Course Outline

advertisement
EET465 Course Outline for Term 2004-10
Instructor
Pui-Chor Wong
Office Hours
As posted in the faculty office and on eCollege (http://www.devryu.net)
Course No.
Course Name
Contact
Hours
EET465
Data Communications and Networking
Credit Hours
4
4
Calendar Course Description
This course is devoted to digital and data communications systems techniques. Topics include digital
modulation systems; noise effects; multiplexing methods; information theory fundamentals; protocols;
transmission methods; and computer network architecture, installation and troubleshooting.
Course Prerequisites
Course No. Course Name
EET-368
Communications Systems
Course Co-requisites
Course No. Course Name
EET465L
Data Communications and Networking Lab
Required Textbooks
Tomasi, W. (2004). Electronic Communications Systems Fundamental
through Advanced, 5th Edition. Prentice-Hall Inc., Englewood Cliffs, NJ.
Writing Research Papers 9th /10th Edition. Lester & Lester Jr.
Supplemental
References
Windows 2000
1
Major Topics
• Information Theory – Source and channel coding
• Digital Communications – Information capacity, FSK,PSK,QAM
• Introduction to Telecommunications- Local loop signaling, Traffic Engineering
• Introduction to Networking- Layered Models, Data link layer, Physical layer Multiple Access
Protocols
• Local Area networking
• Internetworking with TCP/IP
Course Evaluation
Assignments and Inclass:
Quizzes (1 drop):
Final Exam:
Bonus:
20%
40%
40%
10%
2
Course Terminal Objectives
Module I: Information Theory
1.
Given the specifications of a communication system including symbol code set, and a band-limited channel, calculate
system performance parameters such as symbol probability, average code length, code efficiency and channel capacity.
2.
Given a discrete set of symbols such as that of a keyboard, design a uniquely decodeable fixed and variable length
source codes which represents the data and compare and contrast the efficiencies of the two codes with each other
and with the theoretical limits of the symbol set.
3.
Given a stream of source data, implement at least three methods for error detection and/or correction and compare and
contrast the cost/benefit of the added bits in terms of throughput.
Module II: Digital Communications
1.
Given the four major digital modulation schemes (ASK, PSK, FSK, QAM), compare and contrast each with respect to
bandwidth requirements and ease of demodulation.
2.
Given a PSK or QAM modulation system, draw the constellation diagram and discuss bit-error rate as it relates to the
constellation diagram.
3.
Given each of the digital modulation schemes, illustrate methods of demodulation so that the original data stream is
successfully recovered.
4.
Given a communication application with specific power constraints (Eb/No), select a digital modulation method and provide
justification.
Module III: Introduction To Telecommunications
1.
Given a signaling operation (Off-hook, DTMF, dial-tone, etc.) in a local loop, classify the signaling function as alerting,
attending, supervisory or testing and show how system control is interpreted.
2.
Given the digital hierarchical system of the public switched telephone network, and the required traffic flow between
multiple systems, design a system to meet traffic flow using a minimum number of T1 switches and Digital Access and
Cross-connect Systems (DACS).
3.
Given a specified number of resources and a specified amount of traffic, design a system using Erlang-B tables a
specified grade of service (GOS).
4.
Given a fully available blocking switch and a cost constraint, calculate the blocking and non-blocking factors for maximum
switch throughput using a minimum number of crosspoints.
Module IV: Introduction to Networking
1.
Given an example network system, interpret the major functions of the network as they relate to the seven layer OSI
model and TCP/IP.
2.
Given a datalink protocol, demonstrate each step in transmitting a data frame between two adjacent nodes including
supervisory frames, information frames, and unnumbered frames.
3.
Given a system which utilizes a multiple access protocol such as Ethernet, illustrate data encoding, frame format and
methods used for bus contention and collision control. Demonstrate how performance is affect by bus length, probability
of transmission and number of stations.
Module V: Local Area Networking
1.
Given a case study of a small office, design all necessary network configuration, user accounts, workgroups to
effectively service the users as defined by the case study.
2.
Given a case study of a small network system, design all necessary security precautions needed to limit access as
defined by the case study.
3.
Given a case study with a defined network configuration, design a printer capability and a method and schedule for backing
up the network data.
Module VI: Internetworking with TCP/IP
1.
Given a network layer protocol, diagram each step in transmitting a sequence of frames between two end users using
both connection-oriented and connectionless routing using the Internet Protocol (IP).
2.
Using the Transport Control Protocol (TCP) utilized on the Internet, describe how a connection is established, and how
data is transferred so that reliable communication is obtained to reach as specified quality of service.
3.
Given the Internet, diagram an e-mail connection, such as Eudora using the TCPIP protocol.
4.
Given the Internet, describe how HyperText Transfer Protocol (HTTP) is used to provide server side services for the WWW
through the use of Web pages.
3
Instructor Notes
•
Assignments are due at the beginning of the class period on the due date.
•
There will be no makeup for assignments and quizzes. Make-up for final examination will be granted
under special circumstances such as sickness. In such case, doctor's note will be required.
Furthermore, there is no midterm examination.
•
Late assignments (after the due time on the due date) will not be accepted.
Classroom Policy
1
Disruption in class will result in being dismissed from the classroom and/or any disciplinary action
2
Any additions as discussed/suggested by the class.
Plagiarism is a serious issue and can result in penalties in both course and lab work.
On Plagiarism
In speaking or writing, plagiarism is the intentional or unintentional act of representing someone else's work
as one's own. In addition, plagiarism is defined as using the essential style and manner of expression of a
source as if it were one's own. If there is any doubt, the student should consult his or her instructor, or
document the source in a footnote or other form of citation. Any statement made without documentation will
be interpreted as the student’s own words and may therefore be interpreted as plagiarism.
Your work in this course may be submitted to turnitin.com , an online plagiarism-checking service.
Turnitin.com operates a secure database and protects your privacy by assigning code numbers, not student
names, to all student work stored in its database. The purpose of using this service is to help protect the
integrity of a DeVry credential, which in turn helps protects your investment in a DeVry education. We will
assume we have your consent to submit gradable work in this course to turnitin.com unless you indicate
otherwise.
4
EET465L Course Outline for Term 2004-10
Instructor
Pui-chor Wong
Office Hours
As posted in Academics and on eCollege (http://www.devryu.net)
Course No.
EET465L
Course Name
Contact
Hours
Data Communications and Networking Lab
2
Credit Hours
1
Calendar Course Description
Students gain practical experience by constructing digital/data modulation and demodulation circuits.
System-performance measurements are made, and experience is provided in troubleshooting defective
systems. Local area network installation and troubleshooting are also included.
Course Prerequisites
Course No. Course Name
Course Co-requisites
Course No. Course Name
EET465
Required Textbooks
Supplemental
References
Data Communications and Networking
Instructor supplied lab handout and instruction
Course Evaluation
•
Each Lab counts equally towards the final LAB grade.
5
Course Terminal Objectives
Module I: Information Theory
1.
Given a text file, write a C++ program which will calculate the each symbols probability, calculate the
source character set’s entropy, generate a new binary code using Huffman encoding, and finally
compress the file using the new huffman code.
2.
Given an ASCII text file write a C++ program which will calculate the needed parity bits to be added
to generate a valid hamming code word, transmit the character out the serial port to another computer
which will regenerate the original ASCII code word.
Module II: Digital Communications
1.
Using a circuit or an equipment which can generate ASK, FSK, and PSK, analyze the bandwidth
generated by each modulation technique and determine the throughput capability on a bandlimited
channel.
2.
Using a bandlimited channel with a white noise error source, transmit data using FSK, PSK and QAM,
analyze the received data and determine the bit error rate as a function of noise.
Module III: Introduction To Telecommunications
1.
Given a classical telephone, an A/D circuit with variable sampling rate, and a D/A circuit, determine
the effects of variable sampling rates on voice quality.
2.
Given up to 24 data channels and a specified input data rate, design a system to multiplex and demultiplex the data channels into a T1 frame.
Module IV: Introduction to Networking
1.
Given a particular data link protocol, such as HDLC, transmit data between two adjacent computers
fully implementing the protocol and verify that data was transmitted properly.
2.
Using software simulation, simulate data transmission between two adjacent computers and analyze
data link performance while varying data-link parameters, such as frame length, window size, and
protocol.
Module V: Local Area Networking
1.
Given a local area network plan, install all software and install all hardware necessary to implement the
plan.
2.
Using a case study of a small office environment, design and implement a network architecture to
allow all users the proper access to network software while maintaining proper security precautions.
3.
Using a case study for a small office, set up a printing environment which most effectively utilizes
hardware resources and office space.
VI: Internetworking with TCP/IP
1.
Using a protocol analyzer, monitor the data traffic on a network trunk and create a report on the packet
structure, packet function and packet routing employed.
2.
Using a computer software, simulate data transmission between two non-adjacent computers and
analyze network performance while varying system parameters such as routing algorithms and protocol
used.
6
Course Notes
•
•
•
•
•
•
•
•
•
Lab attendance is mandatory, and no credit will be given for absentees.
Labs will be handed out prior to lab period or made available on the network.
A signature (either the Instructor or course F.A.s) is required for each lab and it should reflect the fact
that the lab was performed during the lab period.
Group work is permitted. (Maximum group size is as indicated by the Instructor)
One lab report per group. (The writer of the report should alternate for each report and also be clearly
indicated on the report).
Lab due dates and times are as indicated in the due date file (465duedate.doc on website and/or
network).
Late labs will not be accepted.
The STANDARD LAB REPORT FORMAT should be used for all reports.
A minimum of 1 week will be allotted to each lab.
On Plagiarism
In speaking or writing, plagiarism is the intentional or unintentional act of representing someone else's work
as one's own. In addition, plagiarism is defined as using the essential style and manner of expression of a
source as if it were one's own. If there is any doubt, the student should consult his or her instructor, or
document the source in a footnote or other form of citation. Any statement made without documentation will
be interpreted as the student’s own words and may therefore be interpreted as plagiarism.
Your work in this course may be submitted to turnitin.com , an online plagiarism-checking service.
Turnitin.com operates a secure database and protects your privacy by assigning code numbers, not student
names, to all student work stored in its database. The purpose of using this service is to help protect the
integrity of a DeVry credential, which in turn helps protects your investment in a DeVry education. We will
assume we have your consent to submit gradable work in this course to turnitin.com unless you indicate
otherwise.
7
STANDARD LAB REPORT FORMAT
Title Page and abstract
Includes:
-Title of experiment
-Name of course
-Name of instructor
-Name of author and partner(s)
-Date
-Adequate motivation
Objective/Purpose
Tells why the experiment was performed and
what results are anticipated. This section often
interprets the purpose of the lab experiment as
provided by the instructor.
Equipment and Parts
This is a list of the components and test
equipment used to perform the lab experiment.
Experimental Data and Observations
(Raw Data)
Documents (without a detailed analysis) what
happened during the performance of the lab.
Records and presents the data, tables, charts,
calculations and evidence of where this
information was derived from (ie. equations,
textbooks, class-notes, multimeter, etc).
Discussion of Results/
Questions and Answers
This is a detailed analysis and discussion of the
results of the experiment, plus a comparison of
the results with theoretical expectations (ie. Did
the data prove or disprove your theory? Why
might the lab not have worked?) Any questions
posed in the lab handout are answered here.
Conclusion
Contains a concise description of the
conclusions. Includes a statement of whether or
not the objectives were met and any
recommendations you may have.
Note: Your report should be Times New Roman, size 12 fonts. Figures and tables should be labeled properly.
8
Download