COMP3122 Network Management
-
Upload
wilma-chaney -
Category
Documents
-
view
29 -
download
0
description
Transcript of COMP3122 Network Management
COMP3122 COMP3122 Network ManagementNetwork Management
Richard HensonRichard Henson
March 2011March 2011
Week 6 – Installing & Auto-Week 6 – Installing & Auto-installing softwareinstalling software
ObjectivesObjectives– Explain different methods for installing Explain different methods for installing
system and application software on client system and application software on client machinesmachines
– Explain how installation can occur without Explain how installation can occur without user interventionuser intervention
– Explain how a complete system can be Explain how a complete system can be rapidly installed on a client machine to rapidly installed on a client machine to minimise downtimeminimise downtime
Serving Users Serving Users What happens at the server end is What happens at the server end is
mostly “behind the scenes”mostly “behind the scenes”– users rarely get involved…users rarely get involved…
Client-end matters are often “up-close-Client-end matters are often “up-close-and-personal”and-personal”– client machines in the hands of usersclient machines in the hands of users– users not able to do their job because users not able to do their job because
something isn’t working as they would wish something isn’t working as they would wish can be difficult to deal withcan be difficult to deal with
Managing ClientsManaging Clients One of the most important parts of the One of the most important parts of the
job of a network managerjob of a network manager– potentially more troublesome as the potentially more troublesome as the
network gets bigger and more diversenetwork gets bigger and more diverse Having “happy” users involves getting Having “happy” users involves getting
three things right:three things right:– user and group settingsuser and group settings– applications delivered via the desktopapplications delivered via the desktop– desktop settingsdesktop settings
Client Installation Methods: Client Installation Methods: Sequence of OperationsSequence of Operations
Applications run on operating Applications run on operating systemssystems– makes sense to install the operating makes sense to install the operating
system firstsystem first
– some methods (e.g. disk “imaging”) some methods (e.g. disk “imaging”) do both simultaneouslydo both simultaneously
Client Installation Methods: Client Installation Methods: 1. From Local CD-ROM1. From Local CD-ROM
Software issued by suppliers on CD-ROM or Software issued by suppliers on CD-ROM or DVD-ROMDVD-ROM– could just install operating systems and could just install operating systems and
applications to individual machines via CD-ROM applications to individual machines via CD-ROM drive on the client machinedrive on the client machine
Problem… TIME! CD-ROM slowProblem… TIME! CD-ROM slow– modern systems software and applications are modern systems software and applications are
EACH often large (> 500 Mb)EACH often large (> 500 Mb)» long time to copy CD -> hard disklong time to copy CD -> hard disk
– replicated many times to install all this on all replicated many times to install all this on all machines in a typical networkmachines in a typical network
Client Installation Methods: Client Installation Methods: 2. from local hard disk2. from local hard disk
Convenient if operating system already Convenient if operating system already installedinstalled– applications all copied “en bloc” from CD-ROM to applications all copied “en bloc” from CD-ROM to
local hard disk (may need a large hard disk…)local hard disk (may need a large hard disk…)– technician can get on with other tasks while the technician can get on with other tasks while the
apps installation files are copyingapps installation files are copying Installation program then executed directly Installation program then executed directly
from local hard diskfrom local hard disk– rapid copying because no CD-ROM involvedrapid copying because no CD-ROM involved– significantly faster than CD-ROM based significantly faster than CD-ROM based
installationinstallation
Client Installation Methods:Client Installation Methods:3. CD-ROM across the network3. CD-ROM across the network
CD-ROM drive on the serverCD-ROM drive on the server Local machine accessible from the serverLocal machine accessible from the server Either:Either:
– contents of CD-ROM copied across the network to contents of CD-ROM copied across the network to local hard disk (slow)local hard disk (slow)
– software then installed from local machine (faster)software then installed from local machine (faster) Or:Or:
– Software installed directly to local machine from Software installed directly to local machine from network CD-ROM (slow)network CD-ROM (slow)
Client Installation Methods:Client Installation Methods:4. USB across the network4. USB across the network
Assumes previous copying of app(s) to USB:Assumes previous copying of app(s) to USB:– memory stick then plugged into USB the servermemory stick then plugged into USB the server
Either:Either:– USB data copied across the network to local hard USB data copied across the network to local hard
disk (fast)disk (fast)– then software installed from local machine (fast)then software installed from local machine (fast)
Or:Or:– software installed directly to local machine from software installed directly to local machine from
network CD-ROM (fast)network CD-ROM (fast)
Client Installation Methods: Client Installation Methods: 5. Directly from Server Hard 5. Directly from Server Hard
Disk across the networkDisk across the network Software all previously copied to server hard Software all previously copied to server hard
disk (CD-slow, USB-faster)disk (CD-slow, USB-faster) Then either:Then either:
– data copied across the network to local hard disk data copied across the network to local hard disk (fast)(fast)
– software then installed from local machine (fast)software then installed from local machine (fast) Or:Or:
– Software installed directly to local machine from Software installed directly to local machine from network server (fast)network server (fast)
Client Installation Methods: Client Installation Methods:
6. To multiple clients 6. To multiple clients simultaneously from Serversimultaneously from Server Software all previously copied to server Software all previously copied to server
hard disk as before (CD-slow, USB-hard disk as before (CD-slow, USB-faster)faster)– data copied simultaneously across the data copied simultaneously across the
network to many local hard disks (slow)network to many local hard disks (slow)– apps then triggered to install “unattended” apps then triggered to install “unattended”
on local machine (fast)on local machine (fast)
Unattended InstallationsUnattended Installations Whilst software is being installed on a Whilst software is being installed on a
computer, the set-up program asks a series of computer, the set-up program asks a series of questions…questions…– means that the installation cannot be fully means that the installation cannot be fully
automaticautomatic However, for a given hardware setup it is However, for a given hardware setup it is
possible to create and use a text file possible to create and use a text file containing appropriate answers to the set-up containing appropriate answers to the set-up program’s questionsprogram’s questions– the set-up program processes these directlythe set-up program processes these directly– fully automated installations then occur…fully automated installations then occur…
Managing Unattended Managing Unattended Installations across the networkInstallations across the network
““Batch file” written to answer set-up program Batch file” written to answer set-up program all these questions automaticallyall these questions automatically– accessible to all “hardware clone” clients from the accessible to all “hardware clone” clients from the
serverserver
With Windows 2000 etc., batch file saved as With Windows 2000 etc., batch file saved as UNATTEND.TXT UNATTEND.TXT – to take account of the different hardware to take account of the different hardware
specifications of client machines, a number of specifications of client machines, a number of “unattend” files need to be available on the server“unattend” files need to be available on the server
““Batch” or “Script” filesBatch” or “Script” files
Just a series of commands for the Just a series of commands for the operating system e.g.operating system e.g.– Autoexec.bat (from MS-DOS)Autoexec.bat (from MS-DOS)– Win.ini (from Windows 3.1)Win.ini (from Windows 3.1)– Unix “shell scripts”Unix “shell scripts”
All commands executed automatically, All commands executed automatically, and very quickly, without user and very quickly, without user interventionintervention
Creating the scripts for an Creating the scripts for an unattended installationunattended installation
At first sight, two alternatives:At first sight, two alternatives:– EITHEREITHER
» created manually, from knowledge of the setup created manually, from knowledge of the setup program, and the information it would requestprogram, and the information it would request
» perhaps with the help of template files…perhaps with the help of template files…
– OROR» created automatically with software as a result of created automatically with software as a result of
checking the system configuration of a machine that checking the system configuration of a machine that has already been set uphas already been set up
Creating a system for unattended Creating a system for unattended installations on clientsinstallations on clients
A very clever system could do it all…A very clever system could do it all…– check any client computer to be used on the check any client computer to be used on the
networknetwork» make note of the drivers, settings, etc.make note of the drivers, settings, etc.
– use this information to generate a scriptuse this information to generate a script– store the script on a network serverstore the script on a network server– allow access to the script across the networkallow access to the script across the network– execute the script whenever a similar installation is execute the script whenever a similar installation is
to occur on a similar type of machineto occur on a similar type of machine
Starting Computers Remotely Starting Computers Remotely (Remote boot motherboard)(Remote boot motherboard)
Motherboards now have a program in the Motherboards now have a program in the BIOS settings (PXE-BIOS) that can be BIOS settings (PXE-BIOS) that can be activated remotely to start the boot-up activated remotely to start the boot-up processprocess
Requires client to be already switched on and Requires client to be already switched on and connected via network to server…connected via network to server…– very useful, and greatly labour saving!very useful, and greatly labour saving!– can be used to activate a client machine at some can be used to activate a client machine at some
distance from the server remotely so that software distance from the server remotely so that software can be installedcan be installed
Remote Installation “from Remote Installation “from scratch” on a new clientscratch” on a new client
Client with PXE-BIOS needs to be able to Client with PXE-BIOS needs to be able to boot up…boot up…– by accessing, downloading, and executing an by accessing, downloading, and executing an
operating system boot program remotely across operating system boot program remotely across the networkthe network
– which will then trigger the operating system which will then trigger the operating system remote install…remote install…
Whichever system is used the operating Whichever system is used the operating system needs to be available from hard disk system needs to be available from hard disk on a network server…on a network server…
Remote booting an older BIOSRemote booting an older BIOS
Older machines do not have motherboards Older machines do not have motherboards that support the PXE remote boot environmentthat support the PXE remote boot environment
However, a tool is available with Windows However, a tool is available with Windows servers that enables remote booting on a non-servers that enables remote booting on a non-PXE motherboard PXE motherboard – such a useful thing to be able to do!such a useful thing to be able to do!– means that any clients, no matter what the age of means that any clients, no matter what the age of
the motherboard, can always be remotely the motherboard, can always be remotely configuredconfigured
Upgrades to Operating Upgrades to Operating Systems and ApplicationsSystems and Applications
Upgrading an operating system across a Upgrading an operating system across a network is a major undertakingnetwork is a major undertaking– carefully planning!carefully planning!– all data needs to be backed upall data needs to be backed up– applications may need to be reinstalledapplications may need to be reinstalled
» sometimes quicker to start again from scratch than go through sometimes quicker to start again from scratch than go through the lengthy upgrade process…the lengthy upgrade process…
Upgrading an application across a network is Upgrading an application across a network is usually a simpler processusually a simpler process– still benefits greatly from automationstill benefits greatly from automation
Setting up Applications so users Setting up Applications so users can use them appropriatelycan use them appropriately
Major occupier of network administrators timeMajor occupier of network administrators time– The only more time-consuming tasks are The only more time-consuming tasks are
installations and managing logonsinstallations and managing logons Need to ensure:Need to ensure:
– that the required applications ARE availablethat the required applications ARE available– that users have an appropriate desktop to provide that users have an appropriate desktop to provide
access to themaccess to them– that users have sufficient rights to use applications that users have sufficient rights to use applications
in the way they need to use them to do their job, in the way they need to use them to do their job, etc.etc.
Ways to make Applications Ways to make Applications available for Usersavailable for Users
Available:Available:– asas fat client: fat client:
» user accesses application from local hard diskuser accesses application from local hard disk
– as thin client:as thin client:» user downloads a copy of the application from the serveruser downloads a copy of the application from the server
– via Virtualisation (a server-based virtual machine)via Virtualisation (a server-based virtual machine)
The former is:The former is:– quicker and more flexible for the userquicker and more flexible for the user– a potential pain for the system manager!a potential pain for the system manager!
Assuming Fat Client Assuming Fat Client Installation… (still the norm)Installation… (still the norm)
Essential to make sure the application works Essential to make sure the application works as expected FOR THE GROUP(S) OF USERS as expected FOR THE GROUP(S) OF USERS WHO WILL BE ACCESSING IT!WHO WILL BE ACCESSING IT!
May need alterations to:May need alterations to:– application configurationapplication configuration– user permissionsuser permissions
Also essential to repeat this cycle for each Also essential to repeat this cycle for each application installedapplication installed
Rolling out a completed client Rolling out a completed client setup across the networksetup across the network
Could repeat installation processes for Could repeat installation processes for each applicationeach application– create and use unattend scripts to allow create and use unattend scripts to allow
installation to proceed automaticallyinstallation to proceed automatically– copy each application individually to each copy each application individually to each
client machineclient machine Or could use “disk imaging”Or could use “disk imaging”
Disk “Imaging” or “Cloning”Disk “Imaging” or “Cloning”
The principle is a simple one:The principle is a simple one:– keep a copy of the sector-by-sector contents of keep a copy of the sector-by-sector contents of
the client hard disk on the serverthe client hard disk on the server
Specialist software is required to achieve thisSpecialist software is required to achieve this– separate image created for each type of client separate image created for each type of client
computer on the networkcomputer on the network» different hardware requires different driversdifferent hardware requires different drivers
– each image needs to be stored on the servereach image needs to be stored on the server
Disk “imaging” Disk “imaging” – continued– continued
Only computers with identical hardware and Only computers with identical hardware and applications will have identical disk imagesapplications will have identical disk images– even small hardware changes require different even small hardware changes require different
drivers, etc.drivers, etc. A unique image must be created for each A unique image must be created for each
batch of computers usedbatch of computers used– each image will require a large amount of space each image will require a large amount of space
on the server(s)on the server(s) Good reason to buy client computers in bulk!Good reason to buy client computers in bulk!
Achieving the disk Achieving the disk (or partition) “image”(or partition) “image”
Software needs to:Software needs to:– scan and copy a hard disk sectorscan and copy a hard disk sector– write that sector to a new locationwrite that sector to a new location
Repeat until all sectors copiedRepeat until all sectors copied– very many sectors involved…very many sectors involved…– time consuming processtime consuming process
Same principle used in defragmenting filesSame principle used in defragmenting files– but latter copied to the SAME partitionbut latter copied to the SAME partition
Using the Disk ImageUsing the Disk Image Copying the data back from server to client Copying the data back from server to client
needs careful management:needs careful management:1.1. The client machine needs to have access to an The client machine needs to have access to an
operating system in order to boot upoperating system in order to boot up• assuming the BIOS is PXE (Pre-boot eXecution assuming the BIOS is PXE (Pre-boot eXecution
Environment) compliantEnvironment) compliant
2.2. Once the client is “active”, it can support Once the client is “active”, it can support copying the image across the networkcopying the image across the network
3.3. The client machine, with a full installation of The client machine, with a full installation of operating system and applications, should operating system and applications, should reboot, and in theory would be “ready to roll”reboot, and in theory would be “ready to roll”
Example of a “Example of a “clean installation” clean installation” tool (Norton Ghost)tool (Norton Ghost)
Popular for imaging over many yearsPopular for imaging over many years Sector-by-sector copying onlySector-by-sector copying only
– this would create identical clients with same IDsthis would create identical clients with same IDs– feature allows a unique SID to be added for each feature allows a unique SID to be added for each
Windows clientWindows client– but not for applications… (problem!)but not for applications… (problem!)
Image file saved as .ghs (if >2 Gb “spanned”) Image file saved as .ghs (if >2 Gb “spanned”) filefile
Remote Installation Tools for Remote Installation Tools for Managing InstallationsManaging Installations
A useful tool needs to (unattended installations):A useful tool needs to (unattended installations):– generate unattend scripts for operating system and generate unattend scripts for operating system and
application setupsapplication setups– manage all aspects of each unattended installation manage all aspects of each unattended installation
including the allocation of unique IDsincluding the allocation of unique IDs
For imaged installations…For imaged installations…– create an image (or clone) of a client (or server) hard create an image (or clone) of a client (or server) hard
disks & allow it to be accessible via serverdisks & allow it to be accessible via server– manage the restoration of data by copying the image manage the restoration of data by copying the image
from a server to a corrupted, but undamaged, hard from a server to a corrupted, but undamaged, hard disk, and resolve ID conflictsdisk, and resolve ID conflicts
UNATTEND tools with UNATTEND tools with Windows-series networksWindows-series networks
WINNT (or WINNT32): Setup program itselfWINNT (or WINNT32): Setup program itself– Used with switches e.g. Used with switches e.g.
» /s path to allow installation from a remote source/s path to allow installation from a remote source
» /u path for an unattend script/u path for an unattend script
Unattend.txtUnattend.txt– script providing answers to setup questionsscript providing answers to setup questions
Setup ManagerSetup Manager– tool that automatically generates unattend.txt filestool that automatically generates unattend.txt files
Windows Application Windows Application Installer ToolInstaller Tool
MSIEXEC.EXEMSIEXEC.EXE– uses windows installer (.msi) files which uses windows installer (.msi) files which
provide installation information as a scriptprovide installation information as a script– executes commands to:executes commands to:
» copy files to target machinecopy files to target machine
» make changes to registrymake changes to registry
» create desktop shortcutscreate desktop shortcuts
Windows IMAGING (SYSPREP)Windows IMAGING (SYSPREP)
SysprepSysprep– tool specifically for organizations that use tool specifically for organizations that use
disk cloning for mass deploymentsdisk cloning for mass deployments– will clone a particular machine once an will clone a particular machine once an
image of an identical machine has been image of an identical machine has been createdcreated
– further (third party) software is needed to further (third party) software is needed to create the image from another clientcreate the image from another client
» takes that sector-by-sector copy of the disktakes that sector-by-sector copy of the disk
SYSPREP, continuedSYSPREP, continued 1. Strips the SID from the PC being imaged1. Strips the SID from the PC being imaged 2. installs a miniature version of Windows Setup2. installs a miniature version of Windows Setup 3. imaging software clones the "reference 3. imaging software clones the "reference
machine”machine” 4. new PC pxe-booted using the new image:4. new PC pxe-booted using the new image:
– mini-setup runs:mini-setup runs:» specifies network info, languages and locales, display specifies network info, languages and locales, display
settings…settings…» question responses can be scripted by using a answer file, question responses can be scripted by using a answer file,
sysprep.infsysprep.inf makes the imaging process totally “hands free”makes the imaging process totally “hands free”
SYSPREP (continued)SYSPREP (continued)
Target PCs must all use the same HAL, Target PCs must all use the same HAL, NTOSKRNL.EXE, and boot deviceNTOSKRNL.EXE, and boot device
Several sysprep support files required:Several sysprep support files required:– sysprep.exe, setupcl.exe, otherssysprep.exe, setupcl.exe, others– must be contained in the C:\SYSPREP must be contained in the C:\SYSPREP
folder of the imagefolder of the image– can be copied from the Deploy folder on can be copied from the Deploy folder on
the Windows 2000 installation CDthe Windows 2000 installation CD
SYSPREP (continued)SYSPREP (continued)
Setupmgr.exe used to automate the Setupmgr.exe used to automate the “mini-setup” process“mini-setup” process
Answer file must be named sysprep.infAnswer file must be named sysprep.inf BOTH saved in the C:\SYSPREP folderBOTH saved in the C:\SYSPREP folder C:\SYSPREP folder removed as part of C:\SYSPREP folder removed as part of
the installation process the installation process
Windows RIS Windows RIS (Remote (Remote Installation ServiceInstallation Service))
Manages the complete process Manages the complete process cleanly cleanly installing an operating system and installing an operating system and applications applications to a clientto a client– not “sector-by-sector” cloningnot “sector-by-sector” cloning– can cope with different types of client using can cope with different types of client using
different UNATTEND filesdifferent UNATTEND files– uses PXE to reboot the client and connect uses PXE to reboot the client and connect
it to the network after disk image createdit to the network after disk image created
More about RISMore about RIS
Three requirements at the server endThree requirements at the server end– not necessarily all on the same machinenot necessarily all on the same machine– should all be on the same subnet)should all be on the same subnet)
These areThese are– active RIS on a server (with active directory) to active RIS on a server (with active directory) to
manage the processmanage the process– active DHCP to deliver the IP address for the active DHCP to deliver the IP address for the
client that is to be remote bootedclient that is to be remote booted– installation files (on a partition separate from RIS) installation files (on a partition separate from RIS)
to download and install an operating system on to download and install an operating system on the new clientthe new client
Sequence of RIS processesSequence of RIS processes
1.1. DHCP server supplies IP address to DHCP server supplies IP address to clientclient
2.2. RIS server provides boot file & PXE-RIS server provides boot file & PXE-boot environment for clientboot environment for client
3.3. Client prompts for F12 to “network Client prompts for F12 to “network boot”boot”
AdvancedAdvanced RIS RIS
RIS equivalent for cloning Windows RIS equivalent for cloning Windows serversservers
No real excuse for not having a No real excuse for not having a backup…backup…– if an administrator is capable enough to if an administrator is capable enough to
manage users and clients, server cloning is manage users and clients, server cloning is no more challenging…no more challenging…