Key words: software, network, convenient maintenance, durability, Campus Network
AbstractAbstract: In the world of rapid development of information technology, various threat attacks constantly target the educational network environment on campus, which has a great impact on students' learning and teachers' teaching. This article starts with defense and discusses the maintenance of campus Education Network.
The information technology and network environment have become an indispensable means of modern education. However, such stories happen in almost every school's student data center: there are always several "bad machines ", students always say that I still use this lesson well. How can this lesson not start up? The teacher is always scratching his head for this problem. I just got a fixed seat in the previous lesson, this lesson has to be changed again. The student's previous homework is still in the "bad machine", and this lesson cannot be completed. In this case, it is estimated that every information teacher has encountered such a problem. Why? After careful analysis, most of these situations are caused by improper "reinforcement" of operating systems or software. So how can we create a student data center that is easy to maintain and durable?
Software deployment
1) collect IP addresses. Now, it is estimated that you can use a large branch of the machine in your IDC. There is always a DHCP server in the school, so clear the DHCP address lease pool. Set the student machine to automatically obtain the IP address. One machine is started in the order you want, so that each machine can obtain an IP address, and then export the list from the DHCP server for backup.
2) Hard Disk Partition: the hard disk is divided into two areas, namely, C and D. The format is NTFS, which facilitates management.
3) install the operating system and common software: Install common software such as Windows XP system, Office, Kingsoft typing, and Flash.
4) Operating System settings:
1. Disable the network neighbor attribute. That is, right-click the network neighbor and no response is returned. Why? When I was in class, I found that many students often do not control their computers during class. I checked and found that the students disabled the "local connection, naturally, it is out of control. Originally, modifying the Registry can disable the attributes of network neighbors, but it is not very convenient, so I used the following small software to "restrict users from modifying IP address tools for XP" and then delete the software.
2. Customize the desktop size. Set the desktop size to 1024*768, no background, no screen protection, and the power supply solution is always on. This grants students no permission to modify desktop properties. Why? In the course of teaching, I found that students were always happy to modify the desktop properties in each lesson, and the size of the desktop was different for each student. In this way, broadcasting software was not uniform, which made teaching difficult. The specific operation is: start -- run -- enter Regedit to open the registry:
Disable the "display" setting of the Control Panel
HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System Create a New DWORD Value "NoDispCPL" in the window on the right and set the value to "1 ".
You can.
(5) Copying data to a location that is hard to find, for example, C: \ Windows \ System32.
Introduction to the polar restoration software:
The polar restoration system uses the latest dynamic restoration technology. Without restarting the operating system, you can perform operations such as restoring, transferring, protecting status conversion, and opening and writing devices dynamically. After data is written from a writable device, the data can be dynamically restored to the status after the data is written, achieving "penetration Update" in the true sense ".
Software Interface:
650) this. width = 650; "title =" clip_image001 "style =" border-right: 0px; border-top: 0px; border-left: 0px; border-bottom: 0px "height =" 286 "alt =" clip_image001 "hspace =" 12 "src =" http://www.bkjia.com/uploads/allimg/131227/0T6021939-0.jpg "668" border = "0"/>
5) install the student token to copy the file "40 .exe" green software of 40 k size) to Area D, create a shortcut to the desktop, and set it to hidden so that students can run it, but it is not easy to accidentally delete it.
Software introduction:
The data center is usually used in several classes or even several grades. The exercises that cannot be completed in one lesson are often deleted by the students in the next lesson, it causes great inconvenience to teaching. The student disk software effectively solves this problem. With this software, each student can set a password to open a disk with the drive letter M. The software distinguishes the students according to the password and enters its own password to display its saved content. After the computer is restarted, the M Disk automatically disappears, effectively protecting the students' files. Students enter their own passwords to open the previously saved content and continue the exercise.
This software provides the administrator login function. After the Administrator logs in, he can view each student disk to effectively manage student files. The initial password is admin888. Enter the password and click Generate m Disk to enter the administrator interface. You can change the management password.
The student content of this software is hidden in drive D. Do not format drive D.
Software Interface:
650) this. width = 650; "title =" clip_image002 "style =" border-right: 0px; border-top: 0px; border-left: 0px; border-bottom: 0px "height =" 248 "alt =" clip_image002 "hspace =" 12 "src =" http://www.bkjia.com/uploads/allimg/131227/0T602F13-1.jpg "655" border = "0"/>
6) install the electronic classroom client. There are many broadcast systems in the electronic classroom, which are similar to each other, but most of them share the same thing: the client has several installation methods, in this case, I especially recommend that the data center administrators select the "secret mode". In this case, the students do not know what software is used by the instructors to control the password, which is not easy to crack, if an icon is displayed on the student side, it will be able to crack it and you will not be able to control it. I use the NetOp School classroom as the broadcast system. Installing the NetOp School client is simple. By default, It is enough. If you have multiple data centers and are in the same IP segment, you only need to create different classes.
7) install MACList. This is a software that can automatically modify IP addresses, computer names, and working groups. The workflow of this software is:
1. First enable the DHCP service on the server, such as using the DHCP function of 2003 or TFTPD32.
2. Start the client one by one in order to facilitate standardized computer names ).
3. Export DHCP records on the server.
4. Use MACList. EXE to process DHCP records and generate the MAC. INI file.
5. Package the ModiIP.exe and MAC. INI files into the client Ghost image. Or only package ModiIP.exe,
Place MAC. INI on the TFTP server, which is obtained by ModiIP.exe from the network.
6. After the network is cloned, the client calls ModiIP.exe at startup to modify the IP address, computer name, and other information.
Do you still remember what we did in the first step? The list of IP addresses collected from the DHCP server.
List of IP addresses exported by the DHCP server:
650) this. width = 650; "title =" clip_image003 "style =" border-right: 0px; border-top: 0px; border-left: 0px; border-bottom: 0px "height =" 235 "alt =" clip_image003 "hspace =" 12 "src =" http://www.bkjia.com/uploads/allimg/131227/0T6024942-2.jpg "648" border = "0"/> custom IP, computer name, Workgroup:
650) this. width = 650; "title =" clip_image005 "style =" border-right: 0px; border-top: 0px; border-left: 0px; border-bottom: 0px "height =" 416 "alt =" clip_image005 "hspace =" 12 "src =" http://www.bkjia.com/uploads/allimg/131227/0T602A21-3.jpg "504" border = "0"/>
Generate and modify the MAC. ini file:
After you click "Save and quit", the MAC. ini file is generated. The content is as follows:
[Config]
Gateway = 192.168.0.1
Gwmetric = 0
Mask = 255.255.255.0
WorkGroup = student
[List]
50784C4951F4 = 192.168.0.1, s001
50784C495042 = 192.168.0.2, s002
50784C495761 = 192.168.0.3, s003
50784C495A0F = 192.168.0.4, s004
50784C495A28 = 192.168.0.5, s005
50784C495CEE = 192.168.0.6, s006
50784C495106 = 192.168.0.7, s007
......
In particular, we need to add the MAC address of the computer where the DHCP server did not collect the IP address here.
Copy the modiip.exe and mac. ini files to the c: \ Windows directory. Run modiip.exe
650) this. width = 650; "title =" clip_image007 "style =" border-right: 0px; border-top: 0px; border-left: 0px; border-bottom: 0px "height =" 447 "alt =" clip_image007 "hspace =" 12 "src =" http://www.bkjia.com/uploads/allimg/131227/0T6022Q7-4.jpg "477" border = "0"/>
Click "add to startup Item ".
So far, all software has been installed.
1. network applications.
1) if a hard disk protection card, such as a LAN card, is installed in the IDC, you can copy it over the network, select all parameters and hard disk partitions, use the local machine as the transmitting station, and use other machines as the receiving station, network copy can be completed in 40 minutes. However, many schools do not have such conditions, and the IDC does not have LAN cards or other things installed. Use the following method.
2) Ghost Network cloning:
1. Create a Network clone image: mount the system disk to the Network clone server.
Note that the system disk must be set to a slave disk, and the Network clone program must be installed on the master disk of the Network clone server. There must be enough disk space on the hard disk of the Network clone server to create a cloned image file.
2. attach another hard Disk To your host. Then restart To DOS mode, start GHOST, and select "Local → Disk → To Image ".
650) this. width = 650; "title =" clip_image009 "style =" border-right: 0px; border-top: 0px; border-left: 0px; border-bottom: 0px "height =" 239 "alt =" clip_image009 "hspace =" 12 "src =" http://www.bkjia.com/uploads/allimg/131227/0T6025627-5.jpg "478" border = "0"/>
Prepare image files, such as Student. gho.
3. Create a GHOST server: Start WINDOWS to open the GHOSTSRV. EXE file. The file can be found in HOST Enterprise Edition.
Give the server a name. My name is Student, select clone client, select the image file we just backed up to another hard disk, and click accept customer's button.
650) this. width = 650; "title =" clip_image011 "style =" border-right: 0px; border-top: 0px; border-left: 0px; border-bottom: 0px "height =" 267 "alt =" clip_image011 "src =" http://www.bkjia.com/uploads/allimg/131227/0T60251H-6.jpg "" 494 "border =" 0 "/>
4. Set the client: Start ghost.exe on the client, and select the following:
650) this. width = 650; "title =" clip_image013 "style =" border-right: 0px; border-top: 0px; border-left: 0px; border-bottom: 0px "height =" 278 "alt =" clip_image013 "src =" http://www.bkjia.com/uploads/allimg/131227/0T6024452-7.jpg "" 488 "border =" 0 "/>
In this case, the system will ask you about the server name. Enter your server name (Student here) and press Enter.
The following figure is displayed:
650) this. width = 650; "title =" clip_image015 "style =" border-right: 0px; border-top: 0px; border-left: 0px; border-bottom: 0px "height =" 290 "alt =" clip_image015 "src =" http://www.bkjia.com/uploads/allimg/131227/0T60242U-8.jpg "" 480 "border =" 0 "/>
Now our client is in the receiving status.
At this time, we will see the following status on the server:
650) this. width = 650; "title =" clip_image016 "style =" border-right: 0px; border-top: 0px; border-left: 0px; border-bottom: 0px "height =" 120 "alt =" clip_image016 "src =" http://www.bkjia.com/uploads/allimg/131227/0T602I03-9.jpg "" 467 "border =" 0 "/>
After connecting all the clients, you can choose to start transmission for network cloning.
Note:
1) Ghost Network cloning mainly involves client settings. If the connection fails or the server cannot find the client, check the client's configuration first.
2) When setting the client Nic, you must specify an interrupt to the NIC. The NIC must be installed with the DOS driver on the client.
3) If it is convenient, you can use the server version of the operating system as a DHCP (Dynamic IP Address Allocation) server, and then do not need to configure the IP address of one machine or one machine, you only need to perform a batch processing, and then add the-rb parameter (restart automatically after completion)
However, we would like to remind you that the number of GHOST machines on the network should not exceed 50. if something goes wrong, you are in trouble. if a machine is disconnected, shut down the machine and wait for it. After about five minutes, it is recorded as timeout. GHOST will continue to run. in addition, some Nic drivers will lock the keyboard after execution. create a batch file by yourself.
3. Reinforce the system. Hard Disk protection is required for all student computers.
Run the electronic classroom on the instructor's machine. Generally, the electronic classroom has the option of running programs on the controlled terminal. Select all the student's machines and run the hard disk protection program to restore them quickly ).
Quick installation: because we have copied the extreme speed recovery program setup.exe to C: \ Windows \ System32, if you want to install the driver, set the password to 123, and restore and protect the C drive.
Run C: \ Windows \ System32 \ setup.exe/install/password: 123/protect: C
If you need to install the driver and set startup protection, add/check
Run C: \ Windows \ System32 \ setup.exe/install/check/password: 123/protect: C
650) this. width = 650; "title =" clip_image018 "style =" border-right: 0px; border-top: 0px; border-left: 0px; border-bottom: 0px "height =" 409 "alt =" clip_image018 "src =" http://www.bkjia.com/uploads/allimg/131227/0T6023130-10.jpg "" 559 "border =" 0 "/>
In this way, all the student machines will automatically restart in a few seconds to complete hard disk protection.
If you want to temporarily install a software in your IDC or take a computer examination and cancel hard disk protection, we will run the quick uninstallation program on the instructor's computer's classroom instructor side:
If the restored password is 123, uninstall the driver.
Run C: \ Windows \ System32 \ setup.exe/uninstall/password: 123
Similarly, in a few seconds, all student computers will automatically restart and disable hard disk protection.
I have two student data centers and 100 student computers. I take information courses in 18 classes in three grades and receive the accounting computerization examination in Beijing every year. I deploy the system using the above methods, it has been running normally for more than two years. During this period, except for occasional hardware damage and replacement, the software never experienced problems. To do our jobs well, we must first sharpen our tools. Only by maintaining our educational network environment can we better serve our education and teaching work, provide our teachers and students with a pure sky, and let them fly freely.