Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Linux+ Certification Bible.pdf
Скачиваний:
46
Добавлен:
15.03.2015
Размер:
3.78 Mб
Скачать

142 Part II Installation

distributions will compile the kernel so that it is actively able to boot the system. Then the shell script proceeds by creating a bootable diskette, which is advisable because you can use this diskette to boot the system in case of emergencies, such as boot failures, system crashes, and even to repair a damaged system. After the boot diskette has been created, the system then configures a modem or other device to be used for remote login or dial-in or dial-out. This is a potentially complicated task, because you must know the port that the modem or other device is using, such as COM1 or COM2. Finally, you may be presented with some other customization choices, such as font selection, but the next major menu is the installation of LILO, or LInux LOader, which prompts you to install the bootstrap.

The character sequence of “LILO” informs you of the success or failure of the boot process. The first “L” indicates that the primary boot loader has been started. “I” appears as soon as the secondary boot loader has been loaded. The second “L” appears when the secondary boot loader signals that it has been loaded. If any problems have occurred, a two-digit hex error code appears, which is documented in LILO’s manual. If no problems occur, the “O” displays along with the boot prompt.

The next configuration is for the LILO text console, which displays the messages that were created during the boot process. Your next selection is to choose the location for the LILO installation. Select this location according to your preinstallation plan. After LILO is installed, your next step is to manually configure the network, which usually requires the predetermined network configuration, including a static IP address or the use of DHCP (Dynamic Host Configuration Protocol).

See Chapter 4 for more information about configuring networking.

After networking has been completed, you are prompted to complete the configuration of the mouse, the time zone, and the X Window System. After you have completed these tasks, the system is ready to be rebooted.

Network installations of Linux

2.2 Describe the different types of Linux installation interaction and determine which to use for a given situation (e.g., GUI, text, network)

2.8 Select appropriate networking configuration and protocols (e.g., modems, Ethernet, Token-Ring)

If you have a closed network environment, a LAN with no outside connection, or a LAN with an extremely secure firewall, you may want to choose to allow the network to install Linux for you. If you do choose the installation of Linux by NFS (Network File System) or another network method, you are required to use a supported network interface card (NIC). Therefore, when starting an installation via NFS or other network method, remember to perform the following tasks:

Chapter 5 Advanced Installation 143

Verify that the network card is supported.

Select the driver that supports your network card. In most cases, you are offered the opportunity to supply additional parameters to assist the Linux kernel in communicating with your card.

Configure the networking protocol to access the server. In most cases, the networking protocol is TCP/IP and NFS. For a TCP/IP installation via NFS, the required parameters will most likely be those listed in Table 5-1.

Table 5-1

Configuration for Network Installation

Configuration

Configuration

Reason for Information

Needed

Data (examples)

 

 

 

 

IP Address

192.168.0.100

IP address for stations to access the network

 

 

 

Netmask *

255.255.255.0

Used to determine the size of the network

 

 

 

Network Address

192.168.0.0

Used to determine the network address

 

 

 

Broadcast Address

192.168.0.255

Where broadcasts are made

 

 

 

NFS Server Name

Linux_nfs

What server to request files from

 

 

 

File Directory

/mnt/cdrom

Where the server keeps the files necessary for

 

 

installation

 

 

 

Domain Name

Fully Qualified

The name of the network in use

 

Domain Name

 

 

(FQDN)

 

 

 

 

Host Name

Linux_workstation

The rest of the FQDN for the workstation

 

 

 

Gateway

192.168.0.1

Not used, unless the server is not on the local

 

 

network

Name Server

192.168.0.250

Where to convert the NFS Server Name to IP

 

 

address

 

 

 

* Often called sub-netmask

Most often, information from this table is all that you will need. After this has been put into the Linux installation program, it connects to the NFS server (or another server being used) and begins the installation of the files. This installation method is often started with a diskette and can therefore be run on several machines at once. After the network configuration is complete, differences are essentially indistinguishable between a network installation and a CD-ROM-based installation. The network installation does have a few drawbacks — consisting mostly of security issues and NIC driver availability — but is an excellent way to install Linux on many machines simultaneously at one or many locations.

Соседние файлы в предмете Операционные системы