210 likes | 213 Views
Explore how Pennsylvania State University incorporates ICT standards into its Information Sciences and Technology and Security and Risk Analysis programs. Discover the impact of these standards on the curriculum and the importance of standardization in telecommunications education.
E N D
Telecommunications Standards Education Michael R. Bartolacci Associate Professor of Information Sciences and Technology Pennsylvania State University - Berks
Pennsylvania State University (Penn State) • Largest university in the state of Pennsylvania which has a population of 12 million people • State affiliated, but not part of the “State University System” – majority of its working revenue (95%) is derived from sources other than the state’s financial subsidies (it is a nonprofit institution) • 23 campuses and approximately 93,000 students • Main campus is in the geographic center of the state with about 46,000 students • Contains a law school and a medical school as well
Pennsylvania State University (Penn State) • Has a 8.5 billion dollar direct and indirect economic impact on the state of Pennsylvania • 2010 Wall Street Journal research showed that Penn State University students were the most heavily recruited by U.S. employers out of all universities in the U.S. • Has five main academic colleges that play a role in the teaching of standards for ICT • “Engineering”, “Business”, “Communications”, “Law”, and “Information Sciences and Technology”
Different Focus For Each • Engineering – contains the departments of “Electrical Engineering” and “Computer Science and Engineering” • Business – contains the “Management Information Systems” and “Supply Chain and Information Systems” programs • Law – courses and faculty expertise cover areas such as telecommunications regulation, patents, and other legal aspects of ICT • Communications – contains the “Telecommunications” program which deals more with mass media aspects of telecommunications • Information Sciences and Technology – contains the “Information Sciences and Technology” and “Security and Risk Analysis” programs
College of Information Sciences and Technology • Two Degree Programs • Information Sciences and Technology or IST • Concentration on the implementation of ICT to solve problems • Concentration on systems development (with much more of a technology focus than computer science) • Concentration on the impact of technology on people and society • Security and Risk Analysis or SRA • Concentration on information cyber security • Concentration on intelligence analysis and monitoring • Concentration on social factors and risk
IST and SRA Have ICT Standards Embedded in Their Curriculum • I personally have taught 38 different courses in my 14 years at Penn State and can speak to the fact that ICT standards, the standards process, and organizations involved in the process are discussed throughout the curriculum for both IST and SRA (and, to my knowledge, also the few College of Business and College of Communications courses that I have taught in the past), but only in passing and there is no focus on any of these per se • You can probably already see the main point of this talk, that large universities in the U.S. spread out ICT over many programs and that standardization is not given a full treatment in any of them (students miss the big picture) • Foundation courses common to both programs are IST 110 (Introduction to Information, People and Technology ), IST 210 (Organization of Data), and IST 220 (Networking and Telecommunications)
Grant From National Science Foundation • We (Dr. Abdullah Konakand other faculty in IST/SRA at my campus) received a grant of about $160,000 for creating virtual computing networks for teaching Networking and Information Security technologies • Allow access to the virtual networks for other PSU campuses and for community colleges • Past grants have allowed for the summer camps in Networking and Information Security for middle school and high school students and the creation of online training modules in these topics
Penn State’s Information Sciences and Technology (IST) and Information Security and Risk Analysis Programs (SRA) • Both programs require an introductory telecommunications and networking course (IST 220) which provides the foundations for all future networking and cyber security classes
IST 220 - Networking and Telecommunications • First semester sophomore year course for both IST and SRA majors • I have taught this course more than 25 times and it has evolved over the years • Most recent course redesign was completed May 2013 • Elimination of all discussion of analog voice telecommunications and related standards, history of voice telecommunications, and almost all older technologies • Focus mainly on wide area networking technologies and standards • Lesser focus on local area networking technologies and standards
Learning Goals for IST 220 • Remember that this is a course required for IST and SRA majors with a focus on the technology and its implementation and less on the theory behind it • Discussion of standards is undertaken in the context of their role in the choice of technology to solve a problem • Telecommunication and networking standards are covered through IST 220, but in less subtle ways and not as a specific section of the course • The following are the actual Learning Goals created for the course as part of the recent redesign (committee on which I was a member)
1. Explain the components of computer networks and their relationships to each other • a) Illustrate current network applications (Web, Social Networking, Peer-to-Peer, Mobile Apps, and Cloud Computing) • b) Describe how applications may use the network differently • c) Identify the common network topologies (e.g., bus, ring and star) and scope (e.g., PAN, LAN, WAN, MAN) • d) Compare and contrast the uses of hubs, switches and routers e)Identify the opportunity and need for network security • f) Examine the OSI and Internet reference models and identify roles that individual protocols and equipment play in a network implementation • g) Explain the concept of encapsulation as it applies to the network stack and protocols • h) Examine wireless networking technologies, including 802.11
2. Explain the impact of Application Layer Protocols on the user and the network • a) Describe the application layer protocols and their role in the protocol stack • b) Describe the utility of network support protocols (e.g., DHCP and DNS) • c) Compare and contrast network traffic based on email (SMTP, POP, IMAP), web (HTTP), file transfer (FTP) and network administration (SNMP) protocols
3. Describe the how different Transport Layer protocols package data for transmission across the network • a) Compare and contrast the differences between TCP, UDP and ICMP • b) Explain how error correcting and sequencing codes work • c) Explain principles of congestion and flow control • d) Describe the relationship between sequence numbers, fragmentation and fairness in TCP/IP • e) Describe the how data is sent across a network
4. Discuss how network layer protocols and routers move packets across the network • a) Demonstrate understanding of network layer protocols • b) Explain the interaction between the transport layer and network layer protocols • c) Demonstrate high-level understanding of the interaction between the network and link layers • d) Distinguish between process names, port numbers, IP addresses, and network interfaces • e) Identify need for IPv6 and describe differences between IPv4 and IPv6 • f) Differentiate between virtual circuits and datagram networks • g) Compare and contrast link-state and distance-vector routing algorithms • h) Describe IPSec and how it provides network security • i) Calculate basic subnet properties (subnet address, broadcast address, subnet size) in IPv4 under CIDR and IPv6 • j) Illustrate mobile networking within the same subnet • k) Demonstrate capability to connect networking devices together • l) Demonstrate capability to connect internetworking devices
5. Explain the Link Layer and the Physical Layer • a) Describe link-layer addressing and the Address Resolution Protocol (ARP) • b) Describe the common uses of physical and wireless media (coax, twisted pair, fiber, RF, microwave, etc) • c) Express characteristics of multiple transmission technologies • d) Define key characteristics of Ethernet protocols • e) Describe CSMA/CD, ALOHA, and Slotted ALOHA protocols f) Define CDMA in mobile networks • g) Compare and contrast the physical layer of an 802.11 wireless LAN to Ethernet (CSMA/CA plus CTS/RTS to CSMA/CD) • h) Define the process of modulation and demodulation and the components of that process through one or more network technologies • i) Describe the operation of ARP
6. Design of Local and Wide Area Networks • a) Illustrate the design and analysis of Local Area Networks • b) Discuss and compare the designs of traditional enterprise and residential networks • c) Practice common tasks conducted while administering LANs • d) Capture end-user requirements for network use; select matching network design components and features • e) Describe how DHCP operates
As You Can See … • Limited time devoted to any discussion of standards organizations or the standards process per se; discussed more in passing with the introduction of the reference models and specific standards such as 802.11 • Even the higher level SRA cyber security courses do not include in-depth discussions of these per se; the discussions are focused more on the advantages and disadvantages of various standards in terms of information security (such as WEP versus WPA versus WPA2)
Also … • In any given semester, approximately 40 different instructors teach IST 220 across 21 campuses with varying network laboratories and equipment • Experience and expertise of these instructors range from only a bachelor’s degree with several years of networking experience in industry to Ph.D.’s with no industry networking experience • Although the curriculum is supposed to be standardized, each instructor ultimately varies it somewhat based on the above factors; this results in students getting a mixed bag of standards-related education across both degree programs
MIS and Telecommunications Courses in Other Colleges at Penn State • I have taught several sections of an MIS course for the business degree program (Bachelor of Science in Business) and a telecommunications technology course for the Telecommunications program of the College of Communications • Neither course included any specific module specifically on standards or the standards process • The Telecommunications program course did devote a significant amount discussion to the impact of changing standards and technologies on mass media
Main Points • A very large U.S. university such as Penn State includes ICT in many degree programs and courses • One can surmise that most of these programs and courses do not specifically address ICT standards and the standards process as a course or even a specific module in a course • Voice communications and its standards are becoming less important in the curriculum for most of the courses related to ICT • Even if standards and the standards process were emphasized in the curriculum, it is difficult to implement and enforce implementation across a geographically dispersed set of campus locations and faculty
Questions ? • Michael R. Bartolacci • Associate Professor of IST • Penn State University – Berks • mrb24@psu.edu