Raid and Its Associate
Raid and Its Associate
Raid and Its Associate
RAID Levels
Level Name
0 Striping
1 Mirroring
2 Parallel Access with Specialized Disks
3 Synchronous Access with Dedicated Parity Disk
4 Independent Access with Dedicated Parity Disk
5 Independent Access with Distributed Parity
6 Independent Access with Double Parity
What is striping?
Striping is the automated process of writing data across multiple drives
simulteneously. Striping is used to increase the performance of disk reads.
When using striping, if you write a 5GB file across 5 drives, 1GB of data is
written to each drive. Parallel reading of data from multiple disks can have a
significant positive impact on performance, because the physical disk drive
is most often the performance bottleneck.
Striping is used in RAID Level 0.
1
If one drive in a striped set fails, all of the data in the stripe set is lost. The
data must be restored from backup. Because of this, striping is often
combined with the use of parity (RAID 5) or mirroring (RAID 0+1).
What is mirroring?
Mirroring is the automated process of writing data to two drives
simulteneously. Mirroring is used to provide redundancy.
If one drive fails, the redundant drive will continue to store the data and
provide access to it. The failed drive can then be replaced and the drive set
can be re-mirrored.
Mirroring is used in RAID Level 1.
2
Hot Swappable Hardware
What is ATA?
ATA (AT Attachment) is the primary standard for connecting storage to PC's.
ATA replaced earlier technologies such as MFM, RLL, and ESDI. ATA
currently competes with SCSI.
ATA is a specification for attaching hard drives to the AT bus. The AT
specification has been extended to include other storage, such as CD/DVD
drives, tape drives, and Zip drives with the Advanced Technology
Attachment Packet Interface (ATAPI) additions to the specification.
ATA is also known as IDE (Integrated Drive Electronics).
3
Parallel ATA Cables
Each ATA bus supports two storage devices. The first storage device is
called the Master and the second storage device is termed the Slave.
There are two methods for configuring which device is the master and which
is the slave: drive jumpers and cable select.
Drive Jumpers
The original method for configuring Master and Slave
relationships on ATA drives was to place or remove jumpers on
each storage device.
The jumper definitions differ among drive manufacturers and
models. The jumper setting are often printed on the drive. If
not, read the drive manual or visit the drive manufacturers web
page.
In a single drive configuration, some drives should be set to
"Single Drive", while other drives should be set to "Master".
In a dual drive configuration, one drive should be set to Master
and the other drive should be set to Slave.
Cable Select
4
A newer standard for configuring Master/Slave relationships on
ATA drives is to allow the position of the drives on the drive
cable to determine the ordering.
For Cable Select to work, both of the drives and the ATA cable
must support cable select.
To use Cable Select, the jumpers on both drives should be set
to Cable Select.
All versions of ATA up until ATA-7 in 2004 utilized parallel transfer of data
from the motherboard to the drive controller built onto the disk.
The ATA-7 specification introduced Serial ATA.
The most obvious change with Serial ATA is the difference in drive cables.
Other differences include:
• Higher throughput
• Revised power connector
• Longer data cables
• Support for external drives (eSata)
What is ATAPI?
ATAPI stands for AT Attachment Packet Interface.
ATAPI is a set of extensions to the ATA standards to allow ATA CD/DVD
drives and tape drives.
5
The ATAPI standard was originally defined by the Small Form Factor
committee. Maintenance of the ATAPI standard was later transferred to the
T13 Technical Committee, the group that defines the ATA standard. The
ATAPI standard ceased to exist as a separate document when it became
part of the core ATA standard with the publication of ATA-4 in 1998.
ATAPI Drivers
Microsoft Windows and most PC-based Unixes provide a generic driver for all
ATAPI based CD-ROM devices.
Because of this, you do not need to download and install an ATAPI driver if
you are using one of those operating systems.
Early ATAPI CD-ROM drives required specialized drivers for use under DOS.
If you are running DOS, visit the web page of the company which
manufactured your CD-ROM drive to try to find an ATAPI driver.
The original Serial ATA standard offered miniminal improvement over the
existing 133MBps bandwidth of the existing Parallel ATA standard.
Serial ATA standards are constantly evolving to meet higher bandwidth
requirements.
Serial ATA Type Bandwith Bus Speed Signal Rate
SATA-150 150MBps 1500MHz 1.5Gbps
SATA-300 300MBps 3000MHz 3.0Gbps
SATA-600 600MBps 6000MHz 6.0Gbps
6
Higher bandwidth requirements were pushing requirements for shorter
Parallel ATA data cables. Serial ATA reversed this trend by allowing data
cables up to 1 meter in length.
eSATA (External SATA) allows the use of shielded cables up to 2 meters in
length for external drives.
The serial ATA power cable uses a 15-pin wafer connector to provide 3.3, 5,
or 12 volts to ATA devices.
The serial ATA power cable uses a 15-pin wafer connector to provide 3.3, 5,
or 12 volts to ATA devices.
7
What is eSATA?
eSATA is an extension to Serial ATA standards to enable SATA drives to be
attached externally.
Before eSATA, external hard drives were connected via USB or FireWire.
eSATA can provide data transfer rates significantly faster than USB or
FireWire.
eSATA 1.5 offers data rates up to 150MBps. eSATA 3G doubles that to
300MBps.
eSATA cables can be up to 2 meters (approximately 6 feet) in length.
eSATA drives are hot-pluggable, meaning that you can attach or remove an
eSATA hard drive from a system without powering down the system or the
drive.
What is SCSI?
8
SCSI (Small Computer System Interface) is a set of ANSI standards for
connecting devices to computer systems. The vast majority of SCSI devices
are data storage devices.
Standard SCSI is a parallel technology, but many serial SCSI variants exist,
including FireWire and Fibre Channel.
SCSI is generally considered a higher-end alternative to IDE (Integrated
Drive Electronics). A single IDE controller can control two drives. A single
SCI controller can control 8 or 16 drives. In addition, SCSI usually offers
greater cable length and higher length than IDE.
SCSI Standards
Many SCSI standards have options for Narrow or Wide operation. Narrow
SCSI is parallel SCSI which transmits 8 bits of data at a time. Wide SCSI is
parallel SCI which transmits 16 bits of data at a time.
What is iSCSI?
iSCSI stands for internet SCSI, or internet Small Computer Systems
Interface.
iSCSI is the transmission of SCSI commands and data over IP networks.
9
When an application attempts to read from an iSCSI device, the SCSI read
command is encapsulated inside an IP packet. The IP packet is then routed
just like any other IP packet on the network. When the IP packet reaches its
destination, the encapsulation is stripped off and the SCSI read command is
interpreted by the iSCSI drive.
SCSI write commands are handled in the same manner.
Alternatives to iSCSI
External hard drives can be connected using several popular interfaces. One
external hard drive may support two or more of these interfaces.
FireWire
FireWire, almost known as IEEE 1394, is a popular interface for Macintosh
external hard drives, and became somewhat popular on PC's before USB 2.0
was standardized.
USB
USB (Universal Serial Bus) is a standard for connecting a wide range of
devices, including external hard drives, PDA's, and Sony PlayStations.
USB 1.x was not fast enough to satisfy most users of external hard drives.
USB 2.0 provides slightly better performance than FireWire in most
applications.
eSATA
eSATA is the newest standard for external hard drives.
eSATA is an extension of the Serial ATA standard which allows the use of
external hard drives.
An external hard drive using an eSATA connection will not suffer a
performance penalty imposed by encapsulating the ATA data inside the USB
or FireWire protocols, because the eSATA external hard drive uses the same
communications protocol as the internal hard drives.
10
Ethernet
A few external hard drives offer Ethernet connections.
These drives include intelligent electronics to enable them to act like file
servers.
These external hard drives are actually low-end network attached storage
devices.
What is LBA?
LBA is Logical Block Addressing.
Early PC hard drives were supported by the PC BIOS using
Cylinder/Head/Sector addressing.
To read or write from a specific sector on the disk, you specified the sector
in terms of its cylinder number, its head number, and its sector number.
LBA adressing uses just one number. In LBA addressing, the first sector on
the disk is sector zero and all sectors on the disk are simply incremented
from there.
The normal job of the MBR program is to search the partition table for the
active partition, copy the boot sector from the active partition into memory,
and transfer control over to that program.
If the MBR cannot accomplish this task successfully, it will print one of these
error messages:
11
FDISK /MBR
Under DOS and early versions of Microsoft Windows, it was possible to use
the `FDISK /MBR` command to repair the MBR.
Unfortunately, FDISK was not terribly intelligent about the repair and this
option would often cause more damage than it fixed. FDISK has been
removed Windows XP.
FIXMBR
12
What is a Memory Stick?
A Memory Stick is an IC (Integrated Circuit) which is stored in a compact
and rugged plastic enclosure. Memory Sticks are designed to store data and
to enable the transfer of data between devices equipped with Memory Stick
slots.
The Memory Stick standard was introduced by Sony in October of 1998.
Current Memory Stick capacities range up to 512MB.
A Memory Stick is 50mm long, 21.5mm wide, and 2.8mm thick.
An even more compact format, Memory Stick Duo, is 32mm long, 20mm
wide, and 1.6mm thick.
The theoretical transfer speed of Memory Stick is 160Mbps.
13
What is a SD Card?
A SD Card (Secure Digital Card) is an IC (Integrated Circuit) which is stored
in a compact and rugged plastic enclosure. SD Cards are designed to store
data and to enable the transfer of data between devices equipped with SD
Card slots.
Current SD Card capacities range up to 1GB.
A SD Card is 32mm long, 24mm wide, and 2.1mm thick.
An even more compact format, the miniSD Card, is 20mm long, 21.5mm
wide, and 1.4mm thick.
The theoretical transfer speed of a SD 1.0 Card is 12.5MB/s. SD 1.1 is
expected to raise this to 50MB/s.
The SD Card standard was introduced by Toshiba, Matsushita Electric, and
SanDisk in 1999.
SDIO
14
What is a MultiMediaCard (MMC)?
A MultiMediaCard (MMC) is an IC (Integrated Circuit) which is stored in a
compact and rugged plastic enclosure. MultiMediaCard (MMC)s are designed
to store data and to enable the transfer of data between devices equipped
with MultiMediaCard (MMC) slots.
The MultiMediaCard (MMC) standard was introduced in November of 1997
by SanDisk and Siemens AG/Infeneon Technologies AG.
Current MultiMediaCard (MMC) capacities range up to 2GB.
A MultiMediaCard (MMC) is 32mm long, 24mm wide, and 1.4mm thick.
MultiMediaCards can be used in SD Card readers and writers.
The theoretical transfer speed of a MultiMediaCard is 2.5MB/s.
What is HD-DVD?
HD-DVD is an optical sotrage format developed by Toshiba and Hitachi.
HD-DVD uses a 405nm wavelength blue-violet laser and an 0.65nm pickup
aperture. HD-DVD's are coated with a 0.6mm protective surface layer,
which is the same thickness used in DVD's.
Single-layer HD-DVD disks currently store 15GB of data, which dual-layer
HD-DVD disks are able to store 30GB of data.
The HD-DVD standard supports the following codec's: MPEG-2, Microsoft
Video Codec 1, H.264 / MPEG-4 AVC.
For security, HD-DVD supports mandatory HDCP encrypted output, volume
identifiers and Advanced Access Content System (AACS).
What is Blu-Ray?
15
Blu-Ray is an optical storage format developed by Sony and Phillips. Blu-Ray
was created to store large amounts of high definition video and sound. Blu-
ray gets its name from the type of laser it uses to read and write data from
and to the disc, the color of the laser is a hue of blue-violet. Due to the
extreme density of these optical discs the data needs to be smaller to fit
onto the disc, a blue-violet laser has a shorter wavelength than the normal
red lasers used today.
How does Blu-ray stack up against other types of discs? Well a normal CD
holds about 700 to 800 megabytes of data. A standard DVD holds about 4.7
gigabytes. You can also purchase dual layer DVD's that holds about 9.4 total
gigabytes of data. A HD DVD, which is a new DVD technology that also uses
blue lasers, holds about 25 gigabytes of data and there are reports that test
media can hold up to 200 gigabytes of data. The Blu-ray DVD can usually
hold about 50 gigabytes of data and there are also claims that test media
can hold up to 200 gigabytes of data.
There is currently a market war taking place against both HD DVD's and
Blu-ray DVD's. These two types of DVD's are fighting to see who will be the
new form of media for the years to come. As of yet, neither media type has
made enough inroads to garner a champion.
Obviously the major benefit of Blu-ray DVD's is that it is able to hold more
data on one disc, therefore allowing high definition audio and video. The
more data you have, the more data can be read to give a clearer picture
with more color and vividness.
One of the benefits of Blu-ray technology is that because data is so close
together, early types of Blu-ray discs would be contaminated by slight
scratches. However, a new coating has been developed that makes Blu-ray
discs extremely difficult to scratch.
Blu-ray is looking to make inroads into the consumer electronics market
with the Blu-ray DVD player with its Sony PlayStation. The Sony PlayStation
will include a basic Blu-ray DVD player which might spur sales of media and
make it the de facto standard.
The disadvantages to Blu-ray discs are that they are quite expensive. For
instance, players are selling at about the $1,000 mark and DVD discs will be
more expensive than their standard DVD counterparts. Another
disadvantage is that since there are two standards, both Blu-ray and HD,
most people are sitting on the sidelines to see who the winner is. Because
Blu-ray has been developed in part with Sony, Sony has included DRM or
digital rights management that will make it more difficult for people to place
shift and time shift their content.
Blu-Ray Technology
16
Blu-Ray uses a 405nm wavelength blue-violet laser and an 0.85nm pickup
aperture. Blu-Ray disks are coated with a 0.1mm protective surface layer.
Single-layer Blu-Ray disks currently store 23.3GB of data, which dual-layer
Blu-Ray disks are able to store 46.6GB of data.
The Blu-Ray standard supports the following codec's: MPEG-2, Microsoft
Video Codec 1, H.264 / MPEG-4 AVC.
For security, Blu-Ray supports mandatory HDCP encrypted output, ROM-
Mark watermarking, BD+ dynamic cryptology, and the Advanced Access
Content System (AACS).
What is HVD?
HVD (Holographic Versatile Disc) is the next generation in optical disk
technology. HVD is still in a research phase that would phenomenally
increase the disk storage capacities over the currently existing HD DVD and
Blu-Ray optical disk systems. According to published statistics, when
produced in full scale, HVDs will have a storage capacity of 3.9 terabytes
(39,000 GB) and a data transfer rate of 1 GB/s, which is at least six times
more than the speed of DVD players. This would, without a doubt, become a
giant step in revolutionizing the disk storage industry.
Some industry experts call HVDs a next-next generation technology. This
inference is a direct reference to the enormous storage capacity HVDs offer
compared to HD DVD and Blu-Ray optical disk systems, both of which are
yet to replace DVDs for mass optical storage. HD DVD and Blu-Ray optical
disk systems offer a storage capacity of 75 and 90 GB respectively, but
neither comes anywhere near the massive storage capacity of HVD.
HVD Technology
HVD uses a technology called 'collinear holography,' in which two laser rays,
one blue-green and one red, are collimated into a single beam. The role of
the blue-green laser is to read the data encoded in the form of laser
interference fringes from the holographic layer on the top, while the red
laser serves the purpose of a reference beam and also to read the servo info
from the aluminum layer - like in normal CDs - near the bottom of the disk.
The servo info is meant to monitor the coordinates of the read head above
the disk (this is similar to the track, head and sector information on a
normal hard disk drive).
How do the laser beams selectively pass through the layers? A layer of
dichroic mirrors that exists between the holographic and servo data layer
reflects back the blue-green laser beam, letting only the red laser pass
through it to reach the servo information. By doing so, it actually eliminates
the possible chances of the interference that can happen due to the
refraction of blue-green laser off the servo data pits, a problem that had
affected the efficiency of many holographic storage media in the past.
17
Optical Storage
Competing Technologies
HVD Capacity
HVD Adoption
The biggest challenge for HVD will be in establishing itself in the commercial
market, which as of now seems to be a distant dream, given its higher cost
margins. It is anticipated that a single HVD, when commercially available,
may cost anywhere between $100-120 (by 2006 year's end), and the reader
will be priced anywhere in the range of $10,000 to $15,000. However, like
anything else associated with technology, the price will soon fall as R&DD
costs are recouped and competitions lowers profit margins.
18
If you would like to replace your old hard drive with an upgraded drive, this
is a simple process that can be done at home. Most new hard drives will
come with installation instructions to make the task easier for you.
A user may decide to split a hard disk into multiple partitions in order to
organize his data more effectively. On Microsoft Windows machines, it is
common to store the OS and applications on one hard disk partition and
user data on another hard disk partition. When a problem occurs with
19
Microsoft Windows, the OS partition can be completely formatted and
reinstalled without affecting the data partition.
A user may decide to split a hard disk into multiple partitions because
smaller partitions often have smaller cluster sizes. A cluster size is the
smallest chunk of data which a partition can store. A large partition might
have a cluster size of 16KB. This mens that a file with one character in it will
occupy 16KB of space on the disk. In a smaller partition, that file might only
require 4KB to store. This is a useful strategy if you are storing a large
number of small files.
A user may have to split a large hard disk into multiple partitions if the hard
disk is larger than the partition size supported by the operating system.
Most operating system use the `fdisk` command to create hard disk
partitions. Many ooperating systems also have graphical tools which
accomplish the same task.
Extended Partitions
20
Partition Types
21
94 Amoeba BBT
a5 FreeBSD, NetBSD, BSD/386, 386BSD
a6 OpenBSD
a7 NEXTSTEP
b7 BSDI BSD/386 filesystem
b8 BSDI BSD/386 swap
be Solaris 8 bootable
bf Solaris x86
c7 Syrinx
db CP/M
e1 DOS access
e3 DOS R/O
eb BeOS BFS
fb VMWare filesystem
fc VMWare swap
f2 DOS secondary
ff Xenix Bad Block Table
Partition Saving
Partition Saving is an MS-DOS based partition backup and recovery
program. Partition Saving can copy a partition to a file.
Partition Saving is intelligent enough to copy only occupied sectors to the
file, if the partition is FAT12, FAT16, FAT32, NTFS or ext2.
Partition Saving is also able to compress data in the partition and split it into
several files. This is especially useful when saving hard drive partitions to
CD's or DVD's.
Partition Image
22
Partition Image is a Linux/Unix utility which saves partitions to an image
file. The image file can be compressed to save disk space, and split into
multiple files to be copied on removable media.
Partition Image will only copy data from the used portions of the partition.
For speed and efficiency, free blocks are not written to the image file.
Partition Image supports ext2fs/ext3fs, ReiserFS, FAT16/32, HPFS, JFS and
XFS.
SystemRescueCd
SystemRescueCd is a Linux system on a bootable CD-ROM for repairing your
system and your data after a crash.
SystemRescueCd also aims to provide an easy way to carry out
administrative tasks on your computer, such as creating and editing the
partitions of the hard disk.
SystemRescueCd contains a lot of system utilities (parted, partimage,
fstools, ...) and basic ones (editors, midnight commander, network tools). It
aims to be very easy to use: just boot from the CD-ROM, and you can do
everything.
The kernel of the system supports ext2/ext3, ReiserFS, XFS, JFS, VFAT,
NTFS, ISO9660, Samba and NFS.
eXtended FDisk
eXtended FDisk, or short XFDisk, is a free DOS FDISK replacement that
offers more comfort and comes with a boot manager that allows you to have
more than one operating system installed on your hard disk.
With XFDisk you can partition your hard disk or install and configure the
boot manager, which will be located in the first 17 sectors of your first hard
disk. The boot manager will not occupy a partition, so you can fully use the
four available primary partitions per hard disk. If you choose to have an
extended partition with logical drives on your hard disk, XFDisk
transparently manages the extended partition for you.
XFDisk and the boot manager support more than one hard disk and even
booting from logical drives.
TestDisk
23
TestDisk is a tool to check and undelete partitions.
TestDisk works with the following partition types:
• BeFS ( BeOS )
• BSD disklabel ( FreeBSD/OpenBSD/NetBSD )
• CramFS (Compressed File System)
• DOS/Windows FAT12, FAT16 and FAT32
• HFS, Hierarchical File System
• JFS, IBM's Journaled File System
• Linux Ext2 and Ext3
• Linux Raid
• Linux Swap (versions 1 and 2)
• LVM and LVM2, Linux Logical Volume Manager
• Netware NSS
• NTFS ( Windows NT/2K/XP/2003 )
• ReiserFS 3.5 and 3.6
• UFS (Sun/BSD/...)
• XFS, SGI's Journaled File System
GNU Parted
GNU Parted is a program for creating, destroying, resizing, checking and
copying partitions, and the file systems on them. This is useful for creating
space for new operating systems, reorganizing disk usage, copying data
between hard drives and drive imaging.
GNU Parted supports operations on ext2, ext3, FAT16, FAT32, Linux Swap,
HFS and HFS+, JFS, NTFS, ReiserFS, UFS, and XFS. All operations are not
supported across all file systems.
Free FDISK
Free FDISK is the replacement FDISK which is available in FreeDOS.
Free FDISK features include:
24
• Allows the use of boot loaders from other operating systems.
• Free FDISK is Open Source and licensed under the GNU GPL.
MBRWork
MBRWork is a utility to perform some common and uncommon tasks to the
MBR/EMBR/Sectors of a hard drive.
MBRWork is a tool for power users who understand how computers work.
Hard drives are contain millions of sectors. It is very normal for some of
these sectors to be bad sectors, even when the drive is first manufactured.
In addition, a small number of sectors will normally go bad during the
lifespan of a drive.
When this happens, the data in those sectors may be lost, but the data on
the rest of the disk will be unaffected and the disk is still completely usable.
A bad sector cannot be repaired, but it can be marked as unusable. Once
marked as unusable, the Operating System will know not to attempt to store
data in that bad sector. The storage capacity of the disk will be decreased
by the amount of storage space in the bad sector.
If your hard drive develops a bad sector, back the hard drive up
immediately. If the bad sector was caused by a faulty drive head, the
problem can quickly spread to other sectors on the disk.
25
store data in those bad sectors. The total disk capacity will be decreased by
the amount of storage space in those bad sectors.
If your hard drive is experiencing a bad sector, back it up immediately. If
the bad sector was caused by a faulty drive head, the problem can spread to
many other sectors across the disk.
In earlier version of Microsoft Windows and DOS, this functionality was built
into the `scandisk` and `chkdsk` utilities.
Once the bad sector or sectors have been "repaired", continue to back up
your hard drive on a regular basis. Hard drives are mechanical devices and
all mechanical devices will eventually fail.
• User errors
• Software errors
• Hard drive electronics failures
• Hard drive arm failures
26
• Hard drive platter failures
User Errors
Software Errors
Software errors usually result from software writing data to the wrong part
of the disk.
Errors cause by software are generally much more difficult for off-the-shelf
data recovery software to correct. This task may require the services of a
data recovery specialist.
When a hard drive physically fails, sometimes the mechanical parts of the
hard drive remain undamaged. This can happen, for example, if the hard
drive is subject to a power surge or a discharge of static electricity.
In these cases, it is usually possible to take the mechanical parts out of the
hard drive assembly and place them into another identical hard drive unit.
This should be done in a clean-room environment, to prevent dust from
damaging the hard drive.
Hard drive arm failures are very common. When the hard drive arm fails,
there is a very good chance that it will damage the hard drive platters.
When you hear the clicking noises from your hard drive which signal a hard
drive arm failure, back up all necessary data immediately and power the
system down as soon as possible.
If the hard drive platters have not been damaged, a data recovery specialist
may still be able to recover data from a hard drive with a damaged hard
drive arm.
27
Serious hard drive platter failures can occur as a result of hard drive arm
failures. In these cases, the hard drive platters are being scratched. Your
data is being scratched right off the surface of the platters! You can often
hear this damage occuring. These failures are very expensive or impossible
to recover.
The best method of hard drive recovery is to throw away the failed hard
drive and restore your data from backup to a brand new drive.
Backing up your data is a critically important preventative maintenance
task. Don't put yourself at risk by not properly backing up your data.
28
FreeUndelete
FreeUndelete is a freeware data recovery program for deleted files.
In case of accidental deletion of files on a NTFS file system (used by default
in Windows XP, 2000 and NT) FreeUndelete is the utility to help.
A deleted file is essentially an area on disk designated as free and ready to
accept data (such as contents of some other file). Luckily, unless the area
has already been overwritten, it still holds the contents of the deleted file.
Due to this fact it is possible to undelete files.
It is our pleasure to emphasize that FreeUndelete is free. There is no
charge, direct or hidden, to download and use a fully functional copy of the
program. The program does not install any spyware or adware along with it.
It does not populate user's desktop with pop-up ads or forcefully subscribe
user to mailing lists.
Unstoppable Copier
Unstoppable Copier recovers files from disks with physical damage. The
program allows you to copy files from disks with problems such as bad
sectors, scratches or that just give errors when reading data. This software
will attempt to recover every readable piece of a file and put the pieces
together. Using this method most types of files can be made useable even if
some parts were not recoverable in the end.
Disk Investigator
Disk Investigator helps you to discover all that is hidden on your computer
hard disk. It can also help you to recover lost data.
Display the true drive contents by bypassing the operating system and
directly reading the raw drive sectors. View and search raw directories, files,
clusters, and system sectors. Verify the effectiveness of file and disk wiping
programs. Undelete previously deleted files.
29
there is a good chance the data can be recovered by using a variety of hard
drive data recovering techniques.
Hard drive crashes occur for a variety of reasons. One of the main causes
for a full blown hard drive crash is generally attributed to a hardware issues.
The hard drive is a magnetic disc which spins and has an extended arm that
collected data from any area of the hard drive. If the arm fails to function or
the motor overheats or stops spinning, then there is a chance your hard
drive will crash rendering data seemingly inaccessible from all hard drive
areas. Hard drive crashes can also be caused by corrupted registry files or
system files. Viruses, Spyware, adware, and Trojan horses can also cause
system file corruption resulting in a hard drive crash.
To determine whether your hard drive has crashed due to mechanical failure
or a software related problem is relatively simple. Check whether the
flashing light in front of your computer case is blinking or not. If the light is
flashing but the computer is not booting up, then the problem may be
software related; and in most cases the cause is either virus related or due
to a corrupted system file. These types of hard drive crashes can generally
be recovered by reinstalling the operating system.
If the flashing light in the front of the computer case is not blinking, it
indicates that there is no hard drive activity and is generally attributed to a
mechanical problem. In this scenario a qualified computer technician may be
needed to fix problematic hard drive issues.
Physical Damage
30
The Role of Hard Drive Data Recovery Software Programs
Hard drive data recovery software programs play a major role in recovering
hard drive data. You will find several companies that offer these types of
programs. Most will automatically create backup copies of all your files and
folders reducing the worry of potential data loss. A good hard drive data
recovery program can recover all the important files or folders which vanish
after partition loss, accidental format, file or directory deletion, software
malfunction or even a virus attack. Whether you accidentally delete the files
or your computer crashes, data recovery software can locate the lost files
and recover them from your hard drive.
The main contexts where hard drive data recovery software is found useful
include:
31
What is an incremental backup?
A incremental backup is a backup of every file on a filesystem which has
changed since the last backup.
The alternatives to an incremental backup are differential backup and full
backup.
An incremental backup is the fastest backup and requires the least storage
space on the backup media. However, incremental backups also require the
longest time and the most tapes to restore.
Incremental backups should be used only in environments where backup
time or backup storage media are extremely constrained. For most
environments, a weekly full backup and a daily differential backip represent
a better plan.
If you perform a full backup on Sunday along with incremental backups
every night and the system crashes on Thursday, you will need to restore
the full backup from Sunday along with the incremental backups from
Monday, Tuesday, and Wednesday.
In contrast, if you perform a full backup on Sunday and a differential every
night, when the system crashes on Thursday you will only need to restore
the full backup from Sunday and the differential backup from Wednesday.
32
What is network backup?
Network backup is any backup system where the data to be backed up
traverses the network to reach the backup media.
Network backup typically requires a client-server software architecture. The
backup server resides on a centralized server and the backup clients reside
on every system to be backed up.
Advanced network backup systems can manage backup media which are
also connected to the backup server via a network.
Network backup systems are much more scalable and manageable than
local backup systems where tape drives are attached to each comouter
ystem.
Because network backup systems can backup so many computers, they
normally utilize tape autochangers to give them greater storage capacity.
Flash Memory
Flash memory, also known as memory sticks, flash drives, or thumb drives,
are a suitable solution for data backup when the backup amount is
somewhat small. Flash memory drives are easy to plug into any PC with a
USB port. These drives offer unlimited rewrite capabilities and are available
in capacities ranging anywhere from 64 MB to 4 GB. Flash memory data
durability is estimated to be roughly 10 years. Another advantage of flash
memory is that data stored on flash drives is not susceptible to damage
caused by magnets.
33
DVD Backup
DVD backup is a practical alternative for home users and small businesses.
DVD technologies include DVD-RW, DVD+RW, DVD-R, DVD+R, DVD-RAM,
as well as dual layer DVD technologies. Single-layer DVDs can hold up to 4.7
GB of data and dual-layer DVDs can hold up to 8.5 GB. DVD technology is a
suitable option for storing backup data medium amounts of backup data.
Hard Drives
As the prices of hard drives are dropping each year, individuals and
businesses are turning to hard drives as a backup option. Copying and
retrieving data from separate hard drives is very easy. The primary
disadvantages are cost and the worry that a malware attack which affects
the primary hard drives could also effect the backup hard drives.
Tape Backup
Combined with their decreased accessibility and the advances made in the
availability of such storage devices as the CD-R, the CD-RW, and the DVD-
R, tape backups have become less popular and practically obsolete for home
computer users. However, tape backup is still the primary backup method
used in business environments. Tape backups are available in numerous
capacities such as 4mm helical for low-end systems, 8mm helical scan
technology for mid-range systems, and AIT, DLT and LTO for high-end
systems. Compared to several other media solutions, tape drives typically
provide the highest storage capacities at the lowest cost. One drawback to
keep in mind, however, is the write speed of these drives, which is
comparatively low.
Online Storage
Online storage is one of the newest methods of storing your files, of course
backup data also. Onlien storage solutions enable people to upload their
data to a reliable server located in a secure environment. Another
advantage of storing files online is that users can access these files from any
location as long as they have a computer with Internet access.
What is DLT?
34
DLT (Digital Linear Tape) is a magnetic tape format developed by DEC (now
Hewlett-Packard).
DLT tapes are 1/2 inch wide and are packaged in study plastic containers.
DLT tapes store between 10GB and 40GB of uncompressed data.
A SuperDLT II tape can store up to 300GB of uncompressed data and can
transfer as much as 36MB per second.
DLT Alternatives
The LTO tape standard is designed to last for four generations of magnetic
tape technology.
LTO Tape Generation Uncompressed Capacity
Generation 1 100GB
Generation 2 200GB
Generation 3 400GB
35
Generation 4 800GB
LTO Alternatives
What is AIT?
AIT (Advanced Intelligent Tape) is a magnetic tape format developed by
Sony.
AIT tapes contain non-volatile memory called Memory-in-Cassette (MIC).
This storage space contains data about the tape which can be read quickly
by a tape drive, without having to read data from the slower magnetic
media.
AIT uses Advanced Metal Evaporated (AME) tape. To create AME tape,
cobalt is vaporized and deposited directly on the base film.
AME technology gives AIT tape both high-capacity and exceptional
durability. An AIT tape should support 30,000 media uses with an MTBF of
400,000 hours.
36
SDX236C 36GB
SDX2-50C 50GB
SDX2-50W 50GB
SDX3-100C 100GB
SDX3-100W 100GB
SDX4-200C 200GB
SDX4-200W 200GB
AIT tapes are 95mm x 62.5mm x 15.0mm. This compact format is very
convenient for use in 3.5" drive bays.
AIT Alternatives
37
use it for something as simple as sharing photos, music, or videos with their
family members.
Another noted advantage of online data storage is data backup. Computers
are susceptible to hard drive crashes or virus attacks. Hence taking data
backups frequently would be a safe way to protect your data from getting
lost forever. However, it should be kept in mind that backup data must be
stored in some other place other than the same computer or the same
physical location. To do so, there is no better an option than online data
storage.
There are several types of online data storage. If the user is looking for
storage space for some non-sensitive data, then the basic online storage is
an ideal one. On the other hand, for sensitive data, additional security may
be required - such as data encryption or two-factor authentication. In such
cases, online vendors typically use strong encryption technologies to keep
user's data safe and secure during transmission over the Internet.
Nowadays there are several vendors offering online data storage facilities.
Users typically pay fees based upon the amount of space they need.
Generally online data storage vendors feature a fully managed and secure
solution with 24x7 technical support and monitoring. Further almost all
Internet data storage services are secure and password protected. Some
vendors provide an additional measure of security by providing users with a
password token, which automatically generates passwords using two factor
authentication.
• Fabric
• Loop
• Point-to-Point
Fiber Channel supports connectivity over fiber optic cabling or copper wiring.
Fibre Channel devices using fiber optic cabling use two unidirectional fiber
optic cables for each connection. One fiber optic cable is used for
transmitting, the other for receiving. Fibre channel over fiber optic cable
supports cable distances of up to 10Km.
38
Fibre Channel devices which communicate over copper cabling are limited to
distances of 30m.
39
In most cases, Network Attached Storage is less expensive to purchase and
less complex to operate than a Storage Area Network. However, a SAN can
provide better performance and a larger range of configuration options.
NAS servers commonly support NFS (Network File System) and CIFS
(Common Internet File System). They may also support other storage
protocols, such as FTP (File Transfer Protocol) or SCP (Secure CoPy).
NAS server are typically attached to the network via Ethernet. However,
NAS devices are also available which connect to Fibre Channel networks.
Wireless 802.11 Network Attached Storage devices are now appearing on
the market.
What is a HBA?
A HBA, or Host Bus Adapter, is the interface card which connects a host to a
SAN (Storage Area Network).
A HBA could be more accurately referred to as a "Host I/O controller".
40
LUN (Logical Unit Number) Masking is an authorization process that makes a
LUN available to some hosts and unavailable to other hosts.
LUN Masking is implemented primarily at the HBA (Host Bus Adapater) level.
LUN Masking implemented at this level is vulnerable to any attack that
compromises the HBA.
Some storage controllers also support LUN Masking.
LUN Masking is important because Windows based servers attempt to write
volume labels to all available LUN's. This can render the LUN's unusable by
other operating systems and can result in data loss.
41
The OSI model is a reference model which most IT professionals use to
describe networks and network applications.
The OSI model was originally intended to describe a complete set of
production network protocols, but the cost and complexity of the
government processes involved in defining the OSI network made the
project unviable. In the time that the OSI designers spent arguing over who
would be responsible for what, TCP/IP conquered the world.
42
The Presentation Layer of the OSI model is responsible for
defining the syntax which two network hosts use to
communicate. Encryption and compression should be
Presentation Layer functions.
The most major difficulty with the OSI model is that is does not map well to
the real world!
The OSI was created after many of todays protocols were already in
production use. These existing protocols, such as TCP/IP, were designed and
built around the needs of real users with real problems to solve. The OSI
model was created by academicians for academic purposes.
The OSI model is a very poor standard, but it's the only well-recognized
standard we have which describes networked applications.
43
The easiest way to deal with the OSI model is to map the real-world
protocols to the model, as well as they can be mapped.
Layer Name
Common Protocols
7 Application SSH, telnet, FTP
6 Presentation HTTP, SMTP, SNMP
5 Session RPC, Named Pipes, NETBIOS
4 Transport TCP, UDP
3 Network IP
2 Data Link Ethernet
1 Physical Cat-5
The difficulty with this approach is that there is no general agreement as to
which layer of the OSI model to map any specific protocol. You could argue
forever about what OSI model layer SSH maps to.
A much more accurate model of real-world networking is the TCP/IP model:
TCP/IP Model
Application Layer
Transport Layer
Internet Layer
Network Interface Layer
The most significant downside with the TCP/IP model is that if you reference
it, fewer people will know what you are talking about!
For a better description of why the OSI model should go the way of the
dodo, disco, and DivX, read Kill the Beast: Why the Seven-Layer Model Must
Die.
44
Because of these requirements, plenum cable is usually more expensive
than non-plenum cable. Plenum cable is also more stiff and difficult to work
with than regular network cable.
Most plenum cable is covered with Teflon or PVC.
In FreeBSD, you can change your MAC address with the `ifconfig
<interface> link <address>` command.
Under Linux, you can change your MAC address with `ifconfig <interface>
hw <class> <address>`, or you can use the GNU MAC Changer.
In Solaris, you can change the MAC address with the `ifconfig <interface>
<ether> <address>` command.
45
How to change a MAC address under OpenBSD
OpenBSD does not, by default, allow you to change the MAC address. It is
possible to change the MAC address under OpenBSD with sea.c.
Under HP-UX, you can change the MAC address in SAM by selecting
Networking and Communications, then selecting the interface, then Action,
Modify, Advanced Options. HP-UX refers to the MAC address as the "station
address".
What is VoIP?
VoIP (Voice over Internet Protocol) is simply the transmission of voice traffic
over IP-based networks.
The Internet Protocol (IP) was originally designed for data networking. The
success of IP in becoming a world standard for data networking has led to
its adaption to voice networking.
VoIP Telephones
46
Types of VoIP Calls
VoIP telephone calls can be placed either to other VoIP devices, or to normal
telephones on the PSTN (Public Switched Telephone Network).
Calls from a VoIP device to a PSTN device are commonly called "PC-to-
Phone" calls, even though the VoIP device may not be a PC.
Calls from a VoIP device to another VoIP device are commonly called "PC-
to-PC" calls, even though neither device may be a PC
Speed Demon Adapters sells network cards which give you the ability to
change the MAC address stored in their EERPROM.
This can give you the ability to change your MAC address under any
operating system that supports either the PCI bus or PCMCIA Type II cards.
What is 127.0.0.1?
127.0.0.1 is the standard IP address used for a loopback network
connection.
This means that if you try to connect to 127.0.0.1, you are immediately
looped back to your own machine.
If you telnet, ftp, etc... to 127.0.0.1, you are connected to your own
machine.
In other words, 127.0.0.1 is you.
For example, if your system was named "joker", and you attempted to
telnet to 127.0.0.1, you would see:
# telnet 127.0.0.1
Trying 127.0.0.1...
Connected to joker
Escape character is '^]'.
Convincing newbie's to connect to 127.0.0.1 is a frequent joke on the
Internet.
Another name for 127.0.0.1 is localhost.
Although 127.0.0.1 is the most commonly utilized address for localhost, any
IP address in the 127.*.*.* range should also function in the same manner.
What is a firewall?
A firewall is a system that is set up to control traffic flow between two
networks. Firewalls are most commonly specially configured Unix systems,
but firewalls have also been built out of many other systems, including
systems designed specifically for use as firewalls. The most common
commercial firewall today is CheckPoint FireWall-1, but competitors such as
Cisco's PIX are quickly catching up on CheckPoint.
47
Many people disagree on the definition of a firewall, and in this discussion I
will use the term loosely.
• Source IP address
• Source port
• Destination IP address
• Destination port
• IP protocol (TCP or UDP)
Based upon rules configured into the firewall, the packet will either be
allowed through, rejected, or dropped. If the firewall rejects the packet, it
sends a message back to the sender letting him know that the packet was
rejected. If the packet was dropped, the firewall simply does not respond to
the packet. The sender must wait for the communications to time out.
Dropping packets instead of rejecting them greatly increases the time
required to scan your network. Packet filtering firewalls operate on Layer 3
of the OSI model, the Network Layer. Routers are a very common form of
packet filtering firewall.
An improved form of the packet filtering firewall is a packet filtering firewall
with a stateful inspection engine. With this enhancement, the firewall
"remembers" conversations between systems. It is then necessary to fully
examine only the first packet of a conversation.
48
Application-gateway firewalls also operate on Layer 7 of the OSI model.
Application-gateway firewalls exist for only a few network applications. A
typical application-gateway firewall is a system where you must telnet to
one system in order telnet again to a system outside of the network.
49
Major types of wireless networks include:
CDPD Cellular Digital Packet Data
HSCSD High Speed Circuit Switched Data
PDC-P Packet Data Cellular
GPRS General Packet Radio Service
1xRTT 1x Radio Transmission Technology
Bluetooth
IrDA
MMDS Multichannel Multipoint Distribution Service
LMDS Local Multipoint Distribution Service
WiMAX Worldwide Interoperability for Microwave Access
802.11 Wi-Fi
50