Syllabus for NET-563

Pervasive and Cloud Computing


COURSE DESCRIPTION

The goal of pervasive computing, which combines network technologies with wireless computing, voice recognition, Internet capability, and artificial intelligence, is to create an environment where the connectivity of devices is embedded in such a way that it is unobtrusive and always active. Pervasive computing goes beyond the realm of personal computers or the Internet. At its core is the notion that almost any device, be it clothing or tools or appliances or your body or your toothbrush, can be embedded with chips that connect the device to a vast network of other devices. Cloud computing, on the other hand, focuses on the use of shared resources to achieve computational coherence and economies of scale. Similar to utility computing and edge computing, cloud computing has at its core the management of a converged infrastructure and shared services. In this course, students will explore the various computing models, operational frameworks, and technologies that are used to implement pervasive and cloud systems. Topics will include: personal area networks (PAN), distributed computing, grid computing, utility computing, virtualization, cloud characteristics, cloud service models, cloud deployment models (public, private, hybrid, federated, reservoir), architectures, cloud security, and fog computing (federated cloud).

COURSE TOPICS

COURSE OBJECTIVES

After completing this course, you should be able to:

CO1        Contrast distributed computing paradigms.

CO2        Support virtualization of servers.

CO3        Weigh the risks and benefits of cloud computing.

CO4        Compare and contrast cloud service models.

CO5        Compare and contrast cloud deployment models.

CO6        Assess personal area networking technologies.

CO7        Evaluate edge computing benefits.

CO8        Assess advanced cloud architectures.

CO9        Propose cloud security measures.  

COURSE MATERIALS

You will need the following materials to do the work of the course. The required textbook is available from the University’s textbook supplier, MBS Direct.

Required Textbook

ISBN-13: 978-0133387520

COURSE STRUCTURE

Pervasive and Cloud Computing is a three-credit, online course consisting of six modules, a midterm assignment, and a final project. Modules include an overview, topics, learning objectives, study materials, and activities. Module titles are listed below.

ASSESSMENT METHODS

For your formal work in the course, you are required to participate in online discussion forums, complete written assignments, and submit a midterm assignment and a final project. See below for details.

Consult the Course Calendar for due dates.

Discussion Forums

You are required to complete six discussion forums. The discussion forums are designed to encourage you to discuss the module topics with your classmates. In order to successfully complete the discussion forums, you need to address all items included in the forum, reply to peers thoughtfully, add value to the discussion, and apply ideas, insights, or concepts from scholarly sources, assigned readings, lectures, course materials, or other relevant sources. Replies such as “Good post” or “I agree” will not count toward your grade; your post should add value to the class. A grading rubric for discussion forums can be found in the Evaluation Rubrics folder.

Written Assignments

You are required to complete six written assignments. The written assignments are on a variety of topics associated with the course modules. A grading rubric for each of the written assignments can be found in the Evaluation Rubrics folder.

Midterm Assignment

You are required to complete a midterm assignment in which you will review concepts from the first half of the course and further strengthen your knowledge through additional practice and research. See the Midterm Assignment area in Moodle for additional details. A grading rubric for the midterm assignment can be found within the Evaluation Rubrics folder. Consult the Course Calendar for the due date.

Final Project

You are required to complete a final project for which you will develop a plan for a full integrated fog and cloud-based IT implementation for an unspecified large metropolitan area in the United States. See the Final Project area in Moodle for additional details. A grading rubric for the final project can be found in the Evaluation Rubrics folder. Consult the Course Calendar for the due date.

GRADING AND EVALUATION

Your grade in the course will be determined as follows:

All activities will receive a numerical grade of 0–100. You will receive a score of 0 for any work not submitted. Your final grade in the course will be a letter grade. Letter grade equivalents for numerical grades are as follows:

A

=

93–100

B

=

83–87

A–

=

90–92

C

=

73–82

B+

=

88–89

F

=

Below 73

To receive credit for the course, you must earn a letter grade of C or higher on the weighted average of all assigned course work (e.g., assignments, discussion postings, projects). Graduate students must maintain a B average overall to remain in good academic standing.

STRATEGIES FOR SUCCESS

First Steps to Success

To succeed in this course, take the following first steps:

Study Tips

Consider the following study tips for success:

ACADEMIC INTEGRITY

Thomas Edison State University is committed to maintaining academic quality, excellence, and honesty. The University expects all members of its community to share the commitment to academic integrity, an essential component of a quality academic experience.

Students at Thomas Edison State University are expected to exhibit the highest level of academic citizenship. In particular, students are expected to read and follow all policies, procedures, and program information guidelines contained in publications; pursue their learning goals with honesty and integrity; demonstrate that they are progressing satisfactorily and in a timely fashion by meeting course deadlines and following outlined procedures; observe a code of mutual respect in dealing with mentors, staff, and other students; behave in a manner consistent with the standards and codes of the profession in which they are practicing; keep official records updated regarding changes in name, address, telephone number, or e-mail address; and meet financial obligations in a timely manner. Students not practicing good academic citizenship may be subject to disciplinary action including suspension, dismissal, or financial holds on records.

All members of the University community are responsible for reviewing the Academic Code of Conduct Policy in the University Catalog and online at www.tesu.edu.

Academic Dishonesty

Thomas Edison State University expects all of its students to approach their education with academic integrity—the pursuit of scholarly activity free from fraud and deception. All mentors and administrative staff members at the University insist on strict standards of academic honesty in all courses. Academic dishonesty undermines this objective. Academic dishonesty can take the following forms:

Plagiarism

Thomas Edison State University is committed to helping students understand the seriousness of plagiarism, which is defined as using the work and ideas of others without proper citation. The University takes a strong stance against plagiarism, and students found to be plagiarizing are subject to discipline under the academic code of conduct policy.

If you copy phrases, sentences, paragraphs, or whole documents word-for-word—or if you paraphrase by changing a word here and there—without identifying the author, or without identifying it as a direct quote, then you are plagiarizing. Please keep in mind that this type of identification applies to Internet sources as well as to print-based sources. Copying and pasting from the Internet, without using quotation marks and without acknowledging sources, constitutes plagiarism. (For information about how to cite Internet sources, see Online Student Handbook > Academic Standards > Citing Sources.)

Accidentally copying the words and ideas of another writer does not excuse the charge of plagiarism. It is easy to jot down notes and ideas from many sources and then write your own paper without knowing which words are your own and which are someone else’s. It is more difficult to keep track of each and every source. However, the conscientious writer who wishes to avoid plagiarizing never fails to keep careful track of sources.

Always be aware that if you write without acknowledging the sources of your ideas, you run the risk of being charged with plagiarism.

Clearly, plagiarism, no matter the degree of intent to deceive, defeats the purpose of education. If you plagiarize deliberately, you are not educating yourself, and you are wasting your time on courses meant to improve your skills. If you plagiarize through carelessness, you are deceiving yourself.

For examples of unintentional plagiarism, advice on when to quote and when to paraphrase, and information about writing assistance and originality report checking, click the links provided below.

Examples of Unintentional Plagiarism

When to Quote and When to Paraphrase

Writing Assistance at Smarthinking

Originality Report Checking at Turnitin

Disciplinary Process for Plagiarism

Acts of both intentional and unintentional plagiarism violate the Academic Code of Conduct.

If an incident of plagiarism is an isolated minor oversight or an obvious result of ignorance of proper citation requirements, the mentor may handle the matter as a learning exercise. Appropriate consequences may include the completion of tutorials, assignment rewrites, or any other reasonable learning tool in addition to a lower grade for the assignment or course. The mentor will notify the student and appropriate dean of the consequence by e-mail.

If the plagiarism appears intentional and/or is more than an isolated incident, the mentor will refer the matter to the appropriate dean, who will gather information about the violation(s) from the mentor and student, as necessary. The dean will review the matter and notify the student in writing of the specifics of the charge and the sanction to be imposed.

Possible sanctions include:

Copyright © 2018 by Thomas Edison State University. All rights reserved.