Networking is changing computing in remarkable ways. Especially the global Internet enables entirely new types of computing applications, such as social applications (that serve groups of users), the Web (and widespread forms of information access more generally), distance learning and continuing education, business applications (coordination and control of business processes and logistics), and commerce (buying and selling of goods, including auctions). These new applications are having a remarkable impact on organizations of all types--including education, government, and industry--as well as individuals. The global nature of the Internet and widespread access to it is raising many new government policy issues, and changing the very nature of national sovereignty.
Would you like to learn about the applications of networked computing? Would you like to develop a broad working knowledge of the capabilities and limitations of the technologies underlying networked computing? Would you like to participate with an interdisciplinary group of students in discussing the many ramifications and policy issues surrounding networked computing, such as privacy, protection of children, national security and law enforcement, protection of intellectual property, and antitrust law? Would you like to position yourself to invent those new "killer applications" of the future--whatever your profession--and work effectively with technologists and managers to realize them? If so, this course is for you.
Introduction to applications of networked computers, especially social, educational, and information management. Understanding of the networking, computing, and software infrastructure enabling and constraining these networked applications, with the goal of empowering the student to use these technologies effectively in their personal and professional life. Related policy, legal, economic, and industry issues.
Networked computers, especially in the context of the Internet, is an increasingly important infrastructure for society and commerce. Not only do most educated individuals today need a working knowledge of how to use the internet for social applications (like email and discussion forums), but networked computing is an important enabling technology for many organizational contexts (business, commerce, and education). The thesis behind this course is that many educated people should be facile with networked computing, so that they can employ the technology to benefit of their personal and professional lives. The goal of this course is to empower students to conceptualize new applications of networked computing technology by conveying an understanding of both the capabilities and opportunities of the technology, and also the limitations it imposes. The current suite of applications is systematically covered to point to the possibilities. Like all other technologies, networked computing also has potential negative implications, so these are discussed to aid the student in mitigating them. Network computing raises many important policy and legal issues, and is impacted by several unusual economic effects and industry organizational issues, which are also covered. This is not a course in implementing networked applications--and in particular it is not a programming course--but rather the goal is to empower the student to work effectively with technologists to develop new application ideas and bring them to fruition.
· Impart understanding of the terminology and concepts of networked computing and applications
· Empower the student to conceptualize new networked applications in their professional and personal lives by understanding the potentials and limitations of the technology
· Enable the student to work effectively with technologists to realize their new application ideas
Applications of networked computing:
Social applications (serving
groups of users)
Networked information access and management
Network computing embedded in technical systems (transportation, electric power, etc.)
Computers and the network
Client/server and alternative
Network topology and functionality
Architecture, and its use in the software infrastructure
Layering: network, operating systems, middleware, databases
Industry participants and structure
Relevant economics factors: network effects, economics of information and software, lock-in
Government and policy
Access for children
Encryption policy: law enforcement and national security
Acquiring an application
The application life cycle
Internal and contracted development vs. product
Application architectures: objects, components, frameworks
Communication support for applications
Abstract communication services: message,
message with reply, session
Examples drawn from Internet protocols: IP, UDP, TCP, RTP
Reliability and Security
Availability vs. cost tradeoffs
Security capabilities and their uses: confidentiality, authentication, integrity, non-repudiation, firewall
Addressing and routing, name
Packets and packet forwarding
Quality of service and pricing
High speed internet access
Mobile and nomadic access
Voice over Internet
Speed of light as the future limitation
Three units. Three hours of lecture per week and a voluntary recitation (for no credit, to aid students with less background and experience). It is likely that a one-unit laboratory will be added in the future.
For Spring 2001 enrollment will be limited to 100 students due to classroom space
Graduate students cannot receive credit for both IS 106 and IS 206 toward their graduate degrees. SIMS graduate students should take IS 206, which is taught every fall. Other graduate students who cannot enroll in IS 206 may want to take IS 106 as a substitute.
The course uses WebCT, a Web-based course management system. Here are the instructions for accessing the course homepage for the first time.