Course Outline (Word)

advertisement
EET465 Course Outline for Term 2004-10
Instructor
Pui-Chor Wong
Office Hours
As posted in the faculty office and on eCollege (http://www.devryu.net)
Course No.
Course Name
Contact
Hours
EET465
Data Communications and Networking
4
Credit Hours
4
Calendar Course Description
This course is devoted to digital and data communications systems techniques. Topics include digital
modulation systems; noise effects; multiplexing methods; information theory fundamentals; protocols;
transmission methods; and computer network architecture, installation and troubleshooting.
Course Prerequisites
Course No. Course Name
EET-368
Communications Systems
Course Co-requisites
Course No. Course Name
EET465L
Data Communications and Networking Lab
Required Textbooks
Tomasi, W. (2004). Electronic Communications Systems
Fundamental through Advanced, 5th Edition. Prentice-Hall Inc.,
Englewood Cliffs, NJ.
Writing Research Papers 9th/10th Edition. Lester & Lester Jr.
Supplemental
References
Windows 2000
1
Major Topics
 Information Theory – Source and channel coding
 Digital Communications – Information capacity, FSK,PSK,QAM
 Introduction to Telecommunications- Local loop signaling, Traffic Engineering
 Introduction to Networking- Layered Models, Data link layer, Physical layer Multiple Access
Protocols
 Local Area networking
 Internetworking with TCP/IP
Course Evaluation
Assignments and Inclass:
Quizzes (1 drop):
Final Exam:
Bonus:
20%
40%
40%
10%
2
Course Terminal Objectives
Module I: Information Theory
1.
Given the specifications of a communication system including symbol code set, and a band-limited channel, calculate
system performance parameters such as symbol probability, average code length, code efficiency and channel capacity.
2.
Given a discrete set of symbols such as that of a keyboard, design a uniquely decodeable fixed and variable length source
codes which represents the data and compare and contrast the efficiencies of the two codes with each other and with the
theoretical limits of the symbol set.
3.
Given a stream of source data, implement at least three methods for error detection and/or correction and compare and
contrast the cost/benefit of the added bits in terms of throughput.
Module II: Digital Communications
1.
Given the four major digital modulation schemes (ASK, PSK, FSK, QAM), compare and contrast each with respect to
bandwidth requirements and ease of demodulation.
2.
Given a PSK or QAM modulation system, draw the constellation diagram and discuss bit-error rate as it relates to the
constellation diagram.
3.
Given each of the digital modulation schemes, illustrate methods of demodulation so that the original data stream is
successfully recovered.
4.
Given a communication application with specific power constraints (Eb/No), select a digital modulation method and provide
justification.
Module III: Introduction To Telecommunications
1.
Given a signaling operation (Off-hook, DTMF, dial-tone, etc.) in a local loop, classify the signaling function as alerting,
attending, supervisory or testing and show how system control is interpreted.
2.
Given the digital hierarchical system of the public switched telephone network, and the required traffic flow between multiple
systems, design a system to meet traffic flow using a minimum number of T1 switches and Digital Access and Crossconnect Systems (DACS).
3.
Given a specified number of resources and a specified amount of traffic, design a system using Erlang-B tables a specified
grade of service (GOS).
4.
Given a fully available blocking switch and a cost constraint, calculate the blocking and non-blocking factors for maximum
switch throughput using a minimum number of crosspoints.
Module IV: Introduction to Networking
1.
Given an example network system, interpret the major functions of the network as they relate to the seven layer OSI model
and TCP/IP.
2.
Given a datalink protocol, demonstrate each step in transmitting a data frame between two adjacent nodes including
supervisory frames, information frames, and unnumbered frames.
3.
Given a system which utilizes a multiple access protocol such as Ethernet, illustrate data encoding, frame format and
methods used for bus contention and collision control. Demonstrate how performance is affect by bus length, probability of
transmission and number of stations.
Module V: Local Area Networking
1.
Given a case study of a small office, design all necessary network configuration, user accounts, workgroups to effectively
service the users as defined by the case study.
2.
Given a case study of a small network system, design all necessary security precautions needed to limit access as defined
by the case study.
3.
Given a case study with a defined network configuration, design a printer capability and a method and schedule for backing up
the network data.
Module VI: Internetworking with TCP/IP
1.
Given a network layer protocol, diagram each step in transmitting a sequence of frames between two end users using both
connection-oriented and connectionless routing using the Internet Protocol (IP).
2.
Using the Transport Control Protocol (TCP) utilized on the Internet, describe how a connection is established, and how data
is transferred so that reliable communication is obtained to reach as specified quality of service.
3.
Given the Internet, diagram an e-mail connection, such as Eudora using the TCPIP protocol.
4.
Given the Internet, describe how HyperText Transfer Protocol (HTTP) is used to provide server side services for the WWW
through the use of Web pages.
3
Instructor Notes

Assignments are due at the beginning of the class period on the due date.

There will be no makeup for assignments and quizzes. Make-up for final examination will be
granted under special circumstances such as sickness. In such case, doctor's note will be
required. Furthermore, there is no midterm examination.

Late assignments (after the due time on the due date) will not be accepted.
Classroom Policy
1
Disruption in class will result in being dismissed from the classroom and/or any disciplinary
action
2
Any additions as discussed/suggested by the class.
Plagiarism is a serious issue and can result in penalties in both course and lab work.
On Plagiarism
In speaking or writing, plagiarism is the intentional or unintentional act of representing someone
else's work as one's own. In addition, plagiarism is defined as using the essential style and manner of
expression of a source as if it were one's own. If there is any doubt, the student should consult his or
her instructor, or document the source in a footnote or other form of citation. Any statement made
without documentation will be interpreted as the student’s own words and may therefore be
interpreted as plagiarism.
Your work in this course may be submitted to turnitin.com, an online plagiarism-checking
service. Turnitin.com operates a secure database and protects your privacy by assigning code
numbers, not student names, to all student work stored in its database. The purpose of using this
service is to help protect the integrity of a DeVry credential, which in turn helps protects your
investment in a DeVry education. We will assume we have your consent to submit gradable work in
this course to turnitin.com unless you indicate otherwise.
4
EET465L Course Outline for Term 2004-10
Instructor
Pui-chor Wong
Office Hours
As posted in Academics and on eCollege (http://www.devryu.net)
Course No.
EET465L
Course Name
Contact
Hours
Data Communications and Networking Lab
2
Credit Hours
1
Calendar Course Description
Students gain practical experience by constructing digital/data modulation and demodulation circuits.
System-performance measurements are made, and experience is provided in troubleshooting defective
systems. Local area network installation and troubleshooting are also included.
Course Prerequisites
Course No. Course Name
Course Co-requisites
Course No. Course Name
EET465
Required Textbooks
Supplemental
References
Data Communications and Networking
Instructor supplied lab handout and instruction
Course Evaluation

Each Lab counts equally towards the final LAB grade.
5
Course Terminal Objectives
Module I: Information Theory
1.
Given a text file, write a C++ program which will calculate the each symbols probability, calculate the
source character set’s entropy, generate a new binary code using Huffman encoding, and finally
compress the file using the new huffman code.
2.
Given an ASCII text file write a C++ program which will calculate the needed parity bits to be added
to generate a valid hamming code word, transmit the character out the serial port to another computer
which will regenerate the original ASCII code word.
Module II: Digital Communications
1.
Using a circuit or an equipment which can generate ASK, FSK, and PSK, analyze the bandwidth
generated by each modulation technique and determine the throughput capability on a bandlimited
channel.
2.
Using a bandlimited channel with a white noise error source, transmit data using FSK, PSK and
QAM, analyze the received data and determine the bit error rate as a function of noise.
Module III: Introduction To Telecommunications
1.
Given a classical telephone, an A/D circuit with variable sampling rate, and a D/A circuit, determine
the effects of variable sampling rates on voice quality.
2.
Given up to 24 data channels and a specified input data rate, design a system to multiplex and demultiplex the data channels into a T1 frame.
Module IV: Introduction to Networking
1.
Given a particular data link protocol, such as HDLC, transmit data between two adjacent computers
fully implementing the protocol and verify that data was transmitted properly.
2.
Using software simulation, simulate data transmission between two adjacent computers and analyze
data link performance while varying data-link parameters, such as frame length, window size, and
protocol.
Module V: Local Area Networking
1.
Given a local area network plan, install all software and install all hardware necessary to implement
the plan.
2.
Using a case study of a small office environment, design and implement a network architecture to
allow all users the proper access to network software while maintaining proper security precautions.
3.
Using a case study for a small office, set up a printing environment which most effectively utilizes
hardware resources and office space.
VI: Internetworking with TCP/IP
1.
Using a protocol analyzer, monitor the data traffic on a network trunk and create a report on the
packet structure, packet function and packet routing employed.
2.
Using a computer software, simulate data transmission between two non-adjacent computers and
analyze network performance while varying system parameters such as routing algorithms and
protocol used.
6
Course Notes









Lab attendance is mandatory, and no credit will be given for absentees.
Labs will be handed out prior to lab period or made available on the network.
A signature (either the Instructor or course F.A.s) is required for each lab and it should reflect the
fact that the lab was performed during the lab period.
Group work is permitted. (Maximum group size is as indicated by the Instructor)
One lab report per group. (The writer of the report should alternate for each report and also be
clearly indicated on the report).
Lab due dates and times are as indicated in the due date file (465duedate.doc on website and/or
network).
Late labs will not be accepted.
The STANDARD LAB REPORT FORMAT should be used for all reports.
A minimum of 1 week will be allotted to each lab.
On Plagiarism
In speaking or writing, plagiarism is the intentional or unintentional act of representing someone
else's work as one's own. In addition, plagiarism is defined as using the essential style and manner of
expression of a source as if it were one's own. If there is any doubt, the student should consult his or
her instructor, or document the source in a footnote or other form of citation. Any statement made
without documentation will be interpreted as the student’s own words and may therefore be
interpreted as plagiarism.
Your work in this course may be submitted to turnitin.com, an online plagiarism-checking
service. Turnitin.com operates a secure database and protects your privacy by assigning code
numbers, not student names, to all student work stored in its database. The purpose of using this
service is to help protect the integrity of a DeVry credential, which in turn helps protects your
investment in a DeVry education. We will assume we have your consent to submit gradable work in
this course to turnitin.com unless you indicate otherwise.
7
STANDARD LAB REPORT FORMAT
Title Page and abstract
Includes:
-Title of experiment
-Name of course
-Name of instructor
-Name of author and partner(s)
-Date
-Adequate motivation
Objective/Purpose
Tells why the experiment was performed and
what results are anticipated. This section
often interprets the purpose of the lab
experiment as provided by the instructor.
Equipment and Parts
This is a list of the components and test
equipment used to perform the lab
experiment.
Experimental Data and Observations
(Raw Data)
Documents (without a detailed analysis) what
happened during the performance of the lab.
Records and presents the data, tables, charts,
calculations and evidence of where this
information was derived from (ie. equations,
textbooks, class-notes, multimeter, etc).
Discussion of Results/
Questions and Answers
This is a detailed analysis and discussion of
the results of the experiment, plus a
comparison of the results with theoretical
expectations (ie. Did the data prove or
disprove your theory? Why might the lab not
have worked?) Any questions posed in the lab
handout are answered here.
Conclusion
Contains a concise description of the
conclusions. Includes a statement of whether
or not the objectives were met and any
recommendations you may have.
Note: Your report should be Times New Roman, size 12 fonts. Figures and tables should be labeled
properly.
8
Download