An Optimized VLSI Based High Performance Architecture for Lossless Data Compression

Total Page:16

File Type:pdf, Size:1020Kb

An Optimized VLSI Based High Performance Architecture for Lossless Data Compression International Journal of Advanced Science and Technology Vol. 29, No. 5, (2020), pp. 9503-9510 An Optimized VLSI Based High Performance Architecture for Lossless Data Compression 1*R.Umamaheswaran, 2**S.R.Santhosh kumaran, 3R.Parameshwaran, 4G. Lakshminarayanan, 5S.Thiruppathirajan, 6R. Manikandan 1Scientific Secretary, ISRO, Bengaluru, India. Mail Id: [email protected], 9496040095 2,3,4Department of ECE, National Institute of Technology-Tiruchirappalli, India Mail Id: [email protected] , 9487679810, [email protected], 8056303057 [email protected], 9486001109 5Avionics Entity, VSSC, Department of Space, Thiruvananthapuram, India Mail Id: [email protected], 9446101839 6School of Computing, SASTRA Deemed University, India [email protected], 8667872608 Abstract Data compression is method of encoding rules, which allows substantial reduction in total number of bits to transmit or store file. To archive or transmit binary files or text, lossless data compression is utilized, which is need to keep data intact at any time. LZRW1 (Lempel Ziv Ross Williams) and LZW (Lempel Ziv Welch) was mainly used for lossless data Compression. But LZW takes more time to Compress and decompress data. LZRW refers to variants of LZ77 lossless data compression techniques with emphasis on increasing compression speed by use of hash tables and other methods. In order to provide high throughput of data, a hash table is implemented by replacing the dictionary in LZW. This method has worst case running time. It adapts quickly and neglects initialisation in making it fast as well as powerful for small blocks of data and large ones. The speed of compression has been increased by four times that of LZW.The compression ratio obtained also be relatively same as that of LZW.The proposed algorithm was implemented in system verilog, simulated by using Questa sim tool and synthesised in Xilinx Vivado. KEYWORDS: Data compression, Dictionary-Based, Decompression, Embedded Real time System, Fixed length encoding, Hash Table, Telemetry system, Throughput. 1. Introduction “To store or transmit file, data compression is method of encoding rules, which allows substantial reduction in total number of bits. At present in various areas, two basic classes of data compression are used. One is lossy data compression that is used widely to compress image files for archives are communication purposes. Another is lossless data compression, which is used commonly to archive or transmit text or binary files need to keep data intact at anytime. Storage and data transmission cost money. More costs for more data dealt with. Most digital data not stored in compact form. They stored in way which easy to use. Binary code is executed in computer, individual samples from data acquisition system, ASCII text from word processors, etc [2]. Easy to use encoding methods need data files, which is twice as actually needed to represent data. In general term to address data compression for different techniques and programs are produced [1-2]. To convert data from easy to use to ISSN: 2005-4238 IJAST 9503 Copyright ⓒ 2020 SERSC International Journal of Advanced Science and Technology Vol. 29, No. 5, (2020), pp. 9503-9510 optimized format for compactness, compression program is used. Similarly, uncompress ion program returns data to original form”. Lossless method mostly include Lempel and Ziv codes, most of implementation of LZ technique depends on systolic arrays, or its variant that combines systolic array by plants for information broad cast as well as reduction[1]. A popular version of LZ technique is known as word based LZ technique, which is dictionary method[12]. In this method text elements would only send index to dictionary. It needs Quite lot of time to adjust dictionary. To improve this, an algorithm which is completely based on high throughput, which is LZRW1 [6].An algorithm which is mainly focused on high throughput and data rate is proposed which increases the transmission data per second. This algorithm is better for applications where continuous transmission of data is required. In Two-stage architecture, it will provide a better scope by giving high compression and throughput. The algorithm, which we proposed, is LZRW1, which replaces LZW dictionaries with hash table. This algorithm uses a hash table using which we can attain a high throughput and high compression as that of LZW [6].Using this in telemetry system will be more advantageous. A telemetry system is utilized to calculate performance of aircraft and diagnose failures by detecting aircraft responses [7]. Highly powerful data channel transmission is required and high real time testing, which may be helped by this method. 2. Lzrw Architecture Extremely fast local adaptive technique of LZ77 class is proposed. Technique known as LZEW1 haves size of 16k memory text files. This technique runs in speed of 77k and 250k bytes/sec. It has worst case running time [2]. For small blocks of data and large one, it adapts quickly and negligible initiation overhead which makes efficient and fast. With tight throughput need these techniques are not fast enough for embedded real time systems. Generally these techniques are fast. Systems time is significant in designers and constraints of second space. Figure 1 shows LZRW1 technique with new structure, which gives better output. To process each byte, this technique has few instructions but gives useful compression. It uses copy/single pass literal mechanism. At every step few bytes of input are transferred either directly as pointer or string to already transmitted text. Fig 1 optimized LZRW Architecture ISSN: 2005-4238 IJAST 9504 Copyright ⓒ 2020 SERSC International Journal of Advanced Science and Technology Vol. 29, No. 5, (2020), pp. 9503-9510 Below example shows how certain message is divided into literal items and copy items. Less length, uncompressed copy item has 3 bytes. By representing message using copy items, compression is obtained, but by resorting to literal items three or more bytes not found. For example: Fig 2 content model LZ77 class algorithms are achieved by converting text into sequence of item. Each is either copy or literal item. Literal items contain text they represent. Copy items contain pointer and offset which points to substring already transmitted text. Literal item has single byte, which coded directly. In most recent 4095 bytes of history, copy item contains 2 bytes which specify offset [1, 4095] and length [3,16] of string appear. To preserve byte alignment, control bits shows items of copy or literal and these are clustered to groups of 16. Compression Algorithm: The algorithms data structure, which forms its source model, consists of a few scalar variables, input block, hash table of 4096 pointers [5].Fig 2 and Fig 3 represents the corresponding optimized algorithm flow for the architecture. Input Hash tbl pointer byte addr A w 3EA 1 wa 939 2 wal 451 3 alr A53 4 lru 893 5 … … … Table 1 parameters Algorithm “The hash table maps any three-byte key to a single pointer which can point anywhere in the memory but is likely to point to matching key. The hash table is used to try to find a ISSN: 2005-4238 IJAST 9505 Copyright ⓒ 2020 SERSC International Journal of Advanced Science and Technology Vol. 29, No. 5, (2020), pp. 9503-9510 match in the table for first three bytes or more of ziv bytes (next 16 bytes are coded) with a match resulting in copy item generation”. LZRW1 updates the hash table after each byte as shown in Table 1. Compression Algorithm 1. Input first 16 bytes of string 2. if length of string >2 Copy the string to hast table 3. Store the pointing address in table of pointer. 4. if the string is redundant , The string will be compared 5. An offset value will be created 6. This offset value is passed to table of pointer 7. The value will be stored. 8. An equivalent compressed value will be obtained. 9. When string reaches end, the compression will be done 10. Compressed data will be printed. Fig 3 Compression Algorithm Decompression Algorithm: It accepts one compressed piece of data at a time, data in valid accepts the compressed input and outputs one byte of data. Data in valid is high when the control word is high, the decompressor will go into the DECOMPRESS state. In this state, the decompressor will use the high 4 bits of the data in input to determine the length of the compressed data and the low 12 bits to get the offset. It has a 4095 Bytes offset range. It outputs a distinct byte of data on decompressed byte for each out valid cycle is 1'b1, and then returns to the IDLE state after it's done, where it can accept new data. If the above conditions are met except that control word in is 1'b0, the decompressor must simply pass through the byte when writing down the relevant space in its history memory. The detailed block diagram has been given in Fig 4, which gives the proper image of I/O ports. Decompression Algorithm 1. Initialization 2. while controlword is high Data_in is high, decompress state 3. Out of 16 bits, first 4 bit will identify length of compress data 4. low 12 bits to get offset 5. when control word high, The compressed data in the history buffer Will be decompressed. 6. Print the decompressed result 7. repeat from step 2, until out valid is high 8. Print the complete decompressed result ISSN: 2005-4238 IJAST 9506 Copyright ⓒ 2020 SERSC International Journal of Advanced Science and Technology Vol. 29, No. 5, (2020), pp. 9503-9510 9. Stop Fig 4 Decompression Algorithm Out valid is set to go high for one cycle to allow the byte to pass. It will go back to the IDLE status after that one clock cycle.
Recommended publications
  • Data Compression for Remote Laboratories
    Paper—Data Compression for Remote Laboratories Data Compression for Remote Laboratories https://doi.org/10.3991/ijim.v11i4.6743 Olawale B. Akinwale Obafemi Awolowo University, Ile-Ife, Nigeria [email protected] Lawrence O. Kehinde Obafemi Awolowo University, Ile-Ife, Nigeria [email protected] Abstract—Remote laboratories on mobile phones have been around for a few years now. This has greatly improved accessibility of these remote labs to students who cannot afford computers but have mobile phones. When money is a factor however (as is often the case with those who can’t afford a computer), the cost of use of these remote laboratories should be minimized. This work ad- dressed this issue of minimizing the cost of use of the remote lab by making use of data compression for data sent between the user and remote lab. Keywords—Data compression; Lempel-Ziv-Welch; remote laboratory; Web- Sockets 1 Introduction The mobile phone is now the de facto computational device of choice. They are quite powerful, connected devices which are almost always with us. This is so much so that about every important online service has a mobile version or at least a version compatible with mobile phones and tablets (for this paper we would adopt the phrase mobile device to represent mobile phones and tablets). This has caused online labora- tory developers to develop online laboratory solutions which are mobile device- friendly [1, 2, 3, 4, 5, 6, 7, 8]. One of the main benefits of online laboratories is the possibility of using fewer re- sources to serve more people i.e.
    [Show full text]
  • The Pillars of Lossless Compression Algorithms a Road Map and Genealogy Tree
    International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 6 (2018) pp. 3296-3414 © Research India Publications. http://www.ripublication.com The Pillars of Lossless Compression Algorithms a Road Map and Genealogy Tree Evon Abu-Taieh, PhD Information System Technology Faculty, The University of Jordan, Aqaba, Jordan. Abstract tree is presented in the last section of the paper after presenting the 12 main compression algorithms each with a practical This paper presents the pillars of lossless compression example. algorithms, methods and techniques. The paper counted more than 40 compression algorithms. Although each algorithm is The paper first introduces Shannon–Fano code showing its an independent in its own right, still; these algorithms relation to Shannon (1948), Huffman coding (1952), FANO interrelate genealogically and chronologically. The paper then (1949), Run Length Encoding (1967), Peter's Version (1963), presents the genealogy tree suggested by researcher. The tree Enumerative Coding (1973), LIFO (1976), FiFO Pasco (1976), shows the interrelationships between the 40 algorithms. Also, Stream (1979), P-Based FIFO (1981). Two examples are to be the tree showed the chronological order the algorithms came to presented one for Shannon-Fano Code and the other is for life. The time relation shows the cooperation among the Arithmetic Coding. Next, Huffman code is to be presented scientific society and how the amended each other's work. The with simulation example and algorithm. The third is Lempel- paper presents the 12 pillars researched in this paper, and a Ziv-Welch (LZW) Algorithm which hatched more than 24 comparison table is to be developed.
    [Show full text]
  • The Deep Learning Solutions on Lossless Compression Methods for Alleviating Data Load on Iot Nodes in Smart Cities
    sensors Article The Deep Learning Solutions on Lossless Compression Methods for Alleviating Data Load on IoT Nodes in Smart Cities Ammar Nasif *, Zulaiha Ali Othman and Nor Samsiah Sani Center for Artificial Intelligence Technology (CAIT), Faculty of Information Science & Technology, University Kebangsaan Malaysia, Bangi 43600, Malaysia; [email protected] (Z.A.O.); [email protected] (N.S.S.) * Correspondence: [email protected] Abstract: Networking is crucial for smart city projects nowadays, as it offers an environment where people and things are connected. This paper presents a chronology of factors on the development of smart cities, including IoT technologies as network infrastructure. Increasing IoT nodes leads to increasing data flow, which is a potential source of failure for IoT networks. The biggest challenge of IoT networks is that the IoT may have insufficient memory to handle all transaction data within the IoT network. We aim in this paper to propose a potential compression method for reducing IoT network data traffic. Therefore, we investigate various lossless compression algorithms, such as entropy or dictionary-based algorithms, and general compression methods to determine which algorithm or method adheres to the IoT specifications. Furthermore, this study conducts compression experiments using entropy (Huffman, Adaptive Huffman) and Dictionary (LZ77, LZ78) as well as five different types of datasets of the IoT data traffic. Though the above algorithms can alleviate the IoT data traffic, adaptive Huffman gave the best compression algorithm. Therefore, in this paper, Citation: Nasif, A.; Othman, Z.A.; we aim to propose a conceptual compression method for IoT data traffic by improving an adaptive Sani, N.S.
    [Show full text]
  • Data Compression for Remote Laboratories
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Online-Journals.org (International Association of Online Engineering) Paper—Data Compression for Remote Laboratories Data Compression for Remote Laboratories https://doi.org/10.3991/ijim.v11i4.6743 Olawale B. Akinwale Obafemi Awolowo University, Ile-Ife, Nigeria [email protected] Lawrence O. Kehinde Obafemi Awolowo University, Ile-Ife, Nigeria [email protected] Abstract—Remote laboratories on mobile phones have been around for a few years now. This has greatly improved accessibility of these remote labs to students who cannot afford computers but have mobile phones. When money is a factor however (as is often the case with those who can’t afford a computer), the cost of use of these remote laboratories should be minimized. This work ad- dressed this issue of minimizing the cost of use of the remote lab by making use of data compression for data sent between the user and remote lab. Keywords—Data compression; Lempel-Ziv-Welch; remote laboratory; Web- Sockets 1 Introduction The mobile phone is now the de facto computational device of choice. They are quite powerful, connected devices which are almost always with us. This is so much so that about every important online service has a mobile version or at least a version compatible with mobile phones and tablets (for this paper we would adopt the phrase mobile device to represent mobile phones and tablets). This has caused online labora- tory developers to develop online laboratory solutions which are mobile device- friendly [1, 2, 3, 4, 5, 6, 7, 8].
    [Show full text]
  • Compression: Putting the Squeeze on Storage
    Compression: Putting the Squeeze on Storage Live Webcast September 2, 2020 11:00 am PT 1 | ©2020 Storage Networking Industry Association. All Rights Reserved. Today’s Presenters Ilker Cebeli John Kim Brian Will Moderator Chair, SNIA Networking Storage Forum Intel® QuickAssist Technology Samsung NVIDIA Software Architect Intel 2 | ©2020 Storage Networking Industry Association. All Rights Reserved. SNIA-At-A-Glance 3 3 | ©2020 Storage Networking Industry Association. All Rights Reserved. NSF Technologies 4 4 | ©2020 Storage Networking Industry Association. All Rights Reserved. SNIA Legal Notice § The material contained in this presentation is copyrighted by the SNIA unless otherwise noted. § Member companies and individual members may use this material in presentations and literature under the following conditions: § Any slide or slides used must be reproduced in their entirety without modification § The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations. § This presentation is a project of the SNIA. § Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney. § The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. 5 | ©2020 Storage Networking Industry Association.
    [Show full text]
  • Accelerating Compressed File Pattern Matching with Parabix Techniques
    Accelerating Compressed File Pattern Matching with Parabix Techniques by Xiangyu Wu B.Eng., Tongji University, China, 2015 Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in the School of Computing Science Faculty of Applied Sciences © Xiangyu Wu 2018 SIMON FRASER UNIVERSITY Fall 2018 All rights reserved. However, in accordance with the Copyright Act of Canada, this work may be reproduced without authorization under the conditions for "Fair Dealing". Therefore, limited reproduction of this work for the purposes of private study, research, education, satire, parody, criticism, review and news reporting is likely to be in accordance with the law, particularly if cited appropriately. Approval Name: Xiangyu Wu Degree: Master of Science Title: Accelerating Compressed File Pattern Matching with Parabix Techniques Examining Committee: Chair: Kay Wiese Associate Professor Robert Cameron Senior Supervisor Professor William Sumner Supervisor Assistant Professor Fred Popowich Examiner Professor Date Defended: October 5, 2018 ii Abstract Data compression is a commonly used technique in the big data environment. On the other hand, efficient information retrieval of those compressed big data is also a standard requirement. In this thesis, we proposed a new method of compressed file pattern matching inspired by the bitstream pattern matching approach from ICGrep, a high- performance regular expression matching tool based on Parabix techniques. Instead of using the traditional way that fully decompresses the compressed file before pattern matching, our approach handles many complex procedures in the small compressed space. We selected LZ4 as a sample compression format and implemented a compressed file pattern matching tool LZ4 Grep, which showed small performance improvement.
    [Show full text]
  • 1 Introduction
    HELSINKI UNIVERSITY OF TECHNOLOGY Faculty of Electronics, Communications, and Automation Department of Communications and Networking Le Wang Evaluation of Compression for Energy-aware Communication in Wireless Networks Master’s Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Technology. Espoo, May 11, 2009 Supervisor: Professor Jukka Manner Instructor: Sebastian Siikavirta 2 HELSINKI UNIVERSITY OF TECHNOLOGY ABSTRACT OF MASTER’S THESIS Author: Le Wang Title: Evaluation of Compression for Energy-aware Communication in Wireless Networks Number of pages: 75 p. Date: 11th May 2009 Faculty: Faculty of Electronics, Communications, and Automation Department: Department of Communications and Networks Code: S-38 Supervisor: Professor Jukka Manner Instructor: Sebastian Siikavirta Abstract In accordance with the development of ICT-based communication, energy efficient communication in wireless networks is being required for reducing energy consumption, cutting down greenhouse emissions and improving business competitiveness. Due to significant energy consumption of transmitting data over wireless networks, data compression techniques can be used to trade the overhead of compression/decompression for less communication energy. Careless and blind compression in wireless networks not only causes an expansion of file sizes, but also wastes energy. This study aims to investigate the usages of data compression to reduce the energy consumption in a hand-held device. By con- ducting experiments as the methodologies, the impacts of transmission on energy consumption are explored on wireless interfaces. Then, 9 lossless compression algo- rithms are examined on popular Internet traffic in the view of compression ratio, speed and consumed energy. Additionally, energy consumption of uplink, downlink and overall system is investigated to achieve a comprehensive understanding of compression in wireless networks.
    [Show full text]
  • Data Compression in Solid State Storage
    Data Compression in Solid State Storage John Fryar [email protected] Santa Clara, CA August 2013 1 Acknowledgements This presentation would not have been possible without the counsel, hard work and graciousness of the following individuals and/or organizations: Raymond Savarda Sandgate Technologies Santa Clara, CA August 2013 2 Disclaimers The opinions expressed herein are those of the author and do not necessarily represent those of any other organization or individual unless specifically cited. A thorough attempt to acknowledge all sources has been made. That said, we’re all human… Santa Clara, CA August 2013 3 Learning Objectives At the conclusion of this tutorial the audience will have been exposed to: • The different types of Data Compression • Common Data Compression Algorithms • The Deflate/Inflate (GZIP/GUNZIP) algorithms in detail • Implementation Options (Software/Hardware) • Impacts of design parameters in Performance • SSD benefits and challenges • Resources for Further Study Santa Clara, CA August 2013 4 Agenda • Background, Definitions, & Context • Data Compression Overview • Data Compression Algorithm Survey • Deflate/Inflate (GZIP/GUNZIP) in depth • Software Implementations • HW Implementations • Tradeoffs & Advanced Topics • SSD Benefits and Challenges • Conclusions Santa Clara, CA August 2013 5 Definitions Item Description Comments Open A system which will compress Must strictly adhere to standards System data for use by other entities. on compress / decompress I.E. the compressed data will algorithms exit the system Interoperability among vendors mandated for Open Systems Closed A system which utilizes Can support a limited, optimized System compressed data internally but subset of standard. does not expose compressed Also allows custom algorithms data to the outside world No Interoperability req’d.
    [Show full text]
  • Better Adaptive Text Compression Scheme
    Journal of Education and Science Vol. 27, No.2, 2018, pp. 48-57 ISSN 1812-125X http://edusj.mosuljournals.com Better Adaptive Text Compression Scheme Duha Amir Sultan Dept. of Biology/ Education College of Girls/ University of Mosul تاريخ اﻻستﻻم 17/04/2012 تاريخ القبول 2012/11/07 الخﻻصة ظهرت طر ق عدي دي لكبس البيدااداتو حاةدي أش ر ددددددددددددددهر طديق اللرق ر ط اللريقد ال قترة أش قبل العال ي ش Ziv ح Lempel حالت رطلق عليها اسددددددددد LZ77و ث طورت طيق اللريق أش قبددل العددال يش Storer و Szymanski لتظهر طريقدد يدديدددي ط LZSS و حالت رعلددن اتددا رفضدل أقارا ساداسقاتها سعي رط طبقن عل اصدو ثيير حخدة ف طاتيش اللريقتيش حي ي ع اللرق اﻷخرى الت تنضوي تحن تصنيف اللرق اليدناأيك ي لكبس البيااات دت أاح ال لف أش اليادددار ل الي يش اد اط رطول تلابق بيش أةزط البيااا ت )الن ص ال شدددمر أادددبقاص حالن ص اليي سدديشددمر اللريق ال قترة ف طيا البحث تعت ي أبير البح ث سإت اطيشو أش الياددار ل الي يش ث أش الي يش ل اليادددددددددددددارو عل الرر رط طيق اللريق تحتان حقتا رطول اوعا أا و ﻻ راها رعل ن اتي ثبس اكبر للبيااات Abstract A data compression scheme suggested by Ziv and Lempel, LZ77, is applied to text compression. A slightly modified version suggested by Storer and Szymanski ,LZSS, is found to achieve compression ratios as good as most existing schemes for a wide range of texts. In these two methods and all other dynamic methods, a text file is searched from left to right to find the longest match between the lookahead buffer (the previously encoded text) and the characters to be encoded.
    [Show full text]
  • Module 9: Compression
    Module 9: Compression CS 240 - Data Structures and Data Management Reza Dorrigiv, Daniel Roche School of Computer Science, University of Waterloo Winter 2010 Reza Dorrigiv, Daniel Roche (CS, UW) CS240 - Module 9 Winter 2010 1 / 33 Data Storage and Transmission The problem: How to store and transmit data? Source text The original data, string of characters S from the source alphabet ΣS Coded text The encoded data, string of characters C from the coded alphabet ΣC Encoding An algorithm mapping source texts to coded texts Decoding An algorithm mapping coded texts back to their original source text Note: Source \text" can be any sort of data (not always text!) Usually the coded alphabet ΣC is just binary: f0; 1g. Reza Dorrigiv, Daniel Roche (CS, UW) CS240 - Module 9 Winter 2010 2 / 33 Processing speed Reliability (e.g. error-correcting codes) Security (e.g. encryption) Size Encoding schemes that try to minimize jCj, the size of the coded text, perform data compression. We will measure the compression ratio: jCj · lg jΣC j jSj · lg jΣS j Judging Encoding Schemes We can always measure efficiency of encoding/decoding algorithms. What other goals might there be? Reza Dorrigiv, Daniel Roche (CS, UW) CS240 - Module 9 Winter 2010 3 / 33 Encoding schemes that try to minimize jCj, the size of the coded text, perform data compression. We will measure the compression ratio: jCj · lg jΣC j jSj · lg jΣS j Judging Encoding Schemes We can always measure efficiency of encoding/decoding algorithms. What other goals might there be? Processing speed Reliability (e.g. error-correcting codes) Security (e.g.
    [Show full text]
  • Data Compression for Climate Data
    Data compression for climate data Article Published Version Creative Commons: Attribution-Noncommercial 3.0 Open access Kuhn, M., Kunkel, J. M. and Ludwig, T. (2016) Data compression for climate data. Supercomputing Frontiers and Innovations, 3 (1). pp. 75-94. ISSN 2313-8734 doi: https://doi.org/10.14529/jsfi160105 Available at http://centaur.reading.ac.uk/77684/ It is advisable to refer to the publisher’s version if you intend to cite from the work. See Guidance on citing . Identification Number/DOI: https://doi.org/10.14529/jsfi160105 <https://doi.org/10.14529/jsfi160105> Publisher: South Urals University All outputs in CentAUR are protected by Intellectual Property Rights law, including copyright law. Copyright and IPR is retained by the creators or other copyright holders. Terms and conditions for use of this material are defined in the End User Agreement . www.reading.ac.uk/centaur CentAUR Central Archive at the University of Reading Reading’s research outputs online DOI: 10.14529/jsfi160105 Data Compression for Climate Data Michael Kuhn1, Julian Kunkel2, Thomas Ludwig2 © The Authors 2016. This paper is published with open access at SuperFri.org The different rates of increase for computational power and storage capabilities of super- computers turn data storage into a technical and economical problem. As storage capabilities are lagging behind, investments and operational costs for storage systems have increased to keep up with the supercomputers’ I/O requirements. One promising approach is to reduce the amount of data that is stored. In this paper, we take a look at the impact of compression on performance and costs of high performance systems.
    [Show full text]
  • Improving Data Warehouse Performance Using Filesystem Technology with GZIP, LZJB and ZLE Compression Andre Wenas1, Suharjito2
    JUISI, Vol. 02, No. 02, Agustus 2016 41 Improving Data Warehouse Performance Using Filesystem Technology with GZIP, LZJB and ZLE Compression Andre Wenas1, Suharjito2 Abstract— Data warehouse application is commonly used by The amount of data that must be processed increases many corporations as an analytical platform to develop exponentially, so it takes a certain method that can store marketing strategy and give advantage edge to their data more efficiently over a long period. One method for business. Many times, data warehouse platform need to reducing the amount of data storage is to use a manage huge amount of data as it needs to extract, load and compression (Roth and Van Horn, 1993). Compression transform enterprise data from many sources. To improve performance of data warehouse system, compression has technology is widely used to store individual files and is been used in various ways, both at database layer or at used to store data in a relational database in corporations. filesystem layer. Compression brings an other benefit as it As data warehouse is one of the important applications reduce storage capacity therefore reduce cost. However for commercial business, therefore improving compression also add data processing that may impact to performance and reducing storage capacity will bring overall application response time. In this research, three significant benefits for the business. For example, with a different compression algorithms which are zle, lzjb and compression ratio of 2:1, businesses will spend half of gzip were tested on data warehouse filesystem to understand their IT budget to meet the same requirements. It will help the performance impact and the capacity saving benefit.
    [Show full text]