IT Vortex - Managed IT Services

Whitepaper: A Comparative Study of PCoIP and Blast Protocols for Horizon View

Abstract

This whitepaper provides a technical analysis of PCoIP (PC-over-IP) and Blast Extreme, two advanced display protocols primarily used in Horizon View, VMware’s desktop virtualization product. The paper will highlight the internal workings of these protocols, their use cases, and their advantages over older protocols such as Remote Desktop Protocol (RDP). Particular attention will be given to their performance and bandwidth efficiency, crucial parameters for any display protocol.

1. Introduction

Horizon View utilizes display protocols to transmit the virtual desktop image from the server to the client device. Two key display protocols used in Horizon View are PCoIP and Blast Extreme1. While the former has been a long-time standard, the latter is an innovation by VMware aimed at providing an improved user experience on mobile networks and devices.

2. PCoIP (PC-over-IP)

2.1 How PCoIP Works

PCoIP, a high-performance display protocol, encodes the entire workstation/server display and transmits it over a standard IP network to a PCoIP client2. The PCoIP protocol compresses, encrypts, and rapidly transports pixels to end-user devices. It performs automatic image quality adjustments and network bandwidth optimizations based on the nature of the task and network conditions.

2.2 Performance and Bandwidth

The PCoIP protocol prioritizes the user experience by dynamically adapting to network conditions and rendering the most crucial elements of the display first3. It is bandwidth-efficient and provides high-quality rendering for both text and graphics.

3. Blast Extreme

3.1 How Blast Extreme Works

Blast Extreme is built on the H.264 codec, an industry-standard video compression format4. It is designed to deliver a high-quality user experience on various network conditions, while conserving server resources. Blast Extreme can intelligently switch between TCP and UDP based on the network conditions, which improves performance.

3.2 Performance and Bandwidth

Blast Extreme excels in environments where network conditions can be challenging, such as mobile and high-latency networks5. The H.264 codec allows more efficient encoding and decoding, leading to lower CPU usage and improved battery life on client devices. It also provides an option to leverage hardware encoding when available, further conserving CPU resources.

4. Comparison with RDP

Compared to the older RDP, both PCoIP and Blast Extreme offer significant improvements:

  • Bandwidth Usage: PCoIP and Blast Extreme are designed to dynamically adapt to network conditions and have advanced compression techniques, which helps in conserving bandwidth6.
  • User Experience: These protocols prioritize user experience, rendering important visual elements first and providing superior performance for multimedia applications7.
  • Network Adaptability: Both protocols can function efficiently over various network types and conditions8.
  • Security: PCoIP and Blast Extreme offer superior encryption and security features compared to RDP9.

5. Conclusion

PCoIP and Blast Extreme represent significant advancements in display protocols, offering improved performance, bandwidth efficiency, network adaptability, and security over the older RDP. While both protocols have their unique strengths, their selection should be based on specific use cases, network conditions, and client device types.

6. References

Please see the citation markers throughout the text for the respective references.

Footnotes

  1. Understanding Remote Display Protocols in Horizon 7 – VMware
  2. PCoIP Technology
  3. PCoIP Protocol Performance
  4. Blast Extreme Display Protocol in Horizon 7 – VMware
  5. Blast Extreme Protocol Performance
  6. PCoIP vs RDP Bandwidth
  7. User Experience Blast vs PCoIP
  8. PCoIP and Blast Network Adaptability
  9. Security Features PCoIP and Blast

Share this post

Share on facebook
Share on twitter
Share on linkedin
Share on reddit
Share on tumblr
Share on whatsapp
Share on email

questions about our services?

Request a free consultation. Fill out the form and we will call you to answer all your questions

Tech Tips, Cyber Threat Mitigation, Cutting Edge Technology, Cost Savings and More!

 

IT Vortex, LLC is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. You will consent to us contacting you for this purpose, by submitting the form.

Fortinet logo

Fortinet is offered in our Cloud Hosting Platform? We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

microsoft logo

Name of the partner

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco

questions about our services?

Request a free consultation. Fill out the form and we will call you to answer all your questions

ACTI Logo

Technology Reseller and Distributor, Certified Implementation Expertise with all ACTi products and services. IT Vortex has worked with ACTi for over a decade implementing security camera solutions for a multitude of industries with AI, Facial Recognition, License Plate Recognition, Loitering Detection, Cloud storage, and more.

Amazon_Web_Services_Logo

IT Vortex partners with AWS via VMware for the VMware on AWS offering that allows for cloud services fulfillment via AWS utilizing the same VMware products many companies already enjoy the benefits from.

Barracuda Logo

Barracuda Technology is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Cisco logo

Cisco Technology is offered in our Cloud Hosting Platform via DUO for MFA. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Condusiv Technologies logo

Condusiv Technology is offered in our Cloud Hosting Platform? We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Dell logo

Dell servers are a key component offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Dropbox logo

We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

DTEN logo

We use DTEN extensively in our offices. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

microsoft logo

Various Microsoft technologies are offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation. 

ingram micro cloud logo

Our distribution preferred partner for our technology offerings.

Apply for this position

Fill out the form below and our hiring team will reach out to you as soon as possible

mitel logo

Our telephone platform of choice. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

NEAT Logo

We use NEAT extensively in our offices. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

observe IT Logo

ObserveIT/Fortinet is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Proofpoint essentials Logo

Fortinet is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Solarwinds Logo

Solarwinds is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Trend Micro Logo
veeam green logo

Veeam is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

vmware logo

Our Datacenter is built on a VMWare architecture. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation. 

wasabi logo

Wasabi is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

zoom-logo

We use Zoom extensively to meet internally and externally. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Security as a Service (SECaaS) by IT Vortex

Pricing Calculator

Choose a service, answer a few simple questions, and receive an individual quote for our services

User count by type

Fill out the form and we will call you to answer all your questions