Assignment Policy - Syracuse University

advertisement
Syracuse University
GET439 – Enterprise Technologies
Instructor:
Telephone:
Email:
Office:
Dave Dischiave
315-443-4681
ddischia@syr.edu
225 Hinds Hall
School of Information Studies
Course Syllabus - Fall 2013
Location:
Hinds 018; Lab 010
Day:
Tu/Th
Time:
9:30 – 10:50 am
Office Hours: Tue. 2 - 3 pm
Course Overview
GET439 builds an understanding of the technical and management architecture that comprise
enterprise computing environments. The course focuses on identifying and solving large complex
problems by using enterprise computing technologies. Also, included are the basic architecture and
technology principles that comprise enterprise computing environments. The course addresses the
analysis of the underlying computer hardware and software architecture including: operating systems,
as well as, the management issues relating to enterprise and distributed computing systems, enterprise
applications, databases, security, application development policies, standards and guidelines, software
procurement, custom development, operating system selection: z/OS, Linux, Windows, various
application development and deployment environments, discussion of software sourcing issues,
software reuse design, software maintenance, change control and configuration management.
Prerequisites None
Course Objectives
At the completion of this course students will be able to:

Identify and solve large complex problems

Describe enterprise technology concepts

Evaluate the use of enterprise technologies

Evaluate the use multi-tier architectures for large scale systems

Describe key architectural concepts used in enterprise systems including transaction
processing and messaging & queuing

Describe key enterprise data structure concepts including different database and file
management systems

Use large enterprise computing systems to build enterprise objects
Resources: There are a variety of articles that complement the textbook located in the
Blackboard Learning Modules for this course, URL: https://blackboard.syr.edu.



Englander, I., The Architecture of Computer Hardware and Systems Software &
Networking, (4th ed), Hoboken, NJ, John Wiley & Sons Inc. 2009, ISBN 978-0-47171542-9
Ebbers, M., O’Brien, W., Ogden, B., Introduction to the New Mainframe: zOS
Basics, (2nd ed), International Business Machines Corp. 2011, SG24-6366-01
(provided on Blackboard)
Miller, Lawrence, IBM Software for System z for Dummies, Hoboken, NJ, John
Wiley & Sons Inc. 2013, ISBN: 978-1-118-50128-3 (provided on Blackboard)
1
Syracuse University
GET439 – Enterprise Technologies
School of Information Studies
Course Syllabus - Fall 2013
Grading Policy
Final grades will be based on the number of points earned throughout the semester
according to the table below.
Grade
A
AB+
B
B-
Points
500
474
454
434
414
475
455
435
415
395
Grade
C+
C
CD
F
Points
394
374
354
334
314
375
355
335
315

Class Participation (50 points)

Preparation - There are a number of readings, tutorials and workshops that should be
completed prior to class. This will facilitate both class discussions and lab exercises. There are a
number of good resources in Blackboard so be sure to familiarize yourself with them.

Discussion – There will be discussion activities that include your responses to case study
questions, discussion questions and real world problems in nearly every class. There are no
provisions to make up missed class discussion activities. Therefore, it is important that you
attend class.
Assignments (250 points)

Labs (200 points) – There will be ten (10) labs that will reinforce the concepts and principles
covered in our classroom lectures, readings and discussions.

Enterprise Technology Project (50 points) – There will be one project. This assignment will
reflect your ability to use the enterprise technologies learned in this course to solve technology
problems. For more detail, see the Enterprise Technology Project Guidelines.
Exams (200 points)

Exams (100 points) – There will be two (2) exams. These exams will be based on class
lectures, readings, labs and other course related activities.

Final Exam (100 points) – There will be a final exam that will consist of a variety of questions
and problems. It will be comprehensive and cover all of the topics presented during the
semester. When you come to the exam bring with you all of the resources you will need to be
successful since this will be an open book, open notes, open lab exam.
Assignment Policy

Assignments Due Dates - All reading (and video viewing) and discussion posting (i.e.
Enterprise News) assignments are due on the Tuesday of the week indicated on the syllabus. All
non-reading assignments (labs, models etc.) are due on the Thursday of the week indicated on
the syllabus. Late assignments will be accepted; but will be assessed a reduction in points. Use
the point system judiciously so that you can compensate for missed assignment due dates.

Assignment Format - You are responsible for getting assignments from/to the instructor for
missed classes. All assignments are to be prepared using word processing software. Space and
one half, 12 font is the accepted format.
2
Syracuse University
GET439 – Enterprise Technologies
School of Information Studies
Course Syllabus - Fall 2013
University Policies
Add/drop Process and Course Withdrawal Policy
It is the responsibility of the students to be fully informed of the college catalog policies regarding
course add, drop and withdrawal policies. For more information about the Syracuse University
Add/drop Process and Course Withdrawal Policy, please see the following web site:
http://www.suce.syr.edu/students/current/registrar/adddrop.htm
Statement of Academic Integrity
The academic community of Syracuse University and of the School of Information Studies requires
the highest standards of professional ethics and personal integrity from all members of the
community. Violations of these standards are violations of a mutual obligation characterized by trust,
honesty, and personal honor. As a community, we commit ourselves to standards of academic
conduct, impose sanctions against those who violate these standards, and keep appropriate records of
violations. The academic integrity statement can be found at:
http://supolicies.syr.edu/ethics/acad_integrity.htm
Respect Intellectual Property Rights and cite all sources in your work. Any valid citation style may be
used. The following link may be used for further information regarding appropriate citation styles:
http://library.syr.edu/cite/citationstyle.html
Ownership of Student Work Policy
In compliance with the Federal Family Educational Rights and Privacy Act, works in all media
produced by students as part of their course participation at Syracuse University may be used for
educational purposes, provided that the course syllabus makes clear that such use may occur. It is
understood that registration for and continued enrollment in a course where such use of student works
is announced constitutes permission by the student. After such a course has been completed, any
further use of student works will meet one of the following conditions: (1) the work will be rendered
anonymous through the removal of all personal identification of the work’s creator/originator(s); or
(2) the creator/originator(s)’ written permission will be secured. As generally accepted practice,
honors theses, graduate theses, graduate research projects, dissertations, or other exit projects
submitted in partial fulfillment of degree requirements are placed in the library, University Archives,
or academic departments for public reference.
Disability Statement Policy
In compliance with section 504 of the Americans with Disabilities Act (ADA), Syracuse University is
committed to ensure that “no otherwise qualified individual with a disability…shall, solely by reason
of disability, be excluded from participation in, be denied the benefits of, or be subjected to
discrimination under any program or activity…” If you feel that you are a student who may need
academic accommodations due to a disability, you should immediately register with the Office of
Disability Services (ODS) at 804 University Avenue, Room 308 3rd Floor, 315.443.4498 or
315.443.1371 (TTD only). ODS is the Syracuse University office that authorizes special
accommodations for students with disabilities.
3
Syracuse University
GET439 – Enterprise Technologies
School of Information Studies
Course Syllabus - Fall 2013
Attendance Policy
Regular class attendance is obligatory. An instructor may recommend that a student be dropped from
a course for poor achievement due to excessive absence. A student who is dropped after the deadline
for dropping courses may be assigned a grade of F.
Students who have two unexcused absences during the semester may be dropped from the course at
the discretion of the instructor. The instructor or the department offering the course will notify the
Registrar of this action. However, students should not assume that they have been dropped from a
class just because the first two classes were missed. It is ultimately the responsibility of the student to
drop a course that they are not planning to attend by the deadline published in the university calendar.
Blackboard Policy
The School of Information Studies uses a Web-based teaching and learning environment called
Blackboard. Most IST campus courses use Blackboard as a supplement to classroom activities and
all distance learning courses are conducted in Blackboard. Access to Blackboard is available at the
following URL: https://blackboard.syr.edu. Your professor will let you know the date the course will
be available.
Syllabus Change Policy
This syllabus can be changed with sufficient notice from your instructor.
4
Syracuse University
GET439 – Enterprise Technologies
School of Information Studies
Course Syllabus - Fall 2013
Course Outline – Week-by-Week
Date
Topic, Objectives, Assignments & Deliverables
Week 1 Part 1: Overview of Computer Systems & Enterprise Problems
-----------------------------------------------------------------------------------------------------------01/15 Students will be able to:
 Describe the characteristics of an enterprise problem
01/17
 Describe the components of a computer system
 Explain the various multi-tier system architectures
 Describe the importance of understanding the workload concept
 Describe the components that comprise a workload: CPU, memory, secondary
storage and I/O
Class exercise 1: Identify and define the characteristics of an enterprise problem
Class exercise 2: Introducing a programming language and its relationship to
computer architecture
Lab 1: Getting familiar with RDz and an Enterprise Computing Environment
Assignments Due
1. Read: Englander, Chapters 1 & 2
2. Read Software for Systems z for Dummies, Chapters 1 & 2
Week 2 Part 2: Data in the Computer
-----------------------------------------------------------------------------------------------------------01/22 Students will be able to:
 Describe how data is represented by computer systems
01/24
 Explain how human recognizable data is stored and manipulated by a computer
 Describe the importance of data encoding schemes: ASCII, EBCDIC, Unicode
 Explain the relationship among hexadecimal, decimal and binary number systems
and its relationship to computers
Class exercise 1: Convert computer Data to Human Recognizable Data?
Binary to ASCII Worksheet
Class exercise 2: Working on an Enterprise Class Server
Working on System z Worksheet
Lab 2: How data is represented by computer systems
Assignments Due
1. Read: Englander, Chapters 3 & 4
2. Lab 1
5
Syracuse University
GET439 – Enterprise Technologies
School of Information Studies
Course Syllabus - Fall 2013
Week 3 Part 3: Hardware – The Little Man Computer
-----------------------------------------------------------------------------------------------------------01/29 Students will be able to:
 Explain the “stored program” concept
01/31
 Explain the equivalence and interchangeability of program code and data
 Explain the importance of the instruction set
 Explain the way in which instructions are formatted
 Explain the basis for the instruction cycle
 Explain the importance of the von Neumann Architecture
Class exercise 1: Explain the Stored Program Concept
Little Man Computer Exercise Worksheet
Class exercise 2: Program structure, program preparation
Lab 3: Stored Program Concept using COBOL
Assignments Due
1. Read: Englander, Chapter 6
2. Lab 2
Week 4 Part 3: Hardware – The CPU and Memory
-----------------------------------------------------------------------------------------------------------02/05 Students will be able to:
 Describe the concept, operation and interactions of CPU registers
02/07
 Describe the operation of memory, and the roles of the memory address register and
memory data register
 Describe the Fetch-Execute Instruction cycle
 Explain the purposes for which buses are used within a computer system
 Explain the characteristics of instruction sets: instruction formats and instruction
classifications
Class exercise 1: Describe the Operation of Memory using COBOL
Memory: Data Division - declare variables and Move statement
Lab 4: Memory and CPU using COBOL
Assignments Due
1. Read: Englander, Chapter 7
2. Lab 3
6
Syracuse University
GET439 – Enterprise Technologies
School of Information Studies
Course Syllabus - Fall 2013
Week 5 Part 3: Hardware – CPU and Memory: Design, Enhancement and Implementation
-----------------------------------------------------------------------------------------------------------02/12 Students will be able to:
 Describe the major concepts embedded in superscalar processing: pipelining
02/14
instructions, the instruction unit/execute unit model
 Describe parallel instruction processing
 Explain the issues with handling out-of-order processing
 Describe the purpose of cache memory
Class exercise 1: Explain the Pipelining Concept
Instructions: Procedure Division - If/Then, Evaluate, Add, Subtract, Multiply,
Divide, Compute, Perform (out of order processing)
Thursday, Exam 1
Assignments Due
1. Read: Englander, Chapter 8.2 – 8.5
2. Lab 4
Week 6 Part 3: Hardware – Input/Output
-----------------------------------------------------------------------------------------------------------02/19 Students will be able to:
 Explain the operations of the CPU and the impact of this requirement on I/O
02/21
operations
 Explain the differences between character (or byte-based I/O) and block I/O and the
characteristics of the I/O devices that would produce each
 Explain the concept and method of operation of direct memory access (DMA)
 Describe the purpose, various uses for, and prioritization of interrupts and their
effects on program flow
 Explain the use of I/O modules and device controllers to control I/O operations
 Explain the difference between bus and channel I/O system architectures
 Describe the storage hierarchy, ranging from CPU registers to magnetic tape
 Describe the layout, operation, and performance considerations of magnetic disks
Class exercise 1: Explain the Direct memory Access Concept
Input/Output: More Procedure Division, Read and Write to/from DASD
Lab 5: File I/O and Out of Order Processing using COBOL
Assignments Due
1. Read: Englander, Chapter 9
2. Read: Englander, Chapter 10.0 – 10.4
7
Syracuse University
GET439 – Enterprise Technologies
School of Information Studies
Course Syllabus - Fall 2013
Week 7 Part 4: Software - Operating Systems – An Overview
-----------------------------------------------------------------------------------------------------------02/26 Students will be able to:
 Explain the need for an operating system and the purposes it fulfills
02/28
 Describe the three basic types of services provided by operating systems: user
services, management of program loading and execution and hardware resource
management
 Explain the criteria and methods for evaluating operating systems
 Describe single job and concurrent processing; batch processing, interactive online
processing (online vs. real-time)
 Describe the major system services: file management, I/O handling and interrupt
processing, process control management, memory management, secondary storage
and other resource management, scheduling, security, network and communications
support, and system administration support
 Describe the security mechanisms available in the operating system
Class exercise 1: Describe the Services provided by the Operating Systems
Operating System Exercise Worksheet
Lab 6: Introduction to Operating Systems using COBOL
Assignments Due
1. Read: Englander, Chapter 15
2. Read: Ebbers, Chapter 3
3. Lab 5
Week 8 Part 4: Software - Operating Systems – The User View of Operating Systems
-----------------------------------------------------------------------------------------------------------03/05 Students will be able to:
 Describe the features and strengths of the various types of user interfaces, and the
03/07
tradeoffs between them
 Describe the nature of the different types of tasks and services that are performed
within a user interface
 Explain the purpose and design of command languages and shell scripts
 Describe the purpose for the job control language or JCL
 Describe the services that are provided to a user's programs; the concept of an
application-programming interface (API)
Class exercise 1: Describe Operating Systems Interfaces
Operating System Interface Exercise Worksheet
Lab 7: Understanding JES using COBOL
Assignments Due
1. Read: Englander, Chapter 16
2. Read: Ebbers, Chapters 6 & 7
3. Lab 6
8
Syracuse University
GET439 – Enterprise Technologies
School of Information Studies
Course Syllabus - Fall 2013
03/12 Spring Break -- No Classes
03/14
Week 9 Part 4: Software - Operating Systems – File Management
-----------------------------------------------------------------------------------------------------------03/19 Students will be able to:
 Describe the attributes of a file
03/21
 Describe the tasks that are performed by an operating system file manager and the
methods used internally to perform those tasks
 Explain the different ways in which files can be accessed and stored, logically and
physically
 Describe the organization of directory systems, master and user catalogs
 Describe the basic methods of file protection
Class exercise 1: Describe File Management
File Management Exercise Worksheet
Lab 8: File Management and Summary Processing using COBOL
Assignments Due
1. Read: Englander, Chapter 17
2. Read: Ebbers, Chapter 5
3. Lab7
Week
10
03/26
03/28
Part 4: Software - Operating Systems – File Management, Part II
-----------------------------------------------------------------------------------------------------------Students will be able to:
 Describe the attributes of a file
 Describe the tasks that are performed by an operating system file manager and the
methods used internally to perform those tasks
 Explain the different ways in which files can be accessed and stored, logically and
physically
 Describe the organization of directory systems, master and user catalogs
 Describe the basic methods of file protection
Thursday, Exam 2
Assignments Due
1. Read: Englander, Chapter 17
2. Read: Ebbers, Chapter 5
3. Lab 8
9
Syracuse University
GET439 – Enterprise Technologies
Week
11
04/02
04/04
School of Information Studies
Course Syllabus - Fall 2013
Part 4: Software - The Internal Operating System
-----------------------------------------------------------------------------------------------------------Students will be able to:
 Contrast a process and a thread
 Explain the importance between CPU scheduling and task dispatching
 Describe the concept and importance of memory management
 Describe the concept of hardware and software virtualization
 Explain how resources can be virtualized: CPU, memory and secondary storage
 Explain the concepts of virtual storage, paging and thrashing
Class exercise: Using Virtualization to solve Enterprise Problems
Nationwide Case Study
Lab 9: Processing Keyed Files using COBOL
Assignments Due
1. Read: Englander, Chapter 18
Week
12
04/09
04/11
Part 4: Software - The Internal Operating System, Part II
-----------------------------------------------------------------------------------------------------------Students will be able to:
 Compare and contrast a process and a thread
 Explain the importance between CPU scheduling and task dispatching
 Describe the concept and importance of memory management
 Describe the concept of hardware and software virtualization
 Explain how resources can be virtualized: CPU, memory and secondary storage
 Explain the concepts of virtual storage, paging, swapping and thrashing
 Evaluate the use of virtualization
Class exercise: Using Virtualization to solve Enterprise Problems
Nationwide Case Study
Lab 10: Processing DB2 Databases using COBOL
Assignments Due
1. Read: Englander, Chapter 18
2. Read: Mergan, Virtualization for High-Performance Computing
3. View: YouTube, What is Virtualization
http://www.youtube.com/watch?v=MnNX13yBzAU
4. Lab 9
5. Enterprise Technology Project
10
Syracuse University
GET439 – Enterprise Technologies
Week
13
04/16
04/18
School of Information Studies
Course Syllabus - Fall 2013
Part 5: Role of Enterprise Technologies – Enterprise Systems Architecture
-----------------------------------------------------------------------------------------------------------Students will be able to:
 Compare and contrast “scale up vs. “scale out” computing strategies
 Identify risks and benefits from implementing mainframe architecture
 Compare and contrast the role of enterprise class vs. commodity servers
 Describe the role of asynchronous messaging and the techniques for passing
messages among computing systems
 Evaluate the role of the mainframe in today’s enterprise technology solutions
Class exercise: Debate the merits of distributed vs. centralization computing
strategies
Week
14
04/23
04/25
Assignments Due
1. Read: Mainframe Architecture
2. Read: Ebbers, Chapter 2
3. Read: Ebbers, Chapter 15
4. Lab 10
Part 5: Role of Enterprise Technologies – Enterprise Systems Architecture, Part II
-----------------------------------------------------------------------------------------------------------Students will be able to:
 Describe the security challenges within the modern enterprise
 Evaluate the mainframe as an enterprise security component
 Describe external security managers
 Use Resource Access Control Facility
Class exercise: Debate the merits of large enterprise systems & centralization
strategies
Week
15
Assignments Due
1. Read Software for Systems z for Dummies, Chapter 5
2. Read: Ebbers, Chapter 18
Review Class
------------------------------------------------------------------------------------------------------------
04/30
Week
15/16
Final Exam
-----------------------------------------------------------------------------------------------------------Format and dates will be announced in the Review Class
05/01
05/08
11
Download