当前位置:网站首页>PXE introduction and use
PXE introduction and use
2022-06-24 05:18:00 【Silent cultivator】
One 、 preface
Blackstone 2.0 Preparing clean computing resources for customers 、 In scenarios such as collecting and checking machine hardware information, you need to install one on the physical machine os, And cannot pass through the disk 、U disc 、CDROM Etc , So we can only adopt network boot installation minios, So write this article to describe PXE.
Two 、 What is? PXE
PXE(Pre-boot Execution Environment, Pre boot execution environment ) By Intel The latest technology developed by the company , Work in Client/Server Network mode of , Support workstation to download image from remote server through network , And from this support through the network to start the operating system , In the startup process , The terminal requires the server to assign IP Address , Reuse TFTP(trivial file transfer protocol) or MTFTP(multicast trivial file transfer protocol) The protocol downloads a boot package to the local memory for execution , The basic software settings of the terminal are completed by this startup software package , So as to boot the terminal operating system installed in the server in advance .
Strictly speaking ,PXE It's not an installation , It's a way of guiding . Conduct PXE A prerequisite for installation is to include a PXE Supported network cards (NIC), That is, there must be PXE Client.PXE The protocol enables the computer to start over the network . This agreement is divided into Client End sum Server End , and PXE Client On the network card ROM in . When the computer boots ,BIOS hold PXE Client Call into memory to execute , Then from PXE Client Download the files placed at the remote end to run locally through the network . function PXE The protocol needs to be set DHCP The server and TFTP The server .DHCP The server will give PXE Client( The host on which the system will be installed ) Allocate one IP Address , Because it's for PXE Client Distribute IP Address , So in configuration DHCP You need to add the corresponding PXE Set up . Besides , stay PXE Client Of ROM in , It already exists TFTP Client, Then it can go through TFTP The agreement reached TFTP Server Download the required files .
3、 ... and 、PXE Principle
1. bios load pxe rom after ,rom Medium pxe client First initiate dhcp request , The smart card acts as pxe server, In the verification message mac After the address is correct , return ip、tftp Server address 、 Boot file name
2. pxe client Immediately launch tftp request , Get the boot file , Such as pxelinux.0
3. Execute... In memory pxelinux.0, Specify the next step to request pxelinux.cfg
4. tftp Request and parse pxelinux.cfg, Get kernel and root file information , Respectively vmlinuz and initramfs, There are versions to distinguish
5. tftp Request kernel and root files , Boot in memory
Four 、PXE Who will do it
BIOS Set the boot entry for the next boot to take effect as Legacy perhaps Uefi Then restart the machine , Network cards provide different types of pxe rom,BIOS Of pxe The driver will load the corresponding pxe rom, And then to achieve PXE The process of .
5、 ... and 、 utilize PXE and KickStart Realize unattended installation of operating system
May refer to https://www.cnblogs.com/mchina/p/centos-pxe-kickstart-auto-install-os.html From master attempt
边栏推荐
- System design: Agent & redundancy & replication
- [competition experience sharing] [Tencent internal track rank6] goose Rose Square half hand (TAS) experience
- Three methods of local storage
- [jest] summary of the use of automated test jest
- Where does the website domain name buy a normal domain name? What is the approximate price
- Webmeng: create a website you are proud of
- CLB health check principle and abnormal troubleshooting
- Redis pipeline technology speed and efficiency increased by 5 times
- [Tencent cloud] new enterprise users go to the cloud & the latest discount 2022!
- How to clone virtual machines on vspere client
猜你喜欢

CTF learning notes 17:iwesec file upload vulnerability-02 file name filtering bypass

014_ TimePicker time selector

What are the disadvantages of the free IP address replacement tool?

Intensive learning and application of "glory of the king" to complete the application of 7 real worlds other than human players

Leetcode (question 1) - sum of two numbers

011_ Cascader cascade selector

Analysis on the subjective enthusiasm of post-90s makers' Education

CTF learning notes 18:iwesec file upload vulnerability-03-content-type filtering bypass

Hard core observation 553 AI needs to identify almost everyone in the world with hundreds of billions of photos

Analyzing the superiority of humanoid robot in the post human era
随机推荐
What is the secondary domain name of the website? What is the relationship between the secondary domain name and the primary domain name?
Three methods of local storage
Use of go testing framework gomock
How the query address of cloud native monitoring data exposes the public network
Share 10 creative projects of Gaoxing!
Develop a customized music player from scratch, and your girlfriend will have it?
How to check the Chinese domain name of the website and through what channels?
PTA 1056 sum of combinations (15 points)
What is cloud server? How to access the ECS Homepage
How to apply for domain name space? Will it be difficult to apply for domain name space?
3 minutes to understand JSON schema
What is the use of domain name cloud resolution? What are the factors for domain name errors
Blackmail virus prevention guide
How should a new data center be built?
How can the website be broken by CC attack?
[competition experience sharing] a problem-solving summary of the whole DFS (internal track)
Analysis of PHP environment configuration
Functional advantages of industrial wireless router
What is the difference between a traditional data center and a cloud computing data center?
PHP ksort() function