Talk:Development ideas: Difference between revisions

From ReddNet
Jump to navigation Jump to search
No edit summary
No edit summary
Line 12: Line 12:
**or more levels
**or more levels


*It seems to be common in distributed systems to use a binary hash tree rather than a hash list even on individual data blocks.
*It seems to be common in distributed systems to use a binary hash tree rather than a hash list -- even on individual data blocks.
**Tiger Tree Hash TTH is the most? popular since it provides both high performance and high security
**Tiger Tree Hash TTH is the most? popular since it provides both high performance and high security
**http://en.wikipedia.org/wiki/Tiger_%28hash%29
**http://en.wikipedia.org/wiki/Tiger_%28hash%29

Revision as of 11:47, 24 January 2008

Data Integrity section.

  • One could imagine a 3-level tree
    • a hash for each lowest-common-unit, say the commonly used 1 Kbyte data size
    • a single top hash for each IBP allocation
    • a single top hash for the file
    • or more levels

If the IBP protocol were to be extended to support a single specific checksum method it would possibly be something like TTH. In this example, this would mean TTH usage becomes part of the IBP protocol and both the client and depot would have to implement it.

- Dan 1/24/08