SlideShare a Scribd company logo
1 of 3
Download to read offline
1.List the major communities
Researchers
Computer Scientists, mathematicians, scientists
.Individuals/ End users and Doctors
Volunteers
2.List the major data stores and the user communities for each data store
NAS clusters – Researches, scientists, end users
Medical Records Storage – Raw data from volunteers.
3.Characterize the network traffic in terms of flow, load, behaviour, and QoS requirements. You
will notbe able to precisely characterize the traffic but provide some theories about it an
document the types oftest you would conduct to prove your theory right or wrong
For Genome4U, the data store for the project will be a NAS Cluster. The flow type can
becharacterized as distributed computing due to the data processing which can take place in
themultiple computing nodes across the network therefore enabling the sharing of workload.
Trafficload estimates will be based on the application usage patterns, time required to transmit
dataonce the access to the data store is gained, and further observation of the frame sizes,
andpackage size.Multicast behaviour for the Genome4U project transmits data to a
multicastreceiver group depending on the user communities.In addition to the traffic analysis,
allocationof resources will play an important role given the robustness in the genetic information
of eachperson. The different applications can be categorized to establish the QoS
requirementsespecially when handling sensitive data.
A data store for raw data from the volunteers will contain their traits and medical records. If
theyare filling out a form or submitting their information through an application, traffic flow
willmost likely be asymmetric as the users will be send their data to the host. (Terminal/Host)
4.additional questions would you ask Genome4U’s founder about this project? Who besides the
founder would you talk to and what questions would you ask them
Further is information is required in order to get an overall understanding of the existing
networkand the project’s structure. Questions to be asked to the founder will include the
following.oWhat are the success factors and overall budget for the new network?
oIs the new network designed required for the entire project?
Or is it just a segment?oIs there any documentation on the existing network?oIs there anyone
else involved in the project?
If so, who would be involved in the decisionmaking and approval of the network?oWhere is the
existing research data currently stored?
In addition to the founder, it would be a good idea to talk to any internal or external
usersinvolved in the project and ask them about the applications and their interaction with the
existingnetwork. This would give a better idea on the expectations, application usage and
thereforenetwork traffic
Solution
1.List the major communities
Researchers
Computer Scientists, mathematicians, scientists
.Individuals/ End users and Doctors
Volunteers
2.List the major data stores and the user communities for each data store
NAS clusters – Researches, scientists, end users
Medical Records Storage – Raw data from volunteers.
3.Characterize the network traffic in terms of flow, load, behaviour, and QoS requirements. You
will notbe able to precisely characterize the traffic but provide some theories about it an
document the types oftest you would conduct to prove your theory right or wrong
For Genome4U, the data store for the project will be a NAS Cluster. The flow type can
becharacterized as distributed computing due to the data processing which can take place in
themultiple computing nodes across the network therefore enabling the sharing of workload.
Trafficload estimates will be based on the application usage patterns, time required to transmit
dataonce the access to the data store is gained, and further observation of the frame sizes,
andpackage size.Multicast behaviour for the Genome4U project transmits data to a
multicastreceiver group depending on the user communities.In addition to the traffic analysis,
allocationof resources will play an important role given the robustness in the genetic information
of eachperson. The different applications can be categorized to establish the QoS
requirementsespecially when handling sensitive data.
A data store for raw data from the volunteers will contain their traits and medical records. If
theyare filling out a form or submitting their information through an application, traffic flow
willmost likely be asymmetric as the users will be send their data to the host. (Terminal/Host)
4.additional questions would you ask Genome4U’s founder about this project? Who besides the
founder would you talk to and what questions would you ask them
Further is information is required in order to get an overall understanding of the existing
networkand the project’s structure. Questions to be asked to the founder will include the
following.oWhat are the success factors and overall budget for the new network?
oIs the new network designed required for the entire project?
Or is it just a segment?oIs there any documentation on the existing network?oIs there anyone
else involved in the project?
If so, who would be involved in the decisionmaking and approval of the network?oWhere is the
existing research data currently stored?
In addition to the founder, it would be a good idea to talk to any internal or external
usersinvolved in the project and ask them about the applications and their interaction with the
existingnetwork. This would give a better idea on the expectations, application usage and
thereforenetwork traffic

More Related Content

Similar to 1.List the major communitiesResearchersComputer Scientists, math.pdf

A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSA QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
ijait
 
Activity Streaming as Information X-Docking
Activity Streaming as Information X-DockingActivity Streaming as Information X-Docking
Activity Streaming as Information X-Docking
Kai Riemer
 
FedCentric_Presentation
FedCentric_PresentationFedCentric_Presentation
FedCentric_Presentation
Yatpang Cheung
 
Research Metadata Mechanics - Simon Porter
Research Metadata Mechanics - Simon PorterResearch Metadata Mechanics - Simon Porter
Research Metadata Mechanics - Simon Porter
CASRAI
 

Similar to 1.List the major communitiesResearchersComputer Scientists, math.pdf (20)

What is Data Commons and How Can Your Organization Build One?
What is Data Commons and How Can Your Organization Build One?What is Data Commons and How Can Your Organization Build One?
What is Data Commons and How Can Your Organization Build One?
 
IRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET- Swift Retrieval of DNA Databases by Aggregating QueriesIRJET- Swift Retrieval of DNA Databases by Aggregating Queries
IRJET- Swift Retrieval of DNA Databases by Aggregating Queries
 
Efficient Association Rule Mining in Heterogeneous Data Base
Efficient Association Rule Mining in Heterogeneous Data BaseEfficient Association Rule Mining in Heterogeneous Data Base
Efficient Association Rule Mining in Heterogeneous Data Base
 
The data traffic and data warehouses store managing and controlling
The data traffic and data warehouses store managing and controllingThe data traffic and data warehouses store managing and controlling
The data traffic and data warehouses store managing and controlling
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
 
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSA QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
 
10 problems 06
10 problems 0610 problems 06
10 problems 06
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycle
 
IEEE Service computing 2016 Title and Abstract
IEEE Service computing 2016 Title and AbstractIEEE Service computing 2016 Title and Abstract
IEEE Service computing 2016 Title and Abstract
 
11.challenging issues of spatio temporal data mining
11.challenging issues of spatio temporal data mining11.challenging issues of spatio temporal data mining
11.challenging issues of spatio temporal data mining
 
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion ApproachEnhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
 
Activity Streaming as Information X-Docking
Activity Streaming as Information X-DockingActivity Streaming as Information X-Docking
Activity Streaming as Information X-Docking
 
FedCentric_Presentation
FedCentric_PresentationFedCentric_Presentation
FedCentric_Presentation
 
Healthcare trends and information management strategy
Healthcare trends and information management strategyHealthcare trends and information management strategy
Healthcare trends and information management strategy
 
In Search of a Missing Link in the Data Deluge vs. Data Scarcity Debate
In Search of a Missing Link in the Data Deluge vs. Data Scarcity DebateIn Search of a Missing Link in the Data Deluge vs. Data Scarcity Debate
In Search of a Missing Link in the Data Deluge vs. Data Scarcity Debate
 
Uniting traditional GIS and mainstream IT
Uniting traditional GIS and mainstream ITUniting traditional GIS and mainstream IT
Uniting traditional GIS and mainstream IT
 
Research Metadata Mechanics - Simon Porter
Research Metadata Mechanics - Simon PorterResearch Metadata Mechanics - Simon Porter
Research Metadata Mechanics - Simon Porter
 
Dynamic Layer Management in Super-Peer Architectures
Dynamic Layer Management in Super-Peer ArchitecturesDynamic Layer Management in Super-Peer Architectures
Dynamic Layer Management in Super-Peer Architectures
 
thesis defense1
thesis defense1thesis defense1
thesis defense1
 
Cert Overview
Cert OverviewCert Overview
Cert Overview
 

More from venkt12345

To insert value X into a B-tree, there are 3 stepsIf there are M .pdf
To insert value X into a B-tree, there are 3 stepsIf there are M .pdfTo insert value X into a B-tree, there are 3 stepsIf there are M .pdf
To insert value X into a B-tree, there are 3 stepsIf there are M .pdf
venkt12345
 
The physical protection of knowledge, assets and personnel is key to.pdf
The physical protection of knowledge, assets and personnel is key to.pdfThe physical protection of knowledge, assets and personnel is key to.pdf
The physical protection of knowledge, assets and personnel is key to.pdf
venkt12345
 
Purpose of cashflow statements are to analyse the different cashflow.pdf
Purpose of cashflow statements are to analyse the different cashflow.pdfPurpose of cashflow statements are to analyse the different cashflow.pdf
Purpose of cashflow statements are to analyse the different cashflow.pdf
venkt12345
 
Modern Times is one of the greatest movies in the history of film. T.pdf
Modern Times is one of the greatest movies in the history of film. T.pdfModern Times is one of the greatest movies in the history of film. T.pdf
Modern Times is one of the greatest movies in the history of film. T.pdf
venkt12345
 
Main components of a computerMultimedia devicesOther peripheral .pdf
Main components of a computerMultimedia devicesOther peripheral .pdfMain components of a computerMultimedia devicesOther peripheral .pdf
Main components of a computerMultimedia devicesOther peripheral .pdf
venkt12345
 
INTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdf
INTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdfINTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdf
INTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdf
venkt12345
 
import java.awt.Color;import java.awt.Insets;import java.awt.Con.pdf
import java.awt.Color;import java.awt.Insets;import java.awt.Con.pdfimport java.awt.Color;import java.awt.Insets;import java.awt.Con.pdf
import java.awt.Color;import java.awt.Insets;import java.awt.Con.pdf
venkt12345
 
Identify the computer fraud and abuse technique byThis computer f.pdf
Identify the computer fraud and abuse technique byThis computer f.pdfIdentify the computer fraud and abuse technique byThis computer f.pdf
Identify the computer fraud and abuse technique byThis computer f.pdf
venkt12345
 
Average.javaimport java.util.Scanner;public class Average{ .pdf
 Average.javaimport java.util.Scanner;public class Average{ .pdf Average.javaimport java.util.Scanner;public class Average{ .pdf
Average.javaimport java.util.Scanner;public class Average{ .pdf
venkt12345
 
The short answer is no. The reason why you cant p.pdf
                     The short answer is no. The reason why you cant p.pdf                     The short answer is no. The reason why you cant p.pdf
The short answer is no. The reason why you cant p.pdf
venkt12345
 
First, lets start with naming binary ionic comp.pdf
                     First, lets start with naming binary ionic comp.pdf                     First, lets start with naming binary ionic comp.pdf
First, lets start with naming binary ionic comp.pdf
venkt12345
 

More from venkt12345 (20)

To insert value X into a B-tree, there are 3 stepsIf there are M .pdf
To insert value X into a B-tree, there are 3 stepsIf there are M .pdfTo insert value X into a B-tree, there are 3 stepsIf there are M .pdf
To insert value X into a B-tree, there are 3 stepsIf there are M .pdf
 
The physical protection of knowledge, assets and personnel is key to.pdf
The physical protection of knowledge, assets and personnel is key to.pdfThe physical protection of knowledge, assets and personnel is key to.pdf
The physical protection of knowledge, assets and personnel is key to.pdf
 
The function has 11 zeros , since the degree of function is 11So.pdf
The function has 11 zeros , since the degree of function is 11So.pdfThe function has 11 zeros , since the degree of function is 11So.pdf
The function has 11 zeros , since the degree of function is 11So.pdf
 
Purpose of cashflow statements are to analyse the different cashflow.pdf
Purpose of cashflow statements are to analyse the different cashflow.pdfPurpose of cashflow statements are to analyse the different cashflow.pdf
Purpose of cashflow statements are to analyse the different cashflow.pdf
 
O,S as they belong to same groupSolutionO,S as they belong to .pdf
O,S as they belong to same groupSolutionO,S as they belong to .pdfO,S as they belong to same groupSolutionO,S as they belong to .pdf
O,S as they belong to same groupSolutionO,S as they belong to .pdf
 
Modern Times is one of the greatest movies in the history of film. T.pdf
Modern Times is one of the greatest movies in the history of film. T.pdfModern Times is one of the greatest movies in the history of film. T.pdf
Modern Times is one of the greatest movies in the history of film. T.pdf
 
Main components of a computerMultimedia devicesOther peripheral .pdf
Main components of a computerMultimedia devicesOther peripheral .pdfMain components of a computerMultimedia devicesOther peripheral .pdf
Main components of a computerMultimedia devicesOther peripheral .pdf
 
INTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdf
INTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdfINTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdf
INTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdf
 
Include time header file#includetime.hWrite main method like t.pdf
Include time header file#includetime.hWrite main method like t.pdfInclude time header file#includetime.hWrite main method like t.pdf
Include time header file#includetime.hWrite main method like t.pdf
 
import java.awt.Color;import java.awt.Insets;import java.awt.Con.pdf
import java.awt.Color;import java.awt.Insets;import java.awt.Con.pdfimport java.awt.Color;import java.awt.Insets;import java.awt.Con.pdf
import java.awt.Color;import java.awt.Insets;import java.awt.Con.pdf
 
Identify the computer fraud and abuse technique byThis computer f.pdf
Identify the computer fraud and abuse technique byThis computer f.pdfIdentify the computer fraud and abuse technique byThis computer f.pdf
Identify the computer fraud and abuse technique byThis computer f.pdf
 
Given A fund that starts with a zero balance with time zero. Fund .pdf
Given  A fund that starts with a zero balance with time zero. Fund .pdfGiven  A fund that starts with a zero balance with time zero. Fund .pdf
Given A fund that starts with a zero balance with time zero. Fund .pdf
 
Average.javaimport java.util.Scanner;public class Average{ .pdf
 Average.javaimport java.util.Scanner;public class Average{ .pdf Average.javaimport java.util.Scanner;public class Average{ .pdf
Average.javaimport java.util.Scanner;public class Average{ .pdf
 
Your equation is correct. Double replacement reac.pdf
                     Your equation is correct. Double replacement reac.pdf                     Your equation is correct. Double replacement reac.pdf
Your equation is correct. Double replacement reac.pdf
 
well while idenitfying aldehydeketone u must kee.pdf
                     well while idenitfying aldehydeketone u must kee.pdf                     well while idenitfying aldehydeketone u must kee.pdf
well while idenitfying aldehydeketone u must kee.pdf
 
The short answer is no. The reason why you cant p.pdf
                     The short answer is no. The reason why you cant p.pdf                     The short answer is no. The reason why you cant p.pdf
The short answer is no. The reason why you cant p.pdf
 
Since it gets in equilibrium when dissolved at sa.pdf
                     Since it gets in equilibrium when dissolved at sa.pdf                     Since it gets in equilibrium when dissolved at sa.pdf
Since it gets in equilibrium when dissolved at sa.pdf
 
phosphite ion .pdf
                     phosphite ion                                    .pdf                     phosphite ion                                    .pdf
phosphite ion .pdf
 
First, lets start with naming binary ionic comp.pdf
                     First, lets start with naming binary ionic comp.pdf                     First, lets start with naming binary ionic comp.pdf
First, lets start with naming binary ionic comp.pdf
 
dFdy=dFdu dudy +dFdv dvdy =e^(u+v) 0 +e.pdf
                     dFdy=dFdu  dudy +dFdv dvdy =e^(u+v)  0 +e.pdf                     dFdy=dFdu  dudy +dFdv dvdy =e^(u+v)  0 +e.pdf
dFdy=dFdu dudy +dFdv dvdy =e^(u+v) 0 +e.pdf
 

Recently uploaded

SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Recently uploaded (20)

8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 

1.List the major communitiesResearchersComputer Scientists, math.pdf

  • 1. 1.List the major communities Researchers Computer Scientists, mathematicians, scientists .Individuals/ End users and Doctors Volunteers 2.List the major data stores and the user communities for each data store NAS clusters – Researches, scientists, end users Medical Records Storage – Raw data from volunteers. 3.Characterize the network traffic in terms of flow, load, behaviour, and QoS requirements. You will notbe able to precisely characterize the traffic but provide some theories about it an document the types oftest you would conduct to prove your theory right or wrong For Genome4U, the data store for the project will be a NAS Cluster. The flow type can becharacterized as distributed computing due to the data processing which can take place in themultiple computing nodes across the network therefore enabling the sharing of workload. Trafficload estimates will be based on the application usage patterns, time required to transmit dataonce the access to the data store is gained, and further observation of the frame sizes, andpackage size.Multicast behaviour for the Genome4U project transmits data to a multicastreceiver group depending on the user communities.In addition to the traffic analysis, allocationof resources will play an important role given the robustness in the genetic information of eachperson. The different applications can be categorized to establish the QoS requirementsespecially when handling sensitive data. A data store for raw data from the volunteers will contain their traits and medical records. If theyare filling out a form or submitting their information through an application, traffic flow willmost likely be asymmetric as the users will be send their data to the host. (Terminal/Host) 4.additional questions would you ask Genome4U’s founder about this project? Who besides the founder would you talk to and what questions would you ask them Further is information is required in order to get an overall understanding of the existing networkand the project’s structure. Questions to be asked to the founder will include the following.oWhat are the success factors and overall budget for the new network? oIs the new network designed required for the entire project? Or is it just a segment?oIs there any documentation on the existing network?oIs there anyone else involved in the project? If so, who would be involved in the decisionmaking and approval of the network?oWhere is the existing research data currently stored? In addition to the founder, it would be a good idea to talk to any internal or external
  • 2. usersinvolved in the project and ask them about the applications and their interaction with the existingnetwork. This would give a better idea on the expectations, application usage and thereforenetwork traffic Solution 1.List the major communities Researchers Computer Scientists, mathematicians, scientists .Individuals/ End users and Doctors Volunteers 2.List the major data stores and the user communities for each data store NAS clusters – Researches, scientists, end users Medical Records Storage – Raw data from volunteers. 3.Characterize the network traffic in terms of flow, load, behaviour, and QoS requirements. You will notbe able to precisely characterize the traffic but provide some theories about it an document the types oftest you would conduct to prove your theory right or wrong For Genome4U, the data store for the project will be a NAS Cluster. The flow type can becharacterized as distributed computing due to the data processing which can take place in themultiple computing nodes across the network therefore enabling the sharing of workload. Trafficload estimates will be based on the application usage patterns, time required to transmit dataonce the access to the data store is gained, and further observation of the frame sizes, andpackage size.Multicast behaviour for the Genome4U project transmits data to a multicastreceiver group depending on the user communities.In addition to the traffic analysis, allocationof resources will play an important role given the robustness in the genetic information of eachperson. The different applications can be categorized to establish the QoS requirementsespecially when handling sensitive data. A data store for raw data from the volunteers will contain their traits and medical records. If theyare filling out a form or submitting their information through an application, traffic flow willmost likely be asymmetric as the users will be send their data to the host. (Terminal/Host) 4.additional questions would you ask Genome4U’s founder about this project? Who besides the founder would you talk to and what questions would you ask them Further is information is required in order to get an overall understanding of the existing networkand the project’s structure. Questions to be asked to the founder will include the following.oWhat are the success factors and overall budget for the new network? oIs the new network designed required for the entire project?
  • 3. Or is it just a segment?oIs there any documentation on the existing network?oIs there anyone else involved in the project? If so, who would be involved in the decisionmaking and approval of the network?oWhere is the existing research data currently stored? In addition to the founder, it would be a good idea to talk to any internal or external usersinvolved in the project and ask them about the applications and their interaction with the existingnetwork. This would give a better idea on the expectations, application usage and thereforenetwork traffic