RAID Acquisition Computer Forensics COEN 152/252.

Slides:



Advertisements
Similar presentations
Hardware Lesson 3 Inside your computer.
Advertisements

RAID Redundant Array of Inexpensive Disks Presented by Greg Briggs.
1 Lecture 18: RAID n I/O bottleneck n JBOD and SLED n striping and mirroring n classic RAID levels: 1 – 5 n additional RAID levels: 6, 0+1, 10 n RAID usage.
RAID: Redundant Array of Inexpensive Disks Supplemental Material not in book.
BSD Partitions COEN 152/252 Computer Forensics. BSD Partitions Some BSD systems use IA32 hardware  Designed to co-exists with MS partitions.  Use DOS.
RAID- Redundant Array of Inexpensive Drives. Purpose Provide faster data access and larger storage Provide data redundancy.
1 CSC 486/586 Network Storage. 2 Objectives Familiarization with network data storage technologies Understanding of RAID concepts and RAID levels Discuss.
Chapter 3 Presented by: Anupam Mittal.  Data protection: Concept of RAID and its Components Data Protection: RAID - 2.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
COMPUTER SYSTEM CAN BE DIVIDED INTO : 1- General Computer 2- Special Computer.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
CSE 451: Operating Systems Winter 2010 Module 13 Redundant Arrays of Inexpensive Disks (RAID) and OS structure Mark Zbikowski Gary Kimura.
* SOFTWARE * Computer software, or just software, is a collection of computer programs and related data that provides the instructions. It can not be touched.
Storage Networking. Storage Trends Storage growth Need for storage flexibility Simplify and automate management Continuous availability is required.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
COEN 252 Computer Forensics
Storage System: RAID Questions answered in this lecture: What is RAID? How does one trade-off between: performance, capacity, and reliability? What is.
Storage Area Networks The Basics. Storage Area Networks SANS are designed to give you: More disk space Multiple server access to a single disk pool Better.
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
COEN 252 Computer Forensics Windows Evidence Acquisition Boot Disk.
Guide to Computer Forensics and Investigations Fourth Edition
RAID and mirroring Track SA-E AfNOG workshop May 15, 2009 Cairo, Egypt (Slides by Phil Regnauld)
Day 10 Hardware Fault Tolerance RAID. High availability All servers should be on UPSs –2 Types Smart UPS –Serial cable connects from UPS to computer.
Module 9 Review Questions 1. The ability for a system to continue when a hardware failure occurs is A. Failure tolerance B. Hardware tolerance C. Fault.
Hardware.  Learn what hardware is  Learn different input and output devices  Learn what the CPU is.
RAID Redundant Array of Inexpensive Disks. History Single Large Expensive Disk (SLED) Single Large Expensive Disk (SLED) IBM and Berkeley University IBM.
RAID REDUNDANT ARRAY OF INEXPENSIVE DISKS. Why RAID?
Configuring RAID with mdadm. Raid ? Redundant Array of Inexpenisve Disks JBOD Raid 0,1,2,3,5,6 Combinations 10,0+1, etc...
Hard Drive Overview: The UltraMax Plus, MiniMax and eGo Firewire+ Drives Erik Collett Chinese Product Launch IOMEGA CONFIDENTIAL.
Enterprise Computing With Aspects of Computer Architecture Jordan Harstad Technology Support Analyst Arizona State University.
Operating System Basics section 6A. This lesson includes the following sections: Running Programs Managing Files Managing Hardware Utility Software.
Guide to Computer Forensics and Investigations Fourth Edition
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Computer Foundations Dr. John P. Abraham Professor UTPA.
Davie 5/18/2010.  Thursday, May 20 5:30pm  Ursa Minor  Co-sponsored with CSS  Guest Speakers  Dr. Craig Rich – TBA  James Schneider – Cal Poly.
Chap 5: Hard Drives. Chap 5: Magnetic HD Chap 5: Hard Drive structure.
RAID Arrays A short summary for TAFE. What is a RAID A Raid Array is a way of protecting data on a hard drive by using “redundancy” to repeat data across.
RAID and RAS CIS 485 SAU SUJA SOLOMON TIFFANY STACIE.
Computer Software & its Types Instructor : Adnan Iqbal Course : Introduction to Computer.
Chap 5: Hard Drives. Chap 5: Magnetic HD Chap 5: Solid State Drives.
Storage Networking. Storage Trends Storage grows %/year, gets more complicated It’s necessary to pool storage for flexibility Intelligent storage.
Bootstrapping Introduction. Bootstrapping Introduction: Computers execute programs stored in main memory, and initially the operating system is on the.
The Big Picture. My Story  Wrote great programs  Didn’t understand how they worked.
Seminar on RAID TECHNOLOGY Redundant Array of Independent Disk By CHANDAN.R 8 TH ISE, 1ap05is013 Under the guidance of Mr.Mithun.B.N, Lecturer,Dept.ISE.
Match the following Operating System concepts with definition A to E.
Enhanced Availability With RAID CC5493/7493. RAID Redundant Array of Independent Disks RAID is implemented to improve: –IO throughput (speed) and –Availability.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
ITC 4 ESO 3rd TERM Operating Systems YEAR
RAID.
Storage Area Networks The Basics.
Multiple Platters.
Installing OS.
Storage Networking.
Chapter 4 – Introduction to Operating System Concepts
Storage Virtualization
Cache Memory The cache is logically between the CPU and main memory. Physically, there are several possible places it could be located. Tanenbaum, Structured.
Storage Networking.
Device management How does the operating system manage the hardware and peripheral devices? Device Driver: Each device is attached to your computer with.
CSE 451: Operating Systems Winter 2009 Module 13 Redundant Arrays of Inexpensive Disks (RAID) and OS structure Mark Zbikowski Gary Kimura 1.
COEN 252: Computer Forensics
Mark Zbikowski and Gary Kimura
Digital Forensics Dr. Bhavani Thuraisingham
CSE 451: Operating Systems Winter 2012 Redundant Arrays of Inexpensive Disks (RAID) and OS structure Mark Zbikowski Gary Kimura 1.
Hard Drives & RAID PM Video 10:28
Computer Applications -Generic Elective
A very basic introduction
1 Guide to Computer Forensics and Investigations Sixth Edition Chapter 3 Data Acquisition.
Presentation transcript:

RAID Acquisition Computer Forensics COEN 152/252

RAID Levels RAID 0:Just a Bunch Of Disks (JBOD) RAID 1: Mirrored RAID 5: Redundancy through parity  distributed parity

RAID Hardware RAID  Two types: Special controller that plugs into one of the buses Device that plugs into normal disk controller such as ATA, SCSI, Firewire, …  Computer sees a single volume

RAID Hardware RAID acquisition  Step 1: Acquire and investigate complete RAID volume as a single volume Needs big target device. Use device drivers such as those contained on Linux distributions  Step 2: Acquire individual disks and look for hidden data in possible areas that the RAID volume did not use. Keyword searches can also be performed on the individual disks.

RAID Software RAID  OS sees individual disks  But sees them together as a single volume.  CPU calculates parity info.

RAID Software RAID  Easiest: Acquire entire volume  Encase, ProDiscover can import disks from a Windows RAID volume and analyze them as a single volume. Allows access to data that is hidden on individual disks.