THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Business Course Outline for Semester II of 2014-15 BUSI0073 Data Communications and Networking Management And "IIMT3604 Telecommunications Management" I. INFORMATION ON INSTRUCTORS AND TUTORS Instructor: Dr. Eric Chin Email: ericchin@hku.hk or drericchin@gmail.com Office Location: KKL RM 1317 Office Telephone: 9220 6528 Consultation Times: By appointment Tutors for Laboratory Sessions: Ms. Debbie Chu Office Hours: By appointment Email: debbie@business.hku.hk Teaching Timeslot & Venue Friday 09:30 12:20 KKLG 109 II. COURSE INFORMATION Pre-requisites BUSI1003 "Introduction to MIS" / IIMT2601 "Management Information Systems" Co-requisites None Mutually Exclusive Students taking or having taken "CSIS0278 / COMP3234 Computer and Communication Networks" are not allowed to take this course. Course Description The proliferation of the Internet and the remarkable growth and development of the telecommunications environment have provided organizations around the world with unprecedented business development opportunities in promoting, selling and distributing their physical or digital goods or services in the Electronic Commerce world. This course is an introduction to the fundamentals of data communications and computer networks that provide the basic infrastructure for the digital world. - 1 -- -
The course is designed to provide a conceptual foundation for the study of data communications using various standards and architectures. The course includes in-depth coverage of networking principles for management of local and wide-area networks with an emphasis on wireless networks. Both technical and managerial aspects of data communications are covered in this course. Course Objectives To learn the theories of data and voice communication. To learn to design business communication networks. To work in teams effectively. To develop a global outlook towards the practice of telecommunication. To analyze and evaluate business cases and latest research related to the use of telecommunications in modern businesses. Course Learning Outcomes (CLO) Upon the successful completion of this course, students should be able to: 1. Understand the network infrastructure and the Internet protocols. 2. Identify the key issues that need to be considered and measures that need to be adopted for providing secure communication services for businesses. 3. Be able to review, and synthesize existing literature related to cutting edge technological developments in the field of telecommunication from a technical and business perspective. 4. Be able to decide the tradeoffs of parameters for effective design of local and wide area networks. 5. Be able to design terrestrial and wireless telephone networks in order to meet prespecified requirements in performance. 6. Be able to work in teams effectively. 7. Demonstrate a solid understanding of global issues as they relate to practices in business telecommunications. 8. Be able to write effective case and research reports, and make compelling presentations. Alignment of Program and Course Outcomes Program Learning Outcomes Course Learning Outcomes 1. Acquisition and internalization of knowledge of 1, 2, 3 business and information systems 2. Application and integration of knowledge of business 4, 5, 6 and information systems 3. Inculcating professionalism and instilling leadership 7 skills 4. Developing global outlook 8 5. Mastering communication skills 9-2 -- -
III. TEACHING AND LEARNING ACTIVITIES (TLA) COURSE TEACHING AND LEARNING ACTIVITIES Course Teaching and Learning Activities Expected contact hour Study Load (% of study) TLA1: Interactive Lectures and Discussions Interactive lectures will be provided by the lecturer to illustrate and reinforce basic concepts and knowledge of data communications and networks. Students are expected to have done pre-class reading and preparation and encouraged to share their views and experience actively in class discussions to deepen their learning. TLA2: In-Class Case Studies Case studies of network management, wireless networks configuration and network security will be discussed in class. Students are encouraged to participate in discussions and identify the key issues, sharing their opinions and solutions with their peers. These discussions will help students apply their concepts and knowledge to solve business problems. TLA3: Project Students will investigate how the latest network applications such as VoIP, Cloud Computing, and SOA etc applied in supporting business development. TLA4: Demonstration Live demonstrations of video, software and technologies will be done in class to show students how the technologies are applied in real world. TLA5: Guest Seminar A guest seminar will be conducted for selected topics. Students are required to attend the seminar, participate in discussions, and share their ideas with the guest based on the topics discussed. The guest seminar offer students opportunities to meet a professional practitioner and understand how he/she manages/applies networks system in his/her organization. TLA6: Laboratory Session Assignments Students are expected to follow the instructions to complete all the required software exercises. Case studies will be provided to assess if students can apply the skills and technique related software and technologies to solve problems. TLA7: Examination Final examinations test students knowledge of the topics covered in class and their ability to apply that knowledge. 36 hours 30% 6 hours 5% 6 hours 5% 6 hours 5% 2 hours 1.6% 6 hours 5% 3 hours 2.5% TLA8: Self Study 55 hours 45.9% 120 hours 100% Total (within 120-150 hours) - 3 -- -
IV. ASSESSMENT Assessment Methods Standards For Assessment Each student will be assessed by a combination of the group work (45%) and individual work (55%) Assessment Criteria and Marking Rubrics Business cases are used in this course to present a global view of the subject and to challenge student to use their subject relevant knowledge and judgment for effective business decision making in the context of telecommunications as a team. They will be expected to work in a group, analyse a case, and make a formal report of the case. Students are also required to submit a soft copy as well as a hard copy of the case report. Weight Aligned Course Learning Outcomes AT1: Case Analysis Grade for the presentation will depend on the ability of the team to deliver a professional and persuasive presentation that identifies the key issues related to the case. Grade for the case report will depend on the following: i. identification of major issues and problems in the case, ii. application of appropriate concepts to analyse the situation under study, and iii. a well thought-out and credible recommended course of action. An important aspect of the course is to complete a project that allows student to work as a team and enables them to carry out in-depth research on a chosen topic. They will be asked to work in small groups. There will be a project presentation and a report due at the end of the semester. All members of the group need to participate equally in all group activities. Any problems with group dynamics need to be resolved as soon as possible. 15% CLO1, CLO2 AT2: Project and Presentation In the project students are expected to review latest research on a stateof-the-art technology that is related to the theme of this class and present recommendations on the usability, impact, and relationship of this technological development to the telecommunications practices of modern businesses. 25% CLO1, CLO3, CLO7, CLO9 AT3: Assignments (Individual) Grade for the project will depend on the following: i. innovativeness of the project, ii. completeness of coverage of the topic in the project, iii. relevance of your project to the business world, and iv. ability to work as a team. Assignments are an integral part of this course because they test students knowledge of relevant theories and the ability to apply that knowledge for solving practical telecommunication network design problems. Assignments will include mini case research and analysis. All assignments are to be individual submissions. 20% CLO2, CLO4, CLO8 AT4: Class Participation (Individual) Grade for the assignments will depend on the correctness of the answers to problems, clarity of presentation, and completeness of your solutions. Student participation will be measured to evaluate their enthusiasm and activeness in class works, and discussion both in classroom. 10% CLO4, CLO6, CLO7-4 -- -
AT5: End-of-Term Examination (Individual) The exam will be closed book and closed notes and it will be organized inclass. The exam will be comprehensive in nature and it will involve multiple choice questions, short answer type questions, problem solving questions, situational decision making questions or any combination of the above. Grade for the exam will depend on the ability of the student to express his/her understanding of the theories of data and voice communication, apply the learned theories for solving problems related to design of telecommunication networks, and clarity and correctness of his/her writing. 30% Total 100% CLO1, CLO2, CLO4, CLO5, CLO8 V. Course Final Grade A student s final grade for the course will be assigned according to the cumulative score that s/he has obtained from all of the assessment tasks: o Course Final Grade = Cumulative score of all assessment tasks obtained (100%) o Course Final Grade = Case Analysis and Presentation (20%) + Project and Presentation (25%) + Assignments (Individual) (15 %) + Class Participation (Individual) (10%) + End-of-Term Examination (30%) The conversion of the accumulative score to the course final grade is summarized below: Course Final Grade Cumulative Score of all Assessment Tasks Obtained A+, A, A- 100% - 80% B+, B, B- 79-70% C+, C, C- 69% - 60% D+, D 59% - 50% F <50% Course Grade Descriptors: A+, A, A- B+, B, B- C+, C, C- D+, D F Strong evidence of superb ability to fulfill the intended learning outcomes of the course at all levels of learning: describe, apply, evaluate and synthesis. Strong evidence of ability to fulfill the intended learning outcomes of the course at all levels of learning: describe, apply, evaluate and synthesis. Evidence of adequate ability to fulfill the intended learning outcomes of the course at low levels of learning; such as describe and apply, but not at high levels of learning such as evaluate and synthesis. Evidence of basic familiarity with the subject. Little evidence of basic familiarity with the subject. - 5 -- -
VI. COURSE CONTENT Week Topics 1 Introduction Information and communication Data communications and networking for today s enterprise Trends Business drivers Convergence Unified communications Business information requirements Transmission and transmission media Communication techniques Distributed data processing Internet and distributed applications The Internet TCP/IP Client/Server architectures, intranets, extranets, and SOA Networks Network security Network management Standards Business Information Audio Networking implications Data Networking implications Image Image representation Image and document formats Networking implications Video Digital video Networking implications Performance measures Response time Quality of experience Throughput 2 Distributed Data Processing Centralized and distributed organization Technical trends leading to distributed data processing Management and organizational considerations Data center evolution - 6 -- -
Client/server architecture Intranets and extranets Web services and cloud computing Distributed applications Other forms of DDP Database management systems Centralized versus distributed databases Replicated and partitioned databases Networking implications of DDP Big data infrastructure considerations Data Transmission Signals for conveying information Electromagnetic signals Analog signals Digital signals Transmission impairments and channel capacity Guided media Unguided media Channel capacity 3 Data Communication Fundamentals Analog and digital data communications Data encoding techniques Analog encoding of digital information Digital encoding of analog information Digital encoding of digital data Analog encoding of analog information Asynchronous transmission Synchronous transmission Error detection The need for error control Parity checks Cyclic redundancy check Data Link Control and Multiplexing Flow control Error control Motivation for multiplexing FDM WDM ADSL Synchronous TDM The TDM mechanism Digital carrier systems - 7 -- -
T-1 facilities SONET/SDH Cellular and cordless phone systems 4 The Internet The structure of the Internet Business and the Internet The use of packet switching Key elements The World Wide Web Internet architecture Internet domains Internet names and addresses Domain name system Dynamic host configuration protocol TCP/IP A simple protocol architecture The need for a protocol architecture Three-layer model Standardized protocol architectures Virtual private networks and IP security IPsec Applications of IPsec Benefits of IPsec IPsec functions Internetworking Routers The TCP/IP architecture TCP/IP layers Operation of TCP/IP TCP and UDP IP and IPv6 TCP/IP applications Protocol interfaces 6 Client/Server, Intranet, and Cloud Computing The growth of client/server computing Client/server applications Database applications Classes of client/server applications Three-tier client/server architecture Cloud computing Cloud computing elements Cloud computing reference architecture Middleware - 8 -- -
Middleware architecture Message passing Remote procedure calls Object-oriented mechanisms Intranets Web content Web/Database applications Intranet Webs versus traditional client/server Service-oriented architecture Extranets 7 Internet-Based Applications Electronic mail Internet mail architecture SMTP MIME POP and IMAP Web access and HTTP Web security Web traffic security approaches SSL HTTPS Multimedia applications Media types Multimedia applications Multimedia technologies Acceptable use policies Motivation Policy issues Guidelines for developing a policy Internet Operation Internet addressing IPv4 addressing IPv6 addressing Internet routing protocols Autonomous systems Border gateway protocol OSPF protocol Multicasting Multicast transmission Multicast routing protocols Quality of service Emergence of high-speed LANs Corporate WAN needs - 9 -- -
Internet traffic Differentiated services DS field DS configuration and operation SLAs IP performance metrics 9 LAN Architecture and Infrastructure Personal computer LANs Backend networks and storage area networks High-speed office networks Backbone LANs Factory LANs LAN configuration Tiered LANs Guided transmission media Twisted pair Coaxial cable Optical fiber Structured cabling LAN protocol architecture IEEE 802 reference model Logical link control Media access control Ethernet, Switches, and Virtual LANs Traditional Ethernet Bus topology LAN Medium access control MAC frame IEEE 802.3 medium options at 10 Mbps Bridges Hubs Layer 2 switches Layer 3 switches High-speed Ethernet Fast Ethernet Gigabit Ethernet 10-Gbps Ethernet 100-Gbps Ethernet Virtual LANs The use of virtual LANs Communicating VLAN membership IEEE 802.1Q VLAN standard PoE - 10 -- -
Wireless LANs Wireless LAN applications Wireless LAN requirements Wireless LAN technology Wi-Fi architecture and services IEEE 802.11 architecture IEEE 802.11 services Gigabit WLANs Gigabit Wi-Fi Li-Fi IEEE 802.11 medium access control IEEE 802.11 physical layer IEEE 802.11 security considerations Access and privacy services Wireless LAN security standards 10 WAN Technology and Protocols Switching techniques Circuit-switching networks Basic operation Control signaling Packet-switching networks Basic operation Switching technique Traditional Wide Area Network alternatives WANs for voice WANs for data Voice over IP VoIP signaling VoIP processing VoIP context Presence Presence service structure Presence information WAN Services WAN alternatives WAN offerings Evolution of WAN architectures Frame relay Background Protocol architecture User data transfer Call control - 11 -- -
Congestion control ATM Virtual channels Virtual paths ATM cells ATM service categories MPLS Operation VPN Wide Area Ethernet Wireless WANs Cellular wireless network Cellular network organization Operations of cellular systems Multiple access CDMA Which access method to use Satellite communications Satellite orbits Satellite network configurations Applications Third generation wireless communication WAP WML WTAs Microbrowser Fourth generation wireless communication 4G network requirements OFDMA 4G network evolution 13 Computer and Network Security Threats Computer security concepts Threats and attacks Threats and assets Intruder behavior patterns Intrusion techniques Viruses Worms Bots Spam Computer security trends Malicious software Back door - 12 -- -
Logic bomb Trojan horse Mobile code Multiple-threat malware Credential theft, keyloggers, and spyware Phishing and identity theft Reconnaissance and espionage 14 Computer and Network Security Techniques VPNs and IPsec IPsec functions Transport and tunnel modes Key management IPsec and VPNs SSL and TLS SSL architecture SSL record protocol Handshake protocol Wi-Fi protected access Access control Intrusion detection Basic principles Host-based intrusion detection techniques Firewalls Characteristics Types Malware defense Antivirus approaches Worm countermeasures Bot countermeasures VII. TENTATIVE TEACHING PLAN Week Date Topic Reading 1 23/01/2015 Introduction; Ch. 1 & 2 Business Information 2 30/01/2015 Distributed Data Processing; Ch. 3 & 4 Data Transmission 3 6/02/2015 Data Communication Fundamentals; Ch. 5 & 6 Data Link Control and Multiplexing 4 13/02/2015 The Internet; Ch. 7 & 8 TCP/IP 5 20/02/2015 *** Chinese New Year Holiday*** 6 27/02/2015 Client, Server, Intranet, and Cloud Computing Ch. 9-13 -- -
7 6/03/2015 Internet-Based Applications; Ch. 10 & 11 Internet Operation 8 13/03/2015 ******Reading / Field Trip Week*** 9 20/03/2015 LAN Architecture and Infrastructure; Ch. 12, 13, 14 Ethernet, Switches, Virtual LANs; Wireless LANs 10 27/03/2015 WAN Technology and Protocols; Ch. 15, 16, 17 WAN Services; Wireless WANs 11 3/04/2015 **Easter Holiday** 12 10/04/2015 Project and Presentation 13 17/04/2015 Computer and Network Security Threats Ch. 18 14 24/04/2015 Computer and Network Security Techniques Ch. 19 VIII. Assignment Submission Plan Presentation Written Report AT1: Case Analysis (15%) 27 Feb 2015 6 March, 2015 AT2: Project and Presentation (25%) 10 April, 2015 17 April, 2015 AT3: Assignments (Individual) (20 %) Not Applicable May 2, 2015 IX. Required Text Business Data Communications: Seventh Edition William Stallings and Thomas L.Case (ISBN: 9780273769163) The class notes and other supporting materials can be downloaded from: Moodle X. MEANS/PROCESSES FOR STUDENT FEEDBACK ON COURSE o Conducting mid-term survey in additional to SETL around the end of the semester Online response via Moodle site o Others: Team meeting in mid-term (please specify) XI. COURSE POLICIES University of Hong Kong is a high-education institution with integrity. Hence, the university - 14 -- -
takes the issue of academic integrity very seriously. The University Regulations on academic dishonesty will be strictly enforced! Please check the University Statement on plagiarism on the web: http://www.hku.hk/plagiarism/ Academic dishonesty is behavior in which a deliberately fraudulent misrepresentation is employed in an attempt to gain undeserved intellectual credit, either for oneself or another. It includes, but is not necessarily limited to, the following types of cases: Plagiarism - The representation of someone else's ideas as if they are one s own. Where the arguments, data, designs, etc., of someone else are being used in a paper, report, oral presentation, or similar academic project, this fact must be made explicitly clear by citing the appropriate references. The references must fully indicate the extent to which any parts of the project are not one's own work. Paraphrasing of someone else's ideas is still using someone else's ideas, and must be acknowledged. Unauthorized Collaboration on Out-of-Class Projects - The representation of work as solely one's own when in fact it is the result of a joint effort. Cheating on In-Class Exams - The covert gathering of information from other students, the use of unauthorized notes, unauthorized aids, etc. Unauthorized Advance Access to an Exam - The representation of materials prepared at leisure, as a result of unauthorized advance access (however obtained), as if it were prepared under the rigors of the exam setting. This misrepresentation is dishonest in itself even if there are not compounding factors, such as unauthorized uses of books or notes. As this course involves some technical approach in network and telecommunication, attendance is very important to those who did not have strong technical background students. XII. Additional Course Information Penalty for late assignments - 20 marks of the final mark will be deducted - 15 -- -