SlideShare a Scribd company logo
1 of 7
i
ACKNOWLEDGEMENT
I take this opportunity to present my vote of thanks to all those who really acted as
lightening pillars to enlighten my way to successful and satisfactory completion of this
project report.
I have gained immense knowledge about “GI-FI TECHNOLOGY“. I am grateful to the
teachers who guided me and taught me during this training period. I am much obliged to
respected Mr. RakeshSambyal H.O.D INFORMATION TECHNOLOGY for
endowing me this splendiferous opportunity to increase my skillsets.
Name: Khalid Majeed Mir
Roll No.: 321/14
ii
Abstract
Demand for data storage is growing exponentially, but the capacity of existing storage
media is not keeping up. Using DNA to archive data is an attractive possibility because it
is extremely dense, with a raw limit of 1 exabyte/mm3 (109 GB/mm3), and long-lasting,
with observed half-life of over 500 years. This paper presents an architecture for a DNA-
based archival storage system. It is structured as a key-value store, and leverages
common biochemical techniques to provide random access. We also propose a new
encoding scheme that offers controllable redundancy, trading off reliability for density.
We demonstrate feasibility, random access, and robustness of the proposed encoding
with wet lab experiments involving 151kB of synthesized DNA and a 42kB
randomaccess subset, and simulation experiments of larger sets calibrated to the wet lab
experiments. Finally, we highlight trends in biotechnology that indicate the impending
practicality of DNA storage for much larger datasets.
Categories and Subject Descriptors B.3.2 [Memory Structures]: Design Styles—Mass
storage; J.3 [Life and Medical Sciences]: Biology and genetics
iii
CONTENT Page No.
CHAPTER-1 INTRODUCTION 1-3
CHAPTER-2 BACKGROUND ON DNA MANIPULATION 4-6
2.1 DNA Basic 4
2.2 Selective DNA amplification with polymerase chain reaction (PCR) 4
2.3DNA Syntheis 5
2.4DNA Sequencing 5
2.5Sequencing and synthesis improvement projections 6
CHAPTER-3 A DNA STORAGE SYSTEM 7-10
3.1 Overview 7-8
3.2 Interface and Addressing 9
3.3 System Operation 9
CHAPTER:-4 REPRESENTINGDATAIN DNA 11-14
4.1 Representation 11
4.2 Data Format 12
4.2.1Address 13
4.2.2Primers. 14
4.2.3Random Access. 14
CHAPTER:-5 ENCODINGS FOR RELIABLE STORAGE 15-18
5.1Existing Encodings 15
5.2Goldman Encoding. 16
5.3 XOR Encoding 16
5.4Tunable Redundancy 17
5.5 Factors in Encoding Design 18
iv
CHAPTER-6 EXPERIMENTS 19-21
6.1 Materials and Method 19
6.2 Results 20
6.2.1 Fle Recovery. 20
6.2.2 Sequencing Depth. 20
6.2.3Reduced Sequencing Depth. 21
6.2.4Naive Encoding. 21
CHAPTER:-7 SIMULATION 22-25
7.1Reliability and Density. 22
7.2Density and Strand Length. 24
7.3Decay. 24
CHAPTER:-8 DISCUSSION AND FUTURE WORK 26-29
8.1The Real Source of Errors. 26
8.2Synthesis Efficiency. 27
8.3Avoiding Bad Sequences. 28
CHAPTER:-9 RELATED WORK ENCODING 30
ACKNOWLEDGEMENT i
ABSTRACT ii
CONTENTS iii-iv
LIST OF FIGURES v
CONCLUSIONS vi
REFERENCES vii
v
LIST OF FIGURES
Fig No. Discription Page No.
1 Carlson curves 6
2 NA storage as the bottom level of the storage hierarchy 7
3 Overview of a DNA storage system. 8
4 Overview of a DNA storage system operation as a key-value store 8
5 Translating binary data to DNA nucleotides via a Huffman code 11
6 Encoding a stream of binary data as a stream of nucleotides 12
7 An overview of the DNA data encoding format 13
8 An encoding proposed by Goldman et al. 16
9 Our proposed encoding incorporates redundancy 16
10 Distribution of sequencing depths over all encoded strands 20
11 Reliability of encoded data 22
12 Density of different encodings as a function 23
13 Average number of copies of sequences required 24
14 Distribution of DNA error 26
15 Expected and observed distributions of strand length from DNA synthesis 27
16 A hairpin, 28
vi
Conclusion
DNA-based storage has the potential to be the ultimate archival storage solution: it is
extremely dense and durable. While this is not practical yet due to the current state of
DNA synthesis and sequencing, both technologies are improving at an exponential
rate with advances in the biotechnology industry. Given the impending limits of
silicon technology, we believe that hybrid silicon and biochemical systems are worth
serious consideration: time is ripe for computer architects to consider incorporating
biomolecules as an integral part of computer design. DNA-based storage is one clear
example of this direction. Biotechnology has benefited tremendously from progress in
silicon technology developed by the computer industry; perhaps now is the time for
the computer industry to borrow back from the biotechnology industry to advance the
state of the art in computer systems.
References
[1] http://www.nature.com/news/how-dna-could-store-all-the- world-s-data-1.20496
[2]https://homes.cs.washington.edu/~bornholt/papers/dnastorageasplos16.pdf
[3]//www.idc.com/downloads/where_is_storage_infographic_243338.pdf
[4]http://www.synthesis.cc/2014/02/time-for-new-cost-curves-2014.html
vii
[5]http://www.datacenterknowledge.com/archives/2013/01/18/facebook-builds-
newdata-centers-for-cold-storage/
[6]http://www.extremetech.com/computing/159245-new-optical-laser-canincrease-dvd-
storage-up-to-one-petabyte

More Related Content

What's hot

Digital data storage in DNA
Digital data storage in DNADigital data storage in DNA
Digital data storage in DNASharath Raj
 
DNA storage by Anushka jha
DNA storage by Anushka jhaDNA storage by Anushka jha
DNA storage by Anushka jhaAnushka Jha
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewRasheed Karuvally
 
Dna digital data storage
Dna digital data storageDna digital data storage
Dna digital data storagevarun arora
 
A Study on DNA based Computation and Memory Devices
A Study on DNA based Computation and Memory DevicesA Study on DNA based Computation and Memory Devices
A Study on DNA based Computation and Memory DevicesEditor IJCATR
 
Datastorage in DNA
Datastorage in DNADatastorage in DNA
Datastorage in DNAAditya Nag
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first reviewThomas George C
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...IDES Editor
 
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyDNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyAM Publications
 
Joining Separate Paradigms: Text Mining & Deep Neural Networks to Character...
Joining Separate Paradigms:  Text Mining & Deep Neural Networks  to Character...Joining Separate Paradigms:  Text Mining & Deep Neural Networks  to Character...
Joining Separate Paradigms: Text Mining & Deep Neural Networks to Character...Melissa Moody
 
Goodwin2016 ngs 10 years
Goodwin2016 ngs 10 yearsGoodwin2016 ngs 10 years
Goodwin2016 ngs 10 yearsPrakash Koringa
 
theoretical perspectives on marriage and family
theoretical perspectives on marriage and familytheoretical perspectives on marriage and family
theoretical perspectives on marriage and familyRameenIqbal1
 
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY Abhishek Majumdar
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA CryptographyIRJET Journal
 

What's hot (19)

Dna as data storage device
Dna as data storage deviceDna as data storage device
Dna as data storage device
 
Digital data storage in DNA
Digital data storage in DNADigital data storage in DNA
Digital data storage in DNA
 
Crypt Sequence DNA
Crypt Sequence DNACrypt Sequence DNA
Crypt Sequence DNA
 
1 2 10.1.1.468.7609
1 2 10.1.1.468.76091 2 10.1.1.468.7609
1 2 10.1.1.468.7609
 
DNA storage by Anushka jha
DNA storage by Anushka jhaDNA storage by Anushka jha
DNA storage by Anushka jha
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 
Dna digital data storage
Dna digital data storageDna digital data storage
Dna digital data storage
 
A Study on DNA based Computation and Memory Devices
A Study on DNA based Computation and Memory DevicesA Study on DNA based Computation and Memory Devices
A Study on DNA based Computation and Memory Devices
 
Datastorage in DNA
Datastorage in DNADatastorage in DNA
Datastorage in DNA
 
Dna cryptography
Dna cryptographyDna cryptography
Dna cryptography
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first review
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
 
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyDNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
 
Joining Separate Paradigms: Text Mining & Deep Neural Networks to Character...
Joining Separate Paradigms:  Text Mining & Deep Neural Networks  to Character...Joining Separate Paradigms:  Text Mining & Deep Neural Networks  to Character...
Joining Separate Paradigms: Text Mining & Deep Neural Networks to Character...
 
Goodwin2016 ngs 10 years
Goodwin2016 ngs 10 yearsGoodwin2016 ngs 10 years
Goodwin2016 ngs 10 years
 
Info.m103 r v2.0
Info.m103 r v2.0Info.m103 r v2.0
Info.m103 r v2.0
 
theoretical perspectives on marriage and family
theoretical perspectives on marriage and familytheoretical perspectives on marriage and family
theoretical perspectives on marriage and family
 
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA Cryptography
 

Similar to Ack,abs,con,concl,ref

Dna digital data storage
Dna digital data storageDna digital data storage
Dna digital data storageMaram Aniruddha
 
Data Storage in DNA Documentation
Data Storage in DNA Documentation Data Storage in DNA Documentation
Data Storage in DNA Documentation Aditya Nag
 
DNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel ApproachDNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel ApproachEditor IJCATR
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptxChandniA5
 
Use of open_linked_data_in_bioinformatics
Use of open_linked_data_in_bioinformaticsUse of open_linked_data_in_bioinformatics
Use of open_linked_data_in_bioinformaticsRemzi Çelebi
 
Content aware p2 p video streaming with lowlatency
Content aware p2 p video streaming with lowlatencyContent aware p2 p video streaming with lowlatency
Content aware p2 p video streaming with lowlatencyxiaoran815
 
dna-digital-data-storage_compress.pdf
dna-digital-data-storage_compress.pdfdna-digital-data-storage_compress.pdf
dna-digital-data-storage_compress.pdfAzimGamer1
 
IRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud ComputingIRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud ComputingIRJET Journal
 
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...EMC
 
Datastorage in DNA
Datastorage in DNADatastorage in DNA
Datastorage in DNAAditya Nag
 
Dna data storage
Dna data storageDna data storage
Dna data storageRavi Vaniya
 
Deep learning health care
Deep learning health care  Deep learning health care
Deep learning health care Meenakshi Sood
 
DNA memories
DNA memoriesDNA memories
DNA memoriesHoda msw
 
MVAPICH: How a Bunch of Buckeyes Crack Tough Nuts
MVAPICH: How a Bunch of Buckeyes Crack Tough NutsMVAPICH: How a Bunch of Buckeyes Crack Tough Nuts
MVAPICH: How a Bunch of Buckeyes Crack Tough Nutsinside-BigData.com
 

Similar to Ack,abs,con,concl,ref (20)

Final doc of dna
Final  doc of dnaFinal  doc of dna
Final doc of dna
 
Dna digital data storage
Dna digital data storageDna digital data storage
Dna digital data storage
 
DNA STORAGE
 DNA STORAGE DNA STORAGE
DNA STORAGE
 
Data Storage in DNA Documentation
Data Storage in DNA Documentation Data Storage in DNA Documentation
Data Storage in DNA Documentation
 
Dna synopsis
Dna synopsisDna synopsis
Dna synopsis
 
DNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel ApproachDNA Query Language DNAQL: A Novel Approach
DNA Query Language DNAQL: A Novel Approach
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptx
 
DNA digital data storage.pptx
DNA digital data storage.pptxDNA digital data storage.pptx
DNA digital data storage.pptx
 
Use of open_linked_data_in_bioinformatics
Use of open_linked_data_in_bioinformaticsUse of open_linked_data_in_bioinformatics
Use of open_linked_data_in_bioinformatics
 
Content aware p2 p video streaming with lowlatency
Content aware p2 p video streaming with lowlatencyContent aware p2 p video streaming with lowlatency
Content aware p2 p video streaming with lowlatency
 
Dna computing
Dna computingDna computing
Dna computing
 
dna-digital-data-storage_compress.pdf
dna-digital-data-storage_compress.pdfdna-digital-data-storage_compress.pdf
dna-digital-data-storage_compress.pdf
 
IRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud ComputingIRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
 
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
 
Datastorage in DNA
Datastorage in DNADatastorage in DNA
Datastorage in DNA
 
Dna data storage
Dna data storageDna data storage
Dna data storage
 
Deep learning health care
Deep learning health care  Deep learning health care
Deep learning health care
 
DNA memories
DNA memoriesDNA memories
DNA memories
 
MVAPICH: How a Bunch of Buckeyes Crack Tough Nuts
MVAPICH: How a Bunch of Buckeyes Crack Tough NutsMVAPICH: How a Bunch of Buckeyes Crack Tough Nuts
MVAPICH: How a Bunch of Buckeyes Crack Tough Nuts
 
NGS File formats
NGS File formatsNGS File formats
NGS File formats
 

More from syed Farhan Rizvi

More from syed Farhan Rizvi (7)

Major project of Video calling and remote accessing
Major project  of Video calling and remote accessingMajor project  of Video calling and remote accessing
Major project of Video calling and remote accessing
 
Content1 fina lpdf
Content1 fina lpdfContent1 fina lpdf
Content1 fina lpdf
 
Cert,ack,abs,con,ref pdf
Cert,ack,abs,con,ref pdfCert,ack,abs,con,ref pdf
Cert,ack,abs,con,ref pdf
 
Video calling and remote accessing
Video calling and remote accessingVideo calling and remote accessing
Video calling and remote accessing
 
Contents
ContentsContents
Contents
 
Seminar report-gi-fi - copy
Seminar report-gi-fi - copySeminar report-gi-fi - copy
Seminar report-gi-fi - copy
 
Gi fi technology1
Gi fi technology1Gi fi technology1
Gi fi technology1
 

Recently uploaded

ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 

Recently uploaded (20)

ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 

Ack,abs,con,concl,ref

  • 1. i ACKNOWLEDGEMENT I take this opportunity to present my vote of thanks to all those who really acted as lightening pillars to enlighten my way to successful and satisfactory completion of this project report. I have gained immense knowledge about “GI-FI TECHNOLOGY“. I am grateful to the teachers who guided me and taught me during this training period. I am much obliged to respected Mr. RakeshSambyal H.O.D INFORMATION TECHNOLOGY for endowing me this splendiferous opportunity to increase my skillsets. Name: Khalid Majeed Mir Roll No.: 321/14
  • 2. ii Abstract Demand for data storage is growing exponentially, but the capacity of existing storage media is not keeping up. Using DNA to archive data is an attractive possibility because it is extremely dense, with a raw limit of 1 exabyte/mm3 (109 GB/mm3), and long-lasting, with observed half-life of over 500 years. This paper presents an architecture for a DNA- based archival storage system. It is structured as a key-value store, and leverages common biochemical techniques to provide random access. We also propose a new encoding scheme that offers controllable redundancy, trading off reliability for density. We demonstrate feasibility, random access, and robustness of the proposed encoding with wet lab experiments involving 151kB of synthesized DNA and a 42kB randomaccess subset, and simulation experiments of larger sets calibrated to the wet lab experiments. Finally, we highlight trends in biotechnology that indicate the impending practicality of DNA storage for much larger datasets. Categories and Subject Descriptors B.3.2 [Memory Structures]: Design Styles—Mass storage; J.3 [Life and Medical Sciences]: Biology and genetics
  • 3. iii CONTENT Page No. CHAPTER-1 INTRODUCTION 1-3 CHAPTER-2 BACKGROUND ON DNA MANIPULATION 4-6 2.1 DNA Basic 4 2.2 Selective DNA amplification with polymerase chain reaction (PCR) 4 2.3DNA Syntheis 5 2.4DNA Sequencing 5 2.5Sequencing and synthesis improvement projections 6 CHAPTER-3 A DNA STORAGE SYSTEM 7-10 3.1 Overview 7-8 3.2 Interface and Addressing 9 3.3 System Operation 9 CHAPTER:-4 REPRESENTINGDATAIN DNA 11-14 4.1 Representation 11 4.2 Data Format 12 4.2.1Address 13 4.2.2Primers. 14 4.2.3Random Access. 14 CHAPTER:-5 ENCODINGS FOR RELIABLE STORAGE 15-18 5.1Existing Encodings 15 5.2Goldman Encoding. 16 5.3 XOR Encoding 16 5.4Tunable Redundancy 17 5.5 Factors in Encoding Design 18
  • 4. iv CHAPTER-6 EXPERIMENTS 19-21 6.1 Materials and Method 19 6.2 Results 20 6.2.1 Fle Recovery. 20 6.2.2 Sequencing Depth. 20 6.2.3Reduced Sequencing Depth. 21 6.2.4Naive Encoding. 21 CHAPTER:-7 SIMULATION 22-25 7.1Reliability and Density. 22 7.2Density and Strand Length. 24 7.3Decay. 24 CHAPTER:-8 DISCUSSION AND FUTURE WORK 26-29 8.1The Real Source of Errors. 26 8.2Synthesis Efficiency. 27 8.3Avoiding Bad Sequences. 28 CHAPTER:-9 RELATED WORK ENCODING 30 ACKNOWLEDGEMENT i ABSTRACT ii CONTENTS iii-iv LIST OF FIGURES v CONCLUSIONS vi REFERENCES vii
  • 5. v LIST OF FIGURES Fig No. Discription Page No. 1 Carlson curves 6 2 NA storage as the bottom level of the storage hierarchy 7 3 Overview of a DNA storage system. 8 4 Overview of a DNA storage system operation as a key-value store 8 5 Translating binary data to DNA nucleotides via a Huffman code 11 6 Encoding a stream of binary data as a stream of nucleotides 12 7 An overview of the DNA data encoding format 13 8 An encoding proposed by Goldman et al. 16 9 Our proposed encoding incorporates redundancy 16 10 Distribution of sequencing depths over all encoded strands 20 11 Reliability of encoded data 22 12 Density of different encodings as a function 23 13 Average number of copies of sequences required 24 14 Distribution of DNA error 26 15 Expected and observed distributions of strand length from DNA synthesis 27 16 A hairpin, 28
  • 6. vi Conclusion DNA-based storage has the potential to be the ultimate archival storage solution: it is extremely dense and durable. While this is not practical yet due to the current state of DNA synthesis and sequencing, both technologies are improving at an exponential rate with advances in the biotechnology industry. Given the impending limits of silicon technology, we believe that hybrid silicon and biochemical systems are worth serious consideration: time is ripe for computer architects to consider incorporating biomolecules as an integral part of computer design. DNA-based storage is one clear example of this direction. Biotechnology has benefited tremendously from progress in silicon technology developed by the computer industry; perhaps now is the time for the computer industry to borrow back from the biotechnology industry to advance the state of the art in computer systems. References [1] http://www.nature.com/news/how-dna-could-store-all-the- world-s-data-1.20496 [2]https://homes.cs.washington.edu/~bornholt/papers/dnastorageasplos16.pdf [3]//www.idc.com/downloads/where_is_storage_infographic_243338.pdf [4]http://www.synthesis.cc/2014/02/time-for-new-cost-curves-2014.html