Computer Networking (CSCI 379)
Instructor Prof. Douglas Salane
- office: 6.63.06
- web site: http://web.math.jjay.cuny.edu
- Section 01, Mon. and Wed., period 1, 8:00 - 9:15 am
- Math Resource Center Computer Lab, Room NB 6.64.02
Wed. 2:00 - 3:00 pm or by appointment
- J.F. Kurose and K.W. Ross, Computer Networking: A Top Down Approach
Featuring the Internet: Sixth Edition, Pearson (2013).
- You can order the electronic version of the text from this site provided by the publisher's representative. Vital Source CourseSmart
The main program we will require is the widely used packet sniffer Wireshark. As soon as possible, visit the Wireshark Site
and download the program to the laptop or computer you will use for assissignments - Linux and Windows versions are available. The
program is free software. For developing client server applications, we will use the programming language Python. Python also is free software and can be
downloaded from www.python.org
Exams/Grading Grades will be based on a midterm, a final and two major projects. In addition, there
will be four or five homework assignments that must be handed in as well as several smaller computer assignments. The instructor
will also assign readings from the web or papers. For each assigned reading,
students will be expected to write a one page summary of the reading, which will be due the lecture after the reading is assigned.
The course requires students to have completed CSCI 272 or demonstrate comparable programming skill. No previous
knowledge of computer networking is required. The stated catlog requirements are ENG 201, and CSCI 272 or MAT 272.
Course Description in College Bulletin
CSCI 379 Computer Networking (Formerly MAT 379)
The principles and methodologies used in the design and
implementation of modern computer networks and networked
information systems are studied in detail. Topics include
shared use of a multiple access channel, error detection and
recovery, and flow and congestion control. Packet switched
networks and routing protocols are examined, and procedures
for secure and reliable transport over best-effort deliver
systems are presented. In addition, communication protocols
above the transport level, for example, protocols that support
the Internet and current Internet applications such as Web
servers and clients, are discussed. Network programming is
introduced, and students will be expected to develop several
Course Objectives 1) Students gain the basic background in network hardware, software and architectures
needed to design, manage and secure local area and intranet networks. 2) Students develop a working knowledge of
layered computer communication protocols that are the building blocks of modern
packet based computer networks and network applications. (The TCP/IP protocol suite will be
examined in detail). 3) Students develop the ability to build simple client server applications.
4) Students will be aware of inhernet insecurities in software and protocols that play critical roles in modern networks and the Internet.
- W. Richard Stevens, TCP/IP Illustrated, Volume 1 - The Protocols, Addison Wesley (1994).
- www.cert.org The Cert Coordination Center for security expertise at Carnegie Mellon University.
- www.computer.org IEEE Computer
Magazine home page.
- www.isoc.org The Internet Society
- www.ietf.org The Internet Engineering
Task Force. The RFCs are here.
- www.wireshark.org A packet sniffer for Windows and
Linux systems. Read the documentation carefully before downloading and installing.
- www.python.org The Python home page. Python is available here
as well as documentation and tutorials on python.
Other Resources (coming soon)
power point slides
Projects (coming soon)
Course Schedule CSCI 379, Spring 2015
Announcements 1-27-15 Get access to the text as soon as possible. Install Wireshark as soon as possible as well.
The Mathematics & Resource Center is located on the 6th floor of the New Building next to the Mathematics &
Computer Science Dept. Tutors will be available throughout the semester to assist with programming assignments and use of software.
The instructor will provide additional information in class.
Students with Disabilities
Qualified students with disabilities will be provided reasonable academic accommodations if determined eligible by the
Office of Accessibility Services (OAS). Prior to granting disability accommodations in this course, the instructor must
receive written verification of a student’s eligibility from the OAS which is located at L66 in the new building (212-237-8031).
It is the student’s responsibility to initiate contact with the office and to follow
the established procedures for having the accommodation notice sent to the instructor. (Source,Reasonable Accomodations:
Faculty Guide to Teaching Students with Disabilities, 4th ed., City University of New York, p.3)
Course Requirements/Policies Students are expected to attend
all classes and take the exams at the scheduled times. Assigned readings
and problems must be completed after each class. In addition, students will be
expected to participate in class and offer solutions to problems. Programming assignments must be handed in on time.
The instructor reserves the right to refuse late assignments and impose grading penalities for each day the assignment is late.
Course Statement on Academic Honesty You only learn if your work is
your own. Cheating on exams or copying assignments will not be
tolerated. Please review the College's policies on Plagiarism and Cheating on
the College web site and in the following section.
Plagiarism is the presentation of someone else‘s ideas, words, or artistic, scientific, or technical work as one‘s own creation.
Using the ideas or work of another is permissible only when the original author is identified. Paraphrasing and summarizing,
as well as direct quotations require citations to the original source.
Plagiarism may be intentional or unintentional. Lack of dishonest intent does not necessarily absolve a student of responsibility
for plagiarism. It is the student‘s responsibility to recognize the difference between statements that are common knowledge
(which do not requiredocumentation) and restatements of the ideas of others. Paraphrase, summary, and direct
quotation are acceptable forms of restatement, as long as the source is cited.
Students who are unsure how and when to provide documentation are advised to consult with their instructors.
The Library has free guides designed to help students with problems of documentation.
(John Jay College of Criminal Justice Undergraduate Bulletin, see Chapter IV Academic Standards)
The grade of INC (Incomplete) is given by an instructor only when there is reasonable expectation that a student will
successfully complete course requirements. If this grade is unresolved by the end of the following semester, it will
automatically convert to the grade of F. Degree candidates should be aware that an INC grade received during their last
semester in courses required for graduation will result in the postponement of graduation. More detailed information
on college policies regards grades is available on the College web site. (John Jay College of Criminal Justice
Undergraduate Bulletin, see Chapter IV Academic Standards)
Course development sponsored in part by NSF grants 043044 and 0416494