Course Information

Course syllabus

Course schedule and corresponding lecture notes

A Collection of Related Resources

Resource page

Add the following commands to your shell initializing script (~/.cshrc if you use tcsh, or ~/.bashrc if you use bash) to use Python 3. Once added, save the file, run either source ~/.cshrc or source ~/.bashrc depending on which shell you are using. Next time you log into the system, the environment will be set automatically.

To determine which shell you are using, type echo $SHELL and you should see the answer.

A list of common GDB commands

A day in a packet life (use MS Office PowerPoint to view it.)

Reviews

Labs

Projects

Project One: Search Engine -- A Client Server Program Pair : Team Project

Project Two: Emulation: Stop-and-go Protocol: Individual Project

Code Examples Used in the Lectures

Directory where the code examples reside

Code examples from Unix Network Programming by Stevens are in the directory of ~cs363/unpv13e/ on the Linux file system.

TCP congestion control implementation in Linux 2.6

Student Learning Outcomes

  1. Students will be able to function effectively in a project team (ABET d)
  2. Students will be able to design, test, and implement a complete computing system in software (ABET c, e)
  3. Students will be able to conduct laboratory experiements to validate hypotheses and interpret data (ABET a, b)

Related ABET Student Outcomes

(a) An ability to apply knowledge of mathematics, science and engineering

(b) An ability to analyze a problem, and identify and define the computing requirements appropriate to its solution

(c) An ability to design, implement, and evaluate a computer-based system, process, component, or program to meet desired needs

(d) An ability to function effectively on teams to accomplish a common goal

(e) An ability to identify, formulate, and solve engineering problems

Academic Responsibility

Bucknell University Honor Code

As a student and citizen of the Bucknell University community:
  1. I will not lie, cheat, or steal in my academic endeavors.
  2. I will forthrightly oppose each and every instance of academic dishonesty.
  3. I will let my conscience guide my decision to communicate directly with any person or persons I believe to have been dishonest in academic work.
  4. I will let my conscience guide my decision on reporting breaches of academic integrity to the appropriate faculty or deans.

Students are expected to read and abide by the principles clearly explained in the Student Handbook. Under no circumstance, should any student submit work that is not of his or her authorship. If a deadline is tight, or impossible, before getting desperate, talk to your instructor. It is better to be late than dishonest. Remember that your instructor's main goal is to give you the best opportunities to learn.

The university has a set of web pages that describe what we understand for Principles of Academic Responsibility and how it deals with cases of violations of these principles.

In addition to reading and understanding the university documents above, you are urged pay careful attention to the policy extensions applicable to courses in the Department of Computer Science.

Your instructor will make every effort to explain in detail the collaboration policy for each specific assignment. Before you start your work, make sure to read and understand this policy. Should any questions arise, contact your instructor immediately to have them clarified.


Last modified: Sat Dec 29 09:07:07 EST 2012