This specification defines a lossless compressed data format. The data can be produced or consumed, even for an arbitrarily long sequentially presented input data stream, using only an a priori bounded amount of intermediate storage. The format presently uses the DEFLATE compression method but can be easily extended to use other compression methods. It can be implemented readily in a manner not covered by patents. This specification also defines the ADLER-32 checksum (an extension and improvement of the Fletcher checksum), used for detection of data corruption, and provides an algorithm for computing it.
RFC Downloads
Cited By
- Mazzocca C, Acar A, Uluagac S and Montanari R EVOKE Proceedings of the 33rd USENIX Conference on Security Symposium, (1279-1295)
- Rifai M and Johnsson L (2023). VxH: A Systematic Determination of Efficient Hierarchical Voxel Structures, ACM Transactions on Spatial Algorithms and Systems, 10:1, (1-34), Online publication date: 31-Mar-2024.
- Bahar Talukder B, Ferdaus F and Rahman M (2023). A Noninvasive Technique to Detect Authentic/Counterfeit SRAM Chips, ACM Journal on Emerging Technologies in Computing Systems, 19:2, (1-25), Online publication date: 30-Apr-2023.
- Lawson M, Gropp W and Lofstead J (2022). EMPRESS: Accelerating Scientific Discovery through Descriptive Metadata Management, ACM Transactions on Storage, 18:4, (1-49), Online publication date: 30-Nov-2022.
- Zheng J, Li Z, Qiu Y, Lin H, Xiao H, Li Y and Liu Y (2022). WebAssembly-based Delta Sync for Cloud Storage Services, ACM Transactions on Storage, 18:3, (1-31), Online publication date: 31-Aug-2022.
- Isenko A, Mayer R, Jedele J and Jacobsen H Where Is My Training Bottleneck? Hidden Trade-Offs in Deep Learning Preprocessing Pipelines Proceedings of the 2022 International Conference on Management of Data, (1825-1839)
- Luo G, Deng Z, Zhao X, Jin X, Zeng W, Xie W and Seo H (2020). Spatio-temporal Segmentation Based Adaptive Compression of Dynamic Mesh Sequences, ACM Transactions on Multimedia Computing, Communications, and Applications, 16:1, (1-24), Online publication date: 29-Feb-2020.
- Wendzel S, Eller D and Mazurczyk W One Countermeasure, Multiple Patterns Proceedings of the Central European Cybersecurity Conference 2018, (1-6)
- Blalock D, Madden S and Guttag J (2018). Sprintz, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2:3, (1-23), Online publication date: 18-Sep-2018.
- Doboš J, Fan C, Friston S and Wong C Screen space 3D diff Proceedings of the 23rd International ACM Conference on 3D Web Technology, (1-9)
- Xiao H, Li Z, Zhai E, Xu T, Li Y, Liu Y, Zhang Q and Liu Y Towards web-based delta synchronization for cloud storage services Proceedings of the 16th USENIX Conference on File and Storage Technologies, (155-168)
- Ciftci S, Akyuz A and Ebrahimi T (2018). A Reliable and Reversible Image Privacy Protection Based on False Colors, IEEE Transactions on Multimedia, 20:1, (68-81), Online publication date: 1-Jan-2018.
- Xu L, Pavlo A, Sengupta S and Ganger G Online Deduplication for Databases Proceedings of the 2017 ACM International Conference on Management of Data, (1355-1368)
- Bajpai V and Schonwalder J (2017). Network Flow Query Language—Design, Implementation, Performance, and Applications, IEEE Transactions on Network and Service Management, 14:1, (8-21), Online publication date: 1-Mar-2017.
- Kumar H, Patel Y, Kesavan R and Makam S High-performance metadata integrity protection in the WAFL copy-on-write file system Proceedings of the 15th Usenix Conference on File and Storage Technologies, (197-211)
- Aufaure M, Chiky R, Curé O, Khrouf H and Kepeklian G (2016). From Business Intelligence to semantic data stream management, Future Generation Computer Systems, 63:C, (100-107), Online publication date: 1-Oct-2016.
- Lehmann H, Werzner E and Degenkolb C Optimizing in-situ data compression for large-scale scientific simulations Proceedings of the 24th High Performance Computing Symposium, (1-8)
- Kramarev D, Sakzad A and Viterbo E (2016). Implementation of a two-way relay network with compute-and-forward in GNU Radio, Transactions on Emerging Telecommunications Technologies, 27:4, (484-493), Online publication date: 1-Apr-2016.
- Sato K, Ahn D, Laguna I, Lee G and Schulz M Clock delta compression for scalable order-replay of non-deterministic parallel applications Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, (1-12)
- Tran K, Hosseini S, Xiao L, Finley T and Bilenko M Scaling Up Stochastic Dual Coordinate Ascent Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1185-1194)
- Ferreira K, Riesen R, Bridges P, Arnold D and Brightwell R (2014). Accelerating incremental checkpointing for extreme-scale computing, Future Generation Computer Systems, 30:C, (66-77), Online publication date: 1-Jan-2014.
- Klonatos Y, Makatos T, Marazakis M, Flouris M and Bilas A (2012). Transparent Online Storage Compression at the Block-Level, ACM Transactions on Storage, 8:2, (1-33), Online publication date: 1-May-2012.
- Perks O, Hammond S, Pennycook S and Jarvis S WMTools - assessing parallel application memory utilisation at scale Proceedings of the 8th European conference on Computer Performance Engineering, (148-162)
- Wang T, Wei T, Gu G and Zou W (2011). Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution, ACM Transactions on Information and System Security, 14:2, (1-28), Online publication date: 1-Sep-2011.
- Makatos T, Klonatos Y, Marazakis M, Flouris M and Bilas A Using transparent compression to improve SSD-based I/O caches Proceedings of the 5th European conference on Computer systems, (1-14)
- Gamblin T, de Supinski B, Schulz M, Fowler R and Reed D Scalable load-balance measurement for SPMD codes Proceedings of the 2008 ACM/IEEE conference on Supercomputing, (1-12)
- Ericsson M (2007). The Effects of XML Compression on SOAP Performance, World Wide Web, 10:3, (279-307), Online publication date: 1-Sep-2007.
- Song J and Zhang Y Architecture of a web accelerator for wireless networks Proceedings of the thirtieth Australasian conference on Computer science - Volume 62, (125-129)
- Sapuntzakis C, Chandra R, Pfaff B, Chow J, Lam M and Rosenblum M (2002). Optimizing the migration of virtual computers, ACM SIGOPS Operating Systems Review, 36:SI, (377-390), Online publication date: 31-Dec-2003.
- Sundaresan N and Moussa R Algorithms and programming models for efficient representation of XML for Internet applications Proceedings of the 10th international conference on World Wide Web, (366-375)
- Hovemeyer D and Pugh W More efficient network class loading through bundling Proceedings of the 2001 Symposium on JavaTM Virtual Machine Research and Technology Symposium - Volume 1, (17-17)
- Mitzenmacher M On the Hardness of Finding Optimal Multiple Preset Dictionaries Proceedings of the Data Compression Conference
- de Lara E, Wallach D and Zwaenepoel W Opportunities for bandwidth adaptation in microsoft office documents Proceedings of the 4th conference on USENIX Windows Systems Symposium - Volume 4, (9-9)
- Chi C, Deng J and Lim Y Compression proxy server Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2, (10-10)
- Nielsen H, Gettys J, Baird-Smith A, Prud'hommeaux E, Lie H and Lilley C (1997). Network performance effects of HTTP/1.1, CSS1, and PNG, ACM SIGCOMM Computer Communication Review, 27:4, (155-166), Online publication date: 1-Oct-1997.
- Nielsen H, Gettys J, Baird-Smith A, Prud'hommeaux E, Lie H and Lilley C Network performance effects of HTTP/1.1, CSS1, and PNG Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication, (155-166)
Recommendations
A universal compressed data format for foreign file systems
DCC '95: Proceedings of the Conference on Data CompressionThe authors have proposed a compressed data format that can be used with any foreign file system and that allows users to access data randomly in a compressed file without entirely decompressing it. Since the compressed file includes all information ...