CISC450/650-CPEG419/651-ELEG651 Computer Networks Syllabus


Professor: Paul D. Amer
Email: amer@udel.edu
Office: 434 Smith Hall
Office Phone: (302) 831-1944
Cell Phone: (302) 540-8840 (for urgent matters; pls text before calling)
Office Hours: T,Th: 12:30-1:30pm, and by appointment
Course URL: www.cis.udel.edu/~amer/450/
Last Updated: 2/4/2015

TA: Yuqi "Mike" Kong
Email: kongyq@udel.edu
Hours: M 10-12; 201 Smith Hall

Course Description

Students develop a thorough understanding of foundation principles, architectures, and techniques employed in computer networks. A network is viewed as a hierarchy of layers, or abstract machines. Each layer uses services offered by lower layers to in turn provide enhanced service to the next higher layer. These layers form a protocol suite. The focus is on protocols and mechanisms used in the Internet's TCP/IP protocol suite, including the design and operation of both wide-area and local-area networks. The course is heavily hands-on using Wireshark to 'sniff' and analyze real Internet traffic.

Specific topics include: introduction (network architectures, protocol layering, TCP/IP Protocol Suite); application layer (Web and http, email, file transfer, DNS); transport layer (TCP, UDP, SCTP, connection management, end-to-end reliable data transfer, sliding window protocols, quality of service, flow control, congestion control, socket programming); network layer (link-state vs. distance-vector routing, IPv4, IPv6, internetworking, NATs); local area and wireless networks (Ethernet, switches, PPP, CDMA); data link layer (framing, error control, CRC checksums,); physical layer (analog vs digital transmission, the telephone system, packet vs circuit switching, multiplexing).

Prerequisites

Students may not earn credit at UD for any two of the following: CISC250, CISC450, CISC650, CPEG419, ELEG651, CPEG651

Required References

Additional Non-required References

Assignments and Grading

20% - Midterm Exam
20% - Final Exam
60% - Assignments (done in Groups of 2):

Assignments (paper copy) are due at the beginning of class on the day due. No emailed (i.e., electronic) assignments are accepted. Assignments received after class begins are accepted and considered late. Unexcused late assignments will be penalized up to 10% of the awarded grade per day including weekends. Without prior discussion with the professor, no assignment will not be accepted more than 3 days late (maximum 30% penalty).

Achieving a certain percentage of the weighted total allowed points in the course guarantees a student a minimum grade (see table below).  I reserve the right to curve grades higher, but not lower.
 

A

A-

B+

B

B-

C+

C

C-

D+

D

D-

CISC450/CPEG419

91%

88%

85%

82%

79%

76%

73%

70%

67%

64%

61%

CISC650/ELEG651/CPEG651

93%

90%

87%

84%

81%

78%

75%

72%

69%

66%

63%

Class participation or a pattern of grade improvement can have a positive effect on the final grade. Borderline cases are influenced primarily by exam scores and class participation, not by assignments.

A philosophical note on grades: I do the best I can in measuring how much course material you demonstrate that you know. This evaluation is done through assignments and tests. I do not attempt to grade intelligence. I do not grade based on how many hours you put into the course.

Academic Honesty

The homeworks, Wireshark projects (except for the first Wireshark Introduction project), and the socket programming assignment in Python should be done in groups of at most two. No groups of three are permitted. If your schedule does not permit you to work with a partner, or you cannot find a partner, then you will have to work alone. Students should NOT divide an assignment where one does half of the questions and the other does the other half. Students should NOT divide up the assignments where one does half of them and the other does the other half.

By putting your name on your submission, you are claiming that you were a full participant in doing the work that resulted in your submission. If your lab partner writes the solution without your participation, you are engaging in academic dishonesty by including your name on the submission. If your lab partner writes the solution without your participation, and it turns out that your lab partner engaged in academic dishonesty, you will also be liable for academic dishonesty if your name is included on the solution. Be sure to understand what is submitted, and have no doubts about its origin. If you did not participate in, or do not understand the solution being submitted, remove your name or do not submit it. To earn full credit on an assignment, each student is responsible for the full understanding of all group solutions.

Discussion with others to better understand material from class or the text, or to better understand general programming concepts is ENCOURAGED. Those discussions should end when writing your specific solutions. Prior to submitting an assignment, students in one pair are PROHIBITED from accessing or comparing assignment answers with those of any other student (past or present, UD or not-UD, alive or dead). Students may NOT use any web site that contains answers. Comparing answers before submitting one's work, or getting answers off the web is considered academic dishonesty. Anyone that provides answers to another group is also guilty of academic dishonesty. Both will be prosecuted in accordance with the University's Policy on Academic Honesty.

If you do not have time to complete an assignment, submit a partial solution.

Laptops and Cell Phones

I love my job teaching at UD, and promise to work extremely hard to make this class exciting and challenging. In return, I expect your full attention in class. I believe cell phone texting, using a laptop for doing other class assignments, reading email, playing video games, visiting Facebook, etc., while someone is working to educate you is as rude as it gets, and I will be personally offended. At the beginning of class, turn off your electronic devices, and close laptop windows unrelated to the class. If you believe this policy is too severe, I understand, and ask you to please take computer networks from another professor. Thank you.