What are the priorities for video, audio, and USB PCoIP traffic?
PCoIP technology gives priority to USB and audio, while imaging uses remaining available bandwidth. PCoIP technology optimizes user experience for a given bandwidth by adaptively controlling quality and update rate of the image data, and optionally …
Why can a session not be establish after a user disconnects while the Windows "waiting for programs to close" dialog is showing?
Problem When disconnecting a PCoIP session while Windows is shutting down or a user account is logging off with the "waiting for programs to close" dialog is showing; the ability to reconnect the PCoIP session is lost.    Cause When Windows is shutting …
How does PCoIP handle networks with high traffic volumes?
When you plan to use PCoIP on network with high volumes of other traffic that may cause congestion, it is recommended that QoS is implemented to give PCoIP guaranteed bandwidth. PCoIP will adjust to use it's fair share of the network but UDP is typically …
What is Intelligent Packet Re-Transmission in PCoIP Protocol?
PCoIP Protocol uses UDP protocol similar to other real-time protocols (voice-over-IP, interactive video conferencing etc).  This is done to minimize the overhead associated with TCP protocol.  However, reliable transmission of data is important for remote …
What congestion avoidance should be used in network switches and routers?
Weighted Random Early Discard (WRED) should be configured as the congestion avoidance, or congestion management method. WRED gradually drops packets while considering IP precedence, as network devices become congested. This allows PCoIP protocol …
What happens when a PCoIP Packet is lost in transit?
When a PCoIP packet is lost or considered lost, the PCoIP protocol makes an intelligent decision on if the packet should be re-transmitted. PCoIP packets containing audio and sometimes imaging may never be re-transmitted as the next sample of audio or new …
Vault Backup fails if secret has been deleted
Problem The vault backups fail for Anyware Manager if the secret data is deleted. To Verify: Install Anyware Manager Complete the initial login and create a deployment. Create a Deployment Service account and then delete it (this is what might trigger the …