Sunteți pe pagina 1din 13

The School of Business & Technology

Webster Course Syllabus


UNIVERSITY Directed Study (Fall 2007)
Course ITM 5100 Information and Communications Systems and Networks

Name: Umesh C. Varma


Instructor Phone: 910-893-1408
Email: varma@campbell.edu
Catalog Description This course introduces students to the technical aspects of information and
communications networks and technology. The course focuses on the
interdependencies among information and communications technologies
and architectures. Emphasis will be placed on the fundamentals of
networks (LAN and WAN).
Prerequisites ITM 5000 — Information Technology Management – Overview
Course Level After completing this course, students will:
Learning Outcomes
a. Be able to examine the data communications hardware, software and
transmission facilities.

b. Understand how networks are used today.

c. Understand the four-layer network model, a foundation for data


communications and networking.

d. Gain full understanding of detail architecture of four layers relating to


the OSI model.

e. Understand the internet/intranet architecture and associated protocols.

f. Understand the design and development of LAN, WAN, MAN, and


Backbone networks.

g. Be able to examine the client-server architecture.

h. Gain knowledge about the issues involved in network design,


management, and security.

i. Be able to explore the new technologies, which will affect network


applications in the future.

Materials 1. Required Text:

Business Data Communications and Networking; Jerry Fitzgerald and Alan


Dennis; 8th Edition; John Wiley & Sons, 2005; ISBN 0-471-34807-4.

To order: Call MBS Direct at 1-800-325-3252 or by Internet:


http://www.mbsdirect.net

2. Use of Webster Library: (use of the Webster library is encouraged)

Eden-Webster Library at http://library.webster.edu. Go to Databases and


Internet Resource, then to Online/full text Databases or
http://www.webster.edu/webmain2.html and then go to Library
Resource, then to Online/full text Databases.

3. Supplemental Readings (for reference)

1. Modern Data Communications, Davenport, William P., Hayden Book


Company, Inc. NJ.

2. Data Communications: A Comprehensive Approach, Held, Gilbert and


Sarchray, McGraw-Hill Publications Company, NY.

3. Data Communications For Business, Lientz, P. Bennet, Rea, P. Kathryn,


Times Mirror/Mosby.

4. Data Communications, Concepts and Applications, McGovern, Tom,


Prentice-Hall, Canada.

5. Data and Computer Communications, Stallings, Williams, MacMillian


Publishing Company.

6. Business Data Communications, Stamper, David A.,


Benjamin/Cummings Publishing Company Inc.

7. Security for Computer Networks, Second Edition, Davies, D. W. and


Price, W. L., 1992, John Wiley & Sons, Inc.

8. Differential Cryptanalysis of the Data Encryption Std. E. Bihaun and A.


Shauir. Weizma Institute of Science; Rehovot, Israel. Springer-Verlag NY,
Inc., 1993.

9. Public-Key Cryptography. A. Salourae. Academy of Finland; Turku,


Finland. Springer Verlag New York, Inc., 1990.

10. PC Viruses, Detection, Analysis, and Cure. A. Solomon. Springer-


Verlag New York Inc., 1991.

11. Applied Cryptography, Protocols, Algorithms, and Source Code in C.


Bruce Schneier. John Wiley & Sons, 1993.

12. Network and Internetwork Security - Principles and Practice. William


Stallings, Prentice Hall, 1995.

13. E-Mail Security - How to Keep Your Electronic Messages Private.


Bruce Schneier, John Wiley & Sons, 1995.
14. Network Security. Steven L. Shafer and Alan R. Simon, AP
Professional Division of Harcourt Brace & Co., 1995.

15. Network Security Secrets. David J. Stang and Sylvia Moon, IDG
Books, 1995.

16. Applied Cryptography. Bruce Schneier, John Wiley and Sons, 1995.

17. Encryption for Everyone - PGP - Pretty Good Privacy. Simson


Garfinkel, O'Reilly & Associates Inc., 1995.

18. Data Communications Networking Devices, Gilbert Held, John Wiley


& Sons, 1992.

19. Data Communications, Computer Networks and Open Systems, Fred


Halsall, J. O'Reilly, E. L. Dagless, Pearson Publications Company, 1996.

20. Wireless Communications : Principles and Practice, Theodore S.


Rappaport, IEEE, 1996.

21. Mobile IP: Design Principles and Practices, Charles E. Perkins,


Addison-Wesley, 1997.

22. Wireless Multimedia Communications: Networking Video, Voice, and


Data, Ellen Kayata, Addison-Wesley Publishing Co., 1997.

23. Spread Spectrum CDMA Systems for Wireless Communications, Savo


Glisic, Branka Vucetic, Artech House, 1997.

24. Wireless: The Revolution in Personal Telecommunications, Ira


Brodsky, Artech House, 1995.

25. Electronic Media and Government: The Regulation of Wireless and


Wired Mass Communication in the United States, F. Leslie Smith,
Addison-Wesley Publishing Co., 1994.

26. Integrating E-Mail, S. M. H. Collin, Wayne Vigeant, Digital Press,


1999.

27. Looking into Intranets and the Internet: Advice for Managers, Anita
Rosen, AMACOM, 1997.

28. VPN Applications Guide: Real Solutions for Enterprise Networks,


David E. McDysan, John Wiley & Sons, 2000.

29. Intranet Performance Management, Kornel Terplan, Saba Zamir, CRC


Press, 1999.

30. Designing the Total Area Network: Intranets, VPNs, and Enterprise
Networks Explained, Mark Norris, Steve Pretty, John Wiley & Sons, 2000.
Grading The GRADUATE catalog provides these guidelines and grading
options:
• A/A– Superior graduate work
• B+/B/B– Satisfactory graduate work
• C Work that is barely adequate as graduate-level performance
• CR Work that is performed as satisfactory graduate work (B– or better). A grade
of "CR” is reserved for courses designated by a department, involving
internships, a thesis, practicums, or specified courses.
• F Work that is unsatisfactory
• I Incomplete work
• ZF An incomplete which was not completed within one year of the end of the
course. ZF is treated the same as an F or NC for all cases involving G.P.A.,
academic warning, probation, and dismissal.
• IP In progress
• NR Not reported
• W Withdrawn from the course

COURSE REQUIREMENTS PERCENT OF GRADES


Mid Term 30%
Final 30%
Case Study 12%
Term Paper 12% (topics included in the syllabus)
Homework 16 %

Grade Distribution for this course is as follows:


100 - 95 A
94 - 90 A-
89 - 87 B+
86 - 84 B
83 - 80 B-
79 - 75 C
Below 75 F

NOTE: Students using Tuition Assistance (TA) are responsible for


ensuring that all Incomplete (I) work is completed within 120 days from
the end of the course. If the work is not completed and a grade awarded.
The military will take action to recover their TA payment from your pay.

Students are responsible for ensuring that all grades of Incomplete (I)
have been changed prior to petitioning to graduate.

ACADEMIC REVIEW PROCEDURE: Grades of B- or higher may not be


appealed. The appeal process begins with the instructor. If further review
is warranted, a written request outlining the issue should be submitted to
the Academic Advisor.
Activities Mid-term Exam (30%): Due: Week-4

Mid-term exam consists of Chapters 1, 2, 3, 4, 5, and 6.


Format for mid-term exam: Multiple Choice / Essay / Matching
Weight given to mid-term exam: 30%
Maximum Time Limit: 2 hours 30 minutes

Final Exam (30%): Due: Week-8

Final exam consists of Chapters 7, 8, 9, 10, 11, and 12.


Format for final exam: Multiple Choice / Essay / Matching
Weight given to final exam: 30%
Maximum Time Limit: 2 hours 30 minutes

Case Study (12%): Due: Week-9

One real-life information and communications network case study (12% of


total grades) would be assigned to the students at the beginning of semester.
Students would analyze this case study with respect to network design,
development, deployment, and maintenance. Students would also provide
recommendations for improvement in the existing design, applications of
new technologies in networking, business value of network, solving
network management problems, and future enhancements. Final report of
this case study is due in week-9.

Term Paper (12%): Due: Week-9

a. Select a topic from the list given below.

b. Present a brief proposal for your paper in the first week to discuss your
research objectives and scope. Once these two things are approved by the
instructor you can start working on your paper.

c. Topics for term paper

1. Local Area Network Protocols


2. Packet Switched Networks
3. Synchronous and Asynchronous Communications
4. Network Architecture
5. Wide Area Networks (WANs)
6. Value Added Networks (VANs)
7. Metropolitan Area Networks (MANs)
8. Total Area Networks (TANs)
9. Storage Area Networks (SANs)
10. Distributed Systems Architecture
11. Open System Interconnection (ISO Model)
12. System Network Architecture (IBM Model)
13. T-1/T-4 Networking Technology
14. Integrated Services Digital Network (ISDN)
15. SONET Technology
16. Frame Relay versus Packet Switch Networks
17. Network Security and Control Mechanisms
18. Asynchronous Transfer Mode (ATM) Technology
19. Switched Multimegabit Data Services (SMDS)
20. DSL Services
21. GEO, MEO, and LEO Satellite Broadcasting
22. Network Interconnection using FDDI
23. Data Encryption Standards (DES)
24. World Wide Web (WWW) Security
25. Thin Client - Fat Server Computing
26. Proactive Network Security
27. Internet Security - Distributed Denial of Service (DDOS)
28. E-Commerce Security
29. Migration from IPV4 to IPV6
30. E-Mail Protocols
31. Electronic Data Interchange (EDI) Networks
32. Virtual Private Networks
33. Multicasting Networks
34. Error Detection and Correction in Data Communications
35. Clustering Technologies
36. Java-based networks
37. Gigabit Ethernet
38. Enterprise Extranets
39. Wireless LANs
40. Personal Communication Networks (PCNs)
41. Virtual LANs
42. Public Data Networks (PDNs)
43. TCP/IP Security
44. Firewall Technology
45. Voice Over IP
46. Case Study: Windows NT/2000 Networking
47. Case Study: Deployment of Enterprise Anti-Virus Security
50. Case Study: Deployment of Network Management Software
51. Grid Computing
52. Cluster Computing
53. Intrusion Detection Systems (IDS)
54. Intrusion Prevention Systems (IP)
55. Servlets
56. Streaming Media Protocols
57. Digital Certificates
58. Spanning Tree Protocol
59. IP Multicast Routing
60. P-2-P Protocols

Format For Term Paper

1. Title Page (use any standard format: APA /MLA) – must have title on the top.
2. Table of Contents
3. List of Figures (Optional)
4. List of Tables (Optional)
5. Abstract (one page maximum)
6. Introduction
7. Main Body of Essay (will have several sections)
8. Conclusion
9. Bibliography (URL is not sufficient)

Note: Each item mentioned above must start on a new page and in item “7” each
section must start on a new page.

Documenting Electronic Sources in Term Paper

Below is a sample bibliography styled for documenting Electronic Sources on the


Internet. Sources are listed in alphabetical order by author.

1. E-Mail

FORMAT
Author.<author’s e-mail address>. "Subject Line." Date of post. Personal e-
mail. (Date read).

EXAMPLE
Andrec, Mike. andrec@glyco.chem.yale.edu "New England School of
Bandura." 18 Apr.1996. Personal e-mail. (19 Apr. 1996).

2. Web Site

FORMAT
Author [if known]. "Title" (main title if applicable). Last date updated or
revised [if known]. <URL> (date accessed).

EXAMPLE
Ignatius. "To the Trallians." Early Church Documents (circa 96-50 A.D.). 1994.
http://listsery. american.edu/catholic/church/fathers/ignatius/ign-trl.txt (20
Jun. 1996).

3. FTP

FORMAT
Author [if known]. "Title of Document" (Date of publication) [if available].
FTP address (date accessed).

EXAMPLE
Letter, Mark. "Internet Domain Survey" (18 Feb. 1996). FTP to ftp.nw.com
/zone/report.doc (16 Jun. 1996).

4. Gopher

FORMAT
Author [if known]. "Title of Document" (Date of publication) [if available].
FTP address (date accessed).

EXAMPLE
Westlund, Mark. "Boycott of Mitsubishi in Japan Launched by Peaceful Protest
in Osaka." Published in "RAN News" (the Rainforest Action network
newsletter) March 21, 1996. Gopher igc.apc.org /Organizations/Rainforest
Action Network/Ran News/Mitsubishi Boycott (21 Jun. 1996).

5. Usenet News

FORMAT
Author. <author’s e-mail address> "Subject Line." Date of publication.
<newsgroup> (date accessed).

EXAMPLE
Straczynski, J. M. Jmsatb5 @ aol.com "Re: ATTN JMS: Is B5 Dead?" 19 Jun
1996. rec. arts.sf.tv.babylon5.moderated (23 Jun. 1996).

6. Mailing List

FORMAT
Author [if known]. <author’s e-mail address> "Subject Line." Date of post.
<mailing list address> (date accessed).

EXAMPLE
Tracz, Orysia. Tracz@cc.umanite ba.ca "Shevchenko in Love." 1 May 1996.
ukes-social@soma. crl.mcmaster.ca (23 Jun. 1996).

Homework (16%): Due: Week-9

Homework questions would be assigned from the textbook as well as from


the Internet. All homework assignments are due in week-9. All turned-in
assignments will be neatly typed (word-processed) and printed with letter-
quality type. Students failing to present the information completely, neatly
and in the prescribed format will receive minimal credit for their work.
Students should double check for spelling and grammar before submitting
assignments.

Additional Student Reading

Some handouts may be provided to the students throughout the semester.


Students are responsible to study them as additional learning units.
Policy Statements: University policies are provided in the current course catalog and course
University Policies schedules. They are also available on the university website. This class is
governed by the university’s published policies. The following policies are
of particular interest:

Academic Honesty
The university is committed to high standards of academic honesty.
Students will be held responsible for violations of these standards. Please
refer to the university’s academic honesty policies for a definition of
academic dishonesty and potential disciplinary actions associated with it.

Drops and Withdrawals


Please be aware that, should you choose to drop or withdraw from this
course, the date on which you notify the university of your decision will
determine the amount of tuition refund you receive. Please refer to the
university policies on drops and withdrawals (published elsewhere) to find
out what the deadlines are for dropping a course with a full refund and for
withdrawing from a course with a partial refund.

Special Services
If you have registered as a student with a documented disability and are
entitled to classroom or testing accommodations, please inform the
instructor at the beginning of the course of the accommodations you will
require in this class so that these can be provided.

Disturbances
Since every student is entitled to full participation in class without
interruption, disruption of class by inconsiderate behavior is not acceptable.
Students are expected to treat the instructor and other students with dignity
and respect, especially in cases where a diversity of opinion arises.
Students who engage in disruptive behavior are subject to disciplinary
action, including removal from the course.

Course Policies Incoming Competency Expected By Instructor

Students should should


B. The student have successfully completed
notify the instructor priorthe requisite
to class if an 5000-level
absence is
anticipated and he/she should not miss more than four contact hours.
Makeup work will be assigned and if the absence is unexpected, it may
exceed the material presented.

C. For absences of eight hours, the instructor has the option to lower the
student's grade one latter grade and to inform the student of the action.

D. If the student is absent twelve hours or more, the instructor has the
option to assign a grade of “F” (work that is unsatisfactory) and to
inform the student of the action. It is the student's responsibility to
withdraw from the course.

E. For excused absences (in an extreme case) when the instructor chooses
to award a grade of I (Incomplete) for twelve to sixteen hours missed,
the student must provide acceptable documentation to verify that the
absences were unavoidable (e.g., illness, military duty TDY). These
actions will be coordinated with the site director who will ensure that
the documentation is placed in the student’s file.

F. In all cases, without excused absences, the student should withdraw


from the course if he or she has more than sixteen hours of absences.

Ethics

Webster University strives to be a center of academic excellence. As part of


our Statement of Ethics, the University strives to preserve academic honor
and integrity by repudiating all forms of academic and intellectual
dishonesty, including cheating, plagiarism, and all other forms of academic
dishonesty. Academic dishonesty is unacceptable and is subject to
disciplinary action. The University reserves the right to utilize electronic
databases, such as Turnitin.com, to assist faculty and students with their
academic work.

Schedule for 1. Introduction to Data Communications - Introduction – A Brief


Reading History of Communications in North America, A Brief History of
Assignments Information Systems, A Brief History of the Internet. Data
communications networks – Components of a Network, Types of
Networks. Network Models- Open Systems Interconnection
Reference Model, Internet Model, Message Transmission Using
Layers. Network Standards- The Importance Of Standards, The
Standards-Making Process, Common Standards. Future Trends-
Pervasive Networking, The Integration of Voice, Video and Data,
New Information Services.

2. Application Layer – Introduction. Application Architectures- Host-


Based Architectures, Client- Based Architectures, Client-Server
Architectures, Choosing Architectures. World Wide Web- How the
Web Works, Inside the HTTP Request, Inside an HTTP response.
Electronic Mail- How E-Mail Works, Inside an SMTP Packet,
Listerve Discussion Groups, Attachments in Multipurpose Internet
Mail Extension. Other Applications- File Transfer Protocol, Telnet,
Instant Messaging, Videoconferencing.

3. Physical Layer – Introduction. Circuits- Circuit Configuration,


Data Flow, Communication Media, Media Selection. Digital
Transmission of Digital Data- Coding, Transmission Modes, Digital
Transmission, How Ethernet Transmits Data, Analog Transmission
of Digital Data- Modulation, Capacity of a Voice Circuit, How
Modems Transmit Data. Digital Transmission of Analog Data-
Translating from Analog to Digital, How Telephones Transmit
Voice Data, How Instant Messenger Transmits Voice Data. Analog
Digital Modems Multiplexing- Frequency Division Multiplexing,
Time Division Multiplexing, Statistical Time Division
Multiplexing, Wavelength Division Multiplexing, Inverse
Multiplexing, How DSL Transmits Data.

4. Data Link Layer – Introduction. Media Access Control- Controlled


Access, Contention, Relative Performance. Error Control- Sources
of Error, Error Prevention, Error Detection, Error Correction via
Retransmission. Forward Error Correction- Data Link Protocols,
Asynchronous Transmission, Asynchronous File Transfer Protocols,
Synchronous Transmission. Transmission Efficiency.

5. Network and Transport Layers – Introduction. Transport and


Network Layer Protocols- Transmission Control Protocol/ Internet
Protocol, Internetwork Packet Exchange/Sequenced Packet
Exchange, X.25, Systems Network Architecture, Transport Layer
Functions- Linking to the Application Layer, Packetizing.
Addressing- Assigning Addresses, Address Resolution. Routing -
Types of Routing, Routing Protocols, Multicasting, TCP/IP
Example - Known Addresses (same subnet), Known Addresses
(different subnet), Unknown Addresses, TCP Connections, TCP/IP
and Network Layers.

6. Local Area Networks - Introduction- Why Use a LAN? Dedicated-


Server verses Peer-to-Peer LANs, LAN Components- Network
Interface Cards, Network Cables, Network Hubs, Network
Operating Systems, Traditional Ethernet (IEEE 802.3)- Topology,
Media Access Control, Types of Ethernet, Switched Ethernet-
Topology, Media Access Control, Performance Benefits. The best
practice LAN design – effective data rates, costs, recommendations.
Improving LAN performance – improving server performance,
improving circuit capacity, reducing network demand.

7. Wireless Local Area Networks – Introduction, IEEE 802.11b –


Topology, Media Access Control, Physical data transmission. IEEE
802.11a - Topology, Media Access Control, data transmission in the
physical layer. IEEE 802.11g - Topology, Media Access Control,
Physical transmission. Bluetooth - Topology, Media Access Control,
data transmission in the physical layer. The best practice
WLAN design – effective data rates, costs, recommendations,
physical WLAN design, WLAN security. Improving WLAN
Performance- Improving Device Performance, Improving Circuit
Capacity, Reducing Network Demand.

8. Backbone Networks – Introduction. Backbone Networks


Components- Bridges, Routers, Gateway, A Caveat Backbone
Architectures- Backbone Architecture Layers, Routed Backbone,
Bridged Backbone, Collapsed Backbone, Virtual LAN Backbone
Technologies- Fiber-Distributed Data Interface, Asynchronous
Transfer Mode. The best practice backbone design – architecture,
effective data rate, conversion between protocols,
recommendations. Improving Backbone Performance- Improving
Computer and Device Performance, Improving Circuit Capacity,
Reducing Network Demand.

9. Metropolitan and Wide Area Networks – Introduction, Circuit-


Switched Networks- Basic Architecture, Plain Old Telephone
Service, ISDN, Dedicated Circuit Networks – Basic Architecture, T
Carrier Services, Synchronous Optical Network, Packet Switched
Networks- Basic Architecture, X.25, Asynchronous Transfer Mode,
Frame Relay, Switched Multimegabit Data Service, Ethernet/IP
packet Networks, Virtual Private Networks- Basic Architecture,
VPN Types. The Best Practice MAN/WAN. Improving MAN/WAN
Performance- Improving Device Performance, Improving Circuit
Capacity, Reducing Network Demand,

10. The Internet – Introduction. How the Internet Works- Basic


Architecture, Connecting to an ISP, The Internet Today. Internet
Access technologies – DSL, Cable Modems, Fixed Wireless,
Mobile Wireless, Future Technologies Internet Governance- Internet
2.

11. Network Security - Introduction- Why Networks Need Security,


Types of Security Threats, Network Controls. Risk Assessment-
Develop a Control Spreadsheet, Identify and Document the
Controls, Evaluate the Network’s Security. Controlling Disruption.
Business continuity planning - Preventing Disruption, Destruction,
and Disaster, detecting Disruption, Destruction, and Disaster,
Correcting Disruption, Destruction, and Disaster. Controlling
Unauthorized Access- Preventing Unauthorized Access, Detecting
Unauthorized Access, Correcting Unauthorized Access. Best
practice recommendation.

12. Network Design – Introduction. The Traditional Network Design


Process, The Building Block Network Design Process. Needs
Analysis- Geographic Scope, Application Systems, Network Users,
Categorizing Network Needs, Deliverables. Technology Design-
Designing Clients and Servers, Designing Circuits and Devices,
Network Design Tools, Deliverables. Cost Assessment- Request for
Proposal, Selling the Proposal to Management, deliverables.
Designing for network performance – managed networks, network
circuits, network devices, minimizing network traffic.

13. Network Management – brief coverage.


Additional Disclaimer
Information
This syllabus is intended to provide a basic structure to this course.
Adherence to this syllabus is subject to change at the discretion of the
instructor.

Copyright © 2007 -2008, School of Business & Technology, Webster University. All rights reserved.

[Revised: Fall 2007 / File: Syllabus-5100-Fall-2007-MB-DS]

S-ar putea să vă placă și