|
|||||||
View general information Description Professional fields to which it applies Prior knowledge Information prior to enrolment Learning objectives and results Content View the UOC learning resources used in the subject Guidelines on assessment at the UOC View the assessment model | |||||||
This is the course plan for the second semester of the academic year 2022/2023. To check whether the course is being run this semester, go to the Virtual Campus section More UOC / The University / Programmes of study section on Campus. Once teaching starts, you'll be able to find it in the classroom. The course plan may be subject to change. | |||||||
This course presents the basic concepts of computer networks focusing on Internet and the www. Moreover, this course deals with multimedia networks as well as the basic principles of security in Internet applications. | |||||||
This subject trains the student to know the basic concepts and main applications of the Internet network, with special emphasis on the web, as well as basic concepts of Internet security. | |||||||
Operating systems and java programming. | |||||||
Students should have knowledge on operating systems and object-oriented programming (practical assignments are done in Java) | |||||||
The main objective of the subject is that the student knows the basic aspects of internet communications, the protocols of the main applications of information exchange, with special emphasis on the web, and basic aspects of security. The general objectives are summarized in:
|
|||||||
Unit 1: Computer networks and the Internet. This unit presents an overview of computer networks and the Internet. You will see components of all layers of networks always trying not to lose this global vision. Unit 2: Internet applications. This unit studies the conceptual aspects and implementation of network applications. You can also see the basic functioning of different network applications such as the web, email, name service, etc. Especially you can see the basic aspects of web architecture. Finally, you can see different communication mechanisms for network applications. Unit 3: Multimedia networks. This unit describes the communication mechanisms and protocols that allow real-time multimedia to work. Unit 4: Principles of security in Internet applications. This unit presents the basic security aspects to keep in mind when running network applications |
|||||||
|
|||||||
The assessment process is based on the student's personal work and presupposes authenticity of authorship and originality of the exercises completed. Lack of authenticity of authorship or originality of assessment tests, copying or plagiarism, the fraudulent attempt to obtain a better academic result, collusion to copy or concealing or abetting copying, use of unauthorized material or devices during assessment, inter alia, are offences that may lead to serious academic or other sanctions. Firstly, you will fail the course (D/0) if you commit any of these offences when completing activities defined as assessable in the course plan, including the final tests. Offences considered to be misconduct include, among others, the use of unauthorized material or devices during the tests, such as social media or internet search engines, or the copying of text from external sources (internet, class notes, books, articles, other students' essays or tests, etc.) without including the corresponding reference. And secondly, the UOC's academic regulations state that any misconduct during assessment, in addition to leading to the student failing the course, may also lead to disciplinary procedures and sanctions. The UOC reserves the right to request that students identify themselves and/or provide evidence of the authorship of their work, throughout the assessment process, and by the means the UOC specifies (synchronous or asynchronous). For this purpose, the UOC may require students to use a microphone, webcam or other devices during the assessment process, and to make sure that they are working correctly. The checking of students' knowledge to verify authorship of their work will under no circumstances constitute a second assessment. |
|||||||
|