School of management, Fudan University Information Management Information Systems December. 2009 Computer Network Course Outline Dr Zhengchuan xu Phone:(86)21-25011237 (86)21-65643640 Email zexu fudan. edu. cn
School of Management, Fudan University Information Management & Information Systems December, 2009 Computer Network Course Outline Dr. Zhengchuan XU Phone: (86) 21-25011237 Fax: (86) 21-65643640 Email: zcxu@fudan.edu.cn
Computer Network L C Information Course Description Business telecommunications is one of the fastest growing areas in industry today. The use of local-and wide area networks has become common place. Data communications technology prov ides the necessary infrastructure for client-server architecture, the internet, intranets and extranets, groupware, and any e-business This course introduces students to both managerial issues as well as the supporting technical knowledge needed to plan and manage todays business communication system. The course begins with an introduction to the data communications concepts and technologies, followed by a technical review of the network services, including LANS and WANs, the Internet and internetworking, and enterprise networks. We then turn to look at some issues relating to network security and management. Course Objectives Describe the basic principles of Computer Networks. Distinguish between basic communication concepts and terminology. Grasp the concepts in the connectiv ity of stand alone LANs and WANS Intelligently converse with others on the subjects of various network architecture and topology Describe employ the Open Systems Interconnect(OSI) and TCP/IP model and use this model to explain ty pical data communications Internet, Extranet and Intranet architectures Use the technical vocabulary of data communication technology to design, implement and manage organizational communications functions Understand the role of data communications as an integrator of business processes. explain lected technical issues underlying the integration of business processes Create an oral and/or written presentations about a current data communications topic Course Materials exton Business data Networks and Telecommumications Raymond R Panko. 6th edition(2007) Cases articles 1. Choi, Y B, etc(2006)'Corporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance Int J Mobile communications Vo.4,No.3,pp266-290 2. Kumar, S(2004)Mobile communications: global trends in the 2 lst century, Int J. Mobile Communication, Vol 2, No 1, pp 67-86 3. Varshney, U, Malloy, A, Ahluwalia, P and Jain, R(2004)'Wireless in the enterprise requirements, solutions and research directions, Int J. Mobile Communications, Vol 2, No. 4 pp.354-367 4. Lim, B and Zheng, H (2004)'A day in the life of Jini: a peek at service-oriented architecture for internet appliances, Int J Mobile Communication, Vol. 2, No 2, pp 199-216 5. Pietro, R D and Mancini, L V(2003)Security and privacy issues of handheld and wearable wireless devices. Communications of the acm. vol 46. No. 9 6. Wei, J, Liu, L.C. and Koong, KS(2006)An onion ring framework for developing and assessing mobile commerce security, Int J Mobile Communications, Vol. 4, No 2, pp 128
Computer Network 2 I. Course Information Course Description: Business telecommunications is one of the fastest growing areas in industry today. The use of local- and widearea networks has become common place. Data communications technology provides the necessary infrastructure for client-server architecture, the internet, intranets and extranets, groupware, and any e-business application. This course introduces students to both managerial issues as well as the supporting technical knowledge needed to plan and manage today’s business communication system. The course begins with an introduction to the data communications concepts and technologies, followed by a technical review of the network services, including LANs and WANs, the Internet and internetworking, and enterprise networks. We then turn to look at some issues relating to network security and management. Course Objectives: • Describe the basic principles of Computer Networks. Distinguish between basic communication concepts and terminology. Grasp the concepts in the connectivity of stand alone LANs and WANs • Intelligently converse with others on the subjects of various network architecture and topology. • Describe employ the Open Systems Interconnect(OSI) and TCP/IP model and use this model to explain typical data communications Internet, Extranet and Intranet architectures • Use the technical vocabulary of data communication technology to design, implement and manage organizational communications functions • Understand the role of data communications as an integrator of business processes. explain selected technical issues underlying the integration of business processes • Create an oral and/ or written presentations about a current data communications topic. Course Materials: Textbook: Business Data Networks and Telecommunications, Raymond R. Panko. 6th edition (2007) Cases & Articles: 1. Choi, Y.B., etc (2006) ‘Corporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance’, Int. J. Mobile Communications, Vol. 4, No. 3, pp.266–290. 2. Kumar, S. (2004) ‘Mobile communications: global trends in the 21st century’, Int. J. Mobile Communication, Vol. 2, No. 1, pp.67–86. 3. Varshney, U., Malloy, A., Ahluwalia, P. and Jain, R. (2004) ‘Wireless in the enterprise: requirements, solutions and research directions’, Int. J. Mobile Communications, Vol. 2, No. 4, pp. 354–367. 4. Lim, B. and Zheng, H. (2004) ‘A day in the life of Jini: a peek at service-oriented architecture for internet appliances’, Int. J. Mobile Communication, Vol. 2, No. 2, pp.199–216. 5. Pietro, R.D. and Mancini, L.V. (2003) Security and privacy issues of handheld and wearable wireless devices, Communications of the ACM, Vol 46, No. 9. 6. Wei, J., Liu, L.C. and Koong, K.S. (2006) ‘An onion ring framework for developing and assessing mobile commerce security’, Int. J. Mobile Communications, Vol. 4, No. 2, pp.128– 142
Computer Network Re eferences Business Data Communications and Networking, Fitzgerald, J, Dennis, A. John Wiley Sons, Inc, New York, NY, 7th Edition, (2002) Local area networks Forouzan, B A. McGraw-Hill, New York, NY, Ist Edition, (2002) Business data Communications Stallings, w. Prentice Hall, Upper Saddle River, New Jersey, 4th Edition, 2001 Nerds 2.0.1: A Brief History of the Internet Segaller, Stephen. New York: TV Books [ISBN: 1-57500-088-1](1999)
Computer Network 3 References: ▪ Business Data Communications and Networking, Fitzgerald, J., Dennis, A. John Wiley & Sons, Inc., New York, NY, 7th Edition, (2002). ▪ Local Area Networks, Forouzan, B. A. McGraw-Hill, New York, NY, 1st Edition, (2002). ▪ Business Data Communications Stallings, W. Prentice Hall, Upper Saddle River, New Jersey, 4th Edition, 2001. ▪ Nerds 2.0.1: A Brief History of the Internet. Segaller, Stephen. New York: TV Books [ISBN: 1-57500-088-1] (1999)
Computer Network IL Course Learning Outcomes(CLOs) On completion of this course, students should be able to Develop knowledge of principles, concepts, and technology in the data communication to conceptualize a network and specify its components. (CLOI Develop the ability to analyze the business needs of an organization and apply the correct networking solutions. (CLO2) Develop the ability to design and document a large network, convey that design to managers in an understandable way and the ability to work network engineers and technicians to ensure the successful implementation and on going maintenance of a network (CLO3) Develop capabilities for case study and analysis of contemporary data communication and network management. (CLO4) Alignments of Program and Course learning outcomes Undergraduate Students Learning Outcomes Course los 1. Solid theoretical basis. strong professional skills, and logical modes of CLO1, CLO2 thinking CLO3 2. Collection and measurement of data and information CLOI CLO2 CLO4 3. Written and Verbal Communication Skills CLOI CLO3 4. Research skill in Problem solution CLO2 CLO3 ng sense ponsibility and high ethical standards CLO4 Teaching and learning activities Lectures: basic concepts and knowledge will be presented in the class through In-class discussions: sometimes discussion questions are raised by the lecturer. Students are encouraged to participate in discussions and share opinions with their peers. These discussions encourage students to think more for certain arguable topics assignments they can acq uire hands-on experience using these technologies ss. Through the Assignments: students accomplish tasks using technologies covered in class. Through the Group project: students forming groups to practice the research study project initiation/selection planning, execution, summarization, presentation and evaluation. Small group meeting discussion: multiple discussion sessions with individual small group during the semester to prov ide the feedback and suggestions for course project and case study Case study: students express and share their ideas and questions on the case or articles related to network in the class. These discussions encourage students to think about the class materials after class Demonstration: live demonstrations of software and technologies used in the network(such as video conferencing, schedule management, and optimization tools) will be given in the class and lab session to show how these technology applied in the network Videos: video clips are shown for selected topics in the class to show the real scenarios in the different situations for network. Students are required to answer questions and problems based on the video contents. These questions offer students opportunities to apply basic concepts and techniques to specific scenarios
Computer Network 4 II. Course Learning Outcomes (CLOs): On completion of this course, students should be able to: • Develop knowledge of principles, concepts, and technology in the data communication to conceptualize a network and specify its components. (CLO1) • Develop the ability to analyze the business needs of an organization and apply the correct networking solutions. (CLO2) • Develop the ability to design and document a large network, convey that design to managers in an understandable way and the ability to work network engineers and technicians to ensure the successful implementation and on going maintenance of a network. (CLO3) • Develop capabilities for case study and analysis of contemporary data communication and network management. (CLO4) Alignments of Program and Course Learning Outcomes: Undergraduate Students Learning Outcomes Course LOs 1. Solid theoretical basis, strong professional skills, and logical modes of thinking. CLO1, CLO2, CLO3 2. Collection and measurement of data and information CLO1, CLO2, CLO4 3. Written and Verbal Communication Skills CLO1, CLO3, CLO4 4. Research Skill in Problem Solution CLO2, CLO3, CLO4 5. A strong sense of social responsibility and high ethical standards CLO4 Teaching and Learning Activities: Lectures: basic concepts and knowledge will be presented in the class through. In-class discussions: sometimes discussion questions are raised by the lecturer. Students are encouraged to participate in discussions and share opinions with their peers. These discussions encourage students to think more for certain arguable topics. Assignments: students accomplish tasks using technologies covered in class. Through the assignments they can acquire hands-on experience using these technologies. Group project: students forming groups to practice the research study, project initiation/selection, planning, execution, summarization, presentation and evaluation. Small group meeting & discussion: multiple discussion sessions with individual small group during the semester to provide the feedback and suggestions for course project and case study. Case study: students express and share their ideas and questions on the case or articles related to network in the class. These discussions encourage students to think about the class materials after class. Demonstration: live demonstrations of software and technologies used in the network (such as video conferencing, schedule management, and optimization tools) will be given in the class and lab session to show how these technology applied in the network. Videos: video clips are shown for selected topics in the class to show the real scenarios in the different situations for network. Students are required to answer questions and problems based on the video contents. These questions offer students opportunities to apply basic concepts and techniques to specific scenarios
Computer Network Measurement of Learning outcomes: Teaching and learning activity Develop knowledge of Lectures, in-class discussions, Attendance, participation in principles, concepts, and assignments, group project, discussions, assignments, case technology in the data ase study tutorials study communication to conceptualize a network and specify its components (CLOD) Develop the ability to analyze Lectures, in-class discussions, Attendance, participation in the business needs of an assignments, group project, discussions, assignment organization and apply the group meeting, case study, study, project presentation and correct networking solutions tutorials ummary report CLO2 class discu and document a large network, assignments, exams, group discussions, case study, project convey that design to managers project, group meeting, case presentation and summary in an understandable way and study report the ability to work network ngineers and technicians to ensure the ensure the successful implementation and on going maintenance of a network CLO3 Develop capabilities for case Lectures, In-class discussions,I Attendance, participation in study and analysis of assignments, group meeting, discussions, case study, project case study, presentation and summary communication and network report management(CLO4)
Computer Network 5 Measurement of Learning Outcomes: Learning outcome Teaching and learning activity Assessment Develop knowledge of principles, concepts, and technology in the data communication to conceptualize a network and specify its components. (CLO1) Lectures, in-class discussions, assignments, group project, case study, tutorials Attendance, participation in discussions, assignments, case study. Develop the ability to analyze the business needs of an organization and apply the correct networking solutions. (CLO2) Lectures, in-class discussions, assignments, group project, group meeting, case study, tutorials Attendance, participation in discussions, assignments, case study, project presentation and summary report. Develop the ability to design and document a large network, convey that design to managers in an understandable way and the ability to work network engineers and technicians to ensure the ensure the successful implementation and on going maintenance of a network. (CLO3) Lectures, in-class discussions, assignments, exams, group project, group meeting, case study, Attendance, participation in discussions, case study, project presentation and summary report. Develop capabilities for case study and analysis of contemporary data communication and network management. (CLO4) Lectures, In-class discussions, assignments, group meeting, case study, Attendance, participation in discussions, case study, project presentation and summary report
Computer Network I. Process for assessment In-class participation(30%) Participation in class discussion, group discussion, presentation and play ing a proactive role in other class activities Group Case Study- Each group will be assigned one case in the beginning of the course and need to submit the case presentation (i.e. power point file) before the lecture of presentation/discussion Individual written assignment (30%) Softcopy to teaching assistant and lecturer Including question /answer, summary of reading, and research s Electronic submission preferable (o late submission Group project(40%=20%Report+20% Presentation) Project topics will be either assigned by lecturer or proposed by project members (with lecturers 20-minute presentation followed by 10 minute Q&A (April 12, 2008) Submission of written report+ presentation file( due date: April 27, 2008) IV. Course Policies Academic dishonesty The University Regulations on acade mic dishonesty will be strictly enforced. Academic dishonesty is behavior in which a deliberately fraudulent misrepresentation is employed an attempt to gain undeserved intellectual credit, either for oneself or for another. It includes, but is not necessarily limited to, the following types of cases a. Plagiarism- The representation of someone elses ideas as if they are ones own. Where the arguments, data, designs, etc, of someone else are being used in a paper, report, oral presentation. or similar academic project, this fact must be made explicitly clear by citing the appropriate references. The references must fully indicate the extent to which any parts of the project are not ones own work. Paraphrasing of someone else's ideas is still using someone else's ideas, and must be acknowledged b. Unauthorized Collaboration on Out-of-Class Proiects- The representation of work as solely one's own when in fact it is the result of a joint effort. c. Cheating on In-Class Exams. The covert gathering of information from other students, the use of unauthorized notes, unauthorized aids, etc d. Unauthorized Advance Access to an Exam- The representation of materials prepared at leisure, as a result of unauthorized advance access(however obtained), as if it were prepared under the rigors of the exam setting. This misrepresentation is dishonest in itself even if there are not compounding factors, such as unauthorized uses of books or notes
Computer Network 6 III. Process for Assessment IV. Course Policies Academic Dishonesty: The University Regulations on academic dishonesty will be strictly enforced. Academic dishonesty is behavior in which a deliberately fraudulent misrepresentation is employed in an attempt to gain undeserved intellectual credit, either for oneself or for another. It includes, but is not necessarily limited to, the following types of cases: a. Plagiarism - The representation of someone else’s ideas as if they are one’s own. Where the arguments, data, designs, etc., of someone else are being used in a paper, report, oral presentation, or similar academic project, this fact must be made explicitly clear by citing the appropriate references. The references must fully indicate the extent to which any parts of the project are not one’s own work. Paraphrasing of someone else’s ideas is still using someone else's ideas, and must be acknowledged. b. Unauthorized Collaboration on Out-of-Class Projects - The representation of work as solely one's own when in fact it is the result of a joint effort. c. Cheating on In-Class Exams - The covert gathering of information from other students, the use of unauthorized notes, unauthorized aids, etc. d. Unauthorized Advance Access to an Exam - The representation of materials prepared at leisure, as a result of unauthorized advance access (however obtained), as if it were prepared under the rigors of the exam setting. This misrepresentation is dishonest in itself even if there are not compounding factors, such as unauthorized uses of books or notes. In-class participation (30%) ▪ Participation in class discussion, group discussion, presentation and playing a proactive role in other in - class activities. ▪ Group Case Study - Each group will be assigned one case in the beginning of the course and need to submit the case presentation (i.e. power point file) before the lecture of presentation/discussion. Individual written assignment (30%) • Softcopy to teaching assistant and lecturer • Including question /answer, summary of reading, and research. • * Electronic submission preferable (No late submission) Group project (40% = 20% Report + 20% Presentation) • Project topics will be either assigned by lecturer or proposed by project members (with lecturer’s approval). • 20-minute presentation followed by 10 minute Q&A (April 12, 2008) • Submission of Written report + presentation file (due date: April 27, 2008)
V. Course Schedule Lecture Subjet Supplement/Reference Homework Course overview Chapter One: 1 2/16 Core Network Concepts 2 2/23Standard Chapter Two 330 Physical Layer Propagation Chapter Three 43/9 connetorizing UTP 53/16Ethernet LANs Chapter Four: 63/23 Lab on creating lan Case report 7 3/30 Wireless LAN Chapter Five 84/6 i presentation On lastest wireless Presentation technology and mobile commerce 94/13 Telec Chapter sⅸ 10 4/20 Presentation On Lastest WAN technology Presentation 114/27wANs Chapter Seven; 125/4 Case Study First Bank of paradise's wide Case Report area networks 135/11 TCPAP Internetworking Chapter Eight Hands-On: Packet Capture 145/18 Lab on TCP/P and Analysis with WinDUMPCase Report and TCPdUmP 5 5/25 Security Ch hapter nine 16 6/ Security Lab Case Study Hands-On: Windows Security Case Report 1716/8 Network Management Chapter Ten; 18 6/15 Project Presentation Project eport Due 196/22 Examination
Computer Network 7 V. Course Schedule Lecture Subject Supplement/Reference Homework 1 2/16 Course overview Core Network Concepts Chapter One; 2 2/23 Standard Chapter Two; 3 3/2 Physical Layer Propagation Chapter Three; 4 3/9 Lab on physical layer Hand-On: cutting and connetorizing UTP 5 3/16 Ethernet LANs Chapter Four; 6 3/23 Lab on creating LAN Case report 7 3/30 Wireless LAN Chapter Five; 8 4/6 Presentation On Lastest wireless technology and mobile commerce Presentation 9 4/13 Telecommunication Chapter Six; 10 4/20 Presentation On Lastest WAN technology Presentation 11 4/27 WANs Chapter Seven; 12 5/4 Case Study First Bank of Paradise’s wide area networks Case Report 13 5/11 TCP/IP Internetworking Chapter Eight; 14 5/18 Lab on TCP/IP Hands-On: Packet Capture and Analysis with WinDUMP and TCPDUMP Case Report 15 5/25 Security Chapter Nine; 16 6/1 Security Lab & Case Study Hands-On: Windows Security Case Report 17 6/8 Network Management Chapter Ten; 18 6/15 Project Presentation Project Report Due 19 6/22 Examination