Instructor: Chen Qian <cqian12@ucsc.edu>
Class meeting time: TuTh 01:30PM-03:05PM
Office hours: Thu, 10am-11am
Classroom: Engineering 2 180 (Simularium)
Time: T/Th 1:30-3:05 PM
Lab: BE 301A
Lab Session Schedule:
Chen Qian | Yalda Edalat | Cole Grim |
E-mail: cqian12 "at" ucsc.edu | E-mail: yalda "at" soe.ucsc.edu | E-mail: cgrim "at" ucsc.edu |
Office: E2 231 | ||
Office Hours: Thursdays, 10am-11am | Lab: BE 301A | Lab: BE 301A |
The course provides a basic overview of computer network architectures and protocols, with emphasis on the basic protocols used on the Internet. In the associated lab, students explore the protocols covered in class through (bi-) weekly exercises using a network of routers, switches, and Linux-based computers.
CMPE16 and CMPE12/L or CMPS 12B/M
Textbook: Computer Networking: A Top-Down Approach
*There are minor differences between the 5th and 6th ed., feel free to use either for class. We do not recommend the 7th ed., but you can use it. Please be noted that the former "Network Layer" becomes two chapters in the 7th ed.: "Network Layer: Data Plane" and "Network Layer: Control Plane".
In recent years, there has been an increased number of academic integrity violation incidents in many UC campuses, and unfortunately, UCSC is no exception. The School of Engineering has a zero tolerance policy for any incident of academic dishonesty. If cheating occurs, they will result in academic sanctions in the context of the course, and in addition, every case of academic dishonesty is referred to the students' college Provost, who then sets the disciplinary sanctions. Cheating in any part of the course may lead to failing the course and suspension or dismissal from the University.
What is cheating? In short, it is presenting someone else's work as your own. Examples would include copying another student's written or electronic homework assignment, or allowing your own work to be copied. Although you may discuss problems with fellow students, when you submit an assignment with your name on it, it is assumed it is your own work. If you use ideas or text from others, you MUST cite your sources and give credit to whoever contributed to your work.
If there are any questions on what constitutes academic integrity violations, please make sure to talk to the instructor and/or the TAs for clarification. You are also referred to www.ucsc.edu/academics/academic_integrity/ for additional information on UCSC's academic integrity policies.
Disability Resource Center (DRC) Resource
UC Santa Cruz is committed to creating an academic environment that supports its diverse student body. If you are a student with a disability who requires accommodations to achieve equal access in this course, please submit your Accommodation Authorization Letter from the Disability Resource Center (DRC) to me privately during my office hours or by appointment, preferably within the first two weeks of the quarter. At this time, I would also like us to discuss ways we can ensure your full participation in the course. I encourage all students who may benefit from learning more about DRC services to contact DRC by phone at 831-459-2089, or by email at drc@ucsc.edu.
Grading Rubric | ||||||||||||
*The same grade will be assigned to both CE 150/150L. |
Lecture recordings will be made available. Stay tuned for more details. Slides are revised from the ones by Kurose and Ross, Simon Lam, and Katia Obraczka. pptx files are available upon requests.
Date | Topic | Readings |
Lecture Notes |
1.10 | General class information | lecture 1 | |
1.12 | Introduction: concepts, terminology | Chapter 1.1 -1.3 | lecture 2 |
1.17 | Introduction: concepts, terminology | Chapter 1.4 -1.6 | lecture 3 |
1.19 | Application layer | Chapter 2.1-2.2 | lecture 4 |
1.24 | Application layer | Chapter 2.3-2.5 | lecture 5 |
1.26 | Application layer | Chapter 2.5-2.7 | lecture 6 |
1.31 | Transport layer | Chapter 3.1-3.2 | lecture 7 |
2.2 | Transport layer | Chapter 3.3-3.4 | lecture 8 |
2.7 | Transport layer | Chapter 3.5-3.6 | lecture 9 |
2.9 | Transport layer | Chapter 3.7 -3.8 | lecture 10 |
2.14 | Network layer | Chapter 4 | lecture 11 |
2.16 | Midterm Exam | ||
2.21 | Network layer | Chapter 4 | lecture 12 |
2.23 | Network layer | lecture 13 | |
2.28 | No Lecture (gone for conference) | ||
3.2 | Network layer | lecture 14 | |
3.7 | Data link layer | Chapter 5 | lecture 15 |
3.9 | Data link layer | lecture 16 | |
3.14 |
Data link layer |
lecture 17 | |
3.16 |
Final Review |
lecture 18 | |
3.23 | Final Exam 12:00-3:00pm |
|
|