...

MIS 3520: Data Communications & Networking (Fall 2015)

by user

on
Category: Documents
29

views

Report

Comments

Transcript

MIS 3520: Data Communications & Networking (Fall 2015)
MIS 3520: Data Communications & Networking (Fall 2015)
Instructor
Office
Office Phone
E-Mail
Class Room
Class Time
Office Hours
Fang Chen
482 Drake Centre
474-6727
[email protected]
Drake 530
Tues, Thur 1:00pm – 2:15pm
Mon & Wed, 2:30pm – 3:30pm.
or any time my office door is open
or by appointment
AACSB Assurance of Learning Goals and Objectives.
The Asper School of Business is proudly accredited by AACSB. Accreditation
requires a process of continuous improvement of the School and our students. Part of
“student improvement” is ensuring that students graduate with the knowledge and
skills they need to succeed in their careers. To do so, the Asper School has set the
learning goals and objectives listed below for the Undergraduate Program. The
checked goal(s) and objective(s) will be addressed in this course and done so by means
of the items listed next to the checkmark.
Goals and Objective in the Undergraduate Program
1
B.
C.
3
Determine which quantitative analysis technique is appropriate for
solving a specific problem.
Use the appropriate quantitative method in a technically correct
way to solve a business problem.
Analyze quantitative output and arrive at a conclusion.
Written Communication
A.
Use correct English grammar and mechanics in their written work.

B.
Communicate in a coherent and logical manner

C.
Present ideas in a clear and organized fashion.

two case analyses
and two project
reports
two case analyses
and two project
reports
two case analyses
and two project
reports
Ethical Thinking
A.
B.
C.
D.
4
Course Item(s)
Relevant to
these Goals
and Objectives
Quantitative Reasoning
A.
2
Goals and
Objectives
Addressed
in this
Course
Identify ethical issues in a problem or case situation
Identify the stakeholders in the situation.
Analyze the consequences of alternatives from an ethical
standpoint.
Discuss the ethical implications of the decision.
Core Business Knowledge

Entire course
1
Online Class Materials
Class materials (e.g., syllabus, PPT slides and project descriptions) will be posted on
Desire2Learn, please check frequently for new information. PPT slides will be available for
download on D2L 24 hours before the lecture.
Desire2Learn URL http://umanitoba.ca/d2l
User name: your UMNetID (also known as your UofM email account)
Password: UMNetID password
Readings
Fitzgerald, J. & Dennis, A., Business Data Communications and Networking, 11th
Edition, John Wiley & Sons, Inc. ISBN : 978-1-118-21528-9
Text book URL
www.wiley.com/college/fitzgerald
Additional Readings:
Case 1: Chandrasekhar, R. & Haggerty N. (2008), Security Breach at TJX, Ivey Case Studies,
9B08E003.
Case 2: McFarlan, F. W. & Austin, R. D. (2005), CareGroup, Harvard Business School Case
Studies, 9-303-097.
You may purchase these two cases from Harvard Business Publishing online at
http://cb.hbsp.harvard.edu. The instructor will also put multiple copies in the library for
reservation.
Course Objectives
A practical understanding of the technical concepts and principles used in the design and
implementation of data communications systems.
Students who work hard and participate actively in this course will be able to:
 Explain basic telecommunications technology concepts, architectures, standards,
protocols, and terminology
 Compare telecommunications architectures, standards, and protocols
 Choose between various telecommunications architectures, standards, and protocols
 Implement a simple local area network for an imagined organization
Team Selection
Students are responsible for forming teams. The number of team members will be announced in
the class. You can choose the same team for all projects or different teams for each project. If
you have difficulty finding a team please let the instructor know right away.
2
Marking Scheme
Assignment 1: LAN Evaluation Project (team)
Assignment 2: Server Configuration Project (team)
Participation
Case analysis for case 1 and 2
Midterm
Final
Total
20%
10%
4%
6%
25%
35%
100%
Additional information about the exams, assignments, and presentations will be provided in class.
The scheduled dates for exams, assignments, etc. are subject to change, but all changes will be
discussed in class. All students must take exams at the scheduled times except for emergencies.
Assignments are due at the beginning of the class. Late assignments receive a penalty of 10% per
day (starting with the first late minute). Assignments are designed to be learning tools; students
should seek help from the instructor when unsure of how to proceed.
The LAN evaluation project will require your team to work with a real company and evaluate
their current computer network. When your project is complete there will be a class presentation.
The server configuration project requires your team to configure a Windows-based network
server with the appropriate security for users to access files. This includes creating users and
configuring file system security.
A small percentage of semester mark is based on your participation in classes. Mere attendance,
however, does not count at all toward participation. Students have to contribute to class
discussions, and other in-class activities to earn participation marks.
Academic Integrity
It is critical to the reputation of the I.H. Asper School of Business and of our degrees that
everyone associated with our faculty behaves with the highest academic integrity. As the faculty
that helps create business and government leaders, we have a special obligation to ensure that our
ethical standards are beyond reproach. Any dishonesty in our academic transactions violates this
trust. Page 26 of the University of Manitoba General Calendar addresses the issue of academic
dishonesty under the heading "Plagiarism and Cheating." Specifically, acts of academic
dishonesty include, but are not limited to:
 using the exact words of a published or unpublished author without quotation marks and
without referencing the source of these words
 duplicating a table, graph or diagram, in whole or in part, without referencing the source
 paraphrasing the conceptual framework, research design, interpretation, or any other
ideas of another person, whether written or verbal (e.g., personal communications, ideas
from a verbal presentation) without referencing the source
 copying the answers of another student in any test, examination, or take-home assignment
 providing answers to another student in any test, examination, or take-home assignment
 taking any unauthorized materials into an examination or term test (crib notes)
3
 impersonating another student or allowing another person to impersonate oneself for the
purpose of submitting academic work or writing any test or examination
 stealing or mutilating library materials
 accessing tests prior to the time and date of the sitting
 changing name or answer(s) on a test after that test has been graded and returned
 submitting the same paper or portions thereof for more than one assignment, without
discussions with the instructors involved.
Group Projects and Group Work
Many courses in the I.H. Asper School of Business require group projects. Students should be
aware that group projects are subject to the same rules regarding academic dishonesty. Because
of the unique nature of group projects, all group members should exercise special care to ensure
that the group project does not violate the policy on Academic Integrity. Should a violation
occur, group members are jointly accountable unless the violation can be attributed to a specific
individual(s).
Some courses, while not requiring group projects, encourage students to work together in groups
(or at least do not prohibit it) before submitting individual assignments. Students are encouraged
to discuss this issue as it related to academic integrity with their instructor to avoid violating this
policy.
In the I.H. Asper School of Business, all suspected cases of academic dishonesty are passed to
the Dean’s office to ensure consistency of treatment.
Tentative Class Schedule
The class schedule is subject to change. All changes will be announced in the class and posted on
Angle, please check Angle frequently for update.
4
Day of
the week
Thur
Tues
Thur
Date
Tues
Thur
Tues
Thur
Tues
Thur
Tues
Sept. 22
Sept. 24
Sept. 29
Oct. 1
Oct. 6
Oct. 8
Oct. 13
Thur
Oct. 15
Tues
Thur
Tues
Thur
Tues
Thur
Oct. 20
Oct. 22
Oct. 27
Oct. 29
Nov. 3
Nov. 5
Tues
Thur
Tues
Nov. 10
Nov. 12
Nov. 17
Sept. 10
Sept. 15
Sept. 17
Lecture Topic
Nov. 18
Course Introduction
Intro of data comm.
Application architecture and
numbering system
Application layer
Physical layer
Physical layer
LAN
Wireless LAN
Transport layer
Network layer (IP
Addressing)
Network layer (IP
Addressing)
Network layer (routing)
Backbone network
Midterm exam–in class
WAN & Internet
Network Security
Midterm Exam Review &
Network Security (continued)
Guest speaker
Network Management
IT Management framework ITIL
This is a Wednesday
Thur
Nov. 19
Guest speaker
Tues
Thur
Tues
Thur
Nov. 24
Nov. 26
Dec. 1
Dec. 3
To be arranged
To be arranged
A1 presentation
A1 presentation
Dec. 8
TBA
Course summary
Final Exam
Readings
Exam
/Assignments
None
Ch 1
Ch 2
Ch 2
Ch 3
Ch 3
Ch 6
Ch 6
Ch 7
Ch 5
Team List due
A1 posted
A1 starts
Ch 5
Ch 5
Ch 7
A2 posted
Midterm exam
A2 starts
Ch 10
Case 1 analysis
due
Ch 12
The last day for
Voluntary
Withdrawal
Case 2 analysis
due
To be arranged
A2 ends
A1 final report
and peer
evaluation due
5
Fly UP