CISK 347 115/515 Data Communications

advertisement

CISK 347.115 – Summer 2014

Texas A&M University Central Texas

Data Communications

CISK 347.115

TR 2:30pm – 5:15pm

Location: FH 207

Instructor: Dr. Randy Brown

Office: FH – 323J

Phone: (254) 519- 5462

Preferred Classroom Communication Method: BlackBoard Messages

Email: rwbrown@ct.tamus.edu

Office Hours:

Location Mon Tues Wed Thurs Fri

FH 323J 16:00-18:00, and by appointment

12:00-14:00, and by appointment

16:00-18:00, and by appointment

12:00-14:00, and by appointment

By

Appointment

Virtual By

Appointment

By

Appointment

By

Appointment

By

Appointment

By

Appointment

Mode of instruction and course access:

TAMUCT Blackboard Learn System ( http://tamuct.blackboard.com

) will be our primary resource for the class information. You will use the Blackboard username and password communicated to you separately to logon to this system. The course syllabus, schedule, supplemental readings, class announcements, power point slides, learning modules, homework assignments, exams and other course related documents will be posted on blackboard. Each student is responsible for the posted material, and should check BlackBoard at least daily for updates. The course outline in this syllabus shows the basic schedule for the semester.

Student-instructor interaction:

Please send all course related correspondence through Blackboard messages. Please use

TAMUCT email only when Blackboard is not available (or for non-course related correspondence). I check email several times a day during the week and at least once during the weekends. I will attempt to respond within 24 hours and within 48 hours on Saturday through

Sunday. Please do not hesitate to stop by my office during the scheduled office hours or contact me via phone / blackboard email or TAMUCT email, if there are any personal problems or challenges that are hindering your regular progress in the course.

UNILERT

Emergency Warning System for Texas A&M University – Central Texas

UNILERT is an emergency notification service that gives Texas A&M University-Central Texas

CISK 347.115 – Summer 2014 the ability to communicate health and safety emergency information quickly via email and text message. By enrolling in UNILERT, university officials can quickly pass on safety-related information, regardless of your location. Please enroll today at TAMUCT.org/UNILERT

Course Information

1.0

Course Overview and description:

This course examines the management and utilization of data communication technologies including technical components, configurations, applications, protocols, legal issues, software and management issues, Local Area Network (LAN) technologies, and security issues. Prerequisite: CIS 501 or approval of department head. This is a cohort course with five mandatory class meetings as scheduled. Students missing any of the class meetings must consult with the professor.

1.1

Prerequisites: Significant experience with personal computers, word processing, spreadsheet, database, and presentation software.

1.2

Students are expected to read this document, and submit all coursework as required.

2.0

Course Objective:

2.1

Student Learning Outcomes

2.1.1

Demonstrate knowledge about a wide range of telecommunication technology and management

2.1.2

Evaluate work conditions and employment responsibilities in telecommunications.

2.1.3

Create material to demonstrate knowledge of telecommunications analysis tools

2.1.4

Develop an in depth detailed knowledge of the topic

2.1.5

Assess security trends and threats to telecommunications

3.0 Required Reading and Textbook(s):

Required Text: Applied Data Communications, James E. Goldman & Phillip T. Rawles

ISBN: 0471346403 4 th ed. Wiley

Note: A student of this institution is not under any obligation to purchase a textbook from a university-affiliated bookstore. The same textbook may also be available from an independent retailer, including an online retailer.

3.1

Supplementary Material: The course textbook may be supplemented with other materials including handouts, oral presentations, industry articles, videos, research paper readings, case studies, power point presentations etc.

3.2

On-Line References TBA

CISK 347.115 – Summer 2014

3.3

Students preferring to use their own computers are required to have products, data encodings, file names, system structure, and products equal to those provided in the computer lab and the server used in class.

3.4

Current publications: The campus library contains numerous books and periodicals relating to Computer Science. The student should take advantage of this resource by visiting the library.

http://www.tarleton.edu/centraltexas/departments/library/

.

4.0

Course Requirements:

4.1

Reading Assignments: All assigned chapters will be used as basis for class and/or blackboard discussions. Study the assigned readings before each class.

4.2

Participation/Discussion Questions: Class attendance is required. The policy as officially stated by the University will be enforced. Students are expected to make arrangements with the instructor before missing a series of classes due to job requirements. Students are responsible for any material missed during an absence. In all cases, the responsibility remains with the students to meet/obtain all course requirements/changes. If you are not present the class period your presentation is scheduled, the presentation grade is zero. Regular course progress is expected. It is each student’s responsibility to review the blackboard and syllabus for the latest information, assignments and examinations. NOTE:

Attendance will be taken each class period. Attendance will count as 20% (200

Points) of your total grade. NOTE: Blackboard Discussion questions will count toward participation.

4.2

Research Paper: Each Student will be required to write a Research Paper. In the required paper, students will select and explore a current topic/trend in technology or a specific career field in technology. It will consist of at least five double spaced pages (not including title page, table of contents, bibliography, appendixes, etc.) in length with 1” margins formatted in APA style. This is a professional paper – do not use informal language. Do not over quote your references, instead summarize what they say in your own words, and provide reference to the article. Every claim you make in the paper should have a peerreviewed academic reference. Wikipedia is NOT academic and should not be used unless it is unavoidable. The paper must be submitted in MS Word format

(.rtf, .doc, .docx). More information about the paper will be distributed by the 4 th week of class. There will be three preliminary deliverables worth 20 points each.

The final paper will be worth the remaining 140. (total: 200pts or 20%).

NOTE: I take a hard line on plagiarism. Plagiarism will not be tolerated.

Any paper containing plagiarism will be given a score of 0 and the student will be referred to Student Affairs for Academic Integrity Violation.

CISK 347.115 – Summer 2014

A grading rubric for the paper can be found in Appendix A: Research Paper

Rubric

4.3

Examinations: There will be a midterm and a final exam worth 200 points

(20%) each. Makeup exams will be given ONLY when arrangements have been made PRIOR to the class meeting. NOTE: Late exams will NOT be accepted.

4.4

Homework: Homework will be assigned after each chapter and is intended to reinforce the concepts discussed in class. Each homework assignment will be worth 20 points, but only the top 10 will count (200 points total).

4.5

Late Submissions: Homework Assignments will be considered late if submitted after the due date/time. Since a Summer session is very short, a late penalty of

10% per DAY (including weekends!) will be applied. That means that NO submissions will be accepted if submitted more than 10 days after the due date.

Any submissions AFTER 10 days will be considered lack of participation and will result in a lower participation score. In addition, discussions (if assigned) MUST be completed within the week during which the discussion is assigned (i.e. late discussions will NOT be allowed). Late tests will NOT be accepted!

NOTE: NO work will be accepted after the last day of “class” (7/25/2014).

4.6

Other Notes about assignments:

4.7.1

All assignments will be zipped prior to submission to BlackBoard – any unzipped assignments will not be accepted.

4.7.2

If there are multiple parts, submit all parts in a SINGLE zip file. I would suggest you create a folder for each assignment, then you can zip that entire folder at once…

4.7.3

Make sure all programs are labelled in a logical manner that makes it easy for me to figure out which program is which.

4.7.4

All assignments will be posted in BB with a value of 100 points, regardless of how many “points” they actually count toward your final grade.

5.0

Grading Criteria Rubric and Conversion

Assignment Points Percent My Grade Percentage Points Grade

Mid-Term Exam

Final Exam

200

200

20%

20%

90.0-100%

80.0-89.9%

900-1000

800-899

A

B

Term Paper

Homework

Participation

Total

200

200

20%

20%

200 20%

1000 100%

70.0-79.9% 700-799

60.0-69.9% 600-699

0-59.9% 0-599

C

D

F

CISK 347.115 – Summer 2014

6.0

Posting of Grades:

All student grades will be posted on the Blackboard Grade book and students should monitor their grading status through this tool. Grades for weekly assignments, discussions, quizzes and exams should be posted (no guarantees) within 5 days following the due date.

7.0

Technology Requirements and Support

7.1

Technology Requirements

This course will use the TAMU-CT Blackboard Learn learning management system for class communications, content distribution, and assessments. Logon to http://tamuct.blackboard.com

to access the course.

Username: Your Tarleton email address (the complete email address, e.g. john.doe@go.tarleton.edu)

Initial password: Your DuckTrax ID (UID)

For this course, you will need reliable and frequent access to a computer and to the Internet. You will also need a headset with a microphone or speakers and a microphone to be able to listen to online resources and conduct other activities in the course. If you do not have frequent and reliable access to a computer with

Internet connection, please consider dropping this course or contact me at rwbrown@ct.tamus.edu to discuss your situation.

Blackboard supports the most common operating systems:

PC: Windows 8, Windows 7, Windows Vista

Mac: Mac OS X 10.9 (Mavericks), 10.8 (Mountain Lion), and 10.7 (Lion)

NOTE: Computers using Windows XP, Windows 8 RT and OS X 10.6 or lower are NO longer supported!

Check browser and computer compatibility by following the “Browser Check” link on the TAMUCT Blackboard logon page. ( http://tamuct.blackboard.com

) This is a

CRITICAL step as these settings are important for when you take an exam or submit an assignment.

Upon logging on to Blackboard Learn, you will see a link to Blackboard Student

Orientation under My Courses tab. Click on that link and study the materials in this orientation course. The new Blackboard is a brand-new interface and you will have to come up to speed with it really quickly. This orientation course will help you get there. There is also a link to Blackboard Help from inside the course on the left-hand menu bar. The first week of the course includes activities and assignments that will help you get up to speed with navigation, sending and receiving messages and discussion posts, and submitting an assignment. Your ability to function within the Blackboard system will facilitate your success in this course.

CISK 347.115 – Summer 2014

Technology issues are not an excuse for missing a course requirement – make sure your computer is configured correctly and address issues well in advance of deadlines.

7.2

Technology Support

For technological or computer issues, students should contact the TAMU-CT

Blackboard Support Services 24 hours a day, 7 days a week:

Email: helpdesk@tamu.edu

Support Portal: http://www.ct.tamus.edu/bbsupport

Online chat:

http://hdc.tamu.edu

Phone: (254)-519-5466

8.0

Complete Course Calendar (Subject to Change)

Class Date Chapter(s) Assignment(s) Due!

1

2

3-Jun

Syllabus/Introductions

Chapter 1

5-Jun Chapter 2

10-Jun Chapter 3

12-Jun Chapter 4

CISK 347.115 – Summer 2014

Syllabus Acknowledgement

Introduction Discussion

Chapter 1 Odd End of Chapter Review Questions

Chapter 2 Even End of Chapter Review Questions

Paper Topic Due

3

4

5

6

7

8

17-Jun Chapter 5

19-Jun Chapter 7

24-Jun Mid-Term "Review"

26-Jun

Mid-Term Exam

(Covers Chapters 1-5, 7)

1-Jul Chapter 6

3-Jul Chapter 8

8-Jul Chapter 9

10-Jul Chapter 10

15-Jul Chapter 11

17-Jul Chapter 12

22-Jul Final Exam "Review"

24-Jul

Chapter 3 Odd End of Chapter Review Questions

Chapter 4 Even End of Chapter Review Questions

Chapter 5 Odd End of Chapter Review Questions

Chapter 7 Odd End of Chapter Review Questions

Mid-Term Due

Paper Outline Due

Chapter 6 Even End of Chapter Review Questions

Chapter 8 Even End of Chapter Review Questions

Paper Rough Draft Due

Chapter 9 Odd End of Chapter Review Questions

Chapter 10 Even End of Chapter Review Questions

Chapter 11 Odd End of Chapter Review Questions

Final Paper Due

Chapter 12 Even End of Chapter Review Questions

Final Exam Due

Final Exam

(Covers Chapters 6, 8-12)

CISK 347.115 – Summer 2014

9.0

Drop Policy

If you discover that you need to drop this class, you must go to the Records Office and ask for the necessary paperwork. Professors cannot drop students; this is always the responsibility of the student. The record’s office will provide a deadline for which the form must be returned, completed and signed. Once you return the signed form to the records office and wait 24 hours, you must go into Duck Trax and confirm that you are no longer enrolled. Should you still be enrolled, FOLLOW-UP with the records office immediately? You are to attend class until the procedure is complete to avoid penalty for absence. Should you miss the deadline or fail to follow the procedure, you will receive an

F in the course.

10.0

Academic Integrity

Texas A&M University - Central Texas expects all students to maintain high standards of honor in personal and scholarly conduct. Any deviation from this expectation may result in a minimum of a failing grade for the assignment and potentially a failing grade for the course. All academic dishonesty concerns will be reported to the university's Office of Student Conduct. Academic dishonesty includes, but is not limited to, cheating on an examination or other academic work, plagiarism and improper citation of sources, using another student's work, collusion, and the abuse of resource materials. When in doubt on collaboration, citation, or any issue, please contact me before taking a course of action. More information can be found at

http://www.tamuct.edu/departments/studentconduct/academicintegrity.php

.

11.0

Disability Support Services

If you have or believe you have a disability and wish to self-identify, you can do so by providing documentation to the Disability Support Coordinator. Students are encouraged to seek information about accommodations to help assure success in their courses. Please cIf you have or believe you have a disability and wish to selfidentify, you can do so by providing documentation to the Disability Support

Coordinator. Students are encouraged to seek information about accommodations to help assure success in their courses. Please call (254) 501-5831 or visit Founder's

Hall 114, Suite 114. Additional information can be found at

http://www.tamuct.edu/departments/disabilitysupport/index.php

.

12.0

Tutoring

CISK 347.115 – Summer 2014

Tutoring is available to all TAMUCT students, both on-campus and online. Subjects tutored include Accounting, Finance, Statistics, Mathematics, and Writing. Tutors are available at the Tutoring Center in Warrior Hall, Room 111. Visit www.ct.tamus.edu/AcademicSupport and click "Tutoring Support" for tutor schedules and contact info. If you have questions, need to schedule a tutoring session, or if you're interested in becoming a tutor, contact Academic Support Programs at 254-501-5830 or by emailing tutoring@ct.tamus.edu.

Chat live with a tutor 24/7 for almost any subject on your computer! Tutor.com is an online tutoring platform that enables TAMUCT students to log-in and receive FREE online tutoring and writing support. This tool provides tutoring in Mathematics, Writing,

Career Writing, Chemistry, Physics, Biology, Spanish, Calculus, and Statistics. To access

Tutor.com, log into your Blackboard account and click "Online Tutoring.”

13.0

Library Services

Library distance education services aims to make available quality assistance to

A&M-Central Texas students seeking information sources remotely by providing digital reference, online information literacy tutorials, and digital research materials.

Much of the TAMUCT collection is available instantly from home. This includes over half of the library's book collection, as well as approximately 25,000 electronic journals and 200 online databases. Library Distance Education Services are outlined and accessed at:

http://www.tamuct.edu/departments/library/deservices.php

.

Information literacy focuses on research skills which prepare individuals to live and

work in an information-centered society. Librarians will work with students in the development of critical reasoning, ethical use of information, and the appropriate use of secondary research techniques. Help may include, but is not limited to: the

14.0

exploration of information resources such as library collections, the identification of appropriate materials, and the execution of effective search strategies. Library

Resources are outlined and accessed at:

http://www.tamuct.edu/departments/library/index.php

Any instructor policies related to absence, grading, etc

Grading. Grades are not given; the student earns them. Rubrics are employed whenever possible to assure that the grading of an individual assignment is consistent. There are always disagreements about the grade given to a work product and a student’s expectation; students are encouraged to make sound well-reasoned arguments as to why they should receive more points. Arguments that are not well-reasoned include:

1.

I need a better grade because I am on probation.

2.

I come from a good family.

3.

I will be deported.

4.

I will lose my scholarship.

5.

I think it is an A paper

CISK 347.115 – Summer 2014

15.0

Instructor’s Personal Statement:

1.

Instructor reserves the right to modify the syllabus during the course of the semester for the benefit of the students.

2.

Instructor reserves the right to supplement the material presented in the text with addition material that may benefit the students by either providing additional information or a different point of view.

3.

Instructor expects that the students will act in a curious and professional manner in all interactions with other students and the instructor.

4.

Instructor reserves the right to modify grading rubrics. Changes to grading rubrics are only made to current and/or future assignments.

5.

Any changes made will be announced in class and posted on BlackBoard.

CISK 347.115 – Summer 2014

Appendix A

Research Paper Rubric

NOTE: The total points will be adjusted to 140 (70%), so a 200 (max) will result in 70% of the paper grade – the remaining 30% comes from the preliminary deliverables as described in the assignments section of the syllabus.

Criteria

Focus on topic

Citations and

References

Spelling &

Grammar

Writing

Style

Points Exceeds Criteria Met Criteria

100

50

25

25

Papers that go above and beyond can receive up to

25 additional points

N/A

N/A

N/A

Paper clearly addresses the assigned topic =

100 points

Peer reviewed journals, APA format citations and references, unavoidable

URLs = 50 points

Active voice used, no spelling and no grammar problems. = 25 points

Writing is clear and academic.

No first person, no contractions, no informal language = 25 points

Partially Met

Criteria

Paper does not clearly address topic

= 80

Peer reviewed journals, but not APA format citations and references =

25 points

Less than ten spelling or grammar issues

(including use of passive voice) = 12 points

Less than three uses of informal language = 12 points

Did Not meet

Criteria

Paper does not meet the objectives of the assignment = 0 points

Not peer reviewed journals, or no citations, or

URLs used as references, or other problem =

0 points

More than ten spelling or grammar issues

(including use of passive voice) =

0 points

Use of first person or more than three uses of informal language = 0 points

CISK 347.115 – Summer 2014

Appendix A

Module Objectives

Module 0: Introduction

Objectives:

1.

Ensure students have access to all materials necessary for the class

2.

Ensure students have a clear understanding of what they can expect during the class

3.

Ensure students know what the instructor expects from them

4.

Introduce students and instructor to each other

Module 1: Introduction to Data Communications

Goldman/Rawles, Chapter 1

Objectives:

At the end of this module, students should be able to:

1.

Understand today's data communications industry as a system of interacting components

2.

Describe the current state of the data communications industry, as well as the major issues facing each of the industry's constituent components

3.

Discuss the challenges and solutions to business-oriented data communications analysis

4.

Understand the importance of structured models to successful business-oriented data communications analysis

5.

Describe the relationship of network analysis and design to information systems analysis and design

6.

Discuss career opportunities in data communications and the job skills required to succeed in this field

SLO(s) Targeted:

2.1.1 Define fundamental Network terms, and protocols

2.1.3 Demonstrate knowledge about careers in networking

2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts

Module 2: Data Comm Concepts

Goldman/Rawles, Chapter 2

Objectives:

At the end of this module, students should be able to:

1.

Identify organizations that set standards for networking

2.

Describe the purpose of the OSI model and each of its layers

3.

Explain specific functions belonging to each OSI model layer

4.

Understand how two network nodes communicate through the OSI model

CISK 347.115 – Summer 2014

5.

Discuss the structure and purpose of data packets and frames

6.

Describe the two types of addressing covered by the OSI model

SLO(s) Targeted:

2.1.1 Define fundamental Network terms, and protocols

2.1.2 Describe the OSI Model Layers and Protocols.

2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts

Module 3: The Physical Layer

Goldman/Rawles, Chapter 3

Objectives:

At the end of this module, the student should be able to:

1.

Explain basic data transmission concepts, including full duplexing, attenuation, latency, and noise

2.

Describe the physical characteristics of coaxial cable, STP, UTP, and fiber-optic media

3.

Compare the benefits and limitations of different networking media

4.

Explain the principles behind and uses for serial cables

5.

Identify wiring standards and the best practices for cabling buildings and work areas

Course SLO(s) Targeted:

2.1.1 Define fundamental Network terms, and protocols

2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts

Module 4: The DataLink Layer

Goldman/Rawles, Chapter 4

Objectives:

At the end of this module, the student should be able to:

1.

Identify and explain the functions of the core TCP/IP protocols

2.

Explain the TCP/IP model and how it corresponds to the OSI model

3.

Discuss addressing schemes for TCP/IP in IPv4 and IPv6 and explain how addresses are assigned automatically using DHCP (Dynamic Host Configuration Protocol)

4.

Describe the purpose and implementation of DNS (Domain Name System)

5.

Identify the well-known ports for key TCP/IP services

6.

Describe how common Application layer TCP/IP protocols are used

Course SLO(s) Targeted:

2.1.1 Define fundamental Network terms, and protocols

CISK 347.115 – Summer 2014

2.1.2 Describe the Application Layers and Protocols.

2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts

Module 5: Voice Communications

Goldman/Rawles, Chapter 5

Objectives:

At the end of this module, the student should be able to:

1.

Describe the underlying technical concepts for voice transmission, voice digitization, voice compression, and data/voice integration (convergence)

2.

Define and compare available voice-related technology including PBXs, voice digitizers, and voice/data multiplexers and modems

3.

Know and describe the functionality, standards, business impact, and technology involved with computer telephony integration

4.

Discuss the functionality, concepts, standards, business impact, and technology involved with voice network services, voice transmission alternatives, and voice/data integration

Course SLO(s) Targeted:

2.1.1 Define fundamental Network terms, and protocols

2.1.2 Describe the OSI Layers and Protocols

2.1.3 Demonstrate knowledge about careers in networking

2.1.4 Demonstrate knowledge of security as it applies to networks

2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts

Module 6: Network, Transport, & Session Layers; LANs

Goldman/Rawles, Chapter 7

Objectives

At the end of this module, the student should be able to:

1.

Describe protocol encapsulation

2.

Discuss address resolution and its role in the delivery of data

3.

Compare and contrast frames and packets

4.

Describe the network, transport and session layers of the OSI Model

5.

Differentiate between connectionless and connection-oriented protocols

6.

Compare and contrast the IPX/SPX protocols and TCP/IP protocols

7.

Describe the applications and limitations of the NetBEUI and DLC communications protocols

Course SLO(s) Targeted:

2.1.1 Define fundamental Network terms, and protocols

2.1.2 Describe the OSI Layers and Protocols

CISK 347.115 – Summer 2014

2.1.3 Demonstrate knowledge about careers in networking

2.1.4 Demonstrate knowledge of security as it applies to networks

2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts

Module 7: WANs

Goldman/Rawles, Chapter 6

Objectives:

At the end of this module, the student should be able to:

1.

Discuss drivers and issues surrounding WAN design and network convergence

2.

Describe the advantages and limitations of WAN technologies

3.

Demonstrate and understanding of WAN standards

4.

Describe interrelationships and dependencies of WAN architecture components

5.

Compare and contrast x.25, frame relay, cell relay, ATM, MPLS, SONET and other WAN concepts

6.

Discuss the digital services hierarchy

Course SLO(s) Targeted:

2.1.1 Define fundamental Network terms, and protocols

2.1.2 Describe the OSI Layers and Protocols

2.1.3 Demonstrate knowledge about careers in networking

2.1.4 Demonstrate knowledge of security as it applies to networks

2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts

Module 8: Network Design

Goldman/Rawles, Chapter 8

Objectives:

At the end of this module, the student should be able to:

1.

Describe the IP routing process and the difference between routing and layer 3 switching

2.

Define proper classful and variable length subnet masks for a given IP address that will meet network design requirements

CISK 347.115 – Summer 2014

3.

Describe the advantages and proper use of variable length subnet masking and classless inter-domain routing addresses

4.

Describe IPv6 protocols and methods of transitioning to IPv6

Course SLO(s) Targeted:

2.1.1 Define fundamental Network terms, and protocols

2.1.2 Describe the OSI Layers and Protocols

2.1.4 Demonstrate knowledge of security as it applies to networks

2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts

Module 9: LAN Operating Systems and Remote Access

Goldman/Rawles, Chapter 9

Objectives:

At the end of this module, the student should be able to:

1.

Describe the basics of network operating systems functionality and the implementation of

LAN software

2.

Compare peer-to-peer and client/server, operating systems architectures

3.

Describe the roles of client network operating systems and the universal client

4.

Describe how to analyze functional networking requirements and match those requirements to available technology

Course SLO(s) Targeted:

2.1.1 Define fundamental Network terms, and protocols

2.1.4 Demonstrate knowledge of security as it applies to networks

2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts

Module 10: The Network Development Life Cycle

Goldman/Rawles, Chapter 10

Objectives:

At the end of this module, the student should be able to:

1.

Compare the network development life cycle (NDLC) to other systems development architectures and life cycles

2.

Explain the NDLC including: overall issues, process structure, detailed activates of each step, coping with multiprotocol/multivendor environments

3.

Describe the advantages, disadvantages, and costs of NDLC tools available

4.

Explain the stages of the NDLC and the role of vendors at each stage

Course SLO(s) Targeted:

2.1.1 Define fundamental Network terms, and protocols

2.1.2 Describe the OSI Layers and Protocols

CISK 347.115 – Summer 2014

2.1.4 Demonstrate knowledge of security as it applies to networks

2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts

Module 11: Network Management

Goldman/Rawles, Chapter 11

Objectives:

At the end of this module, the student should be able to:

1.

Describe the business motivations and forces at work in the current systems administration and network management arena

2.

Contrast the differences between systems administration and network management processes and where/how they may be implemented effectively

3.

Describe the protocols and technology associated with each area of systems administration and network management

Course SLO(s) Targeted:

2.1.1 Define fundamental Network terms, and protocols

2.1.4 Demonstrate knowledge of security as it applies to networks

2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts

Module 12: Network Security

Goldman/Rawles, Chapter 12

Objectives:

At the end of this module, the student should be able to:

1.

Describe the concepts, protocols, standards, and technology related to Network Security, such as: virus protection, firewalls, authentication, encryption, etc.

4.

Discuss the processes involved with developing and implementing a comprehensive security policy and architecture management

Course SLO(s) Targeted:

2.1.1 Define fundamental Network terms, and protocols

2.1.4 Demonstrate knowledge of security as it applies to networks

CISK 347.115 – Summer 2014

2.1.5 Demonstrate an in depth knowledge about a range of network terms and concepts

Download