Genome4u is a scientific research project at a large

Assignment Help Computer Network Security
Reference no: EM13805113

Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 100,000 volunteers with a goal of creating a set of publicly accessible databases with human genomic, trait, and medical data. 
The project's founder, a brilliant man with many talents and interests, tells you that the public databases will provide information to the world's scientific community in general, not just those interested in medical research. Genome4U is trying not to prejudge how the data will be used because there may be opportunities for interconnections and correlations that computers can find that people might have missed. The founder envisions clusters of servers that will be accessible by researchers all over the world. The databases will be used by end users to study their own genetic heritage, with the help of their doctors and genetic counsellors. In addition, the data will be used by computer scientists, mathematicians, physicists, social scientists, and other researchers. 
The genome for a single human consists of complementary DNA strands wound together in a double helix. The strands hold 6 billion base pairs of nucleotides connected by hydrogen bonds. To store the research data, 1 byte of capacity is used for each base pair. 

As a result, 6 GB of data capacity is needed to store the genetic information of just one person. The project plans to use network-attached storage (NAS) clusters. In addition to genetic information, the project will ask volunteers to provide detailed information about their traits so that researchers can find correlations between traits and genes. Volunteers will also provide their medical records. Storage will be required for these data sets and the raw nucleotide data. 

You have been brought in as a network design consultant to help the Genome4U project. 

Questions: 

1. List the major user communities. 
2. List the major data stores and the user communities for each data store.
3. Characterize the network traffic in terms of flow, load, behaviour, and QoS requirements. You will not be able to precisely characterize the traffic but provide some theories about it and document the types of tests you would conduct to prove your theories right or wrong.
4. What additional questions would you ask Genome4U's founder about this project?  Who besides the founder would you talk to and what questions would you ask them? 

Reference no: EM13805113

Questions Cloud

Write a research-based report to an organization : Write a research-based report to an organization making a recommendation to implement a particular product, service, or program.
Construct a hypothesis for your research problem : Conduct a web search on the technology topic of your choice. State the keywords that used for research. Formulate a possible research problem around that topic, then explore possible variables, state them, then construct a hypothesis for your rese..
Manufacturers begin building a new plant in arizona : Manufacturers begin building a new plant in Arizona. Which determinant of aggregate demand causes the change?
Discuss organisational goal from perspective key stakeholder : Identify and discuss organisational and individual goals from the perspective of the key stakeholders. Evaluate how the organisation can fulfil its main business objectives while recognising the interests of the stakeholders.
Genome4u is a scientific research project at a large : Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 100,000 volunteers with a goal of creating a set of publicly accessible databases wit..
What are your independent and dependent variables : Write and post a one paragraph purpose statement for your research project. What are your Independent and Dependent variables
Multiple regression analysis based numericals : If the sum of squares regression is 100 and the sum of squares total is 500. Given that the sum of squares residual (or error) is 400 what is the r-squared value?
Identify the main business processes in your business : Identify the main business processes in your business. What types of business information systems will you need to efficiently run the various business processes of your business
Assignment on expected value and consumer choices : Assignment: Expected Value and Consumer Choices

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd