Course ID: | MIST 5640. 3 hours. |
Course Title: | IT Infrastructure |
Course Description: | Concepts, design, implementation, and security of network-based
IT infrastructure. The course is organized around the OSI model,
with an emphasis on Internet-centric backbones and pipes, TCP/IP
applications, cloud infrastructure, digital services, and
security. Also covers capacity planning, architecture,
virtualization, and scaling of IT infrastructure, applications,
and services. |
Oasis Title: | IT Infrastructure |
Semester Course Offered: | Offered every year. |
Grading System: | A-F (Traditional) |
|
Course Objectives: | 1. Students will be able to understand fundamental network-
based IT infrastructure concepts and the design and
implementation of IT infrastructure.
2. Students will learn how organizational needs and
imperatives influence technical decisions about IT
infrastructure.
3. Students will be able to understand the security
implications and tradeoffs associated with design choices in
IT infrastructure. They will also learn about the
cybersecurity challenges and approaches associated with
specific IT infrastructure design choices.
4. Students will be able to understand the Open Systems
Interconnection (OSI) network model spanning the application,
transport, internet, network, and physical layers.
5. Students will be able to understand TCP/IP applications
and their varied architectures (e.g., cloud computing and
client-server), their connection to data management (with an
emphasis on big data and data streams).
6. Students will learn about the physical components of
Internet backbone and last-mile networks as well as the
associated protocols.
7. Students will learn about how the design of various IT
infrastructure components affects their security, performance,
and scalability.
8. Students will learn about the interdependencies among
scalability in infrastructure, data, and applications.
9. Students will learn about the implications of IT
infrastructure design at the enterprise level for application
layer-level design choices.
10. Students will learn about capacity planning, load
balancing, and virtualization. In-class exercises and cases
will be used to demonstrate the application of the themes in
the course. |
Topical Outline: | 1. The course will cover fundamental concepts, design,
implementation, and security of network-based IT infrastructure.
It will follow the Open Systems Interconnection (OSI) network
model spanning the application, transport, internet, network,
and physical layers.
2. The course will cover all three facets of modern IT
portfolios: Foundational IT infrastructure, TCP/IP
applications, and data. The emphasis will be on how these
facets are influenced by the business needs and priorities of
an organization.
3. Physical layer: Students will learn about the physical
components of Internet backbone and last-mile networks and the
associated protocols.
4. Network and Transport layers: Students will understand the
standard Internet protocols.
5. Security implications: Students will examine the
strengths and weaknesses of TCP/IP and how to design and
manage a system from both the client and server side. The
security implications and tradeoffs associated with each
architectural design choice for IT infrastructure at various
levels of the overall IT portfolio will be covered.
6. Architecture: Students will learn about the security,
performance, and scalability implications of various
enterprise-level IT infrastructure design choices and
application layer-level architectural design choices (e.g.,
cloud computing versus client-server).
7. Scalability: Students will learn about vertical versus
diagonal scalability in infrastructure, data, and applications |
Honor Code Reference: | The University of Georgia has an Honor Code and Academic Honesty Policy that governs
student academic performance both in and out of the classroom. The Honor Code
appears in both the Student Handbook and in the UGA Catalog. The responsibilities of
students, instructors, and judiciary personnel are spelled out in the Honor Code, as
are potential penalties for plagiarism and cheating. As a student at UGA, you are
expected to abide by the Honor Code for this class and for all others in which you
are enrolled. Please understand that portraying others' work as your own will result
in appropriate sanctions.
All academic work must meet the standards contained in A Culture of Honesty, the
University's policy and procedures for handling cases of suspected dishonesty, can be
found at www.uga.edu/ovpi. Each student is responsible to inform themselves about
those standards before performing any academic work. |