Principles of the Citrix Protocol ICA Technology

Source: Internet
Author: User

Reprinted from: http://www.zrss.com.cn/article-110-1.html

The core of the Citrix Delivery Center solution is the virtualization technology, the core of virtualization computing is the ICA protocol, the ICA protocol connects the application client execution environment and the remote terminal device, through the ICA's 32 virtual channels (respectively, passing various input and output data such as mouse, keyboard, image, sound, port, print , and so on), the input and output data of the application execution environment on the hub server is again directed to the input of the remote terminal device, so although the application client software is not executed on the client devices, However, the user does not feel any change in operation as compared with client installation.

Virtualization Application Environment Publishing principles for example, as seen in:

Citrix ICA protocol is an efficient data exchange protocol, using data compression, encryption and connection optimization technology , each user's connection only consumes a small amount of network bandwidth, and the actual client software is located in the background LAN, so the end-user equivalent A small amount of network bandwidth will be able to enjoy the speed of execution within the LAN. If there is a lot of data interaction between the system client and server, using the Citrix centralized mode can effectively reduce the transmission data and greatly improve the overall performance.
At the same time, the ICA protocol can be controlled separately for individual virtual channels, which provides fine-grained control of user access and use. For example, assume that the control user is not allowed to print the information through the printer, only need to interrupt the ICA connection in the printer channel.
The platform is designed from a security point of view and is the basis for safe access, not an afterthought.

first of all, the application and data are concentrated in the data center, rather than in the scattered around the terminal equipment, the network only transmits very little non-business data in the encrypted way, such as: keyboard and mouse percussion, screen content refresh, avoid the business important data spread through the network, Even enable users to safely exploit untrusted networks.

second , IT managers have full control over centralized access authorization , and policy-based control makes it easy for IT management to limit what information is available to people and when to access it.

In addition , the platform can establish a secure access network, strengthen user authentication and audit monitoring, can more effectively protect and supervise the enterprise information.


All in all, security-related designs provide the right level of protection for organizations wishing to expand their applications, while reducing security risks such as leaks.

Principles of the Citrix Protocol ICA Technology

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.