Computer Networking (CSCI 379)
Spring 2015

Instructor Prof. Douglas Salane

  • office: 6.63.06
  • e-mail:dsalane@jjay.cuny.edu
  • web site: http://web.math.jjay.cuny.edu

Class Meetings

  • Section 01, Mon. and Wed., period 1, 8:00 - 9:15 am
  • Math Resource Center Computer Lab, Room NB 6.64.02

Office Hours

    Mon. and Wed. 2:00 - 3:00 pm or by appointment

Required Text

  • J.F. Kurose and K.W. Ross, Computer Networking: A Top Down Approach Featuring the Internet: Sixth Edition, Pearson (2013).
  • You can order the electronic version of the text from this site provided by the publisher's representative. Vital Source CourseSmart

Required Software The main program we will require is the widely used packet sniffer Wireshark. As soon as possible, visit the Wireshark Site and download the program to the laptop or computer you will use for assissignments - Linux and Windows versions are available. The program is free software. For developing client server applications, we will use the programming language Python. Python also is free software and can be downloaded from www.python.org

Exams/Grading Grades will be based on a midterm, a final and two major projects. In addition, there will be four or five homework assignments that must be handed in as well as several smaller computer assignments. The instructor will also assign readings from the web or papers. For each assigned reading, students will be expected to write a one page summary of the reading, which will be due the lecture after the reading is assigned.

Course Prerequisties The course requires students to have completed CSCI 272 or demonstrate comparable programming skill. No previous knowledge of computer networking is required. The stated catlog requirements are ENG 201, and CSCI 272 or MAT 272.

Course Description in College Bulletin CSCI 379 Computer Networking (Formerly MAT 379) The principles and methodologies used in the design and implementation of modern computer networks and networked information systems are studied in detail. Topics include shared use of a multiple access channel, error detection and recovery, and flow and congestion control. Packet switched networks and routing protocols are examined, and procedures for secure and reliable transport over best-effort deliver systems are presented. In addition, communication protocols above the transport level, for example, protocols that support the Internet and current Internet applications such as Web servers and clients, are discussed. Network programming is introduced, and students will be expected to develop several client/server applications.

Learning Outcomes

Course Objectives 1) Students gain the basic background in network hardware, software and architectures needed to design, manage and secure local area and intranet networks. 2) Students develop a working knowledge of layered computer communication protocols that are the building blocks of modern packet based computer networks and network applications. (The TCP/IP protocol suite will be examined in detail). 3) Students develop the ability to build simple client server applications. 4) Students will be aware of inhernet insecurities in software and protocols that play critical roles in modern networks and the Internet.

Supplemental Resources


  • W. Richard Stevens, TCP/IP Illustrated, Volume 1 - The Protocols, Addison Wesley (1994).

Web Sites

www.cert.org The Cert Coordination Center for security expertise at Carnegie Mellon University.
www.computer.org IEEE Computer Magazine home page.
www.isoc.org The Internet Society home page.
www.ietf.org The Internet Engineering Task Force. The RFCs are here.
www.wireshark.org A packet sniffer for Windows and Linux systems. Read the documentation carefully before downloading and installing.
www.python.org The Python home page. Python is available here as well as documentation and tutorials on python.

Other Resources (coming soon)

computer codes notes power point slides papers assignments

Projects (coming soon)

Course Schedule CSCI 379, Spring 2015

Announcements 1-27-15 Get access to the text as soon as possible. Install Wireshark as soon as possible as well.

Tutoring The Mathematics & Resource Center is located on the 6th floor of the New Building next to the Mathematics & Computer Science Dept. Tutors will be available throughout the semester to assist with programming assignments and use of software. The instructor will provide additional information in class.

Students with Disabilities Qualified students with disabilities will be provided reasonable academic accommodations if determined eligible by the Office of Accessibility Services (OAS). Prior to granting disability accommodations in this course, the instructor must receive written verification of a student’s eligibility from the OAS which is located at L66 in the new building (212-237-8031). It is the student’s responsibility to initiate contact with the office and to follow the established procedures for having the accommodation notice sent to the instructor. (Source,Reasonable Accomodations: Faculty Guide to Teaching Students with Disabilities, 4th ed., City University of New York, p.3)

Course Requirements/Policies Students are expected to attend all classes and take the exams at the scheduled times. Assigned readings and problems must be completed after each class. In addition, students will be expected to participate in class and offer solutions to problems. Programming assignments must be handed in on time. The instructor reserves the right to refuse late assignments and impose grading penalities for each day the assignment is late.

Course Statement on Academic Honesty You only learn if your work is your own. Cheating on exams or copying assignments will not be tolerated. Please review the College's policies on Plagiarism and Cheating on the College web site and in the following section.

College-wide Policies

Plagiarism Plagiarism is the presentation of someone else‘s ideas, words, or artistic, scientific, or technical work as one‘s own creation. Using the ideas or work of another is permissible only when the original author is identified. Paraphrasing and summarizing, as well as direct quotations require citations to the original source. Plagiarism may be intentional or unintentional. Lack of dishonest intent does not necessarily absolve a student of responsibility for plagiarism. It is the student‘s responsibility to recognize the difference between statements that are common knowledge (which do not requiredocumentation) and restatements of the ideas of others. Paraphrase, summary, and direct quotation are acceptable forms of restatement, as long as the source is cited. Students who are unsure how and when to provide documentation are advised to consult with their instructors. The Library has free guides designed to help students with problems of documentation. (John Jay College of Criminal Justice Undergraduate Bulletin, see Chapter IV Academic Standards)

Incomplete Grades The grade of INC (Incomplete) is given by an instructor only when there is reasonable expectation that a student will successfully complete course requirements. If this grade is unresolved by the end of the following semester, it will automatically convert to the grade of F. Degree candidates should be aware that an INC grade received during their last semester in courses required for graduation will result in the postponement of graduation. More detailed information on college policies regards grades is available on the College web site. (John Jay College of Criminal Justice Undergraduate Bulletin, see Chapter IV Academic Standards)

Course development sponsored in part by NSF grants 043044 and 0416494