NETW 110 Handout Lab 10 - Backup and Restore

Size: px
Start display at page:

Download "NETW 110 Handout Lab 10 - Backup and Restore"

Transcription

1 The Importance of Scheduled Backups Most people who have worked in client-server or mainframe environment have lost files or data. Therefore, it is necessary for the IT staff to develop a thorough, yet easily maintained backup procedure since at some point, any piece of hardware will fail. The first step in designing a backup regimen is to create a written policy that specifies: who is responsible for ensuring that backups occur. what file systems and files need regular archiving. Anything that is mission critical for the organization should be backed up regularly. when backups should occur. Backups should be conducted during slow hours, because most backup programs will not properly archive a file if it is in use. The policy should specify a backup time, and all users should know the days and times. where the backup tapes and media should be stored. This should be a secure, cool, and dry place. Some backups should be stored off campus which systems need backing up. Decide which systems require a regular backup and the frequency. what type of media should be used for backing up. This can include DAT tapes, re-writable CDs and DVD s, Flash ROM, removable hard drives connected to Firewire or USB ports, even another server or servers that exist exclusively for backups how to backup As a backup policy is developed, the decision on what needs to be backed up must be made. There must be a way to differentiate between the operating system files and user files. Generally, we will need to archive an operating system (including /, /usr, /var, and /etc) only when significant changes occur, such as when we install or update a daemon or kernel. We need to backup user files in /home much more frequently. In some conditions, these directories may become very large, so we must schedule major backups for off-peak backup times, as well as a strategy that backs up only those files that have changed since the last backup. Usually Friday or Saturday nights are good times to perform full backups. Selecting a Backup Strategy Archiving requires considerable time. In large systems, a single backup can take all night. Most administrators work to achieve a balance between long backup times and long restore times. We have several options to help achieve this balance, and we should choose the best strategy for our particular situation. Below are descriptions of the various backup options. Full Also known as level 0, archival, or epochal, a full backup is a complete archive of all files, including system and user files, on a drive or partition. This method requires one set of media, but generally takes the longest. This type is a mandatory part of all other strategies. Depending on some factor, this may be done on a weekly, monthly or quarterly basis. The frequency depends on how often system files are updated. Differential Known as a level 1 backup, all files that were created or modified since the last full backup are saved during a differential backup. Differential backups require two sets of tapes. The first tape contains the full backup. The second contains a backup of all files created or changed since the full backup. The second tape will grow larger, but not as large as the full backup tape. This option saves backup time,

2 but requires more restoring time, because we use only these two tapes. This option is usually the easiest to implement. Incremental Known as a level 2 backup, an incremental backup uses several sets of tapes to archive only those files with newer created or modified dates since the last backup. A new tape is used for each backup. Each new tape contains only files created or changed on the day of the backup. This option is more complex. When restoring, we must use the archival tape, then restore each tape for each day. This option allows us to spend the least time backing up, though it requires the most time when restoring. Incremental backups pose the threat of operator error and can force administrators into searching each tape for the proper archive. Network backup Most systems permit backing up filesystems from one machine onto a backup device connected to another machine--this is referred to as a remote or network backup. Examples of programs for remote dumps include rdump and rrestore. Disk Mirroring Disk Mirroring duplicates everything on a drive to another drive. It is usually common for a system of this type to update the duplicate drive continuously with the most current information. With RAID 1, the duplicate drive is written at the same time as the original. This reduces or eliminates the recovery time in case of a disaster. If the main drive fails, the backup drive can immediately take over. Many popular repositories of shareware and free software use disk mirroring. It also reduces incoming traffic since users can visit a local mirror to download software. Types of Backup Devices and Media Comparison of Backup Media Medium Capacity Reliability Cost Speed Magnetic Tape High High Cheap Slow Writable CD s Medium Medium Cheap Fast Hard Drive High High Expensive Fast Floppy Low Low Cheap Slow DVD High High Medium Slow ZIP Disks Medium Low Medium Slow Flash ROM Medium High Expensive Fast Firewire Hard Drive High High Expensive Fast USB Hard Drive High High Expensive Medium Tapes Tapes remain the most common archiving media. At one time, 9-mm tapes were the most common tape media, but today 4mm and 8mm DDS, DLT, and DAT tape cartridges, about the size of an audiocassette, are now standard. Tape carts can hold from 20GB to 600GB CD-ROMs Re-writable CD-ROMs have become popular, although they only hold up to 600 to 700 MB of information. Highly secure or frequently hacked sites use read-only CD ROMS to store log files to this

3 media, which ensures that a hacker cannot alter the data. A CD jukebox contains multiple read-write drives, which can then store up to five stacks of 100 CDs. With a jukebox, we can back up multiple machines across a network. The difference between a jukebox and a CD tower is that the former is meant for archiving, and the latter is meant for real-time network access. DVD-ROMs Similar to CD s except each disk stores much more data (4.7G and up depending on the type of drive). Some DVD Jukebox systems can hold up to 200 disks, and can write either CDs or DVDs Other Archiving Media SyQuest drives, Iomega ZIP, and JAZ drives can also be used. Generally, these devices can store from 100 MB to 1 GB per disk, but not a good choice for unattended backups. Firewire and USB or removable hard drives are also a possibility. The remainder of this handout will examine the commands to backup and restore all or part of a filesystem. Adding a Tape Drive Tape drives and removable drives are often used for system backups and archiving of important software. Removable drives can also be used to store a Linux file system. Numerous tape drives are supported by Linux through the ftape.o and st.o tape modules, found under the /lib/modules/2.0.xx/misc directory (where xx represents your kernel s version). The ftape module is a device driver used to support floppy controller tape or removable backup devices, whereas the st.o module supports SCSI tape devices. Both modules are automatically loaded and unloaded by the kerneld system daemon when needed during tape operation. Generally speaking, although nearly all SCSI and floppy controller tape drives should work with modern Linux kernels, version 2.0 and up, but many high-speed or parallel-port tapes may not. Installing a Tape Drive SCSI tape drives are either attached directly to an installed SCSI adapter or added to the current SCSI device chain. Make sure that a free device number is used, and that the SCSI chain is properly terminated. The devices used to support SCSI tape drives are found under the /dev directory and begin with the letters st: /dev/st0 /dev/st1 /dev/st2 /dev/st3 /dev/st4 /dev/st5 /dev/st6 /dev/st7 /dev/nst0 /dev/nst1 /dev/nst2 /dev/nst3 /dev/nst4 /dev/nst5 /dev/nst6 /dev/nst7 There are two types of tape drive devices: Rewinding Rewinding devices automatically rewind after tape operation. Nonrewinding Devices with names starting with n are nonrewinding tape devices, and will not rewind after tape operation. Floppy controller tape drives are attached to the spare floppy controller port. You cannot use your floppy drive when using a floppy tape drive. The devices used to support tape drives are found under the /dev directory and have the letters ft in their filenames: /dev/nrft0 /dev/nrft2 /dev/rft0 /dev/rft2 /dev/nrft1 /dev/nrft3 /dev/rft1 /dev/rft3

4 Creating a tape drive device symbolic link 1. Choose the device names, such as /dev/st0 or /dev/rft0, that match your SCSI or floppy tape drive. 2. As the root operator, use the ln command to create symbolic links for your devices, like so: ln -s /dev/nrft0 /dev/nftape ln -s /dev/rft0 /dev/ftape This command creates easily remembered names of your tape drive. Tapes must be purchased preformatted or must be formatted by using another operating system s utilities; at the time of this writing, no Linux utilities were available to format magnetic tapes. Using the mt Command The mt (magnetic tape) command is used to control tapes in your tape drive. These operations include the following: Rewinding the tape Retensioning the tape Erasing the tape More than two dozen SCSI-specific tape operations The mt command can also be used by backup scripts, or backup utilities such as the tar or cpio commands, to archive Linux directories and files. The mt command has several different commandline options, but is usually used with the -f option to specify the tape device followed by a command: mt -f /dev/nftape command Tape drives, unlike other file systems, are not mounted or unmounted for read or write operation. Retensioning Tapes The general consensus among Linux tape users is that it is a good idea to retension new tapes before use. Tapes should be retensioned before use to take up any existing slack, and to make sure the tape conforms to your tape drive s tension strength. This will help to reduce the risk of errors during backups. To retension a tape, insert the tape into the tape drive, then use the mt command with the nonrewinding tape drive device and the retension command: mt -f /dev/nftape retension Rewinding Tapes Although some tape drives automatically rewind inserted tapes, you might occasionally need to rewind a tape yourself, especially if a backup operation has been halted by software or operator intervention. To rewind a tape, use the mt command with the nonrewinding tape drive device and the rewind command: mt -f /dev/nftape rewind Preparing Tapes for Linux Backups Before using a formatted tape for backups, you must generally use the mt command to erase the tape and prepare it for Linux. To erase a tape, use the mt command with the nonrewinding tape drive device and the erase command: mt -f /dev/nftape erase

5 The dump and restore Commands There has been much controversy about the best application choice for the Linux environment, especially the use of dump at all. See dump is ideal for archiving entire file systems, though we can also archive selected files. It was originally developed for BSD UNIX, but is now been ported to all major versions of UNIX. It is ideal for incremental backups because we can set it to use and modify the /etc/dumpdates file, which lists the date and level of the latest backup. This information allows dump to perform differential backups. dump uses the syntax: dump option... argument... filesystem-to-backup AIX and Solaris use a similar syntax, but they name their dump programs backup and ufsdump, respectively. dump Options and Arguments Option Description Argument 0-9 Specifies the dump level The 0 option creates a full backup. A 9 option creates an incremental backup. dump uses a zero-based count, which means that it begins counting at 0, not at 1. Therefore, if we specify 1, we are specifying dump level 2. If we do not specify a level, dump defaults to 9. a archive-file archive-file will be a table of contents of the archive. f dump-file specify the file (usually a device file) to write the dump to, a specifies standard output u Updates /etc/dumpdates None v after writing each volume, rewind the tape and verify. The file system must not be used during dump or the verification. s Gives size of tape. Depends upon tape length. The 8-mm default is if combined with the c option. c Specifies the use of a tape cartridge. Depends on the size of the tape. This option is often used with s. d Specifies tape density. Recent versions of dump can autodetect tape lengths and density. Depends on density. For 8-mm, 42500, or 1000 when used with the c option. As we specify dump options and arguments, note that some flavors of UNIX do not permit hyphens between the commands. restore The restore command allows us to retrieve the files we backed up using dump. Solaris names the program ufsrestore. Using restore, we can retrieve single files or entire filesystems. The syntax for restore is: restore options arguments file/directory The options for restore include:

6 Option Description -i Launches restore in interactive mode. -r Reads and restores the full tape. -t Lists the files on the archive tape. -x Restores all files and directories into the current directory. -f Specifies the device to use. If not specified, the default setting applies. -s Selects the specific backup tape (for use on jukeboxes). -s n skip to the nth dump file on the tape -d turn on debugging -h prevent hierarchical restoration of subdirectories -v verbose mode -a archive-file use an archive file to search for a file s location. Convert contents of the dump tape to the new file system format -f dump-file specify dump-file to use, - refers to standard input Use of the dump Command to Archive a filesystem. As we dump file systems, we must specify the dump level, the device where we wish to put the archive, and the file system to back up. The dump level we specify helps we create epochal, differential, or incremental backups. The following table shows the special file name corresponding to a tape drive for various systems. System File name AIX /dev/rfd0 IRIX /dev/tape HP-UX /dev/rmt/0 Linux /dev/tape Solaris /dev/rmt0 SunOS and BSD dump ->../devices/pseudo/dump@0:dump An example of the dump command on a Linux system: dump 0uf /dev/rft0 /dev/hda Specifies the entire filesystem (level 0) 2. on /dev/hda3 3. should be backed up to mag tape (f option combined with destination device) 4. at /dev/rft0 5. and that the dumpdate (u option) should be written to /etc/dumpdates Below is an example of what we could do when dumping a file system to a device we specify: dump 1fu /dev/rmt/1 /dev/hda3 This command dumps the /dev/hda3 file system to the /dev/rmt/1 tape. The backup would be differential, because a 0 creates a full, or epochal backup, and a 1 archives only those files that had changed since the epochal backup. If we wished to do an incremental backup, we would specify a 2 for the next backup, and so on. The f option allows we to specify a non-default tape device, and the u option updates the /etc/dumpdates file.

7 When dumping file systems, we can use the -a option, which allows dump to write to the tape drive without verifying its size. However, only newer tape drives support this option. Also, the -b option allows we to specify block size, which is important for certain file systems. There are limitations with the dump command and we must take precautions when it is used. In addition, we should also archive any export directories (/export, /export/home) daily on mission-critical systems. The dump command does not support authentication procedures. We can automate backups using scripts, as well as crontab. Improper use of dump can lead to various disasters. First, because dump generally requires several options and arguments, we may make procedural errors. If we reverse dump syntax as root, we could restore the wrong file system on top of another. Also, if /etc/dumpdates entries are incorrect, or if we specify the wrong dump level, we probably will not back up the proper files. dump to standard output In addition to tape drives, we can dump to standard output. We denote standard output as a stand-alone hyphen: (-). The standard output option can be attractive if we have a large hard disk on a separate computer. We can then dump the root file system onto another partition, hard disk, or partition without having to worry about restoring it from tape. For example, suppose that we wanted to dump the root file system of the system we are working on to a separate hard drive partition, /backup, which resides on /dev/hda10. We could issue the following command to do so: ufsdump 0uf - / (cd backup ; restore xf- ) This command results in an epochal backup of the root file system into standard output (f and its argument, -), an updating of the /etc/dumpdates file (u), which is then piped into the backup directory. The contents of the backup directory are not in archival form; they are live files that we can move back to the repaired partition in the case of an event. Although tape backups are the most secure because we can store them offsite, this option has become quite popular because it is quick. Using the restore Command to Restore Individual Files To restore an archive, we generally reverse the steps we took to back it up. Therefore, recovering from a differential backup is different from recovering from an incremental backup. We must always restore backups in the order they were created, as follows: Differential: To recover from a differential backup, we would first restore the full (epochal) backup set. We would then restore the set of tapes we used to archive subsequent changes. This restoration can take considerable time. Incremental: Depending upon how often we back up, this option requires a full (epochal) backup set, then as many tapes as were used to conduct subsequent backups for each day. If we used six subsequent (sets of) tapes to increment the full backup, we will need each of these tapes. This restoration option requires the most backup time. Generally, we have to change to the destination directory before using restore. For example, to restore the /etc directory, we would change to it, then use restore with its options. With no options, restore will attempt to load the contents of the entire tape to the destination drive. Therefore, when restoring individual files, the interactive mode is the most useful. Interactive mode Interactive mode allows us to navigate through an archival device and specify exactly what file to restore from it.

8 In most systems, the following command allows us to search the default tape for an individual file manually: restore -i -f <device> The -i option provides a limited range of shell-type navigation options, including ls, cd, add (selects a file to be restored) and delete. Using standard UNIX directory-related commands like cd and ls for restoring the files and directories, use wildcards * and? in the usual way. Additional commands include help, quit, and extract, which extracts files to the destination directory after we have selected them. Non-interactive commands Non-interactive commands are available. For example, -s specifies an archive's number: restore -s 4 would restore the fourth archive to the current directory. The -x option allows us to restore a file in the current directory using relative path names. From the /etc directory, the following command would restore the passwd file from a default device to /etc: restore -x /etc/passwd Using the restore command to restore a filesystem If we have lost an entire filesystem, we must usually take certain steps before using restore. They include replacing damaged equipment and formatting drives using mkfs, for example. Once we have paved the way for the filesystem, we can restore it using one of several options. Recursive option The recursive option, -r, is particularly powerful. It allows us to first change to the partition we want to restore, then run restore: restore -r archive.name To restore a lost or damaged file system, you must first create the partition and directory. Assume we want to recreate the /home directory on hdb1 mkfs /dev/hdb1 mount /dev/hdb1/home cd /home restore rf /dev/rft0 The r option specifies that the entire archive on rft0 should be restored to the current directory. If we do not specify the -f option, restore will read from the default device, obtain the /backup/dev/hda1, and place it on the current partition. mt program If we have dumped multiple archives to a tape, we will probably need to access different areas of the tape. The mt program allows us to reposition the tape so that we can access the proper archives. mt syntax is: mt -t tapename command [count] mt -f /dev/rmt2 rewind would bring the tape back to the beginning. The cpio utility cpio was the original archiving utility. It has much of dump's functionality, but does not support backing up across a network. However, it is particularly useful when archiving entire file systems.

9 Program syntax is: Flags Options i extracts all files matching one or more of the given pattern arguments from the archive. o writes a new archive to the standard output, using the list of files read from the standard input b causes 16-bit words to be swapped within each long word and bytes to be swapped within each 16-bit word of each extracted file. d forces the creation of necessary intermediate directories if they do not already exist. v provides more verbose information than usual. cpio prints the names of files as it extracts them from or adds them to archives. The command to restore all files from the tape device /dev/rmt1 that have the word accounts in them is: cpio -icdv accounts < /dev/rmt1 cpio and find cpio is often used with find. The command: find /etc -print cpio -o >/etc/rmt1 copies all files in the /etc directory to the tape device /dev/rmt1. The -o option allows we to copy the files in the specified path using input to output. cpio then takes the redirected output and writes it to the device we specify.) The -p Option The -p option allows us to archive files from one directory to another. The command to archive all contents of /etc cpio -pd /etc /backup/ The dd Program dd is mainly used to create images of file systems. dd copies an input file and sends it to an output file. The program defaults to standard output if no arguments are given. Program syntax is: dd option=value For example, the command to archive the passwd file to the /dev/rmt1 archive is dd if=/etc/passwd dd of=/dev/rmt1 The tar command We have previously examined the use of tar. Its strength is archiving directory structures. The -c option creates a new tape, whereas the -r option appends new files to existing archives. Appending is a standard feature of most archiving programs. The following command would archive the /etc directory in a non-default tape device: tar cvf /dev/rmt0 /etc The pax Program pax is an improvement over tar and cpio that is used in many flavors of UNIX, but its chief strength lies in its ability to archive files within their original directory hierarchies. It supports tar and cpio formats, and introduces a few of its own. The instruction syntax is: pax options arguments

10 An example of this command that backs up the contents of /etc to the tape device /dev/rmt1 would be: pax -w -f /dev/rmt1 /etc The gzip Utility gzip is a common utility that compresses and decompresses files, leaving the.gz extension. Program syntax is: gzip option Other Backup and Restore Options Although dump is a standard utility, other utilities may be used to backup a system. Right now, the cpio and tar solutions are definitely considered much more reliable, and they all work on multiple filesystems. Another popular solution is AMANDA - Advanced Maryland Automatic Network Disk Archiver from the University of Maryland. The AMANDA server manages a pool of backup media and rotates usage through the pool in order to ensure that all backups are retained for the administrator specified retention period. All media is preformatted with data that allows AMANDA to detect whether the proper media is available or not. In addition, AMANDA can be interfaced with robotic media changing units, making it possible to completely automate backups. AMANDA can use either tar or dump to do the actual backups. Complete information on AMANDA can be found at dump and restore Example without a Tape Drive We do not have tape drives or similar backup media connected to our system. However, it is important to experiment with the dump and restore commands to gain an understanding of how they work. This handout offers an example that will allow you to use these commands without a tape drive. The method relies on the fact that Linux and UNIX accesses devices through files. A Practice File System For our experimentation with the commands, we will work with a practice file system. Practicing backups with hard-drive partitions is not that efficient as they will almost certainly be very large, and a small mistake could have disastrous consequences. Instead we are going to work with a floppy or ZIP drive. We will use a floppy disk in this example. The first step is to format a floppy with the ext2 file system. /sbin/mke2fs /dev/fd0 mke2fs 1.34 (25-Jul-2003) Filesystem label= OS type: Linux Block size=1024 (log=0) Fragment size=1024 (log=0) 96 inodes, 720 blocks 36 blocks (5.00%) reserved for the super user First data block=1 1 block group 8192 blocks per group, 8192 fragments per group 96 inodes per group Writing inode tables: done Writing superblocks and filesystem accounting information: done

11 This filesystem will be automatically checked every 27 mounts or 180 days, whichever comes first. Use tune2fs -c or -i to override. We will now mount the drive and copy some files to the floppy. mount -t ext2 /dev/fd0 /mnt/floppy cp /etc/passwd /etc/issue /etc/group /var/log/messages /mnt/floppy cd /mnt/floppy ls group issue lost+found messages passwd Performing a level 0 dump We have copied some important files to the disk. Now we will backup the entire floppy volume to the /tmp directory on the hard drive. This is an example of a full backup. Here is an example of the commands with the output. The following is an explanation of the dump command that we will use: /sbin/dump 0uf /tmp/backup /mnt/floppy Specifies the entire filesystem (level 0) 7. on /mnt/floppy 8. should be backed up to the hard drive 9. to a file named backup in /tmp directory 10. and that the dumpdate (u option) should be written to /etc/dumpdates Now we will change to the root directory on fd0 and issue the dump command. cd / /sbin/dump 0uf /tmp/backup /mnt/floppy DUMP: Date of this level 0 dump: Thu Dec 9 10:04: DUMP: Dumping /dev/fd0 (/mnt/floppy) to /tmp/backup DUMP: Excluding inode 7 (resize inode) from dump DUMP: Label: none DUMP: Writing 10 Kilobyte records DUMP: mapping (Pass I) [regular files] DUMP: mapping (Pass II) [directories] DUMP: estimated 39 blocks. DUMP: Volume 1 started with block 1 at: Thu Dec 9 10:04: DUMP: dumping (Pass III) [directories] DUMP: dumping (Pass IV) [regular files] DUMP: Closing /tmp/backup DUMP: Volume 1 completed at: Thu Dec 9 10:04: DUMP: Volume 1 20 blocks (0.02MB) DUMP: 20 blocks (0.02MB) on 1 volume(s) DUMP: finished in less than a second DUMP: Date of this level 0 dump: Thu Dec 9 10:04: DUMP: Date this dump completed: Thu Dec 9 10:04: DUMP: Average transfer rate: 0 kb/s DUMP: DUMP IS DONE The entire filesystem on fd0 is now backed up. This process created a file on the hard drive of the server /tmp/backup, which contains a level 0 dump. The presence of the backup can be verified with the command: ls -l /tmp/backup -rw-r--r-- 1 root root Dec 9 10:04 /tmp/backup

12 Since we used the u option with dump, it also created a file named /etc/dumpdates. The contents of /etc/dumpdates is: /dev/fd0 0 Thu Dec 9 10:04: Restoring the backup Since we have a archive to work with, we could use the restore command to restore files. /sbin/restore -if /tmp/backup /sbin/restore > ls.: group issue lost+found/ messages passwd /sbin/restore > add passwd /sbin/restore > extract You have not read any volumes yet. Unless you know which volume your file(s) are on you should start with the last volume and work towards the first. Specify next volume # (none if no more volumes): 1 restoring./passwd set owner/mode for '.'? [yn] y /sbin/restore > quit Alternative Rather than backup to a normal file on the hard-drive you could choose to backup files directly to a floppy drive (i.e. use /dev/fd0 rather than /tmp/backup). One problem with this alternative is that you are limited to 1.44Mb per media. This used to be a problem because the Linux version of dump did not support multiple volumes. It appears it now does.

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

Backing up data. On LINUX and UNIX

Backing up data. On LINUX and UNIX Backing up data On LINUX and UNIX Logical backup Why? Job security For user data. Remember endian order, character set issues. Full backup + incremental = backup set No differential (see find command).

More information

This is Worksheet and Assignment 12. Disks, Partitions, and File Systems

This is Worksheet and Assignment 12. Disks, Partitions, and File Systems This is Worksheet and Assignment 12 This is a combined Worksheet and Assignment.. Quizzes and tests may refer to work done in this Worksheet and Assignment; save your answers. You will use a checking program

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration Backup and Restore Why do you need backups? What are backups? Backup and restore policies Backup schedule Capacity and consumables planning Backup media Dump,

More information

Chapter 6. Linux File System

Chapter 6. Linux File System Chapter 6 Linux File System 1 File System File System management how to store informations on storage devices The Hierarchical Structure Types of file Common File system Tasks 2 The Hierarchical Structure

More information

Backup & Recovery. Sun Microsystems Korea. ning.co.kr

Backup & Recovery. Sun Microsystems Korea.  ning.co.kr Backup & Recovery Sun Microsystems Korea http://www.suntrai ning.co.kr Sample Backup strategy Sat 0 Mon Tue Wed Thu Fri Level 0 Monthly M T W Th F 3 4 5 6 2 3 4 5 6 2 3 4 5 6 2 3 4 5 6 2 3 4 5 6 2 Sample

More information

User Commands tar ( 1 )

User Commands tar ( 1 ) NAME tar create tape archives and add or extract files SYNOPSIS tar c [ bbeeffhiklnoppqvwx@ [0-7]] [block] [tarfile] [exclude-file] {-I include-file -C directory file file}... tar r [ bbeeffhiklnqvw@ [0-7]]

More information

Course 55187B Linux System Administration

Course 55187B Linux System Administration Course Outline Module 1: System Startup and Shutdown This module explains how to manage startup and shutdown processes in Linux. Understanding the Boot Sequence The Grand Unified Boot Loader GRUB Configuration

More information

Computer Center, CS, NCTU. Outline. Backup devices and media Backup philosophy Unix backup and archiving commands

Computer Center, CS, NCTU. Outline. Backup devices and media Backup philosophy Unix backup and archiving commands Backups Outline Backup devices and media Backup philosophy Unix backup and archiving commands 2 Backup Media By Storage (1) The media are presented in rough order of increasing capacity Optical media CD

More information

CST8207: GNU/Linux Operating Systems I Lab Nine Disks, Partitions, and File Systems Part 2. Disks, Partitions, and File Systems - Part 2 of 2

CST8207: GNU/Linux Operating Systems I Lab Nine Disks, Partitions, and File Systems Part 2. Disks, Partitions, and File Systems - Part 2 of 2 Student Name: Lab Section: Disks, Partitions, and File Systems - Part 2 of 2 1 Due Date - Upload to Blackboard by 8:30am Monday April 9, 2012 Submit the completed lab to Blackboard following the Rules

More information

Tape pictures. CSE 30341: Operating Systems Principles

Tape pictures. CSE 30341: Operating Systems Principles Tape pictures 4/11/07 CSE 30341: Operating Systems Principles page 1 Tape Drives The basic operations for a tape drive differ from those of a disk drive. locate positions the tape to a specific logical

More information

Chapter 14: Mass-Storage Systems

Chapter 14: Mass-Storage Systems Chapter 14: Mass-Storage Systems Disk Structure Disk Scheduling Disk Management Swap-Space Management RAID Structure Disk Attachment Stable-Storage Implementation Tertiary Storage Devices Operating System

More information

UNIX System Administration

UNIX System Administration $!... 14:13 $$... 14:13.netrc...12:27-28 /etc/fstab... 6:25 /etc/hosts.equiv... 8:23 /etc/inittab Entries... 4:8 /etc/netmasks... 8:22 /etc/shells... 12:25 /home... 6:69 /tmp...6:61-67 /usr... 6:70 /var...

More information

Typical File Extensions File Structure

Typical File Extensions File Structure CS 355 Operating Systems File Systems File Systems A file is a collection of data records grouped together for purpose of access control and modification A file system is software responsible for creating,

More information

Module 13: Secondary-Storage

Module 13: Secondary-Storage Module 13: Secondary-Storage Disk Structure Disk Scheduling Disk Management Swap-Space Management Disk Reliability Stable-Storage Implementation Tertiary Storage Devices Operating System Issues Performance

More information

Data Integrity: Backups and RAID

Data Integrity: Backups and RAID Data Integrity: Backups and RAID Track 2 Workshop PacNOG 7 June 29, 2010 Pango Pango, American Samoa (Original slides by Phil Regnauld) Introduction Keeping your data safe and reliable TM Backups Types

More information

Chapter 12: Mass-Storage Systems. Operating System Concepts 8 th Edition,

Chapter 12: Mass-Storage Systems. Operating System Concepts 8 th Edition, Chapter 12: Mass-Storage Systems, Silberschatz, Galvin and Gagne 2009 Chapter 12: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management

More information

Introduction to OS. File Management. MOS Ch. 4. Mahmoud El-Gayyar. Mahmoud El-Gayyar / Introduction to OS 1

Introduction to OS. File Management. MOS Ch. 4. Mahmoud El-Gayyar. Mahmoud El-Gayyar / Introduction to OS 1 Introduction to OS File Management MOS Ch. 4 Mahmoud El-Gayyar elgayyar@ci.suez.edu.eg Mahmoud El-Gayyar / Introduction to OS 1 File Management Objectives Provide I/O support for a variety of storage device

More information

MINI-HOWTO backup and/or restore device or partition using zsplit/unzsplit

MINI-HOWTO backup and/or restore device or partition using zsplit/unzsplit MINI-HOWTO backup and/or restore device or partition using zsplit/unzsplit Jurij Ivastsuk-Kienbaum jurij [at] device-image.de Revision History First draft March 14, 2006 This document describes a setup

More information

Silberschatz, et al. Topics based on Chapter 13

Silberschatz, et al. Topics based on Chapter 13 Silberschatz, et al. Topics based on Chapter 13 Mass Storage Structure CPSC 410--Richard Furuta 3/23/00 1 Mass Storage Topics Secondary storage structure Disk Structure Disk Scheduling Disk Management

More information

File System: Interface and Implmentation

File System: Interface and Implmentation File System: Interface and Implmentation Two Parts Filesystem Interface Interface the user sees Organization of the files as seen by the user Operations defined on files Properties that can be read/modified

More information

V Workstation Imaging

V Workstation Imaging V Workstation Imaging The following sections provide information on Novell ZENworks Desktop Management Workstation Imaging procedures and features. Chapter 50, Common Imaging Deployment Strategies, on

More information

MASS-STORAGE STRUCTURE

MASS-STORAGE STRUCTURE UNIT IV MASS-STORAGE STRUCTURE Mass-Storage Systems ndescribe the physical structure of secondary and tertiary storage devices and the resulting effects on the uses of the devicesnexplain the performance

More information

Read the relevant material in Sobell! If you want to follow along with the examples that follow, and you do, open a Linux terminal.

Read the relevant material in Sobell! If you want to follow along with the examples that follow, and you do, open a Linux terminal. Warnings 1 First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Read the relevant material in Sobell! If

More information

Backup challenge for Home Users

Backup challenge for Home Users PARAGON Technologie GmbH, Systemprogrammierung Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com Email sales@paragon-software.com

More information

HP-UX System Administration Course Overview. Skills Gained. Who will the Course Benefit?

HP-UX System Administration Course Overview. Skills Gained. Who will the Course Benefit? HP-UX System Administration Course Overview This Hewlett Packard HP-UX System Administration training course is designed to give delegates practical experience in the administration of an HP-UX UNIX System.

More information

Answers to Even- Numbered Exercises

Answers to Even- Numbered Exercises Answers to Even- 17 Numbered Exercises from page 1077 1. What option should you use with fsck if you want to review the status of your filesystems without making any changes to them? How does fsck determine

More information

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B::

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B:: Module Title Duration : 55187B: Linux System Administration : 4 days Overview This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

File systems and Filesystem quota

File systems and Filesystem quota File systems and Filesystem quota 8.1 Unit objectives After completing this unit, you should be able to: Describe what a file is Describe what a file system is List possible file systems Describe i-nodes

More information

computer user has lost data at some point, perhaps because of a corrupted file or accidental

computer user has lost data at some point, perhaps because of a corrupted file or accidental CHAPTER 31 Backing Up Data Every computer user knows that backing up data is vital. This is usually because every computer user has lost data at some point, perhaps because of a corrupted file or accidental

More information

How to install the software of ZNS8022

How to install the software of ZNS8022 How to install the software of ZNS8022 1. Please connect ZNS8022 to your PC after finished assembly. 2. Insert Installation CD to your CD-ROM drive and initiate the auto-run program. The wizard will run

More information

Using grub to Boot various Operating Systems

Using grub to Boot various Operating Systems Operating Systems and Systems Integration Using grub to Boot various Operating Systems Contents 1 Aim 2 2 What You Will Do 2 3 Background 2 3.1 Installing grub in MBR from a floppy, and from the OS........

More information

Exam LFCS/Course 55187B Linux System Administration

Exam LFCS/Course 55187B Linux System Administration Exam LFCS/Course 55187B Linux System Administration About this course This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

Operating Systems: Lecture 12. File-System Interface and Implementation

Operating Systems: Lecture 12. File-System Interface and Implementation 1 Operating Systems: Lecture 12 File-System Interface and Implementation Jinwoo Kim jwkim@jjay.cuny.edu Outline File Concept and Structure Directory Structures File Organizations Access Methods Protection

More information

XenData6 Workstation User Guide

XenData6 Workstation User Guide XenData6 Workstation User Guide Version 6.21 2011-2016 XenData Limited. All rights reserved. XenData is a trademark of XenData Limited. Document last modified date: October 5, 2016 XenData6 Workstation

More information

"Charting the Course... MOC B: Linux System Administration. Course Summary

Charting the Course... MOC B: Linux System Administration. Course Summary Description Course Summary This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional Linux system administrator. The course covers

More information

Linux Interview Questions and Answers

Linux Interview Questions and Answers Linux Interview Questions and Answers You need to see the last fifteen lines of the files dog, cat and horse. What command should you use? tail -15 dog cat horse The tail utility displays the end of a

More information

(Self-Study) Identify How to Back Up and Restore NetWare Systems

(Self-Study) Identify How to Back Up and Restore NetWare Systems SECTION 18 (Self-Study) Identify How to Back Up and Restore NetWare Systems The following objective will be tested: Develop a Network Backup Strategy In this section you learn how you can back up and restore

More information

Paragon Exact Image. User Manual CONTENTS. Introduction. Key Features. Installation. Package Contents. Minimum System Requirements.

Paragon Exact Image. User Manual CONTENTS. Introduction. Key Features. Installation. Package Contents. Minimum System Requirements. Paragon Exact Image User Manual CONTENTS Introduction Key Features Installation Package Contents Minimum System Requirements Basic Concepts Backup Operations Scheduling Interface Overview General Layout

More information

Manage Directories and Files in Linux. Objectives. Understand the Filesystem Hierarchy Standard (FHS)

Manage Directories and Files in Linux. Objectives. Understand the Filesystem Hierarchy Standard (FHS) Manage Directories and Files in Linux Objectives Understand the Filesystem Hierarchy Standard (FHS) Identify File Types in the Linux System Change Directories and List Directory Contents Create and View

More information

Disks & File Systems. Dick Gillman, ITSS. 1/19/06 10:20:11 am docs/disks.sxi

Disks & File Systems. Dick Gillman, ITSS. 1/19/06 10:20:11 am docs/disks.sxi Disks & File Systems Dick Gillman, ITSS 1/19/06 10:20:11 am docs/disks.sxi IDE and SCSI most lower end systems come with IDE SCSI better performance choose system with SCSI for servers Checklist for new

More information

Virtual Machine. Linux flavor : Debian. Everything (except slides) preinstalled for you. https://www.virtualbox.org/

Virtual Machine. Linux flavor : Debian. Everything (except slides) preinstalled for you. https://www.virtualbox.org/ Virtual Machine Anyone have problems installing it? VM: Virtual Box - allows you to run a different operating system within the current operating system of your machine. https://www.virtualbox.org/ Linux

More information

Linux Files and the File System

Linux Files and the File System Linux Files and the File System 1. Files a. Overview A simple description of the UNIX system, also applicable to Linux, is this: "On a UNIX system, everything is a file; if something is not a file, it

More information

5/8/2012. Creating and Changing Directories Chapter 7

5/8/2012. Creating and Changing Directories Chapter 7 Creating and Changing Directories Chapter 7 Types of files File systems concepts Using directories to create order. Managing files in directories. Using pathnames to manage files in directories. Managing

More information

This course is for those wanting to learn basic to intermediate topics in Solaris 10 system administration.

This course is for those wanting to learn basic to intermediate topics in Solaris 10 system administration. Course Summary Description This course teaches basic to intermediate topics in Solaris 10 system administration. The operating system will be Oracle Solaris 10 (SunOS 5.10 Release 1/13 U11). Objectives

More information

Chapter 11: Implementing File

Chapter 11: Implementing File Chapter 11: Implementing File Systems Chapter 11: Implementing File Systems File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency

More information

File System Internals. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

File System Internals. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University File System Internals Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today s Topics File system implementation File descriptor table, File table

More information

Chapter 11: Implementing File Systems. Operating System Concepts 9 9h Edition

Chapter 11: Implementing File Systems. Operating System Concepts 9 9h Edition Chapter 11: Implementing File Systems Operating System Concepts 9 9h Edition Silberschatz, Galvin and Gagne 2013 Chapter 11: Implementing File Systems File-System Structure File-System Implementation Directory

More information

Chapter 11: Implementing File Systems

Chapter 11: Implementing File Systems Chapter 11: Implementing File Systems Operating System Concepts 99h Edition DM510-14 Chapter 11: Implementing File Systems File-System Structure File-System Implementation Directory Implementation Allocation

More information

Chapter 11: File System Implementation. Objectives

Chapter 11: File System Implementation. Objectives Chapter 11: File System Implementation Objectives To describe the details of implementing local file systems and directory structures To describe the implementation of remote file systems To discuss block

More information

Chapter 10: Mass-Storage Systems

Chapter 10: Mass-Storage Systems COP 4610: Introduction to Operating Systems (Spring 2016) Chapter 10: Mass-Storage Systems Zhi Wang Florida State University Content Overview of Mass Storage Structure Disk Structure Disk Scheduling Disk

More information

18-Sep CSCI 2132 Software Development Lecture 6: Links and Inodes. Faculty of Computer Science, Dalhousie University. Lecture 6 p.

18-Sep CSCI 2132 Software Development Lecture 6: Links and Inodes. Faculty of Computer Science, Dalhousie University. Lecture 6 p. Lecture 6 p.1 Faculty of Computer Science, Dalhousie University CSCI 2132 Software Development Lecture 6: Links and s 18-Sep-2017 Location: Goldberg CS 127 Time: 14:35 15:25 Instructor: Vlado Keselj Previous

More information

Chapter 02 Linux Installation and Usage

Chapter 02 Linux Installation and Usage Chapter 02 Linux Installation and Usage TRUEFALSE 1. A swap partition contains a filesystem. 2. When a user interacts with his computer, he interacts directly with the kernel of the computer's operating

More information

Introduction. Secondary Storage. File concept. File attributes

Introduction. Secondary Storage. File concept. File attributes Introduction Secondary storage is the non-volatile repository for (both user and system) data and programs As (integral or separate) part of an operating system, the file system manages this information

More information

UNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan

UNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan UNIT V UNIX SYSTEM COMMUNICATION Dr.T.Logeswari 1 Electronic mail or email is easiest way of communication on unix. Fast and cheap Used to exchange graphics, sound and video files 2 3 Elements of a communication

More information

Aras Innovator 11. Backup and Recovery Procedures

Aras Innovator 11. Backup and Recovery Procedures Document #: 11.0.02015040601 Last Modified: 1/4/2018 Copyright Information Copyright 2018 Aras Corporation. All Rights Reserved. Aras Corporation 300 Brickstone Square Suite 700 Andover, MA 01810 Phone:

More information

OPERATING SYSTEM. Chapter 12: File System Implementation

OPERATING SYSTEM. Chapter 12: File System Implementation OPERATING SYSTEM Chapter 12: File System Implementation Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management

More information

CSE380 - Operating Systems

CSE380 - Operating Systems CSE380 - Operating Systems Notes for Lecture 17-11/10/05 Matt Blaze, Micah Sherr (some examples by Insup Lee) Implementing File Systems We ve looked at the user view of file systems names, directory structure,

More information

ICS Principles of Operating Systems

ICS Principles of Operating Systems ICS 143 - Principles of Operating Systems Lectures 17-20 - FileSystem Interface and Implementation Prof. Ardalan Amiri Sani Prof. Nalini Venkatasubramanian ardalan@ics.uci.edu nalini@ics.uci.edu Outline

More information

File Systems Management and Examples

File Systems Management and Examples File Systems Management and Examples Today! Efficiency, performance, recovery! Examples Next! Distributed systems Disk space management! Once decided to store a file as sequence of blocks What s the size

More information

STORAGE & FILE CONCEPTS, UTILITIES

STORAGE & FILE CONCEPTS, UTILITIES STORAGE & FILE CONCEPTS, UTILITIES (Pages 6, 150-158 - Discovering Computers & Microsoft Office 2010) I. Computer files data, information or instructions residing on secondary storage are stored in the

More information

An introduction to Logical Volume Management

An introduction to Logical Volume Management An introduction to Logical Volume Management http://distrowatch.com/weekly.php?issue=20090309 For users new to Linux, the task of switching operating systems can be quite daunting. While it is quite similar

More information

RocketRAID 231x/230x SATA Controller Fedora Linux Installation Guide

RocketRAID 231x/230x SATA Controller Fedora Linux Installation Guide RocketRAID 231x/230x SATA Controller Fedora Linux Installation Guide Version 1.0 Copyright 2008 HighPoint Technologies, Inc. All rights reserved. Last updated on April 7, 2009 Table of Contents 1 Overview...1

More information

The NetBackup catalog resides on the disk of the NetBackup master server. The catalog consists of the following parts:

The NetBackup catalog resides on the disk of the NetBackup master server. The catalog consists of the following parts: What is a NetBackup catalog? NetBackup catalogs are the internal databases that contain information about NetBackup backups and configuration. Backup information includes records of the files that have

More information

Implementation should be efficient. Provide an abstraction to the user. Abstraction should be useful. Ownership and permissions.

Implementation should be efficient. Provide an abstraction to the user. Abstraction should be useful. Ownership and permissions. File Systems Ch 4. File Systems Manage and organize disk space. Create and manage files. Create and manage directories. Manage free space. Recover from errors. File Systems Complex data structure. Provide

More information

File Systems Ch 4. 1 CS 422 T W Bennet Mississippi College

File Systems Ch 4. 1 CS 422 T W Bennet Mississippi College File Systems Ch 4. Ë ¾¾ Ì Ï ÒÒ Ø Å ÔÔ ÓÐÐ 1 File Systems Manage and organize disk space. Create and manage files. Create and manage directories. Manage free space. Recover from errors. Ë ¾¾ Ì Ï ÒÒ Ø Å

More information

Computer Systems Laboratory Sungkyunkwan University

Computer Systems Laboratory Sungkyunkwan University File System Internals Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today s Topics File system implementation File descriptor table, File table

More information

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories Chapter Two Exploring the UNIX File System and File Security Lesson A Understanding Files and Directories 2 Objectives Discuss and explain the UNIX file system Define a UNIX file system partition Use the

More information

CS370 Operating Systems

CS370 Operating Systems CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2017 Lecture 24 File Systems Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 Questions from last time How

More information

How to clone a Linux box using netcat

How to clone a Linux box using netcat How to clone a Linux box using netcat Dr. Emiliano Bruni info@ebruni.it Version 0.01 $Date: 2003/08/22 14:52:15 $ Many times it s necessary to have a clone of a linux box without modifying the original

More information

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version : HP HP0-771 Designing and Implementing HP Enterprise Backup Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-771 A. copy backup B. normal backup C. differential backup D.

More information

Overview of Mass Storage Structure

Overview of Mass Storage Structure Overview of Mass Storage Structure Magnetic disks provide bulk of secondary storage Drives rotate at 70 to 250 times per second Ipod disks: 4200 rpm Laptop disks: 4200, 5400 rpm or 7200 rpm Desktop disks:

More information

Chapter 12: File System Implementation

Chapter 12: File System Implementation Chapter 12: File System Implementation Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency

More information

CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed.

CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed. CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed. File-System Structure File structure Logical storage unit Collection of related information File

More information

File Organization Sheet

File Organization Sheet File Organization Sheet 1. What are File Structures? A File Structure is a combination of representations for data in files and of operations for accessing the data. A File Structure allows applications

More information

Chapter 10: File System Implementation

Chapter 10: File System Implementation Chapter 10: File System Implementation Chapter 10: File System Implementation File-System Structure" File-System Implementation " Directory Implementation" Allocation Methods" Free-Space Management " Efficiency

More information

Advanced Operating Systems

Advanced Operating Systems Advanced Operating Systems File Systems: File Allocation Table, Linux File System, NTFS Lecture 10 Case Studies of File Systems File Allocation Table (FAT) Unix File System Berkeley Fast File System Linux

More information

Lecture 2: The file system

Lecture 2: The file system Lecture 2: The file system Hands-on Unix System Administration DeCal 2012-01-30 1 / 19 Basic programs Basic commands 2 / 19 Basic programs Basic programs Basic commands pwd cd ls cp, mv less, vi 3 / 19

More information

IBM Tivoli Storage Manager for HP-UX Version Installation Guide IBM

IBM Tivoli Storage Manager for HP-UX Version Installation Guide IBM IBM Tivoli Storage Manager for HP-UX Version 7.1.4 Installation Guide IBM IBM Tivoli Storage Manager for HP-UX Version 7.1.4 Installation Guide IBM Note: Before you use this information and the product

More information

Full file at https://fratstock.eu

Full file at https://fratstock.eu Guide to UNIX Using Linux Fourth Edition Chapter 2 Solutions Answers to the Chapter 2 Review Questions 1. Your company is discussing plans to migrate desktop and laptop users to Linux. One concern raised

More information

File System Internals. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

File System Internals. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University File System Internals Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today s Topics File system implementation File descriptor table, File table

More information

BRU User s Guide. Copyright , TOLIS Group, Inc. BRU User s Guide 1

BRU User s Guide. Copyright , TOLIS Group, Inc. BRU User s Guide 1 BRU User s Guide Copyright 2003-2013, TOLIS Group, Inc. BRU User s Guide 1 BRU User s Guide 2 Table of Contents Chapter 1 - Welcome... 9 General Description... 9 BRU Features... 9 Incremental and Differential

More information

Chapter 10: Mass-Storage Systems

Chapter 10: Mass-Storage Systems Chapter 10: Mass-Storage Systems Silberschatz, Galvin and Gagne 2013 Chapter 10: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space

More information

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 Fault tolerance refers to the capability of a computer or network to continue to function when some component fails. Disk fault tolerance refers

More information

User's Manual. Intego Personal Backup X User's Manual Page 1

User's Manual. Intego Personal Backup X User's Manual Page 1 User's Manual Intego Personal Backup X User's Manual Page 1 Intego Personal Backup X for Macintosh 2002-2004 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written for use

More information

Chapter 10: Mass-Storage Systems. Operating System Concepts 9 th Edition

Chapter 10: Mass-Storage Systems. Operating System Concepts 9 th Edition Chapter 10: Mass-Storage Systems Silberschatz, Galvin and Gagne 2013 Chapter 10: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space

More information

Persistent Storage - Datastructures and Algorithms

Persistent Storage - Datastructures and Algorithms Persistent Storage - Datastructures and Algorithms Seite 1 L 07: Case Study: Unix FS Seite 2 Questions: Encoding What is an encoding? Name some examples of codes Which are used in computers? Seite 3 Questions:

More information

Linux File System Study Guide

Linux File System Study Guide Linux File System Study Guide Copyright 1998, 1999 P. Tobin Maginnis This document is free; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the

More information

Fedora Linux Installation Guide

Fedora Linux Installation Guide RocketRAID 276x SAS Controller Fedora Linux Installation Guide Version 1.1 Copyright 2012 HighPoint Technologies, Inc. All rights reserved. Last updated on May 29, 2012 Table of Contents 1 Overview...

More information

CompTIA Linux Course Overview. Prerequisites/Audience. Course Outline. Exam Code: XK0-002 Course Length: 5 Days

CompTIA Linux Course Overview. Prerequisites/Audience. Course Outline. Exam Code: XK0-002 Course Length: 5 Days CompTIA Linux+ 2009 Exam Code: XK0-002 Course Length: 5 Days Course Overview This instructor-led course will prepare students for the 2009 CompTIA Linux+ certification exam. It provides a comprehensive

More information

WHITE PAPER: ENTERPRISE SOLUTIONS. Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows

WHITE PAPER: ENTERPRISE SOLUTIONS. Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows WHITE PAPER: ENTERPRISE SOLUTIONS Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows White Paper: Enterprise Security Disk-Based Data Protection Achieving Faster

More information

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this

More information

Section 8 TAPE INTERFACE

Section 8 TAPE INTERFACE Section 8 TAPE INTERFACE This Section describes the tape interface for backup and restore of file-save or account-save tapes. The UniVision System Administration Guide describes the mechanism for performing

More information

The Ultimate Linux/Windows System

The Ultimate Linux/Windows System The Ultimate Linux/Windows System Kevin Farnham Abstract Use cross-platform applications and shared data for the ultimate Linux/Windows system. I recently converted my Toshiba notebook computer into a

More information

CISC 7310X. C11: Mass Storage. Hui Chen Department of Computer & Information Science CUNY Brooklyn College. 4/19/2018 CUNY Brooklyn College

CISC 7310X. C11: Mass Storage. Hui Chen Department of Computer & Information Science CUNY Brooklyn College. 4/19/2018 CUNY Brooklyn College CISC 7310X C11: Mass Storage Hui Chen Department of Computer & Information Science CUNY Brooklyn College 4/19/2018 CUNY Brooklyn College 1 Outline Review of memory hierarchy Mass storage devices Reliability

More information

CS720 - Operating Systems

CS720 - Operating Systems CS720 - Operating Systems File Systems File Concept Access Methods Directory Structure File System Mounting File Sharing - Protection 1 File Concept Contiguous logical address space Types: Data numeric

More information

Chapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D.

Chapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. Chapter Two File Systems CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. 1 Learning Objectives At the end of this section, you will be able to: Explain the purpose and structure of file systems

More information

What is Data Storage?

What is Data Storage? What is Data Storage? When we talk about storing data, we mean putting the data in a known place. We can later come back to that place and get our data back again. Writing data or saving data are other

More information

Che-Wei Chang Department of Computer Science and Information Engineering, Chang Gung University

Che-Wei Chang Department of Computer Science and Information Engineering, Chang Gung University Che-Wei Chang chewei@mail.cgu.edu.tw Department of Computer Science and Information Engineering, Chang Gung University l Chapter 10: File System l Chapter 11: Implementing File-Systems l Chapter 12: Mass-Storage

More information

UNIX System Programming Lecture 3: BASH Programming

UNIX System Programming Lecture 3: BASH Programming UNIX System Programming Outline Filesystems Redirection Shell Programming Reference BLP: Chapter 2 BFAQ: Bash FAQ BMAN: Bash man page BPRI: Bash Programming Introduction BABS: Advanced Bash Scripting Guide

More information