COURSE: CPS 406 – NET – CENTRIC COMPUTING (3 CREDIT

advertisement
COURSE: CPS 406 – NET – CENTRIC COMPUTING (3 CREDIT UNITS – COMPULSORY)
COURSE DURATION: Two hours per week for 15 weeks (30 hours), as taught in 2015/2016 Session
Lecturer:
Mutiat A. OGUNRINDE
B. Sc(Ibadan), M. Sc. (Ibadan) Ph D. in view (Ibadan)
Department of Mathematical and Computer Sciences
College of Natural and Applied Sciences
Fountain University, Osogbo. Nigeria.
Email: mutiat.ogunrinde@fountainuniversity.edu.ng
bogunrinde@gmail.com
Location: Lecture Room 8, beside server room, ICT building, College of natural and Applied Sciences.
Fountain University, Osogbo.
Course Details
Distributed computing, Mobile and Wireless Computing, Network Security; Client / Server Computing
(using web), Building Web Application.
Course Description
This course focuses different methods of computing which include how computer can be arranged in
order to work together. Some basic Computing architectures are being taught. It also covers methods or
steps to be followed in building web Applications.
Course Justification
The increase in the use of computer applications this days in all aspect of our life has exert pressure on the
needs for Computer used for the purpose to be arranged in such a way that will ease record retrieval,
secure the application and make it available at anytime of the day.
Course Objectives
The main objective of this course is to impact on the students the act of Computing arrangements and
security. By the end of the course, students will be able to:
1. Define some basic computer arrangements
2. Know their classification, functions, merits and demerits
3. Know the what, how and why of a network security
4. Have the good understanding of ways to build a web application.
Course Requirement
This is a compulsory course that all students must take. They must attend the normal classes and
participate in the robust debates during the course of the programme. Students will be expected to carry
out assignments as given. They are expected to attend 75% of the classes before they can sit for the
examination. All students will have an email address because it is compulsory for them to contribute to
the online discussion group and to submit their assignments in word processed form.
Methods of Grading
S /NO
1.
2.
3.
4.
TYPES OF GRADING
Participation
in
assignments
Test(s)
Final Examination
Total
Class,
SCORES (%)
10
20
70
100
Course Delivery Strategies
Face to face lectures will be the major method of course delivery while class discussion, group work,
assignments and online interaction will be complimentary. Basic lecture notes will be provided to the
students.
LECTURE CONTENT
Week 1 and 2: Distributed Computing
Objective: At the end of the lectures, students will have an overview of the course; describe the various
definitions, concept and terminologies of distributed computing.
Description:
Week1 (First Hour)
Overview of the course as a whole
Second Hour
Definition of distributed computing, its concept and terminologies.
Week2 (First Hour)
How computers are arranged in a distributed environment and works.
Second Hour
Advantages and disadvantages of distributed computing.
Study questions:
1.
2.
3.
4.
5.
What do understand by distributed computing?
How can computers in a distributed computing arranged?
Does computers in a distributed computing be physically present in a location?
What are the merits of distributed computing?
What are the demerits of distributed computing?
Reading List:
Week 3 and 4: Model / Configurations in Distributed System
Objective: At the end of the lectures, students will understand different model or configurations in
distributed system and the property of each one of them.
Description:
Week3 (First Hour)
The five models in distributed system
Second Hour
Properties of Minicomputer and Workstation models in distributed system with appropriate examples.
Week4 (First Hour)
Properties of Workstation Server and Processor Pool models in distributed system with appropriate
examples.
Second Hour
Properties of Hybrid model in distributed system with appropriate examples.
Study questions:
1.
2.
3.
4.
What are different models or configurations in distributed computing?
Explain each model in distributed computing base on their properties?
What are the models used in building hybrid model?
How effective are these models in today’s computing?
Reading List
Week 5 and 6: Mobile and Wireless Computing
Objective: At the end of the lectures, students will have an understanding of the concept and
terminologies of mobile and wireless computing and will be able to describe various definition involved.
Description:
Week 5 (First Hour)
Definition of Mobile computing, its concept and components of mobile computing.
Second Hour
Definition of wireless computing, its concept and definition of terms involved.
Week6 (First Hour)
The three data transfer options.
Second Hour
The three data transfer options. (Cont’d)
Study questions:
1.
2.
3.
4.
5.
6.
Define mobile computing
Differentiate between wireless and internet
How does mobile computing works?
How does data been transfer in wireless computing.
What are the components of mobile computing?
Why go mobile?
Reading List:
1. California HealthCare Foundation (2001) Wireless and Mobile Computing
Week 7 and 8: Mobile and Wireless Computing
Objective: At the end of the lectures, students will have an understanding of the mobile computing
devices and their features, limitations and current issues related to the technology and merits and demerits
of mobile and wireless computing.
Description:
Week 7 (First Hour)
Mobile computing devices and their features.
Second Hour
Things that must be present on a devices.
Week 8 (First Hour)
Limitations and current issues related to the data transfer technology in mobile computing.
Second Hour
Merits and demerits of mobile and wireless computing
Study questions:
2.
3.
4.
5.
6.
List different mobile computing devices with atleast three features each.
What are the features of devices used in mobile computing?
Mention advantages of mobile computing
Mention disadvantages of mobile computing
What are the issues related to data transfer technology today.
Reading List:
1. California HealthCare Foundation (2001) Wireless and Mobile Computing
Week 9 and 10: Network Security
Objective: At the end of the lectures, students will have an understanding of what a network security is.
Important of security, the enemies that affect network, what the enemies can do, why network should be
secured and at the same time whom a network administrator is.
Description:
Week 9 (First Hour)
Definition of network security, network administrator
Second Hour
Important of Network security
Week 10 (First Hour)
The enemies that affect network and what they can do
Second Hour
Why network should be secured
Study questions:
1.
2.
3.
4.
5.
6.
Who are the enemies?
Who is a network administrator?
What is network security?
Give reasons why an organization need to protecting her network?
What is the important of network?
What can an administrator do to protect a network?
Reading List:
A Beginner’s guide to Network Security. Available at http://www.cisco.com/tutorial/network security
overview.pdf
Week 11 and 12: Client Server Computing
Objective: At the end of the lectures, students will be able to define a client, server, the relationship
between client and server and the Client-Server Architecture. They will know the advantages and
disadvantage of client server computing.
Description:
Week 11 (First Hour)
Definition of Client, Server and their relationship
Second Hour
Client – Server architecture
Week 12 (First Hour)
Advantages and disadvantages of client server computing.
Second Hour
Advantages and disadvantages of client server computing.
Study questions:
1.
2.
3.
4.
5.
6.
What is a client?
What do you understand by the term Server?
What is the relationship between client and server?
Can break down of either client or server affect the computing arrangement?
What are advantages and disadvantages of Client Server Computing?
What are the advantages of three tier architecture over the two tier architecture?
Reading List:
Week 13: Building Web Application
Objective: At the end of the lectures, students will know step that need to be followed in building web
applications. They will know how web application works and functions. This lesson will also enlighten
the students of the differences between web sites and web applications.
Description:
Week 13
(First Hour)
Definition of websites and web application, their differences and relationship and how web application
works
Second Hour
Steps in building web application
Study questions:
1.
2.
3.
4.
5.
Define web application
What are the differences between websites and web application?
Itemize the steps to be taken in building web application.
Who are the stakeholders in requirement gathering phase of web application development?
What are the documents generated during the requirement gathering phase of web application
development?
Reading List:
Week 14 and 15: Revision Exercise
Objective: These two weeks are specifically left for revision of all the topics and subtopics covered in the
course. Students are expected to ask questions related to the course while the lecturers will also ask the
student question to ascertain their level of understanding of the course.
Revision Questions:
1.
2.
3.
4.
5.
6.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
Who are the enemies?
Who is a network administrator?
What is network security?
Give reasons why an organization need to protecting her network?
What are different models or configurations in distributed computing?
Explain each model in distributed computing base on their properties?
Who are the stakeholders in requirement gathering phase of web application development?
What are the documents generated during the requirement gathering phase of web application
development?
Itemize the steps to be taken in building web application.
Can break down of either client or server affect the computing arrangement?
What are advantages and disadvantages of Client Server Computing?
What are the advantages of three tier architecture over the two tier architecture?
How can computers in a distributed computing arranged?
Do computers in a distributed computing be physically present in a location?
What are the merits of distributed computing?
List different mobile computing devices with atleast three features each.
What are the features of devices used in mobile computing?
What are the issues related to data transfer technology today?
Reading List:
Download