ITM301 - IT Infrastructure

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6
At a glance
Powered by AI
The document provides an overview of the ITM301 course, which focuses on IT infrastructure components and solutions. It outlines the course objectives, topics, structure, teaching methods and policies.

The purpose of the course is to develop knowledge and skills related to IT infrastructure capabilities and limitations. The course will be structured around weekly lectures, readings, case studies, lab exercises, assignments and discussions to achieve the learning objectives.

The primary teaching methods used in the course include lectures, readings, case study analysis, lab exercises, assignments and discussions. Students are expected to actively participate in class and online to contribute to the learning environment.

RYERSON UNIVERSITY

Ted Rogers School of Information Technology Management


and G. Raymond Chang School of Continuing Education

COURSE OF STUDY
2017-2018

(C)ITM 301 – IT Infrastructure


1.0 PREREQUISITE

The prerequisite for this course is (ITM 100 or ITM 102) or in the two-year Business Tech.
Ontario College Diploma. Students who do not have the prerequisites will be dropped from the
course.

2.0 INSTRUCTOR INFORMATION


• Name:
• Office Phone Number:
• E-mail address:
• Faculty/course web site(s): https://my.ryerson.ca
• Office Location & Consultation hours:
• Your instructor is available for personal consultation during scheduled consultation hours
which are posted on their office door or on the course shell in D2L Brightspace. However,
you are advised to make an appointment by e-mail or by telephone before coming to
ensure that the professor is not unavoidably absent.

• E-mail Usage & Limits:


Students are expected to monitor and retrieve messages and information issued to them by the
University via Ryerson online systems on a frequent and consistent basis. Ryerson requires that any
official or formal electronic communications from students be sent from their official Ryerson E-
mail account. As such emails from other addresses may not be responded to.

3.0 CALENDAR COURSE DESCRIPTION

This course provides an introduction to computer hardware/software and communication networks. It


gives the students the knowledge and skills that they need for communicating effectively with
professionals whose special focus is on hardware and systems software technology and for designing
organizational processes and software solutions that require in-depth understanding of the IT
infrastructure capabilities and limitations. It also prepares the students for organizational roles that
require interaction with external vendors of IT infrastructure components and solutions.

1 of 6
4.0 COURSE OVERVIEW
Students in this course will build on previous knowledge of Business Information Systems. ITM301
concentrates on the components of a secure corporate IT infrastructure. The objectives for this course
are:
1. to develop a comprehensive knowledge of the functionality of networking hardware;
2. to acquire the skills to solve business problems that require IT solutions; and
3. to develop the competency to investigate inter-organization and intra-organization
communications problems and propose a viable technology solution.

5.0 COURSE OBJECTIVES


Upon completion of this course, students will be able to:
1. Analyze a business problem and propose an IT enabled solution.
2. Explain the principles underlying layered systems architecture and their application to both
computers and networks.
3. Distinguish the core elements of an IT infrastructure solution, such as clients, servers, other
network devices, wired and wireless network links, systems software, and specialized security
devices.
4. Discuss how IT infrastructure components are organized into infrastructure solutions in
different organizational environments.
5. Examine the principles underlying operating systems and virtual networks and propose a
network operating system given a business scenario.
6. Use practical examples to demonstrate how protocols are used to enable communication
between computing devices connected to each other.
7. Configure an IT infrastructure solution for a small organization, including a network based on
standard technology components, servers, security devices, and several different types of
computing clients.
8. Apply the core concepts underlying IP networks to solve simple network design problems,
including IP subnetting.
9. Illustrate the role of the emergent cloud computing technology in business today.
10. Write about the opportunities that virtual computing service provision models, such as Virtual
Machines and Virtual Networks, create for organizations

6.0 EVALUATION
The grade for this course is composed of the mark received for each of the following components:

Evaluation Component Percentage of the Final Grade


Assignments 10%
Labs 10%
Group Project 10%
Midterm Examination 30%
Final Examination 40%
Total 100%

NOTE: Students must achieve a course grade of at least 50% to pass this course.

Citation Format for Essays and Term Papers


All essay assignments, term paper and other written works must adhere with APA citation format.

2 of 6
Technical errors (spelling, punctuation, proofing, grammar, format, and citations) and/or
inappropriate levels of language or composition will result in marks being deducted. You are
encouraged to obtain assistance from the Writing Centre (www.ryerson.ca/writingcentre) for help
with your written communications as needed.

You can find APA guidelines and academic referencing from the following online resources:

a) Ryerson Writing Support Web site:


http://www.ryerson.ca/content/dam/studentlearningsupport/resources/citation-
conventions/APA%20Basic%20Style%20Guide.pdf

b) Ryerson Library for APA style guide: https://library.ryerson.ca/guides/style/

7.0 POSTING OF GRADES


 All grades, on assignments or tests must be posted or made available to students through the
return of their work. Grades on final exams must be posted. However, as there may be other
consideration in the determination of final grades, students will receive their official final
grade in the course only from the Registrar. Final official course grades may not be posted or
disclosed anywhere by an instructor.
 Posting of grades on the Course Management System (D2L Brightspace) is preferred. If
grades are posted in hard copy they must be posted numerically sorted by student
identification number after at least the first four digits have been removed. Instructors must
inform students in all course management documentation of the method to be used in the
posting of grades. Students who wish not to have their grades posted must inform the
instructor in writing.
 Some graded work will be returned to students prior to the last date to drop a course without
academic penalty.

8.0 TOPICS – SEQUENCE & SCHEDULE

Session Topic Learning Outcomes Readings Activities & Due


Dates
1 Lecture: Introduction to IT ● Identify types of Ch.1: Material • Logging in D2L
infrastructure applications and protocols Lecture notes • Navigating
Computer networks and its used on a network Turnitin.com
various business applications. ● Distinguish between the
client-server and P2P
networks
2 Lecture: Networking Essentials ● Describe how computers Ch. 2: Material Lab exercise:
and other devices are Lab1
addressed on a network
● Describe the purpose of
the OSI model and each of
its layers
3 Lecture: TCP/IP Protocols ● Identify and explain the Ch. 3: Material Lab exercise:
functions of the core Lab2
TCP/IP protocols
● Explain the purposes and
properties of routing and

3 of 6
describe common IPv4 and
IPv6 routing protocols
4 Lecture: Transmission Basics ● Explain analog and digital Ch.4 & Ch 5: Lab exercise:
and Networking Media transmission Material Lab3
● Explain types of Lecture notes
multiplexing technologies
● Describe the physical
characteristics of coaxial
cable, STP, UTP, and fiber-
optic media
● Compare the benefits and
limitations of different
networking media
5 Lecture: Wireless Networking ● Describe WLAN Ch.6: Material Lab exercise:
architecture Lecture notes Lab4
● Describe major
characteristics of 802.11
standards
● Describe WPA/WPA2
encryptions
● Explain Wireless PAN
● Explain WiMAX
technology
6 Lecture: Cloud Computing & ● Explain Cloud Ch. 7 & Ch. 10: Lab exercise:
Virtualization Computing. Material Lab5
Switches VLANs and bridging ● Explain virtualization and
protocols characteristics of virtual Prepare for
network components. Midterm Intro. Group
● Describe the techniques Project Case
for incorporating virtual study
components in VLANs.
● Explain methods for
connecting Virtual
Machines
7 Midterm Examination ● Explain methods for Ch.7: Material Assignment:
remotely connecting to a Lecture notes Assignment 1
Lecture: Remote Access network
● Discuss VPNs and the
protocols they rely on
● Understand methods of
encryption, such as IPsec,
SSL/TLS, and SSH
8 Lecture: Network Risk ● Describe security risks Ch.8: Material Assignment:
Management associated with people, Lecture notes Assignment 2
hardware, software, and
Internet access
● Assess a network’s
security needs and
vulnerabilities
● Prevent and respond to
malware infections
9 Lecture: TCP/IP structure & ● Describe methods of Ch. 10 : Material Assignment:
network segmentation network design unique to Assignment 3
TCP/IP networks, including
subnetting & CIDR
● Describe IPv6 network
addressing

4 of 6
10 Lecture: Network Operating ● Explain the function of a Lecture notes Assignment:
Systems & Applications server operating system in a Assignment 4
network
● Explain the role of NOS
in managing a network
security
● Describe the role of a
directory service
● Describe the role of
LDAP protocol
● Explain Active Directory
infrastructure
11 Lecture: Wide Area ● Explain different WAN Assignment:
Network topologies Assignment 5
● Compare features of
various WAN technologies
● Describe several WAN
transmission and connection
methods, including PSTN,
ISDN, T-carriers, DSL,
broadband cable, ATM,
SONET, MPLS and
Satellite
12 Group Project
Course wrap-up

9.0 TEACHING METHODS


The pedagogical approach for this course is Outcomes Based Action Learning (OBAL). The course will
incorporate the following teaching/learning methods: Lectures, readings, case study analysis, labs
exercises, lab assignments and discussions are the primary teaching methods in this course. Students are
expected to have studied the assigned readings and completed any online or written pre-class assignments
or quizzes prior to attending the lectures. Some of the assigned weekly labs/assignments may be combined
into a single case study with a higher weight. The lectures will review and expand the textual material and
provide students with the professor’s commentary, examples, and illustration. The case studies will be
used to link theoretical IT Infrastructure concepts to practice in a business context. The in-class activities
and problem sets will be used to allow the students to use their understanding of the material to develop IT
solutions. The group assignment and regular status update meetings with the Professor will enable
students to develop their “soft skills”. Each student is expected to contribute to the active learning
environment through in-class and/or online discussions and will be grade accordingly.

10.0 TEXTS & OTHER READING MATERIALS


Title: Network+ Guide to Networks, 7th Edition
Author: Jill West, Tamara Dean, Jean Andrews
Publisher: Cengage Learning
ISBN: 978-1305090941

Suggested/Recommended Textbook
Title: Cloud Computing, Automating the Virtualized Data Center
Author: Venkata Josyula, Malcom Orr & Greg Page
Publisher: Cisco Press
ISBN-13: 978-1587204340

5 of 6
11.0 VARIATIONS WITHIN A COURSE
All sections of a course (Day and CE sections) will follow the same course outline and will use the
same course delivery methods, methods of evaluation, and grading schemes. Any deviations will be
posted on D2L Brightspace once approved by the course coordinator.

12.0 OTHER COURSE, DEPARTMENTAL, AND UNIVERSITY POLICIES


• For more information regarding course management and departmental policies, please
consult the ‘Appendix of the Course of Study’ which is posted on the Ted Rogers School
of Information Technology Management website,
http://www.ryerson.ca/content/dam/itm/documents/cos/Appendix.pdf. This appendix
covers the following topics:
12..1 Attendance & Class Participation
12..2 Email Usage
12..3 Request for Academic Consideration
12..3.1 Ryerson Health Certificate
12..3.2 Academic Accommodation for Students with Disabilities
12..3.3 Religious, Aboriginal or Spiritual Observance
12..3.4 Re-grading and Recalculation
12..4 Examinations & Tests
12..4.1 Period of Prohibition from Testing
12..4.2 Make-Up of Mid-Term Tests, Assignments and Other Assessments
During the Semester
12..4.3 Make –Up of Final Exams
12..4.4 Missing a Make-Up
12..5 Late Assignments
12..6 Standard of Written Work
12..7 Academic Grading Policy
12..8 Academic Integrity
12..8.1 Turnitin.com
12..9 Student Rights

6 of 6

You might also like