Principles of Information and Technology Systems
Text book or
“Foundation of computer science” , by Behrouz Forouzan and Firouz Mosharraf.
“Fundamentals of Information Technology”, Third Edition, ISBN: 978-81-7446 481-1,2010
Develop an understanding of the components of computing and their relationships, significant impacts of IT disciplines on society, fundamentals of programming structures, basic modules and functions of operating system, enterprise and Internet business applications, and the basics of network architectures, protocols and security, basics on AI and expert systems.
Prerequisites or co-requisites
required, elective, or selected elective
By the completion of this course, the student will be able to:
1. Recognize the basics of the components of computing and their relationships.
2. Recognize the fundamentals of programming structures, basic modules and functions of operating system
3. Recognize the basic modules and functions of operating system
4. Explain the basics of network architectures, protocols and security and the idea of cloud computing.
5. Explain the basics of AI and expert systems
6. State the enterprise and Internet business applications
7. State the basics of Mobile computing and Data warehousing.
8. Describe multimedia data, its representation.
Introduction to the course content, text book(s), reference(s) and course plan.
Data Manipulation and CPU Architecture.
Data representation and storage
Networking and the Internet + cloud computing
Algorithms and Programming Languages.
Databases and enterprise information
Artificial Intelligence + expert systems
Computers Network Fundamentals
Behrouz A. Forouzan “ Data Communications and Networking”, McGrew-Hill, fourth edition,2007
This course provides an overview of basic networking concepts, including network architecture, design, the layering concept in networking and how data transferring between devices.
By the completion of this course, the student will be able to:
1.Compare between the OSI and TCP/IP model
2.Describe the layering concept
3.Understand the network topology
4.Calculate the throughput and network capacity.
5.Idetifiy the different types of medium with their differences
6.Calculate the error checking (CRC, Checksum)
7.Understand the protocol of flow control
8.Identify the IPV4 address space
9.Identify the difference between the classful and classes addressing
10.Performing the subnetting
11.Understanding the routing protocols (shortest path first)
13.Idetifing the connection establishment
14.Idetifying connection establishment and connection release
15.Implemeitng the error control
16.Defining the multiplexing
Give a brief definition of computer networks.
Introduction to Computer Networks: uses of computer Networks, types of connections, physical topology, PAN, LAN, MAN, WAN, network software.
Physical layer: analog and digital signals, bandwidth and throughput, Fourier Analysis, twisted pair, coaxial cable, fiber optic, wireless transmission, baseband and passband transmissions.
Data link layer: functions of the data link layer, framing, error detection (parity check, CRC, checksum), flow control (noisy and noiseless channels).
OSI versus TCP/IP model: OSI layers and their functions, TCP layers, TCP versus UDP, comparison between OSI and TCP/IP models.
Network layer: logical addressing, classful and classless addressing, IPV4, network routing algorithms: sink tree, shortest path, flooding, distance vector routing.
Transport layer: elements of the transport layer (connection establishment, connection release, error control, multiplexing), UDP (ports, checksum, UDP operation), TCP(service, segment, TCP connection, TCP flow control, TCP error control, TCP congestion control).
Application Layer: Brief introduction about the main protocols such as ( HTTP, DNS, SMTP)
NET 222 D
Credit hours :
Communications and Networks fundamentals
“Data and Computer Communications", by William Stalling, Prentice-Hall, The Latest Edition.
Introduction to signals and systems; time & frequency domains; spectrum, bandwidth, data rate; transmission media & impairment constraints; modulation and encoding techniques; Multiplexing; Switching and routing; Ethernet technologies; Internet Protocol (IP).
Prerequisites or co-requisites :
Students who successfully complete this course will be able to:
1- Understand the fundamentals of communication and network systems.
2- Apply concepts and techniques from coding, and multiplexing
3- Understand the sources of noise in a communication system.
4- Having knowledge of various network protocols.
Types of Signals & its Properties. Continuous-Time & Discrete-Time Signals
Analog & Digital Signals, Periodic Signals, Even & Odd Signals, Real & Complex Signals, Exponential & Sinusoidal Signals
Time Shift Transformation, Unit Step and Unit Impulse Functions
Systems and Classifications of Systems Linear-Time-Invariant Systems Convolution Sum
Types of communications, Time domain and frequency domain, Spectrum, Bandwidth and Data Rate Transfer, and relations between them
Transmission Impairments: Attenuation, delay distortion, noise, Channel capacity, Nyquist Bandwidth, Shannon capacity Formula
Guided media (twisted-pair, coaxial and optical fiber cables)
Unguided media (wireless)
Modulation and Encoding Techniques:
Digital Data to Analog Signals (ASK, FSK,PSK)
Digital Data to Digital Signals (NRZI, NRZL,AMI, Manchester)
Analog Data to Digital Signals, Nyquest Theory for Sampling
Data Multiplexing (TDM, FDM)
Transmission Types: Serial, and Parallel
Communication Types: FDX, HDX
Communication Methods: Synchronous and Asynchronous, Forwarding
Error Control: Error Detection, Error Correction Retransmission Technique: ARQ
Network Models Wired LANs and Wireless LANs Internetworking and Addressing
Cryptography and Network Security: Principles and practice’, William Stallings Fifth edition, 2011.
Develop an understanding of information assurance as practiced in computer operating systems, software and web applications, gain familiarity with common attacking techniques such as virus, Trojan, worms and memory exploits defenses against them, develop a basic understanding of cryptography, how it has evolved, and two key encryption techniques used today(DEA, RSA).
NET 221 D
1. Describe Computer security concepts.
2. Describe OSI security architecture.
3. Explain information assurance as practiced in software and web applications.
4. Describe cryptography and how it has evolved.
5. Apply two key encryption techniques used today(DEA, RSA).
6. Develop a basic understanding of Message Authentication (MAC)
7. Apply Message Integrity (Secure Hash Algorithms: SHA-1)
8. Apply Digital signatures (ELGamal digital signature scheme and Digital Signature
9. explain of malicious software, viruses, viruses countermeasures, worms.
10. study ways of attaching a virus to a program.
11. explain the sources of viruses and how to countermeasure them.
12. List types of security policies, high and low level policy languages, operational issues.
13. explain security feature in Linux.
14. apply security feature in windows.
15. explain the vulnerabilities in programs.
16. explain Buffer Overflow ,Cross-site Scripting (XSS) and SQL Injection.
17. study cybercrime and computer crime, intellectual property (copyright).
18. explain the problem of intrusion (behavior and techniques).
19. classify intrusion detection techniques (statistical and rule-based)
20. explain password management.
Computer security concepts, OSI security architecture, security attacks, security services, security mechanisms.
Classical encryption techniques, block ciphers and Data Encryption Standard (DES), public key cryptography (RSA and ELGamal algorithms), cryptographic data integrity (SHA algorithm), digital signatures (ELGamal digital signature scheme and Digital Signature Standard)
Types of malicious software, viruses, viruses countermeasures, worms
Definition, types of security policies, high and low level policy languages, operational issues
Operating system security:
Technical mechanisms (layering, abstraction, data hiding, process isolation, hardware segmentation), policy mechanisms (principles of least privileges, accountability), security models (state machine model, information flow model, Bell-Lapadula model, non-interference model, access control matrix, Clarck Wilson model)
Vulnerability, sandboxing, control flow integrity
cybercrime and computer crime, intellectual property (copyright, patent) hacking and intrusion
NET 323 D
“Data Communication and Networking", by Behrouz A Forouzan, McGraw Hill, 2006 or the Latest Edition.
“TCP/IP guide ", by Charles M. Kozierok, McGraw Hill, 2005 or the Latest Edition
"Computer Networks", by Tanenbaum, Prentice-Hall, The Latest Edition.
This course demonstrates the basics of Class-full addressing, classless addressing, and sub-netting; Delivery and routing of IP packets; Address resolution: ARP and RARP; IP protocol; Network troubleshooting: ICMP; Network design and performance; User datagram protocol (UDP); Transmission control protocol (TCP); Routing protocols: RIP, OSPF, and BGP. BOOTP, DHCP,DNS, and FTP.
Prerequisites or co-requisites
1-Explain the difference between classful addressing and classless addressing
2-Compare the difference between the subnetting and suppernetting
3-Explain the attributes of IPv4 datagram
4-Explain mapping Logical to physical Address: ARP
5-Exemplify the ARP Packet
6-Enumerate the different cases of the services of ARP
7-Explain the proxy ARP technique
8-Explain the RARP and its problems
Introduction to the course content, text book(s), reference(s) and course plan.
Classfull addressing, classless addressing, and Sub-netting
Delivery and routing of IP packets
Routing protocols: RIP, OSPF, and BGP
Address resolution: ARP, RARP, BOOTP, and DHCP
IP protocol (IP)
User Datagram Protocol (UDP)
Transmission Control Protocol (TCP)
Domain Name System (DNS)
File Transfer Protocol
Networks Management and Analysis
Network Management: Accounting and Performance Strategies" Benoit Claise, Cisco Press, ISBN-10: 1-58705-198-2, 2007
Course Description :
The course covers in detail the methodology of network analysis, architecture. The course addresses Network management and protocols such as SNPM, CMIP and RMON as well as traffic analysis and network performance evaluation software systems; Reliability concepts; Architectures for system observation and control; System utilization and traffic classification; Network management tools.
1. Understand the methodology of network analysis.
2. Understand Network management and protocols such as SNMP, CMIP
3. know the SNMP structure
4. know the SNMP versions
5. know the SNMP SIM data coding format
6. encode data using SIM rules
7. know CMIP advantages
8. compare between SNMP and CMIP
9. Plan for security management
10. Know the security management steps
11. Analyze the results for security reasons
12. use ping command
13. understand the wireless concepts
14. understand the mobile fundamental
15. Understand the wired concepts.
16. Understand the main concept for security
Network Management Principles
Simple Network Management Protocol (SNMP)
Management paradigms and protocols
Wireless & mobile
Wireless Networks and Mobile Communication Systems
1. Wireless Communication and Networks" , by William Stalling , Prentice-Hall, The Latest Edition.
2. Wireless Communications: Principle and Practice", by T. S. Rappaport, Prentice-Hall, The Latest Edition.
The course covers underlying and fundamental computer communication concepts which support modern mobile and wireless communication systems and networks. Some of these concepts deal with propagation effects, including loss, fading, mobile systems, including design principles of base units and mobile units; micro cells and pico-cells; cell division, including frequency use and reuse; concepts of FDMA, TDMA, and CDMA. The focus for wireless networks is on the physical and medium access layers of the network protocol stack. Wireless systems include satellite and cellular networks, wireless LANs (IEEE 802.11) and personal area networks (Bluetooth and Zigbee).
1. Identify Wireless Networks and its elements.
2. Classification of Networks based on different criterion
3. Compare and Classify wired and Wireless Network
4. Plan ways to study a network
5. Study the network/Protocol architecture of networks
6. Study the Electromagnetic Waves and Spectrum
7. Understand Antenna fundamentals
8. Interpret/Recognize basic specifications from antenna spec sheets
9. Understand some of the attributes of analog and digital signals Time Period, Frequency, Wavelength and Bandwidth, Bit rate, Bit length.
10. Understand/Explain the key Factors/Parameters and tradeoffs for wireless system design(Bandwidth, Data Rate, Noise, Channel impairments, acceptable error rate.
11. Understand the different types of impairments present in wireless networks and analyze their impact on communication system performance.
"Antennas: definition, radiation patterns, antennas types. Antenna characteristics: gain, effective area, attenuation, free space loss, noise, Eb/N0, fading.
"Satellite Communications: parameters, satellite versus terrestrial communications, orbits, LEO,MEO, GEO, frequency bands, capacity allocation.
Spread spectrum Systems
Cellular Wireless Networks: Organization, frequency reuse, operations, power control, TDMA, GSM
IEEE802.11 Standard: architecture, Mac format, LLC, components, services, Mac protocols, physical layer, dynamic spread spectrum, frequency hopping.
Bluetooth: applications, piconet, radio layer, baseband layer, L2Cap layer.
IEEE 802.15:Bluetooth versus Zigbee, components of Zigbee, Zigbee network topology, device architecture, physical layer functionalities, network setup, beacon and non becon opeartions, mac layer.
"Wireless network devices: wireless network interface cards, access point, bridge, gateway Mobile Networks Fundamentals: Generations, Topologies, and Components
Networks Programming and Applications
Textbook: Behrouz A.Forouzan, Data Communications and Networking 5th Edition
NET 341D is an introduction to developing networks applications and programs. From the application view, this course explains the basic application protocols that are required to develop an application: HTTP, FTP, SMTP, POP, and DNS. From a programming point of view, this course is intended to explain how to write a code at the client and the server sides. NET 341D exploits JAVA which offers many networks libraries.
1. Remember computer networks basics.
2. Describe HTTP.
3. Describe FTP.
4. Describe SMTP.
5. Describe POP.
6. Describe DNS.
7. Compare HTTP, FTP, SMTP, POP, DNS.
8. Explain HTTP persistent connection.
9. Explain HTTP nonpersistant connection.
10. Explain FTP commands.
11. Explain a SMTP session.
12. Explain DNS resolution techniques.
13. Describe sockets.
14. Use Java to write simple programs.
15. Use Java to write a UDP application
16. Use Java sockets for networks and to write a TCP application
17. Describe TCP socket options.
18. Use Java sockets for networks programming.
19. Describe JavaMail classes.
20. Use Java to send an e-mail.
21. Use Java to check an e-mail.
22. Use Java to send an e-mail attachment.
23. Explain a servlet structure.
24. Use Java servlets to generate HTML code .
25. Use Java servlets to generate an HTTP request and response.
26. Use Java servlets to read and send cookies.
Introduction to the course content text book(s), reference(s) and course plan
Internet Applications: HTTP, FTP, SMTP, POP, DNS 3
Network programming basics: socket concept 2
Java Overview: IO, Threads, streams 2
UDP programming 1
TCP programming 2
Mail programming 2
Web programming using servlets
Networks Security Protocols
‘Cryptography and Network Security: Principles and practice’, William Stallings Fifth edition, 2011
An introductory course, intended to cover the fundamental concepts and techniques of
Networks Security Protocols. The student is expected to develop number of applications that demonstrate an understanding of the course.
1- Use the different methods of attack. Understand and apply selected technologies used to ensure security.
2- Evaluate existing Network Security attacks Programs
3- use new types to prevent attacks
4- Describe the architectural models for TCP/IP Stack
5- evaluate different methods for Attacks through TCP/IP
6- Explain the Security Components
7- use Security through Firewall
8- Describe VPN
9- Describe the main architecture for IPSec
10- use different models for IPSec
11- use Combining Security Association
12- Describe DNS protocol stack
13- use the different types attach for DNS
14- explain the intrusion process
15- Explain types of intrusion detection systems
16- Describe current challenges of intrusion detection systems
17- use Secure Multipurpose
18- Describe Internet security Mail Exchange using S/MIME
19- Explain models for Secure socket layer (SSL)
20- Explain transport layer security (TLS).
Foundation of Network Security: what network security is? goals of network security, secure network architecture, network security policies, network security components
Overview of TCP/IP: TCP/IP architectural models, TCP/IP possible attacks(packet sniffing, spoofing, process table attack).
TCP/IP security components: Firewall protection, types of firewalls (packet filter, proxy server, stateful filter), Firewall architectures (dual-homed host, screened host), VPN, advantages of VPNs, types VPNs, architecture of VPNs (point to point tunneling protocol, layer 2 forwarding ), VPN models (Nas-initiated VPN, client-initiated VPN).
IPSec: architecture, authentication header, encapsulating security payload, combining security association, key management, benefits, limitations.
DNS: protocol stack (spoofing, ID hacking, cache poisoning), protection
Intrusion detection: definition, intrusion process, intrusion detection system, types of intrusion detection systems, challenges of intrusion detection systems, intrusion detection systems.
Application and transport layers security: (Pretty Good Privacy (PGP), Secure Multipurpose Internet security Mail Exchange (S/MIME), Secure HTTP, Secure socket layer (SSL), transport layer security (TLS).
Advanced Networks Services
Data Communication and Networking", by Behrouz A Forouzan, McGraw Hill, 2006, The Latest Edition
Outline some traditional networks services (DNS, HTTP, DHCP).Understand multimedia services, Understand real time services. Understand mobility services.
1. Recognize the principles of Internetworking
2. Stating the operation of Internet Protocol.
3. Explain the addressing mechanisms
4. Describe IPv4 protocol.
5. Describe IPv6 protocol
6. Differentiate between Unicast, Unicast, and Multicast addressing in IPv6
7. Describe Flow Control in IPv6
8. Describe Error control in IPv6
9. Stating Routing Protocol
10. Differentiate between Connection Oriented and Connectionless protocols
11. Describe TCP protocol
12. Describe UDP protocol
13. Stating Virtual Private networks
14. Describe IPSec protocol.
15. State different applications of IPSec
16. State the benefits of IPSec.
17. Describe the funcions of IPSec
18. Describe Steaming.
19. Explain the digitization of Audio signals
20. Explain the digitization of Video signals
21. Explain Audio Compression
22. Differentiate between predictive encoding and perceptual encoding.
23. Explain Video Compression
24. Describe JPEG
25. Describe MPEG
26. Stating Approaches for Streaming Stored Audio/Video
27. Describe Streaming Live Audio/Video
28. Describe Real-Time Audio/Video
29. Differentiate between Jitter, Ordering, and Mixing
30. Describe Real-time Transport Protocol(RTP)
31. Describe Real-time Transport Control Protocol(RTCP)
32. Describe Session Initiation Protocol (SIP)
33. Stating SIP messages
34. Describe Caller Tracking
35. DescribeH.323 protocol
36. Recognizing Mobility
37. Describe the operation of Mobile IP protocol
38. Stating the Components of Mobile IP Networks.
39. Describe Agent Discovery
40. Describe ICMP Router Discovery Protocol (IRDP)
41. Describe Registration
42. Describe Tunneling
43. Describe Mobile IP Encapsulation
Credit hours: 2
Graduation Project -I
Handbook of wireless networks and mobile computing’, Ivan Stojmonovic, ISBN-0-471-41902-8, John Wiley Edition, 2002.
List Essential References Materials (Journals, Reports, etc.)
1- Data Communications and Networking’ Bahrouz A.Forouz , McGraw Hil , 2007
2- Cryptography and Network Security: Principles and practice William Stallings Prentice Hall 2011
3- Data and Computer Communications, William Stalling, Prentice-Hall, 2007.
This course provides teamwork of students with a thorough guideline for survey and research to design, develop, and implement different fields covering the IT area.
Passing successfully at least 90 credit hours and IS 350D
1. Provide the necessary background or context for the project and its importance.
2. Outline the problem they are working on, why it is interesting and what the challenges are.
3. Propose an appropriate solution for the project problem.
4. Conduct a related work survey.
5. Outline new information technologies such as mobile computing, and Data warehouses
6. Develop illustrative examples and programs to explain different IT systems
7. Operate a simple IT system.
8. Provide the requirements determination and analysis.
9. Provide system design, including the system architecture, implementation requirements and user interface design.
10. Operate a simple IT system.
11. Write a small project in a teamwork.
12. Demonstrate basics of an IT system
1- Registering and selecting topics.
2- Registering and selecting topics.
3- Providing the problem statement & significance and propose a solution.
4- Providing the necessary background and related work survey.
5- Topic presentation.
6- Providing requirements determination and analysis.
7- Designing the system architecture.
8- Providing the implementation requirements (software and hardware that will be used).
9- Designing the user interface of the system by prototyping.
10- Finishing the proposal writing and submission
Graduation Project II
The choice of the books depends upon the project type, domain, and characterization.
The aim of this module is to provide students with experience and appreciation of the process of performing projects in one of the streams of networks and communications associated with information technology, including the specification, design and development, and reporting processes. Students work together in teams under the supervision of a supervisor, and learn about the processes of teamwork. This involves a scientific project in an area (in Networking and Communications) which deals with the scientific challenges in the following or related areas:
Quality of Service
Secure network solutions
Mobility and energy related issues in wireless networks
1. Identify proper work procedures or approaches for the project.
2. Apply technical and scientific knowledge to a task.
3. Choose between technical alternatives.
4. Analyze, schedule and resource the task.
5. Convert the conceptual schema (relational tables into physical schema).
6. Translate functional requirements into functions and procedures
7. Engage in design and Implementation.
8. Develop the capacity to undertake lifelong learning.
9. Devise and carry out tests where necessary
10. Provide a test plan, test cases and test results.
11. Organize, compile and record all test results in an efficient manner.
12. Analyze data.
13. Evaluate and discuss the outcome of the project
14. Function effectively as an individual and as a team member.
15. Present the project outcome effectively using good presentation skills.
16. Compile and present the project carried out in the form of a report.
17. Communicate technical results, information and conclusions to others by means of poster and scientific paper.
Developing the system based on the design and method proposed in the Graduation Project I.
Implementing the system.
Testing the system.
Submission of project documentation and poster.
Credit hours: 4
1- “Practicum and Internship: Textbook and Resource Guide for Counseling and Psychotherapy”, by John Boylan, Judith Scoot, Routledge, 2008.
Internship course is an important component of the IT-Networks and Communication systems program. This course is designed to provide students’ opportunity to gain a supervised practical experience in computer environment of an approved department, firm or agency in KSA. The students will gain a valuable on-site working experience. It further allows the students to develop skills like: communication, team work and problem solving, which will enable them in joining a competitive job market in their fields. Cooperative Training Office (CTO) should coordinate with students to apply internship. The student and CTO should also submit a written plan for approval before taking-up the internship. All internships are subject to approval by the Internship Coordinator of the college.
Note: maximum number of students 35 per class.
Passing successfully at least 90 credit hours
Understand professional organizational culture
Develop relevant professional competencies and professional relation ship
Use existing knowledge to solve some technical problems
Apply Classroom Theory
Prepare written report about the internship experience 6.
Construct experience and confidence in expressing ideas.
Communicate in a professional manner.
Establish network of acquaintances to increase employment opportunities.
Understand the practices and protocols of the particular company and industry in which they are working.
Demonstrate professional demands (such as behavior, attitude, appearance, and punctuality) of the workplace.
Apply academic knowledge in a professional setting.
Communicate effectively in verbal and written forms.
Explain current trends and issues specific to the topic of her internship program
3- Integrated services.
4- High availability
5- Quality of service
6- Secure network solutions.
7- Mobility and energy issues for wireless networks.
NET 302 D
Selected topics (1)
Mark Aakhus, James E. Katz, Perpetual Contact: Mobile Communication, Private Talk, Public Performance, Cambridge University Press, 2002.
By the end of this course, the students should be able to:
1. Understanding the basic principles of mobile radio.
2. Knowing the different Cellular structures and mobile radio network.
3. Understanding the basics of Diversity and Combining Techniques
4. Having acquired a good knowledge of Modulation Techniques and Multiple Access Techniques.
1. Stating Frequency bands.
2. Stating Mobile Radio Frequencies
3. Stating the fundamentals of VHF Propagation
4. Describe the signal propagation in Free Space
5. Describe the signal propagation over reflecting surface
6. Describe the signal propagation over Irregular Terrain
7. Describe the signal propagation in Built-up Area
8. Describe Diversity reception
9. Describe Source coding
10. Describe channel coding.
11. Describe digital modulations.
12. Stating the basic functions of mobile communication systems
13. Describe multiple access systems
14. Stating transmission modes
15. Stating the utilization of frequency bands
16. Describe the organization of Cellular Networks.
17. Recognize the cell structure.
18. Stating the geographical coverage area.
19. Explain TDMA.
20. Explain FDMA.
21. Explain CDMA.
22. Stating GSM.
23. Stating 2G CDMA
24. Stating 2.5G Networks.
25. Describe 3G Networks
26. Recognize the main driver for 3G Networks.
27. Stating the difference between IEEE 802.11 and 3G Cellular.
28. Describe the Multimedia Message Service.
29. Stating the MMS applications.
30. Recognize 4G Networks.
31. Stating 4G wireless technologies.
32. Stating the difference between 3G and 4G wireless networks.
Fundamentals of mobile radio
Structure of cellular network: cells and frequency reuse
Mobile radio propagation channels
Channel allocation techniques : TDMA, FDMA, CDMA
3RD and 4th generation
NET 351 D
Networks Operating Systems
Network Operating Systems: Making the Right Choices Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA
This course aims to explain how to install a secure, multi-user, client-based network operating system , Implement and administer operating system resources, Implement, share and NTFS permissions, Configure and troubleshoot workstation performance, Monitor a network, Implement, monitor, and troubleshoot operating system security and Configure, troubleshoot network connectivity.
NET 221D - NET 340D
Describe the network operating system NOS.
2. Describe the Mechanisms for Network Operating Systems.
3. Describe how NOS provides the LAN with access to other networks
4. Describe the services and applications of NOS.
5. Describe the role of the NOS in network computing.
6. Describe How is the NOS likely to evolve.
7. Describe What is client/server computing.
8. Describe how to Install and deploy Windows 7
9. Describe how to Install Windows 2008 server on networking hardware
10. Explain terms associated with installing and configuring an NOS
11. Describe how to work with Disks and Devices.
12. Apply the Windows 2008 Registry.
13. Explain how to install and configure a TCP/IP protocol stack.
14. Apply Windows 2008 Server DHCP.
15. Apply Exercises on Windows 2008 Domain Name Service.
16. Apply exercises on Internet Information Server (web services).
17. Describe the process of monitoring a network server.
18. Explain the importance of backing up systems and data.
19. Describe procedures for backing up systems and data.
20. Describe the processes for updating network operating systems
21. Describe terms associated with administering server resources.
22. Explain IP Addressing.
23. Apply Initial Network setup.
24. Explain Linux System Administration.
25. Explain how to install Software.
26. Describe concepts associated with file system security.
27. Describe procedures for sharing and securing server resources.
Basics of network operating system NOS.
How does the NOS provide the LAN with access to other networks and computer systems?
What is the role of NOS in network management?
What are application-programming interfaces (APIs) and how are they supported in the NOS?
What is network computing and what is the role of the NOS in it? How is the NOS likely to evolve? What is client/server computing?
Introducing Windows 7 and Windows 2008 architecture concepts.
Installing and deploying Windows 7.
Install Windows 2008 server on networking hardware, under VMWare Workstation.
Working with Disks and Devices, explore and exercise the Windows 2008 Registry.
Install and configure a TCP/IP protocol stack.
Explore Windows 2008 Server DHCP.
Exercise Windows 2008 Domain Name Service.
Exercise Internet Information Server (web services).
Managing and Monitoring Windows 7 Performance
Linux Installation, IP Addressing, Initial Network setup, Linux System Administration, Software installation
Credit hours : 3
Real time and embedded systems
Dr. Amina Saleem
1. Real-time flow systems, Jane W.S.Liu, ISBN -10:0130996513, 2000
2. Real-Time Systems: Design Principles for Embedded Applications, Second
Edition, ISBN 978-1-4419-8236-0, Springer, 2011.
1. PIC Microcontroller: A Introduction to Software & Hardware Interfacing”,
Han-Way Huang, Delmar Cengage Learning, 2007. ISBN 978-1-4018-3967-3
The course covers the concepts, fundamental problems, and approaches in the design and analysis of real-time and embedded systems inherent in many hardware platforms. It addresses the issues related to the design and analysis of systems with real-time constraints (Synchronization and communication;
Scheduling Real Time systems; Advanced scheduling; Simulation of a Real Time system). The students also learn the fundamentals of embedded system hardware, micro controller and microprocessor architecture and assembly language programming for the PIC Micro controller.
1. Describe embedded systems and embedded systems with real time applications.
2. Understand technical, economic factors characterizing a real-time application to interpret demands that the system designer must cope with.
3. Understand the key characteristics of real time embedded systems: logical, functional and timing correctness and resource scheduling.
4. Classify real time systems.
5. Compare hard and soft real time systems.
6. Understand the functional and temporal requirements of real time systems.
7. Differentiate between real-time applications based on their timing attributes.
8. Study some typical real time embedded systems and their current and future trends.
9. Describes the general model of real-time systems.
10. Understand the real time system model (workload model, a resource model and algorithms).
11. Define the basic component of any real-time application system.
12. Describe the parameters that characterize application systems.
13. Study parameters that characterize the processors
14. Understand the concept of scheduling in real time systems.
15. Study the scheduling approaches for real time systems: clock-driven, weighted round robin and priority-driven.
16. Analyze the advantages and disadvantages of clock driven scheduling.
17. Analyze the merits and limitations of the priority driven scheduling algorithms.
18. Compare scheduling methods.
19. Classify priority-driven algorithms for scheduling periodic tasks on a processor. fixed priority and dynamic priority
20. Describe algorithms for Scheduling aperiodic and sporadic jobs.
21. Describe what is meant by real time networks
22. Enumerate key goals of Real-time Communication
23. Describe Hard and soft real time communication systems
24. Understand Real time network architecture
25. Study the Real time transport and internet protocol
26. Study Flow control for real time communication systems
27. Classify the flow control protocol. Explicit and Implicit flow control
28. Assess real time communication system needs
29. Understand scheduling in real time communications
30. Define Embedded systems
31. Understand the architecture of embedded systems
32. Analyze the design goals of embedded systems (Performance, cost, power
33. Describe some functional and non-functional requirements of embedded systems.
34. Study the key components of embedded system hardware.
35. Understand micro- processors and micro-controllers.
36. Understand the Key design requirements of micro-processors (energy
efficiency, code density)
37. Differentiate between microprocessors and micro-controllers.
38. Enumerate the components of a micro-controller
39. Describe the architectural characteristics of the Pic family of micro-controllers.
40. Describe the peripherals devices of the PIC micro-controllers (Digital I/O,
41. Study Instruction set for PIC Micro-controller
42. Understand the PIC Interrupts, Interrupt processing, management and
43. Understand the difference between High-level languages and machine language.
44. Explain the Assembly language program structure (directives, instructions
45. Use assembler directives to allocate memory blocks.
46. Write programs loops to perform repetitive operations.
47. Write assembly programs to perform simple arithmetic operations.
48. Understand the concept of IDE (Integrated development environment).
49. Study the MPLAB IDE development tool.
50. Write; assemble some basic assembly programs for PIC.
51. Use MPLAB IDE to enter programs and build executable codes and
1. Typical real-time applications: digital control, optimal control, tracking, and multimedia applications.
2. Reference model of real-time systems: workload model, resource model, and algorithms.
3. Hardware real-time systems scheduling: clock driven scheduling, priority driven scheduling, scheduling aperiodic tasks.
4. Real-time communication: real-time flow control, scheduling for switched networks, internet and transport protocols for real-time applications.
5. Introduction to embedded systems: definition and examples of embedded systems, design constraints.
6. Introduction to embedded systems: microcontroller and microprocessor architecture, memory (RAM, ROM, EPROM, EEROM, Flash memory), I/O, interruptions
7. Introduction to the assembly language: labels, instructions, operands, directives.
8. Assembly programming for PIC microcontroller: programming interfaces.
1. Fundamentals of parallel computer architectures: multichip and multicore systems”, Yan Solihin, ISBN-13-978-0-9841630-0-7, 2009.
2. Parallel Computer Architecture: A hardware/software approach, David E. Culler, Jaswinder Pal Singh, Anoop Gupta, Morgan Kaufmann publishers, 1999, ISBN: 1-55860-343-3.
1. John Hennessy and David Patterson, Computer Architecture: A Quantitative Approach, Morgan Kauffman Publisher.
This course covers fundamental and comprehensive concepts related to the design of parallel computer systems (including modern parallel architectures and alternatives), architecture for shared memory multi processors and multicore architectures. Topics include program issues with shared memory multiprocessors, memory hierarchy, cache coherence, synchronization, multicore organization choices and cache.
CS 340D, CS 206D
1. Define parallel architectures.
2. Understand the technological, architectural trends, economic and application requirements that dictate the growth of parallel systems.
3. State some of the motivations behind the development of parallel systems
4. Understand some of the fundamental design issues of the parallel computer Systems such as Resource allocation, data access, performance and scalability.
5. Understand and Classify Parallelism. ILP, task level and program level parallelism.
6. Understand and illustrate the Taxonomy of Parallel computers and the Flynn taxonomy
7. Study the different types of Parallel architectures such as SIMD, MISD, MIMD
8. Understand the concept of memory hierarchies and its big impact on the Performance of applications.
9. Study the operation of memory hierarchy and analyze the range of Performance issues influencing its design.
10. Classify the components/levels of memory hierarchy such as register, Cache (SRAM), Memory (DRAM), Disk etc.
11. Understand the Cache memory, its organizations (Direct Mapped, Set associative and fully associative), and addressing and performance metrics.
12. Understand the concept of prefetching in multiprocessor systems and how it is used to improve the cache performance.
13. Understand the concept of shared memory, its advantages and disadvantages.
14. Classify the Shared Memory Multiprocessors Variations. Uniform and Non-Uniform Memory Access (UMA) Multiprocessors
15. Study the shared memory multi-processor organization. (Shared cache, shared bus and distributed shared memory).
16. Understand the type of hardware support required to construct a shared Memory multi-processor.
17. Assess the key technical challenges in the design of such machines (such as organization and implementation of the shared memory subsystem).
18. Understand issues for a shared memory architecture (Cache coherence, Memory consistency models, synchronization support)
19. Explain the cache coherence problem, cache coherence protocols, Implementations (snooping, directory) and assessing their behavior)
20. List and compare key characteristics of the bus based and shared cache Multi processors.
21. Understand cache coherence in bus-based multiprocessors.
22. Study the Bus-Snooping cache coherence protocol.
23. Analyze the impact of the cache design on Cache coherence performance.
24. Understand the different types of synchronization in parallel architectures such as (event and group synchronization)
25. List the components of a synchronization event.
26. Study some synchronization operations such as locks and barriers, their Performance criteria, implementation, illustration and drawbacks.
27. Compare different synchronization operations.
28. Understand the limitations of the Symmetric shared multi processors.
29. Understand the concept of scalable-shared memory systems.
30. Study the implementation of distributed shared memory coherence protocols.
31. Describe the advantages (reduce bandwidth demands) limitations and the Performance criterion of directory based protocol.
32. Define the inter connection networks
33. Describe the network characteristics such as topology, routing algorithm, Switching strategy, and flow control.
34. Compare between different network topologies
35. Analyze the impact of network characteristics on the performance and functionality of the communication system.
36. Study the organizational structure of parallel computer networks.
37. Describes the different classes of routing algorithms used in modern machines.
38. Understand key properties of good routing algorithms (producing deadlock-free routes, maintaining low latency, spreading load evenly, and
39. Understand the multi core processors.
40. Contrast single core and multi-core processors
41. List some of the advantages and applications of multi-core processors.
42. Study the multi-core memory hierarchy, issues, design space and constraints.
43. Multi core memory hierarchy issues design space and constraints
44. Cache coherence problem and its solution in multi-core architectures.
45. Compare SMT (Simultaneous Multi-threading) and Multi-core systems
Introduction to parallel architectures:
evolution, definition, motivation, Flynn’s taxonomy of MIMD parallel computers, examples.
Introduction to memory hierarchy organization:
motivation for memory hierarchy, basic architectures of a cache, cache performance, prefetching.
Shared memory multiprocessors:
cache coherence problem, memory Consistency problem, synchronization.
Shared memory multiprocessors:
cache coherence problem, memory Consistency problem, synchronization.
Bus based coherent multiprocessors:
basic support for bus-based multiprocessors, cache coherence in bus-based multiprocessors, impact of cache design on Cache Coherence performance.
Hardware support for synchronization:
lock implementation, barrier implementation.
Distributed shared memory multiprocessors:
approaches to large-scale multiprocessors, building a directory-based coherence protocol, basic DSM cache coherence protocol, implementation correctness and performance.
Interconnection network architecture:
link and channel, network topology, Routing policies and algorithms, router architecture.
Designing multicore architectures:
multicore architecture, multicore Memory hierarchy organization, performance volatility.
Selected topics (2)
Ralf Steinmetz & Klara Nahrstedt, Multimedia Systems, Springer-Verlag, (ISBN:3540408673)
Introductory course in multimedia computing and networking. Explores the interaction between multimedia data and the systems that need to support multimedia data such as audio and video. Topics that will be covered in the course include: compression technologies, multimedia formats such as JPEG and MPEG, multimedia streaming over reservation-based and best-effort networks, multicasting of multimedia data, and systems support for multimedia computing
1. Describe Audio Signals.
2. Describe Video Signals.
3. Stating Huffman Compression
4. Stating Run-Length Encoding.
5. Stating LZW Compression
6. Describe G.711.
7. Describe A-law.
8. Describe U-law.
9. Describe MP3.
10. Explain GIF.
11. Explain JPEG
12. Explain PPM
13. Explain M-JPEG.
14. Explain MPEG-1.
15. Explain MPEG-2.
16. Explain H.261.
17. Explain H.263.
18. Stating TCP/IP
19. Stating HTTP
20. Describe SIP
21. Describe H.323
22. Stating reservation based networks
23. Stating best effort networks
24. Stating Features of Multimedia Operating System.
25. Describe the real time process scheduling
26. Stating Multimedia Disk Scheduling
Sound, image, and video signals
Lossless data compression techniques: Huffman, Run-Length Encoding, LZW
Audio compression techniques: G.711, A-law, U-law, MP3
Image compression techniques : GIF, JPEG, PPM 2 Video compression techniques : M-JPEG, MPEG-1,
MPEG-2, H.261, H.263
Networking protocol review: TCP/IP, HTTP
Multimedia integration technologies: SIP, H.323
Multimedia streaming: reservation based networks, best effort networks
Multimedia operating systems
NET 425 D
“Timothy Pratt, Charles W. Bostian, Jeremy E. Allnutt, “Satellite
Communication Systems”, John Wiley & Sons, The Latest Edition
The course is intending to cover the fundamental concepts of satellite communications and orbital concepts. The student is expected to understand the basics of satellite communications, satellite system elements, key issues of satellite, handle error control for digital satellites, and grasp the propagation effects on satellite-earth links
Describing satellite orbit
2. Explain Kepler's three lows
3. Compute orbital Period
4. Classify different orbital elements
5. Recognizing coordination elevation and azimuth angles
6. Describing orbital size, shape, orientation, and satellite location
7. Compare the role of different subsatellite systems
8. Compare between different transponders
9. Solve problems on antenna gain and diameters
10. Design link budget for satellite uplink/downlink
11. Differentiate between different frequency bands used by satellite
12. Differentiate between satellites in different altitudes
13. Recalling basic transmission theory
14. Classify different propagation effects (gases, rain, ionosphere, scintillations)
15. Compare between rain types
16. Compute rain attenuation
17. Recognize contour maps for rain rate
18. Explain digital transmission
19. Describe QPSK modulation technique
20. Recognize different multiple access techniques
21. Stating errors occurred and solutions
22. Classify different satellite applications
Introduction to satellite - communications and its applications
Satellite systems elements
Satellite signal coding
Satellite link design
Orbits and launching methods
Beam angle and directivity
Error control for digital satellite
Modulation and Multiplexing techniques
Propagation effects and their impact on satellite-earth link
Exploration of some applications of satellite systems (GPS, Mobile communication, WEB communications)
Net 426 D
Selected Topics (3)
Designing Networks and Services for the Cloud: Delivering business-grade cloud applications and services”, By Huseni Saboowala, Muhammad Abid, Sudhir Modali , Published May 16, 2013 by Cisco Press
This course focuses on selected research topics in networks and communication systems. The course is structured as group of lectures to discuss one or more of the hot topics in the field plus a research seminar where students present research papers to their peers. Topics may include advanced concepts in data communication, networks, networks security, network protocols, wireless sensors networks, satellite networks, optical networks, distributed networks, mobile computing, cloud computing.
Acquire many of the skills in the selected topics.
Acquire a solid foundation about architectural concepts of data communications and computer networking
master the knowledge about data communications and computer networking in the context of real-life applications
Understanding, evaluating critically, and assimilating new knowledge and emerging technology about computer networks.
Follow-up the scientific research in the area of specialization.
Introduction to the course content, text book(s), reference(s) and course plan.
Introduction to Cloud Computing
History of Cloud Computing
Infrastructure as a service (IaaS)
Platform as a service (PaaS)
Software as a service (SaaS)
Cloud management challenges
Aspects of cloud management systems
Security in cloud computing
Applications of Cloud Computing
NET 433 D
Networks Design and Implementation
“Top-Down Network Design (3ed Edition) by Priscilla Oppenheimer, 2010
The course is intending to cover modern integrated networks, the types of traffic generated and their quality of service requirements. It provides an appreciation of performance issues in networks, and competence in the use of techniques to analyze and optimize performance.
Recognize business goals and constrains.
Compare technical goals and different tradeoffs.
Explain differences for existing internetworks.
Understand the design of a network topology.
Classify different protocols for switches and routers
Implement network security strategy.
Describe LAN's hierarchical models, and secure models.
Recognize LAN's types.
Differentiate between different LAN's hardware.
State the WAN technology concepts.
Distinguish between WAN's connection options.
Understand the configuration of the frame relay
Stating the design models for the WLAN.
Compare between the WLAN's models.
Describe the traffic flow.
Check the traffic load.
Apply different networks using Wireshark or OPNET
Identifying customers’ needs and goals:
analyzing business goals and constraints, analyzing technical goals and tradeoffs, analyzing existing internetworks
Logical network design:
design a network topology, design models for addressing and numbering, selecting switching and routing protocols, developing network security strategy, developing network management strategy
hierarchical models, redundant models, secure models, LAN types ( large buildings and campus LANs, small remote sites), LAN hardware (repeaters, switches, bridges, routers).
WAN technology concepts (physical layer, data link layer, switching), WAN connection options (dedicated connection link options, circuit-switched connection options, packet switched connection options, Internet connection options, choosing a WAN link connection), frame relay (basic frame relay concepts, configuring a frame relay network)
wireless design models, topologies, and infrastructures, service sets (base station, SSID distributed system, infrastructure, AD Hoc mode), WLAN design modes (site-to-site connections, point-to point, point-to-multipoint), wireless mesh networks, evolution of WLAN models.
Network traffic: traffic flow (terminal/host traffic, client server traffic, peer to peer traffic, server/server traffic, distributed computing traffic flow, traffic flow in Voice over IP), traffic load (calculating theoretical traffic load, estimating theoretical load by routing protocols, traffic behavior).
Analysis and design tools:
Wireshark and OPNET 2
NET 434 D
Credit hours :3
Sam Halabi, Danny McPherson, "Internet routing architectures" ,2nd Edition, CISCO press, ISBN 1-57870-233-X Analyst Study Guide" ,2010
The course is intending to cover internet design principles, internet routing design, and internet application protocols
1. Recognize internet architecture
2. Stating internet and the layering principles
3. Explain about internet and end-to-end arguments
4. Summarizing modularity and layering in a network architectures.
5. Exemplify internet integrated design.
6. Describing of routing
7. Exemplify border gateway protocol V4.
8. Recognize tuning BGP capabilities.
9. Compare controlling routing inside the autonomous system
10. Evaluate the interaction of non BGP routers with BGP routers
11. Paraphrasing route reflectors, and IGP expansions
12. Stating the different protocols for the internet application layer
13. Compare different application layer protocols, MIME and SNTP
Original architecture of the Internet:
introduction, Internet and the layering principle, Internet and the end-to-end arguments
Internet design principles:
modularity, integrated design, layering, modularity and layering in network architectures, end-to-end arguments
Interdomain routing basics:
overview of routing, border gateway protocol V4
Internet routing design:
tuning BGP capabilities, redundancy, symmetry, and load balancing, controlling routing inside the autonomous system, interaction of non BGP routers with BGP routers, BGP policies
Controlling large-scale autonomous systems: route reflectors, IGP expansions
Internet application layer protocols:
MIME, SNTP, SMTP, SNTP, Telnet
Wireless Sensor Networks
-Ian F.kyildiz, and M.Can Vuran , Wireless sensor networks, 2010.
-C. Poellabauer , Fundamentals of wireless sensor networks. Theory and practice, 2010 Wiley.
1. Recognize sensors platforms.
2. State the features of wireless sensor networks (WSN).
3. Describe wireless technologies for WSN
4. Explain the different applications of WSN
5. State different types of WSN.
6. State the current challenges for WSN.
7. State the research trends for WSN.
8. Describe Layers of the WSN Protocol stack.
9. Interpret CSMA technique
10. Describe MAC protocol
11. Describe SMAC protocol
12. Describe TRAMA protocol
13. Recognize routing mechanisms for Wireless sensor networks
14. Differentiate between Flat, Hierarchical, and geographic routing protocols.
15. Differentiate between flooding and gossiping protocols.
16. Describe SPIN routing protocol.
17. Describe Leach routing protocol.
18. Describe Pegasis routing protocol.
19. Explain Geographic routing.
20. Differentiate between Greedy and Face routing.
21. Describe GPRS routing protocol.
22. State the features of operating systems for WSN
23. Describe the components of tinyOs
24. Describe the interfaces of tinyOs, configurations, and wiring.
25. Describe the configurations of tinyOs.
26. Describe the wiring of tinyOs.
27. State challenges for time synchronization in WSN
28. Describe Global Positioning System
29. Describe NTP protocol
30. Describe TPSN protocol
31. State the general characteristics of IEEE 802.15.4 standard.
32. Describe the supported topologies of IEEE 802.15.4 standard.
33. Describe the physical layer of IEEE 802.15.4 standard.
34. Describe MAC layer of IEEE 802.15.4 standard.
35. State the challenges for localization algorithms in WSN.
36. Differentiate between range-based, range free localization techniques.
37. Describe Time of arrival (TOA) ranging technique
38. Describe one way TOA technique
39. Describe two way TOA technique
40. Describe Received Signal Strength RSS technique.
-Introduction to the course content, text book(s), reference(s) and course plan.
-Sensor networks: sensor platforms, WSN architecture and protocol stack, applications (military, environmental, health, home, industrial), factors influencing WSN design (hardware constraints, fault tolerance, scalability, power consumption, topology, transmission media)
-MAC protocols: challenges for MAC, CSMA, SMAC, and TRAMA.
-Network layer: challenges for routing, data centric and flat architecture protocols (flooding, gossiping, SPIN), hierarchical (Leach, Pegasis), geographic routing, energy efficient routing protocols.
-Location and positioning in wireless sensor networks: greedy and face routing protocols.
-TinyOs concepts and programming: components, interfaces, configurations, and wiring.
-Time synchronization in wireless sensor networks: challenges for time synchronization, Network Time Protocol, Timing Sync Protocol for WSN.
-IEEE 802.15.4 standard: general characteristics, supported topologies, physical, and Mac layers overview.
-Localization: challenges, ranging techniques, range based localization techniques, range free localization techniques.
Rajiv Ramaswani ,Kumar N. Sivarajan, Galen H. Sasaki, "Optical Networks. A practical perspective" , Morgan Kauffman publishers, 3rd Edition.
Optical Fiber Communication, Gerd Keiser, Mc-Graw Hill, Last edition.John R. Vacca, " Optical Networking. Best practices Handbook" , John Wiley & Sons publisher, 2007.
The course covers underlying and fundamental light characteristics concepts. And demonstrates components, types, and communication of fiber optics which support modern wireless communication systems and networks. Some of the basic knowledge of some networks (SONET/SDH) has been described in this course. The focus for optical networking fundamentals is on the physical layer of the network protocol stack. The optical line terminal and optical line amplifier of WDM networks is studied in this course.
1. describing light as an electromagnetic wave
2. describing the polarization of light wave
3. explain the interference effects on light wave
4. Explain the basic elements of optical fiber transmission link
5. Explain the fiber modes
6. Stating the basic operating principles of single mode and multimode fibers.
7. Describe the different Transmission constraints
8. Compare between different types of propagation
9. Stating the difference between the couplers, isolators and circulators
10. Explain the principle of operation of multiplexers and filters
11. Stating the advantages and disadvantages of optical amplifiers
12. Compare between the different types of optical amplifiers
13. Explain the different components of digital communication optical system
14. Explain the transmitters and detectors, switches, wavelength converters.
15. Explain the switches and wavelength converters.
16. Describing the interaction between optical components and IP
17. Explain light path routing solution,
18. Explain the OSPF enhancements
19. Stating the different types of IP links
20. Discriminate between the control channels, data channels,
21. Explain the integrated optical networks
22. Recalling the modulation
23. Explain the subcarrier modulation and multiplexing
24. Stating spectral efficiency
25. Explain the spectral efficiency
26. Explain the error detection and correction.
27. Explain the time division multiplexing,
28. Differentiate between the VCAT and LCAS,
29. Describe the SONET/SDH layers,
30. Explain the SONET frame structure,
31. Explain the SONET/SDH physical layer,
32. Discriminate the elements of a SONET/SDH infrastructure
33. Explain the optical line terminal.
34. Distinguish between the different types of optical line amplifiers.
35. Explain the Add/Drop multiplexers
36. Explain the cross-connects.
Light Characteristics: light as an electromagnetic wave, polarization, interference
Fiber Optics: Modes, Transmission constraints (fiber-optic cable modes, fiber optic glass, plastic optical-fiber, fluid-filled fiber optics, transmitting light on a fiber, light propagation in multimode fiber, single mode propagation)
Fiber Optics Components: couplers, isolators and circulators, multiplexers and filters, optical amplifiers, transmitters, detectors, switches, wavelength converters.
Optical networking fundamentals: interaction between optical components and IP, light path routing solution, OSPF enhancements/ IS-IS, IP links, control channels, data channels, integrated optical networks
Fiber Optics Communications: modulation, subcarrier modulation and multiplexing, spectral efficiency, demodulation, error detection and correction.
SONET/SDH Networks: multiplexing, VCAT and LCAS, SONET/SDH layers, SONET frame structure, SONET/SDH physical layer, elements of a SONET/SDH infrastructure
WDM Networks: optical line terminal, optical line amplifiers, Add/Drop multiplexers, cross-connects.
NET 461 D
Entrepreneurship and New
Venture Creation in IT
New venture creation :entrepreneurship for the 21 century,jefrry A.Timmons and Stephen Spinelli,Jr.McGraw-Hill
Critical foundation for the study in investigation of business; basic knowledge and understanding of economic, sociological, psychological and managerial theories of enterprise creation and development with a particular (but not exclusive) focus on the creation of small nosiness; Theoretical and policy frameworks for the study of entrepreneurship, defined as new venture creation and innovative growth relating to different types of organizations.
NET 201 D
1- Describe the role and skills of entrepreneur and cultivate an entrepreneurial mindset.
2- Explain principles and dynamics of various functions of business (e.g. marketing, accounting, operations and HRM) to create value added product and services
3- Identify, asses and evaluate business opportunities and construct a robust business plan
4- Describe the implications of various business ownership and financial structures.
5- Describe the various venture capital opportunities including (venture capitalist, angel investors, IPO in the stock market and conventional lending instructions).
6- Describe the role of CIO and CKO within a business structure
Introduction to the course content, text book(s), reference(s) and course plan.
Entrepreneurship conceptual aspects
Entrepreneurial Characteristics Amidst Global Challenges
Entrepreneurial process & entrepreneurship development
The Opportunity: Creating, Shaping, Recognizing, Seizing
Preparing for an entrepreneurial career:
Crafting the Business Plan
Institutional infrastructure to promote entrepreneurship
Financing Entrepreneurial Ventures
Obtaining Venture and Growth Capital
Emerging trends in Entrepreneurship
للحصول على التوصيف المختصر للمقررات على شكل ملف ( اضغط هنا )