Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Disk cloning
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Process of duplicating all data on a digital storage drive}} '''Disk cloning''' is the process of duplicating all data on a [[Digital Storage|digital storage]] drive, such as a [[Hard disk drive|hard disk]] or [[Solid-state drive|solid state drive]], using hardware or software techniques.<ref name=":0">{{Cite book |last1=Panichprecha |first1=S. |last2=Pongsawatkul |first2=N. |last3=Mitrpant |first3=C. |last4=Ketprom |first4=U. |last5=Kovintavewat |first5=P. |title=The 8th Electrical Engineering/ Electronics, Computer, Telecommunications and Information Technology (ECTI) Association of Thailand - Conference 2011 |chapter=Multi-threading in disk cloner |date=2011 |chapter-url=https://ieeexplore.ieee.org/document/5947887 |pages=512β515 |doi=10.1109/ECTICON.2011.5947887|isbn=978-1-4577-0425-3 |s2cid=15754588}}</ref> Unlike file copying, disk cloning also duplicates the [[File system|filesystems]], [[Disk partitioning|partitions]], drive meta data and [[slack space]] on the drive.<ref>{{Cite journal |last1=Turriza |first1=JosΓ© Luis Lira |last2=Huh |first2=Yaqueline Pech |last3=Lira |first3=Jose Manuel |date=2018 |title=Comparative study of restoration tools by cloning using LSP me-thod |journal=Revista Ingeniantes |volume=5 |issue=1 |pages=1}}</ref> Common reasons for cloning a drive include; data backup and recovery; duplicating a computer's configuration for mass deployment and for preserving data for [[digital forensics]] purposes.<ref name=":0"/><ref>{{Cite book |last=Hayes |first=Darren R. |title=A Practical Guide to Computer Forensics Investigations |publisher=Pearson Education |year=2014 |isbn=9780132756150 |pages=86β87}}</ref><ref>{{Cite journal |last1=Jeanvoine |first1=Emmanuel |last2=Sarzyniec |first2=Luc |last3=Nussbaum |first3=Lucas |date=2013-02-01 |title=Kadeploy3: Efficient and Scalable Operating System Provisioning for Clusters |url=https://hal.inria.fr/hal-00909111 |journal=USENIX Association |language=en |volume=38 |issue=1 |pages=38}}</ref> Drive cloning can be used in conjunction with [[Disk imaging|drive imaging]] where the cloned data is saved to one or more files on another drive rather than copied directly to another drive. == Background == [[File:Cloning Hard disk drive.jpg|left|thumb|251x251px|'''Figure 1''': An illustration of connecting two drives to a computer to clone one drive (the source drive) to another (the destination) drive.]] Disk cloning occurs by copying the contents of a drive called the source drive. While called "disk cloning", any type of storage medium that connects to the computer via [[USB]], [[NVMe]] or [[SATA]] can be cloned. A small amount of data is read and then held in the computer's memory. The data is then either written directly to another (destination) drive or to a [[disk image]]. Typically, the destination drive is connected to a computer (Fig. 1). Once connected, a disk cloner is used to perform the clone itself. A hardware-based drive cloner can be used which does not require a computer.<ref name=":3">{{Cite web |date=2021-12-28 |title=Everything You Should Know About Hard Drive Duplicators |url=https://www.minitool.com/partition-disk/hard-drive-duplicator.html |access-date=2023-01-09 |website=MiniTool |language=en-US}}</ref> However, software cloners tend to allow for greater flexibility because they can exclude unwanted data from being duplicated reducing cloning time. For example, the filesystem and partitions can be resized by the software allowing data to be cloned to a drive equal to or greater than the total used space. Most hardware-based cloners typically require for the destination drive to be the same size as the source drive even if only a fraction of the space is used.<ref name=":3"/> Some hardware cloners can clone only the used space but tend to be much more expensive. == Applications == === Deployment === A common use of disk cloning is for deployment. For example, a group of computers with similar hardware can be set up much quicker by cloning the configuration. In educational institutions, students are typically expected to experiment with computers to learn. Disk cloning can be used to help keep computers clean and configured correctly.<ref name=":4"/> Further, while installing the operating system is quick, installation of programs and ensuring a consistent configuration is time consuming. Thus, disk cloning seeks to mitigate this administrative challenge. === Digital forensics === One of the most common applications of disk cloning is for digital forensics purposes.<ref>{{Cite book |last1=Manson |first1=Dan |last2=Carlin |first2=Anna |last3=Ramos |first3=Steve |last4=Gyger |first4=Alain |last5=Kaufman |first5=Matthew |last6=Treichelt |first6=Jeremy |title=2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07) |chapter=Is the Open Way a Better Way? Digital Forensics Using Open Source Tools |date=2007 |chapter-url=https://ieeexplore.ieee.org/document/4076922 |pages=266b |doi=10.1109/HICSS.2007.301|s2cid=15273267}}</ref> This aims to ensure that data is preserved at the time it was acquired for later analysis.<ref name=":5">{{Cite journal |last1=Meffert |first1=Christopher S. |last2=Baggili |first2=Ibrahim |last3=Breitinger |first3=Frank |date=2016-08-07 |title=Deleting collected digital evidence by exploiting a widely adopted hardware write blocker |url=https://digitalcommons.newhaven.edu/context/electricalcomputerengineering-facpubs/article/1056/viewcontent/Deleting_Collected_Digital_Evidence___WriteBlocker.pdf |journal=Digital Investigation |language=en |volume=18 |pages=S87βS96 |doi=10.1016/j.diin.2016.04.004 |issn=1742-2876|doi-access=free }}</ref> Techniques for cloning a disk for forensic purposes differ from cloning a drive for other purposes. Typically, the cloning process itself must not interfere with the data. Because software cannot be installed on the system, a hardware-based cloner is generally used to duplicate the data to another drive or image.<ref name=":0"/> Further, the hardware-based cloner also has write-blocking capabilities which intercepts write commands to prevent data being written to the drive.<ref name=":5"/> === Backup === Disk cloning can be used as a backup solution by creating a duplicate of data as it existed when the clone was started.<ref>{{Cite journal |last=Babalola |first=Olawunmi |date=2018-03-02 |title=BEST PRACTICE FOR COMPUTER IMAGING AND MAINTAINING A DATABASE |url=https://digitalcommons.olivet.edu/csis_stsc/4 |journal=Student Scholarship β Computer Science}}</ref> The clone can be used to restore corrupted files such as corrupted databases. In modern software solutions, it is not uncommon for disk cloning techniques to be combined with [[disk imaging]] techniques to create a backup solution. === Drive upgrade === Upgrading to a larger or faster drive can be facilitated by cloning the old drive to the new drive once it is installed into the system. This reduces the need to having to manually reinstall applications, drivers and the operating system.<ref>{{Cite web |title=How to Clone Hard Drive on Windows 10 without Reinstalling |url=https://www.diskpart.com/windows-10/clone-hard-drive-windows-10-0528.html |access-date=2023-01-09 |website=www.diskpart.com}}</ref> The procedure can be used when migrating from mechanical [[Hard disk drive|hard disk drives]] to [[Solid-state drive|solid state drives]].<ref>{{Cite web |title=How to Upgrade HDD to SSD without Reinstalling Windows |url=https://www.diskpart.com/articles/upgrade-hdd-to-ssd-without-reinstalling-0310.html |access-date=2023-01-09 |website=www.diskpart.com}}</ref> Modern cloning software tends to communicate with storage devices through a common interface, which means, that any storage device can be cloned and migrated. Sometimes, booting from the destination drive can fail and require adjustments in the computer's [[UEFI|UEFI or BIOS]] to make the new clone bootable.<ref>{{Cite web |title=Fixed: Cloned Hard Drive or SSD Won't Boot |url=https://www.diskpart.com/articles/cloned-hard-drive-ssd-wont-boot-4348.html |access-date=2023-01-09 |website=www.diskpart.com}}</ref> == Technical challenges == There are several technical challenges that need to be considered when planning to clone a drive. === Drive in use === Often, cloning software runs within the [[operating system]] which is running off of one of the drives being cloned. As a result, any attempt to clone the contents of the drive, even to a file, would result in [[data corruption]]. Consequently, the drive cloner must ensure that the data on the source drive remains in a consistent state at the time of reading. Further, in the case, that the user desires to clone to the computer's system drive, this generally cannot be done while the operating system is running. A common solution to cloning a drive that is in use, which is utilized by software such as [[Clonezilla|CloneZilla]], is to boot from a Linux-based operating system so the drive can be copied and/or overwritten.<ref name=":4">{{Cite book |last1=BΔlan |first1=T.C. |last2=Robu |first2=D.N. |last3=Sandu |first3=F. |title=2015 IEEE 21st International Symposium for Design and Technology in Electronic Packaging (SIITME) |chapter=Ad-hoc lab computer network configuration using remote resources |date=2015 |chapter-url=https://ieeexplore.ieee.org/document/7342360 |pages=393β396 |doi=10.1109/SIITME.2015.7342360|isbn=978-1-5090-0332-7 |s2cid=39545275}}</ref><ref>Yao, J. F. J., & Carlisle, J. (2011). [https://www.researchgate.net/profile/Ghassan-Alkadi/publication/234782265_Beyond_the_computer_science_curriculum_empowering_students_for_success/links/00b4952f3c4a0924c3000000/Beyond-the-computer-science-curriculum-empowering-students-for-success.pdf#page=75 Self-support computer science lab]. ''Journal of Computing Sciences in Colleges'', ''26''(4), 64-70.</ref> This approach is not suitable for servers that need to be running all the time and cannot be shutdown routinely to perform the backup (or cloning) operation.<ref name=":1">{{Citation |last1=Grasdal |first1=Martin |title=Chapter 8 - MCSE 70-293: Planning, Implementing, and Maintaining a High-Availability Strategy |date=2003-01-01 |url=https://www.sciencedirect.com/science/article/pii/B9781931836937500129 |work=MCSE (Exam 70-293) Study Guide |pages=559β638 |editor-last=Grasdal |editor-first=Martin |place=Rockland |publisher=Syngress |language=en |isbn=978-1-931836-93-7 |access-date=2023-01-09 |last2=Hunter |first2=Laura E. |last3=Cross |first3=Michael |last4=Hunter |first4=Laura |last5=Shinder |first5=Debra Littlejohn |last6=Shinder |first6=Thomas W. |editor2-last=Hunter |editor2-first=Laura E. |editor3-last=Cross |editor3-first=Michael |editor4-last=Hunter |editor4-first=Laura}}</ref> Further, the Linux-based operating system must provide appropriate drivers for the system's hardware. Drivers are also required for the source and destination drives and for any attached storage involved in facilitating the cloning operation such as USB, tape device and networking drivers. Some server-based operating system incorporate mechanisms to allow the drive to be safely backed up while the system is running to overcome these challenges. For example, [[Windows Server 2003]] (and later) includes [[Shadow Copy|volume shadow service]] (VSS).<ref name=":1"/><ref>{{Cite web |last=JasonGerend |title=Volume Shadow Copy Service |url=https://learn.microsoft.com/en-us/windows-server/storage/file-server/volume-shadow-copy-service |access-date=2023-01-09 |website=learn.microsoft.com |date=7 December 2022 |language=en-us}}</ref> VSS takes a snapshot of the drive so that any changes are not written to the snapshot.<ref>Leschke, T. R. (2010). [https://redirect.cs.umbc.edu/courses/pub/www/undergraduate/courses/FYS102D/Recycle.Bin.Forensics.for.Windows7.and.Windows.Vista.Shadow.Volumes.pdf Shadow volume trash: $ Recycle. Bin forensics for Windows 7 and Windows Vista shadow volumes].</ref> The snapshot creates a virtual drive called a shadow volume that is backed up (or cloned) by the software. === Slow === Disk cloning can be time consuming, especially, for large disks because a true clone needs to copy all the data on the disk even if most data resides in unallocated drive space.<ref name=":0"/> Software solutions can determine the space in use and only copy the used data reducing the time needed to clone the drive. Some drive cloners make use of [[Multithreading (computer architecture)|multithreading]] to further speed up the cloning operation.<ref name=":0"/> ==See also== * [[Comparison of disk cloning software]] * [[Disk mirroring]] * [[Disk image]] *[[List of backup software]] *[[List of data recovery software]] *[[List of disk partitioning software]] * [[Live USB]] * [[Recovery disc]] * [[Security Identifier]] == References == {{reflist}} {{Backup software}} [[Category:Disk cloning| ]] [[Category:Storage software]] [[Category:Backup]] [[Category:Utility software types]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Backup software
(
edit
)
Template:Citation
(
edit
)
Template:Cite book
(
edit
)
Template:Cite journal
(
edit
)
Template:Cite web
(
edit
)
Template:Reflist
(
edit
)
Template:Short description
(
edit
)