MIS 3520: Data Communications & Networking (Fall 2015)
by user
Comments
Transcript
MIS 3520: Data Communications & Networking (Fall 2015)
MIS 3520: Data Communications & Networking (Fall 2015) Instructor Office Office Phone E-Mail Class Room Class Time Office Hours Fang Chen 482 Drake Centre 474-6727 [email protected] Drake 530 Tues, Thur 1:00pm – 2:15pm Mon & Wed, 2:30pm – 3:30pm. or any time my office door is open or by appointment AACSB Assurance of Learning Goals and Objectives. The Asper School of Business is proudly accredited by AACSB. Accreditation requires a process of continuous improvement of the School and our students. Part of “student improvement” is ensuring that students graduate with the knowledge and skills they need to succeed in their careers. To do so, the Asper School has set the learning goals and objectives listed below for the Undergraduate Program. The checked goal(s) and objective(s) will be addressed in this course and done so by means of the items listed next to the checkmark. Goals and Objective in the Undergraduate Program 1 B. C. 3 Determine which quantitative analysis technique is appropriate for solving a specific problem. Use the appropriate quantitative method in a technically correct way to solve a business problem. Analyze quantitative output and arrive at a conclusion. Written Communication A. Use correct English grammar and mechanics in their written work. B. Communicate in a coherent and logical manner C. Present ideas in a clear and organized fashion. two case analyses and two project reports two case analyses and two project reports two case analyses and two project reports Ethical Thinking A. B. C. D. 4 Course Item(s) Relevant to these Goals and Objectives Quantitative Reasoning A. 2 Goals and Objectives Addressed in this Course Identify ethical issues in a problem or case situation Identify the stakeholders in the situation. Analyze the consequences of alternatives from an ethical standpoint. Discuss the ethical implications of the decision. Core Business Knowledge Entire course 1 Online Class Materials Class materials (e.g., syllabus, PPT slides and project descriptions) will be posted on Desire2Learn, please check frequently for new information. PPT slides will be available for download on D2L 24 hours before the lecture. Desire2Learn URL http://umanitoba.ca/d2l User name: your UMNetID (also known as your UofM email account) Password: UMNetID password Readings Fitzgerald, J. & Dennis, A., Business Data Communications and Networking, 11th Edition, John Wiley & Sons, Inc. ISBN : 978-1-118-21528-9 Text book URL www.wiley.com/college/fitzgerald Additional Readings: Case 1: Chandrasekhar, R. & Haggerty N. (2008), Security Breach at TJX, Ivey Case Studies, 9B08E003. Case 2: McFarlan, F. W. & Austin, R. D. (2005), CareGroup, Harvard Business School Case Studies, 9-303-097. You may purchase these two cases from Harvard Business Publishing online at http://cb.hbsp.harvard.edu. The instructor will also put multiple copies in the library for reservation. Course Objectives A practical understanding of the technical concepts and principles used in the design and implementation of data communications systems. Students who work hard and participate actively in this course will be able to: Explain basic telecommunications technology concepts, architectures, standards, protocols, and terminology Compare telecommunications architectures, standards, and protocols Choose between various telecommunications architectures, standards, and protocols Implement a simple local area network for an imagined organization Team Selection Students are responsible for forming teams. The number of team members will be announced in the class. You can choose the same team for all projects or different teams for each project. If you have difficulty finding a team please let the instructor know right away. 2 Marking Scheme Assignment 1: LAN Evaluation Project (team) Assignment 2: Server Configuration Project (team) Participation Case analysis for case 1 and 2 Midterm Final Total 20% 10% 4% 6% 25% 35% 100% Additional information about the exams, assignments, and presentations will be provided in class. The scheduled dates for exams, assignments, etc. are subject to change, but all changes will be discussed in class. All students must take exams at the scheduled times except for emergencies. Assignments are due at the beginning of the class. Late assignments receive a penalty of 10% per day (starting with the first late minute). Assignments are designed to be learning tools; students should seek help from the instructor when unsure of how to proceed. The LAN evaluation project will require your team to work with a real company and evaluate their current computer network. When your project is complete there will be a class presentation. The server configuration project requires your team to configure a Windows-based network server with the appropriate security for users to access files. This includes creating users and configuring file system security. A small percentage of semester mark is based on your participation in classes. Mere attendance, however, does not count at all toward participation. Students have to contribute to class discussions, and other in-class activities to earn participation marks. Academic Integrity It is critical to the reputation of the I.H. Asper School of Business and of our degrees that everyone associated with our faculty behaves with the highest academic integrity. As the faculty that helps create business and government leaders, we have a special obligation to ensure that our ethical standards are beyond reproach. Any dishonesty in our academic transactions violates this trust. Page 26 of the University of Manitoba General Calendar addresses the issue of academic dishonesty under the heading "Plagiarism and Cheating." Specifically, acts of academic dishonesty include, but are not limited to: using the exact words of a published or unpublished author without quotation marks and without referencing the source of these words duplicating a table, graph or diagram, in whole or in part, without referencing the source paraphrasing the conceptual framework, research design, interpretation, or any other ideas of another person, whether written or verbal (e.g., personal communications, ideas from a verbal presentation) without referencing the source copying the answers of another student in any test, examination, or take-home assignment providing answers to another student in any test, examination, or take-home assignment taking any unauthorized materials into an examination or term test (crib notes) 3 impersonating another student or allowing another person to impersonate oneself for the purpose of submitting academic work or writing any test or examination stealing or mutilating library materials accessing tests prior to the time and date of the sitting changing name or answer(s) on a test after that test has been graded and returned submitting the same paper or portions thereof for more than one assignment, without discussions with the instructors involved. Group Projects and Group Work Many courses in the I.H. Asper School of Business require group projects. Students should be aware that group projects are subject to the same rules regarding academic dishonesty. Because of the unique nature of group projects, all group members should exercise special care to ensure that the group project does not violate the policy on Academic Integrity. Should a violation occur, group members are jointly accountable unless the violation can be attributed to a specific individual(s). Some courses, while not requiring group projects, encourage students to work together in groups (or at least do not prohibit it) before submitting individual assignments. Students are encouraged to discuss this issue as it related to academic integrity with their instructor to avoid violating this policy. In the I.H. Asper School of Business, all suspected cases of academic dishonesty are passed to the Dean’s office to ensure consistency of treatment. Tentative Class Schedule The class schedule is subject to change. All changes will be announced in the class and posted on Angle, please check Angle frequently for update. 4 Day of the week Thur Tues Thur Date Tues Thur Tues Thur Tues Thur Tues Sept. 22 Sept. 24 Sept. 29 Oct. 1 Oct. 6 Oct. 8 Oct. 13 Thur Oct. 15 Tues Thur Tues Thur Tues Thur Oct. 20 Oct. 22 Oct. 27 Oct. 29 Nov. 3 Nov. 5 Tues Thur Tues Nov. 10 Nov. 12 Nov. 17 Sept. 10 Sept. 15 Sept. 17 Lecture Topic Nov. 18 Course Introduction Intro of data comm. Application architecture and numbering system Application layer Physical layer Physical layer LAN Wireless LAN Transport layer Network layer (IP Addressing) Network layer (IP Addressing) Network layer (routing) Backbone network Midterm exam–in class WAN & Internet Network Security Midterm Exam Review & Network Security (continued) Guest speaker Network Management IT Management framework ITIL This is a Wednesday Thur Nov. 19 Guest speaker Tues Thur Tues Thur Nov. 24 Nov. 26 Dec. 1 Dec. 3 To be arranged To be arranged A1 presentation A1 presentation Dec. 8 TBA Course summary Final Exam Readings Exam /Assignments None Ch 1 Ch 2 Ch 2 Ch 3 Ch 3 Ch 6 Ch 6 Ch 7 Ch 5 Team List due A1 posted A1 starts Ch 5 Ch 5 Ch 7 A2 posted Midterm exam A2 starts Ch 10 Case 1 analysis due Ch 12 The last day for Voluntary Withdrawal Case 2 analysis due To be arranged A2 ends A1 final report and peer evaluation due 5