Instructor: Rick Graziani
Office: Engineering 2 Room 569
E-mail:  rgrazian@ucsc.edu Office hours: Tu/Thu, 12pm-1pm

Classroom: Engineering 2 506 
Time: T/Th 9:50-11:25 AM

Teaching Assistants:  Abdulazaz Albalawi (Aziz): aalbalaw@ucsc.edu
Lab: Baskin Engineering 109

Lab Session Schedule: 
Monday 2:00pm - to 3:10 pm 
Monday 3:10 pm - to 4:20 pm
Tuesday 3:00 pm - to 4:10 pm


Grading Scheme:
Labs: 40%
Project: 25%
Quizzes: 25%
Participation: 10%

Course Focus:
The goal of this course is twofold: first, to develop an understanding of networking protocols and how they work from hands-on experience building networks, and second, to give students an introduction on how to  configure and administer networks. Both dedicated network equipment (Cisco) and general-purpose Linux systems  are used in this course. The logic here is to give students experience with equipment used for building  production networks, and with Linux systems which are typically used in prototyping and evaluating protocols  developed in network research. This prepares students for work in both commercial and research environments.

 

Academic Honesty and Integrity: 

In recent years, there has been an increased number of cheating incidents in many UC campuses, and unfortunately, UCSC is no exception. The School of Engineering has a zero tolerance policy for any incident of academic dishonesty. If cheating occurs, there may be consequences within the context of the course, and in addition, every case of academic dishonesty is referred to the students' college Provost, who then sets the disciplinary process in motion. Cheating in any part of the course may lead to failing the course and suspension or dismissal from the university.

What is cheating? In short, it is presenting someone else's work as your own. Examples would include copying another student's written or electronic homework assignment, or allowing your own work to be copied. Although you may discuss problems with fellow students, your collaboration must be at the level of ideas only. Legitimate collaboration ends when you "lend", "borrow", or "trade" written or electronic solutions to problems, or in any way share in the act of writing or electronically sharing your answers. If you do collaborate (legitimately) or receive help from anyone, you must credit them by placing their name(s) at the top of your paper.  

What is Academic Integrity? This question is better answered with how we violate academic integrity. One prime example is fabrication. From the pages of the registrar

Fabrication:

  • In any academic exercise, submitting falsified data including bibliographic resources and experimental data, or altering graded coursework/exams and resubmitting to the instructor for a higher score.

Another example of violating academic integrity is Facilitating Academic Dishonesty:

  • One form of this is answering questions on someone else's exam or doing someone else's homework for them.
  • Another form is helping another student take a test (allowing them to cheat from you).