You are on page 1of 5

COURSE SYLLABUS TKB 4563 Introduction to Data Networks

Credit: 3 semester hours Prerequisite: TKT 1273 Microcomputers in Education or BIS 1103 or CS 1103 Catalog Description: TKB 4563. Introduction to Data Networks. (3) (Prerequisites: TKT 1273 or BIS 1103 or CS 1103) Three hours lecture. Strategies in supporting the users of data networking systems and exploration of the associated networking hardware and software that are appropriate for the office environment.

Conceptual Framework: The emphasis in networking courses has concentrated mostly on supporting and troubleshooting at the hardware and software level, but little attention has been placed on user support. This course is designed to provide students with knowledge of networking issues from a client and practice perspective as opposed to the more common server and theory perspective. Objectives:

Sa m
Topics To Be Covered:

At completion of the course students should be able to:

1. Identify the necessary steps to design and maintain networking environments. CFPO #3, 10 2. Identify basic elements of network planning. CFPO #3, 10 3. Identify and explain the function of the major hardware and software components needed to run a small office network. CFPO #3, 10 4. Identify the major hardware and software components needed by the client to attach to the network. CFPO #3, 10

1. Introduction (Hallberg, 2001; Gibbs & Brown, 1997; Black, 2001) 6 hours a. Overview of communications b. History of computing 2. Definition of a Network (Hallberg, 2001; Freer, 1996) 6 hours 3. Clients, Servers, & Peripherals (Horak, 2001; Spohn, 1997) 8 hours a. Clients b. Servers

pl e

c. Peripherals d. Connecting Clients, Servers, & Peripherals 4. Connections & Protocols (Rybczynski, 2002; Hallberg, 2001) 6 hours a. OSI Model b. Physical and Data Link Layer Protocols c. Routing and Protocols d. Protocols in Action 5. Traffic Control (Rendleman, 2002; Hallberg, 2001) 6 hours a. Network Interfaces b. Hubs c. Switches d. Bridges e. Routers f. Comparing and contrasting hubs, switches, bridges, & routers g. Security systems 6. Network Operating Systems & Application Software (Nance, 1997; Pfeiffer & Rodrigues, 2002) 8 hours a. Operating Systems b. Network Operating Systems c. Application Programs d. Monitoring and Managing the Network

Sa m
Suggested Student Activities:

7. Wide Area Networks (Mather, 1997; Freer, 1996; Halberg, 2001) 5 hours a. Investigating common WAN technologies b. Comparing WAN technologies

1. Students will interview network support people and discover the essential skills and knowledge necessary to support network users. 2. Students will prepare a support budget for a help desk that supports a LAN environment and its users. 3. Students will complete a policies and procedures manual that will detail the procedures for obtaining support and responsibilities of the various staff involved in supporting users. 4. Students will develop a training course for users on how to best use the network to help them in their work environment.

pl e

Methods of Instruction: Methods of instruction will include the following: lecture, demonstration, class discussions, peer teaching, cooperative learning, guest speakers, problem-based learning, and personal research. Technology: Content of the course will center on data networks. Student will learn theoretical concepts and view technology in various environments.

Students will be required to complete successfully each of the class activities. In-class activities will constitute a major portion of the formative evaluation with scheduled exams making-up the summative evaluation scheme. A ten-point scale will be used to determine the final grade for this course.

Graduate students are expected to develop an understanding of how design principles can be applied to create a web page through combining theories, knowledge of design and practical experience investigating a topic of one's own choice. Students will report this understanding in a research paper prepared according to instructors requirements.

Sa m
Grading: Above 90% 80-89% 70-79% 60-69% A B C D Below 60% F Evaluation Items: Undergraduate Students: Class Projects 40% Individual Project Exams 30% 30% Exams

pl e
Graduate Students: 30% 30% 30% 10% Class Projects Individual Project Research Paper

Evaluation of Student Progress:

Academic Honesty Academic misconduct will be dealt with in accordance with the guidelines and procedures outlined in the Academic Misconduct Policy, which may be accessed on the web at http://www.msstate.edu/dept/audit/1207A.html. Honor Code
MSUs Honor Code states As a Mississippi State University student I will conduct myself with honor and integrity at all times. I will not lie, cheat, or steal, nor will I accept the actions of those who do.

Required Texts:

Dean, T. (2005). Network+ Guide to Networks (4th ed.). Boston, MA: Course Technology. Bibliography:

Sa m

Black, U. (2001). Networking 101. Upper Saddle River, NJ: Prentice Hall. Cisco Systems, (1999) Cisco IOS 12.0 wide area networking solutions. Indianapolis, IN: Cisco Press. Freer, J. R. (1996). Computer communications and networks. San Francisco, CA: Pitman Publishing. Gibbs, M. & Brown, T. (1997). Absolute beginners guide to networking. Indianapolis, IN: SAMS. Horak, R. (2001). Communications systems and networks. New York, NY: Hungry Minds. Mather, B. R. (1997). Creating a local area network in the school library media center. Westport, CT: Greenwood Publishing Group. Nance, B. (1997). Introduction to networking. Indianapolis, IN: Que Education & Training. Pfeiffer, O., & Rodrigues, J. R. (2002). Its time to implement embedded networking and internetworking. Electronic Design, 50(20), 83-87.

pl e

As indicated in the Code of Student Conduct, Mississippi State University recognizes students as adults who are expected to obey the law and the rules and regulations of the university, to take personal responsibility for their conduct, to respect the rights of others and to have regard for the preservation of state and university property, as well as the private property of others. All interactions with faculty members, staff members, and other students should be conducted with courtesy, civility, decency, and a concern for personal dignity and worth.

Rendleman, J. (2002). Routers add processing punch. Information Week, (903), 54-55. Rybczynski, T. (2002). Changing the business of networking. Communication News, 39 (10), 6-7. Spohn, D. L. (1997). Data network design. New York: McGraw-Hill.

Sa m

pl e

You might also like