Where Did All The Bytes Go?
نویسندگان
چکیده
Configuring, installing, re-configuring, and re-installing disk drives can be time consuming. Understanding the physical disk and how UNIX file systems are laid out on disk drives can not only help an administrator troubleshoot problems, but can allow him/her to maximize the amount of disk space available. Standard formatting utilities tend to configure disks with similar geometry identically. By using different geometry parameters or third party formatting programs, you can get the maximum amount of disk space from your drives. This paper is a tutorial on understanding SCSI disk drive geometry (and how it differs from more traditional drives ) and the steps required to get a disk drive to the point where it is usable (e.g., with a UNIX file system on it.) It includes practical tips such as questions to ask vendors so you know how much usable space you will have when you purchase a disk drive. It also include a case study where we show how you can squeeze additional usable disk space from a drive. This paper is targeted at novice system administrators, but experienced administrators who want to learn more about disk drives will hopefully learn something from reading this paper. The examples we use will be based on a BSD system, but the concepts apply to other types of UNIX systems as well. Background and Motivation Disk drives are probably one of the biggest headaches administrators will ever run across. Our experience has been that the number of disk drives increases the support effort significantly. One of the reasons is the amount of time involved in installation and reconfiguration of disk drives. Figuring out how to configure the drives and backing up and restoring the files on the existing drives can take a lot of time. Standard hardware interfaces (de facto as well as official) have helped create a market where users can pick and choose different combinations of disk drives and controllers. The Small Computer System Interface (SCSI) is the most common type of bus found on workstations today. Vendors typically use a proprietary, high-speed bus to connect CPUs with memory and SCSI to connect I/O devices and peripherals. The SCSI specification is published and vendors have used this specification to manufacture hundreds of SCSI devices. This allows customers to select the device that best meets their needs and the computer vendors can focus on their processor and operating-system technologies. Many computer vendors supply default configuration information for configuring disks drives. However, these defaults are not optimized for each disk and by taking the time to perform the calculations yourself, you can maximize the amount of disk space available after configuring the disk.
منابع مشابه
Whither Mental Health Policy-Where Does It Come from and Does It Go Anywhere Useful?; Comment on “Cross-National Diffusion of Mental Health Policy”
Factors influencing cross-national diffusion of mental health policy are important to understand but complex to research. This commentary discusses Shen’s research study on cross-national diffusion of mental health policy; examines the extent to which the three questions researched by Shen (whether countries are more likely to have a mental health policy (a) the earlier a country becomes a memb...
متن کاملA Known Plaintext Attack on the PKZIP Stream Cipher
Table 3. Complexity of the attack by the size of the known plaintext and any other le which is encrypted by the same key. This known plaintext attack breaks the cipher using 40 (compressed) known plaintext bytes, or about the 200 rst uncompressed bytes (if the le is compressed), with complexity 2 34. Using about 10000 known plaintext bytes, the complexity is reduced to about 2 27. Table 3 descr...
متن کاملFull Plaintext Recovery Attack on Broadcast RC4
This paper investigates the practical security of RC4 in broadcast setting where the same plaintext is encrypted with different user keys. We introduce several new biases in the initial (1st to 257th) bytes of the RC4 keystream, which are substantially stronger than known biases. Combining the new biases with the known ones, a cumulative list of strong biases in the first 257 bytes of the RC4 k...
متن کاملImproved recovery and reconstruction of DEFLATEd files
This paper presents a method for recovering data from files compressed with the DEFLATE algorithm where short segments in the middle of the file have been corrupted, yielding a mix of literal bytes, bytes aligned with literals across the corrupted segment, and coindexed unknown bytes. An improved reconstruction algorithm based on long byte ngrams increases the proportion of reconstructed bytes ...
متن کاملNovel Impossible Differential Cryptanalysis of Zorro Block Cipher
Impossible difference attack is a powerful tool for evaluating the security of block ciphers based on finding a differential characteristic with the probability of exactly zero. The linear layer diffusion rate of a cipher plays a fundamental role in the security of the algorithm against the impossible difference attack. In this paper, we show an efficient method, which is independent of the qua...
متن کاملFeasibility Analysis of Using Anatomic and Dental Formulas in Human Identification
Background and purpose: Dental and skeletal features, unlike soft tissues, remain unchanged in events where most body tissues are destroyed such as car accidents, plane crash, crimes, etc. Panoramic and lateral cephalometric radiographs can provide useful information about dental and cephalometric indicators in human identification. Materials and methods: A cohort retrospective study was carri...
متن کامل