复旦大学:《计算机网络 Computer Networking》课程教学资源_教学大纲(英文)胥正川

School of management, Fudan University Information Management Information Systems December. 2009 Computer Network Course Outline Dr Zhengchuan xu Phone:(86)21-25011237 (86)21-65643640 Email zexu fudan. edu. cn
School of Management, Fudan University Information Management & Information Systems December, 2009 Computer Network Course Outline Dr. Zhengchuan XU Phone: (86) 21-25011237 Fax: (86) 21-65643640 Email: zcxu@fudan.edu.cn

Computer Network L C Information Course Description Business telecommunications is one of the fastest growing areas in industry today. The use of local-and wide area networks has become common place. Data communications technology prov ides the necessary infrastructure for client-server architecture, the internet, intranets and extranets, groupware, and any e-business This course introduces students to both managerial issues as well as the supporting technical knowledge needed to plan and manage todays business communication system. The course begins with an introduction to the data communications concepts and technologies, followed by a technical review of the network services, including LANS and WANs, the Internet and internetworking, and enterprise networks. We then turn to look at some issues relating to network security and management. Course Objectives Describe the basic principles of Computer Networks. Distinguish between basic communication concepts and terminology. Grasp the concepts in the connectiv ity of stand alone LANs and WANS Intelligently converse with others on the subjects of various network architecture and topology Describe employ the Open Systems Interconnect(OSI) and TCP/IP model and use this model to explain ty pical data communications Internet, Extranet and Intranet architectures Use the technical vocabulary of data communication technology to design, implement and manage organizational communications functions Understand the role of data communications as an integrator of business processes. explain lected technical issues underlying the integration of business processes Create an oral and/or written presentations about a current data communications topic Course Materials exton Business data Networks and Telecommumications Raymond R Panko. 6th edition(2007) Cases articles 1. Choi, Y B, etc(2006)'Corporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance Int J Mobile communications Vo.4,No.3,pp266-290 2. Kumar, S(2004)Mobile communications: global trends in the 2 lst century, Int J. Mobile Communication, Vol 2, No 1, pp 67-86 3. Varshney, U, Malloy, A, Ahluwalia, P and Jain, R(2004)'Wireless in the enterprise requirements, solutions and research directions, Int J. Mobile Communications, Vol 2, No. 4 pp.354-367 4. Lim, B and Zheng, H (2004)'A day in the life of Jini: a peek at service-oriented architecture for internet appliances, Int J Mobile Communication, Vol. 2, No 2, pp 199-216 5. Pietro, R D and Mancini, L V(2003)Security and privacy issues of handheld and wearable wireless devices. Communications of the acm. vol 46. No. 9 6. Wei, J, Liu, L.C. and Koong, KS(2006)An onion ring framework for developing and assessing mobile commerce security, Int J Mobile Communications, Vol. 4, No 2, pp 128
Computer Network 2 I. Course Information Course Description: Business telecommunications is one of the fastest growing areas in industry today. The use of local- and widearea networks has become common place. Data communications technology provides the necessary infrastructure for client-server architecture, the internet, intranets and extranets, groupware, and any e-business application. This course introduces students to both managerial issues as well as the supporting technical knowledge needed to plan and manage today’s business communication system. The course begins with an introduction to the data communications concepts and technologies, followed by a technical review of the network services, including LANs and WANs, the Internet and internetworking, and enterprise networks. We then turn to look at some issues relating to network security and management. Course Objectives: • Describe the basic principles of Computer Networks. Distinguish between basic communication concepts and terminology. Grasp the concepts in the connectivity of stand alone LANs and WANs • Intelligently converse with others on the subjects of various network architecture and topology. • Describe employ the Open Systems Interconnect(OSI) and TCP/IP model and use this model to explain typical data communications Internet, Extranet and Intranet architectures • Use the technical vocabulary of data communication technology to design, implement and manage organizational communications functions • Understand the role of data communications as an integrator of business processes. explain selected technical issues underlying the integration of business processes • Create an oral and/ or written presentations about a current data communications topic. Course Materials: Textbook: Business Data Networks and Telecommunications, Raymond R. Panko. 6th edition (2007) Cases & Articles: 1. Choi, Y.B., etc (2006) ‘Corporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance’, Int. J. Mobile Communications, Vol. 4, No. 3, pp.266–290. 2. Kumar, S. (2004) ‘Mobile communications: global trends in the 21st century’, Int. J. Mobile Communication, Vol. 2, No. 1, pp.67–86. 3. Varshney, U., Malloy, A., Ahluwalia, P. and Jain, R. (2004) ‘Wireless in the enterprise: requirements, solutions and research directions’, Int. J. Mobile Communications, Vol. 2, No. 4, pp. 354–367. 4. Lim, B. and Zheng, H. (2004) ‘A day in the life of Jini: a peek at service-oriented architecture for internet appliances’, Int. J. Mobile Communication, Vol. 2, No. 2, pp.199–216. 5. Pietro, R.D. and Mancini, L.V. (2003) Security and privacy issues of handheld and wearable wireless devices, Communications of the ACM, Vol 46, No. 9. 6. Wei, J., Liu, L.C. and Koong, K.S. (2006) ‘An onion ring framework for developing and assessing mobile commerce security’, Int. J. Mobile Communications, Vol. 4, No. 2, pp.128– 142

Computer Network Re eferences Business Data Communications and Networking, Fitzgerald, J, Dennis, A. John Wiley Sons, Inc, New York, NY, 7th Edition, (2002) Local area networks Forouzan, B A. McGraw-Hill, New York, NY, Ist Edition, (2002) Business data Communications Stallings, w. Prentice Hall, Upper Saddle River, New Jersey, 4th Edition, 2001 Nerds 2.0.1: A Brief History of the Internet Segaller, Stephen. New York: TV Books [ISBN: 1-57500-088-1](1999)
Computer Network 3 References: ▪ Business Data Communications and Networking, Fitzgerald, J., Dennis, A. John Wiley & Sons, Inc., New York, NY, 7th Edition, (2002). ▪ Local Area Networks, Forouzan, B. A. McGraw-Hill, New York, NY, 1st Edition, (2002). ▪ Business Data Communications Stallings, W. Prentice Hall, Upper Saddle River, New Jersey, 4th Edition, 2001. ▪ Nerds 2.0.1: A Brief History of the Internet. Segaller, Stephen. New York: TV Books [ISBN: 1-57500-088-1] (1999)

Computer Network IL Course Learning Outcomes(CLOs) On completion of this course, students should be able to Develop knowledge of principles, concepts, and technology in the data communication to conceptualize a network and specify its components. (CLOI Develop the ability to analyze the business needs of an organization and apply the correct networking solutions. (CLO2) Develop the ability to design and document a large network, convey that design to managers in an understandable way and the ability to work network engineers and technicians to ensure the successful implementation and on going maintenance of a network (CLO3) Develop capabilities for case study and analysis of contemporary data communication and network management. (CLO4) Alignments of Program and Course learning outcomes Undergraduate Students Learning Outcomes Course los 1. Solid theoretical basis. strong professional skills, and logical modes of CLO1, CLO2 thinking CLO3 2. Collection and measurement of data and information CLOI CLO2 CLO4 3. Written and Verbal Communication Skills CLOI CLO3 4. Research skill in Problem solution CLO2 CLO3 ng sense ponsibility and high ethical standards CLO4 Teaching and learning activities Lectures: basic concepts and knowledge will be presented in the class through In-class discussions: sometimes discussion questions are raised by the lecturer. Students are encouraged to participate in discussions and share opinions with their peers. These discussions encourage students to think more for certain arguable topics assignments they can acq uire hands-on experience using these technologies ss. Through the Assignments: students accomplish tasks using technologies covered in class. Through the Group project: students forming groups to practice the research study project initiation/selection planning, execution, summarization, presentation and evaluation. Small group meeting discussion: multiple discussion sessions with individual small group during the semester to prov ide the feedback and suggestions for course project and case study Case study: students express and share their ideas and questions on the case or articles related to network in the class. These discussions encourage students to think about the class materials after class Demonstration: live demonstrations of software and technologies used in the network(such as video conferencing, schedule management, and optimization tools) will be given in the class and lab session to show how these technology applied in the network Videos: video clips are shown for selected topics in the class to show the real scenarios in the different situations for network. Students are required to answer questions and problems based on the video contents. These questions offer students opportunities to apply basic concepts and techniques to specific scenarios
Computer Network 4 II. Course Learning Outcomes (CLOs): On completion of this course, students should be able to: • Develop knowledge of principles, concepts, and technology in the data communication to conceptualize a network and specify its components. (CLO1) • Develop the ability to analyze the business needs of an organization and apply the correct networking solutions. (CLO2) • Develop the ability to design and document a large network, convey that design to managers in an understandable way and the ability to work network engineers and technicians to ensure the successful implementation and on going maintenance of a network. (CLO3) • Develop capabilities for case study and analysis of contemporary data communication and network management. (CLO4) Alignments of Program and Course Learning Outcomes: Undergraduate Students Learning Outcomes Course LOs 1. Solid theoretical basis, strong professional skills, and logical modes of thinking. CLO1, CLO2, CLO3 2. Collection and measurement of data and information CLO1, CLO2, CLO4 3. Written and Verbal Communication Skills CLO1, CLO3, CLO4 4. Research Skill in Problem Solution CLO2, CLO3, CLO4 5. A strong sense of social responsibility and high ethical standards CLO4 Teaching and Learning Activities: Lectures: basic concepts and knowledge will be presented in the class through. In-class discussions: sometimes discussion questions are raised by the lecturer. Students are encouraged to participate in discussions and share opinions with their peers. These discussions encourage students to think more for certain arguable topics. Assignments: students accomplish tasks using technologies covered in class. Through the assignments they can acquire hands-on experience using these technologies. Group project: students forming groups to practice the research study, project initiation/selection, planning, execution, summarization, presentation and evaluation. Small group meeting & discussion: multiple discussion sessions with individual small group during the semester to provide the feedback and suggestions for course project and case study. Case study: students express and share their ideas and questions on the case or articles related to network in the class. These discussions encourage students to think about the class materials after class. Demonstration: live demonstrations of software and technologies used in the network (such as video conferencing, schedule management, and optimization tools) will be given in the class and lab session to show how these technology applied in the network. Videos: video clips are shown for selected topics in the class to show the real scenarios in the different situations for network. Students are required to answer questions and problems based on the video contents. These questions offer students opportunities to apply basic concepts and techniques to specific scenarios

Computer Network Measurement of Learning outcomes: Teaching and learning activity Develop knowledge of Lectures, in-class discussions, Attendance, participation in principles, concepts, and assignments, group project, discussions, assignments, case technology in the data ase study tutorials study communication to conceptualize a network and specify its components (CLOD) Develop the ability to analyze Lectures, in-class discussions, Attendance, participation in the business needs of an assignments, group project, discussions, assignment organization and apply the group meeting, case study, study, project presentation and correct networking solutions tutorials ummary report CLO2 class discu and document a large network, assignments, exams, group discussions, case study, project convey that design to managers project, group meeting, case presentation and summary in an understandable way and study report the ability to work network ngineers and technicians to ensure the ensure the successful implementation and on going maintenance of a network CLO3 Develop capabilities for case Lectures, In-class discussions,I Attendance, participation in study and analysis of assignments, group meeting, discussions, case study, project case study, presentation and summary communication and network report management(CLO4)
Computer Network 5 Measurement of Learning Outcomes: Learning outcome Teaching and learning activity Assessment Develop knowledge of principles, concepts, and technology in the data communication to conceptualize a network and specify its components. (CLO1) Lectures, in-class discussions, assignments, group project, case study, tutorials Attendance, participation in discussions, assignments, case study. Develop the ability to analyze the business needs of an organization and apply the correct networking solutions. (CLO2) Lectures, in-class discussions, assignments, group project, group meeting, case study, tutorials Attendance, participation in discussions, assignments, case study, project presentation and summary report. Develop the ability to design and document a large network, convey that design to managers in an understandable way and the ability to work network engineers and technicians to ensure the ensure the successful implementation and on going maintenance of a network. (CLO3) Lectures, in-class discussions, assignments, exams, group project, group meeting, case study, Attendance, participation in discussions, case study, project presentation and summary report. Develop capabilities for case study and analysis of contemporary data communication and network management. (CLO4) Lectures, In-class discussions, assignments, group meeting, case study, Attendance, participation in discussions, case study, project presentation and summary report

Computer Network I. Process for assessment In-class participation(30%) Participation in class discussion, group discussion, presentation and play ing a proactive role in other class activities Group Case Study- Each group will be assigned one case in the beginning of the course and need to submit the case presentation (i.e. power point file) before the lecture of presentation/discussion Individual written assignment (30%) Softcopy to teaching assistant and lecturer Including question /answer, summary of reading, and research s Electronic submission preferable (o late submission Group project(40%=20%Report+20% Presentation) Project topics will be either assigned by lecturer or proposed by project members (with lecturers 20-minute presentation followed by 10 minute Q&A (April 12, 2008) Submission of written report+ presentation file( due date: April 27, 2008) IV. Course Policies Academic dishonesty The University Regulations on acade mic dishonesty will be strictly enforced. Academic dishonesty is behavior in which a deliberately fraudulent misrepresentation is employed an attempt to gain undeserved intellectual credit, either for oneself or for another. It includes, but is not necessarily limited to, the following types of cases a. Plagiarism- The representation of someone elses ideas as if they are ones own. Where the arguments, data, designs, etc, of someone else are being used in a paper, report, oral presentation. or similar academic project, this fact must be made explicitly clear by citing the appropriate references. The references must fully indicate the extent to which any parts of the project are not ones own work. Paraphrasing of someone else's ideas is still using someone else's ideas, and must be acknowledged b. Unauthorized Collaboration on Out-of-Class Proiects- The representation of work as solely one's own when in fact it is the result of a joint effort. c. Cheating on In-Class Exams. The covert gathering of information from other students, the use of unauthorized notes, unauthorized aids, etc d. Unauthorized Advance Access to an Exam- The representation of materials prepared at leisure, as a result of unauthorized advance access(however obtained), as if it were prepared under the rigors of the exam setting. This misrepresentation is dishonest in itself even if there are not compounding factors, such as unauthorized uses of books or notes
Computer Network 6 III. Process for Assessment IV. Course Policies Academic Dishonesty: The University Regulations on academic dishonesty will be strictly enforced. Academic dishonesty is behavior in which a deliberately fraudulent misrepresentation is employed in an attempt to gain undeserved intellectual credit, either for oneself or for another. It includes, but is not necessarily limited to, the following types of cases: a. Plagiarism - The representation of someone else’s ideas as if they are one’s own. Where the arguments, data, designs, etc., of someone else are being used in a paper, report, oral presentation, or similar academic project, this fact must be made explicitly clear by citing the appropriate references. The references must fully indicate the extent to which any parts of the project are not one’s own work. Paraphrasing of someone else’s ideas is still using someone else's ideas, and must be acknowledged. b. Unauthorized Collaboration on Out-of-Class Projects - The representation of work as solely one's own when in fact it is the result of a joint effort. c. Cheating on In-Class Exams - The covert gathering of information from other students, the use of unauthorized notes, unauthorized aids, etc. d. Unauthorized Advance Access to an Exam - The representation of materials prepared at leisure, as a result of unauthorized advance access (however obtained), as if it were prepared under the rigors of the exam setting. This misrepresentation is dishonest in itself even if there are not compounding factors, such as unauthorized uses of books or notes. In-class participation (30%) ▪ Participation in class discussion, group discussion, presentation and playing a proactive role in other in - class activities. ▪ Group Case Study - Each group will be assigned one case in the beginning of the course and need to submit the case presentation (i.e. power point file) before the lecture of presentation/discussion. Individual written assignment (30%) • Softcopy to teaching assistant and lecturer • Including question /answer, summary of reading, and research. • * Electronic submission preferable (No late submission) Group project (40% = 20% Report + 20% Presentation) • Project topics will be either assigned by lecturer or proposed by project members (with lecturer’s approval). • 20-minute presentation followed by 10 minute Q&A (April 12, 2008) • Submission of Written report + presentation file (due date: April 27, 2008)

V. Course Schedule Lecture Subjet Supplement/Reference Homework Course overview Chapter One: 1 2/16 Core Network Concepts 2 2/23Standard Chapter Two 330 Physical Layer Propagation Chapter Three 43/9 connetorizing UTP 53/16Ethernet LANs Chapter Four: 63/23 Lab on creating lan Case report 7 3/30 Wireless LAN Chapter Five 84/6 i presentation On lastest wireless Presentation technology and mobile commerce 94/13 Telec Chapter sⅸ 10 4/20 Presentation On Lastest WAN technology Presentation 114/27wANs Chapter Seven; 125/4 Case Study First Bank of paradise's wide Case Report area networks 135/11 TCPAP Internetworking Chapter Eight Hands-On: Packet Capture 145/18 Lab on TCP/P and Analysis with WinDUMPCase Report and TCPdUmP 5 5/25 Security Ch hapter nine 16 6/ Security Lab Case Study Hands-On: Windows Security Case Report 1716/8 Network Management Chapter Ten; 18 6/15 Project Presentation Project eport Due 196/22 Examination
Computer Network 7 V. Course Schedule Lecture Subject Supplement/Reference Homework 1 2/16 Course overview Core Network Concepts Chapter One; 2 2/23 Standard Chapter Two; 3 3/2 Physical Layer Propagation Chapter Three; 4 3/9 Lab on physical layer Hand-On: cutting and connetorizing UTP 5 3/16 Ethernet LANs Chapter Four; 6 3/23 Lab on creating LAN Case report 7 3/30 Wireless LAN Chapter Five; 8 4/6 Presentation On Lastest wireless technology and mobile commerce Presentation 9 4/13 Telecommunication Chapter Six; 10 4/20 Presentation On Lastest WAN technology Presentation 11 4/27 WANs Chapter Seven; 12 5/4 Case Study First Bank of Paradise’s wide area networks Case Report 13 5/11 TCP/IP Internetworking Chapter Eight; 14 5/18 Lab on TCP/IP Hands-On: Packet Capture and Analysis with WinDUMP and TCPDUMP Case Report 15 5/25 Security Chapter Nine; 16 6/1 Security Lab & Case Study Hands-On: Windows Security Case Report 17 6/8 Network Management Chapter Ten; 18 6/15 Project Presentation Project Report Due 19 6/22 Examination
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 复旦大学:《计算机网络 Computer Networking》课程教学资源_教学大纲(中文)胥正川.doc
- 复旦大学:《网络虚拟环境与计算机应用》PPT教学课件_lecture7 网络虚拟环境与人文精神.ppt
- 复旦大学:《网络虚拟环境与计算机应用》PPT教学课件_lecture6 网络虚拟环境中的计算机科学问题.ppt
- 复旦大学:《网络虚拟环境与计算机应用》PPT教学课件_lecture5 构建NVE——虚拟现实技术.ppt
- 复旦大学:《网络虚拟环境与计算机应用》PPT教学课件_lecture4 构建NVE——互联网与Web.ppt
- 复旦大学:《网络虚拟环境与计算机应用》PPT教学课件_lecture2 网络虚拟环境的应用.ppt
- 复旦大学:《网络虚拟环境与计算机应用》PPT教学课件_lecture3 网络虚拟环境发展历程.ppt
- 复旦大学:《网络虚拟环境与计算机应用》PPT教学课件_lecture1 网络虚拟环境概述.ppt
- 复旦大学:《网络虚拟环境与计算机应用》PPT教学课件_lecture0 课程介绍.ppt
- 《网络虚拟环境与计算机应用》课程参考资料:网络行为心理学——虚拟世界与真实生活〔英〕亚当·乔伊.pdf
- 《网络虚拟环境与计算机应用》课程参考资料:《虚实世界计算机仿真如何改变科学的疆域》PDF电子书(约翰.l.卡斯蒂).pdf
- 《网络虚拟环境与计算机应用》课程参考资料:数字化生存(尼古拉·尼葛洛庞帝).pdf
- 中国人民大学出版社网络文化丛书:《得乐园·失乐园——网络与文明的传说》PDF电子书(共十章,李河).pdf
- 《网络虚拟环境与计算机应用》课程参考资料:《失控——全人类的最终命运和结局》PDF电子书(共二十四章).pdf
- 《网络虚拟环境与计算机应用》课程参考资料:《大连接——社会网络是如何形成的以及对人类现实行为的影响》PDF电子书.pdf
- 《网络虚拟环境与计算机应用》课程参考资料:《大脑革命——数字时代如何改变了人们的大脑和行为》PDF电子书.pdf
- 陕西科学技术出版社:《人工智能的未来》PDF电子书(共八章,杰夫·霍金斯、桑德拉·布拉克斯莉).pdf
- 《网络虚拟环境与计算机应用》课程参考资料:《大设计 THE GRAND DESIGN》(英)史蒂芬.霍金.pdf
- 《网络虚拟环境与计算机应用》课程参考资料:大型多人在线游戏开发 MASSIVELY MULTIPLAYER GAME DEVELOPMENT.pdf
- 《网络虚拟环境与计算机应用》课程参考资料:《21世纪网络生存术》PDF电子书(姜奇平,共十章).pdf
- 《计算机网络》课程教学资源(学习资料)Teaching Data Communications and Networking to School of Business Undergraduates.pdf
- 《计算机网络》课程教学资源(学习资料)IV-JIMC04-JiniCaseStudy.pdf
- 《计算机网络》课程教学资源(学习资料)IX-Corporate wireless LAN security threats and an effective security assessment framework for wireless information assurance-IJMC06.pdf
- 《计算机网络》课程教学资源(学习资料)Mobile banking services.pdf
- 《计算机网络》课程教学资源(学习资料)mobile commerce-what is and what could be.pdf
- 《计算机网络》课程教学资源(学习资料)MobiPass-a passport for mobile business.pdf
- 《计算机网络》课程教学资源(学习资料)Security and privacy issues of handheld and wearable wireless devices.pdf
- 《计算机网络》课程教学资源(学习资料)SpecialIssueHomeland security-Introdution.pdf
- 《计算机网络》课程教学资源(学习资料)The economics of wireless networks.pdf
- 《计算机网络》课程教学资源(学习资料)Understanding mobile handheld device use and adoption.pdf
- 《计算机网络》课程教学资源(学习资料)understanding usability in mobile commerce.pdf
- 《计算机网络》课程教学资源(学习资料)VIII-wlansecurity.pdf
- 《计算机网络》课程教学资源(学习资料)VII-Short-range Wireless Technologies with Mobile Payments Systems.pdf
- 《计算机网络》课程教学资源(学习资料)V-Wireless in the enterprise requirements, solutions and research directions.pdf
- 《计算机网络》课程教学资源(学习资料)What's so different about the mobile Internet.pdf
- 《计算机网络》课程教学资源(学习资料)X-An onion ring framework for developing and assessing mobile commerce security-IJMC06.pdf
- 《计算机网络》课程教学资源(学习资料)XIII-system model for mobile commerce.pdf
- 《计算机网络》课程教学资源(学习资料)XI-IJMC04-Critical success factors in mobile communications a comparative roadmap for Germany and India.pdf
- 《计算机网络》课程教学资源(学习资料)XII-The evolution of China's mobile telecommunications industry past, present and future-IJMC05.pdf
- 《计算机网络》课程教学资源(学习资料)XIV-IJMC-A framework for mobile business applications.pdf