SlideShare a Scribd company logo
1 of 45
193734
RACHAEL MARSH
BSC COMPUTER NETWORKING
Deployment of
services over the
network
OPERATING SYSTEMS, SOFTWARE AND LICENSING
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 1
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 2
Copyright
Copyright© 2015 Rachael Marsh. All rightsreserved.
The copyrightof thisthesisrestswiththe Author. Copies(byanymeans) eitherinfull,orof extracts,
may notbe made withoutpriorwrittenconsentfromthe Author.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 3
Preface
Thanksto HighburyCollege for providingequipment and resourcesthatallowed
for project completion.
Eastleigh College ITservices for taking the time to allow me to havea discussion
about deployment systems used and showing what these systems look like in
real working environments.
The Academy, Selsey for taking the time to allow me to havea discussion about
the use of their deployment system.
Many thanks for Patrick Swieskowski from Ninite Pro for the provision of a
suitable length trial to fully test this software option.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 4
Contents
Preface........................................................................................................................................................................................3
List of figures..............................................................................................................................................................................5
Nomenclature............................................................................................................................................................................6
Abstract......................................................................................................................................................................................7
Introduction...............................................................................................................................................................................8
A review of network system deployment ............................................................................................................................9
PXE technology.....................................................................................................................................................................9
Proprietary deployment solutions.................................................................................................................................10
Open-source deployment solutions ..............................................................................................................................10
Research Methodology.........................................................................................................................................................11
Operating System solution..............................................................................................................................................11
Software solution..............................................................................................................................................................11
Artefact Design.......................................................................................................................................................................12
Required hardware for implementation..................................................................................................................14
How it changed?...........................................................................................................................................................14
System implementation........................................................................................................................................................17
WDS.....................................................................................................................................................................................17
SCCM ...................................................................................................................................................................................17
Installation of SCCM.....................................................................................................................................................17
Configuration................................................................................................................................................................18
Deployment...................................................................................................................................................................19
FOG server..........................................................................................................................................................................21
Installation of FOG Server...........................................................................................................................................21
Configuration................................................................................................................................................................22
Deployment...................................................................................................................................................................22
Software Deployment: Ninite Pro..................................................................................................................................24
Volume licensing...............................................................................................................................................................26
Conclusion...............................................................................................................................................................................29
Further research.....................................................................................................................................................................30
Self-evaluation........................................................................................................................................................................31
Works Cited.............................................................................................................................................................................32
Appendix..................................................................................................................................................................................35
Section 1: Extended AD log file......................................................................................................................................35
Section 2: Ninite Pro.........................................................................................................................................................38
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 5
List of figures
Figure 1-1: Diagram showing the process of PXE booting ................................................................ 9
Figure 2-1:Logical network design of basic network design............................................................ 12
Figure 2-2:WDS network design................................................................................................... 13
Figure 2-3:FOG Server network design......................................................................................... 13
Figure 2-4: SCCM network design ................................................................................................ 15
Figure 2-5: Re-configured FOG Server details ............................................................................... 16
Figure3-1:DHCP optionsforSCCMDeployment..…………………………………………………………………………….20
Figure 3-2: Task Sequence after successful PXE boot..................................................................... 20
Figure 3-3:FOG Server Database installer web page...................................................................... 22
Figure 3-4:Mobile interface of FOG.............................................................................................. 22
Figure 3-5:Ninite Pro remote options window.............................................................................. 26
Figure 3-6:Volume activation key options..................................................................................... 29
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 6
Nomenclature
A numberof keytermsthat are usedthroughoutthisdocumentandare definedhere:
SCCM- SystemConfigurationCenterManager
WDS - WindowsDeploymentServices
FOG - Free Open-Source Ghost
WIM - WindowsImagingFormat
PXE- Pre-bootexecution environment
WinPE- WindowsPreinstallationenvironment
TFTP - trivial file transferprotocol
OS - operatingsystem
NBP - NetworkBootstrapProgram;bootimage usedforbootingovera network
NIC- Networkinterface card
BIOS- Basic inputoutputsystem
VMWare Workstation - virtual machine hostingsoftware made byVMWare
EXE – executablefile
KMS – KeyManagementServices
GVLK - General VolumeLicensingKey
DHCP – (DomainHostConfigurationProtocol) ProvidesIPaddressesonanetwork
SQL - StructuredQueryLanguage
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 7
Abstract
The aimof this projectisto lookat a numberof differentdeploymentssystemsthatavailable onthe
marketand the advantagesof networkdeploymentservicesintermsof operatingsystems,software
and licensing.
The project will look into the deployment technology, the options are available on the market and
analysis a selection of both propriety and open-source solutions to assess to determine what
deployments options can do for different size businesses. The areas that will be investigated are
infrastructure required, installation of the product and deployment management.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 8
Introduction
Technologyisnowabiggerpartof everydaylife whetherthisbe inthe home orworkenvironment.In
the business,anetworkwillhave computersonitwhichare keytoproductivity. Withthisinmind,the
installationof operatingsystemsandsoftware whenadevice needsinstallationorisbeingupgraded
using conventional means such as disc can make the full process hard to manage. This has led many
companiestouse automatedpackagesfordeploymentof operatingsystemsandsoftware,aswell as
all of the updatesthattheyrequire.Manyoperatingsystems andsoftware packagesrequirelicensing
therefore; it is also important to automate the deployment of licensing services.
This report looks to highlight the key advantages of using automated deployment services over the
conventional installation methods and the benefits which they can bring to an organisation. Along
with this recommendation will be shown as to which system or systems are best for a range of
different organisations. The key aims of this report are:
 Analyse differentdeploymentsystemsforoperatingsystemdeploymentandthefeatures that
they can offer
 Different software deployment systems which can provide automated deployment of
software on bothexistingdomain andbarebones computersthathave justbeeninstalledand
added to a network
 Look into the use of volume licencing services for automatically activing operating systems
and software packages to reduce the need of manual activation
 Develop a working demonstration of implemented network deployment systems
 Give recommendationsbased of eachproductanalysedasto its place on the marketand the
types of organisation who should consider it
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 9
A review of network system deployment
PXE technology
PXE isa methodof bootinga computerusingonlythe networkcard.It is part of a specificationthatis
designedtoreduce the total cost of ownershipof computers. Itscreatedcame afterit was identified
in the late nineties that technology was becoming more important and was essential for businesses
to be able to succeed. The aim was to allow IT professionals to have a low ownership cost through
better management of the assets on a network through being able to install, reinstall and manage
remotely (Intel,1998).The networkbootingsidethatisbeingfocusedon allowsaPXE-compatibleNIC
card to pick up a deployment software when it is connected to the network and utilise the remote
installation option of operating systems that is provided (Oracle, 2015).
While it may have be licensed by Intel, it is actually an open-source standard. The technology is
designedtobe vendor-independentwhichmeansthatitworksonanycomputerassumingithasa NIC
that allowsPXEbooting. The majorityof networkcardsthatwere made inthe lastfive yearsnormally
have these compatibility built in if they are made by the major hardware makers.
The PXE process is relatively simple in what it uses in terms of the protocols and what it requiresto
work. It requires in its most basic format: DHCP, TFTP and a Boot Image File (NBP). DHCP is usedto
identifydevicesonthe networkincludingthe TFTPwhichgivesthe NBPtothe client.Figure 1-1shows
how the process works roughly.
As a result of this technology being aroundfor as long as it has and it being adopted by some of the
largercompanies,there isarange of deploymentsoftware comesthathasbeencreatedwithdifferent
featuresfora differentrange of businesssizes.There are some that are designedtodo one function
onlysuchasapplicationdeploymentorOSdeploymentwhileothersofferamanagementconsole that
has multiple functions built in. There is also a mixture of proprietary and open-source imaging
software whichallowsitnottobe justlarge organisationsbutawideraudiencewhowouldotherwise
be restricted to having to use conventional means.
PXE-enabled NIC senda a
DHCP Discover broadcast
message to pick up the
DHCP on the network
DHCP server sends back all
the usual IP information
and points the NIC to
where the TFTP server is
and the boot image is
The PXE-clientuses the
TFTP information to
contact itand ask for the
boot image (NBP)
TFTP server sends the client
that requested the boot
image and it is launched on
the client.
The clientcan now access
the deployment software
and actions can be taken
over the network e.g.
installion of an OS
Figure 1-1 (Intel, 1999)
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 10
Proprietary deployment solutions
Proprietary software isownedbya specificcompanyor personwhich has restrictionsplacedonit in
terms of its usage, changes that can be made to the software and distribution. When it comes to
costing,itmay be a licensedproductthatispurchasedor may have an agreementthatallowsittobe
free. It can be both paid for and free deployment solutions.
Open-source deployment solutions
Open-source is used to describe deployment toolsthat have the ability to be altered not just by the
creators but also the general public.Itis not restrictedin whatprogram code can be changedto like
proprietarythathasasetcode thatcanbe altereduptoacertainpointthenitisnotallowed. Whereas
most commercial productsare closedsource,opensource products allow developersmore freedom
to customise functionality to their needs.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 11
Research Methodology
Operating System solution
For the OSdeployment,alarge range of softwarewaslookedatandwasonlydeemedviableif itmeet
a number of different constraints which are as follows:
The supported operating systems should includeWindows7 and 8
This was a necessary constraint due to the fact that 75% of the OS market uses these platforms and
legacy system such as Windows XP are quickly becoming replaced with these newer versions due to
Microsoftpullingofficialsupportandapplicationsnolongerbeingbuiltforthese oldersystems. While
other systems such as Linux and OSX holds a small market share, this will be looked at in a more
theoretical senseratherthanactuallyimplementingdue totheamountof Linuxdistributionsavailable
and the propriety server software that OSX needs to run all the relevant servicesfor deployment
(Statista, 2015)
There had to bePXE-capabilitieswhen itcameto deploymentoptions
Since the aim of the project was to look at network deployment using PXE technology, if it doesn’t
have this capability then it isn’t suitable for use in this project.
Centralmanagementavailable
Whetheritbe throughacommandpromptwindows,aconsole onthe systemitselforawebinterface,
this requirement allows monitoring to take place and testing to be completed to determine the
success of deployments.
Flexibility
An organisation may not have all the same requirements for every user. A system should be able to
deploy a mixture of different images and there needs to the capacity to expand the amount of
deployment.
There were anumberof differentprogramsthatwere eliminatedasthe above constraintscouldn’tbe
meet which included Acronis snap deploy and Clonezilla. Acronis snap deploywas unsuitable due to
the fact that the licensing method was very complex (Kb.acronis.com, 2015). With Clonezilla, it was
foundwhile itwassuitable tohave PXEserver butitseemstobe aimedatmore usersthatwantto do
imagingeveryonce inawhilewithone imageforall machines ratherthanonaregularbasis andthere
are some known issues such as MBR record corruption on windows systems when imaging.
As a resultof thisresearch,the chosenOSdeploymentsoftware isFOGserverandWDS serverasit is
representative of productsthat are scalable andlooksinto bothopensource and proprietysoftware
to get an overview of options.
Software solution
For the software deployment,itwaskeyto lookat what programswere mostcommonlyinstalledon
the majority of computers and determine from thisresearch; the programs that would be usedas a
result to test the distributionof applicationson a network. As a result, the installationwas going to
focus on the common applications divided into:
 Runtime and background programs such as.net framework
 Office suites such as Microsoft Office
 Other document tools such as PDF readers
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 12
As a result of this research, the chosen Software are Ninite Pro and Group policy. These represent a
subscription based service and a tool that can be used within a domain network at no cost to
demonstrate the implementation.
Artefact Design
Whenit came to howthe artefact wouldbe configuredtoprovide all the necessaryservicesrequired
for the utilisationof the PXE booting method to be able to achieve the aim of creating a working
deploymentservice,the basicsetup isshowninfigure2.2of the requirementsonthe clientandserver
side on a network.The clientside isdepictingthe computersthat will be deployedwhile the servers
depict the background infrastructure that is in place to enable the distribution. While it shows two
devices,itisn’tthe definitive amountthat may be found ina network dependingon the solution and
size of the company.
Figure 2-1
Whencreatingthe designsforthe OS deploymentsoftware thatwasbeingused,figure 2.1 was used
as a template to define the rough structure for the network infrastructure. Figure 2-2 shows the
configuration of the WDS server and figure 2-3 FOG server when it was applied and additional
information thatwasaddedto aidthe configurationof the servers.ThisincludedIPaddressingof the
network, what needed to be installed on what machine and computer name.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 13
Figure 2--1
Figure 2-3
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 14
While volume licensingispartof thisproject,thiscouldn’tbe implementedinthe testdeploymentas
an active licensingaccount isneededforreal wordtestingandtoverify validityof key butthiswasn’t
available.Alsothe domainwasn’tconnectedtothe internetdue toconflictingDHCPserversbeingan
issue when the college network was being used for internet access.
Required hardware for implementation
The minimumhardware requirementsforbe able tocomplete the aimof creatinga demonstration
model are showintable 2.1
Table 2.1
Resource Purpose What it needs?
Laptop Forremote managementof the
servers and accessing the
distribution software
 NIC port
 Remote desktop
services
3 clientmachines To be used as distribution
clients for the operating
systems and clients.
 PXE-compatible NIC
 Blank Hard drive for
the deployed OS and
applications
2 servers To be used as a base for
distribution software to be
installed on and for the
network infrastructure
 NIC
 Hard drive for OS
installation
 Suitable amount of
RAM to support the
required applications
Switch To be used to connect all the
machines for creation of a
network
 Atleast8portstoallow
the required 6 devices
to be able to connect
and access required
resources on the
network
WindowsServer Be used as a base for WDS
distribution system and
providing other network
services e.g. DHCP/DNS
 Server 2012 R2 as this
supports newer OS’s
e.g. Windows 8.1
FOG serversoftware FOG serverdistribution
software
 Version1.2.0
CentOS The operatingsystemonthe
FOG serversoftware will be
installedon.
 Compatible version for
FOG software thatis
beingused
How it changed?
There were a number of changes to the actual configuration required to cope with modifications in
terms of the hardware available, software used and how it needed to be implemented.
Originally physical hosts were going to be used for the clientsbut there were no suitable computers
thatsuitedthispurpose.Togetaroundthisissue,adesktopcomputerwasusedinsteadtohostvirtual
machines running off a virtual machine platform that would be the clients. There was all the
capabilities that were needed such as PXE boot, hard drive space but it had the benefit that more
hosts could be created as the amount of deployments wasn’t restricted to the amount of physical
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 15
machines. It did mean that any quantitative data that was obtained such as bandwidth being used
wouldn’t simulate real world scenarios as all the data was going through one NIC.
InitiallyFOGserverandWDSserverweregoingtobe usedastheOSdeploymenttoolsbutthischanged
after Eastleigh College due the introduction to a management system for network pcs calledSCCM.
Thisrequiredaredesignof the networkasthe machine thatcouldhavebeenusedasaSCCMmachine
was now had virtual machines on it and this new software needed a separate computer due to the
hardware requirements of the deploymentsoftware.Due tothe restrictionstohavingtouse apcthat
is running less than the requirement for SCCM, no numerical data will be recordedas it wouldn’t be
realistic data.
Since it utilises WDS deployment capabilities through its management console, there was no point
doingthissystemanymoresoitwasreplaced withSCCMOSdistribution.Suitablehardwarewasfound
forthissoftware. Figurex-xshowsthenetworkconfigurationplanthatwascreatedforuse tointegrate
into a network when it replaced WDS.
Figure 2--2
Fog server was going to be on its own separate network which didn’t have an ad connection which
meantthat AD integrationcouldn’tbe lookedat until the systemswere imaged. Thisisfollowingthe
discussion at Eastleigh College as to how it was configured here as figure 2-5 shows the IP settings
were changed to IP address: 192.168.1.95 and the subnet used being 192.168.1.0 subnet instead.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 16
Figure 2--3
When deciding on the areas to analyse, the chosen software was going to be looked at from the
following aspects:
Installation of the productandnetwork integration
 Installation of the operating system that is used as a base OS of Linux or Microsoft
 Network implementation which is the requirements to either integrate into the current
network infrastructure or creating the network setup if starting from the ground up
 Product installation
The actual install of the product that will be used for the deployment through activating a
feature already built in or an external source.
 Configuration thatneedstobe done tothe productandanychangesnecessarytothe existing
network post-installation
 Testingoutthat the product isworkingas it shouldbe and resolvinganyissuesthatcome up
as a result including where support can be found.
Deploymentof the OS or software
 The management method that is usedwith the software whether it be a console, web page
or other types of windows.
 Methods that it uses for image deployment
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 17
System implementation
WDS
In Microsoft Server 2000, it utilised the new PXE booting method to allow operating systems and
software to be packaged together and installed using a network. This feature was called Remote
Installation Service (RIS) which was built into the operating system itself and was simply installed
through the server configuration window. With the next version of the server software releasedin
2003, it came with RIS but when service pack 1 came out, it was replaced with an alternative called
WDS (Miller,2015).Asnewerversionshave beenreleased,ithasbeenaddingsupport forcurrentand
future systems which at the moment are Windows 7, 8 and 10. While legacy systems such as XP are
still supported, it is slowly being phased out.
For a WDS serverto be installedona network,the serverhas to be firstjoinedto the domain which
hasa fewaspectsalreadyinplace.These requirementsare anetworkinfrastructure thathasAD,DHCP
and DNS. Since the installation of active directory automatically promptsthe installation of the DNS
role so this would normally be installed together. The installation is done through the server
management window throughthe add rolesand features which the majority of users are familiar of
the server side software with due to the fact that the majority of other services such as DHCP are
installed through this method.
There are two differentfilesthatcan be deployedusing WDSwhichare WIM and VHD. A WIMis the
file that is used to install windows through a disc or other media. A VHD is a virtual disk image that
can be installedwiththe OSandall the requiredapplications.Whenthisformatisdeployed,itcopies
the image straightontothe computerbeingimaged.Ithas the benefitthatnoapplicationshasto be
installed if they are already available.
SCCM
SCCM is designed withthe main focus of being able to manage the deployments of OS systems and
applications all from one management console on a large network. While there is some support for
Linux operating systems, it is provides considerably more features for the Windows side. Like WDS
before it doesn’t really care what type of device it is as long as it is running Microsoft software. It
differsinone wayasitsupports mobile devices;theSurface Pro tabletrange canalsobe managedand
imaged using a special network adaptor.
Installation of SCCM
WindowsServeristhe platformthatisusedforthe SCCMinstallation. Thisprojectwillbe usingSCCM
2012 R2 due to the fact that the AD serverisServer2012 R2 and it supportsWindows8 withoutany
issues.
The installation of this deployment tool is not as simple as WDS where it is installing a role through
the server manager. With SCCM, there are a number of network steps and pre-requisites that are
requiredbefore installationof it. There shouldbe planningdone before itisimplemented due tothe
complexity of the installation. A domain admin account should be used for all of the installation to
allow the correct permissions.
The network stepsrequiredare connectingtothe servertothe domainandextendingthe ADschema.
When there is no connection to the domain and all the pre-requisites are installed, the permissions
are all configuredtoworkonthe local administratoraccountratherthanadomainadministrator.This
meansthat whenitis connectedtodomainand the SCCMsoftware is installedthatthere are a lot of
errors due to the wrong permissions. Extending the AD schema can be done before or after the
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 18
software installationbutitis bestpractice to complete itpre-installation(Meyleret al., 2012). It is a
relativelysimpleprocessthatisdone on usingafilecalled“ExtADSCh.exe”thatislocatedonthe SCCM
install file. When this successfully run, a log is created as seen in appendix section 1.
The pre-requisites and their purpose can be seen in table 3-1.
Table 3-1
Pre-requisite Purpose
Windows Features:
Dot Net framework
WCF
Asp.net
Additional features needed for IIS to function properly
IIS Web server for application deployment
SQL Server Storing host data on a database
WDS Provides PXE for OS deployment (SCCMautomatically installs)
ADK Tool for customisable OS deployment
MDT Provides tool to create unattended install function
Withall the pre-requisites,the correctversionshave tobe usedforthe versionof SCCMthat isbeing
installed and whether it is a primary or secondary of site being installed. A primary site is a
requirement for any SCCM deployment as it is where all the installed secondary sites connect to. A
secondary site is an additional copy of the software that can be installed under the primary site to
provide load-balancing capabilities if dealing with lots of clients.
Once all the pre-requisites, the SCCMapplication can be installed. It is installedthrough file through
the “splash.hta”thatislocated inthe installfile inthemaindirectory.Itwasarelativitysimple process
split up to logical steps if you have all the required information written down such as the database
details.Allyoureallyneedtoenterinisafew detailssuchasa site code andname toidentifyitonthe
network, type of site, database details, whether https will be use and ticking a few boxes to install
features (distribution and management point).
Configuration
After the installation of SCCM, there are a number of actions that can be divided into additional
network alterations, testing functionality and setting up features.
The twonetworkchangesthatneedtobe made are configuringthe discoverysothatthe SCCMserver
isenabledtoscanthe AD andimportthe detailsdiscoveredintothe managementconsole.The SPN is
a command that maps a SQL server with an account and allows authentication for the database.
Testing functionality is done by looking at the monitoring tab of the SCCM window under the site
hierachysection. Thiscanbe usedto detectif there are anyconfigurationerrors.One sucherrorthat
was found using this process of testing was the “Awebsvc not responding” error which prompted to
restart the service but this only fixed it until a restart happened of the server. This error is a known
fault with either SCCM2012 R2 or Server 2012 R2.
The distributionpoint is the part of the software that deals with the distribution of both the OS and
software content. If the content isn’t sent to the distribution point then clients are unable to access
that content when connecting to the SCCMserver.
The processof configuringthe serverfordeploymentstartswiththe addingthe PXEfunctionwhich
islocatedon the distributionpointpropertieswindow.Once enablePXEsupportforclientsisticked,
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 19
WDS will be installedautomaticallyandothersettings canbe definedsuchasallowingunknownPCs
to contact the PXE.
Like WDS, it usesa WinPE file whichis a cut downversionof windowsasthe bootimage that issent
to the clientfollowingarequestforit sentto the TFTP (Technet,2015).Thisisautomaticallyaddedin
when the PXE is installed on the distribution point.
Deployment
SCCMusestasksequencestocreate OSdeployments.A WIMfile isrequiredforthe selectedplatform
that is beingdistributed.Thishas to be extractedintoa folderthatis accessible onthe networkas it
has tobe importedinfromasharednetworklocation.The waytogetroundthe issue isjusttocreate
a share on a serverthat everyone hasrightsas there isno havingto setpermissionsespeciallyforit.
Once the file is imported, a copy is sent to the distribution point to make it accessible. Once this is
done, it can be used in building task sequences for deployment.
The PXE bootingisbasicallythe same whenitcomestoall systemssoitisjustmakingsure that F12 is
pressedfornetworkboot.Whenitwasfirstattempteditwasn’tpickingupthe SCCMboot,there was
no DHCP serversettingsthat toldthe clientswhere togo. This is prettyeasyto fix as it is justsetting
twodetailsinthe DHCPserverwindow. Anexampleof how thisisimplementedisshowninfigure x-4
Once those detailsare entered,the PXE shouldworkand clientsshouldbe able to contact the DHCP
server and be pointed towards the SCCMserver. If successful, this screen should appear:
Figure 3-2
Figure 3-1
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 20
The system copes well will having more than one deployment happening simultaneously which is a
key as organisations don’t tend do one machine at time if over 1000 computers. It has a good
monitoring system that shows what is being deployed using the deployment tab on the monitoring
section. This shows what stage each machine is at and shows the error if the deployment fails. This
enables the issue to be rectified easily.
The system isn’t perfect when it comes to deployment as SCCM 2012 has an issue that means that
once one device usesthe unknowncomputerdevicesobjectandit fillsinsome of the detailssuchas
mac address whichmeansthatthe next unknownpctriestoconnectbutthePXEbootfails.The easiest
fix is to make a new unknown computer collection and change some settings as the default one
doesn’t let anything be changed.
SCCM softwareinstallation
BuiltintoSCCM, there isthe abilitytoaddsoftware installationintothe OSdeploymentbyaddingit
to the task sequence orthroughthe software centre.
OS installationtask sequence
Withinthe OSinstallationtasksequence,therecanbe additional applicationsinstalledsuchasOffice
suiteswhichare performedautomaticallywhenapc isdeployed.Thisisrelativelyeasyprocesswhen
all the applications once SCCMissetupcorrectly.
Software centre
There is a client that is available for devices on a SCCM network that allow central management
through the network. One of the features that its install is a software centre that allows a network
administratortoinstall software ontothe computerremotely. Itisavailable whenthe SCCMclientis
installed which can be installed with an OS deployment.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 21
FOG server
It was produced in 2007 when it was clear for the creators Chuck Syperski and Jian Zhang found a
suitable solutionwasn’tavailable onthe marketthat fittedtheirneeds (Munn,2015). Since itis built
to be based on the Linux operating systems, no cost is normally incurred with the OS licensing and
there isaflexibilityonwhatitcanbe installedon.Itcanbe runonuserfriendlyversionssuchasUbuntu
or enterprise level platforms such as Red Hat.
The hardware requirementsof the software isdesignedtobe able to run of machinesthathave 2GB
to 16GB RAM. It can be installedonanoldserverthat has beensittinginthe cornersformonths.It is
recommended that it has a minimum 40GB Hard drive space for the storage of the OS images.
Whenit comes to the necessaryinfrastructure required,aninternetconnectionisall thatis needed.
Itisflexibleinhowitcanbe setup.Initsmostbasicform, itcanbe pluggedintoaswitchandthe clients
to be imaged plugged in, this can be done as there is a built-in DHCP service that can be installed.
Installation of FOG Server
The install itselfisdone through aterminal usingafew commands. The filethatisrequiredforsetting
up can be downloaded through the FOG website or the “wget” package that allows files to be
downloaded from the web using just the path where it is located. The install package comes in a
“tar.gz” which is basically a linux zip file format. All that is required to install in the terminal is to
navigate to the bin folderwhenunzipped andrun the command“sudo ./installfog.sh”.Thislaunches
a script thathas veryeasyto followsteps.OnlydetailslikeIPaddressare neededtobe knownbefore
the install. Some steps are automatically setsuch as type of linux being used. Once the detailshave
beenset,all the pre-requisitesare downloadedandinstalledautomatically.Itisinstalledatthispoint
other than configuring the DHCP to allow it to tell the clients where to go.
There are things that can go wrong if the Linux platform usedis relativelynew. Thisis the case with
Ubuntu 14.04 when this software was first installed. In this version, it was found that the database
schemaupdate page keptcomingon everytime it wasturnedonas shownin figure 3-3.It was found
that it was caused by the fact that it was a relatively new versionand something had changed from
the previousversion (Troliver.com,2015).Accordingto the FOG website,thisversionhasaTFTPissue
andisn’tguaranteedtowork.Previousversionsof thissoftwareseemtoworksotheseshouldbe used
instead.
Figure 3-3
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 22
Configuration
All the configuration after the initial install is done through a web page in the form of
http://IPaddressoffog/fog/management that can be logged into from any device on the network.
There is the ability to access the management through a mobile device which has limited abilities
includingbeingtodeployanimage toa hostwithouthavingtogo to the mainmanagementpage.An
example of this can be seen in figure 3-4.
Figure 3-4
In FOG management,imageshave tobe created inthe image managementsectiontoallow animage
to be uploaded or for it to be deployed. This is a simple process that is specifying the image name,
what OS system and the kind of partitions that is being used. Single or multiple partitions are the
options for Windows Os’s and Linux deployments need an Ext4 partition.
Deployment
FOG usesa capturedimagesratherthanWIMfilestodeploytocomputers.A capture image hastobe
createdfirstbut thiscan have all the software thatis requiredfora systeminstalledonit. A sysprep
should be run on the machine before it is captured so that when it joins the domain there isn’t an
issues with cloned SID’s. Only one device SID can be the same on a domain.
It is designedwhenitPXEbootsto not needany driversto be injectedasis the case sometimeswith
WDS. Thisisdue tothe factthat a lotof driversare builtintothe NBPthatissentfromthe TFTPserver
to the client.
The next step is registering a host which is done using either quick or full registration. Quick
registrationdoesn’taskwhatyouwant that hostto be calledor whatimage is goingto be usedlike it
is the case on the full version. While it may seem easier to register quickly, if multiple machines are
done at once it can complicatedandit is hard to determine whichdevice iswhich.Thisisn’tan issue
if onlyone image thatisbeingdeployedbutif twodifferentOS’sare beingdeployedthenitcanresult
in havingtofindwhat device hasa certainaddress.Once a hostis registered,animage isassignedto
it and it can either be uploaded or deployed to.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 23
There is Linux OS deployment support built in but from using FOG server, it is hard to get to point
where itcanbe deployedsuccessfully. Windowsdeploymentworkswellandonce thereisonecapture
image then that is all that is needed per OS.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 24
Software Deployment: Ninite Pro
Ninite Pro is the business version of the popular free tool that allows users to install multiple
applications at once. The pro version is a subscription based service that has premium features
provided for that cost.
When it comes to the subscription, it is a monthly contract or annual depending on the amount of
hostsusing the service.Thisis a benefittoorganisationsasit allowscompaniestoaccess the service
at the same cost regardless of how the budgeting works.
The benefit that it can offer is that it saves time when it comes to installing all the background
programs such as Dot Net Framework, Flash as the correct files are selected by the software when
these programs are selected. There is no need to go to individual sites to get all the download files
and install individually.
When it comes to the installation process, it runs off a file called “NinitePro.exe”. This is a file that
doesn’thave tobe installedonaspecificcomputerlike aserverbutshouldbe usedonapc that has a
domainadministratoraccount so that there are the accessrights that are requiredtobe installedon
the user’s machines. The tasks that can be performed are shown in table 3.2 and how each of these
processes work can be seen in appendix section 2.
Table 3.2
Task What it does
Install Installs the selected program/s
Update Updates the selected program/s
Audit Tells the user what devices the software is
installed on
Uninstall Uninstalls the program/s that are selected by
the user
The Pro versionnotonlyhasextrafunctionsoverthe free versionswhichonlyhasthe abilitytoinstall
or update pera single user. Whenthese tasksare performed overanetwork, remote options isused.
Thisprovidesthe programsto be managedto multiple devicessimultaneously throughautomatically
discoveringtheconnecteddevices ondomainandnon-domainnetworksandthe resultingscanonthe
demonstrationmodel canbe seen in figure 3-5 and the requiredactioncompleted forthe programs
selected.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 25
Figure 3-5
The deployment of a task mentionedintable 3-2 is all completed througha single intuitive interface
which has all tasks that can be completed available with a few simple clicks. Even the process of
selectingthe programsis easy to pick up as there are headingthat define whatitemsare below and
there is no list that has to be looked through to find what is required.
While itdoeshave alargeamountof applications,itonlyhas openofficeintermsof office applications.
Since the companies tend to use Microsoft Office suite then another software option is required to
deploy this to the network.
There was an issue internet access for the majority of the tasks to be completed. Since the college
setup didn’t have access to internet, a virtual environment was used to look into the features this
program offered. It was a simply process to adding a second interface to the virtual machine which
allowed internet access without affectingthe domain network. Another issue was that the software
trial license only lasts 7 days and this really isn’t long enough for the product to be fully reviewed.
There is the possibilitythatanextendedtrial canbe obtainedif an email wassentto the companyto
see aboutgettingalongertrial. Thisactionwastakentoensurepropertestinganda replywasreceived
back and a 60 day trial link was provided.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 26
Volume licensing
Volume licensingisfocusedatenterpriselevelapplications.The advantage of usingitisthatOS’s and
applicationsthatrequire alicensetobe able tofunctionproperlycanall be licensedusingthenetwork
anditiscentrallymanaged.Let’ssaythatacomputerwithastaticlicense isdecommissionedorneeds
to be reinstalled, the license hasto be obtainedoff the machine for it be usedagain if it isn’tlocked
to a particular device.
Centrally controlled licensing means that it isn’t assigned to a specific computer and there will be a
setamountof licensesthatare available foreachproductsomonitoringshouldbe usedtomake sure
that the amount of licenses is correct for the amount of devices using that product. If there isn’t
enough, it is like a DHCP pool which once it runs out of available IP addresses no more are issued.
There are a number of large organisations that have volume licensing available including Adobe and
Microsoft. Looking at Microsoft licensing as an example, it provides centralised activation for both
clientandserveroperatingsystemsontop of othersoftwarethatiscanbe usedforincludingitsrange
of office software. Since it has started providing cloud services, there are new tariffs that are aimed
to deal withthistype of product. Table 3.3showsthe Microsoftoptions available atthiscurrenttime.
Table 3-3 (Microsoft, 2015)
Amount of devicesor users Volume licensingoptions
Less than 5 Individual licensesshouldbe boughtforthisamountof usersor
devicesas5 licenses isthe minimumthatcanbe boughtto qualify
for volume licensing
5-249 OpenLicense
This is a fixed term contract that allow a company to start with a
minimumof 5 licensesandadditional licensescanbe bought when
required. It is the solution for a small business that needs licenses
butisn’tsure how manyare goingto be neededaswhentheygrow,
it can be increased.
OpenValue Subscription
Thisis similartoopenvalue contractbut has reduced monthlycost
as the licensesaren’townedbutaccessisallowedtothe products.
OpenValue isthe basicallyanagreementthat allowslicensestobe
obtained but instead having to pay one lump sum up front, it is
dividedintomonthlypaymentsthatcanbe factoredintoa business
expenses.
250 plus MicrosoftEnterprise Agreement(EA)
This is a subscription option is a flexible option that allows both
cloudservicestobepurchasedalongside otherlicensing.Thebenefit
of thisisthatthe costisreducedasacompanypaysforaccesstouse
productsinsteadof buyingthemoutright. Itis a fixedfee eachyear
that can be changed to fit the needs of the company.
MicrosoftProductsand ServicesAgreement(MPSA)
This is the replacement for the retiring licensing optionmentioned
below. It allows both online and offline products to be bought
togetherandconnectsthemalltogetherintoonemanagementpage
for easy management across many organisations.
MicrosoftSelectPlus
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 27
This was a package that was for licensing in organisations that are
made up from a conglomerate of smaller companies but if it had
individual contracts wouldn’tbe able to utilise the lower costs that
volume licensingoffers.Asof July1st
2015, this isbeingretiredas a
licensing option.
MethodsofMicrosoftvolumeactivation
Priorto 2012 whenthe latestgenerationof the operatingsystemswasreleased,there were onlyone
methodthatwasavailabletoimplementthevolume licensinginanetwork.Thiswasthroughaservice
called KMS.
KMS is a volume licensingmethodthatcanbe usedfor eithersingle ormultiple productactivation.It
providesthe flexibilityofbeingabletosupplyakeythathasonlyOSlicensesoramixtureof OSlicenses
and Office products.Itsupportsarange of differentproductsthatare made byMicrosoftandthere is
a minimum platformthat is supported for both OS and Office licensing. It is aimed at networksthat
are runningMicrosoftVistaandOffice 2010at the minimum.Allthe productsaftertheseversionsare
supported.
The basic principle behindKMS is that it allows a host to be activated using the KMS activation key
and all the otherdevicesonthe networkare pointedinitsdirection usingaDNSrecord.Thishostcan
just be used for activation but it can also be a host that provides other shared services (Cambridge
University,2015).It meansthat on an enterprise network,eachmachine doesn’tneedtobe installed
with a license key whichthen is sent off to Microsoft to see of it is valid. This usesconsiderably less
bandwidth on the network and the IT services department doesn’t have to spend hours activating
productswhenitisinstalledonanewdevice oraddedtoanexistingdevice. Thereare twoconstraints
of the minimum amount of computers that need to be on a network to use this service which are 5
servers, 25 clients and 5 office applications.
With the introduction of Windows 8 and Server 2012, a new way of applying volume activation was
released called Active Directory-Based Activation (ADBA). It is designed to run entirely off an AD
without the need for any host to be activated for additional devices to be licensed.
It worksonthe premise thatonce the keyisinstalled,itwill sitonthe networkand whenanew device
is attachedto the domainitwill justactivate (Savill,2012). While itdoesseemlike a replacementfor
KMS,thisisn’tthe case asitonlysupportsthe operatingsystemsof Windows8,Server2012andOffice
version 2013. The only requirement for the OS or product being installed is that GVLK needs to be
installed initially but the enterprise versions of software are designed to look towards volume
activationmethodsasstandard.If there are oldersystemssuchas Windows7 on the networkmixed
withnewersystemssuchas Windowsserver2012, KMS activationisneededinconjunctionwiththis
method due to incompatibility with ADBA.
In the manage roles and features window on Windows Server 2012, there is a role called ‘Volume
ActivationServices’.While itisthe onlymethodthatis supportedforADBA,it also acceptsKMS keys
so it is a flexible tool that be used regardless of the volume licensing type and meets the changing
needs of a business. An example of what the volume activation toolslooks like and the key options
are seen in figure 3-6.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 28
Figure 3-6
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 29
Conclusion
This reporthad the purpose of lookingatwhat advantagesnetworkdeploymentservicescouldoffer
companiesandwhatthe available optionswere. A numberof different conclusionswere drawnfrom
the analysis of different solutions. There is no one solution that was discussed in this report that is
suited to all companies. The correct option shouldbe used based on the budget available, technical
knowledge and the amount of network devices.
Due to the fact that Microsoft have a majority market share in the operating system market, they
appearto have the edge withnetworkdeploymentservices.Overthe competingproductstheyoften
have multiple years more development which often makes them a more stable platform. Since they
are the creators of the software that is normally deployed whether it be operating system or
application,adeploymentsystemcanbe developed fromthe groundupthat theywill knowwillwork
with the platform they are releasing it on.
Microsoft also offer products which are more suited to different sizes of organisations. For smaller
companiesof one hundredpluspcsWDS will probablyofferamore viable systemthanthatof SCCM.
It is more suitedforsmallerorganisations asWDS provides a platformthat is more easilyconfigured
by network administrators who have less experience knowledge required compared to what is
requiredinlarge organisations. Also, WDShas a lotlessrequirementsforsystemresource compared
to SCCM.
SCCMis verymuch designedtobe an enterprise solutiondue tothe specificationof hardware thatis
requiredforfunctioninginanenterprise environment.Itcanbe integratedintothe currentWindows
environmentwithouthavingtochange toomuch. Althoughitmayneedlotsof infrastructure already
in place,thisisnormallystandardinan organisationthathas over a certainamount of users.It is not
onlyatool thatcanprovide deploymentservicesbutit canbe usedallthe additionalfeaturesincluding
the automationfeaturessuchasautomaticallydetectingthe ADsettingsandthe software deployment
capabilities can minimise the impact that installing, removing and update the software.
Whilstthere are a fewoptionsfor operatingsystemdeploymentonthe opensource marketsuch as
FOG server,there are veryfewstable applicationdeploymentsystems.Fromthe perspective of linux
platforms, there is a great deal of deviation in the available applications as well as the method of
installingapplications.Thisisalso true of opensource community’sdevelopingsuchsystemsforthe
Microsoft market. Ninite Pro seems to be good for when first installing a machine but it lacks the
abilityto install all the applicationsthatmay be requiredlike Office systems. Thisisprobablycaused
by the amount of time and monetary investment required to developthis style of product and that
manyof the applicationdevelopedforMicrosoftrequire certificationtorunonthe platform, Microsoft
have the monopolyoverthe developmentmarketas theycan buildinfunctionalityforsystems,and
this is not always possible for small start-up developments.
FOG server is a good product for something that is free. It isn’t a perfect when it comes some of its
function but open-source by its nature isn’t. An example of when FOG could be utilized is small
companiesthatwant to be able to upgrade withouthavingto pay for the costs of a WindowsServer
license and may have an old computer that can be used to host the system which would save even
more money.
One conclusionthatwasclearregardlessof the limitationsof the softwareused isthatalthoughthese
may take time to install andconfigure correctly,itcan onlybe beneficial inanycompanythat istruly
reliant on its technology to be able to function. It makes the task of deploying systems quick and
efficientdue tothe abilitytoautomate the processintoafew clicksforanumberof clientsallatonce.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 30
Further research
Network service deployment is an ever more important in manageability of network connected
devices. There are a number of areas that could be looked into including:
 There is a rise in the amount of applications that are available through the internet. Some
products that are designed to be run from the cloud takes away the need to have software
deployed. One areawhere thisisthe case is office suite where there isnow the possibilityof
usingservicessuchasMicrosoftOffice365and Google Docswhichcan sometimesbe another
option that can be used to save having to deploy new versions of software.
 Microsoft secure boot is a feature that was added to some pc’s that are running Windows 8
that is normally automatically turned on. It is designed to not allow any untrusted sources
frombeingable toboot the device (Webopedia.com,2015). Thisisan issue whenitcomesto
deploymentsometimessince itcanbe turnaquickinstallprocessintoadifficulttaskif dealing
with a large number of machines being imaged due to BIOS settings having to be changed
before it can be done.
 The area of virtual desktops in on the rise in some organisations. These can be used instead
of the traditional PC that has to be imaged and all the software installed. It enables IT
administratorstospendlesstime deployingsoftware andoperatingsystemsastheyrunoff a
connectiontothe servertoobtainasystemimage ratherthanthe PCitself,itmakesthe need
for deployment software redundant.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 31
Self-evaluation
Looking back to when I started this project that I had no idea what some of the solutions discussed
had featuresthat are included.There isso much that couldhave beencoveredespeciallytodo with
the automation of OS installation but there just wasn’t enough time to do.
I foundsome of the topicsuchas howPXEactuallyworksfascinating.Iamextremelyproudof actually
gettinga SCCMsystemworkingwhichrequiredalotof researchand effortbutit was worthit. Thisis
because it is so complex to install.
I hadissueswithwritingthe concludingsectionasittookalotof tweakingtogetall the requiredpoint
in and link in scenarios. It took a while to get into the actually writing but I used the trick of writing
one section at a time so that I didn’t have to worry about going back to it again.
Time managementhasbeenprettybad in thisunit,some systemstookmore time to getfunctioning
that I would have liked which meant that I couldn’t complete some areas to the full practicallyand
hadtowrittenfrommyownknowledgeandexperiencesof usingthem. Thiswasn’thelpedwhenother
factors thatwere out of my control affected like the time that was available for the practical work.
If there wasthe possibilitytodothe projectagain,more researchwouldhave be done whenit came
to SCCM as time was wasted having to reinstall the system and the report would have beenstarted
earlier.
Usingthe knowledge thatIhave developed,ithasexpandedwhatIknow aboutdifferentdeployment
systemsandthere hasbeenanimprovementinmyproblemsolvingskillsasIhadtogetoverthe issues
faced in the project which is definitely an improvement prior to the start.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 32
Works Cited
Intel,1998. NeedToLowerTotal Costof Ownership.In: Wired formanagementbaseline. s.l.:Intel,
pp.1-3.
Intel,1998. PrebootExecutionEnvironment(PXE).In: Wired forManangementBaseline. s.l.:Intel,p.
31.
Intel,1999. PXEClient/Protocol.In: PrebootExecution Enviroment(PXE) Specification. s.l.:s.n.,pp.
12-35.
Microsoft,2015. Microsoftlicensing agreementcomparison, s.l.:Microsoft.
Docs.oracle.com, (2015). Understanding PXE Booting and Kickstart Technology. [online]
Available at:
https://docs.oracle.com/cd/E24628_01/em.121/e27046/appdx_pxeboot.htm#EMLCM
12199 [Accessed 10 Jun. 2015].
Dynamic Host Configuration Protocol (DHCP) Messages, (2015). [online]
Available at: http://www.omnisecu.com/tcpip/dhcp-dynamic-host-configuration-protocol-
messages.php [Accessed 10 Jun. 2015].
Kb.acronis.com, (2015). Acronis Snap Deploy 5 Licensing Policy | Knowledge Base. [online]
Available at: https://kb.acronis.com/content/47257 [Accessed 9 Jan. 2015].
Linux.com | The source for Linux Information, (2014). FOG: An IT Imaging Solution |
Linux.com. [online] Available at:
http://www.linux.com/component/content/article/133-general-linux/276691-fog-an-
it-imaging-solution/ [Accessed 11 Jun. 2015].
Mandalia, R. (2011). Windows Deployment Service (WDS) for Windows 7 Desktop Deployment
| ITProPortal.com. [online] ITProPortal. Available at:
http://www.itproportal.com/2011/07/27/windows-deployment-service-wds-windows-
7-desktop-deployment/ [Accessed 10 Jun. 2015].
Meyler, K., Holt, B., Oh, M., Sandys, J. and Ramsey, G. (2012). System Center 2012
Configuration Manager (SCCM) unleashed. Indianapolis: Sams Publishing.
Miller, W. (2015). Deployment: Boot into RAM with Windows PE. [online]
Technet.microsoft.com. Available at: https://technet.microsoft.com/en-
us/magazine/2006.10.windowspe.aspx [Accessed 11 Jun. 2015].
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 33
Miller, W. (2015). Using PXE Boot Technologies to Install Windows over a Network. [online]
Technet.microsoft.com. Available at: https://technet.microsoft.com/en-
us/magazine/2008.07.desktopfiles.aspx [Accessed 8 Jun. 2015].
Munn, T. (2015). FOGUserGuide - FOG Project. [online] Wiki.fogproject.org. Available at:
https://wiki.fogproject.org/wiki//index.php?title=FOGUserGuide#Background_on_FOG
[Accessed 11 Jun. 2015].
Savill, J. (2012). Active Directory-Based Activation (ADBA) | Active Directory content from
Windows IT Pro. [online] Windowsitpro.com. Available at:
http://windowsitpro.com/active-directory/q-what-active-directory-based-activation-
adba [Accessed 12 Jun. 2015].
Serepisos, P. (2015). SCCM | Paul Serepisos - Senior Technical Team Lead & Technical Project
Manager. [online] Pserepisos.wordpress.com. Available at:
https://pserepisos.wordpress.com/category/sccm/ [Accessed 3 Mar. 2015].
Statista, (2015). Computer operating systems: global market share 2012-2015 | Statistic.
[online] Available at: http://www.statista.com/statistics/268237/global-market-share-
held-by-operating-systems-since-2009/ [Accessed 5 May 2015].
Technet.microsoft.com, (2015). What is Windows PE?. [online] Available at:
https://technet.microsoft.com/en-us/library/cc766093%28v=ws.10%29.aspx [Accessed
11 Jun. 2015].
Troliver.com, (2015). FOG – Installing and Troubleshooting FOG 1.2.0 on Ubuntu 14.04 |
Troliver. [online] Available at: http://www.troliver.com/?p=285 [Accessed 11 Mar.
2015].
Ucs.cam.ac.uk, (2015). Office Volume Activation — University Information Services
(Academic & Infrastructure). [online] Available at:
http://www.ucs.cam.ac.uk/support/windows-support/winsuptech/volact/officeva
[Accessed 13 Jun. 2015].
Dell(2011). Microsoft Open License Program. [online] Dell. Available at:
http://www.dell.com/learn/us/en/555/vsl-microsoft-licensing-open [Accessed 13 Jun.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 34
2015].
Webopedia.com, (2015). What is Microsoft Secure Boot? Webopedia. [online] Available at:
http://www.webopedia.com/TERM/M/microsoft_secure_boot.html [Accessed 15 Jun.
2015].
Webopedia.com, (2015). What is WfM? A Webopedia Definition. [online] Available at:
http://www.webopedia.com/TERM/W/WfM.html [Accessed 10 Jun. 2015].
Working Hard In IT, (2012). Windows Server 2012 KMS Service Activation - Working Hard In
IT. [online] Available at: https://blog.workinghardinit.work/2012/08/17/windows -
server-2012-kms-service-activation/ [Accessed 10 Jun. 2015].
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 35
Appendix
Section 1: Extended AD log file
<03-06-2015 15:58:55> ModifyingActive DirectorySchema - withSMSextensions.
<03-06-2015 15:58:55> DS Root:CN=Schema,CN=Configuration,DC=Swampie,DC=com
<03-06-2015 15:58:55> Definedattribute cn=MS-SMS-Site-Code.
<03-06-2015 15:58:55> Definedattribute cn=mS-SMS-Assignment-Site-Code.
<03-06-2015 15:58:55> Definedattribute cn=MS-SMS-Site-Boundaries.
<03-06-2015 15:58:55> Definedattribute cn=MS-SMS-Roaming-Boundaries.
<03-06-2015 15:58:55> Definedattribute cn=MS-SMS-Default-MP.
<03-06-2015 15:58:55> Definedattribute cn=mS-SMS-Device-Management-Point.
<03-06-2015 15:58:55> Definedattribute cn=MS-SMS-MP-Name.
<03-06-2015 15:58:55> Definedattribute cn=MS-SMS-MP-Address.
<03-06-2015 15:58:55> Definedattribute cn=mS-SMS-Health-State.
<03-06-2015 15:58:55> Definedattribute cn=mS-SMS-Source-Forest.
<03-06-2015 15:58:55> Definedattribute cn=MS-SMS-Ranged-IP-Low.
<03-06-2015 15:58:55> Definedattribute cn=MS-SMS-Ranged-IP-High.
<03-06-2015 15:58:55> Definedattribute cn=mS-SMS-Version.
<03-06-2015 15:58:55> Definedattribute cn=mS-SMS-Capabilities.
<03-06-2015 15:58:56> Definedclasscn=MS-SMS-Management-Point.
<03-06-2015 15:58:56> Definedclasscn=MS-SMS-Server-Locator-Point.
<03-06-2015 15:58:56> Definedclasscn=MS-SMS-Site.
<03-06-2015 15:58:56> Definedclasscn=MS-SMS-Roaming-Boundary-Range.
<03-06-2015 15:58:57> Successfullyextendedthe Active Directoryschema.
<03-06-2015 15:58:57> Please refertothe ConfigMgrdocumentationforinstructionsonthe manual
<03-06-2015 15:58:57> configurationof accessrightsinactive directorywhichmaystill
<03-06-2015 15:58:57> needto be performed. (Althoughthe ADschemahasnow be extended,
<03-06-2015 15:58:57> AD mustbe configuredtoallow eachConfigMgrSite securityrightsto
<03-06-2015 15:58:57> publishineachof theirdomains.)
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 36
<03-06-2015 15:59:12> ModifyingActive DirectorySchema - withSMSextensions.
<03-06-2015 15:59:12> DS Root:CN=Schema,CN=Configuration,DC=Swampie,DC=com
<03-06-2015 15:59:12> Attribute cn=MS-SMS-Site-Codealreadyexists.
<03-06-2015 15:59:12> Attribute cn=mS-SMS-Assignment-Site-Codealreadyexists.
<03-06-2015 15:59:12> Attribute cn=MS-SMS-Site-Boundariesalreadyexists.
<03-06-2015 15:59:12> Attribute cn=MS-SMS-Roaming-Boundariesalreadyexists.
<03-06-2015 15:59:12> Attribute cn=MS-SMS-Default-MPalreadyexists.
<03-06-2015 15:59:12> Attribute cn=mS-SMS-Device-Management-Pointalreadyexists.
<03-06-2015 15:59:12> Attribute cn=MS-SMS-MP-Name alreadyexists.
<03-06-2015 15:59:12> Attribute cn=MS-SMS-MP-Addressalreadyexists.
<03-06-2015 15:59:12> Attribute cn=mS-SMS-Health-State alreadyexists.
<03-06-2015 15:59:12> Attribute cn=mS-SMS-Source-Forestalreadyexists.
<03-06-2015 15:59:12> Attribute cn=MS-SMS-Ranged-IP-Low alreadyexists.
<03-06-2015 15:59:12> Attribute cn=MS-SMS-Ranged-IP-Highalreadyexists.
<03-06-2015 15:59:12> Attribute cn=mS-SMS-Versionalreadyexists.
<03-06-2015 15:59:12> Attribute cn=mS-SMS-Capabilitiesalreadyexists.
<03-06-2015 15:59:12> Classcn=MS-SMS-Management-Pointalreadyexists.
<03-06-2015 15:59:12> Located LDAP://cn=MS-SMS-Management-
Point,CN=Schema,CN=Configuration,DC=Swampie,DC=com
<03-06-2015 15:59:13> SuccessfullyupdatedclassLDAP://cn=MS-SMS-Management-
Point,CN=Schema,CN=Configuration,DC=Swampie,DC=com.
<03-06-2015 15:59:13> Classcn=MS-SMS-Server-Locator-Pointalreadyexists.
<03-06-2015 15:59:13> Located LDAP://cn=MS-SMS-Server-Locator-
Point,CN=Schema,CN=Configuration,DC=Swampie,DC=com
<03-06-2015 15:59:13> Successfullyupdated class
CN=Schema,CN=Configuration,DC=Swampie,DC=com.
<03-06-2015 15:59:13> Classcn=MS-SMS-Site alreadyexists.
<03-06-2015 15:59:13> Located LDAP://cn=MS-SMS-
Site,CN=Schema,CN=Configuration,DC=Swampie,DC=com
<03-06-2015 15:59:13> SuccessfullyupdatedclassLDAP://cn=MS-SMS-
Site,CN=Schema,CN=Configuration,DC=Swampie,DC=com.
<03-06-2015 15:59:13> Classcn=MS-SMS-Roaming-Boundary-Range alreadyexists.
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 37
<03-06-2015 15:59:13> Located LDAP://cn=MS-SMS-Roaming-Boundary-
Range,CN=Schema,CN=Configuration,DC=Swampie,DC=com
<03-06-2015 15:59:13> SuccessfullyupdatedclassLDAP://cn=MS-SMS-Roaming-Boundary-
Range,CN=Schema,CN=Configuration,DC=Swampie,DC=com.
<03-06-2015 15:59:13> Successfullyextendedthe Active Directoryschema.
<03-06-2015 15:59:13> Please refertothe ConfigMgrdocumentationforinstructionsonthe manual
<03-06-2015 15:59:13> configurationof accessrightsinactive directorywhichmaystill
<03-06-2015 15:59:13> needto be performed. (Althoughthe ADschemahasnow be extended,
<03-06-2015 15:59:13> AD mustbe configuredtoallow eachConfigMgrSite securityrightsto
<03-06-2015 15:59:13> publishineachof theirdomains.)
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 38
Section 2: Ninite Pro
Installation function
Selectingthe applicationsrequired:
Afterthe install buttonisclicked:
Completedinstallation:
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 39
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 40
Audit function
Selectingwhatprogramsthatare goingto be checked:
Afterthe auditbuttonisclicked:
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 41
Completedaudit:
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 42
Update function
Selectingthe applicationstoupdate:
Afterthe update buttonisclicked:
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 43
Completedupdate function:
193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891
Page | 44
Uninstall feature
Selectingthe applicationstouninstall:
Afterthe uninstall buttonisclickedanditiscomplete:

More Related Content

Similar to 193734Researchproejct

Mundrah case study
Mundrah case studyMundrah case study
Mundrah case studySanam khan
 
A Hypothetical Situation Illustrating the Topology of an Enterprise Network U...
A Hypothetical Situation Illustrating the Topology of an Enterprise Network U...A Hypothetical Situation Illustrating the Topology of an Enterprise Network U...
A Hypothetical Situation Illustrating the Topology of an Enterprise Network U...faydah yahya
 
Bit Serial multiplier using Verilog
Bit Serial multiplier using VerilogBit Serial multiplier using Verilog
Bit Serial multiplier using VerilogBhargavKatkam
 
Net Development
Net DevelopmentNet Development
Net Developmentdaveparky
 
Juniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric ArchitectureJuniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric ArchitectureTechnologyBIZ
 
Vmware nsx network virtualization platform white paper
Vmware nsx network virtualization platform white paperVmware nsx network virtualization platform white paper
Vmware nsx network virtualization platform white paperCloudSyntrix
 
VMware-NSX-Network-Virtualization-Platform-WP
VMware-NSX-Network-Virtualization-Platform-WPVMware-NSX-Network-Virtualization-Platform-WP
VMware-NSX-Network-Virtualization-Platform-WPStephen Fenton
 
Vmware nsx-network-virtualization-platform-white-paper
Vmware nsx-network-virtualization-platform-white-paperVmware nsx-network-virtualization-platform-white-paper
Vmware nsx-network-virtualization-platform-white-paperCloudSyntrix
 
Potential Solutions Co Existence
Potential Solutions   Co ExistencePotential Solutions   Co Existence
Potential Solutions Co ExistenceRoman Agaev
 
BSC Honours Report - Neil Leiper (0604623)
BSC Honours Report - Neil Leiper (0604623)BSC Honours Report - Neil Leiper (0604623)
BSC Honours Report - Neil Leiper (0604623)Neil Leiper
 
Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...Videoguy
 
[White paper] Maintain-Accurate-Network-Diagrams
[White paper] Maintain-Accurate-Network-Diagrams[White paper] Maintain-Accurate-Network-Diagrams
[White paper] Maintain-Accurate-Network-DiagramsNetBrain Technologies
 
Implementing QoS in IP Networks - Nikolaos Tossiou
Implementing QoS in IP Networks - Nikolaos TossiouImplementing QoS in IP Networks - Nikolaos Tossiou
Implementing QoS in IP Networks - Nikolaos TossiouNikolaos Tossiou
 
NSX Reference Design version 3.0
NSX Reference Design version 3.0NSX Reference Design version 3.0
NSX Reference Design version 3.0Doddi Priyambodo
 
Prof Chethan Raj C, Final year Project Report Format
Prof Chethan Raj C, Final year Project Report FormatProf Chethan Raj C, Final year Project Report Format
Prof Chethan Raj C, Final year Project Report FormatProf Chethan Raj C
 
Project final report
Project final reportProject final report
Project final reportALIN BABU
 

Similar to 193734Researchproejct (20)

Mundrah case study
Mundrah case studyMundrah case study
Mundrah case study
 
A Hypothetical Situation Illustrating the Topology of an Enterprise Network U...
A Hypothetical Situation Illustrating the Topology of an Enterprise Network U...A Hypothetical Situation Illustrating the Topology of an Enterprise Network U...
A Hypothetical Situation Illustrating the Topology of an Enterprise Network U...
 
Bit Serial multiplier using Verilog
Bit Serial multiplier using VerilogBit Serial multiplier using Verilog
Bit Serial multiplier using Verilog
 
Net Development
Net DevelopmentNet Development
Net Development
 
UDP Report
UDP ReportUDP Report
UDP Report
 
Juniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric ArchitectureJuniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric Architecture
 
Vmware nsx network virtualization platform white paper
Vmware nsx network virtualization platform white paperVmware nsx network virtualization platform white paper
Vmware nsx network virtualization platform white paper
 
VMware-NSX-Network-Virtualization-Platform-WP
VMware-NSX-Network-Virtualization-Platform-WPVMware-NSX-Network-Virtualization-Platform-WP
VMware-NSX-Network-Virtualization-Platform-WP
 
Vmware nsx-network-virtualization-platform-white-paper
Vmware nsx-network-virtualization-platform-white-paperVmware nsx-network-virtualization-platform-white-paper
Vmware nsx-network-virtualization-platform-white-paper
 
Group H Final Report
Group H Final ReportGroup H Final Report
Group H Final Report
 
Group H Final Report
Group H Final ReportGroup H Final Report
Group H Final Report
 
Xpc target ug
Xpc target ugXpc target ug
Xpc target ug
 
Potential Solutions Co Existence
Potential Solutions   Co ExistencePotential Solutions   Co Existence
Potential Solutions Co Existence
 
BSC Honours Report - Neil Leiper (0604623)
BSC Honours Report - Neil Leiper (0604623)BSC Honours Report - Neil Leiper (0604623)
BSC Honours Report - Neil Leiper (0604623)
 
Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...
 
[White paper] Maintain-Accurate-Network-Diagrams
[White paper] Maintain-Accurate-Network-Diagrams[White paper] Maintain-Accurate-Network-Diagrams
[White paper] Maintain-Accurate-Network-Diagrams
 
Implementing QoS in IP Networks - Nikolaos Tossiou
Implementing QoS in IP Networks - Nikolaos TossiouImplementing QoS in IP Networks - Nikolaos Tossiou
Implementing QoS in IP Networks - Nikolaos Tossiou
 
NSX Reference Design version 3.0
NSX Reference Design version 3.0NSX Reference Design version 3.0
NSX Reference Design version 3.0
 
Prof Chethan Raj C, Final year Project Report Format
Prof Chethan Raj C, Final year Project Report FormatProf Chethan Raj C, Final year Project Report Format
Prof Chethan Raj C, Final year Project Report Format
 
Project final report
Project final reportProject final report
Project final report
 

193734Researchproejct

  • 1. 193734 RACHAEL MARSH BSC COMPUTER NETWORKING Deployment of services over the network OPERATING SYSTEMS, SOFTWARE AND LICENSING
  • 3. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 2 Copyright Copyright© 2015 Rachael Marsh. All rightsreserved. The copyrightof thisthesisrestswiththe Author. Copies(byanymeans) eitherinfull,orof extracts, may notbe made withoutpriorwrittenconsentfromthe Author.
  • 4. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 3 Preface Thanksto HighburyCollege for providingequipment and resourcesthatallowed for project completion. Eastleigh College ITservices for taking the time to allow me to havea discussion about deployment systems used and showing what these systems look like in real working environments. The Academy, Selsey for taking the time to allow me to havea discussion about the use of their deployment system. Many thanks for Patrick Swieskowski from Ninite Pro for the provision of a suitable length trial to fully test this software option.
  • 5. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 4 Contents Preface........................................................................................................................................................................................3 List of figures..............................................................................................................................................................................5 Nomenclature............................................................................................................................................................................6 Abstract......................................................................................................................................................................................7 Introduction...............................................................................................................................................................................8 A review of network system deployment ............................................................................................................................9 PXE technology.....................................................................................................................................................................9 Proprietary deployment solutions.................................................................................................................................10 Open-source deployment solutions ..............................................................................................................................10 Research Methodology.........................................................................................................................................................11 Operating System solution..............................................................................................................................................11 Software solution..............................................................................................................................................................11 Artefact Design.......................................................................................................................................................................12 Required hardware for implementation..................................................................................................................14 How it changed?...........................................................................................................................................................14 System implementation........................................................................................................................................................17 WDS.....................................................................................................................................................................................17 SCCM ...................................................................................................................................................................................17 Installation of SCCM.....................................................................................................................................................17 Configuration................................................................................................................................................................18 Deployment...................................................................................................................................................................19 FOG server..........................................................................................................................................................................21 Installation of FOG Server...........................................................................................................................................21 Configuration................................................................................................................................................................22 Deployment...................................................................................................................................................................22 Software Deployment: Ninite Pro..................................................................................................................................24 Volume licensing...............................................................................................................................................................26 Conclusion...............................................................................................................................................................................29 Further research.....................................................................................................................................................................30 Self-evaluation........................................................................................................................................................................31 Works Cited.............................................................................................................................................................................32 Appendix..................................................................................................................................................................................35 Section 1: Extended AD log file......................................................................................................................................35 Section 2: Ninite Pro.........................................................................................................................................................38
  • 6. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 5 List of figures Figure 1-1: Diagram showing the process of PXE booting ................................................................ 9 Figure 2-1:Logical network design of basic network design............................................................ 12 Figure 2-2:WDS network design................................................................................................... 13 Figure 2-3:FOG Server network design......................................................................................... 13 Figure 2-4: SCCM network design ................................................................................................ 15 Figure 2-5: Re-configured FOG Server details ............................................................................... 16 Figure3-1:DHCP optionsforSCCMDeployment..…………………………………………………………………………….20 Figure 3-2: Task Sequence after successful PXE boot..................................................................... 20 Figure 3-3:FOG Server Database installer web page...................................................................... 22 Figure 3-4:Mobile interface of FOG.............................................................................................. 22 Figure 3-5:Ninite Pro remote options window.............................................................................. 26 Figure 3-6:Volume activation key options..................................................................................... 29
  • 7. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 6 Nomenclature A numberof keytermsthat are usedthroughoutthisdocumentandare definedhere: SCCM- SystemConfigurationCenterManager WDS - WindowsDeploymentServices FOG - Free Open-Source Ghost WIM - WindowsImagingFormat PXE- Pre-bootexecution environment WinPE- WindowsPreinstallationenvironment TFTP - trivial file transferprotocol OS - operatingsystem NBP - NetworkBootstrapProgram;bootimage usedforbootingovera network NIC- Networkinterface card BIOS- Basic inputoutputsystem VMWare Workstation - virtual machine hostingsoftware made byVMWare EXE – executablefile KMS – KeyManagementServices GVLK - General VolumeLicensingKey DHCP – (DomainHostConfigurationProtocol) ProvidesIPaddressesonanetwork SQL - StructuredQueryLanguage
  • 8. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 7 Abstract The aimof this projectisto lookat a numberof differentdeploymentssystemsthatavailable onthe marketand the advantagesof networkdeploymentservicesintermsof operatingsystems,software and licensing. The project will look into the deployment technology, the options are available on the market and analysis a selection of both propriety and open-source solutions to assess to determine what deployments options can do for different size businesses. The areas that will be investigated are infrastructure required, installation of the product and deployment management.
  • 9. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 8 Introduction Technologyisnowabiggerpartof everydaylife whetherthisbe inthe home orworkenvironment.In the business,anetworkwillhave computersonitwhichare keytoproductivity. Withthisinmind,the installationof operatingsystemsandsoftware whenadevice needsinstallationorisbeingupgraded using conventional means such as disc can make the full process hard to manage. This has led many companiestouse automatedpackagesfordeploymentof operatingsystemsandsoftware,aswell as all of the updatesthattheyrequire.Manyoperatingsystems andsoftware packagesrequirelicensing therefore; it is also important to automate the deployment of licensing services. This report looks to highlight the key advantages of using automated deployment services over the conventional installation methods and the benefits which they can bring to an organisation. Along with this recommendation will be shown as to which system or systems are best for a range of different organisations. The key aims of this report are:  Analyse differentdeploymentsystemsforoperatingsystemdeploymentandthefeatures that they can offer  Different software deployment systems which can provide automated deployment of software on bothexistingdomain andbarebones computersthathave justbeeninstalledand added to a network  Look into the use of volume licencing services for automatically activing operating systems and software packages to reduce the need of manual activation  Develop a working demonstration of implemented network deployment systems  Give recommendationsbased of eachproductanalysedasto its place on the marketand the types of organisation who should consider it
  • 10. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 9 A review of network system deployment PXE technology PXE isa methodof bootinga computerusingonlythe networkcard.It is part of a specificationthatis designedtoreduce the total cost of ownershipof computers. Itscreatedcame afterit was identified in the late nineties that technology was becoming more important and was essential for businesses to be able to succeed. The aim was to allow IT professionals to have a low ownership cost through better management of the assets on a network through being able to install, reinstall and manage remotely (Intel,1998).The networkbootingsidethatisbeingfocusedon allowsaPXE-compatibleNIC card to pick up a deployment software when it is connected to the network and utilise the remote installation option of operating systems that is provided (Oracle, 2015). While it may have be licensed by Intel, it is actually an open-source standard. The technology is designedtobe vendor-independentwhichmeansthatitworksonanycomputerassumingithasa NIC that allowsPXEbooting. The majorityof networkcardsthatwere made inthe lastfive yearsnormally have these compatibility built in if they are made by the major hardware makers. The PXE process is relatively simple in what it uses in terms of the protocols and what it requiresto work. It requires in its most basic format: DHCP, TFTP and a Boot Image File (NBP). DHCP is usedto identifydevicesonthe networkincludingthe TFTPwhichgivesthe NBPtothe client.Figure 1-1shows how the process works roughly. As a result of this technology being aroundfor as long as it has and it being adopted by some of the largercompanies,there isarange of deploymentsoftware comesthathasbeencreatedwithdifferent featuresfora differentrange of businesssizes.There are some that are designedtodo one function onlysuchasapplicationdeploymentorOSdeploymentwhileothersofferamanagementconsole that has multiple functions built in. There is also a mixture of proprietary and open-source imaging software whichallowsitnottobe justlarge organisationsbutawideraudiencewhowouldotherwise be restricted to having to use conventional means. PXE-enabled NIC senda a DHCP Discover broadcast message to pick up the DHCP on the network DHCP server sends back all the usual IP information and points the NIC to where the TFTP server is and the boot image is The PXE-clientuses the TFTP information to contact itand ask for the boot image (NBP) TFTP server sends the client that requested the boot image and it is launched on the client. The clientcan now access the deployment software and actions can be taken over the network e.g. installion of an OS Figure 1-1 (Intel, 1999)
  • 11. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 10 Proprietary deployment solutions Proprietary software isownedbya specificcompanyor personwhich has restrictionsplacedonit in terms of its usage, changes that can be made to the software and distribution. When it comes to costing,itmay be a licensedproductthatispurchasedor may have an agreementthatallowsittobe free. It can be both paid for and free deployment solutions. Open-source deployment solutions Open-source is used to describe deployment toolsthat have the ability to be altered not just by the creators but also the general public.Itis not restrictedin whatprogram code can be changedto like proprietarythathasasetcode thatcanbe altereduptoacertainpointthenitisnotallowed. Whereas most commercial productsare closedsource,opensource products allow developersmore freedom to customise functionality to their needs.
  • 12. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 11 Research Methodology Operating System solution For the OSdeployment,alarge range of softwarewaslookedatandwasonlydeemedviableif itmeet a number of different constraints which are as follows: The supported operating systems should includeWindows7 and 8 This was a necessary constraint due to the fact that 75% of the OS market uses these platforms and legacy system such as Windows XP are quickly becoming replaced with these newer versions due to Microsoftpullingofficialsupportandapplicationsnolongerbeingbuiltforthese oldersystems. While other systems such as Linux and OSX holds a small market share, this will be looked at in a more theoretical senseratherthanactuallyimplementingdue totheamountof Linuxdistributionsavailable and the propriety server software that OSX needs to run all the relevant servicesfor deployment (Statista, 2015) There had to bePXE-capabilitieswhen itcameto deploymentoptions Since the aim of the project was to look at network deployment using PXE technology, if it doesn’t have this capability then it isn’t suitable for use in this project. Centralmanagementavailable Whetheritbe throughacommandpromptwindows,aconsole onthe systemitselforawebinterface, this requirement allows monitoring to take place and testing to be completed to determine the success of deployments. Flexibility An organisation may not have all the same requirements for every user. A system should be able to deploy a mixture of different images and there needs to the capacity to expand the amount of deployment. There were anumberof differentprogramsthatwere eliminatedasthe above constraintscouldn’tbe meet which included Acronis snap deploy and Clonezilla. Acronis snap deploywas unsuitable due to the fact that the licensing method was very complex (Kb.acronis.com, 2015). With Clonezilla, it was foundwhile itwassuitable tohave PXEserver butitseemstobe aimedatmore usersthatwantto do imagingeveryonce inawhilewithone imageforall machines ratherthanonaregularbasis andthere are some known issues such as MBR record corruption on windows systems when imaging. As a resultof thisresearch,the chosenOSdeploymentsoftware isFOGserverandWDS serverasit is representative of productsthat are scalable andlooksinto bothopensource and proprietysoftware to get an overview of options. Software solution For the software deployment,itwaskeyto lookat what programswere mostcommonlyinstalledon the majority of computers and determine from thisresearch; the programs that would be usedas a result to test the distributionof applicationson a network. As a result, the installationwas going to focus on the common applications divided into:  Runtime and background programs such as.net framework  Office suites such as Microsoft Office  Other document tools such as PDF readers
  • 13. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 12 As a result of this research, the chosen Software are Ninite Pro and Group policy. These represent a subscription based service and a tool that can be used within a domain network at no cost to demonstrate the implementation. Artefact Design Whenit came to howthe artefact wouldbe configuredtoprovide all the necessaryservicesrequired for the utilisationof the PXE booting method to be able to achieve the aim of creating a working deploymentservice,the basicsetup isshowninfigure2.2of the requirementsonthe clientandserver side on a network.The clientside isdepictingthe computersthat will be deployedwhile the servers depict the background infrastructure that is in place to enable the distribution. While it shows two devices,itisn’tthe definitive amountthat may be found ina network dependingon the solution and size of the company. Figure 2-1 Whencreatingthe designsforthe OS deploymentsoftware thatwasbeingused,figure 2.1 was used as a template to define the rough structure for the network infrastructure. Figure 2-2 shows the configuration of the WDS server and figure 2-3 FOG server when it was applied and additional information thatwasaddedto aidthe configurationof the servers.ThisincludedIPaddressingof the network, what needed to be installed on what machine and computer name.
  • 15. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 14 While volume licensingispartof thisproject,thiscouldn’tbe implementedinthe testdeploymentas an active licensingaccount isneededforreal wordtestingandtoverify validityof key butthiswasn’t available.Alsothe domainwasn’tconnectedtothe internetdue toconflictingDHCPserversbeingan issue when the college network was being used for internet access. Required hardware for implementation The minimumhardware requirementsforbe able tocomplete the aimof creatinga demonstration model are showintable 2.1 Table 2.1 Resource Purpose What it needs? Laptop Forremote managementof the servers and accessing the distribution software  NIC port  Remote desktop services 3 clientmachines To be used as distribution clients for the operating systems and clients.  PXE-compatible NIC  Blank Hard drive for the deployed OS and applications 2 servers To be used as a base for distribution software to be installed on and for the network infrastructure  NIC  Hard drive for OS installation  Suitable amount of RAM to support the required applications Switch To be used to connect all the machines for creation of a network  Atleast8portstoallow the required 6 devices to be able to connect and access required resources on the network WindowsServer Be used as a base for WDS distribution system and providing other network services e.g. DHCP/DNS  Server 2012 R2 as this supports newer OS’s e.g. Windows 8.1 FOG serversoftware FOG serverdistribution software  Version1.2.0 CentOS The operatingsystemonthe FOG serversoftware will be installedon.  Compatible version for FOG software thatis beingused How it changed? There were a number of changes to the actual configuration required to cope with modifications in terms of the hardware available, software used and how it needed to be implemented. Originally physical hosts were going to be used for the clientsbut there were no suitable computers thatsuitedthispurpose.Togetaroundthisissue,adesktopcomputerwasusedinsteadtohostvirtual machines running off a virtual machine platform that would be the clients. There was all the capabilities that were needed such as PXE boot, hard drive space but it had the benefit that more hosts could be created as the amount of deployments wasn’t restricted to the amount of physical
  • 16. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 15 machines. It did mean that any quantitative data that was obtained such as bandwidth being used wouldn’t simulate real world scenarios as all the data was going through one NIC. InitiallyFOGserverandWDSserverweregoingtobe usedastheOSdeploymenttoolsbutthischanged after Eastleigh College due the introduction to a management system for network pcs calledSCCM. Thisrequiredaredesignof the networkasthe machine thatcouldhavebeenusedasaSCCMmachine was now had virtual machines on it and this new software needed a separate computer due to the hardware requirements of the deploymentsoftware.Due tothe restrictionstohavingtouse apcthat is running less than the requirement for SCCM, no numerical data will be recordedas it wouldn’t be realistic data. Since it utilises WDS deployment capabilities through its management console, there was no point doingthissystemanymoresoitwasreplaced withSCCMOSdistribution.Suitablehardwarewasfound forthissoftware. Figurex-xshowsthenetworkconfigurationplanthatwascreatedforuse tointegrate into a network when it replaced WDS. Figure 2--2 Fog server was going to be on its own separate network which didn’t have an ad connection which meantthat AD integrationcouldn’tbe lookedat until the systemswere imaged. Thisisfollowingthe discussion at Eastleigh College as to how it was configured here as figure 2-5 shows the IP settings were changed to IP address: 192.168.1.95 and the subnet used being 192.168.1.0 subnet instead.
  • 17. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 16 Figure 2--3 When deciding on the areas to analyse, the chosen software was going to be looked at from the following aspects: Installation of the productandnetwork integration  Installation of the operating system that is used as a base OS of Linux or Microsoft  Network implementation which is the requirements to either integrate into the current network infrastructure or creating the network setup if starting from the ground up  Product installation The actual install of the product that will be used for the deployment through activating a feature already built in or an external source.  Configuration thatneedstobe done tothe productandanychangesnecessarytothe existing network post-installation  Testingoutthat the product isworkingas it shouldbe and resolvinganyissuesthatcome up as a result including where support can be found. Deploymentof the OS or software  The management method that is usedwith the software whether it be a console, web page or other types of windows.  Methods that it uses for image deployment
  • 18. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 17 System implementation WDS In Microsoft Server 2000, it utilised the new PXE booting method to allow operating systems and software to be packaged together and installed using a network. This feature was called Remote Installation Service (RIS) which was built into the operating system itself and was simply installed through the server configuration window. With the next version of the server software releasedin 2003, it came with RIS but when service pack 1 came out, it was replaced with an alternative called WDS (Miller,2015).Asnewerversionshave beenreleased,ithasbeenaddingsupport forcurrentand future systems which at the moment are Windows 7, 8 and 10. While legacy systems such as XP are still supported, it is slowly being phased out. For a WDS serverto be installedona network,the serverhas to be firstjoinedto the domain which hasa fewaspectsalreadyinplace.These requirementsare anetworkinfrastructure thathasAD,DHCP and DNS. Since the installation of active directory automatically promptsthe installation of the DNS role so this would normally be installed together. The installation is done through the server management window throughthe add rolesand features which the majority of users are familiar of the server side software with due to the fact that the majority of other services such as DHCP are installed through this method. There are two differentfilesthatcan be deployedusing WDSwhichare WIM and VHD. A WIMis the file that is used to install windows through a disc or other media. A VHD is a virtual disk image that can be installedwiththe OSandall the requiredapplications.Whenthisformatisdeployed,itcopies the image straightontothe computerbeingimaged.Ithas the benefitthatnoapplicationshasto be installed if they are already available. SCCM SCCM is designed withthe main focus of being able to manage the deployments of OS systems and applications all from one management console on a large network. While there is some support for Linux operating systems, it is provides considerably more features for the Windows side. Like WDS before it doesn’t really care what type of device it is as long as it is running Microsoft software. It differsinone wayasitsupports mobile devices;theSurface Pro tabletrange canalsobe managedand imaged using a special network adaptor. Installation of SCCM WindowsServeristhe platformthatisusedforthe SCCMinstallation. Thisprojectwillbe usingSCCM 2012 R2 due to the fact that the AD serverisServer2012 R2 and it supportsWindows8 withoutany issues. The installation of this deployment tool is not as simple as WDS where it is installing a role through the server manager. With SCCM, there are a number of network steps and pre-requisites that are requiredbefore installationof it. There shouldbe planningdone before itisimplemented due tothe complexity of the installation. A domain admin account should be used for all of the installation to allow the correct permissions. The network stepsrequiredare connectingtothe servertothe domainandextendingthe ADschema. When there is no connection to the domain and all the pre-requisites are installed, the permissions are all configuredtoworkonthe local administratoraccountratherthanadomainadministrator.This meansthat whenitis connectedtodomainand the SCCMsoftware is installedthatthere are a lot of errors due to the wrong permissions. Extending the AD schema can be done before or after the
  • 19. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 18 software installationbutitis bestpractice to complete itpre-installation(Meyleret al., 2012). It is a relativelysimpleprocessthatisdone on usingafilecalled“ExtADSCh.exe”thatislocatedonthe SCCM install file. When this successfully run, a log is created as seen in appendix section 1. The pre-requisites and their purpose can be seen in table 3-1. Table 3-1 Pre-requisite Purpose Windows Features: Dot Net framework WCF Asp.net Additional features needed for IIS to function properly IIS Web server for application deployment SQL Server Storing host data on a database WDS Provides PXE for OS deployment (SCCMautomatically installs) ADK Tool for customisable OS deployment MDT Provides tool to create unattended install function Withall the pre-requisites,the correctversionshave tobe usedforthe versionof SCCMthat isbeing installed and whether it is a primary or secondary of site being installed. A primary site is a requirement for any SCCM deployment as it is where all the installed secondary sites connect to. A secondary site is an additional copy of the software that can be installed under the primary site to provide load-balancing capabilities if dealing with lots of clients. Once all the pre-requisites, the SCCMapplication can be installed. It is installedthrough file through the “splash.hta”thatislocated inthe installfile inthemaindirectory.Itwasarelativitysimple process split up to logical steps if you have all the required information written down such as the database details.Allyoureallyneedtoenterinisafew detailssuchasa site code andname toidentifyitonthe network, type of site, database details, whether https will be use and ticking a few boxes to install features (distribution and management point). Configuration After the installation of SCCM, there are a number of actions that can be divided into additional network alterations, testing functionality and setting up features. The twonetworkchangesthatneedtobe made are configuringthe discoverysothatthe SCCMserver isenabledtoscanthe AD andimportthe detailsdiscoveredintothe managementconsole.The SPN is a command that maps a SQL server with an account and allows authentication for the database. Testing functionality is done by looking at the monitoring tab of the SCCM window under the site hierachysection. Thiscanbe usedto detectif there are anyconfigurationerrors.One sucherrorthat was found using this process of testing was the “Awebsvc not responding” error which prompted to restart the service but this only fixed it until a restart happened of the server. This error is a known fault with either SCCM2012 R2 or Server 2012 R2. The distributionpoint is the part of the software that deals with the distribution of both the OS and software content. If the content isn’t sent to the distribution point then clients are unable to access that content when connecting to the SCCMserver. The processof configuringthe serverfordeploymentstartswiththe addingthe PXEfunctionwhich islocatedon the distributionpointpropertieswindow.Once enablePXEsupportforclientsisticked,
  • 20. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 19 WDS will be installedautomaticallyandothersettings canbe definedsuchasallowingunknownPCs to contact the PXE. Like WDS, it usesa WinPE file whichis a cut downversionof windowsasthe bootimage that issent to the clientfollowingarequestforit sentto the TFTP (Technet,2015).Thisisautomaticallyaddedin when the PXE is installed on the distribution point. Deployment SCCMusestasksequencestocreate OSdeployments.A WIMfile isrequiredforthe selectedplatform that is beingdistributed.Thishas to be extractedintoa folderthatis accessible onthe networkas it has tobe importedinfromasharednetworklocation.The waytogetroundthe issue isjusttocreate a share on a serverthat everyone hasrightsas there isno havingto setpermissionsespeciallyforit. Once the file is imported, a copy is sent to the distribution point to make it accessible. Once this is done, it can be used in building task sequences for deployment. The PXE bootingisbasicallythe same whenitcomestoall systemssoitisjustmakingsure that F12 is pressedfornetworkboot.Whenitwasfirstattempteditwasn’tpickingupthe SCCMboot,there was no DHCP serversettingsthat toldthe clientswhere togo. This is prettyeasyto fix as it is justsetting twodetailsinthe DHCPserverwindow. Anexampleof how thisisimplementedisshowninfigure x-4 Once those detailsare entered,the PXE shouldworkand clientsshouldbe able to contact the DHCP server and be pointed towards the SCCMserver. If successful, this screen should appear: Figure 3-2 Figure 3-1
  • 21. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 20 The system copes well will having more than one deployment happening simultaneously which is a key as organisations don’t tend do one machine at time if over 1000 computers. It has a good monitoring system that shows what is being deployed using the deployment tab on the monitoring section. This shows what stage each machine is at and shows the error if the deployment fails. This enables the issue to be rectified easily. The system isn’t perfect when it comes to deployment as SCCM 2012 has an issue that means that once one device usesthe unknowncomputerdevicesobjectandit fillsinsome of the detailssuchas mac address whichmeansthatthe next unknownpctriestoconnectbutthePXEbootfails.The easiest fix is to make a new unknown computer collection and change some settings as the default one doesn’t let anything be changed. SCCM softwareinstallation BuiltintoSCCM, there isthe abilitytoaddsoftware installationintothe OSdeploymentbyaddingit to the task sequence orthroughthe software centre. OS installationtask sequence Withinthe OSinstallationtasksequence,therecanbe additional applicationsinstalledsuchasOffice suiteswhichare performedautomaticallywhenapc isdeployed.Thisisrelativelyeasyprocesswhen all the applications once SCCMissetupcorrectly. Software centre There is a client that is available for devices on a SCCM network that allow central management through the network. One of the features that its install is a software centre that allows a network administratortoinstall software ontothe computerremotely. Itisavailable whenthe SCCMclientis installed which can be installed with an OS deployment.
  • 22. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 21 FOG server It was produced in 2007 when it was clear for the creators Chuck Syperski and Jian Zhang found a suitable solutionwasn’tavailable onthe marketthat fittedtheirneeds (Munn,2015). Since itis built to be based on the Linux operating systems, no cost is normally incurred with the OS licensing and there isaflexibilityonwhatitcanbe installedon.Itcanbe runonuserfriendlyversionssuchasUbuntu or enterprise level platforms such as Red Hat. The hardware requirementsof the software isdesignedtobe able to run of machinesthathave 2GB to 16GB RAM. It can be installedonanoldserverthat has beensittinginthe cornersformonths.It is recommended that it has a minimum 40GB Hard drive space for the storage of the OS images. Whenit comes to the necessaryinfrastructure required,aninternetconnectionisall thatis needed. Itisflexibleinhowitcanbe setup.Initsmostbasicform, itcanbe pluggedintoaswitchandthe clients to be imaged plugged in, this can be done as there is a built-in DHCP service that can be installed. Installation of FOG Server The install itselfisdone through aterminal usingafew commands. The filethatisrequiredforsetting up can be downloaded through the FOG website or the “wget” package that allows files to be downloaded from the web using just the path where it is located. The install package comes in a “tar.gz” which is basically a linux zip file format. All that is required to install in the terminal is to navigate to the bin folderwhenunzipped andrun the command“sudo ./installfog.sh”.Thislaunches a script thathas veryeasyto followsteps.OnlydetailslikeIPaddressare neededtobe knownbefore the install. Some steps are automatically setsuch as type of linux being used. Once the detailshave beenset,all the pre-requisitesare downloadedandinstalledautomatically.Itisinstalledatthispoint other than configuring the DHCP to allow it to tell the clients where to go. There are things that can go wrong if the Linux platform usedis relativelynew. Thisis the case with Ubuntu 14.04 when this software was first installed. In this version, it was found that the database schemaupdate page keptcomingon everytime it wasturnedonas shownin figure 3-3.It was found that it was caused by the fact that it was a relatively new versionand something had changed from the previousversion (Troliver.com,2015).Accordingto the FOG website,thisversionhasaTFTPissue andisn’tguaranteedtowork.Previousversionsof thissoftwareseemtoworksotheseshouldbe used instead. Figure 3-3
  • 23. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 22 Configuration All the configuration after the initial install is done through a web page in the form of http://IPaddressoffog/fog/management that can be logged into from any device on the network. There is the ability to access the management through a mobile device which has limited abilities includingbeingtodeployanimage toa hostwithouthavingtogo to the mainmanagementpage.An example of this can be seen in figure 3-4. Figure 3-4 In FOG management,imageshave tobe created inthe image managementsectiontoallow animage to be uploaded or for it to be deployed. This is a simple process that is specifying the image name, what OS system and the kind of partitions that is being used. Single or multiple partitions are the options for Windows Os’s and Linux deployments need an Ext4 partition. Deployment FOG usesa capturedimagesratherthanWIMfilestodeploytocomputers.A capture image hastobe createdfirstbut thiscan have all the software thatis requiredfora systeminstalledonit. A sysprep should be run on the machine before it is captured so that when it joins the domain there isn’t an issues with cloned SID’s. Only one device SID can be the same on a domain. It is designedwhenitPXEbootsto not needany driversto be injectedasis the case sometimeswith WDS. Thisisdue tothe factthat a lotof driversare builtintothe NBPthatissentfromthe TFTPserver to the client. The next step is registering a host which is done using either quick or full registration. Quick registrationdoesn’taskwhatyouwant that hostto be calledor whatimage is goingto be usedlike it is the case on the full version. While it may seem easier to register quickly, if multiple machines are done at once it can complicatedandit is hard to determine whichdevice iswhich.Thisisn’tan issue if onlyone image thatisbeingdeployedbutif twodifferentOS’sare beingdeployedthenitcanresult in havingtofindwhat device hasa certainaddress.Once a hostis registered,animage isassignedto it and it can either be uploaded or deployed to.
  • 24. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 23 There is Linux OS deployment support built in but from using FOG server, it is hard to get to point where itcanbe deployedsuccessfully. Windowsdeploymentworkswellandonce thereisonecapture image then that is all that is needed per OS.
  • 25. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 24 Software Deployment: Ninite Pro Ninite Pro is the business version of the popular free tool that allows users to install multiple applications at once. The pro version is a subscription based service that has premium features provided for that cost. When it comes to the subscription, it is a monthly contract or annual depending on the amount of hostsusing the service.Thisis a benefittoorganisationsasit allowscompaniestoaccess the service at the same cost regardless of how the budgeting works. The benefit that it can offer is that it saves time when it comes to installing all the background programs such as Dot Net Framework, Flash as the correct files are selected by the software when these programs are selected. There is no need to go to individual sites to get all the download files and install individually. When it comes to the installation process, it runs off a file called “NinitePro.exe”. This is a file that doesn’thave tobe installedonaspecificcomputerlike aserverbutshouldbe usedonapc that has a domainadministratoraccount so that there are the accessrights that are requiredtobe installedon the user’s machines. The tasks that can be performed are shown in table 3.2 and how each of these processes work can be seen in appendix section 2. Table 3.2 Task What it does Install Installs the selected program/s Update Updates the selected program/s Audit Tells the user what devices the software is installed on Uninstall Uninstalls the program/s that are selected by the user The Pro versionnotonlyhasextrafunctionsoverthe free versionswhichonlyhasthe abilitytoinstall or update pera single user. Whenthese tasksare performed overanetwork, remote options isused. Thisprovidesthe programsto be managedto multiple devicessimultaneously throughautomatically discoveringtheconnecteddevices ondomainandnon-domainnetworksandthe resultingscanonthe demonstrationmodel canbe seen in figure 3-5 and the requiredactioncompleted forthe programs selected.
  • 26. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 25 Figure 3-5 The deployment of a task mentionedintable 3-2 is all completed througha single intuitive interface which has all tasks that can be completed available with a few simple clicks. Even the process of selectingthe programsis easy to pick up as there are headingthat define whatitemsare below and there is no list that has to be looked through to find what is required. While itdoeshave alargeamountof applications,itonlyhas openofficeintermsof office applications. Since the companies tend to use Microsoft Office suite then another software option is required to deploy this to the network. There was an issue internet access for the majority of the tasks to be completed. Since the college setup didn’t have access to internet, a virtual environment was used to look into the features this program offered. It was a simply process to adding a second interface to the virtual machine which allowed internet access without affectingthe domain network. Another issue was that the software trial license only lasts 7 days and this really isn’t long enough for the product to be fully reviewed. There is the possibilitythatanextendedtrial canbe obtainedif an email wassentto the companyto see aboutgettingalongertrial. Thisactionwastakentoensurepropertestinganda replywasreceived back and a 60 day trial link was provided.
  • 27. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 26 Volume licensing Volume licensingisfocusedatenterpriselevelapplications.The advantage of usingitisthatOS’s and applicationsthatrequire alicensetobe able tofunctionproperlycanall be licensedusingthenetwork anditiscentrallymanaged.Let’ssaythatacomputerwithastaticlicense isdecommissionedorneeds to be reinstalled, the license hasto be obtainedoff the machine for it be usedagain if it isn’tlocked to a particular device. Centrally controlled licensing means that it isn’t assigned to a specific computer and there will be a setamountof licensesthatare available foreachproductsomonitoringshouldbe usedtomake sure that the amount of licenses is correct for the amount of devices using that product. If there isn’t enough, it is like a DHCP pool which once it runs out of available IP addresses no more are issued. There are a number of large organisations that have volume licensing available including Adobe and Microsoft. Looking at Microsoft licensing as an example, it provides centralised activation for both clientandserveroperatingsystemsontop of othersoftwarethatiscanbe usedforincludingitsrange of office software. Since it has started providing cloud services, there are new tariffs that are aimed to deal withthistype of product. Table 3.3showsthe Microsoftoptions available atthiscurrenttime. Table 3-3 (Microsoft, 2015) Amount of devicesor users Volume licensingoptions Less than 5 Individual licensesshouldbe boughtforthisamountof usersor devicesas5 licenses isthe minimumthatcanbe boughtto qualify for volume licensing 5-249 OpenLicense This is a fixed term contract that allow a company to start with a minimumof 5 licensesandadditional licensescanbe bought when required. It is the solution for a small business that needs licenses butisn’tsure how manyare goingto be neededaswhentheygrow, it can be increased. OpenValue Subscription Thisis similartoopenvalue contractbut has reduced monthlycost as the licensesaren’townedbutaccessisallowedtothe products. OpenValue isthe basicallyanagreementthat allowslicensestobe obtained but instead having to pay one lump sum up front, it is dividedintomonthlypaymentsthatcanbe factoredintoa business expenses. 250 plus MicrosoftEnterprise Agreement(EA) This is a subscription option is a flexible option that allows both cloudservicestobepurchasedalongside otherlicensing.Thebenefit of thisisthatthe costisreducedasacompanypaysforaccesstouse productsinsteadof buyingthemoutright. Itis a fixedfee eachyear that can be changed to fit the needs of the company. MicrosoftProductsand ServicesAgreement(MPSA) This is the replacement for the retiring licensing optionmentioned below. It allows both online and offline products to be bought togetherandconnectsthemalltogetherintoonemanagementpage for easy management across many organisations. MicrosoftSelectPlus
  • 28. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 27 This was a package that was for licensing in organisations that are made up from a conglomerate of smaller companies but if it had individual contracts wouldn’tbe able to utilise the lower costs that volume licensingoffers.Asof July1st 2015, this isbeingretiredas a licensing option. MethodsofMicrosoftvolumeactivation Priorto 2012 whenthe latestgenerationof the operatingsystemswasreleased,there were onlyone methodthatwasavailabletoimplementthevolume licensinginanetwork.Thiswasthroughaservice called KMS. KMS is a volume licensingmethodthatcanbe usedfor eithersingle ormultiple productactivation.It providesthe flexibilityofbeingabletosupplyakeythathasonlyOSlicensesoramixtureof OSlicenses and Office products.Itsupportsarange of differentproductsthatare made byMicrosoftandthere is a minimum platformthat is supported for both OS and Office licensing. It is aimed at networksthat are runningMicrosoftVistaandOffice 2010at the minimum.Allthe productsaftertheseversionsare supported. The basic principle behindKMS is that it allows a host to be activated using the KMS activation key and all the otherdevicesonthe networkare pointedinitsdirection usingaDNSrecord.Thishostcan just be used for activation but it can also be a host that provides other shared services (Cambridge University,2015).It meansthat on an enterprise network,eachmachine doesn’tneedtobe installed with a license key whichthen is sent off to Microsoft to see of it is valid. This usesconsiderably less bandwidth on the network and the IT services department doesn’t have to spend hours activating productswhenitisinstalledonanewdevice oraddedtoanexistingdevice. Thereare twoconstraints of the minimum amount of computers that need to be on a network to use this service which are 5 servers, 25 clients and 5 office applications. With the introduction of Windows 8 and Server 2012, a new way of applying volume activation was released called Active Directory-Based Activation (ADBA). It is designed to run entirely off an AD without the need for any host to be activated for additional devices to be licensed. It worksonthe premise thatonce the keyisinstalled,itwill sitonthe networkand whenanew device is attachedto the domainitwill justactivate (Savill,2012). While itdoesseemlike a replacementfor KMS,thisisn’tthe case asitonlysupportsthe operatingsystemsof Windows8,Server2012andOffice version 2013. The only requirement for the OS or product being installed is that GVLK needs to be installed initially but the enterprise versions of software are designed to look towards volume activationmethodsasstandard.If there are oldersystemssuchas Windows7 on the networkmixed withnewersystemssuchas Windowsserver2012, KMS activationisneededinconjunctionwiththis method due to incompatibility with ADBA. In the manage roles and features window on Windows Server 2012, there is a role called ‘Volume ActivationServices’.While itisthe onlymethodthatis supportedforADBA,it also acceptsKMS keys so it is a flexible tool that be used regardless of the volume licensing type and meets the changing needs of a business. An example of what the volume activation toolslooks like and the key options are seen in figure 3-6.
  • 30. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 29 Conclusion This reporthad the purpose of lookingatwhat advantagesnetworkdeploymentservicescouldoffer companiesandwhatthe available optionswere. A numberof different conclusionswere drawnfrom the analysis of different solutions. There is no one solution that was discussed in this report that is suited to all companies. The correct option shouldbe used based on the budget available, technical knowledge and the amount of network devices. Due to the fact that Microsoft have a majority market share in the operating system market, they appearto have the edge withnetworkdeploymentservices.Overthe competingproductstheyoften have multiple years more development which often makes them a more stable platform. Since they are the creators of the software that is normally deployed whether it be operating system or application,adeploymentsystemcanbe developed fromthe groundupthat theywill knowwillwork with the platform they are releasing it on. Microsoft also offer products which are more suited to different sizes of organisations. For smaller companiesof one hundredpluspcsWDS will probablyofferamore viable systemthanthatof SCCM. It is more suitedforsmallerorganisations asWDS provides a platformthat is more easilyconfigured by network administrators who have less experience knowledge required compared to what is requiredinlarge organisations. Also, WDShas a lotlessrequirementsforsystemresource compared to SCCM. SCCMis verymuch designedtobe an enterprise solutiondue tothe specificationof hardware thatis requiredforfunctioninginanenterprise environment.Itcanbe integratedintothe currentWindows environmentwithouthavingtochange toomuch. Althoughitmayneedlotsof infrastructure already in place,thisisnormallystandardinan organisationthathas over a certainamount of users.It is not onlyatool thatcanprovide deploymentservicesbutit canbe usedallthe additionalfeaturesincluding the automationfeaturessuchasautomaticallydetectingthe ADsettingsandthe software deployment capabilities can minimise the impact that installing, removing and update the software. Whilstthere are a fewoptionsfor operatingsystemdeploymentonthe opensource marketsuch as FOG server,there are veryfewstable applicationdeploymentsystems.Fromthe perspective of linux platforms, there is a great deal of deviation in the available applications as well as the method of installingapplications.Thisisalso true of opensource community’sdevelopingsuchsystemsforthe Microsoft market. Ninite Pro seems to be good for when first installing a machine but it lacks the abilityto install all the applicationsthatmay be requiredlike Office systems. Thisisprobablycaused by the amount of time and monetary investment required to developthis style of product and that manyof the applicationdevelopedforMicrosoftrequire certificationtorunonthe platform, Microsoft have the monopolyoverthe developmentmarketas theycan buildinfunctionalityforsystems,and this is not always possible for small start-up developments. FOG server is a good product for something that is free. It isn’t a perfect when it comes some of its function but open-source by its nature isn’t. An example of when FOG could be utilized is small companiesthatwant to be able to upgrade withouthavingto pay for the costs of a WindowsServer license and may have an old computer that can be used to host the system which would save even more money. One conclusionthatwasclearregardlessof the limitationsof the softwareused isthatalthoughthese may take time to install andconfigure correctly,itcan onlybe beneficial inanycompanythat istruly reliant on its technology to be able to function. It makes the task of deploying systems quick and efficientdue tothe abilitytoautomate the processintoafew clicksforanumberof clientsallatonce.
  • 31. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 30 Further research Network service deployment is an ever more important in manageability of network connected devices. There are a number of areas that could be looked into including:  There is a rise in the amount of applications that are available through the internet. Some products that are designed to be run from the cloud takes away the need to have software deployed. One areawhere thisisthe case is office suite where there isnow the possibilityof usingservicessuchasMicrosoftOffice365and Google Docswhichcan sometimesbe another option that can be used to save having to deploy new versions of software.  Microsoft secure boot is a feature that was added to some pc’s that are running Windows 8 that is normally automatically turned on. It is designed to not allow any untrusted sources frombeingable toboot the device (Webopedia.com,2015). Thisisan issue whenitcomesto deploymentsometimessince itcanbe turnaquickinstallprocessintoadifficulttaskif dealing with a large number of machines being imaged due to BIOS settings having to be changed before it can be done.  The area of virtual desktops in on the rise in some organisations. These can be used instead of the traditional PC that has to be imaged and all the software installed. It enables IT administratorstospendlesstime deployingsoftware andoperatingsystemsastheyrunoff a connectiontothe servertoobtainasystemimage ratherthanthe PCitself,itmakesthe need for deployment software redundant.
  • 32. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 31 Self-evaluation Looking back to when I started this project that I had no idea what some of the solutions discussed had featuresthat are included.There isso much that couldhave beencoveredespeciallytodo with the automation of OS installation but there just wasn’t enough time to do. I foundsome of the topicsuchas howPXEactuallyworksfascinating.Iamextremelyproudof actually gettinga SCCMsystemworkingwhichrequiredalotof researchand effortbutit was worthit. Thisis because it is so complex to install. I hadissueswithwritingthe concludingsectionasittookalotof tweakingtogetall the requiredpoint in and link in scenarios. It took a while to get into the actually writing but I used the trick of writing one section at a time so that I didn’t have to worry about going back to it again. Time managementhasbeenprettybad in thisunit,some systemstookmore time to getfunctioning that I would have liked which meant that I couldn’t complete some areas to the full practicallyand hadtowrittenfrommyownknowledgeandexperiencesof usingthem. Thiswasn’thelpedwhenother factors thatwere out of my control affected like the time that was available for the practical work. If there wasthe possibilitytodothe projectagain,more researchwouldhave be done whenit came to SCCM as time was wasted having to reinstall the system and the report would have beenstarted earlier. Usingthe knowledge thatIhave developed,ithasexpandedwhatIknow aboutdifferentdeployment systemsandthere hasbeenanimprovementinmyproblemsolvingskillsasIhadtogetoverthe issues faced in the project which is definitely an improvement prior to the start.
  • 33. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 32 Works Cited Intel,1998. NeedToLowerTotal Costof Ownership.In: Wired formanagementbaseline. s.l.:Intel, pp.1-3. Intel,1998. PrebootExecutionEnvironment(PXE).In: Wired forManangementBaseline. s.l.:Intel,p. 31. Intel,1999. PXEClient/Protocol.In: PrebootExecution Enviroment(PXE) Specification. s.l.:s.n.,pp. 12-35. Microsoft,2015. Microsoftlicensing agreementcomparison, s.l.:Microsoft. Docs.oracle.com, (2015). Understanding PXE Booting and Kickstart Technology. [online] Available at: https://docs.oracle.com/cd/E24628_01/em.121/e27046/appdx_pxeboot.htm#EMLCM 12199 [Accessed 10 Jun. 2015]. Dynamic Host Configuration Protocol (DHCP) Messages, (2015). [online] Available at: http://www.omnisecu.com/tcpip/dhcp-dynamic-host-configuration-protocol- messages.php [Accessed 10 Jun. 2015]. Kb.acronis.com, (2015). Acronis Snap Deploy 5 Licensing Policy | Knowledge Base. [online] Available at: https://kb.acronis.com/content/47257 [Accessed 9 Jan. 2015]. Linux.com | The source for Linux Information, (2014). FOG: An IT Imaging Solution | Linux.com. [online] Available at: http://www.linux.com/component/content/article/133-general-linux/276691-fog-an- it-imaging-solution/ [Accessed 11 Jun. 2015]. Mandalia, R. (2011). Windows Deployment Service (WDS) for Windows 7 Desktop Deployment | ITProPortal.com. [online] ITProPortal. Available at: http://www.itproportal.com/2011/07/27/windows-deployment-service-wds-windows- 7-desktop-deployment/ [Accessed 10 Jun. 2015]. Meyler, K., Holt, B., Oh, M., Sandys, J. and Ramsey, G. (2012). System Center 2012 Configuration Manager (SCCM) unleashed. Indianapolis: Sams Publishing. Miller, W. (2015). Deployment: Boot into RAM with Windows PE. [online] Technet.microsoft.com. Available at: https://technet.microsoft.com/en- us/magazine/2006.10.windowspe.aspx [Accessed 11 Jun. 2015].
  • 34. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 33 Miller, W. (2015). Using PXE Boot Technologies to Install Windows over a Network. [online] Technet.microsoft.com. Available at: https://technet.microsoft.com/en- us/magazine/2008.07.desktopfiles.aspx [Accessed 8 Jun. 2015]. Munn, T. (2015). FOGUserGuide - FOG Project. [online] Wiki.fogproject.org. Available at: https://wiki.fogproject.org/wiki//index.php?title=FOGUserGuide#Background_on_FOG [Accessed 11 Jun. 2015]. Savill, J. (2012). Active Directory-Based Activation (ADBA) | Active Directory content from Windows IT Pro. [online] Windowsitpro.com. Available at: http://windowsitpro.com/active-directory/q-what-active-directory-based-activation- adba [Accessed 12 Jun. 2015]. Serepisos, P. (2015). SCCM | Paul Serepisos - Senior Technical Team Lead & Technical Project Manager. [online] Pserepisos.wordpress.com. Available at: https://pserepisos.wordpress.com/category/sccm/ [Accessed 3 Mar. 2015]. Statista, (2015). Computer operating systems: global market share 2012-2015 | Statistic. [online] Available at: http://www.statista.com/statistics/268237/global-market-share- held-by-operating-systems-since-2009/ [Accessed 5 May 2015]. Technet.microsoft.com, (2015). What is Windows PE?. [online] Available at: https://technet.microsoft.com/en-us/library/cc766093%28v=ws.10%29.aspx [Accessed 11 Jun. 2015]. Troliver.com, (2015). FOG – Installing and Troubleshooting FOG 1.2.0 on Ubuntu 14.04 | Troliver. [online] Available at: http://www.troliver.com/?p=285 [Accessed 11 Mar. 2015]. Ucs.cam.ac.uk, (2015). Office Volume Activation — University Information Services (Academic & Infrastructure). [online] Available at: http://www.ucs.cam.ac.uk/support/windows-support/winsuptech/volact/officeva [Accessed 13 Jun. 2015]. Dell(2011). Microsoft Open License Program. [online] Dell. Available at: http://www.dell.com/learn/us/en/555/vsl-microsoft-licensing-open [Accessed 13 Jun.
  • 35. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 34 2015]. Webopedia.com, (2015). What is Microsoft Secure Boot? Webopedia. [online] Available at: http://www.webopedia.com/TERM/M/microsoft_secure_boot.html [Accessed 15 Jun. 2015]. Webopedia.com, (2015). What is WfM? A Webopedia Definition. [online] Available at: http://www.webopedia.com/TERM/W/WfM.html [Accessed 10 Jun. 2015]. Working Hard In IT, (2012). Windows Server 2012 KMS Service Activation - Working Hard In IT. [online] Available at: https://blog.workinghardinit.work/2012/08/17/windows - server-2012-kms-service-activation/ [Accessed 10 Jun. 2015].
  • 36. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 35 Appendix Section 1: Extended AD log file <03-06-2015 15:58:55> ModifyingActive DirectorySchema - withSMSextensions. <03-06-2015 15:58:55> DS Root:CN=Schema,CN=Configuration,DC=Swampie,DC=com <03-06-2015 15:58:55> Definedattribute cn=MS-SMS-Site-Code. <03-06-2015 15:58:55> Definedattribute cn=mS-SMS-Assignment-Site-Code. <03-06-2015 15:58:55> Definedattribute cn=MS-SMS-Site-Boundaries. <03-06-2015 15:58:55> Definedattribute cn=MS-SMS-Roaming-Boundaries. <03-06-2015 15:58:55> Definedattribute cn=MS-SMS-Default-MP. <03-06-2015 15:58:55> Definedattribute cn=mS-SMS-Device-Management-Point. <03-06-2015 15:58:55> Definedattribute cn=MS-SMS-MP-Name. <03-06-2015 15:58:55> Definedattribute cn=MS-SMS-MP-Address. <03-06-2015 15:58:55> Definedattribute cn=mS-SMS-Health-State. <03-06-2015 15:58:55> Definedattribute cn=mS-SMS-Source-Forest. <03-06-2015 15:58:55> Definedattribute cn=MS-SMS-Ranged-IP-Low. <03-06-2015 15:58:55> Definedattribute cn=MS-SMS-Ranged-IP-High. <03-06-2015 15:58:55> Definedattribute cn=mS-SMS-Version. <03-06-2015 15:58:55> Definedattribute cn=mS-SMS-Capabilities. <03-06-2015 15:58:56> Definedclasscn=MS-SMS-Management-Point. <03-06-2015 15:58:56> Definedclasscn=MS-SMS-Server-Locator-Point. <03-06-2015 15:58:56> Definedclasscn=MS-SMS-Site. <03-06-2015 15:58:56> Definedclasscn=MS-SMS-Roaming-Boundary-Range. <03-06-2015 15:58:57> Successfullyextendedthe Active Directoryschema. <03-06-2015 15:58:57> Please refertothe ConfigMgrdocumentationforinstructionsonthe manual <03-06-2015 15:58:57> configurationof accessrightsinactive directorywhichmaystill <03-06-2015 15:58:57> needto be performed. (Althoughthe ADschemahasnow be extended, <03-06-2015 15:58:57> AD mustbe configuredtoallow eachConfigMgrSite securityrightsto <03-06-2015 15:58:57> publishineachof theirdomains.)
  • 37. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 36 <03-06-2015 15:59:12> ModifyingActive DirectorySchema - withSMSextensions. <03-06-2015 15:59:12> DS Root:CN=Schema,CN=Configuration,DC=Swampie,DC=com <03-06-2015 15:59:12> Attribute cn=MS-SMS-Site-Codealreadyexists. <03-06-2015 15:59:12> Attribute cn=mS-SMS-Assignment-Site-Codealreadyexists. <03-06-2015 15:59:12> Attribute cn=MS-SMS-Site-Boundariesalreadyexists. <03-06-2015 15:59:12> Attribute cn=MS-SMS-Roaming-Boundariesalreadyexists. <03-06-2015 15:59:12> Attribute cn=MS-SMS-Default-MPalreadyexists. <03-06-2015 15:59:12> Attribute cn=mS-SMS-Device-Management-Pointalreadyexists. <03-06-2015 15:59:12> Attribute cn=MS-SMS-MP-Name alreadyexists. <03-06-2015 15:59:12> Attribute cn=MS-SMS-MP-Addressalreadyexists. <03-06-2015 15:59:12> Attribute cn=mS-SMS-Health-State alreadyexists. <03-06-2015 15:59:12> Attribute cn=mS-SMS-Source-Forestalreadyexists. <03-06-2015 15:59:12> Attribute cn=MS-SMS-Ranged-IP-Low alreadyexists. <03-06-2015 15:59:12> Attribute cn=MS-SMS-Ranged-IP-Highalreadyexists. <03-06-2015 15:59:12> Attribute cn=mS-SMS-Versionalreadyexists. <03-06-2015 15:59:12> Attribute cn=mS-SMS-Capabilitiesalreadyexists. <03-06-2015 15:59:12> Classcn=MS-SMS-Management-Pointalreadyexists. <03-06-2015 15:59:12> Located LDAP://cn=MS-SMS-Management- Point,CN=Schema,CN=Configuration,DC=Swampie,DC=com <03-06-2015 15:59:13> SuccessfullyupdatedclassLDAP://cn=MS-SMS-Management- Point,CN=Schema,CN=Configuration,DC=Swampie,DC=com. <03-06-2015 15:59:13> Classcn=MS-SMS-Server-Locator-Pointalreadyexists. <03-06-2015 15:59:13> Located LDAP://cn=MS-SMS-Server-Locator- Point,CN=Schema,CN=Configuration,DC=Swampie,DC=com <03-06-2015 15:59:13> Successfullyupdated class CN=Schema,CN=Configuration,DC=Swampie,DC=com. <03-06-2015 15:59:13> Classcn=MS-SMS-Site alreadyexists. <03-06-2015 15:59:13> Located LDAP://cn=MS-SMS- Site,CN=Schema,CN=Configuration,DC=Swampie,DC=com <03-06-2015 15:59:13> SuccessfullyupdatedclassLDAP://cn=MS-SMS- Site,CN=Schema,CN=Configuration,DC=Swampie,DC=com. <03-06-2015 15:59:13> Classcn=MS-SMS-Roaming-Boundary-Range alreadyexists.
  • 38. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 37 <03-06-2015 15:59:13> Located LDAP://cn=MS-SMS-Roaming-Boundary- Range,CN=Schema,CN=Configuration,DC=Swampie,DC=com <03-06-2015 15:59:13> SuccessfullyupdatedclassLDAP://cn=MS-SMS-Roaming-Boundary- Range,CN=Schema,CN=Configuration,DC=Swampie,DC=com. <03-06-2015 15:59:13> Successfullyextendedthe Active Directoryschema. <03-06-2015 15:59:13> Please refertothe ConfigMgrdocumentationforinstructionsonthe manual <03-06-2015 15:59:13> configurationof accessrightsinactive directorywhichmaystill <03-06-2015 15:59:13> needto be performed. (Althoughthe ADschemahasnow be extended, <03-06-2015 15:59:13> AD mustbe configuredtoallow eachConfigMgrSite securityrightsto <03-06-2015 15:59:13> publishineachof theirdomains.)
  • 39. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 38 Section 2: Ninite Pro Installation function Selectingthe applicationsrequired: Afterthe install buttonisclicked: Completedinstallation:
  • 41. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 40 Audit function Selectingwhatprogramsthatare goingto be checked: Afterthe auditbuttonisclicked:
  • 43. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 42 Update function Selectingthe applicationstoupdate: Afterthe update buttonisclicked:
  • 45. 193734 a9fa07c5-b11e-41e9-9537-e44a6cdec61b-150720153200-lva1-app6891 Page | 44 Uninstall feature Selectingthe applicationstouninstall: Afterthe uninstall buttonisclickedanditiscomplete: