Syllabus 5100 Fall 2007 Mb Ds

  • October 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Syllabus 5100 Fall 2007 Mb Ds as PDF for free.

More details

  • Words: 3,319
  • Pages: 13
Webster UNIVERSITY

The School of Business & Technology

Course Syllabus Directed Study (Fall 2007)

Course

ITM 5100 Information and Communications Systems and Networks

Instructor

Name: Phone: Email:

Umesh C. Varma 910-893-1408 [email protected]

Catalog Description This course introduces students to the technical aspects of information and communications networks and technology. The course focuses on the interdependencies among information and communications technologies and architectures. Emphasis will be placed on the fundamentals of networks (LAN and WAN). Prerequisites

ITM 5000 — Information Technology Management – Overview

Course Level After completing this course, students will: Learning Outcomes a. Be able to examine the data communications hardware, software and transmission facilities. b. Understand how networks are used today. c. Understand the four-layer network model, a foundation for data communications and networking. d. Gain full understanding of detail architecture of four layers relating to the OSI model. e. Understand the internet/intranet architecture and associated protocols. f. Understand the design and development of LAN, WAN, MAN, and Backbone networks. g. Be able to examine the client-server architecture. h. Gain knowledge about the issues involved in network design, management, and security. i. Be able to explore the new technologies, which will affect network applications in the future. Materials

1. Required Text:

Business Data Communications and Networking; Jerry Fitzgerald and Alan Dennis; 8th Edition; John Wiley & Sons, 2005; ISBN 0-471-34807-4. To order: Call MBS Direct at 1-800-325-3252 or by Internet:

http://www.mbsdirect.net 2. Use of Webster Library: (use of the Webster library is encouraged)

Eden-Webster Library at http://library.webster.edu. Go to Databases and Internet Resource, then to Online/full text Databases or http://www.webster.edu/webmain2.html and then go to Library Resource, then to Online/full text Databases. 3. Supplemental Readings (for reference)

1. Modern Data Communications, Davenport, William P., Hayden Book Company, Inc. NJ. 2. Data Communications: A Comprehensive Approach, Held, Gilbert and Sarchray, McGraw-Hill Publications Company, NY. 3. Data Communications For Business, Lientz, P. Bennet, Rea, P. Kathryn, Times Mirror/Mosby. 4. Data Communications, Concepts and Applications, McGovern, Tom, Prentice-Hall, Canada. 5. Data and Computer Communications, Stallings, Williams, MacMillian Publishing Company. 6. Business Data Communications, Stamper, Benjamin/Cummings Publishing Company Inc.

David

A.,

7. Security for Computer Networks, Second Edition, Davies, D. W. and Price, W. L., 1992, John Wiley & Sons, Inc. 8. Differential Cryptanalysis of the Data Encryption Std. E. Bihaun and A. Shauir. Weizma Institute of Science; Rehovot, Israel. Springer-Verlag NY, Inc., 1993. 9. Public-Key Cryptography. A. Salourae. Academy of Finland; Turku, Finland. Springer Verlag New York, Inc., 1990. 10. PC Viruses, Detection, Analysis, and Cure. A. Solomon. SpringerVerlag New York Inc., 1991. 11. Applied Cryptography, Protocols, Algorithms, and Source Code in C. Bruce Schneier. John Wiley & Sons, 1993. 12. Network and Internetwork Security - Principles and Practice. William Stallings, Prentice Hall, 1995. 13. E-Mail Security - How to Keep Your Electronic Messages Private. Bruce Schneier, John Wiley & Sons, 1995.

14. Network Security. Steven L. Shafer and Alan R. Simon, AP Professional Division of Harcourt Brace & Co., 1995. 15. Network Security Secrets. David J. Stang and Sylvia Moon, IDG Books, 1995. 16. Applied Cryptography. Bruce Schneier, John Wiley and Sons, 1995. 17. Encryption for Everyone - PGP - Pretty Good Privacy. Simson Garfinkel, O'Reilly & Associates Inc., 1995. 18. Data Communications Networking Devices, Gilbert Held, John Wiley & Sons, 1992. 19. Data Communications, Computer Networks and Open Systems, Fred Halsall, J. O'Reilly, E. L. Dagless, Pearson Publications Company, 1996. 20. Wireless Communications : Principles and Practice, Theodore S. Rappaport, IEEE, 1996. 21. Mobile IP: Design Principles and Practices, Charles E. Perkins, Addison-Wesley, 1997. 22. Wireless Multimedia Communications: Networking Video, Voice, and Data, Ellen Kayata, Addison-Wesley Publishing Co., 1997. 23. Spread Spectrum CDMA Systems for Wireless Communications, Savo Glisic, Branka Vucetic, Artech House, 1997. 24. Wireless: The Revolution in Personal Telecommunications, Ira Brodsky, Artech House, 1995. 25. Electronic Media and Government: The Regulation of Wireless and Wired Mass Communication in the United States, F. Leslie Smith, Addison-Wesley Publishing Co., 1994. 26. Integrating E-Mail, S. M. H. Collin, Wayne Vigeant, Digital Press, 1999. 27. Looking into Intranets and the Internet: Advice for Managers, Anita Rosen, AMACOM, 1997. 28. VPN Applications Guide: Real Solutions for Enterprise Networks, David E. McDysan, John Wiley & Sons, 2000. 29. Intranet Performance Management, Kornel Terplan, Saba Zamir, CRC Press, 1999. 30. Designing the Total Area Network: Intranets, VPNs, and Enterprise Networks Explained, Mark Norris, Steve Pretty, John Wiley & Sons, 2000.

Grading

The GRADUATE catalog provides these guidelines and grading options: • A/A– Superior graduate work • B+/B/B– Satisfactory graduate work • C Work that is barely adequate as graduate-level performance • CR Work that is performed as satisfactory graduate work (B– or better). A grade • • • • • •

of "CR” is reserved for courses designated by a department, involving internships, a thesis, practicums, or specified courses. F Work that is unsatisfactory I Incomplete work ZF An incomplete which was not completed within one year of the end of the course. ZF is treated the same as an F or NC for all cases involving G.P.A., academic warning, probation, and dismissal. IP In progress NR Not reported W Withdrawn from the course

COURSE REQUIREMENTS Mid Term Final Case Study Term Paper Homework

PERCENT OF GRADES 30% 30% 12% 12% (topics included in the syllabus) 16 %

Grade Distribution for this course is as follows: 100 - 95 A 94 - 90 A89 - 87 B+ 86 - 84 B 83 - 80 B79 - 75 C Below 75 F NOTE: Students using Tuition Assistance (TA) are responsible for ensuring that all Incomplete (I) work is completed within 120 days from the end of the course. If the work is not completed and a grade awarded. The military will take action to recover their TA payment from your pay. Students are responsible for ensuring that all grades of Incomplete (I) have been changed prior to petitioning to graduate. ACADEMIC REVIEW PROCEDURE: Grades of B- or higher may not be appealed. The appeal process begins with the instructor. If further review is warranted, a written request outlining the issue should be submitted to the Academic Advisor.

Activities

Mid-term Exam (30%): Due: Week-4 Mid-term exam consists of Chapters 1, 2, 3, 4, 5, and 6. Format for mid-term exam: Multiple Choice / Essay / Matching Weight given to mid-term exam: 30% Maximum Time Limit: 2 hours 30 minutes Final Exam (30%): Due: Week-8 Final exam consists of Chapters 7, 8, 9, 10, 11, and 12. Format for final exam: Multiple Choice / Essay / Matching Weight given to final exam: 30% Maximum Time Limit: 2 hours 30 minutes Case Study (12%): Due: Week-9 One real-life information and communications network case study (12% of total grades) would be assigned to the students at the beginning of semester. Students would analyze this case study with respect to network design, development, deployment, and maintenance. Students would also provide recommendations for improvement in the existing design, applications of new technologies in networking, business value of network, solving network management problems, and future enhancements. Final report of this case study is due in week-9. Term Paper (12%): Due: Week-9 a. Select a topic from the list given below. b. Present a brief proposal for your paper in the first week to discuss your research objectives and scope. Once these two things are approved by the instructor you can start working on your paper. c. Topics for term paper 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17.

Local Area Network Protocols Packet Switched Networks Synchronous and Asynchronous Communications Network Architecture Wide Area Networks (WANs) Value Added Networks (VANs) Metropolitan Area Networks (MANs) Total Area Networks (TANs) Storage Area Networks (SANs) Distributed Systems Architecture Open System Interconnection (ISO Model) System Network Architecture (IBM Model) T-1/T-4 Networking Technology Integrated Services Digital Network (ISDN) SONET Technology Frame Relay versus Packet Switch Networks Network Security and Control Mechanisms

18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60.

Asynchronous Transfer Mode (ATM) Technology Switched Multimegabit Data Services (SMDS) DSL Services GEO, MEO, and LEO Satellite Broadcasting Network Interconnection using FDDI Data Encryption Standards (DES) World Wide Web (WWW) Security Thin Client - Fat Server Computing Proactive Network Security Internet Security - Distributed Denial of Service (DDOS) E-Commerce Security Migration from IPV4 to IPV6 E-Mail Protocols Electronic Data Interchange (EDI) Networks Virtual Private Networks Multicasting Networks Error Detection and Correction in Data Communications Clustering Technologies Java-based networks Gigabit Ethernet Enterprise Extranets Wireless LANs Personal Communication Networks (PCNs) Virtual LANs Public Data Networks (PDNs) TCP/IP Security Firewall Technology Voice Over IP Case Study: Windows NT/2000 Networking Case Study: Deployment of Enterprise Anti-Virus Security Case Study: Deployment of Network Management Software Grid Computing Cluster Computing Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IP) Servlets Streaming Media Protocols Digital Certificates Spanning Tree Protocol IP Multicast Routing P-2-P Protocols

Format For Term Paper 1. Title Page (use any standard format: APA /MLA) – must have title on the top. 2. Table of Contents 3. List of Figures (Optional) 4. List of Tables (Optional) 5. Abstract (one page maximum) 6. Introduction 7. Main Body of Essay (will have several sections) 8. Conclusion 9. Bibliography (URL is not sufficient) Note: Each item mentioned above must start on a new page and in item “7” each

section must start on a new page. Documenting Electronic Sources in Term Paper Below is a sample bibliography styled for documenting Electronic Sources on the Internet. Sources are listed in alphabetical order by author. 1. E-Mail FORMAT Author.. "Subject Line." Date of post. Personal email. (Date read). EXAMPLE Andrec, Mike. [email protected] "New England School of Bandura." 18 Apr.1996. Personal e-mail. (19 Apr. 1996). 2. Web Site FORMAT Author [if known]. "Title" (main title if applicable). Last date updated or revised [if known]. (date accessed). EXAMPLE Ignatius. "To the Trallians." Early Church Documents (circa 96-50 A.D.). 1994. http://listsery. american.edu/catholic/church/fathers/ignatius/ign-trl.txt (20 Jun. 1996). 3. FTP FORMAT Author [if known]. "Title of Document" (Date of publication) [if available]. FTP address (date accessed). EXAMPLE Letter, Mark. "Internet Domain Survey" (18 Feb. 1996). FTP to ftp.nw.com /zone/report.doc (16 Jun. 1996). 4. Gopher FORMAT Author [if known]. "Title of Document" (Date of publication) [if available]. FTP address (date accessed). EXAMPLE Westlund, Mark. "Boycott of Mitsubishi in Japan Launched by Peaceful Protest in Osaka." Published in "RAN News" (the Rainforest Action network newsletter) March 21, 1996. Gopher igc.apc.org /Organizations/Rainforest Action Network/Ran News/Mitsubishi Boycott (21 Jun. 1996). 5. Usenet News FORMAT Author. "Subject Line." Date of publication.

(date accessed). EXAMPLE Straczynski, J. M. Jmsatb5 @ aol.com "Re: ATTN JMS: Is B5 Dead?" 19 Jun 1996. rec. arts.sf.tv.babylon5.moderated (23 Jun. 1996). 6. Mailing List FORMAT Author [if known]. "Subject Line." Date of post. <mailing list address> (date accessed). EXAMPLE Tracz, Orysia. [email protected] ba.ca "Shevchenko in Love." 1 May 1996. ukes-social@soma. crl.mcmaster.ca (23 Jun. 1996).

Homework (16%): Due: Week-9 Homework questions would be assigned from the textbook as well as from the Internet. All homework assignments are due in week-9. All turned-in assignments will be neatly typed (word-processed) and printed with letterquality type. Students failing to present the information completely, neatly and in the prescribed format will receive minimal credit for their work. Students should double check for spelling and grammar before submitting assignments. Additional Student Reading Some handouts may be provided to the students throughout the semester. Students are responsible to study them as additional learning units.

Policy Statements: University Policies

University policies are provided in the current course catalog and course schedules. They are also available on the university website. This class is governed by the university’s published policies. The following policies are of particular interest: Academic Honesty The university is committed to high standards of academic honesty. Students will be held responsible for violations of these standards. Please refer to the university’s academic honesty policies for a definition of academic dishonesty and potential disciplinary actions associated with it. Drops and Withdrawals Please be aware that, should you choose to drop or withdraw from this course, the date on which you notify the university of your decision will determine the amount of tuition refund you receive. Please refer to the university policies on drops and withdrawals (published elsewhere) to find out what the deadlines are for dropping a course with a full refund and for withdrawing from a course with a partial refund. Special Services If you have registered as a student with a documented disability and are entitled to classroom or testing accommodations, please inform the instructor at the beginning of the course of the accommodations you will require in this class so that these can be provided. Disturbances Since every student is entitled to full participation in class without interruption, disruption of class by inconsiderate behavior is not acceptable. Students are expected to treat the instructor and other students with dignity and respect, especially in cases where a diversity of opinion arises. Students who engage in disruptive behavior are subject to disciplinary action, including removal from the course.

Course Policies

Incoming Competency Expected By Instructor Students should should have successfully completed requisite B. The student notify the instructor priorthe to class if an 5000-level absence is anticipated and he/she should not miss more than four contact hours. Makeup work will be assigned and if the absence is unexpected, it may exceed the material presented. C. For absences of eight hours, the instructor has the option to lower the student's grade one latter grade and to inform the student of the action. D. If the student is absent twelve hours or more, the instructor has the option to assign a grade of “F” (work that is unsatisfactory) and to inform the student of the action. It is the student's responsibility to withdraw from the course. E. For excused absences (in an extreme case) when the instructor chooses to award a grade of I (Incomplete) for twelve to sixteen hours missed,

the student must provide acceptable documentation to verify that the absences were unavoidable (e.g., illness, military duty TDY). These actions will be coordinated with the site director who will ensure that the documentation is placed in the student’s file. F.

In all cases, without excused absences, the student should withdraw from the course if he or she has more than sixteen hours of absences.

Ethics Webster University strives to be a center of academic excellence. As part of our Statement of Ethics, the University strives to preserve academic honor and integrity by repudiating all forms of academic and intellectual dishonesty, including cheating, plagiarism, and all other forms of academic dishonesty. Academic dishonesty is unacceptable and is subject to disciplinary action. The University reserves the right to utilize electronic databases, such as Turnitin.com, to assist faculty and students with their academic work. Schedule for Reading Assignments

1. Introduction to Data Communications - Introduction – A Brief History of Communications in North America, A Brief History of Information Systems, A Brief History of the Internet. Data communications networks – Components of a Network, Types of Networks. Network Models- Open Systems Interconnection Reference Model, Internet Model, Message Transmission Using Layers. Network Standards- The Importance Of Standards, The Standards-Making Process, Common Standards. Future TrendsPervasive Networking, The Integration of Voice, Video and Data, New Information Services. 2. Application Layer – Introduction. Application Architectures- HostBased Architectures, Client- Based Architectures, Client-Server Architectures, Choosing Architectures. World Wide Web- How the Web Works, Inside the HTTP Request, Inside an HTTP response. Electronic Mail- How E-Mail Works, Inside an SMTP Packet, Listerve Discussion Groups, Attachments in Multipurpose Internet Mail Extension. Other Applications- File Transfer Protocol, Telnet, Instant Messaging, Videoconferencing. 3. Physical Layer – Introduction. Circuits- Circuit Configuration, Data Flow, Communication Media, Media Selection. Digital Transmission of Digital Data- Coding, Transmission Modes, Digital Transmission, How Ethernet Transmits Data, Analog Transmission of Digital Data- Modulation, Capacity of a Voice Circuit, How Modems Transmit Data. Digital Transmission of Analog DataTranslating from Analog to Digital, How Telephones Transmit Voice Data, How Instant Messenger Transmits Voice Data. Analog Digital Modems Multiplexing- Frequency Division Multiplexing, Time Division Multiplexing, Statistical Time Division Multiplexing, Wavelength Division Multiplexing, Inverse

Multiplexing, How DSL Transmits Data. 4. Data Link Layer – Introduction. Media Access Control- Controlled Access, Contention, Relative Performance. Error Control- Sources of Error, Error Prevention, Error Detection, Error Correction via Retransmission. Forward Error Correction- Data Link Protocols, Asynchronous Transmission, Asynchronous File Transfer Protocols, Synchronous Transmission. Transmission Efficiency. 5. Network and Transport Layers – Introduction. Transport and Network Layer Protocols- Transmission Control Protocol/ Internet Protocol, Internetwork Packet Exchange/Sequenced Packet Exchange, X.25, Systems Network Architecture, Transport Layer Functions- Linking to the Application Layer, Packetizing. Addressing- Assigning Addresses, Address Resolution. Routing Types of Routing, Routing Protocols, Multicasting, TCP/IP Example - Known Addresses (same subnet), Known Addresses (different subnet), Unknown Addresses, TCP Connections, TCP/IP and Network Layers. 6. Local Area Networks - Introduction- Why Use a LAN? DedicatedServer verses Peer-to-Peer LANs, LAN Components- Network Interface Cards, Network Cables, Network Hubs, Network Operating Systems, Traditional Ethernet (IEEE 802.3)- Topology, Media Access Control, Types of Ethernet, Switched EthernetTopology, Media Access Control, Performance Benefits. The best practice LAN design – effective data rates, costs, recommendations. Improving LAN performance – improving server performance, improving circuit capacity, reducing network demand. 7. Wireless Local Area Networks – Introduction, IEEE 802.11b – Topology, Media Access Control, Physical data transmission. IEEE 802.11a - Topology, Media Access Control, data transmission in the physical layer. IEEE 802.11g - Topology, Media Access Control, Physical transmission. Bluetooth - Topology, Media Access Control, data transmission in the physical layer. The best practice WLAN design – effective data rates, costs, recommendations, physical WLAN design, WLAN security. Improving WLAN Performance- Improving Device Performance, Improving Circuit Capacity, Reducing Network Demand. 8. Backbone Networks – Introduction. Backbone Networks Components- Bridges, Routers, Gateway, A Caveat Backbone Architectures- Backbone Architecture Layers, Routed Backbone, Bridged Backbone, Collapsed Backbone, Virtual LAN Backbone Technologies- Fiber-Distributed Data Interface, Asynchronous Transfer Mode. The best practice backbone design – architecture, effective data rate, conversion between protocols, recommendations. Improving Backbone Performance- Improving Computer and Device Performance, Improving Circuit Capacity,

Reducing Network Demand. 9. Metropolitan and Wide Area Networks – Introduction, CircuitSwitched Networks- Basic Architecture, Plain Old Telephone Service, ISDN, Dedicated Circuit Networks – Basic Architecture, T Carrier Services, Synchronous Optical Network, Packet Switched Networks- Basic Architecture, X.25, Asynchronous Transfer Mode, Frame Relay, Switched Multimegabit Data Service, Ethernet/IP packet Networks, Virtual Private Networks- Basic Architecture, VPN Types. The Best Practice MAN/WAN. Improving MAN/WAN Performance- Improving Device Performance, Improving Circuit Capacity, Reducing Network Demand, 10. The Internet – Introduction. How the Internet Works- Basic Architecture, Connecting to an ISP, The Internet Today. Internet Access technologies – DSL, Cable Modems, Fixed Wireless, Mobile Wireless, Future Technologies Internet Governance- Internet 2. 11. Network Security - Introduction- Why Networks Need Security, Types of Security Threats, Network Controls. Risk AssessmentDevelop a Control Spreadsheet, Identify and Document the Controls, Evaluate the Network’s Security. Controlling Disruption. Business continuity planning - Preventing Disruption, Destruction, and Disaster, detecting Disruption, Destruction, and Disaster, Correcting Disruption, Destruction, and Disaster. Controlling Unauthorized Access- Preventing Unauthorized Access, Detecting Unauthorized Access, Correcting Unauthorized Access. Best practice recommendation. 12. Network Design – Introduction. The Traditional Network Design Process, The Building Block Network Design Process. Needs Analysis- Geographic Scope, Application Systems, Network Users, Categorizing Network Needs, Deliverables. Technology DesignDesigning Clients and Servers, Designing Circuits and Devices, Network Design Tools, Deliverables. Cost Assessment- Request for Proposal, Selling the Proposal to Management, deliverables. Designing for network performance – managed networks, network circuits, network devices, minimizing network traffic. Additional Information

13. Network Management – brief coverage. Disclaimer This syllabus is intended to provide a basic structure to this course. Adherence to this syllabus is subject to change at the discretion of the instructor.

Copyright © 2007 -2008, School of Business & Technology, Webster University. All rights reserved.

[Revised: Fall 2007 / File: Syllabus-5100-Fall-2007-MB-DS]

Related Documents

Fall 2007 Syllabus
May 2020 3
5100
December 2019 14
Class Test 1 (syllabus 5100)
November 2019 15