Knowledge

Disk cloning

Source 📝

181:, is to boot from a Linux-based operating system so the drive can be copied and/or overwritten. This approach is not suitable for servers that need to be running all the time and cannot be shutdown routinely to perform the backup (or cloning) operation. Further, the Linux-based operating system must provide appropriate drivers for the system's hardware. Drivers are also required for the source and destination drives and for any attached storage involved in facilitating the cloning operation such as USB, tape device and networking drivers. 63: 93:
exclude unwanted data from being duplicated reducing cloning time. For example, the filesystem and partitions can be resized by the software allowing data to be cloned to a drive equal to or greater than the total used space. Most hardware-based cloners typically require for the destination drive to be the same size as the source drive even if only a fraction of the space is used. Some hardware cloners can clone only the used space but tend to be much more expensive.
836: 116:
process itself must not interfere with the data. Because software cannot be installed on the system, a hardware-based cloner is generally used to duplicate the data to another drive or image. Further, the hardware-based cloner also has write-blocking capabilities which intercepts write commands to prevent data being written to the drive.
200:
Disk cloning can be time consuming, especially, for large disks because a true clone needs to copy all the data on the disk even if most data resides in unallocated drive space. Software solutions can determine the space in use and only copy the used data reducing the time needed to clone the drive.
115:
One of the most common applications of disk cloning is for digital forensics purposes. This aims to ensure that data is preserved at the time it was acquired for later analysis. Techniques for cloning a disk for forensic purposes differ from cloning a drive for other purposes. Typically, the cloning
106:
A common use of disk cloning is for deployment. For example, a group of computers with similar hardware can be set up much quicker by cloning the configuration. In educational institutions, students are typically expected to experiment with computers to learn. Disk cloning can be used to help keep
137:
Upgrading to a larger or faster drive can be facilitated by cloning the old drive to the new drive once it is installed into the system. This reduces the need to having to manually reinstall applications, drivers and the operating system. The procedure can be used when migrating from mechanical
92:
Typically, the destination drive is connected to a computer (Fig. 1). Once connected, a disk cloner is used to perform the clone itself. A hardware-based drive cloner can be used which does not require a computer. However, software cloners tend to allow for greater flexibility because they can
124:
Disk cloning can be used as a backup solution by creating a duplicate of data as it existed when the clone was started. The clone can be used to restore corrupted files such as corrupted databases. In modern software solutions, it is not uncommon for disk cloning techniques to be combined with
644: 174:. Consequently, the drive cloner must ensure that the data on the source drive remains in a consistent state at the time of reading. Further, in the case, that the user desires to clone to the computer's system drive, this generally cannot be done while the operating system is running. 146:. Modern cloning software tends to communicate with storage devices through a common interface, which means, that any storage device can be cloned and migrated. Sometimes, booting from the destination drive can fail and require adjustments in the computer's 107:
computers clean and configured correctly. Further, while installing the operating system is quick, installation of programs and ensuring a consistent configuration is time consuming. Thus, disk cloning seeks to mitigate this administrative challenge.
192:(VSS). VSS takes a snapshot of the drive so that any changes are not written to the snapshot. The snapshot creates a virtual drive called a shadow volume that is backed up (or cloned) by the software. 668:
Grasdal, Martin; Hunter, Laura E.; Cross, Michael; Hunter, Laura; Shinder, Debra Littlejohn; Shinder, Thomas W. (2003-01-01), Grasdal, Martin; Hunter, Laura E.; Cross, Michael; Hunter, Laura (eds.),
510: 727: 184:
Some server-based operating system incorporate mechanisms to allow the drive to be safely backed up while the system is running to overcome these challenges. For example,
46:
on the drive. Common reasons for cloning a drive include; data backup and recovery; duplicating a computer's configuration for mass deployment and for preserving data for
73:
Disk cloning occurs by copying the contents of a drive called the source drive. While called "disk cloning", any type of storage medium that connects to the computer via
85:
can be cloned. A small amount of data is read and then held in the computer's memory. The data is then either written directly to another (destination) drive or to a
289:
The 8th Electrical Engineering/ Electronics, Computer, Telecommunications and Information Technology (ECTI) Association of Thailand - Conference 2011
170:
which is running off of one of the drives being cloned. As a result, any attempt to clone the contents of the drive, even to a file, would result in
328:
Turriza, José Luis Lira; Huh, Yaqueline Pech; Lira, Jose Manuel (2018). "Comparative study of restoration tools by cloning using LSP me-thod".
758: 703: 69:: An illustration of connecting two drives to a computer to clone one drive (the source drive) to another (the destination) drive. 202: 681: 447: 304: 214: 239: 596: 786: 356: 54:
where the cloned data is saved to one or more files on another drive rather than copied directly to another drive.
875: 234: 620: 751: 572: 669: 865: 398: 839: 744: 471:
Manson, Dan; Carlin, Anna; Ramos, Steve; Gyger, Alain; Kaufman, Matthew; Treichelt, Jeremy (2007).
158:
There are several technical challenges that need to be considered when planning to clone a drive.
432:
2015 IEEE 21st International Symposium for Design and Technology in Electronic Packaging (SIITME)
229: 796: 670:"Chapter 8 - MCSE 70-293: Planning, Implementing, and Maintaining a High-Availability Strategy" 34:, using hardware or software techniques. Unlike file copying, disk cloning also duplicates the 860: 728:
Shadow volume trash: $ Recycle. Bin forensics for Windows 7 and Windows Vista shadow volumes
736: 821: 511:"Deleting collected digital evidence by exploiting a widely adopted hardware write blocker" 177:
A common solution to cloning a drive that is in use, which is utilized by software such as
8: 254: 185: 283:
Panichprecha, S.; Pongsawatkul, N.; Mitrpant, C.; Ketprom, U.; Kovintavewat, P. (2011).
801: 488: 453: 310: 677: 535: 443: 352: 300: 143: 47: 39: 31: 492: 457: 314: 525: 480: 435: 292: 167: 870: 767: 296: 171: 139: 27: 23: 554: 439: 530: 472: 427: 284: 219: 477:
2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)
374:"Kadeploy3: Efficient and Scalable Operating System Provisioning for Clusters" 854: 539: 249: 509:
Meffert, Christopher S.; Baggili, Ibrahim; Breitinger, Frank (2016-08-07).
484: 126: 51: 62: 473:"Is the Open Way a Better Way? Digital Forensics Using Open Source Tools" 189: 43: 35: 806: 282: 224: 178: 86: 816: 791: 373: 372:
Jeanvoine, Emmanuel; Sarzyniec, Luc; Nussbaum, Lucas (2013-02-01).
244: 428:"Ad-hoc lab computer network configuration using remote resources" 811: 555:"BEST PRACTICE FOR COMPUTER IMAGING AND MAINTAINING A DATABASE" 766: 573:"How to Clone Hard Drive on Windows 10 without Reinstalling" 147: 82: 78: 371: 16:
Process of duplicating all data on a digital storage drive
399:"Everything You Should Know About Hard Drive Duplicators" 74: 667: 597:"How to Upgrade HDD to SSD without Reinstalling Windows" 508: 50:
purposes. Drive cloning can be used in conjunction with
470: 349:
A Practical Guide to Computer Forensics Investigations
852: 425: 327: 752: 621:"Fixed: Cloned Hard Drive or SSD Won't Boot" 22:is the process of duplicating all data on a 701: 426:Bălan, T.C.; Robu, D.N.; Sandu, F. (2015). 205:to further speed up the cloning operation. 759: 745: 643:Yao, J. F. J., & Carlisle, J. (2011). 649:Journal of Computing Sciences in Colleges 529: 129:techniques to create a backup solution. 676:, Rockland: Syngress, pp. 559–638, 552: 166:Often, cloning software runs within the 61: 153: 853: 559:Student Scholarship – Computer Science 740: 663: 661: 351:. Pearson Education. pp. 86–87. 346: 504: 502: 421: 419: 393: 391: 278: 276: 274: 272: 270: 110: 215:Comparison of disk cloning software 13: 658: 240:List of disk partitioning software 14: 887: 787:Acronis Cyber Protect Home Office 645:Self-support computer science lab 553:Babalola, Olawunmi (2018-03-02). 499: 416: 388: 267: 835: 834: 285:"Multi-threading in disk cloner" 150:to make the new clone bootable. 132: 720: 702:JasonGerend (7 December 2022). 695: 637: 613: 589: 565: 201:Some drive cloners make use of 161: 96: 674:MCSE (Exam 70-293) Study Guide 546: 464: 365: 340: 321: 235:List of data recovery software 1: 260: 101: 57: 704:"Volume Shadow Copy Service" 297:10.1109/ECTICON.2011.5947887 7: 440:10.1109/SIITME.2015.7342360 208: 10: 892: 531:10.1016/j.diin.2016.04.004 830: 779: 347:Hayes, Darren R. (2014). 119: 726:Leschke, T. R. (2010). 230:List of backup software 195: 876:Utility software types 485:10.1109/HICSS.2007.301 70: 42:, drive meta data and 518:Digital Investigation 190:volume shadow service 188:(and later) includes 65: 434:. pp. 393–396. 291:. pp. 512–515. 154:Technical challenges 708:learn.microsoft.com 330:Revista Ingeniantes 255:Security Identifier 186:Windows Server 2003 802:Carbon Copy Cloner 378:USENIX Association 144:solid state drives 71: 848: 847: 683:978-1-931836-93-7 479:. pp. 266b. 449:978-1-5090-0332-7 306:978-1-4577-0425-3 111:Digital forensics 48:digital forensics 32:solid state drive 26:drive, such as a 883: 866:Storage software 838: 837: 761: 754: 747: 738: 737: 731: 724: 718: 717: 715: 714: 699: 693: 692: 691: 690: 665: 656: 641: 635: 634: 632: 631: 625:www.diskpart.com 617: 611: 610: 608: 607: 601:www.diskpart.com 593: 587: 586: 584: 583: 577:www.diskpart.com 569: 563: 562: 550: 544: 543: 533: 515: 506: 497: 496: 468: 462: 461: 423: 414: 413: 411: 410: 395: 386: 385: 369: 363: 362: 344: 338: 337: 325: 319: 318: 280: 168:operating system 140:hard disk drives 891: 890: 886: 885: 884: 882: 881: 880: 851: 850: 849: 844: 826: 775: 768:Backup software 765: 735: 734: 725: 721: 712: 710: 700: 696: 688: 686: 684: 666: 659: 642: 638: 629: 627: 619: 618: 614: 605: 603: 595: 594: 590: 581: 579: 571: 570: 566: 551: 547: 513: 507: 500: 469: 465: 450: 424: 417: 408: 406: 397: 396: 389: 370: 366: 359: 345: 341: 326: 322: 307: 281: 268: 263: 211: 198: 172:data corruption 164: 156: 135: 122: 113: 104: 99: 60: 24:digital storage 17: 12: 11: 5: 889: 879: 878: 873: 868: 863: 846: 845: 843: 842: 831: 828: 827: 825: 824: 819: 814: 809: 804: 799: 794: 789: 783: 781: 777: 776: 764: 763: 756: 749: 741: 733: 732: 719: 694: 682: 657: 636: 612: 588: 564: 545: 498: 463: 448: 415: 387: 364: 357: 339: 320: 305: 265: 264: 262: 259: 258: 257: 252: 247: 242: 237: 232: 227: 222: 220:Disk mirroring 217: 210: 207: 203:multithreading 197: 194: 163: 160: 155: 152: 134: 131: 121: 118: 112: 109: 103: 100: 98: 95: 59: 56: 15: 9: 6: 4: 3: 2: 888: 877: 874: 872: 869: 867: 864: 862: 859: 858: 856: 841: 833: 832: 829: 823: 820: 818: 815: 813: 810: 808: 805: 803: 800: 798: 795: 793: 790: 788: 785: 784: 782: 778: 773: 769: 762: 757: 755: 750: 748: 743: 742: 739: 729: 723: 709: 705: 698: 685: 679: 675: 671: 664: 662: 654: 650: 646: 640: 626: 622: 616: 602: 598: 592: 578: 574: 568: 560: 556: 549: 541: 537: 532: 527: 523: 519: 512: 505: 503: 494: 490: 486: 482: 478: 474: 467: 459: 455: 451: 445: 441: 437: 433: 429: 422: 420: 404: 400: 394: 392: 383: 379: 375: 368: 360: 358:9780132756150 354: 350: 343: 335: 331: 324: 316: 312: 308: 302: 298: 294: 290: 286: 279: 277: 275: 273: 271: 266: 256: 253: 251: 250:Recovery disc 248: 246: 243: 241: 238: 236: 233: 231: 228: 226: 223: 221: 218: 216: 213: 212: 206: 204: 193: 191: 187: 182: 180: 175: 173: 169: 159: 151: 149: 145: 141: 133:Drive upgrade 130: 128: 117: 108: 94: 90: 88: 84: 80: 76: 68: 64: 55: 53: 52:drive imaging 49: 45: 41: 37: 33: 29: 25: 21: 861:Disk cloning 822:Time Machine 772:disk cloning 771: 722: 711:. Retrieved 707: 697: 687:, retrieved 673: 652: 648: 639: 628:. Retrieved 624: 615: 604:. Retrieved 600: 591: 580:. Retrieved 576: 567: 558: 548: 521: 517: 476: 466: 431: 407:. Retrieved 405:. 2021-12-28 402: 381: 377: 367: 348: 342: 333: 329: 323: 288: 199: 183: 176: 165: 162:Drive in use 157: 148:UEFI or BIOS 136: 127:disk imaging 123: 114: 105: 97:Applications 91: 72: 66: 20:Disk cloning 19: 18: 655:(4), 64-70. 524:: S87–S96. 44:slack space 36:filesystems 855:Categories 807:Clonezilla 797:BorgBackup 713:2023-01-09 689:2023-01-09 630:2023-01-09 606:2023-01-09 582:2023-01-09 409:2023-01-09 261:References 225:Disk image 179:CloneZilla 102:Deployment 87:disk image 58:Background 40:partitions 792:Backblaze 540:1742-2876 28:hard disk 840:Category 774:software 493:15273267 458:39545275 403:MiniTool 384:(1): 38. 315:15754588 245:Live USB 209:See also 67:Figure 1 336:(1): 1. 871:Backup 812:Code42 780:Active 680:  538:  491:  456:  446:  355:  313:  303:  120:Backup 514:(PDF) 489:S2CID 454:S2CID 311:S2CID 770:and 678:ISBN 536:ISSN 444:ISBN 353:ISBN 301:ISBN 196:Slow 83:SATA 79:NVMe 526:doi 481:doi 436:doi 293:doi 142:to 89:. 81:or 75:USB 30:or 857:: 817:dd 706:. 672:, 660:^ 653:26 651:, 647:. 623:. 599:. 575:. 557:. 534:. 522:18 520:. 516:. 501:^ 487:. 475:. 452:. 442:. 430:. 418:^ 401:. 390:^ 382:38 380:. 376:. 332:. 309:. 299:. 287:. 269:^ 77:, 38:, 760:e 753:t 746:v 730:. 716:. 633:. 609:. 585:. 561:. 542:. 528:: 495:. 483:: 460:. 438:: 412:. 361:. 334:5 317:. 295::

Index

digital storage
hard disk
solid state drive
filesystems
partitions
slack space
digital forensics
drive imaging

USB
NVMe
SATA
disk image
disk imaging
hard disk drives
solid state drives
UEFI or BIOS
operating system
data corruption
CloneZilla
Windows Server 2003
volume shadow service
multithreading
Comparison of disk cloning software
Disk mirroring
Disk image
List of backup software
List of data recovery software
List of disk partitioning software
Live USB

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.