Course Description For Department of Computer Networks
13
Course Descriptions
Department of Computer Networks
Course Name
Introduction to Computers
Course Code
Credit Hours
3
Contact Hours
Core
Major
COMP
101
Lec
Lab
Tot
2
2
4
Elective
Track
COMP Level
INFS
CNET
1st Level
Prerequisite
Course Description: This course introduces the main concepts of computer science. It includes the basics of computing: hardware, Software, Connectivity, and users, the different types and features of computers. It presents also the data types and data Representation. A Simple Computer System architecture is presented so to emphasize on main components, secondary storage devices, types of memory, Hardware, software and people. The principal Peripheral Devices are also presented: Input, Output and storage, Data preparation, Factors affecting input, Input Devices, Output Devices, Secondary Storage devices, Communication between CPU and input/output devices. Software aspects are introduced like Problems-Solving and programming: Algorithm development, Flowcharts, Looping, Some programming Features, Pseudo code, Some structured programming concepts, Documentation, as well as Programming Languages : Machine language and assembly language, High-Level and Low-Level languages, assemblers, compilers and Interpreters. Finally, the course presents the computer and communication aspects, as well as different features of operating Systems. Course Objectives: After completing this course, students are expected to: 1. Have a complete background about the main aspects of computing systems especially for hardware and software, 2. develop skills in hardware basics: computer architecture, peripheral devices, 3. Develop skills in software basics: programming languages.
data types and representations, problem solving concepts, compilers, assemblers, and
4. Understand the main concepts of Computer networking and communication. 5. Understand the main concepts of operating systems and their role in a computer system. Grading
Mid-term
20%
Project
Final
40%
Lab
20%
Quizzes
15%
Participation
5%
Text Book: Noel Kalicharan, “An Introduction to Computer Studies", Cambridge University Press, 2001, ISBN 0521586852. Reference Book: Raymond P. Canale, "Introduction To Computing for Engineers", McGraw-Hill, 3rd ed., 2000, ISBN: 0079116094.
14 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Intensive English
Course Code
Credit Hours
6
Contact Hours
Core
Major
ENGL
011
R
L
W
G
Tot
5
5
5
3
18
Elective
Track
COMP
INFS
CNET
1st Level
Level
Prerequisite
NONE
Course Description: English 101 is a multi-skill course taught on an intensive basis with work on specific skills allotted as follows : Reading: 5 hrs weekly, Listening : 5 hrs weekly, Writing : 5 hrs weekly and Grammar : 3 hrs weekly.
Course Objectives: 1. 2. 3. 4. 5. 6. 7.
to to to to to to to
Improve reading skills, build vocabulary, practice speech recognition, practice sentence construction, develop writing skills to the paragraph level, present and review grammatical structure, and practice structures orally.
Grading
Mid-term
20%
Project
Quizzes
15%
Final
60%
Lab
Participation
5%
Text Book: Listening Dictation, ISBN 0472086677. Reference Books: 1) 2) 3)
Improving Aural Comprehension, ISBN 0472086650. English sentence Structure, ISBN 0472083074. Introduction to Academic Writing, ISBN 020169509X.
15 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Intensive English 2
Course Code
Credit Hours
3
Contact Hours
Core
Major
ENGL
012
Lec.
Lab.
Tot.
3
3
6
Elective
Track
COMP
INFS
CNET
2nd Level
Level
Prerequisite
ENGL 011
Course Description: English 102 develops the student’s ability in the areas of reading, writing and skills on aspects pertinent to scientific usage in general and, specially, regarding computer science when possible. In the area of reading skills the student continues work on primary reading skills (scanning, information retrieval, etc.) while increasing the range of basic, sub-technical and scientific vocabulary. This includes works on especially scientific prefixes, suffixes and derivations. In the area of writing, basic skill (mechanics, organization, etc.) are expanded. Special attention is given to writing comparisons, descriptions explanations and definitions, especially as pertinent to scientific usage. In the area of study skills, the student gains experience in the use of the dictionary and other references instruments, especially in the areas of science.
Course Objectives: 1. 2. 3. 4. 5.
to to to to to
develop primary reading skills, build general and scientific vocabulary, develop mechanics of writing, build written organizational skills, and practice the use of reference instruments.
Grading
Mid-term
20%
Project
Quizzes
Final
60%
Lab.
Participation
20%
Text Book: Esteras, “Infotech “, Cambridge. Reference Books:
16 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Islamic Culture 1 ISLM
101
Course Name
Course Code الثقافة اإلسالمية 1
Tot.
Lab.
Lec. Contact Hours
2
Credit Hours
2
2 Elective
Core
Major
Track
CNET NONE
COMP
INFS
1st LEVEL
Prerequisite
Level Course Description:
مفهوم الثقافة والحضارة والمدنية ,الثقافة في اللغة واالصطالح ,الثقافة والدين ,الفرق يرين الملرا والثقافرة ,م راثر الثقافرة اإلسرالمية , خ ائص الثقافة اإلسالمية ,تمقيف الحضارة والمالقة يينها ويين الثقافة اإلسالمية ,الحضارة اإلسالمية :مرن الاانرا الملمري ,الممقانري , أسباب تخلف المسلمين :األسباب الداخلية والخارجية .أسباب النهضة :المروثة للرا الابراب والسرنة ,ل يرار البرقام اإلسرالمي وتن ري الحياة الملنية ,الغزو الفاقي :أسبايه ,أهدافه ,األسب قا :تاريخه ,أساليبه .هذا ياإلضافة للا فظ الازر 30من الققآن الاقيا
Course Objectives: )1 )2 )3 )4 )5
20%
يمقف المفاهيا األساسية للثقافة اإلسالمية وم اثرها مع مقارنبها يمفهوم الحضارة والمدنية يحلل الخ ائص والسمات المامة للثقافة اإلسالمية مقارنة يغيقها من الثقافات يوازن يين مفهوم الحضارة والمدنية في ضور الثقافة اإلسالمية ومفهومها في ضور الثقافات األخقى يناقش وينقد ال به البي تثار في وجه الثقافة اإلسالمية مع القث يالحاج ال قعية والمقلية يحدث يمض الم االت المسبادة ويضع لها الحلول المناسبة في ضور م اثر الثقافة اإلسالمية وأصولها
Quizzes
Project
20%
Mid-term
Participation
Lab.
60%
Final
Grading
Text Book: لمحات في الثقافة اإلسالمية لممق عوثة الخطيا Reference Books: )1
الثقافة اإلسالمية (المسبوى األول)( )101تأليف :عبد الق من – جدة
بابه الميداني وآخقون الاباب الااممي ,جاممة الملك عبد المزيز
17 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Islamic Culture 2 ISLM
102
Course Name
Course Code الثقافة اإلسالمية 2
Tot.
Lab.
Lec. Contact Hours
2
Credit Hours
2
2 Elective
Core
Major
Track
CNET
INFS
COMP
2ND LEVEL
Prerequisite
Level Course Description:
أقسام :عقيدة وسقيمة ,المقيدة واأليمان ,مقايا المقيدة اإلسالمية ,أركان اإلسالم :األيمان ياهلل ,األثلة علا وجوثه ,القث علا المنارقين لوجوثه (تو يد اإللوهية ,تو يد القيويية ,تو يد األسرمار وال رفات) الابرا السرماوية ,األيمران يالابرا السرايقة ,األنبيرار والقسرل ,مهمرة القسل ,صفات األنبيار ,محمد صلا هللا عليه وسلا عموم رسالبه ,خاتا النبيين ,البقزخ واليوم اآلخق ,القضار والقدر ,المالئاة ,األخرال : مفهوم األخال وماانبها في البقيية .أقسام :األخال الفقثية واألسرقية واالجبماعيرة ,آثاب المهنرة وريطهرا يالمقيردة واأليمران واألخرال , هذا ياإلضافة للا فظ الازر 29من الققآن الاقيا
Course Objectives:
)1 )2 )3 )4 )5
20%
يحدث جوانا المقيدة اإلسالمية من خالل آيات الققان الاقيا وأ اثيث النبوية وما فيها من اج ويقاهين يمقف مفهوم ال قيمة ويحدث مااالتها ومدى ارتباطها يالمقيدة يناقش مفهوم األخال في اإلسالم وتميزه وعمومه وشموله لال أن طة الحياة يدافع عن ثينه ( عقيدة وشقيمة و وأخال ) ضد ما يواجهه من تحديات ياباية تققيق عن ثراسة امه يطبق ما ثرسه نظقيا ول المقيدة وال قيمة واألخال في ياته وسلوكه المام والخاص
Quizzes
Project
20%
Mid-term
Participation
Lab.
60%
Final
Grading
Text Book: )1العقائد اإلسالمية لل
يخ سيد
Reference Books: )1نظام اإلسالم :المقيدة والمباثة لمحمد المبارك )2شرح العقيدة الطحاوية
18 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Islamic Culture 3 ISLM
103
Course Name
Course Code الثقافة اإلسالمية 3
Tot.
Lab.
Lec. Contact Hours
2
Credit Hours
2
2 Elective
Core
Major
Track
CNET
INFS
COMP
3RD LEVEL
Prerequisite
Level Course Description:
المق وث يملا االقب اث ,المذهبان االقب اثيان المب ارعان في عالا اليوم ,تمقيف علا االقب اث اإلسرالمي ,خ رائص االقب راث اإلسرالمي , م اثر االقب اث اإلسالمي ,الملاية في النظام االقب اثي اإلسالمي ,الم الة االقب راثية وعرالا اإلسرالم لهرا ,الممرامالت فري اإلسرالم ومقارنبها نع النظا االقب راثية المماصرقة ,أركران االقب راث اإلسرالمي ,الممرامالت القيويرة ,البرأمين ,الحسربة وثورهرا فري تنظريا السرو .والمقاقبة علا األسوا ,ياإلضافة للا فظ الازر ( )28من الققآن الاقيا
Course Objectives:
-1 -2 -3 -4
20%
يحدث جوانا النظام االقب اثي في اإلسالم من خالل ال قع والبطبيق قي الواقع ومااالتها. يوازن يين النظام االقب اثي في اإلسالم والنظا االقب اثية الوضمية موضحا أوجه ال به واالخبالف. يمق المفاهيا والم طلحات االقب اثية األساسية يلغبه الخاصة مع البدعيا ياألمثلة يسبنبج أهمية وضقورة تطبيق النظام االقب اثي اإلسالمي لدى المسلمين وغيق المسلمين وآثار تطبيق النظا الوضمية
Quizzes
Project
20%
Mid-term
Participation
Lab.
60%
Final
Grading
Text Book: )1الثقافة اإلسالمية :المسبوى الثالث .تأليف :محمد المبارك وآخقون Reference Books: )1البفايق االقب اثي في اإلسالم .تأليف :خالد عبد الق من أ مد )2النظام االقب اثي الققآني .تأليف :محمد فقيد منفيحي
19 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Islamic Culture 4 ISLM
104
Course Name
Course Code الثقافة اإلسالمية 4
Tot
Lab.
Lec Contact Hours
2
Credit Hours
2
2 Elective
Core
Major
Track
CNET
INFS
COMP
4TH LEVEL
Prerequisite
Level Course Description:
النظام االجبماعي ,نظقة اإلسالم لإلنسان من يث البميز واالسبخالف ,األسقة في السالم ,ماانة المقأة فري اإلسرالم ,اهبمرام اإلسرالم ياألسقة ,الحقو الزوجية ,تمدث الزوجات ,المحقمات ,الميقام في اإلسالم ,المناية يالطفرل فري المابمرع اإلسرالمي ,المدالرة االجبماعيرة في اإلسالم ,نظام الحاا في السالم ,أسس نظام الحاا والسياسة في اإلسالم .هذا ياإلضافة للا فظ الازر 27من الققآن الاقيا.
Course Objectives:
-1 -2 -3 -4 -5
20%
يحلل مفاهيا النظام السياسي وجوانبه وما يقيطه يه من قائق ومقا ل تاريخية يحلل مفاهيا وجوانا النظام االجبماعي وجوانبه من خالل اآليات واأل اثيث يحلل ويناقش جوانا النظامين :االجبماعي والسياسي مقارنا ذلك ياألنظمة الوضمية يسبنبج تاقيا اإلسالم للمقأة والمالمح المامة لألسقة في اإلسالم وما يقتب يها من قو وواجبات وآثاب يدعا يالبقاهين وينقد ال به المطقو ة في وجه هذين النظامين مع القث عليه شقعيا وعقليا
Quizzes
Project
20%
Mid-term
Participation
Lab
60%
Final
Grading
Text Book: )1األ اام السلطانية للماورثي Reference Books: )1 )2
األ اام السلطانية للفقار المقأة في اإلسالم للمسب
ار علا وهبه
20 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Course Name
Department of Computer Networks
Programming 1
Credit Hours
3
Course Code
COMP
011
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track CS Level
IS
3rd Level
CNET Prerequisite
Course Description: This knowledge area consists of those skills and concepts that are essential to programming practice independent of the underlying paradigm and programming language. Specific topics covered include: an overview of algorithms and problem-solving (problem solving strategies, role of algorithms in the problemsolving process, etc), fundamental programming constructs (variables, types, expressions, simple I/O, conditional and iterative control structures, functions, recursion, pointers, etc.), fundamental and advanced data structures and related algorithms (arrays, records, strings and string processing, stacks, queues, trees and files, searching, sorting, etc). Students should acquire some understanding of data internal representation in order to write programs more efficiently. In practice the programming language used is ANSI-C, the syntax aspect of language and some pragmatic aspects such as: comparison of interpreters and compilers and language translation phases must be studied in laboratory. Course Objectives: 1. Discuss the importance of algorithms in the problem-solving process and using pseudo- code. 2. Describe the phases of program translation from source code to executable code and the files produced by these phases. 3. Design, implement, test, and debug a program that uses fundamental programming constructs. 4. Describe the internal representation of numeric and nonnumeric data. 5. Write programs that use fundamental and advanced data structures. Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: Robert Sedgewick, “Algorithms in C: Fundamentals, data structures, sorting, searching, and graph algorithms”, Addison-Wesley 2001, ISBN: 0201756080 Reference Books: Herbert Schildt, “C: the complete reference”, McGraw-Hill 2000, ISBN:0-07-212124-6 21 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Course Name
Department of Computer Networks
Programming 2
Credit Hours
3
Course Code
COMP
112
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track CS Level
IS
4th Level
CNET Prerequisite
COMP 011
Course Description: This course continues the coverage of the fundamental concepts of Object Oriented Programming started in Programming I It covers more advanced concepts and topics such as relationships between classes, inheritance, polymorphism, abstract classes, error handling, interfaces, generics and data structures such as linked lists, stacks and queues, graphical user interface.
Course Objectives:
1. Fundamental concepts of Object Oriented Programming. 2. relationships between classes, inheritance, polymorphism, abstract classes 3. generics and data structures such as linked lists, stacks and queues, graphical user interface
Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: Thomas WU: An Introduction To Object-Oriented Programming With JAVA: 5th Edition McGraw-Hill. Reference Books: Java Software Solutions: Foundations of Program Design 5th or 6th Edition by John Lewis and William Loftus, Addison-Wesley, ISBN:0-321-40949-3 (5th),
22 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Introduction to Information Systems
Course Code
Credit Hours
3
Contact Hours
Core
Major
INFS
111
Lec
Lab
Tot
2
2
4
Elective
Track
COMP Level
INFS
CNET
2nd Level
Prerequisite
Course Description: This course aims to introduce students to the basic concepts and topics related to Information Systems (IS). It covers topics such as: systems concepts; system components and relationships; cost/value and quality of information; competitive advantages of information; specification, design, and re-engineering of IS; application versus system software; package software solutions; procedural versus non-procedural programming languages; object oriented design; database features, functions, and architecture; networks and telecommunication systems and applications; characteristics of IS professionals and IS career path; information security, crime, and ethics. Practical exercises may include developing macros, designing and implementing user interface and reports; developing a solution using database software.
Course Objectives: The course objectives aim : 1. 2. 3. 4. 5. 6.
To provide an introduction to the Organizational uses of information to improve overall quality. To present hardware, software, and related information technology concepts. To provide concepts and skills for the specification and design or the re-engineering of organizationally related systems of limited scope using information technology. To show how information technology can be used to design, facilitate, and communicate organizational goals and objectives. To explain the concepts of individual decision making, goal setting, trust worthiness, and empowerment. To show career paths in information system. To present and discuss the professional and ethical responsibilities of the IS practitioner
Grading
Mid-term
20%
Project
Final
40%
Lab
20%
Quizzes
15%
Participation
5%
Text Book: Ralph, M. Stair, " Principles of Information Systems ", Thomson Learning, 2003, ISBN 0619216077. Reference Book: 1) Ralph, M. Stair, George W. Reynolds, and George Reynolds, " Fundamentals of Information Systems", Course Technology Inc, 2nd ed., 2003, ISBN 0619064919. 2) Steven A., " Information Systems Foundation of E-Business", 4th edition, 2002.
23 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Course Name
Department of Computer Networks
Algorithms & Data Structures 1
Credit Hours
3
Course Code
COMP
221
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track CS
IS
5th Level
Level
CNET Prerequisite
COMP 112
Course Description: Abstract Data Types; Performance Measurement: Time & Space Complexity, Big-O Notation. Basic Data Structures: Lists, Stacks, Queues, Priority Queues. Trees: Recursion, Terminology, General Trees, Binary Trees, Balanced Search Trees, AVL Trees. Multi-way Trees: the family of B-Trees. Heaps: Min and Max Heap, Heap Sort, Priority Queue as a Heap. Hashing Techniques: Hashing Functions, Collision Resolution Strategies. Graphs: Terminology, Graph Traversal Algorithms, Other important graph Algorithms. Sorting.
Course Objectives: 1. 2. 3. 4. 5.
To understand Performance Measurement. To understand Basic Data Structures. To understand Trees. To understand Heaps & Hashing Techniques. To understand Graphs .
Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: Larry Nyhoff, ADTs Data Structures and Problem Solving with C++, Prentice-Hall. Reference Books:
William H. Ford and William R. Topp, Data Structures with Java, Prentice-Hall. Daniel F. Stubbs and Neil W. Webre, Data Structures with Abstract Data Types and Pascal,Brooks/Cole Publishing Company, 1989.
24 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Course Name
Department of Computer Networks
Object Oriented Programming
Credit Hours
3
Course Code
COMP
213
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track CS
IS
CNET
th
Level
5 Level
Prerequisite
COMP 112
Course Description: The purpose of this course is to provide students with fundamental knowledge of object oriented programming (OOP). It emphasizes good software engineering principles and developing programming skills. Specific topics covered include: fundamental concepts of object oriented (classes, methods, instantiation, communication by message, encapsulation, inheritance, overriding, dynamic dispatch, polymorphism, etc.), advanced techniques of OOP (exceptions, multithreaded programming, etc.) and some interesting packages (I/O, strings, etc.). As an OOP programmer, student will be able to translate solution problem into object oriented form, he should acquire some understanding of object oriented concepts and tools such as the Unified Modeling Language (UML), this will give student a firm foundation on which to build high-quality software systems. In practice the programming language used is JAVA, as an introduction to JAVA language; students should acquire some understanding of abstraction mechanisms, JAVA Virtual Machines (JVM) and the byte code notion.
Course Objectives: 1.
Describe the importance and power of abstraction in the context of virtual machines and explain the benefits of intermediate languages in the compilation process.
2.
Justify the philosophy of object-oriented design and the concepts of encapsulation, inheritance and polymorphism.
3.
Explain how abstraction mechanisms support the creation of reusable software components.
4.
Acquire basics of how translate solution problem into object oriented form.
5.
Design and implement simple programs in an object-oriented programming language.
6.
Design and implement program that use exceptions and multithreads.
Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: Bruce E. Wampler, “Essence of Object Oriented Programming with JAVA and UML”, Addison Wesley 2001, ISBN: 0-201-73410-9 Reference Books: Herbert Schildt, “JAVA 2: The complete reference”, McGraw-Hill, 5th edition 2002, ISBN: 0072224207
25 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Database Systems - 1
Course Code
Credit Hours
3
Contact Hours
Core
Major
INFS
221
Lec
Lab
Tot
2
2
4
Elective
Track
COMP
INFS
CNET
5th Level
Level
Prerequisite
INFS 111
Course Description: This course aims to discuss the basic concepts and designs of database. It covers topics such as: data model, levels of abstraction, data independence, and concurrency control. It focuses on how to design databases for given problems, and how to use database effectively, including ER modeling, key and participation constraints, weak entities, class hierarchies, aggregation and conceptual DB design using the ER model. Relational model: creating and modifying relation using query language, enforcing integrity constrains, ER to relational and view. Schema refinement and normal forms: Functional dependencies, reasoning about functional dependencies, normal forms, decompositions and normalization. Relational Queries : Relation algebra and calculus and commercial query languages. Object database systems : User defined abstract data type, structured types, objects; object identity; and reference type, inheritance, and database design for an ORDBMS. Students will be trained on some software tools such as: Oracle, Sybase, DB2, and Informix.
Course Objectives: 1. 2. 3. 4. 5.
To describe and discuss the concepts of database design. Students will learn how to design a conceptual data model and logical database model, convert the logical database designs to physical designs and develop the physical database. Students will learn how to evaluate a set of query using relational algebra and calculus. Students will learn how to evaluate a set of query using query language. To discuss and explain database design for an ORDBMS.
Grading
Mid-term
20%
Project
Final
40%
Lab
20%
Quizzes
15%
Participation
5%
Text Book: Raghu, R. and Johannes, G., “Database Management Systems” , McGraw- Hill,3rd ed., 2002,ISBN 0072465638. Reference Books: 1) 2)
Elmasri, R., Navath,S., and Navath, B.,"Fundamentals of Database Systems" , Addison-Wesley, 4th Ed., 2003, ISBN 0321122267. Date, C. J., “Introduction Database Systems”, Addison-Wesley, 8th ed.,2003, ISBN 0321197844.
26 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Computer Organization and Architecture
Course Name
Credit Hours
Course Code
3
CNET
213
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track
CNET th
Level
5
COMP
INFS
Level
Prerequisite
COMP 101
Course Description: Register transfer and microoperations: register transfer language, bus and memory transfer, arithmetic, logic and shift microoperations. Basic computer organization and design: instruction codes, computer registers and common bus systems, computer instruction set, timing and control, instruction cycle, memory reference instructions, input-output and interrupt instructions, complete computer description, and design of basic computer. Hardwired and microprogrammed control : hardwired control methods, hardwired control examples, control memory, address sequencing, microprogram example, and design of control unit. CNETtral processing unit : general register organization, stack organization, single-accumulator organization, instruction formats, addressing modes, data transfer and manipulation, program control, CISC and RISC computers, and examples of CISC and RISC processor. Computer arithmetic: addition , subtraction, multiplication and division algorithms, and floating point arithmetic operations. Input-output organization: input-output interface, asynchronous data transfer, priority interrupt, DMA, IOP, and serial communication. Memory organization: memory hierarchy, main memory , auxiliary memory, associative memory, cache memory, virtual memory. Student will be trained on the available software such as: Logic Works, MultiSim, Mentor graphics and Xilinx software product in addition with the products and components of Heathkit educational systems such as Microprocessor modules (EWS 3800 microprocessor modules) beside to the Xilinx product and components for FPGA technology.
Course Objectives: The student are introduced to 1. Understand the architecture and organization of computing systems and electronic computers, 2. Study the program execution, instruction format and instruction cycle, 3. Design a simple computer using hardwired and microprogrammed control methods, 4. Study the basic components of computer systems besides the computer arithmetics, and 5. Understand input-output organization, and memory organization and management. Grading 20% Mid-term Project Quizzes Final
40%
Lab.
20%
10% 10 %
Participation
Text Book: 1.
M.Moris Mano, "Computer System Architecture", Prentice Hall , Third Edition.
Reference Books: 3) 4)
th
William Stallings,” Computer Organization and Architecture: Designing for Performance ”, Prentice Hall , 6 edition , 2004, ISBN: 0-13-035119-9. David A. Patterson, John L. Hennessy,” Computer Organization & Design: The Hardware-Software Interface”, Morgan Kaufmann, 2004, ISBN 1558606041.
27 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Course Name
Department of Computer Networks
Operating Systems
Credit Hours
3
Course Code
COMP
231
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track CS Level
IS
th
6 Level
CNET Prerequisite
Course Description: In this course the student will study the basic concepts of operating systems (OS), the following concepts will be studied in this course: OS Overview (objectives, functions, evolution of OS, characteristics of modern OS), process description and control (process definition, process states, process description and process control), threads (definition, why use thread, relationship between processes and threads), microkernel (benefits of microkernel organization, microkernel design), uni-processor scheduling (types of scheduling, short term scheduling criteria, scheduling algorithms), memory management (memory management requirements, loading programs into main memory -fixed partitioning, dynamic partitioning, simple paging, simple segmentation-), virtual memory (paging, segmentation, combined paging and segmentation), operating system software (fetch policy, placement policy, replacement policy, resident set management, cleaning policy, load control), I/O management and disk scheduling (I/O devices, organization of I/O function, I/O buffering, disk I/O), and file management (file management system, file organization and access, file directories, secondary storage management).
Course Objectives: 1. Understand the basic concepts underlying operating systems and how a typical operating system works. 2. Describe the functions and design of operating systems. 3. Understand the main concept behind traditional (non-distributed) operating systems 4. Analyze and explain the Algorithms used in Virtual Memory Management 5. Discuss the algorithms used in I/O and File Management Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: W. Stallings, “Operating Systems: Internals and Design Principles”, Prentice Hall International, 5th edition 2005, ISBN: 0-13-147954-7 Reference Books: Jean Bacon, Tim Harris “Operating Systems”, Addison-Wesley 2003, ISBN: 0321117891.
28 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Internet Technology
Course Code
Credit Hours
3
Contact Hours
Core
Major
INFS
241
Lec
Lab
Tot
2
2
4
Elective
Track
COMP
INFS
CNET
6th Level
Level
Prerequisite
Course Description: Web-Based Information Architectures entails the design, creation, instrumentation and usage of web sites and related indexing and searching software. The course focuses first on web-based search engines: how to use them optimally, how to design e-commerce sites that maximize customer attraction via search engines, how to analyze competition, and how to architect both topological and key-term page access paths in service of successful e-commerce infrastructures. Then, the course focuses on key technological underpinnings, primarily the hands-on creation of a search engine, including inverted-indexing, partial matching, query-expansion and spidering technology. Subsequently, the course addresses related issues in web-based information architectures, including: automated text categorization (e.g. indexing web pages into Yahoo-like taxonomies or auction-site catalogs), information extraction from web-pages, and a glimpse into larger-scale text and data mining methods. Time permitting, the course will survey issues such as multi-lingual web access and distributed information retrieval. Students will be trained on some popular Web-based systems software like: ProblemTracker, PlaceWare's Group Ware collaborative Computing. Course Objectives: The objectives of the course are: To develop and apply powerful tools to retrieve information from the Internet, to understand modern text indexing methods, how to design e-commerce sites, how to help Educators to use the web to support their own teaching, how to build a Web based Education system, to assign projects involving Web-based search engines, to focus on development tools such as Java, ASP, PHP, CGI, ASP net, etc. Grading
Mid-term
20%
Project
10%
Quizzes
15%
Final
40%
Lab
10%
Participation
5%
Text Book: 1.
W.Horton, " Designing Web-based Training ",2000, Ed. Willey, ISBN 047135614X .
Reference Books: 1) 2) 3)
Colin Mc Cormack, David Jones, " Building a Web based System" , Ed Willey 2000 Einecker, "COM+ & XML: ASP.NET on the Edge", Hungry Minds Inc., 2001. Jason Bentrum, James Whatley, "Building e-commerce Sites", Ed Que Sams,2002.
29 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Course Name
Department of Computer Networks
Computer Networks
Credit Hours
Course Code
3
CNET
331
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track
CNET th
Level
7
COMP
INFS
Level
Prerequisite
Course Description: Introduction: Network Applications. Network Hardware. Network Software. Reference Models. The Physical Layer: Guided Transmission Media. Wireless Transmission. Communication Satellites. The Public Switched Telephone Network. The Mobile Telephone System. Cable Television. The Data Dink Layer: Data Link Layer Design Issues. Elementary Data Link Protocols. Sliding Window Protocols. Example of Data Link Protocols: HDLC: High-Level Data Link Control, The Data Link Layer In The Internet. The Medium Access Sub-layer: The Channel Allocation Problem. Multiple Access Protocols. Ethernet. Wireless LANS. Broadband Wireless. Blue Tooth. Data Link Layer Switching. The Network Layer: Network Layer Design Issues. Routing Algorithms. Congestion Control Algorithms. Quality Of Service. Internetworking. The Network Layer In The Internet: The IP Protocol, IP Addresses, Internet Control Protocols, The Interior Gateway Routing Protocol: OSPF. The Exterior Gateway Routing Protocol: BGP, Internet Multicasting, Mobile IP, Ipv6.The Transport Layer: The Transport Service. Elements Of Transport Protocols. A Simple Transport Protocol. The Internet Transport Protocols: UDP; TCP:TCP: Introduction To TCP, The TCP Service Model, The TCP Protocol The TCP Segment Header, TCP Connection Establishment, TCP Connection Release, Modeling TCP Connection Management, TCP Transmission Policy, TCP Congestion Control, TCP Timer Management, Wireless TCP And UDP, Transactional TCP. Performance Issues: Measuring Network Performance, System Design For Better PERFORMANCE, FAST TPDU Processing, Protocols For Gigabit Networks. The Application Layer: DNS: The Domain name system; Electronic Mail; SNMP.ATM Network: ATM Layer. ATM Application Layer. ATM Signaling. PNNI Routing. Case study with Window2000/Linux Course Objectives: Making the student understand the main concepts of: 1. 2. 3. 4.
How does a network establish. Data communication and transmission media, mode of data transmission. Networking, types of networking, network devices and its advantages. Network Protocols and its techniques.
Grading
Mid-term
20%
Project
Final
40%
Lab.
Quizzes
10%
Participation
10 %
20%
Text Book: th
1.
Andrew S. Tanenbaum, “ Computer Networks”, Prentice Hall and Pearson Education , 5 edition, 2003, ISBN 0-13066102-3. Reference Books: 1. 2.
th
William Stallings,”Data and Computer Communication”, Pearson Education, 7 Edition, 2003, ISBN 0131006819. rd Behrouz A Forouzan,” Data Communications and Networking, 3 Edition, , McGraw-Hill, 2003, ISBN 0072923547.
30 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Software Engineering
Course Code
Credit Hours
3
Contact Hours
Core
Major
INFS
334
Lec
Lab
Tot
2
2
4
Elective
Track
COMP
INFS th
Level
8
CNET
Level
Prerequisite
Course Description: This course present both technical and managerial software engineering problems, before studying in depth some life cycle phases, student should understand fundamentals aspects such as : the software life cycle and its phases, the software development models and different specialized systems. In this course, emphasis will be placed on the latest software engineering life cycle phases: the software validation (testing, testing levels, test case generation, black-box and white-box testing techniques) and the software evolution (maintenance, reuse, reengineering, legacy systems). The main topics covered in software validation include formal methods (formal specification languages, formal verification). The construction process considered as one of the inputs to testing process is not studied here; students acquire understanding of coding at programming courses. Students should acquire some fundamentals of software project management: team management; project scheduling; risk analysis; software configuration management; project management tools. Students will be trained on some software tools such as: Rational Unified Process, and Z Language.
Course Objectives: 1) 2) 3) 4) 5)
Understand software validation: Validation planning; testing fundamentals, including test plan creation and test case generation; formal methods concepts, formal verification. Understand software evolution: Software maintenance; characteristics of maintainable software; reengineering; legacy systems; software reuse. Work in team, take a project, test and maintain a small or medium-scale system. Prepare a project plan for a software project that includes estimates of size and effort, a schedule, resource allocation, configuration control, and project risk. Make use of available case tools.
Grading
Mid-term
20%
Project
10%
Quizzes
15%
Final
40%
Lab
10%
Participation
5%
Text Book: Carlo Ghezzi, Mehdi Jazayeri, Dino Mandrioli, “Fundamentals of Software Engineering”, Prentice Hall Copyright: 2003, ISBN: 0-13305699-6, Reference Book: Daniel J. Mosley, Bruce A. Posey, “Just Enough Software Test Automation”, Prentice Hall PTR Copyright 2002, ISBN: 0-13-008468-9
31 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Course Name
Department of Computer Networks
Human Computer Interaction
Credit Hours
3
Course Code
INFS
336
Lec
Lab
Tot
2
2
4
Contact Hours
Core
Major
Elective
Track CS
IS th
Level
8
CNET
Level
Prerequisite
Course Description: This course provides an overview and introduction to the field of HCI. It introduces students to tools, techniques, and sources of information about HCI and provides systematic approach to design. The course increases awareness of good and bad design through observation of existing technologies, and teaches the basic skills of task analysis, and analytic and empirical evaluation methods. The student will be acquainted with the whole design process: HCI in the design process, design rules, implementation support, evaluation techniques, universal support, etc...He also studies some relevant models and theories: cognitive models, communication models, task analysis, dialog notations and design, modeling rich interaction, etc ...Final chapters will cover some alternative realities, multimedia, global information systems, and the Web. Students will also participate in a laboratory where they will practice HCI techniques in an independent , self defined project. Students will be trained on some HCI software like: AlphaUIMS, SuperCard, ISA dialog Manager, InterMaphics. Course Objectives: After completing this course the student will: 1. Acquire some useful HCI techniques in practice. 2. Cover the latest topics in multimedia, global information systems, and the web-based models for rich interaction. 3. Increase coverage of social and contextual models and theories related to HCI design processes. 4. Be acquainted to new topics like: interaction design, universal access, and rich interaction.
Grading
Mid-term
40%
Project
Quizzes
10%
Final
40%
Lab
Participation
10%
Text Book: Alan Dix, Janet E. , Gregory D., and Russell Beale, "Human-Computer Interaction", Prentice Hall, 3rd Ed. , 2003, ISBN: 0-13-046109-1. Reference Books: M.Kaffman, "HCI Models, theories and frameworks", 2003, ISBN: 1-55860-808-7.
32 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Summer Training
Credit Hours
3 Core
Major
Course Code
COMP
Contact Hours
12 Weeks
371
Elective
Track CNET
COMP
INFS 8th
Level
Prerequisite
Course Description: This course should be taken by those students completed 90 credit hours. The course period is 12 weeks long and must be during summer of the forth academic year in. Students must be oriented in one of the companies, and well supervised so to accomplish correctly this training. The course must constitute a link between the theoretical and scientific academic background and the work environment. It provides a better understanding and a clear view of the real-world work environment. It provides also students complementary knowledge and training such as facing and dealing with real-world problems, being trained to work in team-works. After completing the summer training, students must submit a report. An oral exam is held by a committee consisting of both faculty members and external supervisors.
Course Objectives: 1. 2. 3. 4. 5. 6. 7.
Grading
Develop student skills using practical applications. Acquaintance the work environment. Prepare the students to transfer from learning environment to work environment. Acquaintance the applied work systems. Understand mechanism of different applications. Understand the attitude and the manner of the work. Compare the studying courses with real world.
Pass or Fail
Text Book:
Reference Books:
33 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Final Project
Credit Hours
3
Course Code
COMP
472
Lec
Lab
Tot
0
9
9
Contact Hours
Core
Major
Elective
Track CNET
COMP
INFS
10th Level
Level
Prerequisite
Course Description: Project implementation course offers students an opportunity to assemble their knowledge acquired throughout their Bachelor of CNET curriculum to realize a final project. This would require them to gather information about the proposed subject and realize a final report as well as to develop a system practically. At this stage, students must carry on all phases of system analysis, design, and implementation of the subject already defined in the precedent course (Project proposal), and under the supervision of the same supervisor. At the end of the Level, students are asked to make an oral presentation with the presence of faculty members as referees. Course Objectives: the objectives of this course are to help students learn how to : 1. Acquire new knowledge and skills and apply them in a real life project. 2. Implement the selected solution 3. Learn how to test the implementation 4. Readjust and make the necessary changes on the implemented system. 5. Make and write the necessary documentation 6. Present project work. Grading
Weekly Report
40%
Final Report
60%
Text Book: There is no text book for this course Reference Book: 1. John McManus, Trevor Wood-Harper “Information Systems Project Management: Methods, Tools and Techniques”, 2003. ISBN: 0273646990.
34 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Course Name
Department of Computer Networks
Digital Logic
Credit Hours
Course Code
3
CNET
111
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track COMP
INFS
CNET
th
Level
4 Level
Prerequisite
Course Description: Digital Systems: digital computer and digital systems, binary, decimal, octal and hexadecimal number systems, number base conversion, complements, signed and unsigned numbers, binary codes, binary storages and registers, and binary logic. Boolean algebra and logic gates: basic definitions, axioms definitions of Boolean algebra, basic theorem and properties of Boolean algebra, Boolean functions, canonical and standard forms, logic operations, and digital logic gates. Simplification of Boolean functions: the map methods, product of sum simplification, NAND and NOR implementation, and the tabulation method. Combinational logic circuits: adders, sub tractors, decoders, encoders, multiplexers, de-multiplexers, look-up table, function implementation using multiplexers/ decoders and memories. Sequential logic circuits: flip-flops, synchronous and asynchronous circuits, counters (types of counters), registers, memories, design of counters, design of sequential circuits, analysis of counters, and analysis of sequential circuits. Analog-to-digital converters and digital-to-analog converters. Programmable logic devices (PLD) : PLA, PAL and FPGA. Student will be trained on the available software such as: Circuit maker 2000, EWB50a, and LogicWorks 4.0, MultiSim 6.01 in addition with the products and components of Heath kit educational; systems (EWS-3700 analog modules) Course Objectives: 1. The students are introduced to Study the fundamentals of digital systems, Boolean algebra, and logic expressions, simplify and implement Boolean functions using elementary logic gates. Study the combinational and sequential digital circuits, Design and analysis of combinational and sequential logic circuits, and study briefly the advanced mask and field programmable logic devices. Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1.
M. Morris Mano,” Digital Design”, Prentice Hall, Pearson Education International, 3rd Edition .
Reference Books: 1.
M. Morris Mano,” Logic Computer Design Fundamentals and Xilinx Student Edition 4.2 Package”, Prentice Hall, 3rd Edition , 2004, ISBN 0-13-124711-5.
2.
Ronald J, Tocci, Neal S. Widmer, and Gregory L. Moss, “ Digital Systems: Principles and Applications", Prentice Hall, 9th edition, 2004, ISBN 0-13-111120-5.
35 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Electronic Circuits 1
Credit Hours
Course Code
3
CNET
112
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track CS
IS
CNET
4th Level
Level
Prerequisite
Course Description: Diode applications: Limiters, clampers, voltage multipliers. Special purpose diodes: Zener diode, schottky barrier, varactor, optical diodes, PIN diodes, Laser diodes. Biasing of BJT: DC operating point, BJT characteristics & parameters, fixed bias, emitter bias with and without emitter resistance, analysis of above circuits and their design, variation of operating point and its stability. Biasing of FET: Types of FET, characteristics and parameters of JFET, MOSFET, enhancement MOSFET, different biasing circuits, their analysis and design, location of operating point and its stability. CMOS devices. Small Signal BJT amplifiers: AC equivalent circuit, hybrid, re model and their use in amplifier design. BJT as switch, BJT as a diode, emitter coupled pair, design considerations. Small signal FET amplifiers: AC operating point, common source, common drain, common gate characteristics.
Course Objectives: The student are introduced to 1. Study the fundamentals of Diodes and Transistor. 2. Understand & Solve Biasing Problems of BJT and FET. 3. Understand & Solve Modeling Problems of BJT and FET. Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1. Robert L. Boylestad and Louis Nashelsky “Electronic Devices and Circuit Theory”, Eight Edition Pearson Education. Reference Books: 1. Milliman Hallkias - Integrated Electronics; TMH Pub. 2. Microelectronics- Jacob Millman & Arcin Grabel, Mc-Graw Hill publication.
36 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Signals & Systems
Credit Hours
3
Course Code
CNET
221
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track COMP
INFS
5th Level
Level
CNET Prerequisite
Course Description: Introduction: Signals, systems, classification of signals, elementary signals- analog and discrete signals. Time domain representation for linear time invariant systems: Convolution, series and parallel connection of systems, causal, non-causal, impulse, step and differential equation representation for LTI systems. Fourier representation for continuous time and discrete time signals: Fourier transform, discrete time Fourier transform, their properties Fourier transform representation of periodic signals. Laplace transforms Introduction to Laplace transforms, its properties, LT of elementary signals unilateral Laplace transform Inversion of Laplace transform, using L.T. with or without initial conditions, Transfer function of system. Z – transform Introduction, Z transform of elementary signals, ROC, Properties of Z transform, Inversion of Z transform, system function, solution of difference equation, unilateral Z transform. Course Objectives: The student are introduced to Signals, systems, Convolution, Fourier transform, Laplace transforms and Z – transform
Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1. Signal and Systems- Simon Haykin & Barry van veen, John Wiley publication. 2. Signal and systems- Oppenheim & Willsky , Prentice hall publication.
Reference Books: 1. Signals and systems- I.J Nagrath, S.N Sharan, Tata Mcgraw Hill publication. 2. Signal processing and linear systems- B.P. Lathi, Oxford publication. 3. Analog and digital signal processing- Ashok Ambardar, Thomson Learning publication
37 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Electronic Circuits 2
Credit Hours
3
Course Code
CNET
214
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track CS
IS
6th Level
Level
CNET Prerequisite
CNET 112
Course Description: Multistage amplifiers. Feedback amplifiers: Feedback concept, ideal feedback amplifier, classification of feedback's, Topology, analysis and design of different types of negative feedback, General analysis of multistage feedback and multiloop feedback amplifiers. Oscillators: Principle of oscillation, RC oscillator, Wein bridge oscillator, twin T oscillator with LC feedback, Colpitt oscillator, clapp oscillator, Armstrong oscillator, Crystal controlled oscillator. Operation Amplifiers: Differential amplifiers, their types, small signal analysis, differential stage, level shifter & other blocks integrated OP-Amp, Study of Op-Amp parameters like open loop/ closed loop response, frequency response, positive and negative feedback, stability, slew rate Op-Amp using MOS, BiCMOS, JFET. Applications of OP-Amp: Comparator , adder, substractor, integrator, differentiator, instrumentation amplifier, log, antilog amplifier.
Course Objectives: The student are introduced to Multistage amplifiers, Feedback amplifiers and Operational Amplifier
Grading
Mid-term
20%
Project
Final
40%
Lab.
Quizzes
10%
Participation
10 %
20%
Text Book: 1. Electronic devices- Floyd Pearson Education publication. 2. Microelectronic Circuits and circuit theory- Rashid. PWS Publishing Company. Reference Books: 1. Electronics devices and circuit theory-Robert L. Boylestad. 2. Microelectronics-Jacob Millman & Arcin Grabel Mc-Graw Hill publication. 3. Operational Amplifiers - Ramakant Gayakwad
38 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Introduction to Communication System
Course Name
Credit Hours
3
Core
Course Code
CNET
222
Lec
Lab
Tot
2
2
4
Contact Hours
Major
Elective
Track CNET
COMP
INFS
6th Level
Level
Prerequisite
Course Description: Introduction: Elements of a communication system, Modulation and demodulation, Noise in communication systems. Amplitude Modulation: DSB full carrier AM - principles, modulator circuits, and transmitters. Different types of AM, Suppressed-Carrier AM, SSB, ISB-Principles, transmitters. Angle Modulation: Frequency modulation, Phase modulation, effect of noise, FM modulators, Transmitters. Radio Receivers: Receiver characteristics, TRF and super heterodyne receivers, AM detectors, FM detectors, receiver circuits. Radio Wave Propagation: Electromagnetic waves, Properties of radio waves, propagation of waves, Propagation terms and definitions. Analog Pulse Modulation: Sampling theorem for low-pass and band pass signals-proof with spectrum, aliasing, Sampling techniques-principle, generation, demodulation, and spectrum. PAM, PWM, PPM-generation and detection. Digital Transmission: Quantization-Quantization error, non-uniform quantizing, encoding, PCM, delta modulation, adaptive delta modulation-transmission system, bandwidth. Multiplexing: TDM, FDM-principles, hierarchy. Course Objectives: This course aims to build the basics of communication principles. Grading
Mid-term
20%
Project
Final
40%
Lab
20%
Quizzes
10%
Participation
10%
Text Book: 1. Wayne Tomasi, "Electronic Communication Systems", Pearson Education, Third Edition, 2001. 2. Kennedy and Davis,” Electronic Communication Systems", TMH. Reference Book: 1. Leon W Couch, "Digital and Analog Communication Systems", Pearson Education, Sixth Edition. 2. Taub & Schilling, "Principles of Communication Systems", Tata McGraw-Hill Second Edition.
39 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Java Programming
Credit Hours
3
Course Code
COMP
417
Lec
Lab
Tot
2
2
4
Contact Hours
Core
Major
Elective
Track CNET
COMP
INFS
6th Level
Level
Prerequisite
COMP 213
Course Description: Introduction to Java, Primitive Data Types in Java Object Oriented Programming , Arrays as a Data Structure in JAVA Strings Vectors Exceptions , Inheritance, Multithreaded Programming , Applet
Course Objectives:
Understand the object-oriented programming concepts, use of programming tools such as API, how to create and use packages, Define and use exception classes.
Grading
Mid-term
20%
Project
Final
40%
Lab
20%
Quizzes
15%
Participation
5%
Text Book: 1. C. Thomas WU, “An Introduction To Object-Oriented Programming With JAVA (Fourth Edition).” 2. Java, the complete reference, 7th editon, Herbert schildt, TMH. Reference Book: 1. A. D. Smith and P. D. Smith, “Graded Problems in Computer science “Addison-Wesley. 2. Introduction to Java programming 6th edition, Y. Daniel Liang, pearson education
40 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Microprocessor & Assembly Language
Credit Hours
3
Course Code
CNET
315
Lec
Lab
Tot
2
2
4
Contact Hours
Core
Major
Elective
Track CS
IS
CNET
7th Level
Level
Prerequisite
CNET 213
Course Description: Introduction to Microcomputer Systems: Introduction to Microprocessors & its evolution, Overview of 8086 Family, Case study of PC System Architecture of 8086/88 Family: Memory organization & Architecture of 8086 family, 8086 Hardware Design, System clock(8284) & reset signal, buffering & latching circuits, Minimum mode & Maximum mode Operation, Study of bus controller 8288 & its use in maximum mode Connection, System Timing diagrams for 8086.8086 Instruction Set & Programming: Addressing modes, Instruction Set in detail, ALP, Mixed language programming, Stacks, Strings, Procedures, Macros, Timers, Counters & delay. Programming examples using DOS And BIOS Interrupts, Device Drivers Programming.8086 Interrupt System: 8086 Interrupt structure, types and applications: Study of Programmable Interrupt Controller8259A & Interrupt Priority Management using 8259A.
Course Objectives: This course deals with the systematic study of the Architecture and programming issues of 8086/88microprocessor family. The aim of this course is to give the students basic knowledge of the above microprocessor needed to develop the systems using it. Grading
Mid-term
20%
Project
Final
40%
Lab
20%
Quizzes
10%
Participation
10%
Text Book: 1. K. Ray, K. M. Bhurchandi, “Advanced Microprocessors and Peripherals”, Tata McGraw Hill. 2. B. B. Brey, “The Intel Microprocessors”, Prentice Hall International, Sixth Edition. Reference Books: 1. Douglas Hall, “Microprocessors and Interfacing, Programming and Hardware”, Tata McGrawHill.1999, Second Edition. 2. John Uffenback, ”8086/8088 Interfacing, Programming and Design”, 1987,PHI. 3. Yu-Cheng Liu, Glenn A. Gibson, “The 8086/8088 Family Architecture, Programming and Design”, PHI. 1986, Second Edition. 41 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Data Communication
Credit Hours
Course Code
3
CNET
323
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track
CNET th
Level
7
COMP
INFS
Level
Prerequisite
Course Description: Fundamentals of data communications: Essential Elements Of Data Communications : Simplex, Half-Duplex and Full Duplex Transmission, Analogue And Digital Signals, Periodic and Non Periodic Signals , Signal Parameters, Time and Frequency Domains Concepts, Types of Channels, Transmission Impairment). Transmission Media : Guided Media, Unguided Media, and Types of Propagation. Basic concepts of networking: network concepts, network criteria, and network applications and benefits. Configurations, topologies and categories of networks : line configuration , network topologies (mesh , star , tree, bus , ring , hybrid ), scopes of networks (LAN, WAN, MAN), internetwork or internet, types of network connection( peer-to-peer network, server based network, combined network), intranet and extranet. Introduction to OSI and TCP/IP models : The OSI Model The OSI layers, TCP/IP Protocol Suite. Error detection and correction techniques: VRC, LRC, CRC, Checksum, and Hamming code techniques. Circuit and packet switching. Data link layer control: framing, error control, and flow control. Networking and internetworking devices. Net CNETtric computing: distributed computing, and mobile and wireless computing. Internetworking and routing. Student will be trained on the existing components and product related to Cisco such as wireless networking, Switches, routers, etc. in addition with the products ,components and software of Heathkit educational systems for wireless networking Course Objectives: Making the student understand the main concepts of: 1. 2. 3. 4. Grading
Establishment of Network Communication. Data communication and transmission media, mode of data transmission. Networking, types of networking, network devices and its advantages. Working of network Protocols and its techniques. 20% Mid-term Project Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1.
Behrouz A Forouzan,” Data Communications and Networking, 3 0072923547. Reference Books:
rd
Edition, , McGraw-Hill, 2003,
ISBN
th
1. William Stallings, ”Data and Computer Communication”, Pearson Education, 7 Edition, 2003, ISBN 0131006819. th 2. Andrew S. Tanenbaum, “ Computer Networks”, Prentice Hall and Pearson Education , 5 edition, 2003, ISBN 0-13-066102-3.
42 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Cryptographic Techniques
Credit Hours
3
Core
Course Code
COMP
326
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Major
Elective
Track CNET Level
COMP
7th Level
INFS Prerequisite
Course Description: Introduction to Cryptography: Basic Cryptography: Classical Cryptosystems, Public key Cryptography. Cryptographic Protocols: Foundations , Protocol Building Blocks, Basic Protocols, Intermediate Protocols , Advanced Protocols, Esoteric Protocols. Cryptographic Techniques: Key Length, Algorithm Types and Modes , Using Algorithms Cryptographic Algorithms Mathematical Background ,Data Encryption Standard, Other Block lgorithms, Still Other Block Algorithms, Combining Block Algorithms, Pseudo-Random-Sequence Generators and Stream Ciphers, Other Stream Ciphers and Real Random-Sequence Generators. One-Way Hash Functions, Public-Key Algorithms, Public-Key Digital Signature Algorithms, Identification Schemes, KeyExchange Algorithms, Special Algorithms for Protocols. Advanced Encryption Standards (AES) andRC4.
Course Objectives: Learn about the threats in computer security and the techniques to encrypt and decrypt the message. Understand what is meant by padding the message and what is significance of Digital Signature.
Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1. Bruce Schneier, “Applied Cryptography: Protocols, Algorithms and Source code in C”, John Wiley 1994. Reference Books: 1. William Stallings, "Cryptography And Network Security: Principles and practice". 2. Matt Bishop, "Computer Security : Art and Science”, Pearson Education.
43 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Network Operating System
Credit Hours
3
Course Code
CNET
332
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track CEN Level
IS
CS
8th Level
Prerequisite
COMP 231
Course Description: Operating System Objectives and Functions. Characteristics of Modern Operating Systems; Windows 2000 Overview; Traditional UNIX Systems; Modern UNIX Systems. Basic concepts. Processes; files; system calls; shell, layered structure Vs monolithic structure of O.S. Processes: Process Model; Process states; Process Description; UNIX SVR4 Process Management. Threads, SMP. Processes and Threads; Symmetric Multiprocessing; Windows 2000 Thread and SMP Management; Linux Process and Thread Management. Process Scheduling: Objectives; premptive Vs non-premptive scheduling; Multiprocessor Scheduling; RealTime Scheduling; Linux Scheduling; UNIX SVR4 Scheduling; Windows 2000 Scheduling; Software Approaches; Mutual Exclusion; Hardware Support; Semaphores; Monitors; Message Passing; Readers/Writers Problem. Concurrency. Deadlock and Starvation, An Integrated Deadlock Strategy; Dining Philosophers Problem; UNIX Concurrency Mechanisms; Windows 2000 Concurrency Mechanisms. Memory Management Requirements. UNIX and. Linux Memory Management; Windows 2000 Memory Management. I/O Management and Disk Scheduling. I/O Devices. Organization of the I/O Function; Operating System Design Issues; I/O Buffering; Disk Scheduling; RAID; Disk Cache; UNIX SVR4 I/O; Windows 2000 I/O; File Management. Overview; File Organization; File Directories; File Sharing; Record Blocking; Secondary Storage Management; UNIX File Management; Windows 2000 File System. Course Objectives: The objective of the course is to provide an understanding of UNIX Operating System in Detail. Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1. William Stallings, “Operating Systems” 2. Silbershatz, Peterson, Galvin, “Operating System Concepts”, Addison Wesley.. Reference Books: 1. Tannenbaum, “Modern Operating Systems” 2. Tannenbaum, “Operating Systems: Design and Implentation”, Prentice Hall Mc-Graw Hill Publication 44 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Course Name
Department of Computer Networks
Wireless Networks
Credit Hours
3
Core
Course Code
CNET
333
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Major
Elective
Track CNET Level
COMP
8th Level
INFS Prerequisite
CNET 222
Course Description: An overview of 2nd and 3rd generation air interfaces: CDMA IS - 95 Call Processing: Soft hand off and power control in CDMA: Introduction: Types of hand off, Pilot sets, search windows, handoff parameters, handoff messages, handoff processing setup and end of soft handoff, pilot set maintenance, Reverse and Forward link Capacity of a CDMA system, CDMA 2000 System: Introduction, layering structure, logical channels used by PLlCF, physical layer, forward link physical channels, forward link features, reverse physical channels, media access control and LAC sub-layer data services, mapping of logical channels to physical channels, evolution of COMA one to COMA 2000 systems. Wireless Local Loop: Introduction, user requirement for a WLL system, WLL systems, WLL architecture, capacity of a COMA WLL, W-COMA WLL, Air-loop WLL System. Wireless Application protocol, Bluetooth Introduction, Wireless Application protocol, goals of WAP, WAP programming model, WAP architecture, Bluetooth, Bluetooth protocol stack, Blue tooth link types, Bluetooth security, network connection establishment in Bluetooth, error connection in Bluetooth, network topology on Bluetooth, Bluetooth usage models, application of WAP and Bluetooth. Course Objectives: The objective of the course is to provide an understanding of CDMA, WLL and Bluetooth Technology
Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1. Wireless Network Evolution 2 G to 3 G - Vijay K. Garg Prentice Hall PTR publication. Reference Books: 1. Mobile and Personal Communication Systems and Services - Raj Pandya Prentice Hall Publication 2. Mobile Communications - Schiller Addison Wesly Publication.
45 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Network Security
Credit Hours
Course Code
3
Core
CNET
334
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Major
Elective
Track CNET
COMP
INFS
8th Level
Level
Prerequisite
COMP 326
Course Description: Introduction to Network security, Digital Signatures and Authentication Protocols. Authentication Applications, Electronic Mail Security. IP Security, Web Security. Intruders and Viruses: Program Security: Secure programs, Non-malicious program errors, Viruses and other malicious code, Targeted malicious code, Controls against program threats. Operating System Security: Protected objects and methods of protection, Memory address protection, Control of access to general objects, File protection mechanism, Authentication: Authentication basics, Password, Challenge-response, Biometrics Database Security: Security requirements, Reliability and integrity, Sensitive data, Interface, Multilevel database, Proposals for multilevel security. Security in Networks: Threats in networks, Network security control, Firewalls, Intrusion detection systems, Secure e-mail, Networks and cryptography, Example protocols: PEM, SSL, IPsec. Course Objectives: Learn about the threats in computer security. Understand what puts you at a risk and how to control it. Controlling a risk is not eliminating the risk but to bring it to a tolerable Level. Grading
Mid-term
25%
Project
Final
45%
Lab.
15%
Quizzes
10%
Participation
5%
Text Book: 1. William Stallings, "Cryptography And Network Security: Principles and practice". 2. C. P. Pfleeger and S. L. Pfleeger, "Security in Computing”, Pearson Education. Reference Books: 1. Matt Bishop, "Computer Security : Art and Science”, Pearson Education 2. Kaufman, Perlman, Speciner, "Network Security” 3. Eric Maiwald, "Network Security: A Beginner's Guide”, TMH
46 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Course Name
Department of Computer Networks
Network Programming
Credit Hours
Course Code
3
Core
CNET
441
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Major
Elective
Track CNET
COMP
INFS
9th Level
Level
Prerequisite
CNET 331
Course Description: UNIX Diversion: UNIX System kernel and utilities, File & Directories, Single & compound Statement. Command Library and Include Files UNIX System Administration: File System mounting & unmounting, System booting, shutting down, handling user account, backup, recovery, security, terminals, printer and modem. Different Tools & Debugger: System development tool, Lint, Make, SCCS (source code control, system), Language Development Tool – Yacc, Lex and M4, text formatting, tools troff, nroff, tbi, pie and aqn. Debuggers Dbx, Adb, Sdb, Strip and Ctrace UNIX Shell Programming: Bourne Shell, Korn Shell and C Shell- Shell Meta characteristics, shell variable and scripts, facilities and command, environment, integer arithmetic and string manipulation, decision making, aliasing, arrays and job control Portability with C:System Call and Library Function, Command line arguments, Multitasking – back ground process, Child Parent Relationship, Process Identifiers, forking processes, process synchronization, sharing of data. Course Objectives: The aim of this course is to make the student familiar with the UNIX operating system and the shell programming in UNIX. This course also gives an idea about how one can communicate with others using UNIX and change the setup of UNIX operating system
Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1. W.R. Stevens, "Unix Network Programming”, Vol. 1 , Pearson Education 2. Advanced UNIX Programmers guide by Prata, BPB Reference Books: 1. 2. 3. 4.
Kochen & Wood “Unix Shell Programming”. Fileder, Hunter, “Unix System Administration” Hahn, The internet complete reference, TMH Unix & C Programming Excel
47 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Course Name
Department of Computer Networks
Network Architecture Design
Credit Hours
Course Code
3
CNET
442
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track
CNET Level
COMP
INFS
th
9 Level
Prerequisite
CNET 331
Course Description: Introduction to Transmission Technologies: Optical Networking: Physical Layer Protocols and Access Technologies: Common Protocols and Interfaces in the LAN environment: Switching in the LAN environmentFrame Relay: FR specification and design, VoFR:,Advantages and disadvantages of FR.Common WAN Protocol: ATM: Theory of operation ISDN protocol reference model,PHY layer, A TM layer (Protocol model), AMT layer and cell (Definition), Traffic descriptors and parameters, Traffic and Congestion control defined, AAL Protocol model, Traffic contract and QoS, User plane overview, Control plane AAL, Management plane, Sub-DS3 ATM, ATM publicservices.Common Protocols and Interfaces in the Upper Layers (TCP/lP): Background (Routingprotocols), TCP/IP suite, Network layer (Internet work layer), Transport layer, Application layer,Addressing and routing design.Mature Packet Switched Protocol: ITU Recommendation X.25, User connectivity, Theory ofOperation, Network layer functions, X.75 Internetworking protocol, switched multimegabit dataservice (SMDS), SMDS and IEEE 802.6, Subscriber Interface and Access protocol, Addressingand Traffic control.Requirements Definition: User requirements, Traffic sizing, Traffic characteristics, Protocols,Time and Delay considerations, Connectivity, Availability, Reliability and Maintainability, Service aspects, Budget constraints.Traffic Engineering and Capacity planning: Background (Throughput calculations), TraffiCNETgineering basics (Traffic characteristics), Traditional Traffic engineering, Queued data andpacket switched traffic modeling, Designing for peaks, Delay or Latency, Availability andreliability, Network performance modeling, Creating the traffic matrix, Capacity planning andNetwork vision, Design tool, Categories of tools, Classes of design tool, Components of designprojects, Types of design projects. Technology Comparisons: Circuits-message-packet and cell switching methods, Packet switching service aspects, Generic packet switching network characteristics, Private verses Course Objectives: In first part, advanced technologies like High speed Devices etc. are to be considered. Second part Network programming is to be studied. Not just SOCKETS but also protocols, Drivers, Simulation Programming. In third part we should study Network Design, Protocols designs and analysis considering deterministic and non-deterministic approach. We expect natural thinking from student. For example he should able to consider different constraints and assume suitable data and solve the problems
Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1. Darren L Spohn, "Data Network Design", TMH 2. D. Bertsekas, R. Gallager, "Data Networks', PHI Reference Books: 1. W.R. Stevens, "Unix Network Programming”, Vol. 1 , Pearson Education 2. J. Walrand, P. Varaiya, "High Performance Communication Networks", Morgan.
48 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Course Name
Department of Computer Networks
Network Administration
Credit Hours
Course Code
3
CNET
443
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track
CNET
COMP
INFS
th
Level
9 Level
Prerequisite
CNET 331
Course Description:
Introduction to Network Administration. Scope, Goals, Philosophy and Standards. IT System Components and Network Structures, Technology and Protocols. System Administration: Host computer and User management. Network Administration methods and Standards. Managing devices using SNMP, RMON , WBEM and JMX. Management issues: Planning, Implementation, Fault diagnosis and Performance. Network Simulation as a management tool. Network Documentation. Network Security and Administration. Provision and Management of common network and application services, such as name, database and web servers .
Course Objectives:
This unit will develop student knowledge of the tools and techniques for Network Administration. On completion of this unit, the student should
have basic knowledge and experience in configuration and management of network infrastucture protocols used in internets (such as ARP, ICMP, BOOTP, DHCP, DNS, LDAP etc) have basic knowledge of network application protocols and data structures used for system and network management (such as ASN.1, SNMP, SMI/MIB, RMON, DMTF/DMI, WBEM and WMI) be able to install, configure and manage network application services such as name, database and web servers.
Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book:
Burgess, M.. Principles of Network and System Administration (2E), Wiley, 2004, ISBN 0470868074. Burke, J.R., Network Management Concepts and Practice: a Hands-on Approach, Pearson, 2004, ISBN 0130329509.
Reference Books:
Subramanian, M. Network Management: Principles and Practice, Addison Wesley, 2000, ISBN 0201357429. Stallings, W., SNMP, SNMPv2, SNMPv3 and RMON I and II (3E), Addison Wesley, 1998, ISBN 0201485346. Stallings, W., Data and Computer Communications (7E), Prentice Hall, 2004, ISBN 0131006819. Hunt, C., TCP/IP Network Administration (3E), OReilly, 2002, ISBN 0596002971.
49 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Routing & Switching
Credit Hours
3
Course Code
CNET
447
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track CNET
INFS
10th Level
Level
COMP Prerequisite
CNET 331
Course Description: IP Routing: Table driven routing, next hop routing, default routing, the IP routing algorithm, distance vector protocol, link state protocol, routing characteristics, convergence, split horizon, poison reverse, time to line, areas, autonomous system, border routers, routing information protocol (RIP), open shortest path first (OSPF), border gateway protocol (BGP), internet control message protocol(ICMP), ping, echo request and reply message format, congestion and datagram flow control, source quelch, route discovery.TCP/IP Security: IP security (IPSec.), authentication header (AH), encapsulating security payload (ESP),mutable header fields, tunneling, firewalls and internet access, firewall implementation, packet filtering, proxy access through firewall, network address translation (NAT), port mapped NAT. IP Version6 (IPv6): IPv6 address format and types, routing considerations, packet header fields and their functions, auto configuration, quality of service, security, mobile users. Voice and Video over Internet: Voice digitization standards for voice over IP, code excited linear predictive coders (CELP), G.729, G.723.1 and G.728 standards, telephony and internet approaches for voice over IP, digital video, MPEG-2, MPEG- 4, MPEG-6, H.323 architecture, H.323 protocol stack, gatekeeper, admission and status operations, internet multimedia protocols, RTP, Real time control protocol, RSVP, IP multicast, MBONE. Course Objectives: This course deals with the systematic study of IP routing, TCP/IP Security, Voice & Video over Internet
Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: IP Telephony - Oliver Hersent, David Gurle & Jean Pierre Petit. Edition 2001 Pearson Education Asia publication Reference Books: 1. Advanced Internet Technologies - Uyless Black Prentice Hall publication 2.Guide to TCP/IP - Laura A. Chappell, Ed. Tittel Thomson learning publication 50 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
CISCO Networking
Credit Hours
3
Course Code
CNET
448
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track CNET
INFS
10th Level
Level
COMP Prerequisite
CNET 331
Course Description: This course introduces internetworking through the study of Cisco routing and switching. Students will learn how to install, configure, operate, and optimize networks that use Ethernet, TCP/IP, Wide Area Network protocols, and Cisco network hardware. Where possible, this course follows the Cisco curriculum for becoming a Cisco Certified Network Associate
Course Objectives: Students who successfully complete this course should be able to: 1. Apply the Open Systems Interconnection (OSI) and Cisco models to computer networking. 2. Use switches to forward and filter frames while avoiding network loops. 3. Configure IP addresses for an internetwork. 4. Configure a Cisco router. 5. Configure routing between routers. 6. Explain how routers and switches are used to create Virtual Local Area Networks. 7. Manage and troubleshoot an internetwork. 8. Create access lists. 9. Explain how various protocols can be used on a Wide Area Network. 10. Recommend network solutions to both business and technical audiences. Grading 20% Mid-term Project Quizzes Final
40%
Lab.
20%
Participation
10% 10 %
Text Book: From CISCO Press Reference Books: From CISCO Press
51 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Course Name
Department of Computer Networks
Elective-1(Parallel Processing)
Credit Hours
3
Course Code
CNET
316
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Core
Major
Elective
Track CNET Level
COMP
7th Level
INFS Prerequisite
CNET 213
Course Description: Introduction: Parallel Processing Architectures: Parallelism in sequential machines, Abstract model of parallel computer, Multiprocessor architecture, Pipelining, Array processors. Programmability Issues. Data Dependency Analysis. Shared Memory Programming. Algorithms for Parallel Machines. Message Passing Programming. Parallel Programming languages like Fortran90, nCUBE C, Occam, C-Linda. Debugging Parallel Programs. Memory and I/O Subsystems. Performance of Parallel Processors, Amdahl’s law. Course Objectives: Upon completion of this course students will be able to understand and employ the fundamental concepts and mechanisms which form the basis of the design of parallel computation models and algorithms, recognize problems and limitations to parallel systems; as well as possible solutions. Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1. Hawang Kai and Briggs F.A. “Computer Architecture and Parallel Processing “, McGraw Hill 2. Jorden H. F and Alaghaband G.,”Fundamentals of Parallel Processing”. 3. M.J. Quinn, “Parellel Programming”, TMH.
Reference Books: 1. Shashikumar M., “ Introduction to parallel processing “,PHI 2. Wilson G. V., Practical parallel programming”, PHI 3. D.E. Culler, J.P. Singh, A Gupta, “Parellel computer Architecture”, Morgan Kaufman.
52 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Elective 2 (Embedded Systems)
Credit Hours
3
Core
Course Code
CNET
317
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Major
Elective
Track
CNET th
Level
7
COMP
INFS
Level
Prerequisite
CNET 315
Course Description: An overview of embedded systems: Introduction to embedded systems, Categories and requirements of embedded systems, Challenges and issues related to embedded software development, Hardware/Software co-design, Introduction to IC technology, Introduction to design technology. Embedded Software development: Concepts of concurrency, processes, threads, mutual exclusion and inter-process communication, Models and languages for embedded software, Synchronous approach to embedded system design, Scheduling paradigms, Scheduling algorithms, Introduction to RTOS, Basic design using RTOS. Embedded C Language: Real time methods, Mixing C and Assembly, Standard I/O functions, Preprocessor directives, Study of C compilers and IDE, Programming the target device. Hardware for embedded systems: Various interface standards, Various methods of interfacing, Parallel I/O interface, Blind counting synchronization and Gadfly Busy waiting, Parallel port interfacing with switches, keypads display units, Memory and high speed interfacing, Interfacing of data acquisition systems, Interfacing of controllers, Serial communication inter Implementation of above concepts using C language. Study of ATMEL RISC Processor: Architecture, Memory, Reset and interrupt, functions, Parallel I/O ports, Timers/Counters, Serial communication, Analog interfaces, Implementation of above concepts using C language. Case studies and Applications of embedded systems: Applications to: Communication, Networking, Database, Process Control, Case Studies of : Digital Camera, Network Router, RTLinux
Course Objectives: Embedded system tools and products are evolving rapidly. This course deals with various approaches to building embedded systems. It introduces unified view of hardware and software. The aim of this course is to make the students aware of the various applications of embedded systems. Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1.
Raj Kamal, "Embedded Systems”, TMH.
2.
David E. Simon, "An Embedded Software Primer II”, Pearson Education.
Reference Books: 1.
Muhammad Ali Mazidi and Janice Gillispie Mazidi, “The 8051 Microcontroller and Embedded Systems”, Pearson Education
2.
Frank Vahid, Tony Givargis, "Embedded System Design: A Unified Hardware/Software Introduction", John Wiley.
3.
Craig Hollabaugh, "Embedded Linux”, Pearson Education.
53 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Elective-3(Broadband Communications)
Credit Hours
3
Core
Course Code
CNET
324
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Major
Elective
Track CNET Level
COMP
7th Level
INFS Prerequisite
CNET 331
Course Description: Overview Of Optical Fiber Communications: Communication system applications in the electromagnetic spectrum, elements of or fiber transmission link, advantages of optical fiber communication .Light Propagation in Optical Fiber: Filter types, rays and modes, ray theory transmission, electromagnetic mode theory propagation, single mode and multimode fibers, linearly polarized models. Fiber Optics Technology: Fiber materials, fiber fabrication, fiber optic cables, couplers, splices, connectors, Signal Degradation in Optical Fibers: Alternation, dispersion, bit rate and bandwidths, mode coupling. Optical Sources and Detectors: Related semiconductor physics, light emitting diodes, laser diodes, their characteristics, modulation circuits, optical detection principles, quantum efficiency, responsively, n time photo detector noise, PIN and Avalanche photodiodes. Optical Receiver Operation: Noise, Receiver capacitance, receiver structures, pre-amplifiers, Optical Fiber Systems: link power budget, rise time budget, analog systems, digital systems, coherent systemshomodyne and heterodyne detection, multiplexing. Optical Fiber Measurements: Measurement of attenuation, dispersion, refractive index profile, numerical aperture diameter, OTDR. Course Objectives: 1. The objective of the course is to provide an understanding of Broadband Communications using optical fiber technology. Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1. Optical Fiber Communication - John Senion Prentice Hall of India Publication. 2. Optical Fiber Communication - Gred Keiser Mc- Graw Hill Publication. Reference Books: 1.Fiber Optic Communication - Djafar K. Mynbarv, Lowell L. Scheiner 2.Optical Fiber Communication - Selvarajan, Subartkar, T. Srinivas Tata Mc-Graw Hill Publication
54 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Course Name
Department of Computer Networks
Elective - 4 (Internet Communication )
Credit Hours
3
Core
Course Code
CNET
325
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Major
Elective
Track CNET Level
COMP
7th Level
INFS Prerequisite
CNET 331
Course Description: Introduction to TCP/IP: TCP/IP networking model, layer functions, TCPIIP protocols, services, sockets and ports, encapsulations, differences between ISO and internet layering. Internetworking layer: Internet protocol. (IP) datagram header fields and their functions, Internet control message protocol, IP address classes, broadcast, multicast and special addresses , network space and host space, subnets and supernets, private IP addresses, classless inter domain routing (CIDR), CIDR sub net addressing, variable length in CIDR subnet addressing. Transport layer: User datagram protocol (UDP) header fields and their functions, pseudo header, transmission control protocol (TCP), need for stream delivery, properties of reliable stream delivery, TCP header fields, ports, connections, end points, passive and active open, segment, stream and sequence numbers, variable window size and flow control, out of band data, checksum, acknowledgement and retransmission, round trip samples, Karn's algorithm, timer back off, response to delay variation and congestion, TCP state machine, connection establishment. Domain name system (DNS): Internet domain name, mapping domain name and address, domain name solution, efficient translation, caching, DNS server message format, compresed name format, abbreviation of name, inverse mapping, pointer queries. Dynamic host configuration protocol (DHCP): IP address, management with DHCP, standard address discovery process, address renewal process, address release process, DHCP packet structure. Course Objectives: This course deals with the systematic study of TCP/IP, UDP, DNS & DHCP in detail. Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1. Internetworking with TCP/IP, Vol. 1- Douglas Comer Prentice Hall publication Reference Books: 1. Advanced Internet Technologies - Uyless Black Prentice Hall of publication
55 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Elective 5 (Mobile Computing)
Credit Hours
3
Core
Course Code
CNET
426
Lec
Lab
Tot
2
2
4
Contact Hours
Major
Elective
Track CS
IS
CNET
9th Level
Level
Prerequisite
Course Description: This course presents aspects of mobile computing. It shows how mobile devices like PDA's, notebooks, and mobile phones can work with fixed network computers in building files, database and web client-server systems for achieving the goal of computing in wireless mobile environment anytime and anywhere. The technologies involved to realize such a system are covered as well as the fundamental concepts of mobile computing. This course focuses on data management in mobile computing environment, and in particular in distributed mobile file, database, web client-server, and object systems. Students in this course are assigned a project to demonstrate their ability to handle mobile computing operations. The student will use some systems like Aglete and Concord systems. Course Objectives: Making the student to study software architecture in a mobile computing environment, understand system support for dealing with disconnected operations, weak connectivity, broadcast and mobility, understand information representation, study dissemination and management, Location management, caching and replication, and study concurrency and recovery and many other important related issues.
Grading
Mid-term
40%
Project
Quizzes
10%
Final
40%
Lab
Participation
10%
Text Book: 1. Ivan Stojmenovic, “Handbook of Wireless Networks and Mobile Computing”, John Wiley, 2002, ISBN 0471419028. Reference Books: 1. Geoffrey,” Mobile Commerce and Wireless Computing Systems”, Addison-Wesley, 2003, ISBN 0201752409. 2.
Deitel H. Deitel et al,” Wireless Internet & Mobile Business”, Prentice Hall, 2001, ISBN 0-13-0622266.
56 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Elective 6 (Internet Security & Firewalls)
Course Name
Credit Hours
Course Code
3
Core
CNET
444
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Major
Elective
Track CNET
COMP
INFS
9th Level
Level
Prerequisite
CNET 334
Course Description: Internetworking and Layered Models: Networking Technology, Connecting Devices, OSI Model, TCP/IP Model, Network Layer Security: IPsec Protocol, IP Authentication Header, IP ESP. Transport Layer Security: SSLv3 and TLSv1: SSL Protocol, Cryptographic Computations, TLS Protocol, Electronic Mail Security: PGP, S/MIME. Internet Firewalls for Trusted Systems: Role of Firewalls, Firewall-Related Terminology, Bastion Host, Proxy Server ,SOCKS, Choke Point, De-militarised Zone (DMZ), Logging and Alarms, VPN, Types of Firewalls, Packet Filters, Circuit-level Gateways, Application-level Gateways, Firewall Designs , Screened Host Firewall (Single-homed Bastion Host), Screened Host Firewall (Dual-homed Bastion Host), Screened Subnet Firewall. Course Objectives: This course deals with the systematic study of Internet Security especially IPSec,SSL and TLS Protocols, Electronic Mail Security: PGP, S/MIME, and detailed study of Firewalls with its design. Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1. Man Young Rhee, "Internet Security, Cryptographic Principles, Algorithms and Protocols" John Wiley & Sons Publication, England Reference Books: 1. Kaufman, Perlman, Speciner, "Network Security” 2. Eric Maiwald, "Network Security: A Beginner's Guide”, TMH
57 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Elective-7(Mobile Ad Hoc & Sensor Networks)
Credit Hours
3
Core
Course Code
CNET
445
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Major
Elective
Track
CNET th
Level
9
COMP
INFS
Level
Prerequisite
CNET 333
Course Description: A mobile ad-hoc network is a collection of wireless nodes that cooperatively form a network without using any fixed infrastructure of centralized administration. An ad hoc network is self-organizing and communications takes place mostly through multi-hop routing. Mobility of the network nodes, limited resources (e.g., bandwidth and energy supply) and potentially a large number of mobile nodes make the routing and management of ad hoc networks extremely challenging. Target applications for mobile ad hoc networks range from collaborative, distributed mobile computing (sensors, conferences, conventions) to disaster recovery (such as fire, flood, earthquake), law enforcement (crowdcontrol, search and rescue) and tactical communications(digital battlefields). Sensor networks coupled with the notion of ubiquitous computing have emerged as a new communication paradigm that promises to revolutionize information gathering and processing in urban environments and in inhospitable terrain. Integrated sensing devices permit remote monitoring in a variety of contexts: in the field (wild-life habitat monitoring; fire detection; seismic monitoring; remote monitoring & tracking of vehicles, equipment and personnel); the office and the factory (smart tags, inventory-control, motors, small robots); and, the home (automation and smart home).
Course Objectives: At the end of this course the students will have:
A broad overview of the state of wireless and mobile ad hoc networking A thorough understanding of the current and emerging applications An overview of the physical, networking and architectural issues of mobile ad hoc networks Been introduced to the key technologies that will enable the next generation of ad hoc networks and the proliferation of ubiquitous computing Been familiarized with sensor networks and the unique set of design challenges that they introduce Grading 20% Mid-term Project Quizzes Final
40%
Lab.
20%
Participation
10% 10 %
Text Book: 1.
C.Siva Ram Murthy and B.S.Manoj, Ad Hoc Wirless Networks, Architectures and Protocols, Prentice Hall 2004,ISBN 0-13-147023 .
Reference Books: 1.
Ivan Stojmenovic (editor), Handbook of Sensor Networks - Algorithms and Architecture, Wiley 2005, ISBN: 0-47168472-4
58 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Elective 8 (Network Protocols & E-Commerce Technology)
Course Name
Credit Hours
Course Code
3
Core
CNET
446
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Major
Elective
Track
CNET th
Level
9
COMP
INFS
Level
Prerequisite
CNET 331
Course Description: TCP/IP Suite and Internet Stack Protocols, Network Layer Protocols, Internet Protocol (IP), Address Resolution Protocol (ARP), Reverse Address Resolution Protocol (RARP) , Classless Inter domain Routing (CIDR) , IP Version 6 (IPv6, or IPng) , Internet Control Message Protocol (ICMP) , Internet Group Management Protocol (IGMP) ,Transport Layer Protocols ,Transmission Control Protocol (TCP),User Datagram Protocol (UDP) ,World Wide Web ,Hypertext Transfer Protocol (HTTP) ,Hypertext Markup Language (HTML) ,Common Gateway Interface (CGI) ,File Transfer ,File Transfer Protocol (FTP) ,Trivial File Transfer Protocol (TFTP) ,Network File System (NFS) ,Electronic Mail ,Simple Mail Transfer Protocol (SMTP) ,Post Office Protocol Version 3 (POP3) ,Internet Message Access Protocol (IMAP) ,Multipurpose Internet Mail Extension (MIME) ,Network Management Service ,Simple Network Management Protocol (SNMP) ,Converting IP Addresses ,Domain Name System (DNS) ,Routing Protocols ,Routing Information Protocol (RIP) ,Open Shortest Path First (OSPF) ,Border Gateway Protocol (BGP) ,Remote System Programs ,TELNET ,Remote Login (Rlogin) SET for E-commerce Transactions : Business Requirements for SET,SET System Participants , Cryptographic Operation Principles , Dual Signature and Signature Verification , Authentication and Message Integrity , Payment Processing , Cardholder Registration , Merchant Registration , Purchase Request ,Payment Authorisation ,Payment Capture Course Objectives: This course deals with the systematic study of TCP/IP Suite and Internet Stack Protocols and SET for E-commerce Transactions Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1.
Man Young Rhee, "Internet Security, Cryptographic Principles, Algorithms and Protocols" John Wiley & Sons Publication, England
Reference Books: 1.
Whitman, Mattord, "Principles of information security", Thomson
59 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Elective (Digital Communication)
Course Name
Credit Hours
Course Code
3
Core
CNET
327
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Major
Elective
Track
CNET Level
COMP
INFS
Level 7
Prerequisite
CNET 222
Course Description:
Baseband Modulation and Demodulation: Pulse Code Modulation, PCM Waveform Types, PCM Word Size, M-ary Pulse-Modulation Waveform, Correlative Coding; A Base Band Signal Receiver, Detection of binary signals in Gaussian Noise, Inter Symbol Interference, Equalization. Bandpass Modulation and Demodulation: Binary Phase-Shift Keying, Differential Phase Shift Keying, Differentially Encoded PSK, QPSK, Mary PSK, Quadrature Amplitude Shift Keying(QASK), Binary Frequency Shift Keying, M-ary, FSK, Minimum Shift keying (MSK). Error performance for Binary systems, Probability of Error for coherently detected BPSK, Probability of Error for coherently detected Differentially Encoded BPSK, Probability of Error for coherently detected Binary Orthogonal FSK, Probability of Error for non-coherently detected Binary Orthogonal FSK, Probability of Error for Binary Orthogonal DPSK. Symbol Error Performance for M-ary systems, Probability of Symbol Error for MPSK, Probability of Symbol Error for MFSK, Bit Error Probability Vs. Symbol Error Probability, Effects of Inter Symbol Interference. Course Objectives: Digital communication systems are becoming increasingly attractive because of the ever growing demand for data communication and because digital transmission offers data processing options and flexibilities not available with analog communication. Grading 20% 10% Mid-term Project Quizzes Final
40%
Lab.
20%
Participation
10 %
Text Book: 1. Taub and schilling, “Principles of Communication Systems”, TMH, 1991, 2nd Edition. 2. Sklar, “Digital Communications”, Pearson Education, 2001, 2nd Edition. Reference Books: 1. Prokies, “Digital Communications”, TMH. 2. Haykins, “Digital Communications”, John Weily.
60 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Elective (Digital Switching System)
Course Code
Credit Hours
3
Contact Hours
Core
Major
CNET
328
Lec.
Lab.
Tot.
2
2
4
Elective
Track
CNET Level
COMP
INFS
Level 7
Prerequisite
Course Description:
Digital Switching Systems (DSS) fundamentals: Introduction, digital switching system, hierarchy and evolution of switching systems. Major digital switching systems (Lucent 5ESS switching system, Nortel’s DMS 100, Ericsson’s AXE 10, etc.,) Communications and control: Introduction, switching communication and control, functions of interface controller, network control processor, central processor, control architectures, switches fabric. Reliability modeling and analysis: Introduction, downtimes in DSS, reliability assessment techniques, failure models, state transition diagrams for central processor community, clock sub-system, network controller sub-system, switching network. Switching System Software (SSS) and quality analysis: Basic software architecture, call models, call features, life cycle of SSS software development, methodology of accessing quality of SSS to CMM and ISO models. Analysis of DSS: Models for performance analysis of integrated packet networks, deterministic models, worst-case analysis, stochastic models. Models for traffic flow in packet networks. Current trends in DSS. Course Objectives:
This Course aims students to understand Digital Switching Systems (DSS), Communications and control, Reliability modeling and analysis, Switching System Software (SSS) and quality analysis. Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: Digital Switching Systems, Syed R Ali, 4th reprint, Tata Mc Graw-Hill Reference Books: 1. Ross K W, “Multi Service Loss models for broad band telecommunication networks” ,Springer-Verlag. 2. Hui J Y, “Switching and traffic theory for integrated broad band networks”, Kluwer Press.
61 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Elective (Network Management)
Course Code
Credit Hours
3
Contact Hours
Core
Major
CNET
435
Lec.
Lab.
Tot.
2
2
4
Elective
Track
CNET Level
COMP
INFS
Level 9
Prerequisite
CNET 331
Course Description: Installing network hardware, Installing and managing WFWG network, Installing and managing Windows NT network, Installing and managing Novell network, Comparing NT and Novell networks , Installing and managing UNIX network, Diagnosing problems with a computer network, LAN terminology and concepts, LAN maintenance, Evaluating Computer Networks
Course Objectives:
The students will learn the commands and setup used by the Novell NetWare network operating system which will also provide some basis for adapting to other systems. Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1. Introduction to NETWORKING 3rd Edition by Barry Nance
Reference Books: Outside reading from popular computing and networking periodicals like PC- Week, PC-Magazine, LAN, etc. Readings from documents found on the Internet
62 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Course Name
Elective (Multimedia Networks)
Course Code
Credit Hours
3
Contact Hours
Core
Major
CNET
436
Lec.
Lab.
Tot.
2
2
4
Elective
Track
CNET Level
COMP
INFS
Level 9
Prerequisite
CNET 331
Course Description: The following is the projected course syllabus. Multimedia communications – an overview; Multimedia information representation – text, images, audio, video; Introduction to Information Theory – information of a source, average information of a discrete memory less source, source coding for memory less sources; Multimedia compression – text, image, audio, video; Standards for multimedia communications; Transmissions and protocols; Circuit switched networks; the Internet; broadband ATM networks; Packet video in the Network environment; Transport protocols – TCP/IP; TCP; UDP; RTP and RTCP; Wireless networks – models, characteristics; Error resilience for wireless networks. Course Objectives:
The objective of this course is to introduce current techniques in multimedia communications. The course will introduce the basic issues in multimedia communications and networking and is designed to give the student hands-on experience in various aspects of multimedia communications through the various assignments and projects. Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book: 1. Multimedia Communications Applications, Networks, Protocols and Standards Fred Halsall, Addison Wesley, 2001, ISBN: 0-201-39818-4 Reference Books: 1. Packet Video Communications over ATM Networks K.R. Rao and Z.S. Bojkovic, Prentice Hall, ISBN: 0-13011518-5 2. Wireless Video Communications Second to Third Generation Systems and Beyond Lajos Hanzo, Peter J. Cherriman and Jurgen Streit, IEEE Series on Digital and Mobile Communications, John B. Anderson, Series Editor, ISBN: 0-7803-6032-X, IEEE order number PC5880. 3. Emerging Multimedia Computer Communication Technologies, Chwan-Hwa Wu and J.D. Irwin, Prentice Hall, ISBN: 0-13-079967-X
63 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA
Course Descriptions
Department of Computer Networks
Elective (Telecom Networking)
Course Name
Credit Hours
Course Code
3
Core
CNET
437
Lec.
Lab.
Tot.
2
2
4
Contact Hours
Major
Elective
Track
CNET Level
COMP
INFS
Level 9
Prerequisite
CNET 331
Course Description:
Course Objectives:
Grading
Mid-term
20%
Project
Final
40%
Lab.
20%
Quizzes
10%
Participation
10 %
Text Book:
Reference Books:
64 Faculty of Computer Science and Information Systems, Jazan University, Jazan, KSA