Instructor: Chen Qian <cqian12@ucsc.edu>

Class meeting time: TuTh 01:30PM-03:05PM

Office hours: Thu, 10am-11am

Teaching Assistants:
Yalda Edalat <yalda "at" soe.ucsc.edu>
Cole Grim <cgrim "at" ucsc.edu>

Classroom: Engineering 2 180 (Simularium) 
Time: T/Th 1:30-3:05 PM 

Lab: BE 301A

Lab Session Schedule:

  • Monday 11:00-1:00pm 
  • Tuesday 4:00-6:00pm 
  • Wednesday 3:00-5:00pm 
  • Thursday 10:00-noon 
  • Fridays noon-2:00pm

Contact Information

Chen Qian Yalda Edalat Cole Grim
E-mail: cqian12 "at" ucsc.edu E-mail: yalda "at" soe.ucsc.edu E-mail: cgrim "at" ucsc.edu
Office: E2 231    
Office Hours: Thursdays, 10am-11am Lab: BE 301A Lab: BE 301A

Course Focus 

The course provides a basic overview of computer network architectures and protocols, with emphasis on the basic protocols used on the Internet. In the associated lab, students explore the protocols covered in class through (bi-) weekly exercises using a network of routers, switches, and Linux-based computers.

Course Prerequisites 

CMPE16 and CMPE12/L or CMPS 12B/M

Textbook 

Textbook: Computer Networking: A Top-Down Approach

*There are minor differences between the 5th and 6th ed., feel free to use either for class. We do not recommend the 7th ed., but you can use it. Please be noted that the former "Network Layer" becomes two chapters in the 7th ed.: "Network Layer: Data Plane" and "Network Layer: Control Plane".

Academic Honesty And Integrity 

In recent years, there has been an increased number of academic integrity violation incidents in many UC campuses, and unfortunately, UCSC is no exception. The School of Engineering has a zero tolerance policy for any incident of academic dishonesty. If cheating occurs, they will result in academic sanctions in the context of the course, and in addition, every case of academic dishonesty is referred to the students' college Provost, who then sets the disciplinary sanctions. Cheating in any part of the course may lead to failing the course and suspension or dismissal from the University.

What is cheating? In short, it is presenting someone else's work as your own. Examples would include copying another student's written or electronic homework assignment, or allowing your own work to be copied. Although you may discuss problems with fellow students, when you submit an assignment with your name on it, it is assumed it is your own work. If you use ideas or text from others, you MUST cite your sources and give credit to whoever contributed to your work.

If there are any questions on what constitutes academic integrity violations, please make sure to talk to the instructor and/or the TAs for clarification. You are also referred to www.ucsc.edu/academics/academic_integrity/ for additional information on UCSC's academic integrity policies.

 Disability Resource Center (DRC) Resource

UC Santa Cruz is committed to creating an academic environment that supports its diverse student body. If you are a student with a disability who requires accommodations to achieve equal access in this course, please submit your Accommodation Authorization Letter from the Disability Resource Center (DRC) to me privately during my office hours or by appointment, preferably within the first two weeks of the quarter. At this time, I would also like us to discuss ways we can ensure your full participation in the course. I encourage all students who may benefit from learning more about DRC services to contact DRC by phone at 831-459-2089, or by email at drc@ucsc.edu. 

Grading Rubric     
Category Percent
Final 35%
Midterm 30%
Labs 25%
Lab Project 10%
   

*The same grade will be assigned to both CE 150/150L.

 

Schedule (Tentative) 

Lecture recordings will be made available. Stay tuned for more details. Slides are revised from the ones by Kurose and Ross, Simon Lam, and Katia Obraczka. pptx files are available upon requests.

Date Topic Readings

Lecture Notes 

1.10 General class information   lecture 1
1.12 Introduction: concepts, terminology  Chapter 1.1 -1.3 lecture 2
1.17 Introduction: concepts, terminology Chapter 1.4 -1.6 lecture 3
1.19 Application layer Chapter 2.1-2.2 lecture 4 
1.24 Application layer Chapter 2.3-2.5 lecture 5 
1.26 Application layer Chapter 2.5-2.7 lecture 6 
1.31 Transport layer Chapter 3.1-3.2  lecture 7 
2.2 Transport layer Chapter 3.3-3.4 lecture 8 
2.7 Transport layer  Chapter 3.5-3.6 lecture 9 
2.9 Transport layer  Chapter 3.7 -3.8 lecture 10 
2.14 Network layer Chapter 4 lecture 11 
2.16  Midterm Exam    
2.21  Network layer  Chapter 4 lecture 12
2.23 Network layer    lecture 13 
2.28 No Lecture (gone for conference)     
3.2  Network layer    lecture 14
3.7  Data link layer  Chapter 5 lecture 15 
3.9  Data link layer    lecture 16
3.14 

Data link layer

  lecture 17
3.16

Final Review

  lecture 18
3.23 Final Exam 12:00-3:00pm  

 

   
AttachmentSize
PDF icon Lecture01.pdf3.1 MB
PDF icon Lecture02.pdf2.7 MB
PDF icon Lecture03.pdf1.77 MB
PDF icon Lecture04.pdf1.8 MB
PDF icon Lecture05.pdf863.75 KB
PDF icon Lecture06.pdf1.34 MB
PDF icon Lecture07.pdf1.42 MB
PDF icon Lecture08.pdf471.9 KB
PDF icon Lecture09.pdf1.02 MB
PDF icon Lecture10.pdf1.28 MB
PDF icon Lecture11.pdf1.03 MB
PDF icon Lecture12.pdf1.43 MB
PDF icon Lecture13.pdf1.37 MB
PDF icon Lecture14.pdf820.36 KB
PDF icon Lecture16.pdf1.52 MB
PDF icon Lecture15.pdf1.18 MB
PDF icon Lecture17.pdf1.52 MB
PDF icon Lecture18.pdf2.94 MB