Top Banner
COMP3122 COMP3122 Network Management Network Management Richard Henson Richard Henson March 2011 March 2011
40

COMP3122 Network Management

Dec 30, 2015

Download

Documents

wilma-chaney

COMP3122 Network Management. Richard Henson March 2011. Week 6 – Installing & Auto-installing software. Objectives Explain different methods for installing system and application software on client machines Explain how installation can occur without user intervention - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: COMP3122  Network Management

COMP3122 COMP3122 Network ManagementNetwork Management

Richard HensonRichard Henson

March 2011March 2011

Page 2: COMP3122  Network Management

Week 6 – Installing & Auto-Week 6 – Installing & Auto-installing softwareinstalling software

ObjectivesObjectives– Explain different methods for installing Explain different methods for installing

system and application software on client system and application software on client machinesmachines

– Explain how installation can occur without Explain how installation can occur without user interventionuser intervention

– Explain how a complete system can be Explain how a complete system can be rapidly installed on a client machine to rapidly installed on a client machine to minimise downtimeminimise downtime

Page 3: COMP3122  Network Management

Serving Users Serving Users What happens at the server end is What happens at the server end is

mostly “behind the scenes”mostly “behind the scenes”– users rarely get involved…users rarely get involved…

Client-end matters are often “up-close-Client-end matters are often “up-close-and-personal”and-personal”– client machines in the hands of usersclient machines in the hands of users– users not able to do their job because users not able to do their job because

something isn’t working as they would wish something isn’t working as they would wish can be difficult to deal withcan be difficult to deal with

Page 4: COMP3122  Network Management

Managing ClientsManaging Clients One of the most important parts of the One of the most important parts of the

job of a network managerjob of a network manager– potentially more troublesome as the potentially more troublesome as the

network gets bigger and more diversenetwork gets bigger and more diverse Having “happy” users involves getting Having “happy” users involves getting

three things right:three things right:– user and group settingsuser and group settings– applications delivered via the desktopapplications delivered via the desktop– desktop settingsdesktop settings

Page 5: COMP3122  Network Management

Client Installation Methods: Client Installation Methods: Sequence of OperationsSequence of Operations

Applications run on operating Applications run on operating systemssystems– makes sense to install the operating makes sense to install the operating

system firstsystem first

– some methods (e.g. disk “imaging”) some methods (e.g. disk “imaging”) do both simultaneouslydo both simultaneously

Page 6: COMP3122  Network Management

Client Installation Methods: Client Installation Methods: 1. From Local CD-ROM1. From Local CD-ROM

Software issued by suppliers on CD-ROM or Software issued by suppliers on CD-ROM or DVD-ROMDVD-ROM– could just install operating systems and could just install operating systems and

applications to individual machines via CD-ROM applications to individual machines via CD-ROM drive on the client machinedrive on the client machine

Problem… TIME! CD-ROM slowProblem… TIME! CD-ROM slow– modern systems software and applications are modern systems software and applications are

EACH often large (> 500 Mb)EACH often large (> 500 Mb)» long time to copy CD -> hard disklong time to copy CD -> hard disk

– replicated many times to install all this on all replicated many times to install all this on all machines in a typical networkmachines in a typical network

Page 7: COMP3122  Network Management

Client Installation Methods: Client Installation Methods: 2. from local hard disk2. from local hard disk

Convenient if operating system already Convenient if operating system already installedinstalled– applications all copied “en bloc” from CD-ROM to applications all copied “en bloc” from CD-ROM to

local hard disk (may need a large hard disk…)local hard disk (may need a large hard disk…)– technician can get on with other tasks while the technician can get on with other tasks while the

apps installation files are copyingapps installation files are copying Installation program then executed directly Installation program then executed directly

from local hard diskfrom local hard disk– rapid copying because no CD-ROM involvedrapid copying because no CD-ROM involved– significantly faster than CD-ROM based significantly faster than CD-ROM based

installationinstallation

Page 8: COMP3122  Network Management

Client Installation Methods:Client Installation Methods:3. CD-ROM across the network3. CD-ROM across the network

CD-ROM drive on the serverCD-ROM drive on the server Local machine accessible from the serverLocal machine accessible from the server Either:Either:

– contents of CD-ROM copied across the network to contents of CD-ROM copied across the network to local hard disk (slow)local hard disk (slow)

– software then installed from local machine (faster)software then installed from local machine (faster) Or:Or:

– Software installed directly to local machine from Software installed directly to local machine from network CD-ROM (slow)network CD-ROM (slow)

Page 9: COMP3122  Network Management

Client Installation Methods:Client Installation Methods:4. USB across the network4. USB across the network

Assumes previous copying of app(s) to USB:Assumes previous copying of app(s) to USB:– memory stick then plugged into USB the servermemory stick then plugged into USB the server

Either:Either:– USB data copied across the network to local hard USB data copied across the network to local hard

disk (fast)disk (fast)– then software installed from local machine (fast)then software installed from local machine (fast)

Or:Or:– software installed directly to local machine from software installed directly to local machine from

network CD-ROM (fast)network CD-ROM (fast)

Page 10: COMP3122  Network Management

Client Installation Methods: Client Installation Methods: 5. Directly from Server Hard 5. Directly from Server Hard

Disk across the networkDisk across the network Software all previously copied to server hard Software all previously copied to server hard

disk (CD-slow, USB-faster)disk (CD-slow, USB-faster) Then either:Then either:

– data copied across the network to local hard disk data copied across the network to local hard disk (fast)(fast)

– software then installed from local machine (fast)software then installed from local machine (fast) Or:Or:

– Software installed directly to local machine from Software installed directly to local machine from network server (fast)network server (fast)

Page 11: COMP3122  Network Management

Client Installation Methods: Client Installation Methods:

6. To multiple clients 6. To multiple clients simultaneously from Serversimultaneously from Server Software all previously copied to server Software all previously copied to server

hard disk as before (CD-slow, USB-hard disk as before (CD-slow, USB-faster)faster)– data copied simultaneously across the data copied simultaneously across the

network to many local hard disks (slow)network to many local hard disks (slow)– apps then triggered to install “unattended” apps then triggered to install “unattended”

on local machine (fast)on local machine (fast)

Page 12: COMP3122  Network Management

Unattended InstallationsUnattended Installations Whilst software is being installed on a Whilst software is being installed on a

computer, the set-up program asks a series of computer, the set-up program asks a series of questions…questions…– means that the installation cannot be fully means that the installation cannot be fully

automaticautomatic However, for a given hardware setup it is However, for a given hardware setup it is

possible to create and use a text file possible to create and use a text file containing appropriate answers to the set-up containing appropriate answers to the set-up program’s questionsprogram’s questions– the set-up program processes these directlythe set-up program processes these directly– fully automated installations then occur…fully automated installations then occur…

Page 13: COMP3122  Network Management

Managing Unattended Managing Unattended Installations across the networkInstallations across the network

““Batch file” written to answer set-up program Batch file” written to answer set-up program all these questions automaticallyall these questions automatically– accessible to all “hardware clone” clients from the accessible to all “hardware clone” clients from the

serverserver

With Windows 2000 etc., batch file saved as With Windows 2000 etc., batch file saved as UNATTEND.TXT UNATTEND.TXT – to take account of the different hardware to take account of the different hardware

specifications of client machines, a number of specifications of client machines, a number of “unattend” files need to be available on the server“unattend” files need to be available on the server

Page 14: COMP3122  Network Management

““Batch” or “Script” filesBatch” or “Script” files

Just a series of commands for the Just a series of commands for the operating system e.g.operating system e.g.– Autoexec.bat (from MS-DOS)Autoexec.bat (from MS-DOS)– Win.ini (from Windows 3.1)Win.ini (from Windows 3.1)– Unix “shell scripts”Unix “shell scripts”

All commands executed automatically, All commands executed automatically, and very quickly, without user and very quickly, without user interventionintervention

Page 15: COMP3122  Network Management

Creating the scripts for an Creating the scripts for an unattended installationunattended installation

At first sight, two alternatives:At first sight, two alternatives:– EITHEREITHER

» created manually, from knowledge of the setup created manually, from knowledge of the setup program, and the information it would requestprogram, and the information it would request

» perhaps with the help of template files…perhaps with the help of template files…

– OROR» created automatically with software as a result of created automatically with software as a result of

checking the system configuration of a machine that checking the system configuration of a machine that has already been set uphas already been set up

Page 16: COMP3122  Network Management

Creating a system for unattended Creating a system for unattended installations on clientsinstallations on clients

A very clever system could do it all…A very clever system could do it all…– check any client computer to be used on the check any client computer to be used on the

networknetwork» make note of the drivers, settings, etc.make note of the drivers, settings, etc.

– use this information to generate a scriptuse this information to generate a script– store the script on a network serverstore the script on a network server– allow access to the script across the networkallow access to the script across the network– execute the script whenever a similar installation is execute the script whenever a similar installation is

to occur on a similar type of machineto occur on a similar type of machine

Page 17: COMP3122  Network Management

Starting Computers Remotely Starting Computers Remotely (Remote boot motherboard)(Remote boot motherboard)

Motherboards now have a program in the Motherboards now have a program in the BIOS settings (PXE-BIOS) that can be BIOS settings (PXE-BIOS) that can be activated remotely to start the boot-up activated remotely to start the boot-up processprocess

Requires client to be already switched on and Requires client to be already switched on and connected via network to server…connected via network to server…– very useful, and greatly labour saving!very useful, and greatly labour saving!– can be used to activate a client machine at some can be used to activate a client machine at some

distance from the server remotely so that software distance from the server remotely so that software can be installedcan be installed

Page 18: COMP3122  Network Management

Remote Installation “from Remote Installation “from scratch” on a new clientscratch” on a new client

Client with PXE-BIOS needs to be able to Client with PXE-BIOS needs to be able to boot up…boot up…– by accessing, downloading, and executing an by accessing, downloading, and executing an

operating system boot program remotely across operating system boot program remotely across the networkthe network

– which will then trigger the operating system which will then trigger the operating system remote install…remote install…

Whichever system is used the operating Whichever system is used the operating system needs to be available from hard disk system needs to be available from hard disk on a network server…on a network server…

Page 19: COMP3122  Network Management

Remote booting an older BIOSRemote booting an older BIOS

Older machines do not have motherboards Older machines do not have motherboards that support the PXE remote boot environmentthat support the PXE remote boot environment

However, a tool is available with Windows However, a tool is available with Windows servers that enables remote booting on a non-servers that enables remote booting on a non-PXE motherboard PXE motherboard – such a useful thing to be able to do!such a useful thing to be able to do!– means that any clients, no matter what the age of means that any clients, no matter what the age of

the motherboard, can always be remotely the motherboard, can always be remotely configuredconfigured

Page 20: COMP3122  Network Management

Upgrades to Operating Upgrades to Operating Systems and ApplicationsSystems and Applications

Upgrading an operating system across a Upgrading an operating system across a network is a major undertakingnetwork is a major undertaking– carefully planning!carefully planning!– all data needs to be backed upall data needs to be backed up– applications may need to be reinstalledapplications may need to be reinstalled

» sometimes quicker to start again from scratch than go through sometimes quicker to start again from scratch than go through the lengthy upgrade process…the lengthy upgrade process…

Upgrading an application across a network is Upgrading an application across a network is usually a simpler processusually a simpler process– still benefits greatly from automationstill benefits greatly from automation

Page 21: COMP3122  Network Management

Setting up Applications so users Setting up Applications so users can use them appropriatelycan use them appropriately

Major occupier of network administrators timeMajor occupier of network administrators time– The only more time-consuming tasks are The only more time-consuming tasks are

installations and managing logonsinstallations and managing logons Need to ensure:Need to ensure:

– that the required applications ARE availablethat the required applications ARE available– that users have an appropriate desktop to provide that users have an appropriate desktop to provide

access to themaccess to them– that users have sufficient rights to use applications that users have sufficient rights to use applications

in the way they need to use them to do their job, in the way they need to use them to do their job, etc.etc.

Page 22: COMP3122  Network Management

Ways to make Applications Ways to make Applications available for Usersavailable for Users

Available:Available:– asas fat client: fat client:

» user accesses application from local hard diskuser accesses application from local hard disk

– as thin client:as thin client:» user downloads a copy of the application from the serveruser downloads a copy of the application from the server

– via Virtualisation (a server-based virtual machine)via Virtualisation (a server-based virtual machine)

The former is:The former is:– quicker and more flexible for the userquicker and more flexible for the user– a potential pain for the system manager!a potential pain for the system manager!

Page 23: COMP3122  Network Management

Assuming Fat Client Assuming Fat Client Installation… (still the norm)Installation… (still the norm)

Essential to make sure the application works Essential to make sure the application works as expected FOR THE GROUP(S) OF USERS as expected FOR THE GROUP(S) OF USERS WHO WILL BE ACCESSING IT!WHO WILL BE ACCESSING IT!

May need alterations to:May need alterations to:– application configurationapplication configuration– user permissionsuser permissions

Also essential to repeat this cycle for each Also essential to repeat this cycle for each application installedapplication installed

Page 24: COMP3122  Network Management

Rolling out a completed client Rolling out a completed client setup across the networksetup across the network

Could repeat installation processes for Could repeat installation processes for each applicationeach application– create and use unattend scripts to allow create and use unattend scripts to allow

installation to proceed automaticallyinstallation to proceed automatically– copy each application individually to each copy each application individually to each

client machineclient machine Or could use “disk imaging”Or could use “disk imaging”

Page 25: COMP3122  Network Management

Disk “Imaging” or “Cloning”Disk “Imaging” or “Cloning”

The principle is a simple one:The principle is a simple one:– keep a copy of the sector-by-sector contents of keep a copy of the sector-by-sector contents of

the client hard disk on the serverthe client hard disk on the server

Specialist software is required to achieve thisSpecialist software is required to achieve this– separate image created for each type of client separate image created for each type of client

computer on the networkcomputer on the network» different hardware requires different driversdifferent hardware requires different drivers

– each image needs to be stored on the servereach image needs to be stored on the server

Page 26: COMP3122  Network Management

Disk “imaging” Disk “imaging” – continued– continued

Only computers with identical hardware and Only computers with identical hardware and applications will have identical disk imagesapplications will have identical disk images– even small hardware changes require different even small hardware changes require different

drivers, etc.drivers, etc. A unique image must be created for each A unique image must be created for each

batch of computers usedbatch of computers used– each image will require a large amount of space each image will require a large amount of space

on the server(s)on the server(s) Good reason to buy client computers in bulk!Good reason to buy client computers in bulk!

Page 27: COMP3122  Network Management

Achieving the disk Achieving the disk (or partition) “image”(or partition) “image”

Software needs to:Software needs to:– scan and copy a hard disk sectorscan and copy a hard disk sector– write that sector to a new locationwrite that sector to a new location

Repeat until all sectors copiedRepeat until all sectors copied– very many sectors involved…very many sectors involved…– time consuming processtime consuming process

Same principle used in defragmenting filesSame principle used in defragmenting files– but latter copied to the SAME partitionbut latter copied to the SAME partition

Page 28: COMP3122  Network Management

Using the Disk ImageUsing the Disk Image Copying the data back from server to client Copying the data back from server to client

needs careful management:needs careful management:1.1. The client machine needs to have access to an The client machine needs to have access to an

operating system in order to boot upoperating system in order to boot up• assuming the BIOS is PXE (Pre-boot eXecution assuming the BIOS is PXE (Pre-boot eXecution

Environment) compliantEnvironment) compliant

2.2. Once the client is “active”, it can support Once the client is “active”, it can support copying the image across the networkcopying the image across the network

3.3. The client machine, with a full installation of The client machine, with a full installation of operating system and applications, should operating system and applications, should reboot, and in theory would be “ready to roll”reboot, and in theory would be “ready to roll”

Page 29: COMP3122  Network Management

Example of a “Example of a “clean installation” clean installation” tool (Norton Ghost)tool (Norton Ghost)

Popular for imaging over many yearsPopular for imaging over many years Sector-by-sector copying onlySector-by-sector copying only

– this would create identical clients with same IDsthis would create identical clients with same IDs– feature allows a unique SID to be added for each feature allows a unique SID to be added for each

Windows clientWindows client– but not for applications… (problem!)but not for applications… (problem!)

Image file saved as .ghs (if >2 Gb “spanned”) Image file saved as .ghs (if >2 Gb “spanned”) filefile

Page 30: COMP3122  Network Management

Remote Installation Tools for Remote Installation Tools for Managing InstallationsManaging Installations

A useful tool needs to (unattended installations):A useful tool needs to (unattended installations):– generate unattend scripts for operating system and generate unattend scripts for operating system and

application setupsapplication setups– manage all aspects of each unattended installation manage all aspects of each unattended installation

including the allocation of unique IDsincluding the allocation of unique IDs

For imaged installations…For imaged installations…– create an image (or clone) of a client (or server) hard create an image (or clone) of a client (or server) hard

disks & allow it to be accessible via serverdisks & allow it to be accessible via server– manage the restoration of data by copying the image manage the restoration of data by copying the image

from a server to a corrupted, but undamaged, hard from a server to a corrupted, but undamaged, hard disk, and resolve ID conflictsdisk, and resolve ID conflicts

Page 31: COMP3122  Network Management

UNATTEND tools with UNATTEND tools with Windows-series networksWindows-series networks

WINNT (or WINNT32): Setup program itselfWINNT (or WINNT32): Setup program itself– Used with switches e.g. Used with switches e.g.

» /s path to allow installation from a remote source/s path to allow installation from a remote source

» /u path for an unattend script/u path for an unattend script

Unattend.txtUnattend.txt– script providing answers to setup questionsscript providing answers to setup questions

Setup ManagerSetup Manager– tool that automatically generates unattend.txt filestool that automatically generates unattend.txt files

Page 32: COMP3122  Network Management

Windows Application Windows Application Installer ToolInstaller Tool

MSIEXEC.EXEMSIEXEC.EXE– uses windows installer (.msi) files which uses windows installer (.msi) files which

provide installation information as a scriptprovide installation information as a script– executes commands to:executes commands to:

» copy files to target machinecopy files to target machine

» make changes to registrymake changes to registry

» create desktop shortcutscreate desktop shortcuts

Page 33: COMP3122  Network Management

Windows IMAGING (SYSPREP)Windows IMAGING (SYSPREP)

SysprepSysprep– tool specifically for organizations that use tool specifically for organizations that use

disk cloning for mass deploymentsdisk cloning for mass deployments– will clone a particular machine once an will clone a particular machine once an

image of an identical machine has been image of an identical machine has been createdcreated

– further (third party) software is needed to further (third party) software is needed to create the image from another clientcreate the image from another client

» takes that sector-by-sector copy of the disktakes that sector-by-sector copy of the disk

Page 34: COMP3122  Network Management

SYSPREP, continuedSYSPREP, continued 1. Strips the SID from the PC being imaged1. Strips the SID from the PC being imaged 2. installs a miniature version of Windows Setup2. installs a miniature version of Windows Setup 3. imaging software clones the "reference 3. imaging software clones the "reference

machine”machine” 4. new PC pxe-booted using the new image:4. new PC pxe-booted using the new image:

– mini-setup runs:mini-setup runs:» specifies network info, languages and locales, display specifies network info, languages and locales, display

settings…settings…» question responses can be scripted by using a answer file, question responses can be scripted by using a answer file,

sysprep.infsysprep.inf makes the imaging process totally “hands free”makes the imaging process totally “hands free”

Page 35: COMP3122  Network Management

SYSPREP (continued)SYSPREP (continued)

Target PCs must all use the same HAL, Target PCs must all use the same HAL, NTOSKRNL.EXE, and boot deviceNTOSKRNL.EXE, and boot device

Several sysprep support files required:Several sysprep support files required:– sysprep.exe, setupcl.exe, otherssysprep.exe, setupcl.exe, others– must be contained in the C:\SYSPREP must be contained in the C:\SYSPREP

folder of the imagefolder of the image– can be copied from the Deploy folder on can be copied from the Deploy folder on

the Windows 2000 installation CDthe Windows 2000 installation CD

Page 36: COMP3122  Network Management

SYSPREP (continued)SYSPREP (continued)

Setupmgr.exe used to automate the Setupmgr.exe used to automate the “mini-setup” process“mini-setup” process

Answer file must be named sysprep.infAnswer file must be named sysprep.inf BOTH saved in the C:\SYSPREP folderBOTH saved in the C:\SYSPREP folder C:\SYSPREP folder removed as part of C:\SYSPREP folder removed as part of

the installation process the installation process

Page 37: COMP3122  Network Management

Windows RIS Windows RIS (Remote (Remote Installation ServiceInstallation Service))

Manages the complete process Manages the complete process cleanly cleanly installing an operating system and installing an operating system and applications applications to a clientto a client– not “sector-by-sector” cloningnot “sector-by-sector” cloning– can cope with different types of client using can cope with different types of client using

different UNATTEND filesdifferent UNATTEND files– uses PXE to reboot the client and connect uses PXE to reboot the client and connect

it to the network after disk image createdit to the network after disk image created

Page 38: COMP3122  Network Management

More about RISMore about RIS

Three requirements at the server endThree requirements at the server end– not necessarily all on the same machinenot necessarily all on the same machine– should all be on the same subnet)should all be on the same subnet)

These areThese are– active RIS on a server (with active directory) to active RIS on a server (with active directory) to

manage the processmanage the process– active DHCP to deliver the IP address for the active DHCP to deliver the IP address for the

client that is to be remote bootedclient that is to be remote booted– installation files (on a partition separate from RIS) installation files (on a partition separate from RIS)

to download and install an operating system on to download and install an operating system on the new clientthe new client

Page 39: COMP3122  Network Management

Sequence of RIS processesSequence of RIS processes

1.1. DHCP server supplies IP address to DHCP server supplies IP address to clientclient

2.2. RIS server provides boot file & PXE-RIS server provides boot file & PXE-boot environment for clientboot environment for client

3.3. Client prompts for F12 to “network Client prompts for F12 to “network boot”boot”

Page 40: COMP3122  Network Management

AdvancedAdvanced RIS RIS

RIS equivalent for cloning Windows RIS equivalent for cloning Windows serversservers

No real excuse for not having a No real excuse for not having a backup…backup…– if an administrator is capable enough to if an administrator is capable enough to

manage users and clients, server cloning is manage users and clients, server cloning is no more challenging…no more challenging…