COURSE: CPS 406 – NET – CENTRIC COMPUTING (3 CREDIT UNITS – COMPULSORY) COURSE DURATION: Two hours per week for 15 weeks (30 hours), as taught in 2015/2016 Session Lecturer: Mutiat A. OGUNRINDE B. Sc(Ibadan), M. Sc. (Ibadan) Ph D. in view (Ibadan) Department of Mathematical and Computer Sciences College of Natural and Applied Sciences Fountain University, Osogbo. Nigeria. Email: mutiat.ogunrinde@fountainuniversity.edu.ng bogunrinde@gmail.com Location: Lecture Room 8, beside server room, ICT building, College of natural and Applied Sciences. Fountain University, Osogbo. Course Details Distributed computing, Mobile and Wireless Computing, Network Security; Client / Server Computing (using web), Building Web Application. Course Description This course focuses different methods of computing which include how computer can be arranged in order to work together. Some basic Computing architectures are being taught. It also covers methods or steps to be followed in building web Applications. Course Justification The increase in the use of computer applications this days in all aspect of our life has exert pressure on the needs for Computer used for the purpose to be arranged in such a way that will ease record retrieval, secure the application and make it available at anytime of the day. Course Objectives The main objective of this course is to impact on the students the act of Computing arrangements and security. By the end of the course, students will be able to: 1. Define some basic computer arrangements 2. Know their classification, functions, merits and demerits 3. Know the what, how and why of a network security 4. Have the good understanding of ways to build a web application. Course Requirement This is a compulsory course that all students must take. They must attend the normal classes and participate in the robust debates during the course of the programme. Students will be expected to carry out assignments as given. They are expected to attend 75% of the classes before they can sit for the examination. All students will have an email address because it is compulsory for them to contribute to the online discussion group and to submit their assignments in word processed form. Methods of Grading S /NO 1. 2. 3. 4. TYPES OF GRADING Participation in assignments Test(s) Final Examination Total Class, SCORES (%) 10 20 70 100 Course Delivery Strategies Face to face lectures will be the major method of course delivery while class discussion, group work, assignments and online interaction will be complimentary. Basic lecture notes will be provided to the students. LECTURE CONTENT Week 1 and 2: Distributed Computing Objective: At the end of the lectures, students will have an overview of the course; describe the various definitions, concept and terminologies of distributed computing. Description: Week1 (First Hour) Overview of the course as a whole Second Hour Definition of distributed computing, its concept and terminologies. Week2 (First Hour) How computers are arranged in a distributed environment and works. Second Hour Advantages and disadvantages of distributed computing. Study questions: 1. 2. 3. 4. 5. What do understand by distributed computing? How can computers in a distributed computing arranged? Does computers in a distributed computing be physically present in a location? What are the merits of distributed computing? What are the demerits of distributed computing? Reading List: Week 3 and 4: Model / Configurations in Distributed System Objective: At the end of the lectures, students will understand different model or configurations in distributed system and the property of each one of them. Description: Week3 (First Hour) The five models in distributed system Second Hour Properties of Minicomputer and Workstation models in distributed system with appropriate examples. Week4 (First Hour) Properties of Workstation Server and Processor Pool models in distributed system with appropriate examples. Second Hour Properties of Hybrid model in distributed system with appropriate examples. Study questions: 1. 2. 3. 4. What are different models or configurations in distributed computing? Explain each model in distributed computing base on their properties? What are the models used in building hybrid model? How effective are these models in today’s computing? Reading List Week 5 and 6: Mobile and Wireless Computing Objective: At the end of the lectures, students will have an understanding of the concept and terminologies of mobile and wireless computing and will be able to describe various definition involved. Description: Week 5 (First Hour) Definition of Mobile computing, its concept and components of mobile computing. Second Hour Definition of wireless computing, its concept and definition of terms involved. Week6 (First Hour) The three data transfer options. Second Hour The three data transfer options. (Cont’d) Study questions: 1. 2. 3. 4. 5. 6. Define mobile computing Differentiate between wireless and internet How does mobile computing works? How does data been transfer in wireless computing. What are the components of mobile computing? Why go mobile? Reading List: 1. California HealthCare Foundation (2001) Wireless and Mobile Computing Week 7 and 8: Mobile and Wireless Computing Objective: At the end of the lectures, students will have an understanding of the mobile computing devices and their features, limitations and current issues related to the technology and merits and demerits of mobile and wireless computing. Description: Week 7 (First Hour) Mobile computing devices and their features. Second Hour Things that must be present on a devices. Week 8 (First Hour) Limitations and current issues related to the data transfer technology in mobile computing. Second Hour Merits and demerits of mobile and wireless computing Study questions: 2. 3. 4. 5. 6. List different mobile computing devices with atleast three features each. What are the features of devices used in mobile computing? Mention advantages of mobile computing Mention disadvantages of mobile computing What are the issues related to data transfer technology today. Reading List: 1. California HealthCare Foundation (2001) Wireless and Mobile Computing Week 9 and 10: Network Security Objective: At the end of the lectures, students will have an understanding of what a network security is. Important of security, the enemies that affect network, what the enemies can do, why network should be secured and at the same time whom a network administrator is. Description: Week 9 (First Hour) Definition of network security, network administrator Second Hour Important of Network security Week 10 (First Hour) The enemies that affect network and what they can do Second Hour Why network should be secured Study questions: 1. 2. 3. 4. 5. 6. Who are the enemies? Who is a network administrator? What is network security? Give reasons why an organization need to protecting her network? What is the important of network? What can an administrator do to protect a network? Reading List: A Beginner’s guide to Network Security. Available at http://www.cisco.com/tutorial/network security overview.pdf Week 11 and 12: Client Server Computing Objective: At the end of the lectures, students will be able to define a client, server, the relationship between client and server and the Client-Server Architecture. They will know the advantages and disadvantage of client server computing. Description: Week 11 (First Hour) Definition of Client, Server and their relationship Second Hour Client – Server architecture Week 12 (First Hour) Advantages and disadvantages of client server computing. Second Hour Advantages and disadvantages of client server computing. Study questions: 1. 2. 3. 4. 5. 6. What is a client? What do you understand by the term Server? What is the relationship between client and server? Can break down of either client or server affect the computing arrangement? What are advantages and disadvantages of Client Server Computing? What are the advantages of three tier architecture over the two tier architecture? Reading List: Week 13: Building Web Application Objective: At the end of the lectures, students will know step that need to be followed in building web applications. They will know how web application works and functions. This lesson will also enlighten the students of the differences between web sites and web applications. Description: Week 13 (First Hour) Definition of websites and web application, their differences and relationship and how web application works Second Hour Steps in building web application Study questions: 1. 2. 3. 4. 5. Define web application What are the differences between websites and web application? Itemize the steps to be taken in building web application. Who are the stakeholders in requirement gathering phase of web application development? What are the documents generated during the requirement gathering phase of web application development? Reading List: Week 14 and 15: Revision Exercise Objective: These two weeks are specifically left for revision of all the topics and subtopics covered in the course. Students are expected to ask questions related to the course while the lecturers will also ask the student question to ascertain their level of understanding of the course. Revision Questions: 1. 2. 3. 4. 5. 6. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. Who are the enemies? Who is a network administrator? What is network security? Give reasons why an organization need to protecting her network? What are different models or configurations in distributed computing? Explain each model in distributed computing base on their properties? Who are the stakeholders in requirement gathering phase of web application development? What are the documents generated during the requirement gathering phase of web application development? Itemize the steps to be taken in building web application. Can break down of either client or server affect the computing arrangement? What are advantages and disadvantages of Client Server Computing? What are the advantages of three tier architecture over the two tier architecture? How can computers in a distributed computing arranged? Do computers in a distributed computing be physically present in a location? What are the merits of distributed computing? List different mobile computing devices with atleast three features each. What are the features of devices used in mobile computing? What are the issues related to data transfer technology today? Reading List: