You are here: Home Previous Courses 2012 Distributed Storage and Computer …

Distributed Storage and Computer Forensic

joint lecture of Prof. Christian Schindelhauer and Amir Alsbih (Haufe-Lexware)

News

  • 14.10. 2011 Webpage online
  • 24.10. 2011 First lecture
  • 16.12. 2011 Certificate in websystem changed
  • 12.01. 2012 Computer Forensics part starts
  • 16.02. 2012 Exercise will for once take place in  Building 052-02-017

Contents

These days even end consumers use storage area networks in their homes. This development was enabled by the massive price fall of mass storage and the transition of home video from tape recorders to home computers. Another trend is to outsource storage into the Internet where companies like Google, Amazon, and Apple are selling online storage at cheap prices. 

In this lecture we will give an introduction to the algorithms and methods used in modern distributed storage systems. We will start at the physical level of storing data, have a look at the networking issues, and will talk about management of storage systems. At the end will focus on data safety and distributed storage area networks.

  • Organization, introduction, motivation 
  • Hardware: hard disks, flash memory 
  • File systems 
  • Distributed file systems 
  • Connections and interfaces 
  • Storage organisation 
  • Selected topics of distributed systems
  • Conflict resolution 
  • Caching strategies 
  • Redundancy mechanisms
  • Raid and replication 
  • Coding theory 
  • Distributed storage systems
  • Internet storage systems 
  • Forensic

Organisation

Schedule

  • Lecture
    • Monday, 12:00 - 13:00 c.t., Building 101 - 010-014
    • Thursday, 10:00 - 12:00 c.t., Building 101 - 010-014
  • Exercises
    • Monday, 13:00 - 14:00 c.t., Building 101 - 010-014
    • Thursday, 14:00 - 15:00 c.t., Building 051 - 00-034

Forum

Please use the forum1 for general questions about the lecture. Maybe your question and the answer is probably interesting to other students. Please feel free to start new threads and interesting discussion.

Material

Slides

  • Lecture 1: Organization, Motivation, Overview pdf2 (24.10.2011)
  • Lecture 2: Disks pdf3 (24.10.2011)
  • Lecture 3: SSD pdf4 (31.10.2011)
  • Lecture 4: Volumen manager, RAID pdf5 (3.11.2011)
  • Lecture 5: RAID6 Codes pdf6 (3.11.2011)
  • Lecture 6: File systems pdf7 (14.11.2011)
  • Lecture 7: Storage Virtualization and DHT pdf8 (17.11.2011)
  • Lecture 8: Analysis of DHT pdf9 (18.11.2011)
  • Lecture 9: DHHT pdf10 (01.12.2011)
  • Lecture 10: P2P Storage pdf11 (12.12.2011)
  • Lecture 11: Forensics pdf12 (12.01.2012)
  • Lecture 12: Forensics pdf13 (16.01.2012)
  • Lecture 13: Forensics pdf14 (19.01.2012)
  • Lecture 14: Forensics pdf15 (23.01.2012)
  • Lecture 15: Forensics pdf16 (26.01.2012)
  • Lecture 16: Forensics pdf17 (30.01.2012)
  • Lecture 17: Networking pdf18 (09.02.2012)
  • Lecture 18: Forensics pdf19 (13.02.2012)

Recordings

  • Lecture 1: Organization, Motivation, Overview, no recording because of technical problems (24.10.2011)
  • Lecture 2: Hard Discs mp420, (last 5 minutes missing) (27.10.2011)
  • Lecture 3: Solid State Discs mp421, (31.10.2011)
  • Lecture 4: RAID mp422, (03.11.2011)
  • Lecture 5: RAID-6 mp423, (07.11.2011)
  • Lecture 6: RAID-6 Encoding mp424, (10.11.2011)
  • Lecture 7: File Systems mp425, (14.11.2011)
  • Lecture 8: B*-Trees, Virtualization mp426 (17.11.2011)
  • Lecture 9: DHT mp427 (21.11.2011)
  • Lecture 10: Analysis of DHT mp428 (24.11.2011)
  • Lecture 11: Balls into bins mp429 (28.11.2011)
  • Lecture 12: DHHT: The linear method mp430 (01.12.2011)
  • Lecture 13: DHHT: The logarithmic method mp431 (05.12.2011)
  • Lecture 14: Assignment problem and linear programming mp432 (08.12.2011)
  • Lecture 15: Assignment problem and linear programming mp433 (12.12.2011)
  • Lecture 16: P2P Chord mp434 (15.12.2011)
  • Lecture 17: Pastry mp435 (19.12.2011)
  • Lecture 18: Tapestry, Past mp436 (22.12.2011)
  • Lecture 19: Oceanstore mp437 (09.01.2012)
  • Lecture 20: Computer Forensic 1 mp438 (12.01.2012)
  • Lecture 21: Computer Forensic 2 mp439 (16.01.2012, no audio)
  • Lecture 22: Computer Forensic 3 mp440 (19.01.2012)
  • Lecture 23: Computer Forensic 4 mp441 (23.01.2012)
  • Lecture 24: Computer Forensic 5 avi42 (26.01.2012)
  • Lecture 25: Computer Forensic 6 avi43 (30.01.2012)
  • Lecture 26: Computer Forensic 7 avi44 (02.02.2012)
  • Lecture 27: Computer Forensic 8 avi45 (06.02.2012)
  • Lecture 28: Networking mp446 (09.02.2012)
  • Lecture 29: Computer Forensic 9 avi47 (13.02.2012)
  • Lecture 30: Computer Forensic 10 avi48 (16.02.2012)

Exercises

Submit solutions over our websystem49. Deadline for exercise submission is Sunday evening 11:59 pm.

  • Exercise 1 pdf50 (25.10.2011)
  • Exercise 2 pdf51 (1.11.2011)
  • Exercise 3 pdf52 (8.11.2011)
  • Exercise 4 pdf53 (15.11.2011)
  • Exercise 5 pdf54 (22.11.2011)
  • Exercise 6 pdf55 (29.11.2011)
  • Exercise 7 pdf56 (6.12.2011)
  • Exercise 8 pdf57 (13.12.2011)
  • Exercise 9 pdf58 (20.12.2011)
  • Exercise 10 pdf59 (11.01.2012)
  • Exercise 11 pdf60 (17.01.2012)
  • Exercise 12 zip61 (25.01.2012)
  • Exercise 13 zip62 (02.02.2012)

Exam

There will be oral exams at the end of the lecture. Students are allowed to use a selection of their exercise solutions in the exam. To be selected the solution should be submitted to the tutor during the semester within the deadline, also a review has to be done on the solutions of five peers. Furthermore, non relevant or wrong solutions may not be selected.

Literature

  • Real Digital Forensics: Computer Security and Incident Response
  • File System Forensic Analysis
  • Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
  • Storage Networks Explained, Basics and Application of Fibre Channel SAN, SAN, iSCSI and InfiniBand, Ulf Troppens, Rainer Erkens, Wolfgang Müller
  • Technological impact of magnetic hard disk drives on storage systems, Grochowski, R. D. Halem, IBM SYSTEMS JOURNAL, VOL 42, NO 2, 2003
  • A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems
    James S. Plank , 1999 (pdf63)