More videos like this online at http://www.theurbanpenguin.com
In this lesson we look more at the data collector elections, ZDC elections.XenApp servers are orgainised into zones which would normally represent geographical locations within your organization. So you may have a data centre in London with XenApp servers and a data centre in Manchester also with XenApp servers. In which case, you would create two zones. Each zone would have its own elected data collector. The data collector, or ZDC, is responsible for maintaining the dynamic load information for the farm. Each XenApp server within the zone reports using IMA and port 2512 to the ZDC of its zone its current load information. This way new users connecting will connect to the least busy servers and users with existing session connect back to their same session. It would make sense to have at least two, probably three, session controllers in each zone. Remember that with XenApp 6.5 only servers that hold the session controller role can participate in the ZDC elections.
Currently our farm has one zone and two servers; XA2 though is a session host only XenApp server. We will remove XA2 from the farm and add it back in with the session contreoller role. We
will see how we can control the election process using the election preference settings for each zone and monitor election process with performance monitor counters. Stopping the IMA serviceon XA1 will cause XA2 to win the election, starting the IMA service on XA1 again will see the election fall in favour of XA1.
Hi Dear...Thanks for uploading these videos.This really helpful for me. I want to create farm in my home lab how can i get enterprise or platinum edition licences ? For practice purpose will citrix provide licences??
Hi Andrew, First of all thanks for the video. I have something to ask you.
How exactly were you switching from one Xenapp to another i;e XA1 and XA2. I would like to understand how a windows account can be made xenapp server. My question may sound dumb but i am just beginner. Thanks again :-)
Intelligently assess unstructured content to drive compliance, records management, eDiscovery and targeted migration initiatives.
Secure File Sharing Basics.
Learn the basic cloud features any vendor should have, as well as basic and advanced security measures, before choosing a provider.
The Perils of Email Attachments.
Explore the dangers of sending sensitive business content via email attachments and how it compromises security.
Leveraging the Power of Collaboration.
Discover how Box amplifies Office 365 to make content inside and outside your business more collaborative, mobile and secure.
Learn how companies today are leveraging Box and Office 365 to collaborate securely and seamlessly across their organization.
How to Address Shadow IT in the Enterprise.
Find out how Box addresses Shadow IT in the enterprise without placing blame on your employees.
Bring Your Own Encryption.
Learn about customer-managed encryption, and why businesses should stay in control of their encrypted content in the cloud.
Securing Business Information in the Cloud.
Explore how a new generation of secure, enterprise cloud services mitigates security risks by centralizing documents in one platform.
Design Thinking and Enterprise Security.
How to Protect Content in the Age of Distributed Computing.
Adapting security controls to protect sensitive content has proven difficult in the mobile workplace. Learn how you can secure your content and prevent data loss.
Bridging The Cloud Encryption Gap.
Learn how you can bridge the cloud encryption gap with customer-managed encryption keys.
10 Lessons from Tech Leaders on Digital Transformation.
4 Ways to Build Better Apps with Secure Content Services.
5 Counterintuitive Mistakes Made by Companies Going Digital.
Learn how to make the right decisions upfront while building your digital business.
Explore the four key points you should consider when deciding between cloud versus hybrid for your business.
The Future of Security.