THE UNIVERSITY OF HONG KONG
|
|
- Junior Park
- 8 years ago
- Views:
Transcription
1 THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Business Course Outline for Semester II of BUSI0073 Data Communications and Networking Management And "IIMT3604 Telecommunications Management" I. INFORMATION ON INSTRUCTORS AND TUTORS Instructor: Dr. Eric Chin or Office Location: KKL RM 1317 Office Telephone: Consultation Times: By appointment Tutors for Laboratory Sessions: Ms. Debbie Chu Office Hours: By appointment Teaching Timeslot & Venue Friday 09:30 12:20 KKLG 109 II. COURSE INFORMATION Pre-requisites BUSI1003 "Introduction to MIS" / IIMT2601 "Management Information Systems" Co-requisites None Mutually Exclusive Students taking or having taken "CSIS0278 / COMP3234 Computer and Communication Networks" are not allowed to take this course. Course Description The proliferation of the Internet and the remarkable growth and development of the telecommunications environment have provided organizations around the world with unprecedented business development opportunities in promoting, selling and distributing their physical or digital goods or services in the Electronic Commerce world. This course is an introduction to the fundamentals of data communications and computer networks that provide the basic infrastructure for the digital world
2 The course is designed to provide a conceptual foundation for the study of data communications using various standards and architectures. The course includes in-depth coverage of networking principles for management of local and wide-area networks with an emphasis on wireless networks. Both technical and managerial aspects of data communications are covered in this course. Course Objectives To learn the theories of data and voice communication. To learn to design business communication networks. To work in teams effectively. To develop a global outlook towards the practice of telecommunication. To analyze and evaluate business cases and latest research related to the use of telecommunications in modern businesses. Course Learning Outcomes (CLO) Upon the successful completion of this course, students should be able to: 1. Understand the network infrastructure and the Internet protocols. 2. Identify the key issues that need to be considered and measures that need to be adopted for providing secure communication services for businesses. 3. Be able to review, and synthesize existing literature related to cutting edge technological developments in the field of telecommunication from a technical and business perspective. 4. Be able to decide the tradeoffs of parameters for effective design of local and wide area networks. 5. Be able to design terrestrial and wireless telephone networks in order to meet prespecified requirements in performance. 6. Be able to work in teams effectively. 7. Demonstrate a solid understanding of global issues as they relate to practices in business telecommunications. 8. Be able to write effective case and research reports, and make compelling presentations. Alignment of Program and Course Outcomes Program Learning Outcomes Course Learning Outcomes 1. Acquisition and internalization of knowledge of 1, 2, 3 business and information systems 2. Application and integration of knowledge of business 4, 5, 6 and information systems 3. Inculcating professionalism and instilling leadership 7 skills 4. Developing global outlook 8 5. Mastering communication skills
3 III. TEACHING AND LEARNING ACTIVITIES (TLA) COURSE TEACHING AND LEARNING ACTIVITIES Course Teaching and Learning Activities Expected contact hour Study Load (% of study) TLA1: Interactive Lectures and Discussions Interactive lectures will be provided by the lecturer to illustrate and reinforce basic concepts and knowledge of data communications and networks. Students are expected to have done pre-class reading and preparation and encouraged to share their views and experience actively in class discussions to deepen their learning. TLA2: In-Class Case Studies Case studies of network management, wireless networks configuration and network security will be discussed in class. Students are encouraged to participate in discussions and identify the key issues, sharing their opinions and solutions with their peers. These discussions will help students apply their concepts and knowledge to solve business problems. TLA3: Project Students will investigate how the latest network applications such as VoIP, Cloud Computing, and SOA etc applied in supporting business development. TLA4: Demonstration Live demonstrations of video, software and technologies will be done in class to show students how the technologies are applied in real world. TLA5: Guest Seminar A guest seminar will be conducted for selected topics. Students are required to attend the seminar, participate in discussions, and share their ideas with the guest based on the topics discussed. The guest seminar offer students opportunities to meet a professional practitioner and understand how he/she manages/applies networks system in his/her organization. TLA6: Laboratory Session Assignments Students are expected to follow the instructions to complete all the required software exercises. Case studies will be provided to assess if students can apply the skills and technique related software and technologies to solve problems. TLA7: Examination Final examinations test students knowledge of the topics covered in class and their ability to apply that knowledge. 36 hours 30% 6 hours 5% 6 hours 5% 6 hours 5% 2 hours 1.6% 6 hours 5% 3 hours 2.5% TLA8: Self Study 55 hours 45.9% 120 hours 100% Total (within hours)
4 IV. ASSESSMENT Assessment Methods Standards For Assessment Each student will be assessed by a combination of the group work (45%) and individual work (55%) Assessment Criteria and Marking Rubrics Business cases are used in this course to present a global view of the subject and to challenge student to use their subject relevant knowledge and judgment for effective business decision making in the context of telecommunications as a team. They will be expected to work in a group, analyse a case, and make a formal report of the case. Students are also required to submit a soft copy as well as a hard copy of the case report. Weight Aligned Course Learning Outcomes AT1: Case Analysis Grade for the presentation will depend on the ability of the team to deliver a professional and persuasive presentation that identifies the key issues related to the case. Grade for the case report will depend on the following: i. identification of major issues and problems in the case, ii. application of appropriate concepts to analyse the situation under study, and iii. a well thought-out and credible recommended course of action. An important aspect of the course is to complete a project that allows student to work as a team and enables them to carry out in-depth research on a chosen topic. They will be asked to work in small groups. There will be a project presentation and a report due at the end of the semester. All members of the group need to participate equally in all group activities. Any problems with group dynamics need to be resolved as soon as possible. 15% CLO1, CLO2 AT2: Project and Presentation In the project students are expected to review latest research on a stateof-the-art technology that is related to the theme of this class and present recommendations on the usability, impact, and relationship of this technological development to the telecommunications practices of modern businesses. 25% CLO1, CLO3, CLO7, CLO9 AT3: Assignments (Individual) Grade for the project will depend on the following: i. innovativeness of the project, ii. completeness of coverage of the topic in the project, iii. relevance of your project to the business world, and iv. ability to work as a team. Assignments are an integral part of this course because they test students knowledge of relevant theories and the ability to apply that knowledge for solving practical telecommunication network design problems. Assignments will include mini case research and analysis. All assignments are to be individual submissions. 20% CLO2, CLO4, CLO8 AT4: Class Participation (Individual) Grade for the assignments will depend on the correctness of the answers to problems, clarity of presentation, and completeness of your solutions. Student participation will be measured to evaluate their enthusiasm and activeness in class works, and discussion both in classroom. 10% CLO4, CLO6, CLO
5 AT5: End-of-Term Examination (Individual) The exam will be closed book and closed notes and it will be organized inclass. The exam will be comprehensive in nature and it will involve multiple choice questions, short answer type questions, problem solving questions, situational decision making questions or any combination of the above. Grade for the exam will depend on the ability of the student to express his/her understanding of the theories of data and voice communication, apply the learned theories for solving problems related to design of telecommunication networks, and clarity and correctness of his/her writing. 30% Total 100% CLO1, CLO2, CLO4, CLO5, CLO8 V. Course Final Grade A student s final grade for the course will be assigned according to the cumulative score that s/he has obtained from all of the assessment tasks: o Course Final Grade = Cumulative score of all assessment tasks obtained (100%) o Course Final Grade = Case Analysis and Presentation (20%) + Project and Presentation (25%) + Assignments (Individual) (15 %) + Class Participation (Individual) (10%) + End-of-Term Examination (30%) The conversion of the accumulative score to the course final grade is summarized below: Course Final Grade Cumulative Score of all Assessment Tasks Obtained A+, A, A- 100% - 80% B+, B, B % C+, C, C- 69% - 60% D+, D 59% - 50% F <50% Course Grade Descriptors: A+, A, A- B+, B, B- C+, C, C- D+, D F Strong evidence of superb ability to fulfill the intended learning outcomes of the course at all levels of learning: describe, apply, evaluate and synthesis. Strong evidence of ability to fulfill the intended learning outcomes of the course at all levels of learning: describe, apply, evaluate and synthesis. Evidence of adequate ability to fulfill the intended learning outcomes of the course at low levels of learning; such as describe and apply, but not at high levels of learning such as evaluate and synthesis. Evidence of basic familiarity with the subject. Little evidence of basic familiarity with the subject
6 VI. COURSE CONTENT Week Topics 1 Introduction Information and communication Data communications and networking for today s enterprise Trends Business drivers Convergence Unified communications Business information requirements Transmission and transmission media Communication techniques Distributed data processing Internet and distributed applications The Internet TCP/IP Client/Server architectures, intranets, extranets, and SOA Networks Network security Network management Standards Business Information Audio Networking implications Data Networking implications Image Image representation Image and document formats Networking implications Video Digital video Networking implications Performance measures Response time Quality of experience Throughput 2 Distributed Data Processing Centralized and distributed organization Technical trends leading to distributed data processing Management and organizational considerations Data center evolution
7 Client/server architecture Intranets and extranets Web services and cloud computing Distributed applications Other forms of DDP Database management systems Centralized versus distributed databases Replicated and partitioned databases Networking implications of DDP Big data infrastructure considerations Data Transmission Signals for conveying information Electromagnetic signals Analog signals Digital signals Transmission impairments and channel capacity Guided media Unguided media Channel capacity 3 Data Communication Fundamentals Analog and digital data communications Data encoding techniques Analog encoding of digital information Digital encoding of analog information Digital encoding of digital data Analog encoding of analog information Asynchronous transmission Synchronous transmission Error detection The need for error control Parity checks Cyclic redundancy check Data Link Control and Multiplexing Flow control Error control Motivation for multiplexing FDM WDM ADSL Synchronous TDM The TDM mechanism Digital carrier systems
8 T-1 facilities SONET/SDH Cellular and cordless phone systems 4 The Internet The structure of the Internet Business and the Internet The use of packet switching Key elements The World Wide Web Internet architecture Internet domains Internet names and addresses Domain name system Dynamic host configuration protocol TCP/IP A simple protocol architecture The need for a protocol architecture Three-layer model Standardized protocol architectures Virtual private networks and IP security IPsec Applications of IPsec Benefits of IPsec IPsec functions Internetworking Routers The TCP/IP architecture TCP/IP layers Operation of TCP/IP TCP and UDP IP and IPv6 TCP/IP applications Protocol interfaces 6 Client/Server, Intranet, and Cloud Computing The growth of client/server computing Client/server applications Database applications Classes of client/server applications Three-tier client/server architecture Cloud computing Cloud computing elements Cloud computing reference architecture Middleware
9 Middleware architecture Message passing Remote procedure calls Object-oriented mechanisms Intranets Web content Web/Database applications Intranet Webs versus traditional client/server Service-oriented architecture Extranets 7 Internet-Based Applications Electronic mail Internet mail architecture SMTP MIME POP and IMAP Web access and HTTP Web security Web traffic security approaches SSL HTTPS Multimedia applications Media types Multimedia applications Multimedia technologies Acceptable use policies Motivation Policy issues Guidelines for developing a policy Internet Operation Internet addressing IPv4 addressing IPv6 addressing Internet routing protocols Autonomous systems Border gateway protocol OSPF protocol Multicasting Multicast transmission Multicast routing protocols Quality of service Emergence of high-speed LANs Corporate WAN needs
10 Internet traffic Differentiated services DS field DS configuration and operation SLAs IP performance metrics 9 LAN Architecture and Infrastructure Personal computer LANs Backend networks and storage area networks High-speed office networks Backbone LANs Factory LANs LAN configuration Tiered LANs Guided transmission media Twisted pair Coaxial cable Optical fiber Structured cabling LAN protocol architecture IEEE 802 reference model Logical link control Media access control Ethernet, Switches, and Virtual LANs Traditional Ethernet Bus topology LAN Medium access control MAC frame IEEE medium options at 10 Mbps Bridges Hubs Layer 2 switches Layer 3 switches High-speed Ethernet Fast Ethernet Gigabit Ethernet 10-Gbps Ethernet 100-Gbps Ethernet Virtual LANs The use of virtual LANs Communicating VLAN membership IEEE 802.1Q VLAN standard PoE
11 Wireless LANs Wireless LAN applications Wireless LAN requirements Wireless LAN technology Wi-Fi architecture and services IEEE architecture IEEE services Gigabit WLANs Gigabit Wi-Fi Li-Fi IEEE medium access control IEEE physical layer IEEE security considerations Access and privacy services Wireless LAN security standards 10 WAN Technology and Protocols Switching techniques Circuit-switching networks Basic operation Control signaling Packet-switching networks Basic operation Switching technique Traditional Wide Area Network alternatives WANs for voice WANs for data Voice over IP VoIP signaling VoIP processing VoIP context Presence Presence service structure Presence information WAN Services WAN alternatives WAN offerings Evolution of WAN architectures Frame relay Background Protocol architecture User data transfer Call control
12 Congestion control ATM Virtual channels Virtual paths ATM cells ATM service categories MPLS Operation VPN Wide Area Ethernet Wireless WANs Cellular wireless network Cellular network organization Operations of cellular systems Multiple access CDMA Which access method to use Satellite communications Satellite orbits Satellite network configurations Applications Third generation wireless communication WAP WML WTAs Microbrowser Fourth generation wireless communication 4G network requirements OFDMA 4G network evolution 13 Computer and Network Security Threats Computer security concepts Threats and attacks Threats and assets Intruder behavior patterns Intrusion techniques Viruses Worms Bots Spam Computer security trends Malicious software Back door
13 Logic bomb Trojan horse Mobile code Multiple-threat malware Credential theft, keyloggers, and spyware Phishing and identity theft Reconnaissance and espionage 14 Computer and Network Security Techniques VPNs and IPsec IPsec functions Transport and tunnel modes Key management IPsec and VPNs SSL and TLS SSL architecture SSL record protocol Handshake protocol Wi-Fi protected access Access control Intrusion detection Basic principles Host-based intrusion detection techniques Firewalls Characteristics Types Malware defense Antivirus approaches Worm countermeasures Bot countermeasures VII. TENTATIVE TEACHING PLAN Week Date Topic Reading 1 23/01/2015 Introduction; Ch. 1 & 2 Business Information 2 30/01/2015 Distributed Data Processing; Ch. 3 & 4 Data Transmission 3 6/02/2015 Data Communication Fundamentals; Ch. 5 & 6 Data Link Control and Multiplexing 4 13/02/2015 The Internet; Ch. 7 & 8 TCP/IP 5 20/02/2015 *** Chinese New Year Holiday*** 6 27/02/2015 Client, Server, Intranet, and Cloud Computing Ch
14 7 6/03/2015 Internet-Based Applications; Ch. 10 & 11 Internet Operation 8 13/03/2015 ******Reading / Field Trip Week*** 9 20/03/2015 LAN Architecture and Infrastructure; Ch. 12, 13, 14 Ethernet, Switches, Virtual LANs; Wireless LANs 10 27/03/2015 WAN Technology and Protocols; Ch. 15, 16, 17 WAN Services; Wireless WANs 11 3/04/2015 **Easter Holiday** 12 10/04/2015 Project and Presentation 13 17/04/2015 Computer and Network Security Threats Ch /04/2015 Computer and Network Security Techniques Ch. 19 VIII. Assignment Submission Plan Presentation Written Report AT1: Case Analysis (15%) 27 Feb March, 2015 AT2: Project and Presentation (25%) 10 April, April, 2015 AT3: Assignments (Individual) (20 %) Not Applicable May 2, 2015 IX. Required Text Business Data Communications: Seventh Edition William Stallings and Thomas L.Case (ISBN: ) The class notes and other supporting materials can be downloaded from: Moodle X. MEANS/PROCESSES FOR STUDENT FEEDBACK ON COURSE o Conducting mid-term survey in additional to SETL around the end of the semester Online response via Moodle site o Others: Team meeting in mid-term (please specify) XI. COURSE POLICIES University of Hong Kong is a high-education institution with integrity. Hence, the university
15 takes the issue of academic integrity very seriously. The University Regulations on academic dishonesty will be strictly enforced! Please check the University Statement on plagiarism on the web: Academic dishonesty is behavior in which a deliberately fraudulent misrepresentation is employed in an attempt to gain undeserved intellectual credit, either for oneself or another. It includes, but is not necessarily limited to, the following types of cases: Plagiarism - The representation of someone else's ideas as if they are one s own. Where the arguments, data, designs, etc., of someone else are being used in a paper, report, oral presentation, or similar academic project, this fact must be made explicitly clear by citing the appropriate references. The references must fully indicate the extent to which any parts of the project are not one's own work. Paraphrasing of someone else's ideas is still using someone else's ideas, and must be acknowledged. Unauthorized Collaboration on Out-of-Class Projects - The representation of work as solely one's own when in fact it is the result of a joint effort. Cheating on In-Class Exams - The covert gathering of information from other students, the use of unauthorized notes, unauthorized aids, etc. Unauthorized Advance Access to an Exam - The representation of materials prepared at leisure, as a result of unauthorized advance access (however obtained), as if it were prepared under the rigors of the exam setting. This misrepresentation is dishonest in itself even if there are not compounding factors, such as unauthorized uses of books or notes. As this course involves some technical approach in network and telecommunication, attendance is very important to those who did not have strong technical background students. XII. Additional Course Information Penalty for late assignments - 20 marks of the final mark will be deducted
THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS
THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Business BUS10066 Marketing On the Commercial Internet MKTG3524 Internet Marketing 2014-2015, Semester 2 I. Information on Instructor
More informationTHE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS
THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Business BUS10066 Marketing On the Commercial Internet 2011-2012 Second Semester I. Information on Instructor and Class Instructor:
More informationNetwork System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
More informationIT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
More informationLocal Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
More informationTHE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS
THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Business BUS10066 Marketing On the Commercial Internet MKTG3524 Internet Marketing 2015-2016, Semester 2 COURSE SYLLABUS I. Information
More informationFLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2662 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Voice Over IP CTS 2655 and CNT 2102 with grade
More informationFLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 2600 COURSE TITLE: Network Fundamentals PREREQUISITE(S): CTS 1131 and CTS 1133 COREQUISITE(S): STUDENT
More informationCompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
More informationICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
More informationFINA1003 Corporate Finance (Subclasses J&K)
THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Economics and Finance FINA1003 Corporate Finance (Subclasses J&K) Spring 2010 I. INFORMATION ON INSTRUCTOR AND TEACHING ASSISTANT
More informationNew York City College of Technology Computer Systems Technology Department
New York City College of Technology Computer Systems Technology Department CST 3507/CS507: Advanced Single-LAN Concepts (3 credits, 2 class hours, 2 lab hours) Instructor: Office Phone: Office Hours: Virtual
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationIT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
More informationTHE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS Course Template for the Learning Outcomes System
GENERAL INFORMATION Instructor: David Bishop Office: KKL 1313 Phone: 3917 4215 Email: dbishop@hku.hk Consultation times: by appointment Tutor: TBC Pre-requisites: None Co-requisites: n/a Mutually exclusive:
More informationBCIS 4680 -- BUSINESS DATA COMMUNICATIONS and NETWORKING Mr. Cengiz Capan -- Spring 2016
Office : BLB 290E, Business Leadership Building Office Hours: Tu &Th 9:00 am - 11:00 am, or by appointment/drop-in Telephone: 940-565-4660 Web Page: http://www.coba.unt.edu/bcis/faculty/capan/capan.htm
More informationNetwork Technology CMP-354-TE. TECEP Test Description
Network Technology CMP-354-TE This TECEP tests knowledge of the fundamental concepts of data communications. Topics covered include: network architectures, topologies, media and devices, protocols, types
More informationSan José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015
San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015 Course and Contact Information Instructor: Dr. Rod Fatoohi Office
More informationNetwork Security. Vorlesung Kommunikation und Netze SS 10 E. Nett
Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!
More informationSonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
More informationCOMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
More information3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
More informationRaritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking
Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)
More informationICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
More information270125 - TXC - Computer Network Technology
Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 701 - AC - Department of Computer Architecture Academic year: Degree: 2015 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus
More informationComputer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
More information1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
More informationLecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
More informationThis course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking
Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses
More informationTHE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Economics and Finance. FINA0102 Financial Markets and Institutions
THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Economics and Finance BE103/512 FINA0102 Financial Markets and Institutions GENERAL INFORMATION FINA0102A and FINA0102B Instructor:
More informationHow To Understand And Understand Network Theory
University of Southern California Course Title: EE450: Computer Networks Semester: Fall Semester 2014 Instructor: Professor A. Zahid, azahid@usc.edu Office: PHE 418, 213-740-9058 Office Hours: TTH 9:00
More informationCSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.
More informationNetwork and Telecommunications Courses
Network and Telecommunications Courses Detailed syllabi available at http://www.cdm.depaul.edu/ IT 263 - Applied Networks and Security This course introduces the networking and security technologies required
More informationNetworking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
More information1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
More informationDL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.
More informationLayered protocol (service) architecture
Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure
More informationMGMT 3404 Cross-Cultural Management 2014-2015 Second Semester
MGMT 3404 Cross-Cultural Management 2014-2015 Second Semester I. Information on Instructor and TA: Position Name Email Phone Office Instructor Dr. Yiwen ZHANG yzhang@business.hku.hk 3917-1615 KKL 716 Teaching
More informationJOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More informationCOMSATS Institute of Information Technology, Abbottabad Department of Computer Science
COMSATS Institute of Information Technology, Abbottabad Department of Computer Science Course: CSC 432 Telecom Network Design (3,0) (Spring 2015) Office: Instructor: Office hours: Email: Z-Block (Z-359)
More informationMathatma Gandhi University
Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer
More informationComputer Network Engineering
226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
More informationSSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
More informationMANAGEMENT INFORMATION SYSTEMS 8/E
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the
More informationTeracom Training Institute Certified IP Telecom Network Specialist (CIPTS) Course & Certification Package
Teracom Training Institute Certified IP Telecom Network Specialist (CIPTS) Course & Certification Package Certified IP Telecom Network Specialist (CIPTS) Package Overview...2 Detailed Course Descriptions...5
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationIT 101 Introduction to Information Technology
Applied Information Technology Department Course Syllabus IT 101 Introduction to Information Technology Catalog Description Introduces students to the fundamental concepts in information technology (IT)
More informationHow To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
More informationIT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,
More informationOCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More informationNetworking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
More informationCourse Title: ITAP 2431: Network Management. Semester Credit Hours: 4 (3,1)
Course Title: ITAP 2431: Network Management Semester Credit Hours: 4 (3,1) I. Course Overview This course introduces students to business data communications and networking concepts, tools and methods.
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationChapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,
More informationChapter 1 Instructor Version
Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic
More informationTelecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationCompTIA Convergence+ 2006 Examination Objectives
CompTIA Convergence+ 2006 Examination Objectives Introduction The CompTIA Convergence+ examination covering the 2006 objectives certifies that the successful candidate has the necessary knowledge to perform
More informationWHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
More informationCS 5480 Computer Networks
CS 5480 Computer Networks Professor Sneha Kumar Kasera School of Computing 1 My Background PhD - Computer Science dept, UMass Amherst (1999) Bell Labs research (1999 2003) research interests computer networks
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
More informationThe WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center
The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your
More informationMPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
More informationIntroduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
More informationCOURSE NUMBER: CTS 2371
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2371 COURSE TITLE: Virtual Infrastructure: Deployment, Security, and Analysis PREREQUISITE(S): CTS
More informationAssociate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
More informationPost-Class Quiz: Telecommunication & Network Security Domain
1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which
More informationManagement Information Systems
Management Information Systems Basics of the Internet Dr. Shankar Sundaresan (Adapted from Introduction to IS, Rainer and Turban) Internet Basics Outline Internet History Internet Structure Switching Methods
More informationVirtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
More informationChapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
More informationTHE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS. School of Business MGMT2401 J, K: Principles of Management 2015-2016 Second Semester
THE UNIVERSITY O HONG KONG ACULTY O BUSINESS AND ECONOMICS School of Business MGMT2401 J, K: Principles of Management 2015-2016 Second Semester I. Instructor Information Instructor: Dr. Yamei Wang Email:
More informationComputer Network Engineering
208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of
More informationNovember 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
More informationTelecommunications, the Internet, and Wireless Technology
Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks
More informationCore Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
More informationLink Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and
More informationTop-Down Network Design
Top-Down Network Design Third Edition Priscilla Oppenheimer Cisco Press 800 East 96th Street Indianapolis, IN 46240 vi Тор-Down Network Design Contents at a Glance Introduction xxii Part I Identifying
More informationWAN and VPN Solutions:
WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization
More informationChapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system
Dear Student Here is the list of chapter sections that we will be covering for this semester. For each chapter listed in pages below: Any Bold text is required (with all the details in that sections) Any
More informationHow To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationCertified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0
(CTNP) Syllabus Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of part, or of the whole, without
More informationCDA 4504 -- Introduction to Computer Networks
CDA 4504 -- Introduction to Computer Networks [Description] [Prereqs] [Textbooks] [Contents] [Slides] [Assignments] [Grading] [Admin Info] [Submission] [Academic Integrity] Course Description and Goals
More informationCSCI 491-01 Topics: Internet Programming Fall 2008
CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our
More informationICTTEN4215A Install and configure internet protocol TV in a service provider network
ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History
More informationPART D NETWORK SERVICES
CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC
More informationIntroduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationInquire about our programs at Worcester Technical High School!
Inquire about our programs at Worcester Technical High School! For more information on: Dual Enrollment College courses Contact the Networking Academy office (508) 799-1971 For more information on the
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informationRivier College Syllabus CS575A Advanced Networks
Rivier College Syllabus CS575A Advanced Networks Spring 2007 1. Course number and title: CS575A Advanced Networks 2. Instructor s name: Dr. Vladimir V. Riabov, Associate Professor; Office: STH-312; Tel:
More informationCIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS
CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS Course Description A course designed to enable students to understand and work with network media and topologies, protocols and
More informationNetworking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the
Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK
More informationConvergence Technologies Professional (CTP) Course 1: Data Networking
Convergence Technologies Professional (CTP) Course 1: Data Networking The Data Networking course teaches you the fundamentals of networking. Through hands-on training, you will learn the vendor-independent
More informationRecommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
More information