Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering XenApp??

You're reading from   Mastering XenApp?? Master the skills required to implement Citrix® XenApp® 7.6 to deploy a complete Citrix®-hosted application from scratch

Arrow left icon
Product type Paperback
Published in Dec 2015
Publisher
ISBN-13 9781785284861
Length 252 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Sunny Jha Sunny Jha
Author Profile Icon Sunny Jha
Sunny Jha
Arrow right icon
View More author details
Toc

Table of Contents (10) Chapters Close

Preface 1. Understanding the XenDesktop® and XenApp® Architecture 2. Initiating the Hypervisor FREE CHAPTER 3. Setting Up the Infrastructure Components 4. Setting Up the Citrix® Components 5. Setting Up the XenApp® Resources 6. Configuring Policies 7. Setting Up Citrix Provisioning Services™ 8. Setting Up NetScaler® Index

High-level concepts of designing the infrastructure

While designing the infrastructure, we are going to consider the five layer model, which will help us implement unified and standardized solutions for every use of XenApp and XenDesktop 7.6.

  • User layer: In this layer, we identify and define the unique user groups, the endpoints they will be using to connect, and their location
  • Access layer: In this layer, we define how a user group will gain access to their resources, focusing on access policies and desktop/application stores
  • Resource layer: This layer defines the application and data provided to each user group
  • Control layer: This layer defines the underlying infrastructure required to support the user accessing their resources
  • Hardware layer: This layer defines the physical implementation of the overall solution

This model gives us the ability to create an extremely flexible model with which user groups can have their own set of access policies and resources, which can be shared. Regardless of how the user accesses and the resource layer are defined, they all are managed by a single, integrated control layer.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image