CSCI 356 / Fall 2024
Computer Networking
Instructor:
|
Lecture:
Student hours (tentative):
|
This course is designed for those who want to understand the technology that lies beneath the Web and everything else we do online. In short, how computers talk to each other.
We will focus on the fundamentals of computer networks. We will study the low-level protocols that drive the Internet, including protocols for data forwarding, routing, congestion, and flow control. We will examine how these can be used to build services like the Web, email, streaming video, and multi-player games, and we will learn how to write our own networked programs. Some of the assignments will be drawn from emerging research, including peer-to-peer and wireless sensor networks.
Students in the course will be expected to know the basics of computer programming. Students will learn how to program with sockets and how to use various software tools for managing networks and networked programs. The course will make extensive use of online reference materials.
I intend for every student to feel their voice is welcome in this course. My goal is to create a learning environment that supports each of you and embraces the diversity that you all bring. All members of the class are expected to be respectful and supportive of each other's ideas and identities, even when they disagree. Even when discussing narrow technical matters, racism, sexism, and other hidden assumptions can appear, and there are difficult ethical dimensions to everything we do as computer scientists. I will endeavor to point these out when they appear, and to check my own assumptions about your past experiences and perspectives. We all make mistakes that can impact others. But I hope that by committing to listen reflectively, and without defensiveness, we can build a strong and inclusive community. Please let me know if there is anything in class meetings, in office hours, in study sessions, or elsewhere that troubles you or makes you feel uncomfortable or unvalued. Even for events outside of the classroom, I welcome and appreciate any suggestions you have pertaining to diversity, equity, and inclusion.
If you prefer to speak with someone outside the course, please do not hesitate to reach out to any other faculty, the class deans, department members of the student advisory council, or others you feel more comfortable speaking with.
Also, if you have a name and/or set of pronouns that differ from those that appear on my class roster, please let me know!
Strongly recommended, but not required.
Computer Networking: A Top-Down Approach (8th Edition)
James F. Kurose, Keith W. Ross
ISBN: 978-9356061316
If you have the 4th, 5th, 6th, or 7th edition, those should be fine instead.
There will be approximately eight assignments during the semester, split evenly between written homework and coding projects / practicals.
The final grade will be computed approximately as follows:
Coding projects | ~ 30% |
Written homework and discussions | ~ 20% |
Exam 1 | ~ 17% |
Exam 2 | ~ 17% |
Final Exam | ~ 17% |
There will be two mid-term exams and one final exam.
Tentative dates for the mid-term can be found on the weekly schedule. The final exam will be held during the final exam period at a date and time chosen by the registrar.
Assignments are due as specified on the assignment page. The maximum possible score for an assignment will be reduced by 10% for each day or portion of a day that the assignment is turned in late. So the maximum possible score for an assignment turned in up to 24 hours late is 90%, and the maximum possible score for an assignment turned in up to 48 hours late is 80%, and so on. The penalty will be determined when the complete assignment has been received by the instructor, the department administrative assistant, or another faculty member in the Math and Computer Science department. Late work will not be accepted after the graded assignment is returned to the class or after the solutions have been posted.
Please refer to the Math and CS Department Honor Code Policy and the College Academic Integrity Policy.
In general, you may refer to your texts, your class notes, and your course instructor for help. You may also consult public literature (books, articles, web sites) for general information and examples, but you should not seek or use published solutions to assignments. You may also talk with with fellow students about general information and strategies for solving assignments, but not specific solutions or code. The work you turn in must be your own. If you are in doubt about what is acceptable, be sure to ask the course instructor.
Clarification about Artificial Intelligence or "generative AI": Generative AI models like ChatGPT, BARD, GitHub/Microsoft Copilot, or similar code generation tools are clearly useful. And they may turn out to be helpful for learning, or maybe they will prove to be unhelpful in long run. Honestly it's probably too early to tell. For the purposes of CSCI 226 and the collaboration policy, you should treat generative AI models as if it were a person -- say, a very well-read, sometimes clever, and very confident but sometimes unreliable roommate. That means it's okay to ask a model for general help understanding class material (and cross your fingers it doesn't "hallucinate"). But it's not okay to put homework questions into a model, or to ask the model to solve specific tasks that an assignment has tasked _you_ to perform. That crosses the line into simply cheating, just as asking a roommate to do your homework would be a violation of the College academic integrity policy. If you consult or use generative AI in any of your assigned work, you must cite the specific tools you used and provide a list of all prompts you used in your discussion log. You are still responsible for ensuring the correctness and accuracy of all submitted work. In addition, you are responsible for ensuring that all source materials used in your work are properly cited--you should be aware that generative AI can often produce output copied closely (or sometimes directly) from source material without properly citing those sources. Failure to correctly and fully cite sources constitutes plagiarism and is a violoation of the academic integrity policy.
Clarification about other online sources: It is fine to use Google and other sites to look for snippets of publicly available code that might help you with assignments, and it is okay to use a limited amount of such code in your own work. You should not take entire solutions or large amounts of code from the web. And you must clearly comment your code to indicate which code and ideas are purely your own, which code or ideas are borrowed or adapted from elsewhere, and where the other code or ideas came from.
In all cases you must cite each source of ideas you adopt in your discussion log for each assignment. You should never present another person's work (or AI model's output) as your own work. By clearly indicating any sources you consult and the people with whom you collaborate, you are giving credit where it is due. If you borrow or adapt code, and if the code is good, then you will get some credit for having found it (you won't get credit for writing it, since you didn't). If you borrow bad code, the fault is all yours. If you borrow or adapt code or use source material but don't cite it, that's plagiarism, and will be considered a violation of the academic integrity policy.
Enrolled students are expected to attend all regular class meetings and to participate in discussions and other synchronous activities, except for excused and other unexpected absenses or by arrangement with the instructor. Please refer to the College Attendance and Excused Absence Policies.
The instructor is committed to providing students with disabilities equal access to the educational opportunities associated with this course. For details or to request accommodation, please refer to College procedures on Requests for Reasonable Accommodations and the Office of Accessibility Services.