Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Purpose and Objective

The aim of this assignment is to affirm your knowledge and capabilities in drafting networks and storage requirements based on a given design scenario. To be able to identify main traffic sources. To be able to map storage needs to data flows requirements. To be able to estimate capacity based on an offered load estimated based on data and users requirements.

The ability to recognize and classify users, data, loads, and behaviours of IP flows.

Keywords

Traffic Sources, traffic flow, traffic load, traffic behavior, data sinks, user communities, QoS,

Data Communications Network Design

Enterprise Description:

Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 250,000 volunteers with a goal of creating a set of publicly accessible databases with human genomic, trait, and medical data.

The project's founder, a brilliant man with many talents and interests, tells you that public databases would provide information to the world's scientific community in general, not just those interested in medical research. Genome4U is trying not to prejudge how the data would be used as there may be opportunities for interconnections and correlations which computers could find that people may have missed.

The founder envisions clusters of servers that would be accessible by researchers all over the world. The databases would be used by end users to study their own genetic heritage, with the help of their doctors and genetic counsellors. Additionally, the data would be used by computer scientists, mathematicians, physicists, social scientists, and other researchers.

The genome for a single human consists of complementary DNA strands wound together in a double helix. The strands hold about 6 billion base pairs of nucleotides connected by hydrogen bonds. To store the research data, 1 byte of capacity is used for each base pair. As a result, 6 Giga-Bytes of data capacity is needed to store the genetic information of just one person. The project plans to use network-attached Storage (NAS) clusters. A system has been prototyped using the current version of FreeNas software (from: www.freenas.org). Production software is expected to migrate to HBase and Hadoop cloud computing infrastructure.

Genome4U has developed new techniques to sequence a person’s genome, quickly, accurately and most importantly at low cost. Research group is a contestant for the $10,000,000 X-Prize offered by Archon-Genomics (see http://genomics.xprize.org for details). With their current funding they expect to complete the sequencing of 25,000 individuals by December 2012 and can sequence 5,000 individuals every month thereafter with the equipment that they are currently using.

Additionally to genetic information, the project would ask volunteers to give detailed information about their traits so that researchers could find correlations between traits and genes. Volunteers will also provide their medical records. Storage will be required for these data sets and the raw nucleotide data. This detailed medical information is expected to require not more than 100 Mega-Bytes of storage for each individual.

Since the data is to be publically shared, an initial community of 25,000 active users are expected, and this community expected to double every 18 months. Active users are expected to access 10% of the entire database daily which is expected to create huge demand on the networking infrastructure.

You have been brought in as a network design consultant to help the Genome4U project and the management team has asked you to help them organize their requirements.

Answer the following problems:

1. List the major user communities.

2. List the major data stores and the user communities for each data store.

3. Draw a graph of the storage requirements for the project monthly for the next 3 years.

4. Based on the size of the database, and the demands of the active users, what is the expected network capacity required to support the growing community of users? Add this capacity demand to the storage graph you drew above.

5. Can you find out the relationship between the storage size, number of genomes, number of users and network capacity requirements? If possible express this as an equation.

6. Review the capabilities of FreeNAS software. Will the FreeNAS software scale to the projected requirements of this application? If you find limits to its scalability what other solutions are possible?

7. Characterize the network traffic in terms of flow, load, behavior, and QoS requirements. You will not be able to precisely characterize the traffic but provide some theories about it and document the types of tests you would conduct to prove your theories right or wrong.

8. What additional problems would you ask Genome4U's founder about this project? Who besides the founder would you talk to and what problems would you ask them?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91622
  • Price:- $70

Guranteed 36 Hours Delivery, In Price:- $70

Have any Question? 


Related Questions in Computer Network & Security

Explain the key differences between symmetric and

Explain the key differences between symmetric and asymmetric encryption. Which can the computer process faster? Which lowers the costs associated with key management? What is a VPN? Why are VPNs widely used?

Computer scienceprimary task response within the discussion

Computer Science Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discus ...

Short answer1 classify each of the following

Short Answer 1. Classify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether business continuity plans would be called intoplay. a. A hacker breaks into the com ...

Project on security policyin this running case project you

Project on Security Policy In this running case project, you continue developing a secure network for SunGrafix, the video game development company for which you designed a network in the first week and are starting to p ...

Assignment standards researchthe following website may be

Assignment: Standards Research The following Website may be used for reference to complete this assignment. The Website represents an electronic document titled "Standards Organizations" written by William Stallings (200 ...

Information securityfor this weeks discussion consider the

Information Security For this week's discussion, consider the following prompts: A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows ...

Q1 the rijndael algorithm was chosen for the advanced

Q1: The Rijndael algorithm was chosen for the Advanced Encryption Standard (AES). Using either the attached tutorial, or your own sources of information, pick one (or more) steps of the algorithm and explain it in some d ...

Network and internet security assignmentproblem 1 - network

NETWORK AND INTERNET SECURITY ASSIGNMENT PROBLEM 1 - Network Access Control 1) Suppose you are a network administrator and are concerned about unauthorized networked devices being plugged into your system. You have read ...

Project infrastructure and securitythis assignment consists

Project: Infrastructure and Security This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of t ...

Why do networking components need more examination from an

Why do networking components need more examination from an InfoSec perspective than from a systems development perspective? What value would an automated asset inventory system have for the risk identification process? W ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro