Windows.  Viruses.  Laptops.  Internet.  Office.  Utilities.  Drivers

When computers first appeared and began to gain momentum in popularity, they were autonomous and functioned independently of each other. With the increase in the number of machines, there is a need for them working together.


In some sense, this is due to the user activities that occurred within the same document. To solve similar problem, the use of global and local networks. Their creation led to the need to manage this process and perform all sorts of tasks. Network administration has assumed these responsibilities.

Main functions of network administration

According to international standards, network administration has the following functions:

Failure management (search, correct identification, and troubleshooting of problems and failures in the operation of a particular network);
configuration management (configuration of system components, including their location, network addresses, setting network parameters operating systems And so on);
accounting of network operation (consists of registration and subsequent control over the resources and network devices used);
performance management (providing statistical data on network operation for a certain period of time);
security management (access control is performed and the integrity of all data is maintained).

Various sets of presented functions are embodied in products of manufacturers of means for networks. With regard to performance management, it is carried out to minimize the cost of resources, energy and in order to plan resources for future needs.

System Administrator Responsibilities

Administration computer networks carried out under the supervision and guidance of a system administrator who must perform the following tasks:

Check the performance of databases;
monitor the uninterrupted operation of local networks;
ensure data protection and integrity;
ensure network protection from illegal access;
regulate the access rights of local network users to network resources;
fulfill backup data;
use optimal ways programming for full use available tools and network resources;
keep special logs on network operation;
conduct training for local network users;
control the software used;
control the improvement of the local computer network;
develop network access rights;
suspend illegal modification software for the network.

In addition, the system administrator is responsible for informing employees of a particular enterprise or organization about the weaknesses of the network administration system and the likely ways of illegal access to it.

Features and criteria for system planning

Before you install a computer network, you need to find answers to the following questions:

1. What tasks is it designed to solve, what functions to perform?
2. How will the computer network be built?
3. How many and what devices will be present on the network?
4. What network administration programs will be used?
5. At what level is the organization's security policy, where systems will be installed and so on.

After answering these questions, you can create a system of criteria for a particular computer network. It will include the following items:

1. Preparation, control and testing of programs used daily on the network.
2. Control over the performance, as well as the health of the computers involved in the work.
3. Preliminary preparation of system recovery processes in the presence of errors or failures.
4. Control over further installation new system did not have a negative impact on the network.

To achieve all these goals, it is necessary to train staff and users.

Remote administration programs

If there is a need to control the system outside the organization, remote network administration is used. For this purpose, it is necessary to use special software that makes it possible to control the system and remote access using the Internet in real time. These programs are capable of providing almost complete control over remote components of the local network, as well as each computer individually.

This allows you to remotely control the desktop of each computer on the network, copy or delete various files, work with programs and applications, etc. Today there are many known programs designed to perform remote access. They all differ in their protocol and interface. The latter can be console or visual in nature. Well-known programs are Windows Remote Desktop, UltraVNC, Apple Remote Desktop, Remote Office Manager and others.

Categories of networks A network is a collection of different hardware, software, and communication tools responsible for the effective distribution of information resources. All of them are divided into three categories:

Local;
global;
urban.

Global networks are able to provide interaction, as well as the exchange of information between users located at a remote distance from each other. During the operation of these networks, minor delays in the transmission of information may occur. The reason for this is the relatively low rate of this process. The length of global computer networks can reach thousands of kilometers. Urban networks operate over a shorter distance, so they transmit information at medium and high speeds.

They slow down the data a little, like global ones, but are not able to transmit it over long distances. The length of these computer networks is limited and ranges from several kilometers to several hundred kilometers. The local network guarantees the highest data transfer speed. As a rule, it is located inside one or more buildings. As for its length, it is no more than one kilometer. Often, a local network is designed for one specific organization or enterprise.

Data transmission mechanisms in various networks

The mechanism of data transmission in global and local networks is different. Global computer networks are, first and foremost, about connectivity. In other words, before you can start transferring data between two users, you must first establish a connection between them. In local computer systems Ah, completely different methods are involved that do not require prior connection establishment. In this case, the data is sent to the recipient without receiving confirmation of its readiness.

In addition to different speeds, there are other differences between certain categories of networks. When referring to local networks, each device is equipped with its own network adapter that connects it to other computers. For similar purposes, special switching devices are used in urban networks. As for global networks, they involve routers with high power. They are connected to each other by communication channels.

Network infrastructure

A computer network includes components that can be easily combined into separate groups. Thus, they are the following:

1. Active network equipment.
2. Cable system.
3. Means of communication.
4. Network applications.
5. Network protocols.
6. Network services.

Each of the presented groups has its own subgroups and additional components. All devices connected to a particular network are called upon to transmit data in accordance with an algorithm. It must be understandable to other devices that are included in the system.

Network administration tasks

Network administration involves working with a specific system at a variety of levels. If there are complex corporate networks, administration is designed to solve the following tasks:

Carrying out network planning (as you know, the installation of a system and the installation of all its components are usually carried out by appropriate specialists, so the network administrator often has to change the system, including removing or adding individual elements to it);
Configuring network nodes (administrating local networks in in this case carries out work with active network equipment, as a rule, it is network printer);
adjustment work network services(a complex network is capable of having a wide range of network services, including network infrastructure, directories, print files, as well as access to databases, etc.);
troubleshooting (network administrators have the ability to find all possible malfunctions, including problems with the router, as well as failures in the settings network protocols and services).
carrying out the installation of network protocols (in this case, this includes work such as planning and further configuration of network protocols, testing and identifying the optimal configuration);
searching for ways to increase the efficiency of the network (this may include searching for bottlenecks that require replacement of the corresponding equipment);
monitoring network nodes and network traffic;
ensuring data protection (backup, developing a security policy for users’ personal information, using secure communication, etc.).

It is also worth noting that all the tasks listed above must be performed in parallel and comprehensively.

Administration of security means Administration of security means involves working simultaneously in several directions, which include:

1. Dissemination of up-to-date information required for the operation of security features.
2. Collection and analysis of information about the operation of security mechanisms (in this case, the administration of local networks consists of working with the security management information base).

At the same time, the administrator is tasked with the following tasks:

Key generation and redistribution;
setting up and managing network access;
managing encryption using appropriate cryptographic parameters;
configuration and management of traffic and routing.

In addition, the system administrator must distribute the data to users. This information is required to ensure successful authentication. Such data includes passwords, keys, etc.

Protect your system from viruses and malware

IN Microsoft Windows There is a special Information Support Center responsible for protecting the system from viruses and malware. The operating system is also capable of performing anti-hacking functions, as well as automatic update your data. However, the system administrator is required to perform additional tasks, the purpose of which is to ensure the security of the computer network. Here are the main tasks:

Access to a computer using various ID devices;
setting a ban on writing data to removable drives;
encryption of removable storage media, etc.

Network administration represents actions that are aimed at ensuring the security policy, reliability, and availability of network information resources. For this purpose, appropriate software and hardware are used. As for the system administrator, he has many responsibilities and tasks.

System administration
The main goal of system administration
is to bring the network into line with the goals and objectives for which this network is intended.

Functional areas of management related to system administration, are defined in ISO specifications, and are focused on:

· problem solving(diagnostics, localization and troubleshooting, error logging, testing);

· resource management(accounting, monitoring the use of resources, billing for the resources used and restricting access to them);

· configuration management aimed at ensuring the reliable and efficient functioning of all components of the information system;

performance monitoring (collection and analysis of information about the operation of individual resources, forecasting the degree of satisfaction of user / application needs, measures to increase productivity);

· data protection (managing user access to resources, ensuring data integrity and managing their encryption).

Network administration

Network administration (NetworkManagement) occurs when a network administrator needs and is able to operate with a single view of the network, as a rule, this applies to networks with a complex architecture.

The problems solved in this area are divided into two groups:

1. Work control network equipment,

2. Management of the functioning of the network as a whole.

Topic 17.

Automation of network management. Administration for corporate purposes.

Network and system administration tools did not occupy a dominant position in corporate information systems. Usually connecting a local network to a multi-user Internet environment is quite simple, if it is not a spatially distributed network, that is, not a WAN (WideAreaNetwork). The Internet connection problem has two directions:
1. Actually connecting various segments to the Internet.
2. Organization of the company's network using the Internet.



Network management platform(Networkmanagementplatform) is a set of programs designed to manage a network and its constituent systems.

The network service uses the service provided by the interworking area and provides communication between application processes located in different subscriber systems of the network.

Network Service- This application program:

● interacting with clients, servers and data on the network;

● managing distributed data processing procedures;

● informing users about changes occurring in the network.

Network NMS Service(Networkmanagementservice) – a service that performs network management processes. It is developed by ISO and is located at the application level. The NMS Network Service defines:

management functions;

types of services provided for management;

structure of control information;

protocols that define the transport of control information.

CONCLUSION

The practical training took place at the EAGI College from September 1 to October 24, 2015. My responsibilities included:

1. College network administration

2. Troubleshooting problems that arise when using office software

3. Replacement consumables

4. Consultation of users on IT issues

The purpose of undergoing practical training is to apply the theoretical knowledge acquired during the study process and gain practical experience in working with information technology.

Thanks to my internship at EAGI, I was able to feel myself in the role of a “technician-programmer” (IT), and I believe that the knowledge, skills and abilities I acquired during my professional internship will be needed for my future profession. Overall, the practice was quite interesting and productive.

LIST OF REFERENCES

1 Alekhina G.V. Informatics. Basic course: textbook / Ed. G. V. Alekhina. - 2nd ed., add. and processed – M.: Market DS Corporation, 2010. - 731 p.

2 English-Russian dictionary information technology/ S. B. Orlov. – M.: RadioSoft, 2011. - 640 p.

3 Blumin A. M. World informational resources: textbook / A. M.

4 Blyumin, N. A. Feoktistov; Institute of Public Administration, Law and innovative technologies– M.: Dashkov and K, 2011. - 295 p.

5 Bogatov F.G. Workshop on computer science: Word - Excel - Access: Textbook / F.G. Bogatov - M.: Shield-M, 2010. - 264 p.

6 Bogatov F.G. Workshop on computer science: Word - Excel - Access: Textbook - 2nd ed., revised. / F.G. Bogatov - M.: Shield-M, 2010. - 264 p.

7 Vasilkov A.V. Information systems and their security / A.V. Vasilkov, A.A. Vasilkov, I.A. Vasilkov - M.: Forum, 2010. - 525 p.

8 Guda A. N. Informatics. General course: textbook / A. N. Guda, M. A. Butakova, N. M. Nechitailo, A. V. Chernov; under general ed. V. I. Kolesnikova. - 4th ed. – M.: Publishing and trading corporation Dashkov and K, 2011. - 399 p.

9 Guda A.N., Kolesnikov V.I. Informatics and programming: computer workshop - M.: Dashkov i K, 2010. - 240 p.

10 Emelyanova N.Z. Information systems in economics: textbook. manual / N. Emelyanova, T. L. Partyka, I. I. Popov - M.: Forum, 2011. - 461 p.

Introduction ............................................................................................................... 3

Defining the network infrastructure................................................................... ...................... 5

Network administration................................................................ ................................ 7

Monitoring........................................................ ........................................................ ..... 13

Conclusion................................................. ........................................................ ....... 18

List of used literature......................................................... .................. 20


In our age computer technology No company can do without the use of computers. And if there are several computers, then, as a rule, they are combined into a local computer network(LAN).

A computer network is a system of interconnected computers, as well as possibly other devices called nodes (workstations) of the network. All computers on the network are connected to each other and can exchange information.

As a result of connecting computers into a network, the following opportunities arise:

Increasing the speed of transmission of information messages

Fast exchange of information between users

Expanding the list of services provided to users by combining significant computing power with a wide range of different software and peripheral equipment into the network.

Use of distributed resources (printers, scanners, CD-ROMs, etc.).

The presence of structured information and effective search required data

Networks provide enormous benefits that are unattainable when using computers separately. Among them:

Sharing of processor resources. By sharing processor resources, it is possible to use computing power for simultaneous data processing by all stations included in the network.

Data separation. Data sharing allows you to manage databases from any workstations that need information.

Internet sharing. LAN allows you to provide access to the Internet to all your clients using just one access channel.

Resource sharing. LAN allows you to economically use expensive resources (printers, plotters, etc.) and access them from all connected workstations.

Multimedia capabilities. Modern high speed technologies allow you to transmit audio and video information in real time, which allows you to conduct video conferences and communicate over the network without leaving your workplace.

LAN found wide application in computer-aided design and technological preparation systems, production control systems and technological complexes, office systems, on-board control systems, etc. LAN is effective way building complex management systems for various production departments.

Defining the Network Infrastructure

Network infrastructure is the set of physical and logical components that provide communications, security, routing, management, access, and other essential properties of a network.

Most often, the network infrastructure is determined by the project, but much is determined by external circumstances and “heredity”. For example, connecting to the Internet requires support for appropriate technologies, in particular the TCP/IP protocol. Other network parameters, such as the physical layout of the main elements, are determined during design and then inherited by later versions of the network.

The physical infrastructure of a network refers to its topology, that is, the physical structure of the network with all its equipment: cables, routers, switches, bridges, hubs, servers, and nodes. The physical infrastructure also includes transport technologies: Ethernet, 802.11b, public switched telephone network (PSTN), ATM - together they determine how communication is carried out at the level of physical connections.

The logical infrastructure of the network consists of the entire set of software elements that serve to communicate, manage and secure network nodes, and provides communication between computers using communication channels, defined in the physical topology. Examples of network logical infrastructure elements: Domain Name System (DNS), network protocols such as TCP/IP, network clients such as Client for NetWare Networks ( Client Service for NetWare), as well as network services such as Quality of Service (QoS) Packet Scheduler.

Maintenance, administration and management of logical infrastructure existing network requires deep knowledge of many network technologies. A network administrator, even in a small organization, must be able to create Various types network connections, install and configure the necessary network protocols, know manual and automatic addressing methods and name resolution methods, and finally troubleshoot communications, addressing, access, security, and name resolution. In medium and large networks, administrators have more complex tasks: configuring dial-up dial-up and virtual private networks (VPNs); create, configure, and troubleshoot interfaces and routing tables; creating, maintaining and troubleshooting a security subsystem based on public keys; maintenance of mixed networks with different operating systems, including Microsoft Windows, UNIX and Nowell NetWare.

Network administration.

Modern corporate Information Systems by their nature are always distributed systems. User workstations, application servers, database servers and other network nodes are distributed over a large area. In a large company, offices and sites are connected by various types of communications using various technologies and network devices. The main task of a network administrator is to ensure reliable, uninterrupted, productive and secure operation of this entire complex system.

We will consider the network as a set of software, hardware and communication tools that ensure the efficient distribution of computing resources. All networks can be divided into 3 categories:

local networks (LAN, Local Area Network);

global networks (WAN, Wide Area Network);

city ​​networks (MAN, Metropolitan Area Network).

Global networks allow you to organize interaction between subscribers on long distances. These networks operate at relatively low speeds and can introduce significant delays in the transmission of information. The length of global networks can be thousands of kilometers. Therefore, they are somehow integrated with national networks.

Urban networks allow interaction across smaller areas and operate at medium to high speeds. They slow down data transmission less than global ones, but cannot provide high-speed interaction over long distances. The length of urban networks ranges from several kilometers to tens and hundreds of kilometers.

Local networks provide the highest speed of information exchange between computers. A typical local network occupies the space of one building. The length of local networks is about one kilometer. Their main purpose is to bring together users (usually one company or organization) to work together.

Mechanisms for data transmission in local and global networks are significantly different. Global networks are connection-oriented - a connection (session) is established between subscribers before data transfer begins. In local networks, methods are used that do not require the preliminary establishment of a connection - a data packet is sent without confirmation of the recipient's readiness for exchange.

In addition to the difference in data transfer speed, there are other differences between these categories of networks. In local networks, each computer has a network adapter that connects it to the transmission medium. City networks contain active switching devices, while WANs usually consist of groups of powerful packet routers connected by communication channels. Additionally, networks can be private or public networks.

The network infrastructure is built from various components, which can be conditionally divided into the following levels:

1. cable system and communications;

2. active network equipment;

3. network protocols;

4. network services;

5. network applications.

Each of these levels may consist of various sublevels and components. For example, cable systems can be built on the basis of coaxial cable ("thick" or thin"), twisted pair (shielded and unshielded), optical fiber. Active network equipment includes such types of devices as repeaters (repeaters), bridges, hubs, switches, routers. corporate network a rich set of network protocols can be used: TCP/IP, SPX/IPX, NetBEUI, AppleTalk, etc.

The basis of the network is the so-called network services (or services). The basic set of network services of any corporate network consists of the following services:

Network infrastructure services DNS, DHCP, WINS;

File and Print Services;

Directory services (for example, Novell NDS, MS Active Directory);

Messaging services;

Database access services.

The highest level of network functioning is network applications.

The network makes it easy to interact with each other in the most various types computer systems thanks to standardized data transmission methods that make it possible to hide the entire variety of networks and machines from the user.

All devices operating on the same network must communicate in the same language - transmit data in accordance with a well-known algorithm in a format that will be understood by other devices. Standards are a key factor when connecting networks.

Modern technologies do not stand still, so every year professionals come up with various innovations. Before the invention of network technologies, all computers worked independently of each other and could not interact with each other. However, as the number of PCs increased, the need for them to work together became necessary. This was especially true for the possibility of several people working simultaneously with one document. Creation of a single working environment for a huge number of computers became possible thanks to local and global networks. But here there was also a need to manage work processes and implement various tasks. Computer network administration is responsible for performing these functions. Let's try to understand what it is and what features it has.

Definition

Network administration is a set of measures to create, configure and maintain the normal and stable operation of computer networks, as well as technical support all users connected to a specific workgroup.

What tasks is network administration responsible for?

There are uniform generally accepted standards for network administration, according to which it is responsible for performing the following functions:

  1. Maintainability: Find and fix any issues that are preventing the network from running smoothly.
  2. Configuration management: setting up OS parameters and technical upgrading of system components.
  3. Network performance analytics: continuous monitoring of usage network resources.
  4. Performance management: collection of statistics on the functioning of the network for a certain time interval in order to rationalize the use of network resources, as well as reduce associated costs.
  5. Ensuring security: organizing access to the network and ensuring reliable storage of all data.

Thus, network administration is a kind of management, only among computers. To ensure that tasks are completed as efficiently as possible, various software developers release utilities that have a specific set of tools responsible for performing the functions listed above.

What are the responsibilities of a computer network administrator?

System administrators are responsible for setting up, maintaining, and solving various problems related to computer networks.

Network administration includes the following tasks:

  • support normal functioning electronic databases;
  • ensuring stable network operation;
  • preventing intruders from entering the network;
  • organizing user access rights to use network resources;
  • Creation backup copies information;
  • organizing and maintaining records of network operation;
  • optimization of work processes in order to increase productivity levels;
  • training users to work on the network;
  • monitoring the use of software and preventing its illegal modification;
  • control over the modernization of computer networks.

In addition to all of the above, system administration network is also aimed at identifying weak points through which the network can be penetrated outside users, and informing senior management about them.

Computer network design criteria

When developing a local network, the following criteria must be taken into account:

  • purpose of the network;
  • type of system and method of its implementation;
  • number of computers;
  • software;
  • Security policy.

Based on all these points, local network administration allows you to organize the order of actions according to which the system will be developed.

An approximate list of items is as follows:

  1. Selection and testing of software, as well as monitoring its performance.
  2. Monitoring the health and performance level of your PC.
  3. Eliminate errors and restore the system in case of failure.
  4. Overseeing the installation of a new system and ensuring it is compatible with the existing network.

The level of professionalism of the service personnel and users plays an important role in this regard.

Utilities for remote network maintenance

Remote network administration allows you to effectively maintain computers and manage system operation in large enterprises with a minimum number of system administrators. For these purposes they are used special utilities, providing the ability to connect via a network or the Internet to any computer included in the working group, in real time. With the help of these utilities you can gain complete control over any PC and use all its capabilities.

Today there is a huge variety of such utilities from various software developers. They differ from each other in their functionality, set of tools and interface, which can be graphical or console.

The most popular programs for network administration are:

  • Windows Remote Desktop.
  • UltraVNC.
  • Apple Remote Desktop.
  • Remote Office Manager.

Domestic utilities are available on the software market, but they are less functional compared to foreign ones. Which specific program for administering a local network will be used in an enterprise largely depends on the tasks that system administrators face.

Classification of computer networks

A computer network is a set of software products, hardware and communication tools responsible for remote access of a huge number of users to a single information base.

The classification of computer networks is as follows:

  • Local - allows several users located at a short distance from each other to work together with data. It is worth noting that the speed of information transfer over such networks is one of the lowest, as a result of which delays may occur during operation.
  • Global - allows users to exchange data over long distances, which can reach several thousand kilometers. They have more stable work and small delays.
  • City networks are less large-scale compared to global networks. Allows the transfer of electronic information at medium and high speeds. The length of urban networks can vary from one to several hundred kilometers.

Local networks are the fastest, since they usually cover only one or several buildings. In most cases, this type of network is used in medium and large companies, which require a clear organization of interaction between all employees.

Ways to transfer information in various networks

In global and local networks, information is transmitted over different technologies. The first involves creating a connection between two computers, and only after that transferring data. Local ones, in turn, allow you to exchange data without first connecting. Simply put, data will be transmitted even if the recipient does not confirm his readiness to complete the transaction. In addition, the streaming speed at which information is sent and received is also different.

It is also important to understand that local systems network administrations have individual network adapters, with the help of which a connection to other computers is created. In the case of metropolitan networks, switches are used instead of adapters. Global networks are created on the basis of routers that have higher power and transmit data over channels.

How are computer networks organized?

Any computer network, regardless of its type, consists of the following components:

  • network hardware;
  • cable system;
  • switching means;
  • software;
  • network protocols;
  • network services.

It is worth noting that this principle of computer network design is generalized, since each component has a very complex structure and consists of many sublevels. Nevertheless, all devices are in close interaction and operate according to a single algorithm. In turn, administration Windows networks is aimed at maintaining stable operation of all these components.

Computer network administration tasks

Network administration involves working with a specific system at various levels.

If the administrator is responsible for maintaining a corporate network with a complex structure, then he is responsible for performing the following tasks:

  1. Network planning - adapting the system to the specific needs of the enterprise.
  2. Configuring network equipment for normal operation.
  3. Configuring network services - large networks have a set of specific services responsible for accessing files and directories, remote printing of documents, and much more.
  4. Troubleshooting - detecting various problems and failures with software or hardware, and solving them.
  5. Installation, configuration and testing of network protocols.
  6. Optimizing the network and increasing its performance levels.
  7. Monitoring network nodes and traffic.
  8. Ensuring the protection of electronic data and confidential user information from system failures, malware and illegal actions by third parties who do not have access to the system.

In order for the system to work stably, the administration of the local network must be carried out comprehensively.

Security Administration

Setting up and maintaining a security system involves performing the following activities:

  • Informing users about security features.
  • Monitoring the operation of security mechanisms.

The system administrator in this case is responsible for performing the following tasks:

  1. Creation and redistribution of security keys.
  2. Setting up and managing access rights.
  3. Data encryption management.
  4. Traffic and routing control.

In addition to all of the above, administration social networks also involves the creation and distribution of passwords necessary to authenticate users in the system.

Malware protection

In the operating room Windows system a service called “Information Center” has been implemented, which is responsible for ensuring system protection against malware. In addition, the OS also has the ability to protect against hacking.

But despite all these possibilities, the system administrator is responsible for the following tasks aimed at increasing the level of security of computer networks:

  1. Remote connection to a PC with different IDs.
  2. Blocking the ability to copy information to external storage devices.
  3. Encryption of external data storage sources.

This is a set of necessary measures, without which it is impossible to create a reliable computer network security system.

Network administration problems

System administrators face the following problems in the course of their work:

  • determining the cause of a failure or error;
  • efficient distribution of system resources;
  • improving user efficiency;
  • improving the decision-making process.

In addition, very often many specialists find themselves in a situation where the user cannot clearly explain the essence of the problem. Therefore, in order to quickly resolve any malfunction, system administrators must have the appropriate level of qualifications.

Conclusion

Administration of computer networks is a whole range of activities, the task of which is to design, create, configure and maintain networks, rational use of their resources, as well as ensuring a high level of security. These tasks are not simple, but administrators come to the aid of various utilities that allow them to solve many different problems effectively and in the shortest possible time. However, they cannot completely replace a specialist, so service personnel play a key role in the administration of complex corporate networks.

Hello, habrahabr! This is my first article and it is devoted to remote administration. I hope that it will be interesting not only system administrators, but also just for advanced users, since the use of some components may be useful to you.

We will mainly talk about administering computers before loading the operating system. When the number of computers is small, it does not require a lot of human resources to keep them running. As the computer fleet expands, their maintenance becomes more expensive. In my case, the organization has about 100 computers. Reinstalling operating systems and restoring operating system images takes a lot of time. I had to service each piece of equipment separately. Therefore, the task arose to develop a system that would simplify the administrator’s life and increase the amount of free time that could be spent on more interesting things.

There is a lot of software that can do similar things, however, each of them has shortcomings, which I tried to remove and develop a system that satisfies my requirements.

What is needed for this?
The client machine must have a network card that supports the PXE standard (available in almost every network card). I will not describe the principle of operation this standard, there is a lot of information on the Internet for you to familiarize yourself with. Let me just say that it allows you to download files over the network. Well, you need to enable network boot in the BIOS. The configuration of the client part is now complete.

The server must enable DHCP and TFTP. In order not to bother with the settings, I used the TFTPD32 program, which already includes all the necessary components. The program is freely available and open source code.

To configure DHCP, I had to run around and remove the MAC addresses from each computer. This is necessary to identify computers on the network. In the TFTP server, you only had to specify the file upload folder and place everything you needed in it. The bootloader that will perform all operations is grub4dos. This particular bootloader was chosen because there is enough experience in creating bootable USB drives with it, and there is a lot of information on the Internet.

Now about the principle of operation.

1. When turned on, the computer accesses DHCP server y behind the IP address.

2. The DHCP server, according to its settings, issues the required IP to the client, as well as the TFTP server IP address and name boot file. In my case the grub4dos bootloader file is grldr.

3. The client computer, having accepted the request, sets its IP and contacts the TFTP server with a request for the boot file.

4. The TFTP server returns the requested file. It looks like this:

Server response



5. Having downloaded the file, PXE starts the bootloader and finishes its work. Further work is performed by the bootloader. After launch, the bootloader requests the menu.lst file. This file contains instructions for installing the OS or running utilities.

6. The server sends the menu.lst file

7. The downloader program on the client “reads” the instructions and executes them, downloading the required files from the TFTP server.

The point is that TFTPD32 always produces the same instruction file, menu.lst. That is, without changes it was impossible to assign different computers different tasks. Since the program is open source, I found the place in the code where the program sends the menu.lst file and changed it.

As a result, as soon as the client machine requests the menu.lst file from the server, the program sends GET request to the web server (http://localhost/getmenulst.php?ip=IP) to request an instruction file for a specific IP. Instruction files are stored in the database.

For clarity, I will give a new diagram.


Next, the task was to prepare images for installing OS systems and loading utilities, as well as write menu.lst instruction files.
For example, menu.lst for windows installations 7 looks like this:

Install Windows 7

color blue/green yellow/red white/magenta white/magenta timeout 0 default 0 title Install Windows 7 pxe keep chainloader --raw (pd)/pxeboot.n12

To download Acronis True Image:

color blue/green yellow/red white/magenta white/magenta timeout 0 default 0 title boot acronis #root (hd0,0) kernel /kernel.dat vga=788 ramdisk_size=32768 acpi=off quiet noapicmbrcrcs on initrd /ramdisk.dat boot


I won’t list all the options so as not to overload the article.

A lot of time was spent on assembling images with the required software and preparing them for installation over the network, since this is not just copying a file to a directory. Of the OS systems, I collected only Windows 7 and Windows XP. I had to get into Acronis True Image to automatically restore the system from the image. Also uploaded ISO images several necessary utilities.

To manage all this “miracle” I wrote a small administration panel in PHP+MySQL. It allows you to add/remove computers, add/remove options, and also set boot options. We can also see the last time the computer was turned on and the option that was installed on it. The default setting is “Boot from Hard Disk”.

Ignore the first part of the administration panel. There is a possibility remote control installing programs using the uTorrnet program, which I will write about in the next article if anyone is interested.

Let me summarize. This system works in real time. Sometimes I find bugs and fix them, adding new options.

The procedure is as follows: they call me and say that the system on the “Name” computer does not boot. I go to the administration panel, select the “Download Acronis” option and ask the person on the other end to restart the computer. Then the system itself will restore everything from the image and inform the user that it can work. If installed new computer, his MAC is entered into the database, OS installation options are set in the panel, and Windows installs itself without any participation.

This is very convenient because I often have to leave, and this way I can fix problems from anywhere. It is worth noting that there is no finance to purchase quality equipment. We live as best we can.

Of course, there is still a lot of work to be done before full automation, but believe me, my life has become easier.

If you notice an error, select a piece of text and press Ctrl+Enter
SHARE: