ࡱ> xzw} b bjbj55 4b__b LIR,rRtRtRtRtRtRtR$UWHRRR"rRrR2JQ.aQM.^RR0RN X X\QQ XQRRR X : CS 4121 Rubric for Prior Learning Assessment Submissions Course description: Serving as the first course in a series of networking courses, CS 4121 (Data Communications and Computer Networks I) aims at building a firm foundation of data communications and computer networks for students. A thorough understanding of concepts and mechanisms underlying general telecommunications and networking is believed to be essential for students to be able to learn and grasp knowledge about other advanced and specific technologies and architectures. Students are exposed to the big picture of networks we draw in this course that allows them to see how the various parts/layers of the network work individually, and fit into one whole. This course covers basic networking concepts and models, physical data communication mechanisms, Local Area Networks, packet switching networks, end-to-end data transmission control, and important applications. Candidates must score at the minimum level of able in each element of the rubric. ITEMMasterfulAbleDevelopingSOURCES OF LEARNING (EXPERIENCES)Documentation and description of experiences as a basis for PLA.Sources of Learning section succinctly narrates and describes the significance of the candidates relevant learning experiences and establishes the candidate as qualified to write on the subject. Completed in PLA 2000EVIDENCE OF LEARNING (COMPETENCIES)Evidence (overall)Candidate provides evidence of learning from experience. Evidence aligned with specific learning outcomesCandidate provides adequate and appropriate evidence of each learning outcome listed in the course syllabus. Note: learning objectives should include process skills (possible suggestions below) as well as content topics. On successful completion of this course, the student should be able to Describe the fundamental principles in data communications and computer networks including Delay and loss in Packet-Switched Networks Protocol layers and their service models Popular network applications like HTTP, FTP, SMTP, DNS, P2P, etc Reliable data transfer and sliding window protocols Congestion control and flow control Routing algorithms like LS an DV LAN and Ethernet with emphasis on error detection and multiple access protocols Mathematically and logically analyze how computer protocols work in the abstract Solve real-world problems in the context of todays Internet (TCP/IP and UDP/IP) Evidence aligned with specific content topicsFrom the candidates discussion of personal examples, it is clear that the learning arose from the candidates experience and/or experience represents the candidates understanding of the topic. 1. Computer Networks and the Internet The Network Edge The Network Core Delay, Loss, and Throughput in Packet-Switched Networks Protocol Layers and Their Service Models Application Layer Principles of Application Layer Protocols The Web and HTTP File Transfer: FTP Electronic Mail in the Internet DNS the Internets 鶹 Service Peer-to-Peer Applications Transport Layer Multiplexing and Demultiplexing Principles of Reliable Data Transfer Connection-Oriented Transport: TCP Principles of Congestion Control Network Layer and Routing Virtual Circuit and Datagram Networks Whats Inside a Router The Internet Protocol (IP): Forwarding and Addressing in the Internet Routing Algorithms Routing in the Internet Link Layer and Local Area Networks Error-Detection and Correction Techniques Multiple Access Protocols Ethernet Link-Layer Switches Evidence aligned with personal experienceFrom the candidates discussion of personal examples, it is clear that the learning arose from the candidates experience and/or experience represents the candidates understanding of the topic. This element reduces temptation to cut and paste information from reference materials. The documentation must include a meaningful description of the activities leading to the prior learning, an explanation of how each activity relates to the topic, and a discussion of how the topic fits into the general scope of the course. Evidence aligned with academic theoryAppropriate amount and use of academic theory is integrated within the submission, so that the candidates learning is grounded in the academic frameworks of the topic. Provide a justification of the clear understanding of the logics and rationales behind each major step in networking protocols the candidate lists in his/her PLA submission. QUALITY OF PRESENTATION OF SUBMISSIONBreadth / Depth of SubmissionThere is an appropriate depth and breadth of discussion related to requested credits (upper vs. lower division, and amount).Introduction / ConclusionIntroduction effectively introduces the topic in general and the contents of the essay specifically. Conclusion effectively summarizes main points and states significance of the essay topic.Citation of Source MaterialIn-text and end-of-text citations of all sourced materials are correct and complete.DocumentationDocumentation is effective evidence of experience; documentation is effectively referred to within submission, and its significance and relevance is clear.Sentence Structure, Mechanics, and Overall PresentationPLA submission is well-organized, uses adequate subheadings clearly aligned with competencies, and progresses in logical, convincing order. Each sentence structured effectively; rich, well-chosen variety of sentence styles and length. Virtually free of punctuation, spelling, capitalization errors; appropriate format and presentation for assignment. Exceptional vocabulary range, accuracy, and correct and effective word usage. PLA submission is professionally presented, complete, and clear. Note: information in red was provided by Zhiguang Xu. In addition to PLA submission, the candidate will be asked to take a written test. The final conclusion will be drawn based on the results of both of these activities (Please refer to the following weight-distribution chart for details). Assessment MethodDescriptionWeightDocumentationSee the rubric above30%TestProblems will be selected to test candidates theoretical background and analytical capabilities70% 9:MN9 D  ! C D I ^ ķюymeeYNChEyh JCJaJhEyhExCJaJhEyhEx5CJaJhEyhEx5hEyhEx5CJaJhLhLPJnHo(tH hEyhEy hEyh7 h*{h-6B*]ph'h*{h-6B*PJnHo(phtHh*{h-6B*phh*{h7 5B*phh*{h7 B*ph hEyh JhEyhEx5CJaJ h-5CJPJaJnHo(tH9:     $$Ifa$gd2)gdEygd J$a$gdEx ! C [R $Ifgd2)kd$$Ifl\ h $  t0644 layt2)C D _ ` a |||| $Ifgd2)zkd$$Ifl$*  t 0644 lap yt2)^ _ a b (3du",-ꪟ~m^mG,hXxhXxB*CJPJaJnHo(phtHhXxhXxB*CJaJph hXxhXxB*CJaJo(ph#hXxhXxCJPJaJnHo(tHh JCJPJaJnHo(tHhEyhWCJaJhEyh7 CJaJhEyh JCJaJhEyhEx5CJaJhEyhExCJaJhEyhEx5CJaJ hEyhExhEyhExCJaJh*{hExCJaJa b +" $Ifgd2)kde$$Ifl\ h $   t(0644 lap(yt |s|| $Ifgd J $Ifgd2)zkd$$Ifl$*  t 0644 lap yt2) -[RIII8 & F $If^gdW $Ifgd7 $Ifgd2)kd+$$Ifl\ h $  t0644 layt2)-:FP}PQtuv  /7۵ۏۏۏۏۏۃraTr۵hchcB*o(ph hchcB*CJaJo(ph hch )B*CJaJo(phh )B*CJaJph(h )h )B*CJOJQJaJo(ph h )hWB*CJaJo(ph,h )h )B*CJPJaJnHo(phtHh )h )B*CJaJph h )h )B*CJaJo(ph&hcB*CJPJaJnHo(phtHQu8 $Ifgd2) $If^gd)FN & F $If^gd ) & F $If^gdW & F g$7$8$H$If^`ggd ) 78=ijvy|}˼˚˚rcXQE4 h!hhRCJOJQJ^JaJhEyh7 5CJaJ hEyhExhEyhExCJaJh )hB*CJaJph hhWB*CJaJo(ph,h )h )B*CJPJaJnHo(phtH&h!B*CJPJaJnHo(phtHhcB*CJaJo(phh )h )B*CJaJph h )h )B*CJaJo(ph&hcB*CJPJaJnHo(phtHh )hWB*CJaJph+" $Ifgd2)kd$$Ifl\ h $   t(0644 lap(yt~,>hy & F0$If[$\$`0gd! & F  $If[$\$^ gd! & F9$If[$\$`9gd! $If[$\$^ `gd!$If[$\$^gd7 }~ghxyABde#$67пxhEyh7 CJaJ hEyh7 CJOJQJ^JaJh ^h!CJaJ h ^h ^B*CJaJo(phh ^h!B*CJaJph h ^h!B*CJaJo(ph2hLhL5CJOJPJQJ^JaJnHo(tH)hhRCJOJPJQJ^JaJnHo(tH-Be$7Ps & F$If[$\$`gd ^ & F :$If[$\$^:gd ^ & F$If[$\$`gd! & F :$If[$\$^:gd! & F1$If[$\$`1gd! $Ifgd2)$If[$\$^gd!+"" $Ifgd2)kd$$Ifl\ h $   t(0644 lap(yt:?Jdg 8ȹsaZOhEyh JCJaJ hEyhEx#h)FNh)FNCJPJaJnHo(tH,h)FNh)FNB*CJPJaJnHo(phtH&h)FNB*CJPJaJnHo(phtHh)FNB*CJaJphh)FNh)FNB*CJaJphh)FNCJPJaJnHo(tHhExCJPJaJnHo(tHhEyh7 CJaJhEyhExCJaJhEyhEx5CJaJ hEyh7 8RI $Ifgd Jkd9$$Ifl\ h $  t0644 layt2) $Ifgd2)Ikd$$Ifl\ h $  t0644 layt2) $Ifgd2) $Ifgd JJayVWYZt56RVųųٟň}vj^vj}L}vj}vj}vj}#hhCJPJaJnHo(tHhEyhEx5CJaJhEyhEx5CJaJ hEyhExhEyhExCJaJ,hhB*CJPJaJnHo(phtH&ht&B*CJPJaJnHo(phtH#hB*CJPJaJnHphtH&hB*CJPJaJnHo(phtH&h)FNB*CJPJaJnHo(phtH#hh)FNCJPJaJnHo(tHWXY|||| $Ifgd2)zkd$$Ifl$*  t 0644 lap yt2)YZt345>>RR & F \$If^\gdEx $Ifgd2)kdb$$Ifl\ h $  t0644 layt2)56RRRR $Ifgd2)kd& $$Ifl\ h $  t0644 layt2)TUV[RRRR $Ifgd2)kd $$Ifl\ h $  t0644 layt2)VWz<}[R>>>>> & F \$If^\gdEx $Ifgd2)kd $$Ifl\ h $  t0644 layt2)VWGT\ q^q^q^Iq^Iq^(hYrhYrCJOJPJQJaJnHtH$hYrhYrCJPJ^JaJnHtH'hYrhYr5CJPJ^JaJnHtHhYrCJPJaJnHtHhYrCJPJaJnHo(tHh*{CJPJaJnHo(tHh)FNhEyB*CJaJphhEyhEyCJaJ,h*{hEyB*CJPJaJnHo(phtHhEyhExCJaJhEyhEx5CJaJ hEyhEx}~RMHHCgdYrgd7 gdkdr $$Ifl\ h $  t0644 layt2) $Ifgd2)Vkd6 $$IflF $Fx Fx Fx t06    44 lBaytYrdd$If[$\$gdYrgdYr\ ` k[[[dd$If[$\$gdYrkd $$IflF $Fx Fx Fx t06    44 lBaytYr\ ] ` a b ƴ#hcDhYrCJPJaJnHo(tH(hYrhYrCJOJPJQJaJnHtH$hYrhYrCJPJ^JaJnHtH!hYrCJPJ^JaJnHo(tH` a b kfgd7 kdf $$IflF $Fx Fx Fx t06    44 lBaytYr21h:p/ =!"#$% $$If!vh5l 55s5#vl #v#vs#v:V l t065 555yt2)$$If!vh5h%#vh%:V l  t 065*p yt2)#$$If!vh5l 55s5#vl #v#vs#v:V l  t(065 555p(yt$$If!vh5h%#vh%:V l  t 065*p yt2)$$If!vh5l 55s5#vl #v#vs#v:V l t065 555yt2)#$$If!vh5l 55s5#vl #v#vs#v:V l  t(065 555p(yt#$$If!vh5l 55s5#vl #v#vs#v:V l  t(065 555p(yt$$If!vh5l 55s5#vl #v#vs#v:V l t065 555yt2)$$If!vh5l 55s5#vl #v#vs#v:V l t065 555yt2)$$If!vh5h%#vh%:V l  t 065*p yt2)$$If!vh5l 55s5#vl #v#vs#v:V l t065 555yt2)$$If!vh5l 55s5#vl #v#vs#v:V l t065 555yt2)$$If!vh5l 55s5#vl #v#vs#v:V l t065 555yt2)$$If!vh5l 55s5#vl #v#vs#v:V l t065 555yt2)$$If!vh5l 55s5#vl #v#vs#v:V l t065 555yt2)$$If!vh5x 5x 5x #vx :V l t065x BytYr$$If!vh5x 5x 5x #vx :V l t065x BytYr$$If!vh5x 5x 5x #vx :V l t065x BytYrj 666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ OJPJQJ_HmH nHsH tHL`L ExNormal$CJOJPJQJ_HaJmH sH tH DA D Default Paragraph FontRi@R 0 Table Normal4 l4a (k ( 0No List DOD ExNormal1dd[$\$ OJQJ^JJJ Ex Body Text1dd[$\$ OJQJ^Jvv  Table Grid7:V0 OJPJQJN^@"N ! Normal (Web)dd[$\$ PJnHtH`3 Yr Light Grid:V0a44jF@ j9j; j.jDjDDfdXDYD[$\$fdXDYD[$\$x5OJ$PJ QJ$\^Jo(5OJ$PJ QJ$\^Jo(5OJ$PJ QJ$\^Jo(5OJ$PJ QJ$\^Jo(PK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] b b^ -7}V\ b "%+/ C a Y5V}` b  !#$&'()*,-.08@0(  B S  ?  \_d\_dDIQu , $ P s Zt6R\_ad,-: 8 = v v y | } ~ # $ 6 7 N N P P s s VVad5c "X<*eh-.x/doMX5NXh.Ofq\Q"XNUjEWX(eYN\3j[ŮU]zB?c6rn(Qdnr(?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefhijklmnpqrstuvyRoot Entry F>aQ{Data 21Table:eXWordDocument4bSummaryInformation(gDocumentSummaryInformation8oCompObjy  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q