ITE7 - Chp10 - Windows Installation
ITE7 - Chp10 - Windows Installation
ITE7 - Chp10 - Windows Installation
Installation
IT Essentials v7.0
Chapter 10 - Sections & Objectives
10.1 Modern Operating Systems
• Explain operating system requirements.
• Describe the functions of operating systems.
• Describe operating system software and hardware requirements.
• Explain the process of upgrading an operating system.
10.2 Disk Management
• Create a partition in Windows using the Disk Management utility.
• Explain disk management.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Chapter 10 - Sections & Objectives (Cont.)
10.3 Install Windows
• Install a Windows operating system.
• Install a Windows operating system.
• Describe custom installation options.
• Describe the boot sequence and registry files.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
10.1 Modern Operating
Systems
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Operating System Features
Terms
The following terms are often used when describing an operating system (OS):
• Multi-user - Two or more users have individual accounts that allow them to work with programs
and peripheral devices at the same time.
• Multitasking - The computer is capable of operating multiple applications at the same time.
• Multiprocessing - The operating system can support two or more CPUs.
• Multithreading - A program can be broken into smaller parts that are loaded as needed by the
operating system. Multithreading allows different parts of a program to be run at the same time.
The OS boots the computer and manages the file system. Operating systems can support more than
one user, task, or CPU.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Operating System Features
Basic Functions of an Operating System
• The OS manages the interaction between the applications and the hardware.
• The OS creates a file structure on the hard disk drive to store data.
• The OS enables the user to interact with the software and hardware.
• The OS locates and application and loads it into the RAM of the computer.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Operating System Features
Windows Operating Systems
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Customer Requirements for an Operating System
Compatible System Software and Hardware Requirements
To make an OS recommendation, a technician must review budget constraints, learn how the computer
will be used, determine which types of applications will be installed, and whether a new computer may be
purchased. These are some guidelines to help determine the best OS for a customer:
• Does the customer use off-the-shelf applications for this computer? Off-the-shelf applications
specify a list of compatible operating systems on the application package.
• Does the customer use customized applications that were programmed specifically for the
customer? If the customer is using a customized application, the programmer of that application
specifies which OS to use.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Customer Requirements for an Operating System
Minimum Hardware Requirements and Compatibility with OS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Customer Requirements for an Operating System
32-bit vs. 64-bit Processor Architecture
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Operating System Upgrades
Checking OS Compatibility
• An OS must be upgraded periodically to remain
compatible with the latest hardware and
software.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Operating System Upgrades
Windows OS Upgrades
• The version of an OS determines available
upgrade options. For example, a 32-bit OS
cannot be upgraded to a 64-bit OS. Windows
7 and Windows 8 can be upgraded to
Windows 10 but Windows Vista and Windows
XP cannot.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
10.2 Install Windows
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Disk Management
Storage Device Types
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Disk Management
Hard Drive Partitioning
Finding and launching the operating system is one of the responsibilities of computer firmware, which needs
to know the partition scheme. Two partition scheme standards are master boot record (MBR) and globally
unique identifier (GUID) partition table (GPT).
• Master Boot Record - The MBR contains information on how the hard drive partitions are organized. The
MBR is 512 bytes long and contains the boot loader, an executable program that allows a user to choose
from multiple operating systems. MBR is commonly used in computers with BIOS-based firmware.
• GUID Partition Table - Also designed as a partition table scheme standard for hard drives, the GPT
makes use of a number of modern techniques to expand on the older MBR partitioning scheme. GPT is
commonly used in computers with UEFI firmware.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Disk Management
Partitions and Logical Drives
• The primary partition contains the OS files and is usually the first partition.
• On MBR disks, the active partition is used to store and boot an OS.
• If more than 4 partitions are needed on an MBR disk, one partition can be designated an extended
partition.
• A logical drive is a section of an extended partition, used to separate information for administrative
purposes.
• A basic disk (the default) contains partitions such as primary and extended, as well as logical drives which
are formatted for data storage.
• A dynamic disk can create volumes that span across more than one disk.
• Formatting creates a file system on a partition for file storage.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Disk Management
File Systems
File systems differ in properties of speed, flexibility, security, size and more. Here are five common file
systems:
• File Allocation Table, 32 bit (FAT32) - Supports partition sizes up to 2 TB or 2,048 GB. Used by
Windows XP and earlier OS versions.
• New Technology File System (NTFS) - Supports partition sizes up to 16 exabytes, in theory. NTFS
incorporates file system security features and extended attributes.
• exFAT (FAT 64) - Created to address some of the limitations of FAT, FAT32, and NTFS when
formatting USB flash drives, such as file size and directory size. One of the primary advantages of
exFAT is that it can support files larger than 4GB.
• Compact Disc File System (CDFS) - Created specifically for optical disk media.
• NFS (Network File System) - NFS is a network-based file system, that allows file access over the
network. NFS is an open standard which allows anyone to implement it.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
10.3 Installation and Boot
Sequence
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Basic Windows Installation
Account Creation
Authentication is when users enter a username
and password to access a user account. Windows
uses Single-Sign On (SSO) authentication, which
allows users to log in once to access all system
resources. User accounts allow multiple users to
share a single computer using their own files and
settings.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Basic Windows Installation
Finalize the Installation
Windows Update
To update the OS after the initial
installation, Microsoft Windows Update is
used to scan for new software and install
service packs and patches.
Device Manager
After installation, verify that all hardware is
installed correctly. The Device Manager is
used to locate device problems and install
the correct or updated drivers in Windows.
The figure shows the Windows Update
and Device Manager utilities on Windows
10.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Custom Installation Options
Disk Cloning
Installing an OS on multiple computers takes time. To
simplify, administrators usually elect a computer to act as a
base system and go through the regular operating system
installation process. After the OS is installed in the base
computer, a specific program is used to duplicate all the
information on its disk, sector by sector, to another disk.
This new disk, usually an external device, now contains a
fully deployed operating system and can be used to quickly
deploy a fresh copy of the base operating system and any
installed applications and data.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Custom Installation Options
Other Installation Methods
Windows has several different types of custom
installations:
• Network Installation – This includes Preboot
Execution Environment (PXE) Installation,
Unattended Installation, and Remote
Installation.
• Image-based Internal partition Installation -
This is a Windows image stored on an internal
(often hidden) partition that can be used to
restore Windows to its original state when it
was shipped from the factory.
• Other Types of Custom Installations – This
includes Windows Advanced Startup Options,
Refresh your PC (Windows 8.x only), System
Restore, Upgrade, Repair installation, Remote
network installation, Recovery partition, and
Refresh/restore.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Custom Installation Options
Remote Network Installation
With remote network installation, the OS
installation files are stored on a server. The
client computer can access the files
remotely. A software package such as
Remote Installation Services (RIS)
communicates with the client, stores the
setup files, and provides the necessary
instructions for the client to access the
setup files, download them, and begin the
OS installation.
Because the client computer does not have
an OS installed, a special environment must
be used to boot the computer, connect to
the network, and communicate with the
server to begin the installation process. This
special environment is known as the
Preboot eXecution Environment (PXE).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Custom Installation Options
Unattended Network Installation
To perform a Windows Unattended installation,
setup.exe must be run with the user options found in
the answer file. Instead of prompting the user, Setup
uses the answers listed in the file.
To customize a standard Windows 10 installation, use
the System Image Manager (SIM), to create the setup
answer file. The answer file is copied to the
distribution shared folder on a server. At this point,
you can do one of two things:
• Run the unattended.bat file on the client machine
to prepare the hard drive and install the OS from
the server over the network.
• Create a boot disk that boots the computer and
connects to the distribution shared folder on the
server. You then run a batch file containing a set of
instructions to install the OS over the network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Custom Installation Options
Recovery Partition
Some Windows computers contain a
section of the disk that is inaccessible to
the user. This partition, called a recovery
partition, contains an image that can be
used to restore the computer to its
original configuration.
The recovery partition is often hidden to
prevent it from being used for anything
other than restoration. To restore the
computer using the recovery partition,
you often must use a special key or key
combination when the computer is
starting. Sometimes, the option to restore
from the factory recovery partition is
located in the BIOS or found in Windows.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Custom Installation Options
Upgrade Methods
• In-place upgrade - This will update the OS and
migrate apps and settings to the new OS. The
System Center Configuration Manager
(Configuration Manager) task sequence can be
used to completely automate the process.
When upgrading Windows 7 or Windows 8 to
Windows 10, the Windows installation program
(Setup.exe) will perform an in-place upgrade,
which automatically preserves all data, settings,
applications, and drivers from the existing OS
version.
• Clean install - Another way to upgrade to a
newer version of Windows is to perform a clean
upgrade. Because a clean install will wipe the
drive completely, all files and data should be
saved to some form of backup drive.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Windows Boot Sequence
Windows Boot Sequence
After POST, the BIOS locates and reads the
configuration settings stored in the CMOS
memory. The boot device priority is the order in
which devices are checked to locate the bootable
partition. The BIOS boots the computer using the
first drive that contains a valid boot sector. This
sector contains the Master Boot Record (MBR).
The MBR identifies the Volume Boot Record
(VBR) which loads the boot manager, which for
Windows is bootmgr.exe.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Windows Boot Sequence
Windows 7 Startup Modes
Pressing the F8 key during the boot process
opens the Windows Advanced Boot Options
menu. Users can select how to boot Windows. 4
startup options:
• Safe Mode – A diagnostic mode used to
troubleshoot Windows and Windows startup.
Functionality is limited as many device
drivers are not loaded.
• Safe Mode with Networking - Starts
Windows in Safe Mode with networking
support.
• Safe Mode with Command Prompt - Starts
Windows and loads the command prompt
instead of the GUI.
• Last Known Good Configuration - Loads
the configuration settings that were used the
last time that Windows started successfully.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Windows Boot Sequence
Windows 8 and 10 Startup Modes
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30