|This article needs additional citations for verification. (July 2009)|
File synchronization (or syncing) in computing is the process of ensuring that computer files in two or more locations are updated via certain rules.
In one-way file synchronization, also called mirroring, updated files are copied from a 'source' location to one or more 'target' locations, but no files are copied back to the source location. In two-way file synchronization, updated files are copied in both directions, usually with the purpose of keeping the two locations identical to each other. In this article, the term synchronization refers exclusively to two-way file synchronization.
File synchronization is commonly used for home backups on external hard drives or updating for transport on USB flash drives. Bittorrent Sync and Dropbox are prominent products. The automatic process prevents copying already identical files and thus can be faster and save much time versus a manual copy, and is less error prone. However this suffers from the limit that the synchronized files must physically fit in the portable storage device. Synchronization software that only keeps a list of files and the changed files eliminates this problem (e.g. the "snapshot" feature in Beyond Compare or the "package" feature in Synchronize It!). It is especially useful for mobile workers, or others that work on multiple computers.
It is possible to synchronize multiple locations by synchronizing them one pair at a time. The Unison Manual describes how to do this:
- If you need to do this, the most reliable way to set things up is to organize the machines into a “star topology,” with one machine designated as the “hub” and the rest as “spokes,” and with each spoke machine synchronizing only with the hub. The big advantage of the star topology is that it eliminates the possibility of confusing “spurious conflicts” arising from the fact that a separate archive is maintained by Unison for every pair of hosts that it synchronizes.
Common features of file synchronization systems include:
- Encryption for security, especially when synchronizing across the Internet.
- Compressing any data sent across a network.
- Conflict detection where a file has been modified on both sources, as opposed to where it has only been modified on one. Undetected conflicts can lead to overwriting copies of the file with the most recent version, causing data loss. For conflict detection, the synchronization software needs to keep a database of the synchronized files. Distributed conflict detection can be achieved by version vectors.
- Open Files Support ensures data integrity when copying data or application files that are in-use or database files that are exclusively locked.
- Specific support for using an intermediate storage device, such as a removable flash disc, to synchronize two machines. Most synchronizing programs can be used in this way, but providing specific support for this can reduce the amount of data stored on a device.
- The ability to preview any changes before they are made.
- The ability to view differences in individual files.
- Backup between operating systems and transfer between network computers.
Possible security concerns
Consumer-grade file synchronization solutions are popular, however for business use, they create a concern of allowing corporate information to sprawl to unmanaged devices and cloud services which are uncontrolled by the organization.
- Comparison of file synchronization software
- Comparison of online backup services
- Data synchronization
- Data comparison
- Mirror (computing)
- Backup software
- List of backup software
- Remote backup service
- Shared file access
- A. Tridgell (February 1999). "Efficient algorithms for sorting and synchronization". PhD thesis. The Australian National University.
- Pierce, Benjamin (2009). "Unison File Synchronizer. User Manual and Reference Guide.". Retrieved 27 January 2014.
- "Why Should You Backup Your Mac to a Windows (OS based) Computer?". Wei-Soft. Retrieved 23 November 2014.
- de Boer, Mario. Enterprise File Synchronization and Sharing: Thinking Through the Security Issues. 25 October 2013. p.3