Genome4u is a scientific research project at a large

Assignment Help Computer Network Security
Reference no: EM13805113

Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 100,000 volunteers with a goal of creating a set of publicly accessible databases with human genomic, trait, and medical data. 
The project's founder, a brilliant man with many talents and interests, tells you that the public databases will provide information to the world's scientific community in general, not just those interested in medical research. Genome4U is trying not to prejudge how the data will be used because there may be opportunities for interconnections and correlations that computers can find that people might have missed. The founder envisions clusters of servers that will be accessible by researchers all over the world. The databases will be used by end users to study their own genetic heritage, with the help of their doctors and genetic counsellors. In addition, the data will be used by computer scientists, mathematicians, physicists, social scientists, and other researchers. 
The genome for a single human consists of complementary DNA strands wound together in a double helix. The strands hold 6 billion base pairs of nucleotides connected by hydrogen bonds. To store the research data, 1 byte of capacity is used for each base pair. 

As a result, 6 GB of data capacity is needed to store the genetic information of just one person. The project plans to use network-attached storage (NAS) clusters. In addition to genetic information, the project will ask volunteers to provide detailed information about their traits so that researchers can find correlations between traits and genes. Volunteers will also provide their medical records. Storage will be required for these data sets and the raw nucleotide data. 

You have been brought in as a network design consultant to help the Genome4U project. 

Questions: 

1. List the major user communities. 
2. List the major data stores and the user communities for each data store.
3. Characterize the network traffic in terms of flow, load, behaviour, and QoS requirements. You will not be able to precisely characterize the traffic but provide some theories about it and document the types of tests you would conduct to prove your theories right or wrong.
4. What additional questions would you ask Genome4U's founder about this project?  Who besides the founder would you talk to and what questions would you ask them? 

Reference no: EM13805113

Questions Cloud

Write a research-based report to an organization : Write a research-based report to an organization making a recommendation to implement a particular product, service, or program.
Construct a hypothesis for your research problem : Conduct a web search on the technology topic of your choice. State the keywords that used for research. Formulate a possible research problem around that topic, then explore possible variables, state them, then construct a hypothesis for your rese..
Manufacturers begin building a new plant in arizona : Manufacturers begin building a new plant in Arizona. Which determinant of aggregate demand causes the change?
Discuss organisational goal from perspective key stakeholder : Identify and discuss organisational and individual goals from the perspective of the key stakeholders. Evaluate how the organisation can fulfil its main business objectives while recognising the interests of the stakeholders.
Genome4u is a scientific research project at a large : Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 100,000 volunteers with a goal of creating a set of publicly accessible databases wit..
What are your independent and dependent variables : Write and post a one paragraph purpose statement for your research project. What are your Independent and Dependent variables
Multiple regression analysis based numericals : If the sum of squares regression is 100 and the sum of squares total is 500. Given that the sum of squares residual (or error) is 400 what is the r-squared value?
Identify the main business processes in your business : Identify the main business processes in your business. What types of business information systems will you need to efficiently run the various business processes of your business
Assignment on expected value and consumer choices : Assignment: Expected Value and Consumer Choices

Reviews

Write a Review

Computer Network Security Questions & Answers

  When deciding on the proper architecture to run an

the data that organizations gather about their users can vary between strictly commercial information what books did

  Analyze the industry researched for each security model

From the first e-Activity, analyze the industry researched for each security model would be most applicable, and explain why you believe that to be the case. Identify the security models from your findings

  Discuss ways to reduce risk in the network

Discuss 2 ways to reduce risk in the network. Who do you think is responsible for keeping the network safe to the administrator, the users, or both? Why

  How to cracking passwords without salt

Cracking Passwords with Salt on Linux.  Recently, an associate of yours got access to an Ubuntu Linux server. You  suspect users of this system (UST students) have a strong tendency to use the same passwords for everything (including their online..

  Recall that a computer virus is malware

Recall that a computer virus is malware that relies on someone or something (other than itself) to propagate from one system to another. Write a computer virus that can be written to other empty text documents by running the batch program.

  Limits of information privacy

Question 1: Does the governments have the right to go our information privacy? Question 2: What is the limits of information privacy?

  It infrastructure management what to do for task 2a

what to do for task 2a 15 ltbrgt ltbrgtsubmit your enterprise architect blog as a single page with the web address of

  Determine the level of necessary controls to mitigate risks

Describe how an organization determines the level of necessary controls to mitigate the risks while considering the value of its assets.

  Explain the various strategies to prevent such cyber warfare

Need a 1000 word paper on the various recent/news on the United States (particular the group known as Anonymous and Lulzsec).

  Creates for system forensics investigators

Explain why you believe the trend of threats targeting large enterprises is rising and what you believe is the greatest tool these hackers have at their disposal. Provide a rationale.

  Write an information security white paper

Information Technology Security for Small Businesses video from the National Institutes of Standards and Technology

  Analyze any potential physical vulnerabilities and threats

You are the Information Security Officer for a small pharmacy that has recently been opened in the local shopping mall. Identify and analyze any potential physical vulnerabilities and threats that require consideration

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd