1 Information Management DIG 3563 – Lecture 17 File Structures and Cloud Computing J. Michael Moshell University of Central Florida Original image* by.

Slides:



Advertisements
Similar presentations
Storage Management Lecture 7.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Lectures on File Management
Operating System.
CHANGING THE WAY IT WORKS Cloud Computing 4/6/2015 Presented by S.Ganesh ( )
Lecture 13 Page 1 CS 111 Online File Systems: Introduction CS 111 On-Line MS Program Operating Systems Peter Reiher.
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
Lecture 19 Page 1 CS 111 Online Protecting Operating Systems Resources How do we use these various tools to protect actual OS resources? Memory? Files?
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 6 2/13/2015.
Ken Birman. Massive data centers We’ve discussed the emergence of massive data centers associated with web applications and cloud computing Generally.
Database Management: Getting Data Together Chapter 14.
Recap of Feb 27: Disk-Block Access and Buffer Management Major concepts in Disk-Block Access covered: –Disk-arm Scheduling –Non-volatile write buffers.
File System Variations and Software Caching May 19, 2000 Instructor: Gary Kimura.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
CLOUD COMPUTING.
Format Scandisk Defragmentation Antivirus Compression Software
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
TECHNOLOGY GUIDE 3: Emerging Types of Enterprise Computing
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
Chapter 3.1:Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access.
Chapter 7 Working with Files.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
 FILE S SYSTEM  DIFFERENT FILE SYSTEMS  FILE SYSTEM COMPONENTS  FILE OPERATIONS  LOG STRUCTERD FILE SYSTEM  FILE EXAMPLES.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Chapter 4: What is an operating system?. What is an operating system? A program or collection of programs that coordinate computer usage among users and.
Computers in the real world Objectives Understand what is meant by memory Difference between RAM and ROM Look at how memory affects the performance of.
GIS and Cloud Computing. Flickr  Upload and manage your photos online  Share your photos with your family and friends  Post your photos everywhere.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Chapter 4: operating systems. What is an operating system? A program or collection of programs that coordinate computer usage among users and handle common.
Geographic Information Systems Cloud GIS. ► The use of computing resources (hardware and software) that are delivered as a service over the Internet ►
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Digital Planet: Tomorrow’s Technology and You
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
C HAPTER 7 Managing Disk and File System. I NTRODUCING DISK MANAGEMENT 2 types of hard disk storage supported by Windows XP are: basic hard disk & dynamic.
MCTS Guide to Microsoft Windows Vista Chapter 4 Managing Disks.
Cloud Computing A set of Internet-based application.
Disks Chapter 5 Thursday, April 5, Today’s Schedule Input/Output – Disks (Chapter 5.4)  Magnetic vs. Optical Disks  RAID levels and functions.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 11: File System Implementation.
CE Operating Systems Lecture 17 File systems – interface and implementation.
HADOOP DISTRIBUTED FILE SYSTEM HDFS Reliability Based on “The Hadoop Distributed File System” K. Shvachko et al., MSST 2010 Michael Tsitrin 26/05/13.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Information Systems in Organizations 5.2 Cloud Computing.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Pengantar Multimedia.  Primary (accessible by CPU, volatile ex ROM) Registers Cache Main Memory ROM (Read Only Memory, but not so)
Chapter 6 Discovering Computers Fundamentals Storage.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Why is my computer so slow? Find Reason and How You can Speed up Your Computer.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
File System Department of Computer Science Southern Illinois University Edwardsville Spring, 2016 Dr. Hiroshi Fujinoki CS 314.
ITMT Windows 7 Configuration Chapter 4 – Working with Disks and Devices ITMT 1371 – Windows 7 Configuration 1.
How to Recover Data from SanDisk Memory Card ?. 2 Sources:
Are you on the lookout of a good PC backup software? Well, your PC is surely like your virtual diary in this contemporary digital where you store all your.
File-System Management
Dedicated Servers vs Cloud Hosting
Cloud computing-The Future Technologies
Windows XP File Systems
Introduction to Computers
Modern PC operating systems
LO3 – Understand Business IT Systems
Storage Management Lecture 7.
Department of Computer Science
Chapter 5 File Systems -Compiled for MCA, PU
Presentation transcript:

1 Information Management DIG 3563 – Lecture 17 File Structures and Cloud Computing J. Michael Moshell University of Central Florida Original image* by Moshell et al. Imagery is fromWikimedia except where marked with *.

-2 - File System Organization recovermyfiles.com * Disks have sectors; each sector has an address (integer) * A file is a collection of sectors. They can be contiguous or fragmented. * To find the sectors comprising a file, we need a directory. * The directory system records which sectors belong to each file. * The Operating System has software to manage directories & files. planetoftunes.com

-3 - Formatting a Disk * factory (low level) format: - timing tracks, etc. "marks in the parking lot" - usually not re-doable * local reformatting: * Check for read/write errors * Mark good sectors and bad ones * Create a list of available sectors * Set up file structure: - directory - boot sector (for bootable drives) stripespls.com

-4 - File System Organization recovermyfiles.com * A simple (conceptual) architecture: Directory: * at sectors 22010, we have records: So the file is a linked list (like a treasure hunt) through the disk's sectors. (Not all disks are organized this way.) planetoftunes.com DirnumFilenameFilesizeHeadsector 1addresses.doc employees.doc payroll.xls etc blockdirnumnextblockdata Adams, John \t 222 West Wilson, Steve \t 333 East...

-5 - File System Errors * Disk drive hardware checks parity when reading sectors * If a parity error occurs, data may have been lost * Usually this just reports a failure to the OS and you're stuck. However – the actual disk drive hardware can probably still read the data; it just doesn't LIKE it. So, specialized software can sometimes get this "bad checksum" data and display it... we discuss this shortly.

-6 - File System Organization recovermyfiles.com * Deleting a file: The OS keeps an available sector list of sectors that can be reused. To DELETE a file, the system just changes its first and last links. (Think of out-of-service boxcars). The data is not gone, it's just unlinked. It will be overwritten, when (and if) the OS needs more space. tdc.ca

-7 - Losing and Recovering Data recovermyfiles.com Now what if the directory or a sector gets screwed up? a) software error: erase the pointer or link to a file. or b) hardware error: part of directory or sector gets corrupted The data is still out there, but OS can't find it. If you can directly READ THE SECTORS, you will find broken strands of spaghetti... with clues in 'em. restaurantwidow.com

-8 - Recovering Data What clues exist? Links (obviously) if it's a linked system Try to reconstruct the files, or fragments of them Directory item numbers, if these exist Try to "work backwards" and reconstruct the directory The data itself (e. g. search for "Adams") Use syntactic knowledge to match up partial sentences in blocks. Which block might match that one?.. and we re nguins live in Antarc... spect the opinions of \t 333.9e14...

-9 - Recovering Data If you have 'bad sectors' (i. e. bad checksums) Read the data and override the parity error messages Humans are normally required to look at the data and piece it back together. Success is not guaranteed. Formatting a drive writes 0 in all the sectors. SOME claim they can recover what was there before (maybe NSA can?) But it is not a high-percentage bet.

-10 - Forensics: Finding Hidden Stuff * simplest cases: just "erased" your files? - straightforward disk recovery may work. * the famous photocopier story. - copiers have hard drives and remember what was copied shtml * RAMsticks are just like hard drives; "delete" does not empty. (Nonvolatile RAM versus volatile RAM. Why isn't it ALL nonvolatile?) macforensiclabs.com

-11 - Forensics: Finding Hidden Stuff * virtual memory: copies part of your RAM into hard drive on computer. * those images may include print queues and other information that can be recovered. * backup systems may not have been reformatted even if the main hard drive was reformatted. * offsite backup probably was NOT reformatted; old sectors may have copies of data you wanted to make disappear. macforensiclabs.com

-12 - File Structures: Summary * vocabulary terms throughout lecture * backup/archive/redundant storage * criteria for choice of offsite backup * understand and explain disk organization * understand how disk errors occur * analyze what data could be recovered from a particular accident * discuss forensic issues concerning disk data erasure and recovery motifake.com

-13 - Cloud Computing and Digital Asset Management First let's look at the Cloud - Where did it come from? - What is it? - How can it help me? - What new skills will I need to use it? - What effect does Cloud have on DAM?

-14 - As of the Year Most Internet Service Providers sold (... rented...) dedicated hosting One website: delivered by 1 computer mystore.com shared virtual hosting yourstore.com N websites each got 1/Nth computer histore.com herstore.com

Built giant 'ad hoc' systems with thousands of CPUs and petabytes of storage phaseoneenterprises.com And a few giants (Yahoo, Google, Amazon)

And a few giants (Yahoo, Google, Amazon) Built giant 'ad hoc' systems with thousands of CPUs and petabytes of storage. Amazon noticed... less than 10% of their capacity was being used most of the time phaseoneenterprises.com

-17 - en.wikimedia.org... and in 2006 launched Amazon Web Services The 'utility model': power plants have capacity to meet AVERAGE demand and so can deliver UNLIMITED* power to some customers when needed. (*"Unlimited" as long as << total capacity)

Astronomers worldwide now schedule time on big telescopes through the Internet and don't have to go to a cold mountaintop and stay up all night to capture imagery as.utexas.edu The Shared Telescope Model

NASA released NEBULA in 2008, to share research computers instead of building additional data centers. NEBULA is an open source cloud management system The Shared Computing Model

Before PCs, we programmed on punch-cards as.utexas.edu... resembles the old Mainframe Timeshare model

Before PCs, we programmed on punch-cards and thought it was a great INNOVATION when time-sharing became possible as.utexas.edu... resembles the old Mainframe Timeshare model

In 1965 this was SCARCE and we were NUMEROUS (relatively) (Skilled specialists who wanted to use computers) as.utexas.edu But with one fundamental difference: redlinecs.com.au

In 2012 this is ABUNDANT and we are EVERYONE allthingsdistributed.com But with one fundamental difference: reuters.com

... may reduce your company's IT costs * software is expensive – so RENT it * hardware is expensive to update – so RENT it * buildings are expensive – so share them * land is expensive – build in rural areas relies on fast, reliable networks

1. Agility through dynamic provisioning - Order up "supercomputer for an hour" 2. API Accessibility - Your program can specify the needed QOS* QOS: Quality of Service: - Maximum guaranteed latency (e. g. <1ms) - Minimum guaranteed CPU (e. g. >1 petaflop) Key Cloud Concepts:

"Floating Point Operations" like x=239.44* per second Math models (physics, stock market, statistics) may need tera = billion*billion of flops giga = 10 9 tera = peta = exa = What's a flop?

1. Agility through dynamic provisioning - Order up "supercomputer for an hour" 2. API Accessibility - Your program can specify the needed QOS* 3. Virtualization - You "THINK" you have your own machine - Protection models don't need to be reinvented Key Cloud Concepts:

SECURITY. (I know this guy) One solution (for larger firms): Build your own Cloud /95900/ / One Key Cloud Concern:

bigbird.com cookie.com elmo.com kermit.com piggie.com Quickly, web-hosts realized that they could virtualize their service

-30 - Software as a Service (SaaS) The 800 pound anthropoid: Salesforce.com sales cloud (CRM systems) force.com – build your own pin.primate.wisc.edu

-31 - Digital Asset Management in the Cloud pin.primate.wisc.edu 1. Simple: Dropbox 2. Specialized for software: Github 3. Rich metadata -> DAM (e. g. AlienBrain) Media Valet - Widen Fordela

-32 - Digital Asset Management in the Cloud pin.primate.wisc.edu 1. Simple: Dropbox 2. Specialized for software: Github 3. Rich metadata -> DAM (e. g. AlienBrain) Media Valet - "CMIS compliant?"

-33 - Content Management Interoperability Standard roperability_Services CMIS is an open standard that defines how DAM systems can manage metadata ("generic properties") for files and folders. Adobe, HP, IBM, Microsoft, Oracle + + +

-34 - Digital Asset Management in the Cloud pin.primate.wisc.edu 1. Simple: Dropbox 2. Specialized for software: Github 3. Rich metadata -> DAM (e. g. AlienBrain) Media Valet Widen - Fordela

-35 - Digital Asset Management in the Cloud pin.primate.wisc.edu 1. Simple: Dropbox 2. Specialized for software: Github 3. Rich metadata -> DAM (e. g. AlienBrain) Media Valet Widen Fordela - VIDEO focus (started by LucasArts veterans)

-36 - Choosing a DAM System pin.primate.wisc.edu Here's a logically organized Buyer's Guide management-buying-guide-1.html

-37 - Choosing a DAM System pin.primate.wisc.edu Here's a logically organized Buyer's Guide management-buying-guide-1.html End of lecture... End of lectureS. When we return... Project Show-and-tell!