Skip to main content

The Application of Norton Ghost Multicast Technology in the Maintenance of College Computer Room

  • Conference paper
  • 1545 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 226))

Abstract

Computer system maintenance is an important component in network room management. For the complexity and different hardware configuration of University computer room, the Norton Ghost Multicast technology is used to implement the different methods and techniques under different hardware environments in this paper. especially the specific implementation steps for the establishment and running of other important links are given, and the advantages and disadvantages of each method and applicable environment are analyzed and compared, providing some convenient ways for fully tapping the potential of existing hardware resources and effectively solving some problems for the difficult system maintenance of college network computer room, in practice, it achieved good results.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, T.: The Application of DHCP + GHOST for Fast Implementing Computer Room Maintenance based on PXE. Experiment Science and Technology (2) (2006)

    Google Scholar 

  2. Li, W.: The Security and Management of Computer Network. Tsinghua University Press, Beijing (2004)

    Google Scholar 

  3. Qi, D.: Network and Information Resources Management, pp. 368–375. Beijing Hope Electronic Press, Beijing (2005)

    Google Scholar 

  4. Lin, G., Xiang, J.: The Application of Network Cloning Technology in the Computer Room Management. Computer Knowledge and Technology 8(5), 47–53 (2006)

    Google Scholar 

  5. Li, W.: The Detailed Parameters of Ghost and Its Application. Heilongjiang Meteorology (2), 35–35 (2005)

    Google Scholar 

  6. Peng, P.: The Fast Recovery System of LAN based on GHOST. Journal of Jianghan Petroleum University of Staff and Workers (11), 94–96 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jinhui, L., Hongwei, Y., Yong, Z., Ke, Z. (2011). The Application of Norton Ghost Multicast Technology in the Maintenance of College Computer Room. In: Zhang, J. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 226. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23235-0_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23235-0_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23234-3

  • Online ISBN: 978-3-642-23235-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics