DOC PREVIEW
SJSU CS 265 - Rsync

This preview shows page 1-2-3-4-5-6 out of 18 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Rsync:ProblemSolution: RsyncOverview of How Hashing UsedIdeal CaseIdeal ProtocolSender Analyzes Own BlocksCommands: Copy or AddAdvantage of IdealDisadvantage of IdealCompute More HashesOrdinary Sum of BytesDisadvantage of a Simple SumWeighted SumReordering the i + 1 SumFurther EnhancementsSynchronizing DirectoriesSummary of Hashing UsedRsync: Efficiently Synchronizing Files Using HashingBy David ShaoFor CS 265, Spring 2004ProblemWant to synchronize with newer version of a file on a remote serverWant to minimize data sent over slow network linkWant to minimize (round-trip) communication latenciesSolution: RsyncOpen source software projecthttp://samba.anu.edu.au/rsync/Command line driven server and client for Unix-like systemsSynchronizes directories as well as filesAndrew Tridgell’s Ph.D. thesisOverview of How Hashing UsedCan reduce amount of data sent if willing to live with a very small probability of inaccuracySeveral layers of hashing—fast but less accurate and slower but almost always accurate both usedIdeal CaseDivide files into equal-sized blocksFiles are almost identical except for relatively few blocksHave almost all of the data blocks one needs—but how to know it.ReceiverSenderIdeal ProtocolReceiverSenderHashes of blocksCommands on how to build fileSender Analyzes Own BlocksHash Receiver Block 1Hash Receiver Block 2Hash Receiver Block 3Hash Receiver Block 4Hash Sender Block?Commands: Copy or AddCOPY: If the receiver already has the data block, just tell him to copy it. ADD: If the receiver does not have a data block, send it to him. COPY cheap, ADD expensiveAdvantage of IdealIf COPY, reduction in network traffic by factor approximately L / h, where L is the block size and h is the size of a hash of a block of size LDisadvantage of IdealExample: Edit source code, delete a comment at the beginningBlocks no longer neatly alignedCompute More HashesSender needs to compute hash at every byte positionMore expensive: L times more hashes computed by senderUse weaker, faster hash to weed outOrdinary Sum of BytesRolling-type property: sum of L bytes starting at position i+1 almost the same as sum starting at i.Subtract red, add green, yellow sameSum starting at iSum starting at i+1Disadvantage of a Simple SumA simple sum is too symmetricSum of “All men are mortals” is the same as “All mortals are men”Weighted SumFirst bytes have more weight than the tail ones—arbitrary decision0 1 2 3 4 5 6 0 1 2 3 4 5 6Reordering the i + 1 SumRed part to be subtracted and the green part to be added. Yellow is same.0 1 2 3 4 5 6 0 1 2 3 4 5 6Further EnhancementsCompute separate (MD4) signature for entire fileReconstruct new file using temporary storage so that the old version is never removed until a new one is known to be goodSynchronizing DirectoriesDivide into separate receiver/generatorReceiverGeneratorSenderSummary of Hashing UsedWeaker easier to compute hash with the rolling propertyStronger hash (MD4) once most candidates have been weeded outSignature over entire file as a separate


View Full Document

SJSU CS 265 - Rsync

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Rsync
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Rsync and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Rsync 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?