General information 

Instructor: Chen Qian <cqian12 at>, Office: E2-231

Class meeting time: Monday, Wednesday, and Friday 9:20AM-10:25AM

Classroom: Engineer 2 194

Office hours: Wednesday 11:00am - noon or by appointment


Teaching Assistants:


Shouqian Shi <>

TA Office hour:  by appointment


Course Focus 

This course provides an overview and study of graduate-level computer networking topics, Includes network models and switching techniques; medium access control protocols and local area networks; error control and retransmission strategies; routing algorithms and protocols; congestion control mechanisms and end-to-end protocols; application-level protocols; and application of concepts to wireless and wireline networks, with emphasis on both the Internet and emerging types of networks.

Course Prerequisites 

Undergraduate Computer Network course (CMPE150 or equivalence)

Textbook (Recommended)

1. Computer Networking: A Top-Down Approach

Additional research papers will be used as reading material

Academic Honesty And Integrity 

In recent years, there has been an increased number of academic integrity violation incidents in many UC campuses, and unfortunately, UCSC is no exception. The School of Engineering has a zero tolerance policy for any incident of academic dishonesty. If cheating occurs, they will result in academic sanctions in the context of the course, and in addition, every case of academic dishonesty is referred to the students' college Provost, who then sets the disciplinary sanctions. Cheating in any part of the course may lead to failing the course and suspension or dismissal from the University.

What is cheating? In short, it is presenting someone else's work as your own. Examples would include copying another student's written or electronic homework assignment, or allowing your own work to be copied. Although you may discuss problems with fellow students, when you submit an assignment with your name on it, it is assumed it is your own work. If you use ideas or text from others, you MUST cite your sources and give credit to whoever contributed to your work.

If there are any questions on what constitutes academic integrity violations, please make sure to talk to the instructor and/or the TAs for clarification. You are also referred to for additional information on UCSC's academic integrity policies and UC Santa Cruz Academic Misconduct Policy for Undergraduates,


Disability Resource Center (DRC) Resource

UC Santa Cruz is committed to creating an academic environment that supports its diverse student body. If you are a student with a disability who requires accommodations to achieve equal access in this course, please submit your Accommodation Authorization Letter from the Disability Resource Center (DRC) to me privately during my office hours or by appointment, preferably within the first two weeks of the quarter. At this time, I would also like us to discuss ways we can ensure your full participation in the course. I encourage all students who may benefit from learning more about DRC services to contact DRC by phone at 831-459-2089, or by email at 

Grading Rubric     
Category Percent
Course Project 30%
Midterm 25%
Reading reports 15%
Survey study 30%


There are around 15 research papers for the instructor/TA to present in total. You should submit no fewer than 8 reading reports. 

Each report will be graded as a check- (1pt), check (1.5pt), or check+ (2pt). 

You may submit more but we only count the 8 reports with highest grades. And you can earn up to 15 points from the readings. You can only submit at most one reading report for each lecture. So please plan ahead. 

Please use the following ways to submit your assignment:
Reading reports: canvas
Survey: canvas
Project: gitlab

Schedule (Tentative) 

Some slides are revised from the ones by Kurose/Ross and Simon Lam.

Date Topic Readings

Lecture Notes 

9.28 General class information

Personal Responsibility 

Cheating Quiz


Application layer 

 Kurose Book C2


Distributed hash table

 Kurose Book C2, Paper [1]



Network layer and routing

 Kurose Book C4&5 slides
10.8 Link layer

 Kurose Book C6

10.10 Data center networks

  Paper [2]


Data center networks

 Paper [4] and Paper [5] slides

 Data center networks

 Paper [3]   slides 

 Wireless and Mobile networking  

 Kurose Book C7 slides
10.19  Wireless and Mobile networking   Kurose Book C7  
10.22  Network security  Kurose Book C8 slides

 Strike, no class. You may still submit reading reports

 Paper [6]  
10.26   Wireless and sensor network routing   Paper [7]Paper [8] slides

 Algorithmic tool: Bloom filter 

(Dr. Qian attends for the ACM MobiCom conference

Minmei Wang will lecture the class)

 Paper [9]  and Paper [10] slides 

Algorithmic tool: Cuckoo hashing

(Dr. Qian attends the ACM MobiCom conference

Shouqian Shi will lecture the class)

Material [11] and Paper [12]

do not submit report on [11]


 Midterm Exam 

(Dr. Qian attends the ACM MobiCom conference)

11.5  Edge Computing Paper [14] slides
11.7  Edge Computing Paper [15]  slides
11.9  Othello Paper [13] slides
11.12  Holiday, no class    

Guest lecture by Robert Beverly from Naval

Postgraduate School about BGP Communities.  

BGP paper,    
11.16  IoT


Paper [19] 

11.19  IoT,  Survey report due Paper [20] slides
11.21  Cloud Paper [17] slides
11.23  No class, public holiday    
11.26  Internet latency Paper [21] slides
11.28  Survey/project presentation    
11.30  Survey/project presentation    
12.3  Survey/project presentation    
12.5   Survey/project presentation    
12.7   Survey/project presentation  


12.14  Project due by midnight