| |
Abstract/Syllabus:
|
Dellarocas, Chrysanthos, 15.564 Information Technology I, Spring 2003. (Massachusetts Institute of Technology: MIT OpenCourseWare), http://ocw.mit.edu (Accessed 10 Jul, 2010). License: Creative Commons BY-NC-SA
Diagram of the Peer-to-Peer (P2P) web model. (Diagram by Prof. Chrysanthos Dellarocas.)
Course Highlights
The detailed lecture notes explain a wide range of information technology concepts. Students build a database, online survey, and gain exposure to a range of software tools in the assignments.
Course Description
Information Technology I helps students understand technical concepts underlying current and future developments in information technology. There will be a special emphasis on networks and distributed computing. Students will also gain some hands-on exposure to powerful, high-level tools for making computers do amazing things, without the need for conventional programming languages. Since 15.564 is an introductory course, no knowledge of how computers work or are programmed is assumed.
*Some translations represent previous versions of courses.
Syllabus
Course Description
Information Technology I helps students understand technical concepts underlying current and future developments in information technology. There will be a special emphasis on networks and distributed computing. Students will also gain some hands-on exposure to powerful, high-level tools for making computers do amazing things, without the need for conventional programming languages.
Teaching Staff
Instructor: Prof. Chris Dellarocas
Audience and Prerequisites
15.564 is an introductory course. It is assumed that students know how to use Macintosh or IBM PC word processors and spreadsheets. No knowledge of how computers work or are programmed is assumed. Students who have recently completed courses in computer architecture, operating systems, and telecommunications probably should not take this course, because most of the course consists of highlights of those topics. Student backgrounds vary considerably, however. Students with some background in electrical engineering or programming will breeze through certain topics, though it is hoped that the discussion of current eBusiness application classes as well as the term project (see the assignments page) will benefit them as well. Those with no background will have to work harder, but mastery of this material is within reach of every MIT student regardless of background. Talk to the instructor if you're not sure whether your background is appropriate.
Logistics
Lectures: Twice per week for 1.5 hours each.
Recitation: Once per week for 1 hour. The purpose of recitation is to:
a) review material covered in class during the week;
b) provide additional examples and exercises that aid understanding;
c) cover additional topics related to the material of the week.
Due to the intense pace of this course, we strongly recommend that you try to attend as many recitations as possible!
Other than office hours, the Professor may be contacted by appointment. Email is strongly encouraged!
Readings, Lecture Notes and Textbooks
One of the unusual aspects of this course is the diversity of student objectives, backgrounds and previous exposure to the subject matter. To accommodate this diversity we propose that each student select his or her individualized sets of supplementary study materials from the list below. We will describe the recommended study materials and the strategy for choosing between them in the first session of the course. Please feel free to send us email if you have questions related to the best study materials for you.
Required materials
Lecture notes are preprints of Microsoft PowerPoint slides used by the instructor during lectures. They are fairly detailed and comprehensive (typically between 20-30 slides per lecture). In the past, most students found that the slides were the primary resource they used for reviewing the class material. Suggested study strategy: skim the lecture notes before class, then read carefully after class. We will be distributing lecture notes in class at the beginning of each lecture.
Photocopied readings contain textbook chapters and magazine articles whose main purpose is to supplement the lecture notes and serve as a reference for the topics covered in class. Since this is a new course, we will be distributing readings in class as we go.
Recommended materials
There are two recommended textbooks:
-
PriceWaterhouseCooper's Technology Forecast: 2002-2004, Vol. 1: In addition to a concise technical introduction to the various topics covered, it provides excellent surveys of the marketplace, including pointers to leading vendors and products, as well as assessments of trends and directions. Our recommendation: Students with no previous exposure in IT might find this a bit heavy. On the other hand, students who have had some previous IT exposure and especially graduate students who are interested in connecting the technological principles we will learn in the lectures with the marketplace will find this an excellent reference.
-
White, Ron et. al., How Computers Work, 6th ed., Que, 2001. Good introductory text on the internals of computer hardware and system software. Recommended if you don't have a background in science or engineering. Science and engineering majors might find this book too elementary. You may purchase this book from an online bookstore.
-
The PC Webopedia is a Web site that serves as an encyclopedia of Information Technology terms. It provides excellent explanations of Information Technology terms, together with links to additional web pages related to them. For each lecture, the course Web page contains pointers to the relevant category of the PC Webopedia. We strongly encourage you to use this valuable resource to clarify unanswered questions and to go beyond the material covered in class, according to your own personal interests.
Finally, for students who would like to learn Microsoft Access in depth, the following is a recommended textbook (you may choose either):
-
Viescas, John L., Running Microsoft Access 2000, Microsoft Press, 1999. One of the best and most detailed "bibles" on Microsoft Access. Coverage is way beyond what will be covered in this course. This is an excellent reference book for students who are interested in becoming Microsoft Access experts. If you are looking for something more concise, you may consider the Byrne textbook.
Assignments, Exams, and Grading
The course assignments consist of 5 problem sets, two in-class exams and a term project. Grades will be determined on the following basis:
Problem Sets |
35% |
Midterm Exam |
20% |
Final Exam |
20% |
Term Project |
20% |
Class Contribution |
5% |
|
Assignments are due in class during the due dates. In special circumstances (e.g., illness, religious holidays) we'll try to be accommodating, if you make arrangements with us in advance. Late assignments will be penalized by 10% per 24 hours if you have not made arrangements in advance, and will not be accepted at all 48 hours after the time due.
There are several ways to earn "Class Contribution" points. First and foremost is to come prepared for class, ask questions that other students want to know the answer to, and give clear, brief answers to questions I ask. Second is to locate magazine or newspaper articles that are relevant to the class and to bring a photocopy to me for distribution to the entire class. Third is to do follow-up research in order to answer an interesting question that comes up in class. In short, if you help other students learn, you get class contribution points.
Class Web Page
The 15.564 Web page will contain a wealth of information related to the course, such as the course syllabus, downloadable copies of the lecture notes, problem sets and various course-related announcements. For some sessions, it also provides links to additional (optional) reading material found on the Web. Our web page will be updated frequently during the term. You are required to join the class server and encouraged to visit it often!
Computer Facilities
This is a course about Information Technology and several assignments require use of a PC. Students can use either their own PC or the facilities of the School Computer Center. If you do not have a lab account, we will provide one after the first week of classes. You are responsible for getting your own email account.
Collaboration Policy
You are encouraged to discuss material from the class with other students, including material related to problem sets. You must, however, write solutions independently. The time to stop collaborating is when you start writing. In addition, you must write on your problem sets and machine problems the name of anyone with whom you collaborated.
Do: discuss general concepts and techniques for performing the hands-on assignments; compare and discuss answers after you get the problem sets back.
Don't: copy or compare answers before you turn them in; debug each others' programs; sit together while you are writing up your solutions.
Consequences: If you copy or allow copying in violation of these rules, both parties get 0 on the entire assignment. If you do it again, you go to a discipline committee.
Finally, it is strictly forbidden to consult and/or copy your answers from solution sets of past terms. Students who violate this rule will be asked to drop the class.
If you're stuck on a particular problem and need help that would violate the collaboration policy, contact the TAs or the instructor. We'll help.
Calendar
The Basics: Hardware, OS, and Software |
1 |
Introduction: Course Overview; Inside the CPU |
2 |
Computer Architecture: Processing, Memory and I/O |
3 |
Computer Representations; Compression |
4 |
Operating Systems |
5 |
Software Development |
Databases |
6 |
Relational Databases; Database Queries using SQL |
7 |
An Introduction to Microsoft Access |
8 |
Relational Database Design |
9 |
Introduction to User Interface Building with Access Examples |
Networks and Telecommunications |
10 |
Telecommunication Concepts; Data Transmission |
11 |
Local Area Networks; Ethernet; Packet-switched Networks |
12 |
Midterm Exam - In Class |
13 |
Wide Area Networks; The Internet |
14 |
Wireless Network Technologies |
Distributed Computing and Web Technologies |
15 |
Client/Server, Peer-to-Peer and the WWW |
16 |
Security I: Public Key Cryptography |
17 |
Security II: Digital Signatures; Network Security |
18 |
Evolution of Web Technologies |
eBusiness Applications |
19 |
Under the Hood of a Commercial Web Site |
20 |
Data Mining, Data Warehousing |
21 |
Software Agents |
22 |
Student Presentations I |
23 |
Student Presentations II |
24 |
Trends in eBusiness Technology; Course Wrap-up |
25 |
Final Exam - In Class |
|
|
|
|
Further Reading:
|
The following readings are required unless otherwise noted. The PC Webopedia links are optional, but highly recommended.
The Basics: Hardware, OS, and Software |
1 |
Introduction: Course Overview; Inside the CPU |
Madnick, Stuart. Little Man Computer. |
2 |
Computer Architecture: Processing, Memory and I/O |
Optional: How Computers Work. Parts 1-5.
PC Webopedia - Hardware Category Page
PC Webopedia - PC Definition and Links |
3 |
Computer Representations; Compression |
Optional: Blelloch, Guy E. Introduction to Data Compression. Carnegie Mellon University, 2001. Available online at Carnegie Mellon University's School of Computer Science.
PC Webopedia - Data Formats Category Page
Terms to look up: binary, floating-point numbers, character set, ASCII, HTML, bitmap, Postscript, PDF, data compression, MPEG |
4 |
Operating Systems |
Optional: Introduction to Operating Systems. Part of: Mohr, James. The Linux Tutorial, 2003.
PC Webopedia - Operating Systems Category Page
Terms to look up: operating systems, multitasking, virtual memory, file management system, file allocation table, Windows, Linux |
5 |
Software Development |
Gibbs, W. W. Software's Chronic Crisis. In Scientific American. September 1994, pp. 86-95.
PC Webopedia - Programming Languages Category Page
Terms to look up: programming language, compiler, interpreter, Java |
Databases |
6 |
Relational Databases; Database Queries Using SQL |
Elmasri, and Navathe. Fundamentals of Database Systems. Benjamin/Cummings, 1989, Chapter 7 (plus pp. 143-144).
PC Webopedia - Databases Category Page |
7 |
An Introduction to Microsoft Access |
Recommended Textbook: Viescas, John L. Running Microsoft Access 2000. Microsoft Press, 1999. |
8 |
Relational Database Design |
Watterson, Karen. Visual Basic Database Programming. Addison-Wesley, 1994, pp. 12-43. |
9 |
Introduction to User Interface Building with Access Examples |
Recommended Textbook: Viescas, John L. Running Microsoft Access 2000. Microsoft Press, 1999. |
Networks and Telecommunications |
10 |
Telecommunication Concepts; Data Transmission |
Fitzgerald, and Dennis. Business Data Communications and Networking. 6th ed. Wiley, 1999, pp. 83-92, 107-129.
Optional: Dodd, Annabel Z. Basic Telecom Concepts. Chapter 1 in The Essential Guide to Telecommunications. Prentice Hall, 1999.
PC Webopedia - Networks Category Page |
11 |
Local Area Networks; Ethernet; Packet-switched Networks |
Fitzgerald, and Dennis. Business Data Communications and Networking. 6th ed. Wiley, 1999, pp. 192-216. |
12 |
Midterm Exam - In Class |
|
13 |
Wide Area Networks; The Internet |
Fitzgerald, and Dennis. Business Data Communications and Networking. 6th ed. Wiley, 1999, pp. 30-33, 164-189.
Optional: An introductory (but fun!) tutorial on how the Internet works is available: Tyson, Jeff. How Internet Infrastructure Works at HowStuffWorks. The same site contains lots of interesting tutorials on related concepts as well. |
14 |
Wireless Network Technologies |
Noll, A. Michael. Wireless Telephone Service. Chapter 9 in Introduction to Telephones and Telephone Systems (Third Edition). Artech House Telecommunications Library, 1999. |
Distributed Computing and Web Technologies |
15 |
Client/Server, Peer-to-Peer and the WWW |
Orfali, R., et. al. Client/Server Survival Guide. 3rd ed. Wiley, 1999, Chapters 2-3.
Sadoski, Darleen. Client/Server Software Architectures--An Overview. Carnegie Mellon University, 2004.
Optional: Milojicic, Dejan S., et. al. Peer-to-Peer Computing. Hewlett-Packard Laboratories Palo Alto, 2002. Paper No. HPL-2002-57. Available at the HP Labs web site.
PC Webopedia - Client/Server Computing Category Page
Terms to look up: client/server architecture, fat client, thin client, two-tier, three-tier, middleware |
16 |
Security I: Public Key Cryptography |
Zimmerman, Phil. An Introduction to Cryptography. Included in freeware documentation to Pretty Good Privacy (PGP) software program, which is downloadable.
Behar, R. Who's Reading Your E-Mail. Fortune. February 3, 1997, 57-70.
PC Webopedia - Security Category Page
Terms to look up: biometrics, virus, macro virus, antivirus program
PC Webopedia - Encryption Category Page
Terms to look up: symmetric-key cryptography, DES, public-key encryption, RSA, Pretty Good Privacy |
17 |
Security II: Digital Signatures; Network Security |
Zimmerman, Phil. An Introduction to Cryptography. Included in freeware documentation to Pretty Good Privacy (PGP) software program, which is downloadable. pp. 11-36 (also skim Part 2).
Introduction to SSL. Available on the Web.
PC Webopedia - Encryption Category Page
Terms to look up: authentication, digital signature, digital certificate, PKI, SSL, digital cash, smart card |
18 |
Evolution of Web Technologies |
Orfali, R., et. al. Client/Server Survival Guide. 3rd ed. Wiley, 1999. Chapters 26-27.
Optional: Wright, R. The Man Who Invented the Web. Time, May 19, 1997.
Optional: Technology Forecast. pp. 545-592.
PC Webopedia - World Wide Web Category Page |
eBusiness Applications |
19 |
Under the Hood of a Commercial Web Site |
Davis, Jeffrey. How it Works. Business 2.0. February 2000, pp. 112-140.
Optional: Technology Forecast. Pp. 357-472. |
20 |
Data Mining, Data Warehousing |
Two Crows Corporation. Introduction to Data Mining and Knowledge Discovery.
Optional: Technology Forecast. pp. 253-310. |
21 |
Software Agent |
|
22 |
Student Presentations I |
|
23 |
Student Presentations II |
|
24 |
Trends in eBusiness Technology; Course Wrap-up |
|
25 |
Final Exam - In Class |
|
|
|
|
Webliography:
|
The lecture notes recommend several books, articles, and web sites: they are listed here for those who would like to learn more about the topics covered.
The Basics: Hardware, OS, and Software |
1 |
Introduction: Course Overview; Inside the CPU |
|
2 |
Computer Architecture: Processing, Memory and I/O |
|
3 |
Computer Representations; Compression |
Nelson, Mark. The Data Compression Book. New York: M&T Books, 1992. |
4 |
Operating Systems |
|
5 |
Software Development |
|
Databases |
6 |
Relational Databases; Database Queries using SQL |
|
7 |
An Introduction to Microsoft Access |
|
8 |
Relational Database Design |
|
9 |
Introduction to User Interface Building with Access Examples |
|
Networks and Telecommunications |
10 |
Telecommunication Concepts; Data Transmission |
|
11 |
Local Area Networks; Ethernet; Packet-switched Networks |
|
12 |
Midterm Exam - In Class |
|
13 |
Wide Area Networks; The Internet |
|
14 |
Wireless Network Technologies |
|
Distributed Computing and Web Technologies |
15 |
Client/Server, Peer-to-Peer and the WWW |
|
16 |
Security I: Public Key Cryptography |
Microsoft Security Home Page
- Advisors
- Patches
- IIS Security Checklist
SecurityFocus
- Mailing List
- Tools, Books, Links
- Vulnerabilities and Fixes
McClure, Stuart, Joel Scambray, and George Kurtz. Hacking Exposed: Network Security Secrets & Solutions. McGraw-Hill Osborne Media, 2003.
Decrypting in RSA (for aficionados only) - see this paper: Rivest, R.L., A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the Association for Computing Machinery 21, 2. February 1978, pp. 120-126.
|
17 |
Security II: Digital Signatures; Network Security |
Same as Lecture 16.
|
18 |
Evolution of Web Technologies |
Scientific American: The Semantic Web
A new form of Web content that is meaningful to computers will unleash a revolution of new possibilities.
Also available in print: Berners-Lee, Tim, James Hendler, and Ora Lassila. The Semantic Web. Scientific American, May 2001, pp. 35-43.
|
eBusiness Applications |
19 |
Under the Hood of a Commercial Web site |
|
20 |
Data Mining, Data Warehousing |
Recommended book: Berry, Michael J. A., and Gordon Linoff. Data Mining Techniques: For Marketing, Sales, and Customer Support. John Wiley & Sons, 1997.
Useful collections of links - Chapple, Mike. Data Mining and Data Warehousing. About.com.
Case studies and industry - Datamation magazine web site.
|
21 |
Software Agents |
For more information on Amalthea: A Personalized Information Discovery Agent Ecosystem, see:
Moukas, Amalthaea. Amalthaea: Information Discovery and Filtering Using a Multiagent Evolving Ecosystem. Proceedings of the Conference on Practical Application of Intelligent Agents & Multi-Agent Technology. London, 1996.
|
22 |
Student Presentations I |
|
23 |
Student Presentations II |
|
24 |
Trends in eBusiness Technology; Course Wrap-up |
|
25 |
Final Exam - In Class |
|
|
|
|
|
Rating:
0 user(s) have rated this courseware
Views:
21139
|
|
|
|
|