Ort Seite 127.0.0.1 --> Loopback 1-To-1 Relation (Relational Database)

Total Page:16

File Type:pdf, Size:1020Kb

Ort Seite 127.0.0.1 --> Loopback 1-To-1 Relation (Relational Database) 1 2 3 <== Hierarchie Ort Seite # 127.0.0.1 --> loopback 1-to-1 relation (relational database) C7 - Databases 63 1-to-n relation (relational database) C7 - Databases 62 255.255.255.255 --> broadcast address: IPv4, DHCPv4 ff02::1:2 --> broadcast address: DHCPv6 ff:ff:ff:ff:ff:ff --> broadcast address: MAC A abortable locks C4 - Locks 65-67 abortable MCS lock C4 - Locks 67 absorbing states (Markov chains) C11 - Markov Chains & PageRank 97 abstraction (device driver) C9 - I/O Devices / File Systems 7 access method (file system) C9 - I/O Devices / File Systems 62 ACK (acknowledgement) packet C2 - Transport Layer (L3) 23 acknowledgement packet --> ACK additive increase / multiplicative decrease --> AIMD address --> broadcast address --> IPv4 / IPv6 --> MAC address block --> IPv4 address prefix --> IPv4 address resolution protocol --> ARP adjacency list --> graphs AIMD (additive increase / multiplicative decrease) C2 - Transport Layer (L3) 21 allocation structure (vsfs) C9 - I/O Devices / File Systems 63 ALock (Anderson queue lock) --> locks AM (amplitude modulation) --> modulation amplitude modulation (AM) --> modulation anchor text C11 - Markov Chains & PageRank 102 Anderson queue lock (ALock) --> locks anonymous pipe --> (ordinary) pipe aperiodic (Markov chains) C11 - Markov Chains & PageRank 99 distinguish aperiodic states and an aperiodic Markov chain! ARP (address resolution protocol) C10 - Link Layer (L1) 79 arrival probability (Markov chains) C11 - Markov Chains & PageRank 95 AS (autonomous system) C1 - Network Layer (L2) 8 ASN (autonomous system number) C1 - Network Layer (L2) 8 associative array --> dictionary atomic instruction (read-modify-write (RMW) instruction) C4 - Locks 12-13 C5 - Process Synchr. & Deadlocks 24 --> CAS (compare-and-swap) DCAS (double compare-and-swap) (not part of lecture) FAA (fetch-and-add) (not part of lecture) MCAS (multiple compare-and-swap) (not part of lecture) --> TAS (test-and-set) atomic statement (database) --> transaction atomic write (HDD) C9 - I/O Devices / File Systems 12 AtomicBoolean (Java class) C4 - Locks 19 1 2 3 <== Hierarchie Ort Seite attribute (relational database) C7 - Databases 62 augmenting paths C2 - Transport Layer (L3) 16 authoritative nameserver C3 - Application Layer (L4) 33 autonomous system --> AS autonomous system number --> ASN average seek C9 - I/O Devices / File Systems 20 B B* tree C7 - Databases 70 B+ tree C7 - Databases 67-70 backoff strategy C10 - Link Layer (L1) 84 random exponential backoff C10 - Link Layer (L1) 85 slotted aloha C10 - Link Layer (L1) 84 backoff time C10 - Link Layer (L1) 84 balanced search tree C6 - Dictionaries (& Hashing) 44 balanced tree --> B+ tree bank (SSD) C9 - I/O Devices / File Systems 27 BGP (border gateway protocol) C1 - Network Layer (L2) (8), 10 binary search tree C6 - Dictionaries (& Hashing) 43 birthday problem C6 - Dictionaries (& Hashing) 45 Bit / Byte stuffing C10 - Link Layer (L1) 87 --> consistent overhead byte stuffing bitmap (vsfs) C9 - I/O Devices / File Systems 63 block (adresses) --> IPv4 block (file system) C9 - I/O Devices / File Systems 62 block (SSD) C9 - I/O Devices / File Systems 27 logical / physical block --> FTL blocking lock --> locks block-level FTL --> FTL Bluetooth packet --> packet types boolean operator --> SQL statements: SELECT border gateway protocol --> BGP bounded-buffer problem C5 - Process Synchr. & Deadlocks 33 branching factor b (B+ tree) C7 - Databases 67 broadcast address DHCPv6 - ff02::1:2 C10 - Link Layer (L1) 80 global (IPv4, DHCPv4) - 255.255.255.255 C10 - Link Layer (L1) 79 MAC - ff:ff:ff:ff:ff:ff C10 - Link Layer (L1) 78 buckets M[0]...M[m-1] (hashing) C6 - Dictionaries (& Hashing) 44 bulk encryption algorithm C12 - Security 116 C c(h,N) (number of collisions) C6 - Dictionaries (& Hashing) 47 CA --> certificate authority cache (HDD) C9 - I/O Devices / File Systems 16 cache coherence C4 - Locks 32 cache hit C4 - Locks 28 cache miss C4 - Locks 28 cache write method C9 - I/O Devices / File Systems 16 --> write-back --> write-through 1 2 3 <== Hierarchie Ort Seite canonical (not real) device C9 - I/O Devices / File Systems 2 consist of: internal structure, interface canonical form (linear program) C2 - Transport Layer (L3) 18 canonical protocol C9 - I/O Devices / File Systems 3 capacity --> flows carrier sensing --> CCA carrier signal C10 - Link Layer (L1) 90 CAS (compare-and-swap) C4 - Locks 13 cascading style sheet --> CSS CBC --> cipher block chaining CCA (clear channel assessment) C10 - Link Layer (L1) 83 certificate authority C12 - Security 114 checksum C10 - Link Layer (L1) 89 cipher block chaining C12 - Security 116 circuit (telephone network) C1 - Network Layer (L2) 7 clear channel assessment --> CCA CLH (Craig, Landin, and Hagersten) lock --> locks client = consumer = sender close() --> system calls closedir() --> system calls clustering (hashing) C6 - Dictionaries (& Hashing) 51 coalescing (interrupt delaying?) C9 - I/O Devices / File Systems 5 coarse-grained synchronization --> synchronization code division --> medium division collision (hashing) C6 - Dictionaries (& Hashing) 45 collision avoidance --> medium division collision resistant hash function C12 - Security 117 collision response C10 - Link Layer (L1) 84 commute time (Markov chains) C11 - Markov Chains & PageRank 95 Comparable (Java Class) C6 - Dictionaries (& Hashing) 50 compare-and-swap --> CAS composite locks C4 - Locks 68-70 congestion control C2 - Transport Layer (L3) 24 connected graph --> graphs connection (definition) C2 - Transport Layer (L3) 23 consistent overhead byte stuffing C10 - Link Layer (L1) 88 CONSTRAINT --> SQL statements: ALTER TABLE cooperating process C5 - Process Synchr. & Deadlocks 2 cost (SSD) C9 - I/O Devices / File Systems 42 count-to-infinity problem C1 - Network Layer (L2) 10 cover time cov(v) C11 - Markov Chains & PageRank 103 creat() --> system calls CREATE DATABASE --> SQL Statements critical-section problem C5 - Process Synchr. & Deadlocks 19 entry section, critical section, exit section, remainder sect. Peterson's solution C5 - Process Synchr. & Deadlocks 21-22 C-SCAN (elevator unidirectional) --> disk scheduler CSS (cascaded style sheet) C3 - Application Layer (L4) 32 rules, selectors, declaration cuckoo hashing --> hashing current offset (file access) C9 - I/O Devices / File Systems 50 cycle --> graphs 1 2 3 <== Hierarchie Ort Seite D dangling reference (symbolic link) C9 - I/O Devices / File Systems 58 data bitmap --> bitmap data structure (file system) C9 - I/O Devices / File Systems 61 database: collection of tables C7 - Databases 57 datagram --> packet dead block (SSD) --> garbage collection deadlock C5 - Process Synchr. & Deadlocks (31), 44-51 delete file / directory --> system calls destination (target) t --> flows device driver C9 - I/O Devices / File Systems 7-10 IDE device driver C9 - I/O Devices / File Systems 8-10 DHCP (dynamic host configuration protocol) C10 - Link Layer (L1) 79 dictionary definition C6 - Dictionaries (& Hashing) 43 operations: search, insert, delete C6 - Dictionaries (& Hashing) 43 Diffie-Hellman Key Exchange C12 - Security 107 with forward secrecy C12 - Security 110 dimensional analysis C9 - I/O Devices / File Systems 17 dining-philosophers problem C5 - Process Synchr. & Deadlocks 35-37 direct mapped flash transaction layer --> FTL direct memory access --> DMA direct pointer (file system) C9 - I/O Devices / File Systems 66 directed graphs --> graphs --> Markov Chains directory C9 - I/O Devices / File Systems 45 discrete logarithm problem C12 - Security 108 disk arm (HDD) C9 - I/O Devices / File Systems 13 disk head (HDD) C9 - I/O Devices / File Systems 13 disk scheduler C9 - I/O Devices / File Systems 21 NBF (nearest-block-first) C9 - I/O Devices / File Systems 21 SCAN (elevator) C9 - I/O Devices / File Systems 22 C-SCAN (elevator unidirectional) C9 - I/O Devices / File Systems 22 F-SCAN (elevator with freeze) C9 - I/O Devices / File Systems 22 SATF (shortest-access-time-first) C9 - I/O Devices / File Systems 23 SJF (shortest-job-first) C9 - I/O Devices / File Systems 21 SPTF (shortest-positioning-time-first) C9 - I/O Devices / File Systems 23 SSF (shortest-seek-first) C9 - I/O Devices / File Systems 21 SSTF (shortest-seek-time-first) C9 - I/O Devices / File Systems 21 disk scheduling work-conserving C9 - I/O Devices / File Systems 24 non-work-conserving C9 - I/O Devices / File Systems 24 distance in a graph C1 - Network Layer (L2) 4 distance-vector --> DV distance-vector routing --> routing DISTINCT --> SQL statements: SELECT aggregate disturbance (SSD) C9 - I/O Devices / File Systems 30 sequential-programming approach C9 - I/O Devices / File Systems 32 DMA (direct memory access) C9 - I/O Devices / File Systems 5-6 1 2 3 <== Hierarchie Ort Seite DNS (domain name system) C3 - Application Layer (L4) 33 RR (ressource record): A: IPv4 domain name mapping AAAA: IPv6 domain name mapping CNAME: canonical name NS: name server MX: mailserver double hashing --> hashing with probing double indirect pointer (file system) --> indirect pointer duplex (half / full) C10 - Link Layer (L1) 80 duty cycling C10 - Link Layer (L1) 86 DV (distance-vector) routing --> routing dynamic hashing --> hashing dynamic host configuration protocol --> DHCP dynamic partitioning --> memory management C9 - I/O Devices / File Systems dynamic perfect hashing --> hashing E ECB --> electronic block code eigenvectors (Markov chains) C11 - Markov Chains & PageRank 97 electronic block code C12 - Security 116 elevator algorithm (SCAN) --> disk scheduler Elgamal authentication C12 - Security
Recommended publications
  • Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO
    Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO..........................................................................................................................................1 Martin Hinner < [email protected]>, http://martin.hinner.info............................................................1 1. Introduction..........................................................................................................................................1 2. Volumes...............................................................................................................................................1 3. DOS FAT 12/16/32, VFAT.................................................................................................................2 4. High Performance FileSystem (HPFS)................................................................................................2 5. New Technology FileSystem (NTFS).................................................................................................2 6. Extended filesystems (Ext, Ext2, Ext3)...............................................................................................2 7. Macintosh Hierarchical Filesystem − HFS..........................................................................................3 8. ISO 9660 − CD−ROM filesystem.......................................................................................................3 9. Other filesystems.................................................................................................................................3
    [Show full text]
  • 3 Comandos Linux
    Livro Eletrônico Aula 00 Sistemas Operacionais p/ AL-BA (Analista Legislativo - TI) Pós-Edital Professor: Celson Carlos Martins Junior Aula Demonstrativa Celson Carlos Martins Junior Aula 00 ESCLARECIMENTOS INICIAIS .......................................................................................................................................... 3 1 – INTRODUÇÃO .............................................................................................................................................................. 5 1.1 COMMUNITY ENTERPRISE OPERATING SYSTEM ........................................................................................... 6 1.2 RED HAT ENTERPRISE LINUX ......................................................................................................................... 8 1.3 INSTALAÇÃO CENTOS ................................................................................................................................... 10 1.4 GERENCIADOR INICIALIZAÇÃO .................................................................................................................... 17 1.5 SISTEMAS DE ARQUIVOS ................................................................................................................................ 18 1.6 SISTEMAS RAID ............................................................................................................................................. 20 1.7 RESOLUÇÃO DE QUESTÕES ..........................................................................................................................
    [Show full text]
  • Abkürzungs-Liste ABKLEX
    Abkürzungs-Liste ABKLEX (Informatik, Telekommunikation) W. Alex 1. Juli 2021 Karlsruhe Copyright W. Alex, Karlsruhe, 1994 – 2018. Die Liste darf unentgeltlich benutzt und weitergegeben werden. The list may be used or copied free of any charge. Original Point of Distribution: http://www.abklex.de/abklex/ An authorized Czechian version is published on: http://www.sochorek.cz/archiv/slovniky/abklex.htm Author’s Email address: [email protected] 2 Kapitel 1 Abkürzungen Gehen wir von 30 Zeichen aus, aus denen Abkürzungen gebildet werden, und nehmen wir eine größte Länge von 5 Zeichen an, so lassen sich 25.137.930 verschiedene Abkür- zungen bilden (Kombinationen mit Wiederholung und Berücksichtigung der Reihenfol- ge). Es folgt eine Auswahl von rund 16000 Abkürzungen aus den Bereichen Informatik und Telekommunikation. Die Abkürzungen werden hier durchgehend groß geschrieben, Akzente, Bindestriche und dergleichen wurden weggelassen. Einige Abkürzungen sind geschützte Namen; diese sind nicht gekennzeichnet. Die Liste beschreibt nur den Ge- brauch, sie legt nicht eine Definition fest. 100GE 100 GBit/s Ethernet 16CIF 16 times Common Intermediate Format (Picture Format) 16QAM 16-state Quadrature Amplitude Modulation 1GFC 1 Gigabaud Fiber Channel (2, 4, 8, 10, 20GFC) 1GL 1st Generation Language (Maschinencode) 1TBS One True Brace Style (C) 1TR6 (ISDN-Protokoll D-Kanal, national) 247 24/7: 24 hours per day, 7 days per week 2D 2-dimensional 2FA Zwei-Faktor-Authentifizierung 2GL 2nd Generation Language (Assembler) 2L8 Too Late (Slang) 2MS Strukturierte
    [Show full text]
  • Personal System Administration Guide
    Personal System Administration Guide Document Number 007-1366-190 CONTRIBUTORS Written by Amy Smith Updated by Douglas B. O’Morain, Laura Wirth Peters, Julie Boney, and Steven Levine Production by Karen Jacobson Engineering contributions by Betsy Zeller, Roger Chickering, Joe Ruffles, Chris Beekhuis, Jenny Leung, Chandra Pisupati, Ray Niblett, John Relph, Will Rusch, amd Rebecca Underwood. COPYRIGHT © 2000, 2003 Silicon Graphics, Inc. All rights reserved; provided portions may be copyright in third parties, as indicated elsewhere herein. No permission is granted to copy, distribute, or create derivative works from the contents of this electronic documentation in any manner, in whole or in part, without the prior written permission of Silicon Graphics, Inc. LIMITED RIGHTS LEGEND The electronic (software) version of this document was developed at private expense; if acquired under an agreement with the USA government or any contractor thereto, it is acquired as "commercial computer software" subject to the provisions of its applicable license agreement, as specified in (a) 48 CFR 12.212 of the FAR; or, if acquired for Department of Defense units, (b) 48 CFR 227-7202 of the DoD FAR Supplement; or sections succeeding thereto. Contractor/manufacturer is Silicon Graphics, Inc., 1600 Amphitheatre Pkwy 2E, Mountain View, CA 94043-1351. TRADEMARKS AND ATTRIBUTIONS Silicon Graphics, SGI, the SGI logo, IRIS, IRIX , and XFS are registered trademarks, and Extent File System (EFS), Impressario, IRIS InSight, and IRIS Showcase are trademarks, of Silicon Graphics, Inc., in the United States and/or other countries worldwide. Indy is a registered trademark used under license in the U.S. and owned by Silicon Graphics, Inc.
    [Show full text]
  • Linux Kernel Series
    Linux Kernel Series By Devyn Collier Johnson More Linux Related Stuff on: http://www.linux.org Linux Kernel – The Series by Devyn Collier Johnson (DevynCJohnson) [email protected] Introduction In 1991, a Finnish student named Linus Benedict Torvalds made the kernel of a now popular operating system. He released Linux version 0.01 on September 1991, and on February 1992, he licensed the kernel under the GPL license. The GNU General Public License (GPL) allows people to use, own, modify, and distribute the source code legally and free of charge. This permits the kernel to become very popular because anyone may download it for free. Now that anyone can make their own kernel, it may be helpful to know how to obtain, edit, configure, compile, and install the Linux kernel. A kernel is the core of an operating system. The operating system is all of the programs that manages the hardware and allows users to run applications on a computer. The kernel controls the hardware and applications. Applications do not communicate with the hardware directly, instead they go to the kernel. In summary, software runs on the kernel and the kernel operates the hardware. Without a kernel, a computer is a useless object. There are many reasons for a user to want to make their own kernel. Many users may want to make a kernel that only contains the code needed to run on their system. For instance, my kernel contains drivers for FireWire devices, but my computer lacks these ports. When the system boots up, time and RAM space is wasted on drivers for devices that my system does not have installed.
    [Show full text]
  • Esempi Di File System
    Esempi di File System 1 CP/M • Il sistema CP/M pu`oessere considerato l’antenato di MS-DOS • CP/M era un sistema operativo per macchine con processori a 8 bit e 4KB di RAM e un singolo floppy disk di 8 pollici con capacit`adi 180 KB. • CP/M era scarno e molto compatto e rappresenta un interessante esempio di sistema embedded • Quando caricato nella RAM: – Il BIOS contiene una libreria di 17 chiamate di sistema (interfaccia harware) – Il sistema operativo occupa meno di 3584 byte (< 4KB!); la shell occupa 2 KB 2 – Ultimi 256 byte: vettore interruzioni, buffer per la linea di comando Address 0xFFFF BIOS CP/M Shell User program 0x100 Zero page 0 • Comandi vengono copiati nel buffer, poi CP/M cerca il programma da eseguire, lo scrive a partire dall’indirizzo 256 e gli passa il controllo • Il programma pu`oscrivere sopra la shell se necessario File System in CP/M • CP/M ha una sola directory (flat) • Gli utenti si collegavano uno alla volta: i file avevano informazioni sul nome del proprietario • Dopo l’avvio del sistema CP/M legge la directory e calcola una mappa di bit (di 23 byte per un disco da 180KB) per i blocchi liberi • La mappa viene tenuta in RAM e buttata via quando si spegne la macchina 3 Elementi di directory in CP/M Bytes 1 8 3 1 2 16 File name Disk block numbers User code File type Extent Block count (extension) • Lunghezza del nome fissa: 8 caratteri + 3 di estensione • Extent: serve per file con pi`udi 16 blocchii: si possono usare pi`uelementi di directory per lo stesso file, extent mantiene l’ordine con cui leggere i blocchi • Contatore
    [Show full text]
  • IRIX Admin: Disks and Filesystems (This Guide)—Explains Disk, filesystem, and Logical Volume Concepts
    IRIX™ Admin: Disks and Filesystems Document Number 007-2825-002 CONTRIBUTORS Written by Susan Ellis Illustrated by Dany Galgani Production by Ruth Christian St Peter’s Basilica image courtesy of ENEL SpA and InfoByte SpA. Disk Thrower image courtesy of Xavier Berenguer, Animatica. © 1996, Silicon Graphics, Inc.— All Rights Reserved The contents of this document may not be copied or duplicated in any form, in whole or in part, without the prior written permission of Silicon Graphics, Inc. RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure of the technical data contained in this document by the Government is subject to restrictions as set forth in subdivision (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 52.227-7013 and/or in similar or successor clauses in the FAR, or in the DOD or NASA FAR Supplement. Unpublished rights reserved under the Copyright Laws of the United States. Contractor/manufacturer is Silicon Graphics, Inc., 2011 N. Shoreline Blvd., Mountain View, CA 94043-1389. Silicon Graphics, the Silicon Graphics logo, and IRIS are registered trademarks, and IRIX, XFS, Extent File System, Indy, CHALLENGE, Origin2000, IRIS InSight, and REACT are trademarks of Silicon Graphics, Inc. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. FLEXlm is a trademark of Globetrotter Software, Inc. NFS is a registered trademark of Sun Microsystems. NetWorker is a registered trademark of Legato Systems, Inc. EXABTYE is a trademark of EXABTYE Corporation. IRIX™ Admin: Disks and Filesystems Document Number 007-2825-002 Contents List of Examples xi List of Figures xiii List of Tables xv IRIX Admin Manual Set xvii About This Guide xix What This Guide Contains xix Conventions Used in This Guide xx How to Use This Guide xxii Product Support xxiii Additional Resources xxiii 1.
    [Show full text]
  • Hp Openview Storage Data Protector 5.1 Platform & Integration Support
    hp OpenView storage data protector 5.1 Platform & Integration support matrices Version: 1.0 Edition date: May 15, 2003 supported operating systems Data Protector supported operating systems component Cell Manager • Windows NT 4.06 • Windows XP PRO • Windows 2000 • Windows 2003 (32-bit) • HP-UX 11.03, 11.113,5, 11.20 1,3,5 • Solaris 7, 8 & 9 Installation Server • Windows NT 4.06 • Windows XP PRO • Windows 2000 • Windows 2003 (32-bit) • HP-UX 11.03, 11.113,5, 11.20 1,3,5 • Solaris 7, 8 & 9 2 Graphical User Interface7 • Windows XP HE • Windows XP PRO • Windows XP 64-bit • Windows NT 4.0 • Windows 2000 • Windows 2003 (32-bit) 1,3,5 • HP-UX 11.03, 11.113,5, 11.20 • Solaris 7, 8 • Windows NT 4.0 Managers-of-Managers (MoM) • Windows 2000 • Windows XP PRO • Windows 2003 (32-bit) 1,3,5 • HP-UX 11.03, 11.113,5, 11.20 • Solaris 7, 8 & 9 • Windows NT 4.0, Windows 2000 Backup Device Server (media • Windows XP PRO, XP (64-bit) agent), including robotic • Windows 2003 (32-bit) control • Windows 2003 (64-bit) (For Linux, only 32-bit is • Novell NetWare 4.22, 5.12, 6.02 supported) • HP-UX (PA-RISC) -- 11.03, 11.113,5, • HP-UX (IA64) -- 11.201,3,5, 11.223,5 • Tru64 5.xx • OpenVMS 7.3-1 4 • Sun Solaris 2.6, 7, 8, 9 • MPE/iX 6.02, 6.52, 7.02, 7.52 • Linux Redhat 7.x, 8.x • RedHat Enterprise Linux -- Advanced Server 2.18 • Linux SuSe 7.x, 8.x • Linux Debian 3.0 1 The above list plus the following: Backup Device Server (media agent), without • IBM AIX 4.3.x, 5Lver.5.1, 5.2 • SNI Sinix 5.4.3, 5.4.4 robotic control • SCO OpenServer 5.0.5 • Windows NT 4.0 Backup
    [Show full text]
  • Generating Computer Forensic Supertimelines Under Linux
    Generating computer forensic super- timelines under Linux A comprehensive guide for Windows-based disk images R. Carbone Certified Hacking Forensic Investigator (EC-Council) DRDC Valcartier C. Bean Certified Hacking Forensic Investigator (EC Council) Defence R&D Canada – Valcartier Technical Memorandum DRDC Valcartier TM 2011-216 October 2011 Generating computer forensic super- timelines under Linux A comprehensive guide for Windows-based disk images R. Carbone Certified Hacking Forensic Investigator (EC Council) DRDC Valcartier C. Bean Certified Hacking Forensic Investigator (EC Council) Defence R&D Canada – Valcartier Technical Memorandum DRDC Valcartier TM 2011-216 October 2011 Principal Author Richard Carbone Programmer/Analyst Approved by Guy Turcotte Head/System of Systems Approved for release by Christian Carrier Chief Scientist © Her Majesty the Queen in Right of Canada, as represented by the Minister of National Defence, 2011 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2011 Abstract …….. This technical memorandum examines the basics surrounding computer forensic filesystem timelines and provides an enhanced approach to generating superior timelines for improved filesystem analysis and contextual awareness. Timelines are improved by polling multiple sources of information across the filesystem resulting in an approach that is surprisingly flexible and customizable. The timeline is further enhanced by incorporating key time-based metadata found across a disk image which, when taken as a whole, increases the forensic investigator’s understanding. Résumé …..... Ce mémorandum technique examine les bases entourant la création d’un calendrier des événements inforensiques des systèmes de fichier et fournit une approche améliorée pour générer des calendriers supérieurs pour une analyse améliorée des systèmes de fichiers et un meilleur éveil contextuel.
    [Show full text]
  • Einführung in Die Informatik Inf, SAT, Wing, Mi
    Einführung in die Informatik Inf, SAT, Wing, Mi Dipl.-Inf., Dipl.-Ing. (FH) Michael Wilhelm Hochschule Harz FB Automatisierung und Informatik [email protected] http://www.miwilhelm.de Raum 2.202 Tel. 03943 / 659 338 FB Automatisierung und Informatik: Einführung in die Informatik 1 Inhalt 1. Grundlagen der Informatik Zahlensysteme, Nachkommazahlen, Single-Format 2. Rechnerarchitekturen (Hard- und Softwaresysteme) Rechnerarchitekturen, Betriebssysteme, 3. Programmierung Sprachen, Datentypen, Datenstrukturen, Programmiermodelle, Compiler, Programmierparadigmen, Domänenspezifische Sprachen, Algorithmen 4. Verteilte Systeme (Netzwerke) 5. Themenfelder der Informatik Datenbanken, Big Data, Multimediaverarbeitung, Software Engineering, KI, Human Computing Interface, Robotics, VR/AR FB Automatisierung und Informatik: Einführung in die Informatik 2 1 Klassifizierung von Rechnerarchitekturen: . Einprozessorsysteme John v. Neumann – Eine CPU – Ein Bus Havard-Rechnerarchitekturen – Mehrere CPU‘s – Mindestens zwei Bussysteme (North- und SouthBridge) – Aufteilen der Geräte in Bezug auf die Geschwindigkeit FB Automatisierung und Informatik: Einführung in die Informatik 3 Von-Neumann Architektur nach John von Neumann Steuerwerk Befehlszähler Befehl Ein-/ Akumulator Speicher Ausgabe Prozessor = Daten Rechenwerk + Arithmetic-Logical-Unit (ALU) + Daten Steuerwerk Speicher ALU Module FB Automatisierung und Informatik: Einführung in die Informatik 4 2 Rechenwerk: ALU MDU BITP SFT ALU: Arithmetisch-Logische-Einheit MDU: Mupliplikation / Division
    [Show full text]
  • Journal Paper Format
    International Journal of Smart Home Vol. 7, No. 1, January, 2013 XFS File System and File Recovery Tools Sekie Amanuel Majore1, Changhoon Lee2 and Taeshik Shon3 1,3Department of Computer Engineering, Ajou University Woncheon-doing , Yeongton-gu, Suwon, Korea {amanu97, tsshon}@ajou.ac.kr 2Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Korea [email protected] Abstract XFS file system is a designed to suppot very large system and parallelism efficiently. This is feature attracks different organizations which handle big data. Even there consumers electronic devices which use XFS file systems. But there are very few file explorer and recover tools that can work on XFS file system. In this paper we discuss major features of XFS file system and two file explore and recovey tools. Keywords: XFS file system, file explorer, file recovery 1. Introduction File system as one of main component of operating system, it has been evolved to cope with advancement of storage devices capacity and parallel processing. For in-stance ext file system went through much evolution ext2, ext3, ext4 .Some of the reason for these advancement were need to support large file system, large file and short recovery period after crash. Around 1990s, it became clear that EFS (Extent File System) that would not be efficient to support the new application which require high disk capacity, bandwidth capacity and parallelism. As response to these challenges, SGI developed XFS file system from scratch [1]. XFS was ported to Linux in 1999 and today is used by well-known institution such CERN and Fermilab managing petabytes of storage for scientific.
    [Show full text]
  • The Linux Kernel: Configuring the Kernel Part 16
    The Linux Kernel: Configuring the Kernel Part 16 In this article, we will discuss the input/output ports. First, the "i8042 PC Keyboard controller" driver is needed for PS/2 mice and AT keyboards. Before USB, mice and keyboards used PS/2 ports which are circular ports. The AT keyboard is an 84­key IBM keyboard that uses the AT port. The AT port has five pins while the PS/2 port has six pins. Input devices that use the COM port (sometime called RS232 serial port) will need this diver (Serial port line discipline). The COM port is a serial port meaning that one bit at a time is transferred. The TravelMate notebooks need this special driver to use a mouse attached to the QuickPort (ct82c710 Aux port controller). Parallel port adapters for PS/2 mice, AT keyboards, and XT keyboards use this driver (Parallel port keyboard adapter). The "PS/2 driver library" is for PS/2 mice and AT keyboards. "Raw access to serio ports" can be enabled to allow device files to be used as character devices. Next, there is a driver for the "Altera UP PS/2 controller". The PS/2 multiplexer also needs a driver (TQC PS/2 multiplexer). The ARC FPGA platform needs special driver for PS/2 controllers (ARC PS/2 support). NOTE: I want to make it clear that the PS/2 controllers that are discussed in this article are not Sony's game controllers for their PlayStation. This article is discussing the 6­pin mouse/keyboard ports. The controller is the card that holds the PS/2 ports.
    [Show full text]