181:, is to boot from a Linux-based operating system so the drive can be copied and/or overwritten. This approach is not suitable for servers that need to be running all the time and cannot be shutdown routinely to perform the backup (or cloning) operation. Further, the Linux-based operating system must provide appropriate drivers for the system's hardware. Drivers are also required for the source and destination drives and for any attached storage involved in facilitating the cloning operation such as USB, tape device and networking drivers.
63:
93:
exclude unwanted data from being duplicated reducing cloning time. For example, the filesystem and partitions can be resized by the software allowing data to be cloned to a drive equal to or greater than the total used space. Most hardware-based cloners typically require for the destination drive to be the same size as the source drive even if only a fraction of the space is used. Some hardware cloners can clone only the used space but tend to be much more expensive.
836:
116:
process itself must not interfere with the data. Because software cannot be installed on the system, a hardware-based cloner is generally used to duplicate the data to another drive or image. Further, the hardware-based cloner also has write-blocking capabilities which intercepts write commands to prevent data being written to the drive.
200:
Disk cloning can be time consuming, especially, for large disks because a true clone needs to copy all the data on the disk even if most data resides in unallocated drive space. Software solutions can determine the space in use and only copy the used data reducing the time needed to clone the drive.
115:
One of the most common applications of disk cloning is for digital forensics purposes. This aims to ensure that data is preserved at the time it was acquired for later analysis. Techniques for cloning a disk for forensic purposes differ from cloning a drive for other purposes. Typically, the cloning
106:
A common use of disk cloning is for deployment. For example, a group of computers with similar hardware can be set up much quicker by cloning the configuration. In educational institutions, students are typically expected to experiment with computers to learn. Disk cloning can be used to help keep
137:
Upgrading to a larger or faster drive can be facilitated by cloning the old drive to the new drive once it is installed into the system. This reduces the need to having to manually reinstall applications, drivers and the operating system. The procedure can be used when migrating from mechanical
92:
Typically, the destination drive is connected to a computer (Fig. 1). Once connected, a disk cloner is used to perform the clone itself. A hardware-based drive cloner can be used which does not require a computer. However, software cloners tend to allow for greater flexibility because they can
124:
Disk cloning can be used as a backup solution by creating a duplicate of data as it existed when the clone was started. The clone can be used to restore corrupted files such as corrupted databases. In modern software solutions, it is not uncommon for disk cloning techniques to be combined with
644:
174:. Consequently, the drive cloner must ensure that the data on the source drive remains in a consistent state at the time of reading. Further, in the case, that the user desires to clone to the computer's system drive, this generally cannot be done while the operating system is running.
146:. Modern cloning software tends to communicate with storage devices through a common interface, which means, that any storage device can be cloned and migrated. Sometimes, booting from the destination drive can fail and require adjustments in the computer's
107:
computers clean and configured correctly. Further, while installing the operating system is quick, installation of programs and ensuring a consistent configuration is time consuming. Thus, disk cloning seeks to mitigate this administrative challenge.
192:(VSS). VSS takes a snapshot of the drive so that any changes are not written to the snapshot. The snapshot creates a virtual drive called a shadow volume that is backed up (or cloned) by the software.
668:
Grasdal, Martin; Hunter, Laura E.; Cross, Michael; Hunter, Laura; Shinder, Debra
Littlejohn; Shinder, Thomas W. (2003-01-01), Grasdal, Martin; Hunter, Laura E.; Cross, Michael; Hunter, Laura (eds.),
510:
727:
184:
Some server-based operating system incorporate mechanisms to allow the drive to be safely backed up while the system is running to overcome these challenges. For example,
46:
on the drive. Common reasons for cloning a drive include; data backup and recovery; duplicating a computer's configuration for mass deployment and for preserving data for
73:
Disk cloning occurs by copying the contents of a drive called the source drive. While called "disk cloning", any type of storage medium that connects to the computer via
85:
can be cloned. A small amount of data is read and then held in the computer's memory. The data is then either written directly to another (destination) drive or to a
289:
The 8th
Electrical Engineering/ Electronics, Computer, Telecommunications and Information Technology (ECTI) Association of Thailand - Conference 2011
170:
which is running off of one of the drives being cloned. As a result, any attempt to clone the contents of the drive, even to a file, would result in
328:
Turriza, José Luis Lira; Huh, Yaqueline Pech; Lira, Jose Manuel (2018). "Comparative study of restoration tools by cloning using LSP me-thod".
758:
703:
69:: An illustration of connecting two drives to a computer to clone one drive (the source drive) to another (the destination) drive.
202:
681:
447:
304:
214:
239:
596:
786:
356:
54:
where the cloned data is saved to one or more files on another drive rather than copied directly to another drive.
875:
234:
620:
751:
572:
669:
865:
398:
839:
744:
471:
Manson, Dan; Carlin, Anna; Ramos, Steve; Gyger, Alain; Kaufman, Matthew; Treichelt, Jeremy (2007).
158:
There are several technical challenges that need to be considered when planning to clone a drive.
432:
2015 IEEE 21st
International Symposium for Design and Technology in Electronic Packaging (SIITME)
229:
796:
670:"Chapter 8 - MCSE 70-293: Planning, Implementing, and Maintaining a High-Availability Strategy"
34:, using hardware or software techniques. Unlike file copying, disk cloning also duplicates the
860:
728:
Shadow volume trash: $ Recycle. Bin forensics for
Windows 7 and Windows Vista shadow volumes
736:
821:
511:"Deleting collected digital evidence by exploiting a widely adopted hardware write blocker"
177:
A common solution to cloning a drive that is in use, which is utilized by software such as
8:
254:
185:
283:
Panichprecha, S.; Pongsawatkul, N.; Mitrpant, C.; Ketprom, U.; Kovintavewat, P. (2011).
801:
488:
453:
310:
677:
535:
443:
352:
300:
143:
47:
39:
31:
492:
457:
314:
525:
480:
435:
292:
167:
870:
767:
296:
171:
139:
27:
23:
554:
439:
530:
472:
427:
284:
219:
477:
2007 40th Annual Hawaii
International Conference on System Sciences (HICSS'07)
374:"Kadeploy3: Efficient and Scalable Operating System Provisioning for Clusters"
854:
539:
249:
509:
Meffert, Christopher S.; Baggili, Ibrahim; Breitinger, Frank (2016-08-07).
484:
126:
51:
62:
473:"Is the Open Way a Better Way? Digital Forensics Using Open Source Tools"
189:
43:
35:
806:
282:
224:
178:
86:
816:
791:
373:
372:
Jeanvoine, Emmanuel; Sarzyniec, Luc; Nussbaum, Lucas (2013-02-01).
244:
428:"Ad-hoc lab computer network configuration using remote resources"
811:
555:"BEST PRACTICE FOR COMPUTER IMAGING AND MAINTAINING A DATABASE"
766:
573:"How to Clone Hard Drive on Windows 10 without Reinstalling"
147:
82:
78:
371:
16:
Process of duplicating all data on a digital storage drive
399:"Everything You Should Know About Hard Drive Duplicators"
74:
667:
597:"How to Upgrade HDD to SSD without Reinstalling Windows"
508:
50:
purposes. Drive cloning can be used in conjunction with
470:
349:
A Practical Guide to
Computer Forensics Investigations
852:
425:
327:
752:
621:"Fixed: Cloned Hard Drive or SSD Won't Boot"
22:is the process of duplicating all data on a
701:
426:Bălan, T.C.; Robu, D.N.; Sandu, F. (2015).
205:to further speed up the cloning operation.
759:
745:
643:Yao, J. F. J., & Carlisle, J. (2011).
649:Journal of Computing Sciences in Colleges
529:
129:techniques to create a backup solution.
676:, Rockland: Syngress, pp. 559–638,
552:
166:Often, cloning software runs within the
61:
153:
853:
559:Student Scholarship – Computer Science
740:
663:
661:
351:. Pearson Education. pp. 86–87.
346:
504:
502:
421:
419:
393:
391:
278:
276:
274:
272:
270:
110:
215:Comparison of disk cloning software
13:
658:
240:List of disk partitioning software
14:
887:
787:Acronis Cyber Protect Home Office
645:Self-support computer science lab
553:Babalola, Olawunmi (2018-03-02).
499:
416:
388:
267:
835:
834:
285:"Multi-threading in disk cloner"
150:to make the new clone bootable.
132:
720:
702:JasonGerend (7 December 2022).
695:
637:
613:
589:
565:
201:Some drive cloners make use of
161:
96:
674:MCSE (Exam 70-293) Study Guide
546:
464:
365:
340:
321:
235:List of data recovery software
1:
260:
101:
57:
704:"Volume Shadow Copy Service"
297:10.1109/ECTICON.2011.5947887
7:
440:10.1109/SIITME.2015.7342360
208:
10:
892:
531:10.1016/j.diin.2016.04.004
830:
779:
347:Hayes, Darren R. (2014).
119:
726:Leschke, T. R. (2010).
230:List of backup software
195:
876:Utility software types
485:10.1109/HICSS.2007.301
70:
42:, drive meta data and
518:Digital Investigation
190:volume shadow service
188:(and later) includes
65:
434:. pp. 393–396.
291:. pp. 512–515.
154:Technical challenges
708:learn.microsoft.com
330:Revista Ingeniantes
255:Security Identifier
186:Windows Server 2003
802:Carbon Copy Cloner
378:USENIX Association
144:solid state drives
71:
848:
847:
683:978-1-931836-93-7
479:. pp. 266b.
449:978-1-5090-0332-7
306:978-1-4577-0425-3
111:Digital forensics
48:digital forensics
32:solid state drive
26:drive, such as a
883:
866:Storage software
838:
837:
761:
754:
747:
738:
737:
731:
724:
718:
717:
715:
714:
699:
693:
692:
691:
690:
665:
656:
641:
635:
634:
632:
631:
625:www.diskpart.com
617:
611:
610:
608:
607:
601:www.diskpart.com
593:
587:
586:
584:
583:
577:www.diskpart.com
569:
563:
562:
550:
544:
543:
533:
515:
506:
497:
496:
468:
462:
461:
423:
414:
413:
411:
410:
395:
386:
385:
369:
363:
362:
344:
338:
337:
325:
319:
318:
280:
168:operating system
140:hard disk drives
891:
890:
886:
885:
884:
882:
881:
880:
851:
850:
849:
844:
826:
775:
768:Backup software
765:
735:
734:
725:
721:
712:
710:
700:
696:
688:
686:
684:
666:
659:
642:
638:
629:
627:
619:
618:
614:
605:
603:
595:
594:
590:
581:
579:
571:
570:
566:
551:
547:
513:
507:
500:
469:
465:
450:
424:
417:
408:
406:
397:
396:
389:
370:
366:
359:
345:
341:
326:
322:
307:
281:
268:
263:
211:
198:
172:data corruption
164:
156:
135:
122:
113:
104:
99:
60:
24:digital storage
17:
12:
11:
5:
889:
879:
878:
873:
868:
863:
846:
845:
843:
842:
831:
828:
827:
825:
824:
819:
814:
809:
804:
799:
794:
789:
783:
781:
777:
776:
764:
763:
756:
749:
741:
733:
732:
719:
694:
682:
657:
636:
612:
588:
564:
545:
498:
463:
448:
415:
387:
364:
357:
339:
320:
305:
265:
264:
262:
259:
258:
257:
252:
247:
242:
237:
232:
227:
222:
220:Disk mirroring
217:
210:
207:
203:multithreading
197:
194:
163:
160:
155:
152:
134:
131:
121:
118:
112:
109:
103:
100:
98:
95:
59:
56:
15:
9:
6:
4:
3:
2:
888:
877:
874:
872:
869:
867:
864:
862:
859:
858:
856:
841:
833:
832:
829:
823:
820:
818:
815:
813:
810:
808:
805:
803:
800:
798:
795:
793:
790:
788:
785:
784:
782:
778:
773:
769:
762:
757:
755:
750:
748:
743:
742:
739:
729:
723:
709:
705:
698:
685:
679:
675:
671:
664:
662:
654:
650:
646:
640:
626:
622:
616:
602:
598:
592:
578:
574:
568:
560:
556:
549:
541:
537:
532:
527:
523:
519:
512:
505:
503:
494:
490:
486:
482:
478:
474:
467:
459:
455:
451:
445:
441:
437:
433:
429:
422:
420:
404:
400:
394:
392:
383:
379:
375:
368:
360:
358:9780132756150
354:
350:
343:
335:
331:
324:
316:
312:
308:
302:
298:
294:
290:
286:
279:
277:
275:
273:
271:
266:
256:
253:
251:
250:Recovery disc
248:
246:
243:
241:
238:
236:
233:
231:
228:
226:
223:
221:
218:
216:
213:
212:
206:
204:
193:
191:
187:
182:
180:
175:
173:
169:
159:
151:
149:
145:
141:
133:Drive upgrade
130:
128:
117:
108:
94:
90:
88:
84:
80:
76:
68:
64:
55:
53:
52:drive imaging
49:
45:
41:
37:
33:
29:
25:
21:
861:Disk cloning
822:Time Machine
772:disk cloning
771:
722:
711:. Retrieved
707:
697:
687:, retrieved
673:
652:
648:
639:
628:. Retrieved
624:
615:
604:. Retrieved
600:
591:
580:. Retrieved
576:
567:
558:
548:
521:
517:
476:
466:
431:
407:. Retrieved
405:. 2021-12-28
402:
381:
377:
367:
348:
342:
333:
329:
323:
288:
199:
183:
176:
165:
162:Drive in use
157:
148:UEFI or BIOS
136:
127:disk imaging
123:
114:
105:
97:Applications
91:
72:
66:
20:Disk cloning
19:
18:
655:(4), 64-70.
524:: S87–S96.
44:slack space
36:filesystems
855:Categories
807:Clonezilla
797:BorgBackup
713:2023-01-09
689:2023-01-09
630:2023-01-09
606:2023-01-09
582:2023-01-09
409:2023-01-09
261:References
225:Disk image
179:CloneZilla
102:Deployment
87:disk image
58:Background
40:partitions
792:Backblaze
540:1742-2876
28:hard disk
840:Category
774:software
493:15273267
458:39545275
403:MiniTool
384:(1): 38.
315:15754588
245:Live USB
209:See also
67:Figure 1
336:(1): 1.
871:Backup
812:Code42
780:Active
680:
538:
491:
456:
446:
355:
313:
303:
120:Backup
514:(PDF)
489:S2CID
454:S2CID
311:S2CID
770:and
678:ISBN
536:ISSN
444:ISBN
353:ISBN
301:ISBN
196:Slow
83:SATA
79:NVMe
526:doi
481:doi
436:doi
293:doi
142:to
89:.
81:or
75:USB
30:or
857::
817:dd
706:.
672:,
660:^
653:26
651:,
647:.
623:.
599:.
575:.
557:.
534:.
522:18
520:.
516:.
501:^
487:.
475:.
452:.
442:.
430:.
418:^
401:.
390:^
382:38
380:.
376:.
332:.
309:.
299:.
287:.
269:^
77:,
38:,
760:e
753:t
746:v
730:.
716:.
633:.
609:.
585:.
561:.
542:.
528::
495:.
483::
460:.
438::
412:.
361:.
334:5
317:.
295::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.