Syllabus for Telecommunications in Information Systems (CSIA302)

wirelessguideMobile - Wireless

Nov 24, 2013 (3 years and 11 months ago)

287 views


Syllabus for Telecommunication
s

in
Information Systems

(
CSIA302
)



Course Number/Section:
CSIA302
-
A851

Course

Title:
Telecommunication

in
Information
Systems


Instructor Name/Title:
Professor Patsy Reece

Instructor Contact Information:

Email address:

preece@faculty.umuc.edu

and (704) 277
-
6835

Eastern Time

Hi! from Patsy Reece in Charlotte, NC. I have been an online facilitator and online course
designer since 2001. You can reach me at
preece@faculty.umuc.edu

or (704
-
277
-
6835).

I have over twenty years in the IT field with over 17 with IBM around the U.S., and several
others as an IT consultant along the East Coast. My IT experience covers all areas of the
software lif
ecycle, including programming, quality analysis, testing, business analysis, project
management, training, and education.

My academic background consists of an AS in Business Administration, a BS in Management
and Marketing, an MS in Information Technology

Management, and an MS in Instructional
Design for Online Learning. I am currently completing a PhD in Information Systems
Management. My few certifications include CSTE (Certified Software Test Engineer), CSQA
(Certified Software Quality Analyst), and Six

Sigma Green Belt.


Course Introduction

Telecommunications is a very exciting field for one's current and/or future work in cybersecurity
and information technology. Telecommunications is the backbone of the IT infrastructure of the
business enterprise, en
abling business
-
to
-
business, person
-
to
-
person connectivity in today's
global environment. This course provides a foundation in the concepts of telecommunications,
networking, applications, management, and the relevant laws and standards.



Course Descript
ion

(Formerly IFSM 450.) Prerequisite: CSIA 301 or IFSM 300. An introduction to
telecommunications infrastructure. The goal is to plan, analyze, and design a secure
telecommunications infrastructure that meets business needs and protects information assets
.
Topics include cybersecurity, data communication protocols and standards, networks, and
trends in telecommunications. Students may receive credit for only one of the following
courses: CSIA 302, CMIS 370, CMSC 370, or IFSM 450.

Course Outcomes



After co
mpleting this course, students should be able to:

1. plan a secure telecommunications infrastructure based on business needs, requirements,
policies, standards, and best practices to align with organization strategies

2. analyze business
-
driven requiremen
ts for telecommunications and technology solutions to
determine application, feasibility, and potential risks

3. design and implement a reliable and secure telecommunications infrastructure that protects
business information assets



Position of Course i
n Curriculum



Role in Program and Degree Requirements


This course is a required foundational course for both CSIA and IFSM majors.


Program Outcomes to Which this Course Maps


This course supports and aligns with CSIA program outcomes 1 and 2.


CSIA
program outcomes:


P1. Protect an organization's critical information and assets by ethically integrating
cybersecurity best practices and risk management throughout an enterprise.

P2. Implement continuous monitoring and provide real
-
time security soluti
ons.

P3. Analyze advanced persistent threats and deploy countermeasures, and conduct risk and
vulnerability assessments of planned and installed information systems.

P4. Participate in forensic analysis of cyber incidents and assist in recovery of operat
ions.

P5. Formulate, update, and communicate short
-

and long
-
term organizational cybersecurity
strategies and policies.

P6. Assist in assessing, planning, and executing a business continuity program.


Course Materials


Title:

Data Communications & Comput
er Networks
: A Business User’s Approach

Author:

Curt M. White

Edition
:

6
th


Year:


2011

ISBN
: 9780538452618

Microsoft Word application suite

is the standard application used to submit written
assignments.


Project Descriptions



CSIA 302 is one of the t
wo options designed to provide students with foundational
understanding of the infrastructure and technology that moves data through networks and
telecommunications systems and how to protect that data.

Assignments include a group project to analyze busin
ess requirements, a white paper to analyze
risk and make recommendations to mitigate risks, and case studies to address security
implications of various architectures.


Project 1: Group Project



Based on one of the two scenarios below, your group will cre
ate a deliverable PowerPoint
presentat
ion, as assigned:



Scenario 1

Richard's Plumbing Co. has rapidly grown to become a multistate business, and it has recently
acquired Mr. Plumber, a smaller company with multiple outlets located in the same states. Ea
ch
of the companies has its own data network. Mr. Plumber's network connects the field offices
with the databases at the main office. During its earlier expansion, Richard's Plumbing
implemented a network solution that provides mobile access to the custome
r database for the
employees who respond to customer calls. Richard's employees currently use laptops with
wireless access cards with prepaid air time. With the acquisition of Mr. Plumber, Richard's wants
to put all employees on one network and give them w
ireless access directly into the customer
database. They would like to reduce the size of the equipment that employees must carry with
them and eliminate the use of air cards. Your team will list and define the requirements, create
the project steps that n
eed to be completed, identify the technology that needs to be incorporated,
identify issues and security risks, and explain how testing will be done to ensure that
requirements are met and the wireless network is secure.


Scenario 2

Elegant Solutions ins
talls window treatments for homes and offices. They have a large mobile
workforce that spends most of the time out in the field with customers. The salespeople follow
up on customer leads, visit the homes or offices, take the orders and measurements, order

the
window treatments, accept payments from customers, and maintain liaison with the customer
until the project is completed. The installers are also mobile, obtaining their work assignments on
a daily basis, and reporting progress, problems, and completi
on. Much of this is currently done
by telephone, but Elegant Solutions wants to implement a wireless network to connect the sales
force to the corporate customer, materials, ordering, and finance databases. They want to provide
the same wireless access for

the sales and installation personnel when they are in the office. Your
team will list and define the requirements, create the project steps that need to be completed,
identify the technology that needs to be incorporated, identify issues and security risk
s, and
explain how testing will be done to ensure that requirements are met and the wireless network is
secure.


The Deliverable

Your team will develop a PowerPoint presentation that explains the business problem, lists the
requirements, identifies the te
chnology solutions, lists major project steps, identifies issues and
security risks, and explains testing to be done to ensure that requirements are met and the
network is secure. One or more of the presentation slides should contain a table with
requireme
nts and corresponding technology solutions. The presentations should also contain
appropriate diagrams and illustrations. It should be designed as a professional presentation with
appropriate background, fonts, titles, etc. Separate slides should be includ
ed for the cover, the list
of topics covered, the body of the presentation, and the conclusion. Slides should contain the
main points in bullet form, with the text of your presentation (what the speaker would say)
contained in the Notes section accompanyin
g each slide.


Grading


Individual Participation

At the beginning of the assignment, members of the group should assume the various roles of
researcher, writer, editor, illustrator, etc. The work should be balanced among the team. At the
conclusion of th
e project, each team member will rate the participation of each of the team
members, including himself or herself. These ratings will be sent to the instructor via Private
Messaging, using the criteria below.



Grading Rubric for Individual Participation


Description of Participation

Score

Main participant, without whom the project quality
would suffer; major contributor

5

Important participant; major contributions; offered
suggestions for improvements to overall project

4

Good participant; assignmen
ts completed on time;
contributed to discussion of others' input

3

Average participant; did what was assigned, but little
beyond that

2

Minimal participation; little work done

1

No participation

0



Group Project Grade


The group project will be g
raded based on the grading rubric below. (The instructor will determine
whether all members of a group will receive the same grade, or will have their grades influenced by
the group members' ratings of their individual participation.)


Grading Rubric


Att
ribute


Full points

Partial points

No points

Possible
points

Requirements
analysis/

technology
solution table

Requirements analysis/technology
solution appropriately addresses the
business scenario/problem, and
demonstrates understanding of
cou
rse concepts, analysis, and
critical thinking.

Requirements analysis/technology
solution somewhat addresses the
business scenario/problem; it may be
lacking in demonstration of
understanding of course concepts,
analysis, and/or critical thinking.

Require
ments
analysis/technology
solution table is not
included, or does not
identify requirements or
solutions appropriate to the
scenario.

25

Major project
steps

Major project steps to implement the
solution are appropriately identified.

Major project steps

to implement the
solution are partially identified and/or
are somewhat appropriate.

Major project steps are not
included.

10

Issues and
security risks
identified

Issues and risks of the proposed
solution are appropriately identified;
work demonstrates

understanding of
course concepts, analysis, and
critical thinking.

Issues and risks of proposed solution
are partially identified; work may be
lacking in demonstration of
understanding of course concepts,

analysis, and/or critical thinking

Issues and r
isks are not
included, or do not apply to
the proposed solution.

10

Testing
strategy

An effective testing strategy that
tests capabilities and security is
proposed; work demonstrates
understanding of course concepts,
analysis, and critical thinking.

Te
sting strategy is not well
-
defined or
not appropriate, and/or may be
lacking in demonstration of
understanding of course concepts,
analysis, and/or critical thinking.

No testing strategy is
included.

10

Diagram

Diagram(s) are included,
appropriately in
corporated, and
enhance understanding of the
solutions proposed.

Diagram(s) are included, but may not
be appropriately incorporated, and
may not enhance understanding of
solutions proposed.

No diagrams are included.

15

Presentation
content

Sufficient
narrative is included in
the Notes area to fully explain the
content of the presentation; work
demonstrates understanding of
course concepts.

Narrative provided partially covers
the content; work may be lacking in
demonstration of course concepts.

No nar
rative is provided in
the Notes area to
supplement the content on
the slides.

20

Presentation
format

The presentation reflects effective
organization, creative design, and
correct structure of slides, grammar,
and spelling; it is presented in a
professi
onal

format; and references are
appropriately incorporated and cited,
using APA style.

The presentation is not well
-
organized, lacks effective design,
and/or contains grammar and/or
spelling errors; and/or it does not
follow APA style for

references and

citations.

The presentation is
extremely poorly done and
does not convey the
information.

10




Total points

100



Project 2: White Paper (Risk)


Scenario: Metric Machine Parts and Supplies Corp.


With 75,000 customers worldwide, 250 employees work
ing in four locations in the United States
and three European offices, and a catalog of more than 100,000 parts, Metric Machine Parts and
Supplies Corp. (MMPS) relies on its network for its survival. In the past decade, MMPS has seen
its business grow from

just one location and a few local customers to the worldwide supplier it is
today. But in the process of growing exponentially, it has overwhelmed its telecommunications
network, which is currently managed by an outside telecommunications network manageme
nt
company. The network crashes frequently, resulting in customer service and e
-
mail interruptions
that are costly to the company. The network management company is not responsive to MMPS, a
relatively small customer, and often disagrees that there is even

a problem. Since the contract
with the service provider is about to expire, MMPS has decided to seek a better network solution.


The chief information officer (CIO) has outlined the key requirements for a new network for
MMPS. He has explained to the exe
cutive board that a new network would have the following
characteristics:


1.
Availability:
Business operations require maximum uptime, and quick repairs when needed.

2.
Reliability:
The network must function as designed and produce accurate results.

3.

Scalability:
MMPS continues to grow at a rapid rate, and there are plans for acquisition of
several small parts suppliers; the network must support this growth.

4.
Security:
The confidentiality and integrity of MMPS's data is of great importance, as is t
he
protection of its customers' data.

5.
Flexibility:
The new network must be responsive to the changing needs of the business.

6.
Performance:
The network must provide quick access for employees and customers.

7.
Manageability:
The network must be desi
gned and implemented so that it can be managed by
a small team of centrally located IT specialists.

8.
Economic efficiency:
The ongoing operations and maintenance costs should offset the initial
investment costs, reducing the long
-
term total cost of owner
ship of the network.


MMPS's executives have agreed that they need a business network with higher reliability,
security, and scalability, but with lower costs, than the existing externally managed network. The
CIO has proposed that MMPS design and impleme
nt its own network, using advanced
technologies for high availability, efficiency, and security management, that can be operated by a
very small IT department. He proposes to use virtual private network technologies to connect
remote offices and users secu
rely and to facilitate company expansion.


The CIO has asked you to develop a three
-
page white paper that provides the following:



definition of the business or technical problem



discussion of the problem within the context of the scenario



recommendatio
n of the application of technology, processes, and policies that solve the
problem



discussion of the impact or risks of the applied solution within the context of business
strategy and managerial perspective



identification, analysis, and mitigation of ri
sks of the recommended solution



The Assignment


Briefly define the business problem, and discuss it in the context of the scenario. Briefly describe
the proposed technology solution, processes, and policies to solve the problem. You should
demonstrate y
our critical thinking as you incorporate the course concepts and explain the
business needs and solutions. Then discuss the impact or risks of the applied solution within the
context of the business strategy and managerial perspective. Then discuss the cha
llenges and
security risks that result from implementing the proposed solution. Propose mitigation strategies
for the challenges and risks identified.


Your deliverable will be a white paper three pages in length, not counting the cover page and
reference
s page. At least two external sources (other than the textbook and other materials
provided in the course) must be used, and citations and references must be in APA format.

Your
paper will be graded according to the grading rubric below. Be sure you have i
ncorporated all
required aspects of the assignment.


Grading Rubric



Attribute

Full points

Partial points

No points

Possible
points

The
business
problem

The business problem is defined
and discussed in sufficient depth
to set the stage for the propose
d
solution, and demonstrates
critical thinking and
understanding of the course
concepts.

The business problem is partially
defined and/or discussed; it may not
adequately set the stage for the
proposed solution and/or may not
demonstrate critical thinking

and
understanding of course concepts.

The business problem is
not defined.

10

Proposed
technology
solution

The proposed technology
solution appropriately addresses
the business scenario/problem,
and demonstrates understanding
of course concepts, analy
sis, and
critical thinking.

The proposed technology solution
somewhat addresses the business
scenario/problem; it may be lacking in
demonstration of understanding of
course concepts, analysis, and/or
critical thinking.

No technology solution
is proposed.


25

Proposed
processes
and policies
for the
technology
solution

Processes and policies relevant
to the proposed solution are
presented; work demonstrates
understanding of course
concepts, analysis, and critical
thinking.

The processes and policies some
what
address the business scenario/problem;
work may be lacking in demonstration
of understanding of course concepts,
analysis, and/or critical thinking.

No proposed processes
or policies are presented.

10

Impact/risks
in context of
business
strategy an
d
managerial
perspective

Impact and risks relevant to the
proposed solution and the
business strategy are presented
from a managerial perspective;
work demonstrates
understanding of course
concepts,

an
alysis, and critical thinking.

Impact and risks are
somewhat
relevant to the proposed solution
and/or the business strategy; they may
or may not be presented from a
managerial perspective; and they may
be

lacking in demonstration of
understanding of course concepts,
analysis, and/or critical thinking.



No

impact or risks are
presented.

10

Challenges
and security
risks
identified

Challenges and risks of the
proposed solution are
appropriately identified; work
demonstrates understanding of
course concepts, analysis, and
critical thinking.

Challenges and
risks of the proposed
solution are partially identified and/or
explained; work may be lacking in
demonstration of understanding of
course concepts, analysis, and/or
critical thinking.

Challenges and risks are
not included, or do not
apply to the proposed
solution.

15

Mitigation
strategies

Appropriate mitigation strategies
are provided and thoroughly
explained. All risks of the
proposed solution are addressed.

Mitigation strategies are somewhat
appropriate and/or partially explained.
They may only parti
ally address the
risks of the proposed solution.

No mitigation strategies
are provided.

10

External
research

At least two sources other than
the textbook (and other course
material) are incorporated and
used effectively.

One or two sources other than
the
course material may be used, but they
are not properly incorporated or used
and/or are not effective or appropriate.

No external research is
incorporated.

10

Report

format



The report

reflects effective organization
and correct sentence structure
,
grammar, and spelling; it is
presented in a professional
format; and references are
appropriately incorporat
ed and
cited, using APA style.

The report is not

well
-
organized, and/or contains
grammar and/or spelling errors; and/or
it does not follow APA st
yle for
references and citations.



The report is

extremely poorly written
and does not convey the
information.


10





Total points

100




Case Study: Requirements Analysis


Company Overview

Rapid Freight, a global logistics provider, offers fully

integrated freight and supply chain
services through managed warehousing and domestic and international freight forwarding.
Services range from door
-
to
-
door domestic and international delivery services to total supply
chain management. With branches acros
s the United States and Europe and partners worldwide,
Rapid Freight continues to expand, and it has experienced rapid growth through acquisitions.


Note
:
The term
supply chain
refers to all the elements involved in bringing an organization's
products fro
m the raw
-
goods stage to the customer. The
APICS
(Association for Operations
Management)
Dictionary
(http://www.apics.org/Resources/APICSDictionary.htm) defines
supply chain management
(SCM) as the "design, planning, execution, control, and monitoring of
s
upply chain activities with the objective of creating net value, building a competitive
infrastructure, leveraging worldwide logistics, synchronizing supply with demand and measuring
performance globally."


The Business Challenges

Rapid Freight is compet
ing in an environment where freight transport is as much about keeping
customers informed as it is about on
-
time delivery. The company has adopted web
-
based
technologies for tracking freight, differentiating its services, keeping customers informed, and
en
suring the on
-
time delivery that is Rapid Freight's hallmark. As a result, Rapid Freight enjoys a
very high level of customer satisfaction.


Its mobile workforce has rapidly increased, with drivers using PDAs to scan consignments,
which are then synced in

real time via GPRS links to headquarters applications that track the
consignments. Customers use Rapid Freight's web services to view the progress of orders, from
dispatch to warehousing to final delivery. Customers also use Rapid Freight's web
-
based syst
ems
to create freight documentation and generate reports. With the EDI interface, invoices and
payments are transferred directly between the customers' systems and Rapid Freight, saving both
time and money.

As the company has expanded, the data flowing in

the system have increased as well. Now, with
more than 5,000 employees and thousands of customers worldwide, Rapid Freight is suffering
from the effects of explosive growth. Demands on its wide area network (WAN) are exceeding
capacity. The main data cent
er has experienced several network outages and unscheduled
downtime. The aging ISDN telephone system is failing, as the company has avoided the costly
upgrades necessary to keep it operating at optimal performance. Telephone bills have increased
without wa
rning, and the voice mail system is overloaded.


The Opportunity

Rapid Freight wants to provide increased bandwidth between all 47 of its US offices and the
main data center. There are three metropolitan areas that have four to eight Rapid Freight
locati
ons that need to coordinate among themselves: Chicago, Los Angeles, and Baltimore. The
company desires a reliable and secure network to accommodate its planned growth as well as the
unexpected.


The company does not want to spend any more on telephone ser
vices than it does today, and its
goal is to upgrade the services while protecting against escalating costs from its ISDN service
provider.


Efficiency and productivity goals for this rapidly growing company are of paramount
importance, and there is a des
ire to provide capabilities and services that incorporate technology
solutions to improve in those areas as well as retain the high level of customer satisfaction. Rapid
Freight is also interested in reducing travel between its sites by implementing video
conferencing.


In addition, Rapid Freight wants to be able to monitor and manage data and voice services, and
ensure that consumption is appropriate to its business needs.


The Assignment

Using this case study, you are to identify a minimum of five requ
irements, analyze them, and
offer a proposal that provides Rapid Freight with an converged network solution and explains
how the components of the solution, and the solution as a whole, meet the identified
requirements. The proposed solution must address e
ach of the requirements identified. At least
one diagram or illustration must be incorporated to illustrate your proposed solution. You should
do some research to address the cost issues and defend the proposed solution from a cost
-
benefit

perspective. Th
is is to be a general analysis of the benefits versus the cost of a converged
network, not a full cost
-
benefit analysis with cost data.

Your deliverable will be a three
-

to four
-
page paper. The page requirement includes illustrations
or diagrams, but does

not count the cover page and references page. At least two external sources
(other than the textbook and other materials provided in the course) must be used, and citations
and references must be in APA format. Your paper will be graded according to the g
rading
rubric below. Be sure you have incorporated all required aspects of the assignment.


Grading Rubric


Attribute

Full points

Partial points

No points

Possible
points

Requirements
analysis

Analysis covers five
requirements, defining them
and providi
ng explanations of
each; and demonstrates
understanding of course
concepts, analysis, and critical
thinking.

Analysis covers one to four
requirements, and/or lacks
definitions and/or explanations for
each; and may be lacking in
demonstration of understand
ing of
course concepts, analysis, and/or
critical thinking.

Analysis is not included, or
does not identify any
requirements.

30

Technology
solution

An appropriate technology
solution is provided and
thoroughly explained. It
addresses all identified
req
uirements.

A technology solution is partially
appropriate and/or partially
explained. It may only partially
address the requirements.

No technology solution is
provided.

30

Converged
solution

An effective converged
network is proposed; work
demonstrat
es

understanding of course
concepts, an
alysis, and critical
thinking.

The proposed converged network
is not well
-
defined or is not
appropriate, and/or the work may
be lacking in demonstration of
understanding of course concepts,
analysis, and/or critical

thinking.


No converged solution is
included.

10

Cost
-
benefit
analysis

The benefits of the converged
solution are fully discussed in
terms of relative cost of
implementing multiple
solutions.

The benefits and relative costs of a
converged network are
partially
explained or substantiated.

No cost
-
benefit analysis is
provided.

10

External
research

At least two sources other than
the textbook (and other course
material) are incorporated and
used effectively.

One or two sources other than the
course m
aterial may be used, but
are not properly incorporated or
used and/or are not effective or
appropriate.

No external research is
incorporated.

10

Report format

The report reflects effective
organization and correct
sentence structure, grammar,
and spell
ing; it is presented in a
professional format; it
incorporates illustrations or
diagrams; and references are
appropriately

incorporated and cited, using
APA style.

The report is not well
-
organized,
and/or contains grammar and/or
spelling errors; it does
not contain
appropriate illustrations or
diagrams; and/or it does not follow
APA style for references and
citations.


The report is extremely
poorly written and does not
convey the information.

10




Total points

100



Architectural Diagram: Rapid Fre
ight Converged Network



The Case Study

See the assignment instructions for Case Study: Requirements Analysis.


The Assignment

For this assignment, you will use your proposed solution for the Rapid Freight requirements
analysis. Briefly describe the pro
posed technology solution, then list the security risks and
mitigation strategies associated with the proposed solution. This should be done on one page.
Then provide a diagram that illustrates the placement of various security technologies within the
cont
ext of developing a robust and mature security posture for the proposed solution for Rapid
Freight's converged network.



Your deliverable will be a one
-
page paper and an architectural diagram. Your paper will be
graded according to the grading rubric belo
w. Be sure you have incorporated all required aspects
of the assignment.


Grading Rubric


Attribute

Full points

Partial points

No points

Possible

points


Challenges,
security risks,
and mitigation
strategies
identified

Challenges and risks of the
con
verged network are
appropriately identified from
the proposed solution; work
demonstrates understanding of
course concepts, analysis, and
critical thinking.

Challenges and risks of the
proposed solution are partially
identified and/or explained; work
may
be lacking in demonstration of
understanding of course concepts,
analysis, and/or critical thinking.

Challenges and risks are not
included, or do not apply to
the proposed solution.

20

Security
technology
solutions

Appropriate security
technologies are

identified.

The security technologies
identified are somewhat
appropriate; they may only
partially address the security
requirements of the proposed
solution.

No security technologies are
provided.

30

Technology
diagram

Security technologies are
appr
opriately integrated in the
architectural diagram. Work
demonstrates understanding of
course concepts, analysis, and
critical thinking.

Security technologies are
somewhat appropriately integrated
into the architectural diagram;
work may be lacking in
demo
nstration of understanding of
course concepts, analysis, and/or
critical thinking.

Security technologies are not
included in the architectural
diagram, or are not
incorporated correctly.

20

Diagram
quality

The architectural diagram is
professionally pr
esented, is
clear, and appropriately
conveys the information.

The architectural diagram could be
clearer, and/or could be improved
to adequately convey the
information.

No architectural diagram is
provided.

20

Report format

The report reflects effecti
ve
organization and correct
sentence structure, grammar,
and spelling; it is

presented in a professional
format; and any references used
are appropriately incorporated
and cited, using APA style.

The report is not well
-
organized,
and/or contains grammar
and/or
spelling errors; and/or it

does not follow APA style for
references and citations.


The report is extremely
poorly written and does not
convey the information.

10




Total points

100



Quizzes



During this course, you will take three quizze
s. The first quiz will be a self
-
assessment; the
remaining quizzes will measure your understanding of weekly lessons.


Final Individual Paper


Prepare a telecommunications related paper. Topic may be selected from any topic in the text.
The paper should co
ntain a cover sheet, table of content, five pages of content, at least five
references, in
-
text citation, APA style, using report format.


Grading Information

**
Check each week’s task posting in the Conference area for more details on each
assignment
.*
*

G
rades will be based on the completion of the following assignments:

Conference participation
(8 @3 points)

2
4
%

Quizzes (5 @ 2
% each)

1
0
%

Group project: template with analysis

15%

White paper: risk

10%

Case study
Requirements Analysis

10%

Architectu
ral diagram

10%

Final examination: paper


Individual Topic


Outline and Rough Draft

13
%

3%

5%

TOTAL

1
00%



Grading Scale

A =

9
0


1
00⁰o楮is

B =

80
-

8
9 points

C =

70
-

7
9 points

D =

60
-

6
9

points

F =

0
-

5
9

points or less

Do not ex
pect an Incomplete in the course unless you have serious personal problems very close
to the end of the term. University of Maryland University College regulations are strict about the
assignment of an Incomplete. Please consult the Undergraduate Catalog f
or further information
on grading policies.

Participation
--
World Wide Web Protocols

By registering for a Web
-
based course, you have made a commitment to participate in your
course conferences as well as other online activities. To contact your instructor,
use the
conferencing software or e
-
mail links provided, which allow you to communicate with the
instructor and your classmates in a virtual classroom 24 hours a day, 7 days a week. .

For this
course, the weekly conferences open Monday at 12:01 a.m. eastern

time and end the following
Sunday at 11:59 p.m. eastern time.
Please plan to participate regularly. You will note in the
grading policy that your online conference participation counts towards your final grade

You are expected to adhere to the general rul
es of online etiquette. To prepare to use the online
conference, you should review Tips for Success and Online Etiquette in the Course Content area.

You are expected to demonstrate critical thinking and your understanding of the content in the
assigned re
adings as they relate to the issues identified in the conference discussion. In addition,
you are expected to make your own contribution in a main topic, as well as respond with value
-
added comments to
at least two of your classmates
.
The response to
your

in
i
tial discussion
question is due by Wednesday each week.

Finally, you are encouraged to respond to other
students as well as to your instructor. Your online conference participation counts significantly
toward your final grade.

Late Policy

All assignmen
ts are due as scheduled. If you are not going to be able to make the deadline for
some exceptional reason, you must notify me by e
-
mail
before

the materials are due. The penalty
for unexcused late submissions is 10 percent for the first seven (7) days afte
r the deadline and
100 percent thereafter.

Extra Credit

Extra Credit is not automatically given in this course. There are no provisions for extra credit.

Attendance

In this course
,

class participation is extremely important!

Participation is measured in
tw
o ways: interactive discussion with your classmates in the weekly Conference Activity and
the posting of your weekly case analysis to the Assignments folder.
Expect to spend two
to four hours of study time each week.

Writing and Research

Your work in this
course must demonstrate your ability to master and effectively communicate
course content using effective writing using the following goals:



meets the needs of the reader



adequately covers the subject



uses expected conventions of format and organizations




demonstrates use of credible reasoning and evidence



satisfies standards of style and grammatical correctness



requires 100% compliance with UMUC's zero
-
tolerance policy regarding plagiarism


Course Schedule

Week

Session Dates

Readings, Assignments, and

Due Dates

1

MAR 19 ~ MAR
25

Week 1 Overview: History, Concepts, and Terminology

The first week will provide the groundwork for the entire course
by explaining the history of the telecommunications industry,
covering some basic concepts and terminology,
and reviewing
pertinent laws and regulations. The history of telecommunications
dates back over 200 years, from the advent of the telegraph. Read
the web article noted in your reading assignments for the
complete history. Although the terms
data communicat
ions
and
telecommunications
are sometimes used interchangeably, they are
not the same.
Data communications
is the movement of
computer
-
readable data from one point to another by means of
electrical or optical transmission systems.
Telecommunications
is
a b
roader term involving the movement of all forms of data,
including voice and video. The resources listed in the course
module for week 1 will give you a basic understanding of the
terminology and concepts pertaining to this course. Finally, it is
always im
portant to understand any relevant laws and/or
regulations. The Telecommunications Act of 1996, which
amended the Communications Act of 1934, outlines the role of
the Federal Communications Commission (FCC), and the web
links provide great background conce
rning the act.


Read:

Text:
White
,

Data Communications and Computer Networks

o
Chapter 1, "Introduction to Computer Networks & Data
Communications," pp. 1
-
26

o
Glossary, pp. 457
-
476

Module 1: Telecommunications Overview


Do:

o

Weekly d
iscussion

o

C
hapt
er pre
-
quiz

self
-
assessment

o

S
tudy groups
assigned

o

Choose a topic for your individual final paper


Concepts

historic

evolution of where we are and how we got here (1)

cybersecurity (2)

telecommunications components

congressional law (4)

national vs.
international (4), (5)

terminology (3)

overview of policies and standards (5)


Skills

computer skills

Internet fundamentals


Issues

cybersecurity

written and oral communications

lack of computer skills

vocabulary

varied student backgrounds

2

M
AR 26 ~ APR
1

Week 2 Overview: Telecommunications and Networking
Essentials 1

This week, we will begin to discuss the technologies that support
telecommunications and networks. Before you can understand
how the network components work together, you will n
eed to
understand how data are represented within our computer
systems. We will start by reviewing the numeric systems that
computers use for data storage and data communications. In
addition to data formats, memory and the physics of data will be
discusse
d. Once you understand how the data are represented
within our computer systems, we can begin to understand how the
Internet works at the network level. We will explore how items
are addressed, using IP addresses, and found in the World Wide
Web, using the

Domain Name System (DNS). Next, we will
examine how end
-
to
-
end transmission of data takes place across
the networks, using the Open Systems Interconnection (OSI)
model. Finally, we will look at the protocols that define the rules
that govern how networks
communicate. We will specifically
focus on the Transmission Control Protocol and the Internet
Protocol (TCP/IP). The resources listed in the course module for
week 2 will provide an overview of the numeric systems and
background on how the Internet works.


Read:

Text:
White
,
Data Communications and Computer Networks

o Chapter 2, "Fundamentals of Data and Signals," pp. 34
-
62

o Chapter 3, "Conducted and Wireless Media," pp. 70
-
99

o Chapter 10, "The Internet," pp. 308
-
320

o
Module 2: Digital Representati
on of Data, OSI Model and
TCP/IP, Fundamentals of Data and Signals, Hardware and
Connectors


Do:

o

W
eekly discussion

o

Q
uiz: terminology

o

S
cenarios
will be assigned to

grou
ps to
begin work



Concepts

OSI model

TCP/IP

Internet protocols

wireless vs. wire
d (1), (2), (3)


Skills

TCP/IP

written and oral communications

research


Issues

national vs. international

lack of hands
-
on network experience

math

various incompatible software

3

APR 2 ~ APR 8

Week 3 Overview: Telecommunications and Networking
Essentials
2

Now that you have a basic understanding of how the Internet works, we
can begin to examine the components used to build a standard
telecommunications network. Telecommunications networks can be
made up of a complex set of technologies, includ
ing hubs, repeaters,
bridges, switches, routers, connectors, and cables. This week, we will
take a look at the purpose and role each of these components plays
within our network. These components can be combined to create many
different types of network to
pologies, including local area networks
(LANs), metropolitan area networks (MANs), and wide area networks
(WANs). Which topology you choose will depend on your business
requirements, which we will begin to discuss next week. We will also
look at how tradit
ional networks are converging as we begin to use the
same networks to transmit data, video, and voice. The resources listed in
the course module for week 3 will help explain network hardware and
connections, network topologies, and basic design principles.



Read:

Text: i
Data Communications and Computer Networks

o Chapter 7, "Local Area Networks: The Basics," pp. 197
-
226

o Chapter 9, "Introduction to Metropolitan Area Networks and Wide
Area Networks," pp. 276
-
297

o Chapter 11, "Voice & Data Delivery Ne
tworks," pp. 351
-
377

Module 2: Network Topologies, Network Components


Do:

o

Weekly discussions

o

Outline and rough draft for your individual project


Concepts

networks

Internet protocols

subnetwork

what is a design? (4)


Skills

written and oral commu
nications

research


Issues

national vs. international

lack of hands
-
on network experience

math

various incompatible software

4

APR 9 ~ APR
15

Week 4 Overview: Business Requirements and Risk Management

Why do we design complex telecommunications ne
tworks? Answer: In
order to meet the needs of a business or government entity. Before we
can begin to design a secure telecommunications network, we need to
understand what the business requirements are and how to interpret
them into a functional, cost
-
eff
ective design. In order to understand the
business requirements, you will need to be able to define the problem,
gather requirements, and develop your telecommunications strategy.
Telecommunications networks are becoming critical infrastructure for
busines
s, and they are used to conduct daily transactions and store and
process sensitive information. As you build these complex
telecommunications networks, you must consider the risk they pose to
the business, and manage the risk to an appropriate level to ens
ure that
the business is protected. This can be accomplished by completing a risk
assessment of your environment and recommending appropriate
controls to limit your risk exposure. The resources listed in the course
module for week 4 will review business re
quirements and the
components of risk management, including risk identification, risk
assessment, and risk mitigation strategies.


Read:

Text: White,
Data Communications and Computer Networks

o Chapter 13, "Network Design & Management," pp. 425
-
439

o

Mod
ule 3: Business Requirements, Needs Analysis, Risk
Assessment, Risk Management


Do:

o
Weekly discussion

o Qu
iz: terminology

o G
roup project (four per group, s
cenarios assigned in week 2)





o requirements gathering



o analysis comple
te

o T
emplate checklist


Concepts

how to define the problem (2)

requirements gathering (2)

business strategy (1)

what is a requirement? (2)

o technical

o functional

o operational

understanding business requirements (2)

needs analysis (1)

best p
ractices (3)

risk (3)

risk mitigation (1)

risk assessment

risk based on decision making (2), (3)

methodology (4)


Skills

business requirements

critical thinking

writing


Issues

keeping up with evolving technology

keeping up with evolving standar
ds

5

APR 16 ~ APR
22

Week 5 Overview: Telecommunications and Network Security

Understanding risk is the first step in securing your
telecommunications network. Now that you have that basic
understanding of risk, we will begin to learn how to protect our

telecommunications infrastructure. Telecommunications and
network security can be broken down into two basic areas:
communication and infrastructure. First, we need to ensure that
we are securing the communication protocols that are being used
to transmit

the data. This can be accomplished using various
secure protocols and encryption technologies. Second, we need to
ensure that the network components are secured properly so that
they cannot be compromised and used as pawns in the network to
intercept or c
ompromise the data and infrastructure. Best practices
can be used to configure and secure network components to
protect them from known vulnerabilities. The resources listed in
the module for week 5 will introduce the basic concepts of
information security
, including confidentiality, integrity, and
availability of our systems and information. It will also cover
specific details on providing communication and infrastructure
security.


Read:

Text: White,
Data Communications and Computer Networks

o Chapter
12, "Network Security," pp. 387
-
419

Module 3: Communications Security, Infrastructure Security


Do:

o Weekly discussion

o W
hite paper (risk analysis)


o Define problem, find solution, state solution due end of week 5

o Quiz: risk


Concepts

communi
cation security (1)

network security (1)

giving examples of technology solutions (2)

what is reliable? (3)

defining quantitatively (4)


Skills

critical thinking


Issues

keeping up with evolving technology

keeping up with evolving standards

6

APR

23 ~ APR
29

Week 6: Telecommunications and Network Design

Building a telecommunications network requires an understanding
of many different technical concepts and components. Now that
you have a basic understanding of those concepts and
components, we ca
n begin to bring everything together into a
logical design and then a physical architecture. The logical
telecommunications network design describes the relationship and
interdependencies among the various concepts and protocols we
have discussed. It will
also contain the communication flow
throughout the network. The physical architecture will describe
the actual components that will be needed to build the network,
including media selection, topology, and routing and switching.
The resources listed in the
course module for week 6 will assist in
developing a telecommunications network design strategy and
will review current best practices.


Read:

Text: White,
Data Communications and Computer Networks

o Chapter 3, "Media Selection Criteria," pp. 101
-
107

o

Chapter 7, "Local Area Networks," pp. 226
-
231

o Chapter 9, "Introduction to Metropolitan Area Networks and
Wide Area Networks," pp. 300
-
302

o Chapter 11, "Voice & Data Delivery Networks," pp. 377
-
380

o Chapter 13, "Network Design and Management," pp. 4
49
-
451

Module 4: Telecommunications and Network Design Strategies,
Telecommunications and Network Architecture, Logical and
Physical Diagrams


Do:

o Weekly discussion

o Case study: requirements analysis d
ue


Concepts

giving examples of technology solut
ions (2)

what is reliable? (3)

architecture diagram (5), (6)


Skills

diagramming (1), (2)


Issues

using diagramming software

7

APR 30 ~
MAY 6

Week 7: Telecommunications and Network Management

The physical architecture for your telecommunications n
etwork
will need to be planned, installed, maintained, and diagnosed for
any issues that may arise. As we have discussed, a
telecommunications network consists of highly complex
technologies, and trial and error alone may be insufficient to
diagnose a comm
unications and network problem. Rather,
specialized tools are required to ascertain the network's health and
identify any problems. In addition to maintaining the functionality
of the network, you will need to track key performance indicators
and metrics t
o ensure that the network is running at its optimal
performance level. Capacity management will be critical in
ensuring that the network continues to grow as business
requirements continue to change. The resources listed in the
course module for week 7 wil
l assist in planning, installing,
maintaining, and troubleshooting a network.


Read:

Text: White,
Data Communications and Computer Networks

o Chapter 6, "Errors, Error Detection, and Error Control," pp.
167
-
188

o Chapter 9, "Introduction to Metropolita
n Area Networks and
Wide Area Networks," pp. 297
-
300

o Chapter 13, "Network Design and Management," pp. 439
-
448

Module 4: Network Planning, Network Management


Do:

o

W
eek
ly discussion

conference

o

Co
mplete architecture diagram of telecommunications
networ
k

o

Quiz: TBC


Concepts

application and feasibility (1)

capacity scale

telecommunications metrics (2), (3)

bits sent/bits received (4), (5)

8

MAY 7 ~ MAY
13

Do:

o

Weekly discussion

o

Final
individual paper


The following is not written by your professo
r but accompanies your
academic syllabus for this course

UMUC Asia OL

Administrative Policies,
Procedures and Practices

Ordering Course Materials:

Textbooks can be ordered online at the Asia OL Web site,
http://
webtext.asia.umuc.edu/
. Books
ordered from any other source will be at the student's own risk. UMUC Asia cannot be responsible for
problems encountered when textbooks are ordered from sources outside of the Asia OL Web site.

Proctored Exams:

There is no p
roctored exam for this course.


Spring 2012 Session 2 (8 Week Course Calendar)

Registration Dates:
23 Jan 2012 ~ 19 Mar 2012

Session Dates:
19 Mar 2012 ~ 13 May 2012


WEEK

DATES

ACTIVITY

1

MAR 19 ~ MAR 25

Normal Course Instruction Begins

Mar 25 Last With
drawal Date for 75% Tuition Refund

2

MAR 26 ~ APR 1

Apr 1 Last Withdrawal Date for 50% Tuition Refund

3

APR 2 ~ APR 8

Normal Course Instruction

4

APR 9 ~ APR 15

Normal Course Instruction

5

APR 16 ~ APR 22

Normal Course Instruction

6

APR 23 ~ APR
29

Make Reservation for Proctored Exam (IF Required)

7

APR 30 ~ MAY 6

Make Reservation for Proctored Exam (IF Required)

May 4 Last Date to Officially Withdraw

8

MAY 7 ~ MAY 13

Proctored Exam Week (IF Required)



Contact Information:



For administrativ
e assistance contact:
de@asia.umuc.edu




For GoArmyEd issues contact:
GoArmyEd@asia.umuc.edu




For WebTycho assistance on workdays contact:
tycho@asia.umuc.edu




For WebTycho assistance on Saturdays and Sundays:
http://support.umuc.edu/




For proctored exam information, please visit the Asia OL Website at
http://de.asia.umuc.edu

and click on 'Proctored Exams'



For proctored exam assistance contact:
exams@asia.umuc.edu




For textbook assistance: contact
otextbooks@asia.
umuc.edu




For MyUMUC help visit UMUC 360 Helpdesk
-

http://support.umuc.edu/




Support for UMUC Asia students is also available by phone at 225
-
3696 (DSN) or 81
-
42
-
552
-
2510 Ext. 5
-
3696 (international comm.), Monday
-

Friday 7:30 a.m.
-

4:30 p.m. (JST).

Plagiarism:

Ask your professor about his/her plagiarism policies. Here is a great source for further guidance
on how to avoid plagiarism:
UMUC's On
line Writing Center

"How to Avoid Plagiarism"


The University has a license agreement with Turnitin, a service that helps prevent plagiarism from
Internet resources. The professor may be using this service in this class by either requiring students to
sub
mit their papers electronically to Turnitin or by submitting questionable text on behalf of a student.
If you or the professor submit part or all of your paper, it will be stored by Turnitin in its database
throughout the term of the University's contract
with Turnitin. If you object to this temporary storage
of your paper, you must let the professor know no later than two weeks after the start of this class.
Please Note: If you object to the storage of your paper on Turnitin, the professor may utilize othe
r
services to check your work for plagiarism.


Students With Disabilities:

Reasonable accommodations are available for students who have disabilities and are enrolled in any
program offered at UMUC. For more information, students should contact the Directo
r, Student Affairs
or e
-
mail
SADirector@asia.umuc.edu
.

Academic Policies:

Academic Policies are not course specific and are therefore created and housed separately from this
document. You may access and print

Academic Policies from the Syllabus sub
-
menu in your WebTycho
classroom or by going to these links
http://de.asia.umuc.edu/policies/

or
http://www.umuc.edu/policies/academicpolicies/aa15025.cfm
.

Caveat:

UMUC Asia
OL

syllabi are tentative and subject to change, if necessary. Changes will be announced
with as much notice as possible.