Export, Full backup, Gfs (grandfather-father-son) – Acronis Backup for PC - User Guide User Manual

Page 239: Image, Incremental backup, Indexing, P. 239)

Advertising
background image

239

Copyright © Acronis International GmbH, 2002-2014

In case the storage medium is stolen or accessed by an unauthorized person, the malefactor will not
be able to decrypt the vault contents without access to the storage node. Encrypted archives (p. 238)
will be encrypted over the encryption performed by the agent (p. 232).

Export

An operation that creates a copy of an archive (p. 232) or a self-sufficient part copy of an archive in
the location you specify. The export operation can be applied to a single archive, a single backup (p.
232) or to your choice of backups belonging to the same archive. An entire vault (p. 243) can be
exported by using the command line interface.

F

Full backup

A self-sufficient backup (p. 232) containing all data chosen for backup. You do not need access to any
other backup to recover the data from a full backup.

G

GFS (Grandfather-Father-Son)

A popular backup scheme (p. 233) aimed to maintain the optimal balance between a backup archive
(p. 232) size and the number of recovery points (p. 241) available from the archive. GFS enables
recovering with daily resolution for the last several days, weekly resolution for the last several weeks
and monthly resolution for any time in the past.

For more information please refer to GFS backup scheme (p. 41).

I

Image

The same as Disk backup (p. 236).

Incremental backup

A backup (p. 232) that stores changes to the data against the latest backup. You need access to other
backups from the same archive (p. 232) to recover data from an incremental backup.

Indexing

An activity (p. 232) performed by a storage node (p. 242) after a backup (p. 232) has been saved to a
deduplicating vault (p. 236).

During indexing, the storage node performs the following operations:

Moves data blocks from the backup to a special file within the vault. This file is called the
deduplication data store.

In the backup, replaces the moved blocks with their fingerprints ("hashes")

Saves the hashes and the links that are necessary to "assemble" the deduplicated data, to the
deduplication database.

Advertising