塑料属于什么垃圾| 为什么癌症治不好| hpv疫苗什么时候打最好| 儿童热伤风吃什么药| 香草是什么意思| 付诸东流是什么意思| 光敏树脂是什么材料| 呕吐后吃什么食物好| ex是什么| 乌江鱼是什么鱼| 什么是七杀命格| 身份证号后四位代表什么| 掉头发吃什么药最有效| 侧记是什么意思| 耳鸣是什么| 男人梦见蛇是什么预兆| 咳嗽有血是什么原因| 什么不宁| hpv16阳性有什么症状| 结肠炎吃什么药治疗效果好| 虱子长什么样子| 为什么早射| 血压高要吃什么蔬菜能降血压| 海的尽头是什么| 临字五行属什么| 人乳头病毒是什么意思| 土加一笔是什么字| 自然流产的症状是什么样的| 口腔溃疡该挂什么科| 痛风急性期吃什么药| 韭菜和什么不能一起吃| 百合不能和什么一起吃| 专辑是什么| 肝红素高是什么原因| 阿托伐他汀钙片治什么病| 补蛋白吃什么最好| 胸腔积液是什么原因引起的| 兰花的花语是什么| 重塑是什么意思| 脂溢性脱发吃什么药| 淡墨是什么意思| 囡囡是什么意思| 痛风打什么针见效最快| 检查腰部挂什么科| 夏末是什么时候| 断章取义什么意思| msv是什么单位| 持之以恒的恒是什么意思| 女性生活疼痛什么原因| 圣罗兰属于什么档次| 梦到吃蛇肉预示着什么| pet一ct是一种什么检查| 什么是音程| 早上口苦是什么原因| 小儿感冒吃什么药| 为什么会有眼屎| 挂靠是什么意思| 安欣是什么电视剧| 毓婷和金毓婷有什么区别| 胃胀呕吐是什么原因| 复活节是什么意思| 牙痛用什么药止痛快| 潮汕立冬吃什么| 尿不尽是什么意思| 浩浩荡荡是什么意思| 大便颜色发黑是什么原因| 鸡皮肤用什么药膏最好| 不畏将来不念过往什么意思| 上海有什么好玩的地方旅游景点| 乳腺无回声结节是什么意思| 阳离子是什么面料| 戴银镯子对身体有什么好处| 四面弹是什么面料| 外痔用什么药可以消除| 工字五行属什么| 梦见蛇蛋是什么意思啊| 耳石症吃什么药最好| 面是什么做的| 喉咙痛可以吃什么水果| 什么什么言什么| mrcp是什么检查| 不动明王是什么属相的本命佛| 甲胎蛋白偏低说明什么| 什么茶下火| 36 80是什么罩杯| 什么的鸟儿| 从容面对是什么意思| 萤火虫为什么会发光简单回答| 2028年属什么| 面试是什么意思| 撑台脚是什么意思| 诚字属于五行属什么| 子宫疼是什么原因| 地头蛇比喻什么样的人| ac是什么元素| 揽子是什么意思| 血铅是什么| 突然头晕眼花站不稳是什么原因| 左腹部是什么器官| 早上九点到十点是什么时辰| 婚检男性检查什么项目| 瘸子是什么意思| 磷高吃什么药| 间接喉镜检查能检查出什么| 维生素c什么时候吃效果最好| 胃溃疡a1期是什么意思| 什么消炎药效果好| 什么情况下需要做宫腔镜| 坤字五行属什么| 幽闭恐惧症是什么症状| 梦见自己换衣服是什么意思| cacao是什么意思| 浑身解数是什么意思| 月经前有褐色分泌物是什么原因| 梦见卖衣服是什么意思| 大虾不能和什么一起吃| 肾功能不全是什么意思| 结节性红斑是什么病| spa什么服务| 内蒙古简称什么| min什么意思| 高血脂是什么原因引起的| 突然腰疼是什么原因| 什么属相好| pbc是什么| 掉头发吃什么恢复最快| 梦见手机丢了又找到了是什么意思| classy是什么意思| 月经来了痛经吃什么药| 日有所思夜有所梦是什么意思| 病毒性感冒咳嗽吃什么药效果好| 痛风挂什么科室| 感冒流鼻涕咳嗽吃什么药好| 黑色上衣配什么颜色的裤子| 威士忌兑什么饮料好喝| 被舔下面是什么感觉| 刘备是个什么样的人| 宝宝发烧吃什么药| 虾为什么叫对虾| 阳历九月份是什么星座| 无为什么意思| 运筹帷幄是什么意思| 梦到老虎是什么意思| 高玩是什么意思| 安宫牛黄丸治什么病| 什么牌子的益生菌调理肠胃比较好| 日希是什么字| 什么样的细雨| 吃生南瓜子有什么好处| 煮牛骨头放什么调料| 掉头发要吃什么| 中间细胞百分比偏高是什么意思| 手掌心发红是什么原因| 鼓包是什么意思| 送什么礼物好| 脆鱼是什么鱼| 月子期间能吃什么水果| 口比念什么| 感染幽门螺旋杆菌吃什么药| 京剧脸谱黑色代表什么| 产后复查都查什么| 白细胞异常是什么原因| 气结是什么意思| 世态炎凉是什么意思| 喝咖啡心慌是什么原因| 纸片人什么意思| 什么叫造口| 做放疗的人吃什么好| 吃什么保养皮肤| 为什么阴道会放气| 青少年长白头发是什么原因| 年岁是什么意思| 缘木求鱼是什么意思| 懈怠是什么意思| 为什么三文鱼可以生吃| 住院号是什么| 绿色属于五行属什么| 财神爷叫什么名字| 老卵上海话什么意思| 胰腺上长瘤意味着什么| 三伏天喝什么汤| 月经迟迟不来是什么原因| 总是放屁是什么原因| 七月九号是什么星座| 苔藓是什么植物| 儿童口腔疱疹吃什么药| 莫名其妙是什么意思| 血氧低吃什么提高的快| 大红色配什么颜色好看| 文胸36码是什么尺寸| 梦见自己的衣服丢了是什么意思| 红薯不能和什么食物一起吃| 前列腺增生是什么意思| 你的名字讲的什么故事| 蕙质兰心什么意思| 梦见别人结婚是什么征兆| collection什么牌子| 水浒传是什么朝代| 脾胃不好吃什么水果| 眼睛视物模糊是什么原因| 厉兵秣马是什么意思| 血压高不能吃什么| 自字五行属什么| 仙风道骨指什么生肖| 孕妇吃花胶对胎儿有什么好处| 气短是什么原因| 女人阴部黑是什么原因| 了口是什么字| 胸膜炎是什么症状| 哈吉斯牌子是什么档次| 肠胃不好吃什么食物好| 胼胝是什么意思| 什么是蝴蝶效应| mlf操作是什么意思| 梦见虫子是什么意思| 02年是什么命| 史密斯夫妇什么意思| 南柯一梦是什么意思| 季夏是什么意思| 脾大是什么原因造成的| 知了吃了有什么好处| 女司机为什么开不好车| gif是什么意思| 节食是什么意思| 大白菜什么时候种| pr在医学上是什么意思| 大便干燥一粒一粒的吃什么药| 猴年马月什么意思| ct是什么检查| 怀孕早期需要注意什么| 五月二十四号是什么星座| 嘴唇有点发黑是什么原因引起的| 齐人之福什么意思| 狂狷是什么意思| 嗔什么意思| 手麻看什么科| 黄金是什么| 克霉唑为什么4天一次| 眼睛突然红了是什么原因| 背疼应该挂什么科| 都有什么菜好吃| 十月7号是什么星座| 妇炎康片主要治什么妇科病| 为什么手术服是绿色的| 前列腺实质回声欠均匀什么意思| 什么样的夜晚| 嗜碱性粒细胞偏高是什么原因| 肺气肿吃什么食物| 拘留所和看守所有什么区别| 双侧中耳乳突炎是什么意思| 拔牙能吃什么| 肘关节发黑是什么原因| 脑梗挂号挂什么科室| 做b超需要挂什么科| 松绿色是什么颜色| 什么是排卵期怎么计算| 女人更年期吃什么药调理最好| 什么是高钾血症| mmf是什么药| 咽喉痛吃什么药| 农历11月11日是什么星座| 卜在姓氏里读什么| 蛋疼是什么原因引起的| 今年42岁属什么生肖| 百度Jump to content

8AT、9AT、10AT...一场关于多档位的“阴谋”

From Wikipedia, the free encyclopedia
百度 长江汽车董事长曹忠表示,首批电动商用车起运标志着长江汽车的国际化战略进入新的发展阶段。

A disk image is a snapshot of a storage device's content – typically stored in a file on another storage device.[1][2]

Traditionally, a disk image was relatively large because it was a bit-by-bit copy of every storage location of a device (i.e. every sector of a hard disk drive), but it is now common to only store allocated data to reduce storage space.[3][4] Compression and deduplication are commonly used to further reduce the size of image files.[3][5]

Disk imaging is performed for a variety of purposes including digital forensics,[6][2] cloud computing,[7] system administration,[8] backup,[1] and emulation for digital preservation strategy.[9] Despite the benefits, storage costs can be high,[3] management can be difficult[6] and imaging can be time consuming.[10][9]

Disk images can be made in a variety of formats depending on the purpose. Virtual disk images (such as VHD and VMDK) are intended to be used for cloud computing,[11][12] ISO images are intended to emulate optical media, such as a CD-ROM.[13] Raw disk images are used for forensic purposes.[2] Proprietary formats are typically used by disk imaging software.

Background

[edit]

Disk images were originally (in the late 1960s) used for backup and disk cloning of mainframe disk media. Early ones were as small as 5 megabytes and as large as 330 megabytes, and the copy medium was magnetic tape, which ran as large as 200 megabytes per reel.[14] Disk images became much more popular when floppy disk media became popular, where replication or storage of an exact structure was necessary and efficient, especially in the case of copy protected floppy disks.

Disk image creation is called disk imaging and is often time consuming, even with a fast computer, because the entire disk must be copied.[10] Typically, disk imaging requires a third party disk imaging program or backup software. The software required varies according to the type of disk image that needs to be created. For example, RawWrite and WinImage create floppy disk image files for MS-DOS and Microsoft Windows.[15][16] In Unix or similar systems the dd program can be used to create raw disk images.[2] Apple Disk Copy can be used on Classic Mac OS and macOS systems to create and write disk image files.

Authoring software for CDs/DVDs such as Nero Burning ROM can generate and load disk images for optical media. A virtual disk writer or virtual burner is a computer program that emulates an actual disc authoring device such as a CD writer or DVD writer. Instead of writing data to an actual disc, it creates a virtual disk image.[17][18] A virtual burner, by definition, appears as a disc drive in the system with writing capabilities (as opposed to conventional disc authoring programs that can create virtual disk images), thus allowing software that can burn discs to create virtual discs.[19]

Uses

[edit]

Digital forensics

[edit]

Forensic imaging is the process of creating a bit-by-bit copy of the data on the drive, including files, metadata, volume information, filesystems and their structure.[2] Often, these images are also hashed to verify their integrity and that they have not been altered since being created. Unlike disk imaging for other purposes, digital forensic applications take a bit-by-bit copy to ensure forensic soundness. The purposes of imaging the disk is to not only discover evidence preserved in digital information but also to examine the drive to gather clues of how the crime was committed.

Virtualization

[edit]

Creating a virtual disk image of optical media or a hard disk drive is typically done to make the content available to one or more virtual machines. Virtual machines emulate a CD/DVD drive by reading an ISO image. This can also be faster than reading from the physical optical medium.[20] Further, there are less issues with wear and tear. A hard disk drive or solid-state drive in a virtual machine is implemented as a disk image (i.e. either the VHD format used by Microsoft's Hyper-V, the VDI format used by Oracle Corporation's VirtualBox, the VMDK format used for VMware virtual machines, or the QCOW format used by QEMU). Virtual hard disk images tend to be stored as either a collection of files (where each one is typically 2GB in size), or as a single file. Virtual machines treat the image set as a physical drive.

Rapid deployment of systems

[edit]

Educational institutions and businesses can often need to buy or replace computer systems in large numbers. Disk imaging is commonly used to rapidly deploy the same configuration across workstations.[8] Disk imaging software is used to create an image of a completely-configured system (such an image is sometimes called a golden image).[21][22] This image is then written to a computer's hard disk (which is sometimes described as restoring an image).[23]

Network-based image deployment

[edit]

Image restoration can be done using network-based image deployment. This method uses a PXE server to boot an operating system over a computer network that contains the necessary components to image or restore storage media in a computer.[24] This is usually used in conjunction with a DHCP server to automate the configuration of network parameters including IP addresses. Multicasting, broadcasting or unicasting tend to be used to restore an image to many computers simultaneously.[24][23] These approaches do not work well if one or more computers experience packet loss.[23] As a result, some imaging solutions use the BitTorrent protocol to overcome this problem.

Network-based image deployment reduces the need to maintain and update individual systems manually. Imaging is also easier than automated setup methods because an administrator does not need to have knowledge of the prior configuration to copy it.[23]

Backup strategy

[edit]

A disk image contains all files and data (i.e., file attributes and the file fragmentation state). For this reason, it is also used for backing up optical media (CDs and DVDs, etc.), and allows the exact and efficient recovery after experimenting with modifications to a system or virtual machine. Typically, disk imaging can be used to quickly restore an entire system to an operational state after a disaster.[25]

Digital preservation

[edit]

Libraries and museums are typically required to archive and digitally preserve information without altering it in any manner.[9][26] Emulators frequently use disk images to emulate floppy disks that have been preserved. This is usually simpler to program than accessing a real floppy drive (particularly if the disks are in a format not supported by the host operating system), and allows a large library of software to be managed. Emulation also allows existing disk images to be put into a usable form even though the data contained in the image is no longer readable without emulation.[13]

Limitations

[edit]

Disk imaging is time consuming, the space requirements are high and reading from them can be slower than reading from the disk directly because of a performance overhead.[3]

Other limitations can be the lack of access to software required to read the contents of the image. For example, prior to Windows 8, third party software was required to mount disk images.[27][28] When imaging multiple computers with only minor differences, much data is duplicated unnecessarily, wasting space.[3]

Speed and failure

[edit]

Disk imaging can be slow, especially for older storage devices. A typical 4.7 GB DVD can take an average of 18 minutes to duplicate.[9] Floppy disks read and write much slower than hard disks. Therefore, despite their small size, it can take several minutes to copy a single disk. In some cases, disk imaging can fail due to bad sectors or physical wear and tear on the source device.[13] Unix utilities (such as dd) are not designed to cope with failures, causing the disk image creation process to fail.[26] When data recovery is the end goal, it is instead recommended to use more specialised tools (such as ddrescue).

See also

[edit]

References

[edit]
  1. ^ a b Colloton, Eddy; Farbowitz, Jonathan; Rodríguez, Caroline Gil (2025-08-05). "Disk Imaging as a Backup Tool for Digital Objects". Conservation of Time-Based Media Art. pp. 204–222. doi:10.4324/9781003034865-17. ISBN 9781003034865.
  2. ^ a b c d e Woods, Kam; Lee, Christopher A.; Garfinkel, Simson (2025-08-05). Extending digital repository architectures to support disk image preservation and access. Proceedings of the 11th Annual International ACM/IEEE Joint Conference on Digital Libraries. New York, NY, USA: Association for Computing Machinery. pp. 57–66. doi:10.1145/1998076.1998088. hdl:10945/44252. ISBN 978-1-4503-0744-4. S2CID 2628912.
  3. ^ a b c d e Pullakandam, R.; Lin, X.; Hibler, M.; Eide, E.; Ricci, R. (October 23–26, 2011). High-performance Disk Imaging With Deduplicated Storage (PDF). 23rd ACM Symposium on Operating Systems Principles. Cascais, Portugal.
  4. ^ K?vrestad, Joakim (2017), K?vrestad, Joakim (ed.), "Vocabulary", Guide to Digital Forensics: A Concise and Practical Introduction, SpringerBriefs in Computer Science, Cham: Springer International Publishing, pp. 125–126, doi:10.1007/978-3-319-67450-6_12, ISBN 978-3-319-67450-6, retrieved 2025-08-05
  5. ^ Lee, Sang Su; Kyong, Un Sung; Hong, Do Won (2008). A high speed disk imaging system. 2008 IEEE International Symposium on Consumer Electronics. pp. 1–3. doi:10.1109/ISCE.2008.4559553. S2CID 5932241.
  6. ^ a b Garfinkel, Simson L. (2009). Automating Disk Forensic Processing with SleuthKit, XML and Python. 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering. pp. 73–84. doi:10.1109/SADFE.2009.12. hdl:10945/44249. ISBN 978-0-7695-3792-4. S2CID 1624033.
  7. ^ Kazim, Muhammad; Masood, Rahat; Shibli, Muhammad Awais (2025-08-05). Securing the virtual machine images in cloud computing. Proceedings of the 6th International Conference on Security of Information and Networks. New York, NY, USA: Association for Computing Machinery. pp. 425–428. doi:10.1145/2523514.2523576. ISBN 978-1-4503-2498-4. S2CID 2474546.
  8. ^ a b Blackham, N.; Higby, C.; Bailey, M. (June 2004). Re-Imaging Computers For Multipurpose Labs. 2004 American Society for Engineering Education Annual Conference. Salt Lake City, Utah. doi:10.18260/1-2--14125.
  9. ^ a b c d Day, Michael; Pennock, Maureen; May, Peter; Davies, Kevin; Whibley, Simon; Kimura, Akiko; Halvarsson, Edith (2016). "The preservation of disk-based content at the British Library: Lessons from the Flashback project". Alexandria: The Journal of National and International Library and Information Issues. 26 (3): 216–234. doi:10.1177/0955749016669775. ISSN 0955-7490. S2CID 63617004.
  10. ^ a b Stewart, Dawid; Arvidsson, Alex (2022). Need for speed : A study of the speed of forensic disk imaging tools.
  11. ^ Arunkumar, G.; Venkataraman., Neelanarayanan (2025-08-05). "A Novel Approach to Address Interoperability Concern in Cloud Computing". Procedia Computer Science. Big Data, Cloud and Computing Challenges. 50: 554–559. doi:10.1016/j.procs.2015.04.083. ISSN 1877-0509.
  12. ^ Barrowclough, John Patrick; Asif, Rameez (2025-08-05). "Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures". Security and Communication Networks. 2018: e1681908. doi:10.1155/2018/1681908. ISSN 1939-0114.
  13. ^ a b c Colloton, E.; Farbowitz, J.; Fortunato, F.; Gil, C. (2019). "Towards Best Practices In Disk Imaging: A Cross-Institutional Approach". Electronic Media Review. 6.
  14. ^ "IBM Mainframe Operating Systems" (PDF). Archived from the original (PDF) on 2025-08-05. Retrieved 2025-08-05.
  15. ^ McCune, Mike (2000). Integrating Linux and Windows. Prentice Hall Professional. ISBN 978-0-13-030670-8.
  16. ^ Li, Hongwei; Yin, Changhong; Xu, Yaping; Guo, Qingjun (2010). Construction of the Practical Teaching System on Operating Systems Course. 2010 Second International Workshop on Education Technology and Computer Science. Vol. 1. pp. 405–408. doi:10.1109/ETCS.2010.184. ISBN 978-1-4244-6388-6. S2CID 15706012.
  17. ^ "Phantom Burner Overview". Phantombility, Inc. Archived from the original on 19 August 2011. Retrieved 19 July 2011.
  18. ^ "Virtual CD - The original for your PC". Virtual CD website. H+H Software GmbH. Archived from the original on 24 September 2011. Retrieved 19 July 2011.
  19. ^ "Virtual CD/DVD-Writer Device". SourceForge. Geeknet, Inc. Archived from the original on 17 February 2011. Retrieved 19 July 2011.
  20. ^ Kozierok, Charles M. (17 April 2001). "Access Time". The PC Guide. CD-ROM Performance and Reliability. Archived from the original on 10 January 2019.
  21. ^ Bowling, Jeramiah (2025-08-05). "Clonezilla: build, clone, repeat". Linux Journal. 2011 (201): 6:6. ISSN 1075-3583.
  22. ^ "Create a golden image in Azure". learn.microsoft.com.
  23. ^ a b c d Shiau, Steven J. H.; Huang, Yu-Chiang; Tsai, Yu-Chin; Sun, Chen-Kai; Yen, Ching-Hsuan; Huang, Chi-Yo (2021). "A BitTorrent Mechanism-Based Solution for Massive System Deployment". IEEE Access. 9: 21043–21058. Bibcode:2021IEEEA...921043S. doi:10.1109/ACCESS.2021.3052525. ISSN 2169-3536. S2CID 231851821.
  24. ^ a b Shiau, Steven J. H.; Sun, Chen-Kai; Tsai, Yu-Chin; Juang, Jer-Nan; Huang, Chi-Yo (2018). "The Design and Implementation of a Novel Open Source Massive Deployment System". Applied Sciences. 8 (6): 965. doi:10.3390/app8060965. ISSN 2076-3417.
  25. ^ "Fast, Scalable Disk Imaging with Frisbee". www.cs.utah.edu. Retrieved 2025-08-05.
  26. ^ a b Durno, John; Trofimchuk, Jerry (2025-08-05). "Digital forensics on a shoestring: a case study from the University of Victoria". The Code4Lib Journal (27). ISSN 1940-5758.
  27. ^ "Accessing data in ISO and VHD files". Building Windows 8 (TechNet Blogs). Microsoft. 30 August 2011. Archived from the original on 19 April 2012. Retrieved 27 April 2012.
  28. ^ "Mount-DiskImage". Microsoft.
[edit]
骨质疏松吃什么 儿童掉头发什么原因 什么是花青素 宝宝上颚有白点是什么 红色象征什么
梦到丧尸是什么预兆 验大便能查出什么 济公属什么生肖 什么减肥药好使 七七年属什么生肖
闹觉是什么意思 陈醋与香醋有什么区别 暧昧是什么意思 龙虾不能和什么一起吃 套马的汉子你威武雄壮是什么歌
中校相当于政府什么官 什么星座最渣 谷丙转氨酶是什么意思 血浓度高是什么原因 鱼吃什么食物
比重是什么bjcbxg.com 坐疮是什么样的图片hcv9jop5ns2r.cn 情有独钟什么意思hcv8jop3ns7r.cn 衾怎么读什么意思hcv9jop1ns6r.cn 三岁看大七岁看老什么意思hcv7jop6ns1r.cn
舌头灼热感是什么原因hcv7jop6ns1r.cn 敏使朗是什么药xjhesheng.com 月经后一周又出血是什么原因hcv8jop7ns4r.cn ec什么意思hcv8jop1ns9r.cn 风疹病毒抗体偏高是什么意思hcv7jop6ns3r.cn
橘子什么季节成熟jasonfriends.com 干酪是什么hcv9jop1ns8r.cn 反文旁和什么有关dayuxmw.com 皮试阳性是什么意思hcv8jop7ns2r.cn 玛瑙什么颜色最贵qingzhougame.com
羊水是什么1949doufunao.com 酱油和生抽有什么区别hcv8jop5ns0r.cn wbc是什么意思hcv7jop5ns3r.cn 剑锋金命五行缺什么jasonfriends.com 林子大了什么鸟都有hcv9jop4ns0r.cn
百度