TELE70003
Data Comm Networks Intro |
|
|
|
I: Administrative Information II: Course Details
III: Topical Outline(s) Printable Version |
|
Section I: Administrative Information
|
|
Total hours: 42.0
Credit Value: 3.0
Credit Value Notes: N/A
Effective: Spring/Summer 2015
Prerequisites:
(SYST70004)
Corequisites:
N/A
Equivalents:
N/A
Pre/Co/Equiv Notes: IT Operations Program: course completion should
follow this order: SYST70004, INFO70036,
SYST70005, APPL70053, TELE70003, COMM70042 |
Program(s):
IT Operations
Program Coordinator(s):
Multiple Coordinators
Course Leader or Contact: N/A
Version: 1.0
Status: Approved (APPR)
Section I Notes:
N/A
|
|
|
Section II: Course Details
|
Detailed Description
Students study data communications and network concepts, and develop
an understanding of the relationship between network hardware,
topologies, protocols and addressing. They explore basic switching and
routing algorithms and protocols, and gain hands-on skills using
networking devices and software. They also develop the skill to set up
a small functional network using wired LAN and WLAN devices and run
networking applications, like HTTP, FTP, to experience end-to-end
connectivity. Students research the socio-cultural impact of Internet
and the importance of network standards. Students examine networking
careers and the roles and responsibilities of networking
professionals.
Program Context
|
IT Operations |
Program Coordinator: Multiple |
This course will meet
objectives in the area of
building and maintaining local
area networks. Specifically,
the student will be made aware
of factors to be considered
when building a network, type
of networks - topologies,
access and transmission
methods. The student will also
gain hands-on practical
experience in managing the
user environment in a network.
|
Course Critical Performance and Learning Outcomes
|
Critical Performance:
By the end of this course, students will have demonstrated the ability
to:
- Design a network in the context of a small to medium business and
make an informed decision on the appropriate hardware and software
required to implement the network.
Learning Outcomes:
To achieve the critical performance, students will have demonstrated
the ability to:
1. Contextualize the Internet as a social, cultural and economic
revolution to identify the roles and responsibilities of
networking professionals.
2. Understand what a protocol is, how protocols define the
architecture of the Internet and where they come from.
3. Explain the underlying technologies of a LAN: wire and logical
topologies, physical wiring, MAC addressing and switching, IP and
ARP interplay
4. Relate the layers of TCP/IP model to their respective working
protocols: Ethernet, IP, TCP and demonstrate this knowledge using
a protocol analyzer.
5. Explain the challenges of global network routing, the basic
generic approaches and the specific protocols used on the Internet.
6. Describe the working characteristics of the Internet
application framework protocols: FTP, HTTP, SMTP, etc.
7. Explain platform level network applications like DHCP, NAT, DNS,
and SNMP.
8. Relate network theory to the operation and configuration of a home
router using wired and WLAN devices.
|
Evaluation Plan
Students demonstrate their learning in the following ways:
|
Midterm Exam 25% (approximately week 7)
Final Exam 35% (approximately week 14)
Quizzes (3) 15% (approximately weeks 3,5,12)
Assignments (2) 15% (approximately weeks 5, 13)
Hands-on activities (5) 10% (approximately weeks 2,4,8,11)
Total 100%
Faculty members teaching this course agree to the following
practices:
Sheridan wishes to encourage behaviours that will help
students be successful and to ensure that students receive credit for
their individual work.
1. For submission of assignments and projects, the faculty
member will specify, on the class plan:
a) Due dates and special instructions for submissions
b) Deductions for overdue submissions
2. Exams must be written as scheduled by the faculty member. A
makeup exam is at the faculty member¿s discretion provided that the
student has an acceptable reason for their absence and may be asked
for documented evidence, such as a medical certificate, explaining
their absence. These special situations must be discussed with the
faculty member immediately once the situation becomes known. Semester
time constraints may limit rewrite options.
3. To pass the course, students must achieve at least 50%
overall in the course, as well as a 50% weighted average across the
tests and the exams combined.
|
Provincial Context
The course meets the following Ministry of Training, Colleges and Universities requirements:
|
Essential Employability
Skills
Essential Employability Skills emphasized in the course:
X
|
Communication
|
X
|
Critical Thinking & Problem Solving
|
X
|
Interpersonal
|
|
Numeracy |
X
|
Information
Management |
|
Personal
|
Notes: N/A
Prior Learning Assessment and Recognition
PLAR Contact (if course is PLAR-eligible) : Office of the Registrar
Students may apply to receive credit by demonstrating achievement of the course learning outcomes through previous relevant work/life experience, service, self-study and training on the job. This course is eligible for challenge through the following method(s):
Challenge Exam |
Portfolio |
Interview |
Other |
Not Eligible for PLAR |
X |
|
|
|
|
Notes: N/A
|
|
|
|
Section III: Topical Outline
|
Some details of this outline may change as a result of circumstances such as weather cancellations, College and student activities, and class timetabling.
Effective term: Spring/Summer 2015
Professor: Multiple Professors
Textbook(s): Textbook(s): Forouzan, B. (2013).
Data Communications and Networking.
5th Edition. New York, NY: McGraw Hill,
ISBN: 978-0073376226
OR
eText: ISBN: 9781259110467
Applicable student group(s): Continuing Education Students
Course Details:Module 1: Introduction to Data Communications and Networking
Internet- the Big Picture, history
Network types- Topology, Point to Point and Point to Multi-point
connections, CS and PS switching
Standards
Networking as a profession
Module 2: Network Model
Concept of layered architecture and reference model
OSI, TCP/IP models
Encapsulation
Addressing
Protocol stack in operating system
Demonstration of working of protocols and encapsulation/decapsulation
Module 3: Networking Devices
Hub, switch and router in LANs
Introduction to switching and routing
IEEE 802 protocol set, LLC and MAC
Basic access method (CSMA/CD)
Virtual LANs
Module 4: Basics of Host to Host Communication
Functions of network layer
Connectionless/packet switching
IP addresses
Introduction to subnet and CIDR approach
Forwarding of IP packets
DHCP functions
Module 5: Concept of Connection in Networking
Connectionless and connection-oriented services
Functions of transport layer
Port numbers: Source/destination
Introduction to UDP
Introduction to TCP
Three-way handshaking of TCP
Module 6: Application Layer Protocols
Concept of client-server communication
Peer-to-peer paradigm
Concept of Socket and socket programming
Overview of application layer protocols: HTTP, FTP, Email
architecture (SMTP and POP3/IMAP), Telnet, SSH, SNMP
Domain Name System (DNS) architecture
Module 7: Wireless LAN (WLAN)
Wireless characteristics
WLAN topology and architecture
Note: The topics within each module are grouped semantically and are
not meant to suggest a time sequence. At the beginning of the course,
the instructor will identify the class-by-class arrangement of topics
and the timing of evaluation components via a course plan.
|
Sheridan Policies
All Sheridan policies can be viewed on the Sheridan policy website.
Academic Integrity: The principle of academic integrity requires that all work submitted for evaluation and course credit be the original, unassisted work of the student. Cheating or plagiarism including borrowing, copying, purchasing or collaborating on work, except for group projects arranged and approved by the professor, or otherwise submitting work that is not the student's own, violates this principle and will not be tolerated. Students who have any questions regarding whether or not specific circumstances involve a breach of academic integrity are advised to review the Academic Integrity Policy and procedure and/or discuss them with the professor.
Copyright: A majority of the course lectures and materials provided in class and posted in SLATE are protected by copyright. Use of these materials must comply with the Acceptable Use Policy, Use of Copyright Protected Work Policy and Student Code of Conduct. Students may use, copy and share these materials for learning and/or research purposes provided that the use complies with fair dealing or an exception in the Copyright Act. Permission from the rights holder would be necessary otherwise. Please note that it is prohibited to reproduce and/or post a work that is not your own on third-party commercial websites including but not limited to Course Hero or OneNote. It is also prohibited to reproduce and/or post a work that is not your own or your own work with the intent to assist others in cheating on third-party commercial websites including but not limited to Course Hero or OneNote.
Intellectual Property: Sheridan's Intellectual Property Policy generally applies such that students own their own work. Please be advised that students working with external research and/or industry collaborators may be asked to sign agreements that waive or modify their IP rights. Please refer to Sheridan's IP Policy and Procedure.
Respectful Behaviour: Sheridan is committed to provide a learning environment that supports academic achievement by respecting the dignity, self-esteem and fair treatment of every person engaged in the learning process. Behaviour which is inconsistent with this principle will not be tolerated. Details of Sheridan's policy on Harassment and Discrimination, Academic Integrity and other academic policies are available on the Sheridan policy website.
Accessible Learning: Accessible Learning coordinates academic accommodations for students with disabilities. For more information or to register, please see the Accessible Learning website (Statement added September 2016)
Course Outline Changes: The information contained in this Course Outline including but not limited to faculty and program information and course description is subject to change without notice. Any changes to course curriculum and/or assessment shall adhere to approved Sheridan protocol. Nothing in this Course Outline should be viewed as a representation, offer and/or warranty. Students are responsible for reading the Important Notice and Disclaimer which applies to Programs and Courses.
|
[
Printable Version ]
|
Copyright © Sheridan College. All rights reserved. |