THE UNIVERSITY OF HONG KONG

Size: px
Start display at page:

Download "THE UNIVERSITY OF HONG KONG"

Transcription

1 THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Business Course Outline for Semester II of BUSI0073 Data Communications and Networking Management And "IIMT3604 Telecommunications Management" I. INFORMATION ON INSTRUCTORS AND TUTORS Instructor: Dr. Eric Chin or Office Location: KKL RM 1317 Office Telephone: Consultation Times: By appointment Tutors for Laboratory Sessions: Ms. Debbie Chu Office Hours: By appointment Teaching Timeslot & Venue Friday 09:30 12:20 KKLG 109 II. COURSE INFORMATION Pre-requisites BUSI1003 "Introduction to MIS" / IIMT2601 "Management Information Systems" Co-requisites None Mutually Exclusive Students taking or having taken "CSIS0278 / COMP3234 Computer and Communication Networks" are not allowed to take this course. Course Description The proliferation of the Internet and the remarkable growth and development of the telecommunications environment have provided organizations around the world with unprecedented business development opportunities in promoting, selling and distributing their physical or digital goods or services in the Electronic Commerce world. This course is an introduction to the fundamentals of data communications and computer networks that provide the basic infrastructure for the digital world

2 The course is designed to provide a conceptual foundation for the study of data communications using various standards and architectures. The course includes in-depth coverage of networking principles for management of local and wide-area networks with an emphasis on wireless networks. Both technical and managerial aspects of data communications are covered in this course. Course Objectives To learn the theories of data and voice communication. To learn to design business communication networks. To work in teams effectively. To develop a global outlook towards the practice of telecommunication. To analyze and evaluate business cases and latest research related to the use of telecommunications in modern businesses. Course Learning Outcomes (CLO) Upon the successful completion of this course, students should be able to: 1. Understand the network infrastructure and the Internet protocols. 2. Identify the key issues that need to be considered and measures that need to be adopted for providing secure communication services for businesses. 3. Be able to review, and synthesize existing literature related to cutting edge technological developments in the field of telecommunication from a technical and business perspective. 4. Be able to decide the tradeoffs of parameters for effective design of local and wide area networks. 5. Be able to design terrestrial and wireless telephone networks in order to meet prespecified requirements in performance. 6. Be able to work in teams effectively. 7. Demonstrate a solid understanding of global issues as they relate to practices in business telecommunications. 8. Be able to write effective case and research reports, and make compelling presentations. Alignment of Program and Course Outcomes Program Learning Outcomes Course Learning Outcomes 1. Acquisition and internalization of knowledge of 1, 2, 3 business and information systems 2. Application and integration of knowledge of business 4, 5, 6 and information systems 3. Inculcating professionalism and instilling leadership 7 skills 4. Developing global outlook 8 5. Mastering communication skills

3 III. TEACHING AND LEARNING ACTIVITIES (TLA) COURSE TEACHING AND LEARNING ACTIVITIES Course Teaching and Learning Activities Expected contact hour Study Load (% of study) TLA1: Interactive Lectures and Discussions Interactive lectures will be provided by the lecturer to illustrate and reinforce basic concepts and knowledge of data communications and networks. Students are expected to have done pre-class reading and preparation and encouraged to share their views and experience actively in class discussions to deepen their learning. TLA2: In-Class Case Studies Case studies of network management, wireless networks configuration and network security will be discussed in class. Students are encouraged to participate in discussions and identify the key issues, sharing their opinions and solutions with their peers. These discussions will help students apply their concepts and knowledge to solve business problems. TLA3: Project Students will investigate how the latest network applications such as VoIP, Cloud Computing, and SOA etc applied in supporting business development. TLA4: Demonstration Live demonstrations of video, software and technologies will be done in class to show students how the technologies are applied in real world. TLA5: Guest Seminar A guest seminar will be conducted for selected topics. Students are required to attend the seminar, participate in discussions, and share their ideas with the guest based on the topics discussed. The guest seminar offer students opportunities to meet a professional practitioner and understand how he/she manages/applies networks system in his/her organization. TLA6: Laboratory Session Assignments Students are expected to follow the instructions to complete all the required software exercises. Case studies will be provided to assess if students can apply the skills and technique related software and technologies to solve problems. TLA7: Examination Final examinations test students knowledge of the topics covered in class and their ability to apply that knowledge. 36 hours 30% 6 hours 5% 6 hours 5% 6 hours 5% 2 hours 1.6% 6 hours 5% 3 hours 2.5% TLA8: Self Study 55 hours 45.9% 120 hours 100% Total (within hours)

4 IV. ASSESSMENT Assessment Methods Standards For Assessment Each student will be assessed by a combination of the group work (45%) and individual work (55%) Assessment Criteria and Marking Rubrics Business cases are used in this course to present a global view of the subject and to challenge student to use their subject relevant knowledge and judgment for effective business decision making in the context of telecommunications as a team. They will be expected to work in a group, analyse a case, and make a formal report of the case. Students are also required to submit a soft copy as well as a hard copy of the case report. Weight Aligned Course Learning Outcomes AT1: Case Analysis Grade for the presentation will depend on the ability of the team to deliver a professional and persuasive presentation that identifies the key issues related to the case. Grade for the case report will depend on the following: i. identification of major issues and problems in the case, ii. application of appropriate concepts to analyse the situation under study, and iii. a well thought-out and credible recommended course of action. An important aspect of the course is to complete a project that allows student to work as a team and enables them to carry out in-depth research on a chosen topic. They will be asked to work in small groups. There will be a project presentation and a report due at the end of the semester. All members of the group need to participate equally in all group activities. Any problems with group dynamics need to be resolved as soon as possible. 15% CLO1, CLO2 AT2: Project and Presentation In the project students are expected to review latest research on a stateof-the-art technology that is related to the theme of this class and present recommendations on the usability, impact, and relationship of this technological development to the telecommunications practices of modern businesses. 25% CLO1, CLO3, CLO7, CLO9 AT3: Assignments (Individual) Grade for the project will depend on the following: i. innovativeness of the project, ii. completeness of coverage of the topic in the project, iii. relevance of your project to the business world, and iv. ability to work as a team. Assignments are an integral part of this course because they test students knowledge of relevant theories and the ability to apply that knowledge for solving practical telecommunication network design problems. Assignments will include mini case research and analysis. All assignments are to be individual submissions. 20% CLO2, CLO4, CLO8 AT4: Class Participation (Individual) Grade for the assignments will depend on the correctness of the answers to problems, clarity of presentation, and completeness of your solutions. Student participation will be measured to evaluate their enthusiasm and activeness in class works, and discussion both in classroom. 10% CLO4, CLO6, CLO

5 AT5: End-of-Term Examination (Individual) The exam will be closed book and closed notes and it will be organized inclass. The exam will be comprehensive in nature and it will involve multiple choice questions, short answer type questions, problem solving questions, situational decision making questions or any combination of the above. Grade for the exam will depend on the ability of the student to express his/her understanding of the theories of data and voice communication, apply the learned theories for solving problems related to design of telecommunication networks, and clarity and correctness of his/her writing. 30% Total 100% CLO1, CLO2, CLO4, CLO5, CLO8 V. Course Final Grade A student s final grade for the course will be assigned according to the cumulative score that s/he has obtained from all of the assessment tasks: o Course Final Grade = Cumulative score of all assessment tasks obtained (100%) o Course Final Grade = Case Analysis and Presentation (20%) + Project and Presentation (25%) + Assignments (Individual) (15 %) + Class Participation (Individual) (10%) + End-of-Term Examination (30%) The conversion of the accumulative score to the course final grade is summarized below: Course Final Grade Cumulative Score of all Assessment Tasks Obtained A+, A, A- 100% - 80% B+, B, B % C+, C, C- 69% - 60% D+, D 59% - 50% F <50% Course Grade Descriptors: A+, A, A- B+, B, B- C+, C, C- D+, D F Strong evidence of superb ability to fulfill the intended learning outcomes of the course at all levels of learning: describe, apply, evaluate and synthesis. Strong evidence of ability to fulfill the intended learning outcomes of the course at all levels of learning: describe, apply, evaluate and synthesis. Evidence of adequate ability to fulfill the intended learning outcomes of the course at low levels of learning; such as describe and apply, but not at high levels of learning such as evaluate and synthesis. Evidence of basic familiarity with the subject. Little evidence of basic familiarity with the subject

6 VI. COURSE CONTENT Week Topics 1 Introduction Information and communication Data communications and networking for today s enterprise Trends Business drivers Convergence Unified communications Business information requirements Transmission and transmission media Communication techniques Distributed data processing Internet and distributed applications The Internet TCP/IP Client/Server architectures, intranets, extranets, and SOA Networks Network security Network management Standards Business Information Audio Networking implications Data Networking implications Image Image representation Image and document formats Networking implications Video Digital video Networking implications Performance measures Response time Quality of experience Throughput 2 Distributed Data Processing Centralized and distributed organization Technical trends leading to distributed data processing Management and organizational considerations Data center evolution

7 Client/server architecture Intranets and extranets Web services and cloud computing Distributed applications Other forms of DDP Database management systems Centralized versus distributed databases Replicated and partitioned databases Networking implications of DDP Big data infrastructure considerations Data Transmission Signals for conveying information Electromagnetic signals Analog signals Digital signals Transmission impairments and channel capacity Guided media Unguided media Channel capacity 3 Data Communication Fundamentals Analog and digital data communications Data encoding techniques Analog encoding of digital information Digital encoding of analog information Digital encoding of digital data Analog encoding of analog information Asynchronous transmission Synchronous transmission Error detection The need for error control Parity checks Cyclic redundancy check Data Link Control and Multiplexing Flow control Error control Motivation for multiplexing FDM WDM ADSL Synchronous TDM The TDM mechanism Digital carrier systems

8 T-1 facilities SONET/SDH Cellular and cordless phone systems 4 The Internet The structure of the Internet Business and the Internet The use of packet switching Key elements The World Wide Web Internet architecture Internet domains Internet names and addresses Domain name system Dynamic host configuration protocol TCP/IP A simple protocol architecture The need for a protocol architecture Three-layer model Standardized protocol architectures Virtual private networks and IP security IPsec Applications of IPsec Benefits of IPsec IPsec functions Internetworking Routers The TCP/IP architecture TCP/IP layers Operation of TCP/IP TCP and UDP IP and IPv6 TCP/IP applications Protocol interfaces 6 Client/Server, Intranet, and Cloud Computing The growth of client/server computing Client/server applications Database applications Classes of client/server applications Three-tier client/server architecture Cloud computing Cloud computing elements Cloud computing reference architecture Middleware

9 Middleware architecture Message passing Remote procedure calls Object-oriented mechanisms Intranets Web content Web/Database applications Intranet Webs versus traditional client/server Service-oriented architecture Extranets 7 Internet-Based Applications Electronic mail Internet mail architecture SMTP MIME POP and IMAP Web access and HTTP Web security Web traffic security approaches SSL HTTPS Multimedia applications Media types Multimedia applications Multimedia technologies Acceptable use policies Motivation Policy issues Guidelines for developing a policy Internet Operation Internet addressing IPv4 addressing IPv6 addressing Internet routing protocols Autonomous systems Border gateway protocol OSPF protocol Multicasting Multicast transmission Multicast routing protocols Quality of service Emergence of high-speed LANs Corporate WAN needs

10 Internet traffic Differentiated services DS field DS configuration and operation SLAs IP performance metrics 9 LAN Architecture and Infrastructure Personal computer LANs Backend networks and storage area networks High-speed office networks Backbone LANs Factory LANs LAN configuration Tiered LANs Guided transmission media Twisted pair Coaxial cable Optical fiber Structured cabling LAN protocol architecture IEEE 802 reference model Logical link control Media access control Ethernet, Switches, and Virtual LANs Traditional Ethernet Bus topology LAN Medium access control MAC frame IEEE medium options at 10 Mbps Bridges Hubs Layer 2 switches Layer 3 switches High-speed Ethernet Fast Ethernet Gigabit Ethernet 10-Gbps Ethernet 100-Gbps Ethernet Virtual LANs The use of virtual LANs Communicating VLAN membership IEEE 802.1Q VLAN standard PoE

11 Wireless LANs Wireless LAN applications Wireless LAN requirements Wireless LAN technology Wi-Fi architecture and services IEEE architecture IEEE services Gigabit WLANs Gigabit Wi-Fi Li-Fi IEEE medium access control IEEE physical layer IEEE security considerations Access and privacy services Wireless LAN security standards 10 WAN Technology and Protocols Switching techniques Circuit-switching networks Basic operation Control signaling Packet-switching networks Basic operation Switching technique Traditional Wide Area Network alternatives WANs for voice WANs for data Voice over IP VoIP signaling VoIP processing VoIP context Presence Presence service structure Presence information WAN Services WAN alternatives WAN offerings Evolution of WAN architectures Frame relay Background Protocol architecture User data transfer Call control

12 Congestion control ATM Virtual channels Virtual paths ATM cells ATM service categories MPLS Operation VPN Wide Area Ethernet Wireless WANs Cellular wireless network Cellular network organization Operations of cellular systems Multiple access CDMA Which access method to use Satellite communications Satellite orbits Satellite network configurations Applications Third generation wireless communication WAP WML WTAs Microbrowser Fourth generation wireless communication 4G network requirements OFDMA 4G network evolution 13 Computer and Network Security Threats Computer security concepts Threats and attacks Threats and assets Intruder behavior patterns Intrusion techniques Viruses Worms Bots Spam Computer security trends Malicious software Back door

13 Logic bomb Trojan horse Mobile code Multiple-threat malware Credential theft, keyloggers, and spyware Phishing and identity theft Reconnaissance and espionage 14 Computer and Network Security Techniques VPNs and IPsec IPsec functions Transport and tunnel modes Key management IPsec and VPNs SSL and TLS SSL architecture SSL record protocol Handshake protocol Wi-Fi protected access Access control Intrusion detection Basic principles Host-based intrusion detection techniques Firewalls Characteristics Types Malware defense Antivirus approaches Worm countermeasures Bot countermeasures VII. TENTATIVE TEACHING PLAN Week Date Topic Reading 1 23/01/2015 Introduction; Ch. 1 & 2 Business Information 2 30/01/2015 Distributed Data Processing; Ch. 3 & 4 Data Transmission 3 6/02/2015 Data Communication Fundamentals; Ch. 5 & 6 Data Link Control and Multiplexing 4 13/02/2015 The Internet; Ch. 7 & 8 TCP/IP 5 20/02/2015 *** Chinese New Year Holiday*** 6 27/02/2015 Client, Server, Intranet, and Cloud Computing Ch

14 7 6/03/2015 Internet-Based Applications; Ch. 10 & 11 Internet Operation 8 13/03/2015 ******Reading / Field Trip Week*** 9 20/03/2015 LAN Architecture and Infrastructure; Ch. 12, 13, 14 Ethernet, Switches, Virtual LANs; Wireless LANs 10 27/03/2015 WAN Technology and Protocols; Ch. 15, 16, 17 WAN Services; Wireless WANs 11 3/04/2015 **Easter Holiday** 12 10/04/2015 Project and Presentation 13 17/04/2015 Computer and Network Security Threats Ch /04/2015 Computer and Network Security Techniques Ch. 19 VIII. Assignment Submission Plan Presentation Written Report AT1: Case Analysis (15%) 27 Feb March, 2015 AT2: Project and Presentation (25%) 10 April, April, 2015 AT3: Assignments (Individual) (20 %) Not Applicable May 2, 2015 IX. Required Text Business Data Communications: Seventh Edition William Stallings and Thomas L.Case (ISBN: ) The class notes and other supporting materials can be downloaded from: Moodle X. MEANS/PROCESSES FOR STUDENT FEEDBACK ON COURSE o Conducting mid-term survey in additional to SETL around the end of the semester Online response via Moodle site o Others: Team meeting in mid-term (please specify) XI. COURSE POLICIES University of Hong Kong is a high-education institution with integrity. Hence, the university

15 takes the issue of academic integrity very seriously. The University Regulations on academic dishonesty will be strictly enforced! Please check the University Statement on plagiarism on the web: Academic dishonesty is behavior in which a deliberately fraudulent misrepresentation is employed in an attempt to gain undeserved intellectual credit, either for oneself or another. It includes, but is not necessarily limited to, the following types of cases: Plagiarism - The representation of someone else's ideas as if they are one s own. Where the arguments, data, designs, etc., of someone else are being used in a paper, report, oral presentation, or similar academic project, this fact must be made explicitly clear by citing the appropriate references. The references must fully indicate the extent to which any parts of the project are not one's own work. Paraphrasing of someone else's ideas is still using someone else's ideas, and must be acknowledged. Unauthorized Collaboration on Out-of-Class Projects - The representation of work as solely one's own when in fact it is the result of a joint effort. Cheating on In-Class Exams - The covert gathering of information from other students, the use of unauthorized notes, unauthorized aids, etc. Unauthorized Advance Access to an Exam - The representation of materials prepared at leisure, as a result of unauthorized advance access (however obtained), as if it were prepared under the rigors of the exam setting. This misrepresentation is dishonest in itself even if there are not compounding factors, such as unauthorized uses of books or notes. As this course involves some technical approach in network and telecommunication, attendance is very important to those who did not have strong technical background students. XII. Additional Course Information Penalty for late assignments - 20 marks of the final mark will be deducted

THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS

THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Business BUS10066 Marketing On the Commercial Internet MKTG3524 Internet Marketing 2014-2015, Semester 2 I. Information on Instructor

More information

THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS

THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Business BUS10066 Marketing On the Commercial Internet 2011-2012 Second Semester I. Information on Instructor and Class Instructor:

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS

THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Business BUS10066 Marketing On the Commercial Internet MKTG3524 Internet Marketing 2015-2016, Semester 2 COURSE SYLLABUS I. Information

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2662 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Voice Over IP CTS 2655 and CNT 2102 with grade

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 2600 COURSE TITLE: Network Fundamentals PREREQUISITE(S): CTS 1131 and CTS 1133 COREQUISITE(S): STUDENT

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

FINA1003 Corporate Finance (Subclasses J&K)

FINA1003 Corporate Finance (Subclasses J&K) THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Economics and Finance FINA1003 Corporate Finance (Subclasses J&K) Spring 2010 I. INFORMATION ON INSTRUCTOR AND TEACHING ASSISTANT

More information

New York City College of Technology Computer Systems Technology Department

New York City College of Technology Computer Systems Technology Department New York City College of Technology Computer Systems Technology Department CST 3507/CS507: Advanced Single-LAN Concepts (3 credits, 2 class hours, 2 lab hours) Instructor: Office Phone: Office Hours: Virtual

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS Course Template for the Learning Outcomes System

THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS Course Template for the Learning Outcomes System GENERAL INFORMATION Instructor: David Bishop Office: KKL 1313 Phone: 3917 4215 Email: dbishop@hku.hk Consultation times: by appointment Tutor: TBC Pre-requisites: None Co-requisites: n/a Mutually exclusive:

More information

BCIS 4680 -- BUSINESS DATA COMMUNICATIONS and NETWORKING Mr. Cengiz Capan -- Spring 2016

BCIS 4680 -- BUSINESS DATA COMMUNICATIONS and NETWORKING Mr. Cengiz Capan -- Spring 2016 Office : BLB 290E, Business Leadership Building Office Hours: Tu &Th 9:00 am - 11:00 am, or by appointment/drop-in Telephone: 940-565-4660 Web Page: http://www.coba.unt.edu/bcis/faculty/capan/capan.htm

More information

Network Technology CMP-354-TE. TECEP Test Description

Network Technology CMP-354-TE. TECEP Test Description Network Technology CMP-354-TE This TECEP tests knowledge of the fundamental concepts of data communications. Topics covered include: network architectures, topologies, media and devices, protocols, types

More information

San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015

San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015 San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015 Course and Contact Information Instructor: Dr. Rod Fatoohi Office

More information

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

270125 - TXC - Computer Network Technology

270125 - TXC - Computer Network Technology Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 701 - AC - Department of Computer Architecture Academic year: Degree: 2015 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses

More information

THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Economics and Finance. FINA0102 Financial Markets and Institutions

THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Economics and Finance. FINA0102 Financial Markets and Institutions THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Economics and Finance BE103/512 FINA0102 Financial Markets and Institutions GENERAL INFORMATION FINA0102A and FINA0102B Instructor:

More information

How To Understand And Understand Network Theory

How To Understand And Understand Network Theory University of Southern California Course Title: EE450: Computer Networks Semester: Fall Semester 2014 Instructor: Professor A. Zahid, azahid@usc.edu Office: PHE 418, 213-740-9058 Office Hours: TTH 9:00

More information

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.

More information

Network and Telecommunications Courses

Network and Telecommunications Courses Network and Telecommunications Courses Detailed syllabi available at http://www.cdm.depaul.edu/ IT 263 - Applied Networks and Security This course introduces the networking and security technologies required

More information

Networking Technology Online Course Outline

Networking Technology Online Course Outline Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.

More information

Layered protocol (service) architecture

Layered protocol (service) architecture Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure

More information

MGMT 3404 Cross-Cultural Management 2014-2015 Second Semester

MGMT 3404 Cross-Cultural Management 2014-2015 Second Semester MGMT 3404 Cross-Cultural Management 2014-2015 Second Semester I. Information on Instructor and TA: Position Name Email Phone Office Instructor Dr. Yiwen ZHANG yzhang@business.hku.hk 3917-1615 KKL 716 Teaching

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

COMSATS Institute of Information Technology, Abbottabad Department of Computer Science

COMSATS Institute of Information Technology, Abbottabad Department of Computer Science COMSATS Institute of Information Technology, Abbottabad Department of Computer Science Course: CSC 432 Telecom Network Design (3,0) (Spring 2015) Office: Instructor: Office hours: Email: Z-Block (Z-359)

More information

Mathatma Gandhi University

Mathatma Gandhi University Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer

More information

Computer Network Engineering

Computer Network Engineering 226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

More information

Teracom Training Institute Certified IP Telecom Network Specialist (CIPTS) Course & Certification Package

Teracom Training Institute Certified IP Telecom Network Specialist (CIPTS) Course & Certification Package Teracom Training Institute Certified IP Telecom Network Specialist (CIPTS) Course & Certification Package Certified IP Telecom Network Specialist (CIPTS) Package Overview...2 Detailed Course Descriptions...5

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

IT 101 Introduction to Information Technology

IT 101 Introduction to Information Technology Applied Information Technology Department Course Syllabus IT 101 Introduction to Information Technology Catalog Description Introduces students to the fundamental concepts in information technology (IT)

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

Course Title: ITAP 2431: Network Management. Semester Credit Hours: 4 (3,1)

Course Title: ITAP 2431: Network Management. Semester Credit Hours: 4 (3,1) Course Title: ITAP 2431: Network Management Semester Credit Hours: 4 (3,1) I. Course Overview This course introduces students to business data communications and networking concepts, tools and methods.

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,

More information

Chapter 1 Instructor Version

Chapter 1 Instructor Version Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

CompTIA Convergence+ 2006 Examination Objectives

CompTIA Convergence+ 2006 Examination Objectives CompTIA Convergence+ 2006 Examination Objectives Introduction The CompTIA Convergence+ examination covering the 2006 objectives certifies that the successful candidate has the necessary knowledge to perform

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

CS 5480 Computer Networks

CS 5480 Computer Networks CS 5480 Computer Networks Professor Sneha Kumar Kasera School of Computing 1 My Background PhD - Computer Science dept, UMass Amherst (1999) Bell Labs research (1999 2003) research interests computer networks

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

COURSE NUMBER: CTS 2371

COURSE NUMBER: CTS 2371 Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2371 COURSE TITLE: Virtual Infrastructure: Deployment, Security, and Analysis PREREQUISITE(S): CTS

More information

Associate in Science Degree in Computer Network Systems Engineering

Associate in Science Degree in Computer Network Systems Engineering Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45

More information

Post-Class Quiz: Telecommunication & Network Security Domain

Post-Class Quiz: Telecommunication & Network Security Domain 1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which

More information

Management Information Systems

Management Information Systems Management Information Systems Basics of the Internet Dr. Shankar Sundaresan (Adapted from Introduction to IS, Rainer and Turban) Internet Basics Outline Internet History Internet Structure Switching Methods

More information

Virtual Privacy vs. Real Security

Virtual Privacy vs. Real Security Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing

More information

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts

More information

THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS. School of Business MGMT2401 J, K: Principles of Management 2015-2016 Second Semester

THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS. School of Business MGMT2401 J, K: Principles of Management 2015-2016 Second Semester THE UNIVERSITY O HONG KONG ACULTY O BUSINESS AND ECONOMICS School of Business MGMT2401 J, K: Principles of Management 2015-2016 Second Semester I. Instructor Information Instructor: Dr. Yamei Wang Email:

More information

Computer Network Engineering

Computer Network Engineering 208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Telecommunications, the Internet, and Wireless Technology

Telecommunications, the Internet, and Wireless Technology Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Third Edition Priscilla Oppenheimer Cisco Press 800 East 96th Street Indianapolis, IN 46240 vi Тор-Down Network Design Contents at a Glance Introduction xxii Part I Identifying

More information

WAN and VPN Solutions:

WAN and VPN Solutions: WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization

More information

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system Dear Student Here is the list of chapter sections that we will be covering for this semester. For each chapter listed in pages below: Any Bold text is required (with all the details in that sections) Any

More information

How To Pass A Credit Course At Florida State College At Jacksonville

How To Pass A Credit Course At Florida State College At Jacksonville Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0 (CTNP) Syllabus Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of part, or of the whole, without

More information

CDA 4504 -- Introduction to Computer Networks

CDA 4504 -- Introduction to Computer Networks CDA 4504 -- Introduction to Computer Networks [Description] [Prereqs] [Textbooks] [Contents] [Slides] [Assignments] [Grading] [Admin Info] [Submission] [Academic Integrity] Course Description and Goals

More information

CSCI 491-01 Topics: Internet Programming Fall 2008

CSCI 491-01 Topics: Internet Programming Fall 2008 CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our

More information

ICTTEN4215A Install and configure internet protocol TV in a service provider network

ICTTEN4215A Install and configure internet protocol TV in a service provider network ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History

More information

PART D NETWORK SERVICES

PART D NETWORK SERVICES CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Inquire about our programs at Worcester Technical High School!

Inquire about our programs at Worcester Technical High School! Inquire about our programs at Worcester Technical High School! For more information on: Dual Enrollment College courses Contact the Networking Academy office (508) 799-1971 For more information on the

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Rivier College Syllabus CS575A Advanced Networks

Rivier College Syllabus CS575A Advanced Networks Rivier College Syllabus CS575A Advanced Networks Spring 2007 1. Course number and title: CS575A Advanced Networks 2. Instructor s name: Dr. Vladimir V. Riabov, Associate Professor; Office: STH-312; Tel:

More information

CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS Course Description A course designed to enable students to understand and work with network media and topologies, protocols and

More information

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK

More information

Convergence Technologies Professional (CTP) Course 1: Data Networking

Convergence Technologies Professional (CTP) Course 1: Data Networking Convergence Technologies Professional (CTP) Course 1: Data Networking The Data Networking course teaches you the fundamentals of networking. Through hands-on training, you will learn the vendor-independent

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information