SlideShare une entreprise Scribd logo
1  sur  17
Lecture 4:
Clients &
Workstations
Network Design & Administration
Overview
• What are Workstations / Client machines?
• Anything that an actual user sits at!
• Potentially Windows 7 Professional / Ultimate,




                                                      Network Design & Administration
  Vista Business / Ultimate, XP Professional, Linux
  and OS X.
• Have to be able to communicate with Servers
  and use their services – otherwise standalone.
• Much more likely to cause problems because
  user is directly involved.
                                                              2
New Workstations
• May already be bought with an operating system
  on.
• Generally need to install OS if:
 • Home version of OS – unsatisfactory.




                                                      Network Design & Administration
 • Not corporate standard – e.g. Vista rather than
   Windows 7.
 • User preference – only if corporation allows
 • Need multiple boot.
 • Bought bare – will use volume licencing.
 • Want to ensure consistency. i.e. starting from a           3
   known state[1].
What do you get?
• Microsoft – basic versions of standard tools. E.g.
  works, outlook express…
• Linux – full set of free standard tools.
• Apple – complete turnkey system.




                                                       Network Design & Administration
• Microsoft expect you to buy full Office suite and
  use Exchange server if used within a corporate
  environment.
                                                               4
Life and Death of a
Workstation[2]
   New

              Rebuild
                               Update
Build
                                          Entropy




                                                                  Network Design & Administration
             Initialise                               Unknown
   Clean                     Configured
                                            Debug

                Retire

                                Off

• Computer is only usable in a configured state.
• Entropy occurs as workstation gets modified over time (failed
  installs, malware, inappropriate software).                             5
• Need to have processes / procedures to bring back to
  configured state as efficiently as possible.
User Expectations
• A configured machine must:
 • Have the corporate standard word processing
   package, in the standard corporate setup (e.g. with
   foreign language support if required by business).




                                                         Network Design & Administration
 • Allow use of the standard email package with no
   extra user initialisation.
 • Have any business-specific software already
   installed.
 • Have any corporate purchased anti-virus, anti-
   spam, malware software.
                                                                 6
 • Have appropriate web access.
User Expectations
• The workstation must not:
 • Force the user to do anything except log on to
   start working.
 • Allow the user to install their own choices of




                                                       Network Design & Administration
   packages (unless authorised).
 • Encourage the user to keep files locally. i.e. it
   must, wherever possible, default to sending work
   to file servers.
 • It may be worthwhile to provide users with a do /
   don’t list when they first get a new workstation.           7
File System Formats
Historical (nearly)



Still used




                        Network Design & Administration
Necessary for servers




                                8
Hard disk geometry[4]




                                                                           Network Design & Administration
• Hard disks usually have a number of platters contained within them.
• Each side of a platter is used and will have it’s own read/write head.
                                                                                   9
• Each surface will contain a number of tracks and sectors.
Magnetic Disks[4]




                                                        Network Design & Administration
• Example of two sectors on a portion of a disk track

                                                        10
File Allocation Table Example
        Boot Sector             FS Info         FAT 1             FAT 2                        Data

Directory
  Table
                         Cluster Next Cluster              Cluster size is usually between 2KB and 32KB
               Start       2                            00 00 00 00 00 00 00 00 00 …                      2
autoexec.bat   of file




                                                                                                               Network Design & Administration
cmd.com                    3                            00 00 00 00 00 00 00 00 00 …                      3
…
                           4         7                  56 A3 AA 09 7C 32 C0 0C 8A …                      4
                           5                            00 00 00 00 00 00 00 00 00 …                      5
                           6      FFFF                  C3 FA 77 09 4A 32 1A BB FF FF                     6
                           7       10                   3F 33 6E 23 5D 10 19 FB 84 …                      7
                           8                            00 00 00 00 00 00 00 00 00 …                      8
                           9                            00 00 00 00 00 00 00 00 00 …                      9
                           10        6                  56 33 77 09 77 32 11 00 84 …                      10

                           11                           00 00 00 00 00 00 00 00 00 …                      11
                                                                                                               11
                           12                           87 45 22 56 78 44 88 99 34 …                      12

                           13
Installing the OS
• There are a number of ways of doing this:
  • Locally – by typing in parameters as prompted
    during the process (media option)
  • Using Windows Automated Installation Kit (AIK)




                                                     Network Design & Administration
    • Can deploy from:
      • Media (unattended flash drive/ISO/DVD)
      • Network (deploy image via a network)
      • Server (deploy via a server)


                                                     12
Windows Systems Image
Manager Architecture[3]




                          Network Design & Administration
                          13
SIM Interface[3]




     Network Design & Administration
14
Integrating Linux
• Easy to add Windows workstations to an Active Directory Domain!
• It is not so easy to integrate other Operating Systems (e.g. Linux)

Considerations for integrating Linux:
1.     Authenticate against the AD server




                                                                        Network Design & Administration
     • Setup Kerberos package (install using apt-get)
     • Configure Kerberos with realm for domain
         • Configure key server and domain details
     • Generate a new Kerberos ticket
2.     Setup SMB file access (via Samba)
     • Configure smb.conf with realm details
3.     Configure nsswitch.conf
     • Add WINS, DNS and BIND information
4.     Join domain.                                                     15
5.     Still have to set up file shares etc!
Summary
• Many different methods of installation.
• Can depend on starting point (e.g. upgrade or
  bare machine)
• More automation has more pre-requisites.




                                                  Network Design & Administration
• Increased automation reduces Total Cost of
  Ownership (TCO)
  • This is critical in a business environment.


                                                  16
Next Time & References
• Corporate architecture
• Domains and Active Directory Domain Services

[1] “The Practice of System and Network Administration”, Limoncelli,




                                                                            Network Design & Administration
Chapter 3.1.1.4
[2] “The Practice of System and Network Administration”, Limoncelli, p42,
Figure 3.1 (from Evard, 1997)
[3] Windows SIM architecture, Microsoft help file (WAIK)
(http://technet.microsoft.com/en-us/library/cc766157%28WS.10%29.aspx)
[4] “Structured Computer Organisation”, Andrew Tanenbaum, 2006


                                                                            17

Contenu connexe

Tendances

Lesson 5 - Managing Devices
Lesson 5 - Managing DevicesLesson 5 - Managing Devices
Lesson 5 - Managing DevicesGene Carboni
 
Lesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and LibrariesLesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and LibrariesGene Carboni
 
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...Gene Carboni
 
Wd share space_release_notes_2_2_93_final
Wd share space_release_notes_2_2_93_finalWd share space_release_notes_2_2_93_final
Wd share space_release_notes_2_2_93_finalinterviz
 
My sql on linux
My sql on linuxMy sql on linux
My sql on linuxkjwunderle
 
Hyper V And Scvmm Best Practis
Hyper V And Scvmm Best PractisHyper V And Scvmm Best Practis
Hyper V And Scvmm Best PractisBlauge
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingGene Carboni
 
Virtualization technology "comparison vmware 9 vs virtualbox 4.2"
Virtualization  technology "comparison vmware 9 vs virtualbox 4.2"Virtualization  technology "comparison vmware 9 vs virtualbox 4.2"
Virtualization technology "comparison vmware 9 vs virtualbox 4.2"Lagendary Sheeva
 
DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...
DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...
DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...Christoph Adler
 
Lecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 ConfigurationLecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 ConfigurationKen Hutchins
 
Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1Microsoft TechNet
 
Chapter 4 Wendys Op Systems & File Mgt
Chapter 4    Wendys Op Systems & File MgtChapter 4    Wendys Op Systems & File Mgt
Chapter 4 Wendys Op Systems & File Mgtguestf77c65c
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5rohassanie
 
Unix nim-presentation
Unix nim-presentationUnix nim-presentation
Unix nim-presentationRajeev Ghosh
 
Leopard install setup
Leopard install setupLeopard install setup
Leopard install setupnavenaa
 

Tendances (20)

Lesson 5 - Managing Devices
Lesson 5 - Managing DevicesLesson 5 - Managing Devices
Lesson 5 - Managing Devices
 
Lesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and LibrariesLesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and Libraries
 
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
 
SP1_Battlecard
SP1_BattlecardSP1_Battlecard
SP1_Battlecard
 
ITE - Chapter 5
ITE - Chapter 5ITE - Chapter 5
ITE - Chapter 5
 
Wd share space_release_notes_2_2_93_final
Wd share space_release_notes_2_2_93_finalWd share space_release_notes_2_2_93_final
Wd share space_release_notes_2_2_93_final
 
My sql on linux
My sql on linuxMy sql on linux
My sql on linux
 
Vsp 41 config_max
Vsp 41 config_maxVsp 41 config_max
Vsp 41 config_max
 
Hyper V And Scvmm Best Practis
Hyper V And Scvmm Best PractisHyper V And Scvmm Best Practis
Hyper V And Scvmm Best Practis
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and Protecting
 
Virtualization technology "comparison vmware 9 vs virtualbox 4.2"
Virtualization  technology "comparison vmware 9 vs virtualbox 4.2"Virtualization  technology "comparison vmware 9 vs virtualbox 4.2"
Virtualization technology "comparison vmware 9 vs virtualbox 4.2"
 
Windows 7 configuration
Windows 7 configurationWindows 7 configuration
Windows 7 configuration
 
DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...
DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...
DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...
 
Lecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 ConfigurationLecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 Configuration
 
Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1
 
Chapter 4 Wendys Op Systems & File Mgt
Chapter 4    Wendys Op Systems & File MgtChapter 4    Wendys Op Systems & File Mgt
Chapter 4 Wendys Op Systems & File Mgt
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5
 
Unix nim-presentation
Unix nim-presentationUnix nim-presentation
Unix nim-presentation
 
Leopard install setup
Leopard install setupLeopard install setup
Leopard install setup
 
Ch05
Ch05Ch05
Ch05
 

En vedette

En vedette (6)

Isys20261 lecture 10
Isys20261 lecture 10Isys20261 lecture 10
Isys20261 lecture 10
 
GOLD MUSEUM
GOLD MUSEUMGOLD MUSEUM
GOLD MUSEUM
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Skypeprezzi
SkypeprezziSkypeprezzi
Skypeprezzi
 
Lecture 10 the user experience
Lecture 10   the user experienceLecture 10   the user experience
Lecture 10 the user experience
 
Lecture 7 naming and structuring objects
Lecture 7   naming and structuring objectsLecture 7   naming and structuring objects
Lecture 7 naming and structuring objects
 

Similaire à Lecture 4 client workstations

K2000 Mac Imaging
K2000 Mac ImagingK2000 Mac Imaging
K2000 Mac ImagingDell World
 
Operational Best Practices in the Cloud
Operational Best Practices in the CloudOperational Best Practices in the Cloud
Operational Best Practices in the CloudRightScale
 
Sergey Dzyuban "To Build My Own Cloud with Blackjack…"
Sergey Dzyuban "To Build My Own Cloud with Blackjack…"Sergey Dzyuban "To Build My Own Cloud with Blackjack…"
Sergey Dzyuban "To Build My Own Cloud with Blackjack…"Fwdays
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptxTadeseBeyene
 
ICONUK 2018 - IBM Notes V10 Performance Boost
ICONUK 2018 - IBM Notes V10 Performance BoostICONUK 2018 - IBM Notes V10 Performance Boost
ICONUK 2018 - IBM Notes V10 Performance BoostChristoph Adler
 
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff StokesAchieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff StokesJeff Stokes
 
AdminCamp 2018 - IBM Notes V10 Performance Boost
AdminCamp 2018 - IBM Notes V10 Performance BoostAdminCamp 2018 - IBM Notes V10 Performance Boost
AdminCamp 2018 - IBM Notes V10 Performance BoostChristoph Adler
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5Irsandi Hasan
 
Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)MongoDB
 
Ironic 140622212631-phpapp02
Ironic 140622212631-phpapp02Ironic 140622212631-phpapp02
Ironic 140622212631-phpapp02Narender Kumar
 
Ironic 140622212631-phpapp02
Ironic 140622212631-phpapp02Ironic 140622212631-phpapp02
Ironic 140622212631-phpapp02Narender Kumar
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate serverGera Paulos
 
websphere commerce server admin configuration
websphere commerce server admin configuration websphere commerce server admin configuration
websphere commerce server admin configuration Laxmi Kanth Kshatriya
 

Similaire à Lecture 4 client workstations (20)

ITE7_Chp10.pptx
ITE7_Chp10.pptxITE7_Chp10.pptx
ITE7_Chp10.pptx
 
K2000 Mac Imaging
K2000 Mac ImagingK2000 Mac Imaging
K2000 Mac Imaging
 
Operational Best Practices in the Cloud
Operational Best Practices in the CloudOperational Best Practices in the Cloud
Operational Best Practices in the Cloud
 
Ite v5.0 chapter5
Ite v5.0 chapter5Ite v5.0 chapter5
Ite v5.0 chapter5
 
Sergey Dzyuban "To Build My Own Cloud with Blackjack…"
Sergey Dzyuban "To Build My Own Cloud with Blackjack…"Sergey Dzyuban "To Build My Own Cloud with Blackjack…"
Sergey Dzyuban "To Build My Own Cloud with Blackjack…"
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptx
 
Installation of EM 12c
Installation of EM 12cInstallation of EM 12c
Installation of EM 12c
 
ICONUK 2018 - IBM Notes V10 Performance Boost
ICONUK 2018 - IBM Notes V10 Performance BoostICONUK 2018 - IBM Notes V10 Performance Boost
ICONUK 2018 - IBM Notes V10 Performance Boost
 
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff StokesAchieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
 
AdminCamp 2018 - IBM Notes V10 Performance Boost
AdminCamp 2018 - IBM Notes V10 Performance BoostAdminCamp 2018 - IBM Notes V10 Performance Boost
AdminCamp 2018 - IBM Notes V10 Performance Boost
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5
 
Introduction to chrome os
Introduction to chrome osIntroduction to chrome os
Introduction to chrome os
 
Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)
 
Ironic 140622212631-phpapp02
Ironic 140622212631-phpapp02Ironic 140622212631-phpapp02
Ironic 140622212631-phpapp02
 
Ironic
IronicIronic
Ironic
 
Ironic 140622212631-phpapp02
Ironic 140622212631-phpapp02Ironic 140622212631-phpapp02
Ironic 140622212631-phpapp02
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
 
Windows sever 2008
Windows sever 2008Windows sever 2008
Windows sever 2008
 
Deployment Day Session 1: Introduction to MDT 2012
Deployment Day Session 1: Introduction to MDT 2012Deployment Day Session 1: Introduction to MDT 2012
Deployment Day Session 1: Introduction to MDT 2012
 
websphere commerce server admin configuration
websphere commerce server admin configuration websphere commerce server admin configuration
websphere commerce server admin configuration
 

Plus de Wiliam Ferraciolli (19)

Lecture 10 the user experience (1)
Lecture 10   the user experience (1)Lecture 10   the user experience (1)
Lecture 10 the user experience (1)
 
Lecture 9 further permissions
Lecture 9   further permissionsLecture 9   further permissions
Lecture 9 further permissions
 
Lecture 8 permissions
Lecture 8   permissionsLecture 8   permissions
Lecture 8 permissions
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architecture
 
Lecture 2 servers and services
Lecture 2   servers and servicesLecture 2   servers and services
Lecture 2 servers and services
 
Lecture 1 introduction
Lecture 1   introductionLecture 1   introduction
Lecture 1 introduction
 
Lecture 13, 14 & 15 c# cmd let programming and scripting
Lecture 13, 14 & 15   c# cmd let programming and scriptingLecture 13, 14 & 15   c# cmd let programming and scripting
Lecture 13, 14 & 15 c# cmd let programming and scripting
 
Isys20261 lecture 14
Isys20261 lecture 14Isys20261 lecture 14
Isys20261 lecture 14
 
Isys20261 lecture 12
Isys20261 lecture 12Isys20261 lecture 12
Isys20261 lecture 12
 
Isys20261 lecture 11
Isys20261 lecture 11Isys20261 lecture 11
Isys20261 lecture 11
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
 
Isys20261 lecture 08
Isys20261 lecture 08Isys20261 lecture 08
Isys20261 lecture 08
 
Isys20261 lecture 07
Isys20261 lecture 07Isys20261 lecture 07
Isys20261 lecture 07
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
Isys20261 lecture 04
Isys20261 lecture 04Isys20261 lecture 04
Isys20261 lecture 04
 
Isys20261 lecture 03
Isys20261 lecture 03Isys20261 lecture 03
Isys20261 lecture 03
 
Isys20261 lecture 01
Isys20261 lecture 01Isys20261 lecture 01
Isys20261 lecture 01
 
Isys20261 lecture 13
Isys20261 lecture 13Isys20261 lecture 13
Isys20261 lecture 13
 

Lecture 4 client workstations

  • 2. Overview • What are Workstations / Client machines? • Anything that an actual user sits at! • Potentially Windows 7 Professional / Ultimate, Network Design & Administration Vista Business / Ultimate, XP Professional, Linux and OS X. • Have to be able to communicate with Servers and use their services – otherwise standalone. • Much more likely to cause problems because user is directly involved. 2
  • 3. New Workstations • May already be bought with an operating system on. • Generally need to install OS if: • Home version of OS – unsatisfactory. Network Design & Administration • Not corporate standard – e.g. Vista rather than Windows 7. • User preference – only if corporation allows • Need multiple boot. • Bought bare – will use volume licencing. • Want to ensure consistency. i.e. starting from a 3 known state[1].
  • 4. What do you get? • Microsoft – basic versions of standard tools. E.g. works, outlook express… • Linux – full set of free standard tools. • Apple – complete turnkey system. Network Design & Administration • Microsoft expect you to buy full Office suite and use Exchange server if used within a corporate environment. 4
  • 5. Life and Death of a Workstation[2] New Rebuild Update Build Entropy Network Design & Administration Initialise Unknown Clean Configured Debug Retire Off • Computer is only usable in a configured state. • Entropy occurs as workstation gets modified over time (failed installs, malware, inappropriate software). 5 • Need to have processes / procedures to bring back to configured state as efficiently as possible.
  • 6. User Expectations • A configured machine must: • Have the corporate standard word processing package, in the standard corporate setup (e.g. with foreign language support if required by business). Network Design & Administration • Allow use of the standard email package with no extra user initialisation. • Have any business-specific software already installed. • Have any corporate purchased anti-virus, anti- spam, malware software. 6 • Have appropriate web access.
  • 7. User Expectations • The workstation must not: • Force the user to do anything except log on to start working. • Allow the user to install their own choices of Network Design & Administration packages (unless authorised). • Encourage the user to keep files locally. i.e. it must, wherever possible, default to sending work to file servers. • It may be worthwhile to provide users with a do / don’t list when they first get a new workstation. 7
  • 8. File System Formats Historical (nearly) Still used Network Design & Administration Necessary for servers 8
  • 9. Hard disk geometry[4] Network Design & Administration • Hard disks usually have a number of platters contained within them. • Each side of a platter is used and will have it’s own read/write head. 9 • Each surface will contain a number of tracks and sectors.
  • 10. Magnetic Disks[4] Network Design & Administration • Example of two sectors on a portion of a disk track 10
  • 11. File Allocation Table Example Boot Sector FS Info FAT 1 FAT 2 Data Directory Table Cluster Next Cluster Cluster size is usually between 2KB and 32KB Start 2 00 00 00 00 00 00 00 00 00 … 2 autoexec.bat of file Network Design & Administration cmd.com 3 00 00 00 00 00 00 00 00 00 … 3 … 4 7 56 A3 AA 09 7C 32 C0 0C 8A … 4 5 00 00 00 00 00 00 00 00 00 … 5 6 FFFF C3 FA 77 09 4A 32 1A BB FF FF 6 7 10 3F 33 6E 23 5D 10 19 FB 84 … 7 8 00 00 00 00 00 00 00 00 00 … 8 9 00 00 00 00 00 00 00 00 00 … 9 10 6 56 33 77 09 77 32 11 00 84 … 10 11 00 00 00 00 00 00 00 00 00 … 11 11 12 87 45 22 56 78 44 88 99 34 … 12 13
  • 12. Installing the OS • There are a number of ways of doing this: • Locally – by typing in parameters as prompted during the process (media option) • Using Windows Automated Installation Kit (AIK) Network Design & Administration • Can deploy from: • Media (unattended flash drive/ISO/DVD) • Network (deploy image via a network) • Server (deploy via a server) 12
  • 13. Windows Systems Image Manager Architecture[3] Network Design & Administration 13
  • 14. SIM Interface[3] Network Design & Administration 14
  • 15. Integrating Linux • Easy to add Windows workstations to an Active Directory Domain! • It is not so easy to integrate other Operating Systems (e.g. Linux) Considerations for integrating Linux: 1. Authenticate against the AD server Network Design & Administration • Setup Kerberos package (install using apt-get) • Configure Kerberos with realm for domain • Configure key server and domain details • Generate a new Kerberos ticket 2. Setup SMB file access (via Samba) • Configure smb.conf with realm details 3. Configure nsswitch.conf • Add WINS, DNS and BIND information 4. Join domain. 15 5. Still have to set up file shares etc!
  • 16. Summary • Many different methods of installation. • Can depend on starting point (e.g. upgrade or bare machine) • More automation has more pre-requisites. Network Design & Administration • Increased automation reduces Total Cost of Ownership (TCO) • This is critical in a business environment. 16
  • 17. Next Time & References • Corporate architecture • Domains and Active Directory Domain Services [1] “The Practice of System and Network Administration”, Limoncelli, Network Design & Administration Chapter 3.1.1.4 [2] “The Practice of System and Network Administration”, Limoncelli, p42, Figure 3.1 (from Evard, 1997) [3] Windows SIM architecture, Microsoft help file (WAIK) (http://technet.microsoft.com/en-us/library/cc766157%28WS.10%29.aspx) [4] “Structured Computer Organisation”, Andrew Tanenbaum, 2006 17