Genome4u is a scientific research project at a large

Assignment Help Computer Network Security
Reference no: EM13805113

Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 100,000 volunteers with a goal of creating a set of publicly accessible databases with human genomic, trait, and medical data. 
The project's founder, a brilliant man with many talents and interests, tells you that the public databases will provide information to the world's scientific community in general, not just those interested in medical research. Genome4U is trying not to prejudge how the data will be used because there may be opportunities for interconnections and correlations that computers can find that people might have missed. The founder envisions clusters of servers that will be accessible by researchers all over the world. The databases will be used by end users to study their own genetic heritage, with the help of their doctors and genetic counsellors. In addition, the data will be used by computer scientists, mathematicians, physicists, social scientists, and other researchers. 
The genome for a single human consists of complementary DNA strands wound together in a double helix. The strands hold 6 billion base pairs of nucleotides connected by hydrogen bonds. To store the research data, 1 byte of capacity is used for each base pair. 

As a result, 6 GB of data capacity is needed to store the genetic information of just one person. The project plans to use network-attached storage (NAS) clusters. In addition to genetic information, the project will ask volunteers to provide detailed information about their traits so that researchers can find correlations between traits and genes. Volunteers will also provide their medical records. Storage will be required for these data sets and the raw nucleotide data. 

You have been brought in as a network design consultant to help the Genome4U project. 

Questions: 

1. List the major user communities. 
2. List the major data stores and the user communities for each data store.
3. Characterize the network traffic in terms of flow, load, behaviour, and QoS requirements. You will not be able to precisely characterize the traffic but provide some theories about it and document the types of tests you would conduct to prove your theories right or wrong.
4. What additional questions would you ask Genome4U's founder about this project?  Who besides the founder would you talk to and what questions would you ask them? 

Reference no: EM13805113

Questions Cloud

Write a research-based report to an organization : Write a research-based report to an organization making a recommendation to implement a particular product, service, or program.
Construct a hypothesis for your research problem : Conduct a web search on the technology topic of your choice. State the keywords that used for research. Formulate a possible research problem around that topic, then explore possible variables, state them, then construct a hypothesis for your rese..
Manufacturers begin building a new plant in arizona : Manufacturers begin building a new plant in Arizona. Which determinant of aggregate demand causes the change?
Discuss organisational goal from perspective key stakeholder : Identify and discuss organisational and individual goals from the perspective of the key stakeholders. Evaluate how the organisation can fulfil its main business objectives while recognising the interests of the stakeholders.
Genome4u is a scientific research project at a large : Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 100,000 volunteers with a goal of creating a set of publicly accessible databases wit..
What are your independent and dependent variables : Write and post a one paragraph purpose statement for your research project. What are your Independent and Dependent variables
Multiple regression analysis based numericals : If the sum of squares regression is 100 and the sum of squares total is 500. Given that the sum of squares residual (or error) is 400 what is the r-squared value?
Identify the main business processes in your business : Identify the main business processes in your business. What types of business information systems will you need to efficiently run the various business processes of your business
Assignment on expected value and consumer choices : Assignment: Expected Value and Consumer Choices

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is the principle of adequate protection

What is the principle of adequate protection? Do you agree with the principle? What difficulties are associated with implementing it?

  What is cyber security and what are some of its key concept

What is cyber security, and what are some of its key concepts? What are the most significant threats to your data, and what are some of the root causes of those threats

  Was the tjx break-in due to a single security weakness

Explain different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.

  Use the diffie-hellman public-key algorithm

You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman public-key algorithm to exchange secret keys. You and Bob have agreed to use the public base g = 19 and public modulus p = 739.

  Principles and theory of security management

so far this week we have discussed three types of security: retail, institutional, and industrial. I think that there is a little bit of confusion still about what the differences are between each of these types of security because we are looking..

  Personal and business-related cybersecurity scenarios

Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios - Describe the mission of each, and examine and compare details of each stated privacy policy.

  Develop and ratify borderless cybersecurity policies

Establish international cybersecurity threat operation centers where international partnerships work together under the same roof to thwart cyberspace threats

  Develop a system security plan for an information system

Develop a sample System Security Plan for an information system. Select and incorporate appropriate management, technical, and operational security controls into a system security plan.

  Use private key to decrypt the cipher text

Using blocks of 4 encrypt the message I AM AN MSC STUDENT MAJORING IN SECURITY using the public key above. Similarly use the private key above to decrypt the cipher text.

  The performance of a wimax network appears to be lower than

the performance of a wimax network appears to be lower than expected and you suspect interference to be the cause.

  Explain the added challenges of securing wireless devices

Explain the added challenges of securing wireless devices versus securing LAN-connected devices. Imagine you are starting a new small- to-midsized cybercafe business from the ground up. Explain which areas of your network would be LAN based and wh..

  What are the security issues of this

The majority of Australian SMEs are not taking advantage of cloud computing services, though uptake is strengthening among individuals, according to new research.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd