Instructor: Rick Graziani
Office: Engineering 2 Room 569
E-mail: rgrazian@ucsc.edu Office hours: Tu/Thu, 12pm-1pm
Classroom: Engineering 2 506
Time: T/Th 9:50-11:25 AM
Teaching Assistants: Abdulazaz Albalawi (Aziz): aalbalaw@ucsc.edu
Lab: Baskin Engineering 109
Lab Session Schedule:
Monday 2:00pm - to 3:10 pm
Monday 3:10 pm - to 4:20 pm
Tuesday 3:00 pm - to 4:10 pm
Grading Scheme:
Labs: 40%
Project: 25%
Quizzes: 25%
Participation: 10%
Course Focus:
The goal of this course is twofold: first, to develop an understanding of networking protocols and how they work from hands-on experience building networks, and second, to give students an introduction on how to configure and administer networks. Both dedicated network equipment (Cisco) and general-purpose Linux systems are used in this course. The logic here is to give students experience with equipment used for building production networks, and with Linux systems which are typically used in prototyping and evaluating protocols developed in network research. This prepares students for work in both commercial and research environments.
Academic Honesty and Integrity:
In recent years, there has been an increased number of cheating incidents in many UC campuses, and unfortunately, UCSC is no exception. The School of Engineering has a zero tolerance policy for any incident of academic dishonesty. If cheating occurs, there may be consequences within the context of the course, and in addition, every case of academic dishonesty is referred to the students' college Provost, who then sets the disciplinary process in motion. Cheating in any part of the course may lead to failing the course and suspension or dismissal from the university.
What is cheating? In short, it is presenting someone else's work as your own. Examples would include copying another student's written or electronic homework assignment, or allowing your own work to be copied. Although you may discuss problems with fellow students, your collaboration must be at the level of ideas only. Legitimate collaboration ends when you "lend", "borrow", or "trade" written or electronic solutions to problems, or in any way share in the act of writing or electronically sharing your answers. If you do collaborate (legitimately) or receive help from anyone, you must credit them by placing their name(s) at the top of your paper.
What is Academic Integrity? This question is better answered with how we violate academic integrity. One prime example is fabrication. From the pages of the registrar:
Fabrication:
Another example of violating academic integrity is Facilitating Academic Dishonesty: