|
Key
This line was removed.
This word was removed. This word was added.
This line was added.
|
Changes (1)
View Page History![](http://198.64.248.210:8090/images/icons/grey_arrow_right.gif)
Checksums can be used to compute Deltas. The main advantage of the checksum method is that granularity beyond complete files is provided. Checksum methods all have some concept of a block where a block is either defined as fixed length or variable length. In the fixed length example a file is broken into fixed length byte ranges or blocks for example 4 KB. A unique signature called check sum is then computed based on the 4 KB. The most popular checksums for this purpose are [MD4|http://en.wikipedia.org/wiki/MD4] and [MD5|http://en.wikipedia.org/wiki/MD5]. For more information on checksums see: [http://en.wikipedia.org/wiki/Cryptographic_hash_function]
The most popular algorithm for computing deltas in backup applications is the [rsync|http://en.wikipedia.org/wiki/Rsync#Algorithm] algorithm. _Many_ commerical backup applications use the rsync algorithm to compute deltas for backup purposes. One of the best known is [Evault|http://www.evault.com/]. Evault actually has a [patent on the process|http://www.google.com/patents?id=4Gl7AAAAEBAJ] of using variable length block deltas for incremental backup purposes. Some backup application vendors like [Vembu |http://www.vembu.com]actually [brag about bering based on rsync algorithm|http://www.vembu.com/storegrid/rsync-incremental-backup.html].
The are two major challenges with the process of using check sums to compute deltas.
![](http://198.64.248.210:8090/images/icons/grey_arrow_right.gif)