that if things go seriously wrongon a VPS, there is no physical machine to manually reboot. A laboratory administrator must befound to reboot the container from a master control utility. On the other hand, as a testament tothe quality of the isolation of the containers from each other, we have had no instances in whicha student’s application has been able to damage a VPS other than his own.Another limitation from a teaching perspective is that in order to maximize the efficiency of thesystem, software that is common to all the containers on the server should be pre-installed by thesystem administrator. This software image is then shared by all the VPS. This is not desirable ifwe need to give students experience with system administration tasks
with faculty teaching bothday and evening courses on a Monday - Thursday schedule. Fridays and weekends wereestablished as open laboratory times monitored by student workers. While not the bestarrangement, it did allow some student access to the facility outside of normal operatinghours. Figure 2 shows the initial facility layout. Figure 2 – Original Facility LayoutIn year three, additional problems were encountered. For the first two years, only thefirst four CCNP courses were scheduled and allowed a four-day schedule to function.When the remaining CCNP courses were incorporated into the facility schedule, it wasnecessary to increase to a five-day schedule with the facility only available weekends foropen laboratory
, 2005.10. Noerenberg, J.W., II Bridging wireless protocols. Communications Magazine, IEEE, 39 (11). 90-97.11. Planet3 Wireless. Introduction - CWNP career certifications, 2006.12. Richards, B. and Stull, B. Teaching wireless networking with limited resources Proceedings of the 35th SIGCSE technical symposium on Computer science education, ACM Press, Norfolk, Virginia, USA, 2004.13. Sarkar, N.I. Teaching computer networking fundamentals using practical laboratory exercises. IEEE Transactions on Education, 49 (2). 285-291.14. Shin, M., Ma, J., Mishra, A. and Arbaugh, W.A. Wireless network security and interworking. Proceedings of IEEE, 94 (2). 455-466.15. Snyder, J. Down and dirty with Wireless LAN security NetworkWorld
, we will continue to update and refine the development of courses and labs. Page 13.755.7Conclusions and Future WorkIn this paper, we describe the ongoing development of the integrated telecom curriculum andlaboratories. Currently, we already have most of the described equipments. Next, we plan onsetting up and testing the DMS-10, IP/PBX and the SONET devices. Following the testing, wewill interconnect the different networks. Additionally, we will develop new courses and labactivities to fully utilize the integrated laboratory resources. We also plan to evaluate how thisnew integrated laboratory affects teaching and the learning
involve Cyber-tools and Cyber-environments for Engineering Education, and Semantic Grids. Page 14.443.1© American Society for Engineering Education, 2009 Developing a Research and Education Laboratory for High Performance Computing and CyberinfrastructureAbstractHigh performance computing (HPC) and computational science are critical drivers of economicand research competitiveness in global science and engineering. The growth of open sourcesoftware and the universal availability of low cost, high performance computer componentsmake it possible to build powerful and inexpensive high performance computing systems
AC 2007-2819: DEVELOPING BASIC CRYPTOGRAPHY LAB MODULES WITHOPEN SSLEd Crowley, University of Houston Page 12.490.1© American Society for Engineering Education, 2007 Developing Basic Cryptography Lab Modules with OpenSSLPerceived topic: Innovative TeachingKeywords: Security, Cryptography, Open Source, Lab Development, NetworkingWhile there has been a recent proliferation of quality cryptography texts, there remains ashortage of quality applied laboratory exercises and related support materials. In part, thisis due to the cost and availability of commercial cryptographic software. In part, this isdue to the time and resource commitment required to develop laboratory
AC 2010-1432: EVALUATION OF A WEB-BASED LEARNING TOOL FORTEACHING GIS WITHIN THE CONTEXT OF TRANSPORTATIONENGINEERINGAshley Banaszek, Missouri University of Science and TechnologyHong Sheng, Missouri University of Science and TechnologyRichard Hall, Missouri University of Science and TechnologyRonaldo Luna, Missouri University of Science and TechnologyGhulam Bham, Missouri University of Science and Technology Page 15.537.1© American Society for Engineering Education, 2010 Evaluation of a Web-Based Learning Tool for Teaching GIS within the Context of Transportation EngineeringAbstractAn exploratory study was conducted to evaluate a web-based learning
acquired.ConclusionThe teaching of attack understanding based information assurance requires the use ofguaranteed isolation of laboratory networks. Providing Distance Education courses witha remote laboratory network presents challenges to providing adequate isolation. The useof IP-KVM switches adds a very strong layer of isolation, and in combination with theuse of emulation software such as VMWare or other virtual operating systemenvironment, provides an adequately isolated laboratory network for some exercises.References[1] Frincke, D., “Who watches the security educators?”, Security & Privacy Magazine, IEEE Volume 1, Issue 3, May-June 2003 Page(s):56 – 58[2] Eppes, T. & Schuyler, P., “A General-Purpose Distance Lab System
planning theeStudio Laboratory was that it be as hardware free and easy to support as possible.In an effort to achieve the same outcome as the General Engineering Department’s Studio90 environment, the eStudio Laboratory Planning Committee creatively did more withless. First, the original look and feel of the space prior to renovation was stale andindustrial. It was not a collaborative space that students would choose to congregate in orstudy. The room’s white walls were painted yellow and the grey linoleum tile wasoverlaid by red and yellow carpet. The final product is a collaborative teaching spacethat is attractively decorated in Arizona State University’s colors. It promotes Universitypride, spirit, and is one of the most attractive rooms at
curricula.Baccalaureate curricula were designed to allow students completing their Associate’s degrees ata satellite campus to transfer to the main campus and complete their Baccalaureate Degreecoursework.Known colloquially as the “2+2” system, this approach created a significant critical path concernin the networking degree plan of study. The satellite campuses do not have the faculty expertise,nor the space and funds to teach laboratory-based networking courses. As a result, all corelaboratory-based networking courses had to be delivered in the junior and senior years. Studentstook the majority of their non-core courses in the first two years, then took predominatelylaboratory-based core courses in their last two years.This created several curriculum design
technologies through a series of laboratory experiments using small-scaletest beds. The protocols and standards include IEEE 802.11 (a, b, g or simply WiFi)5,14,Bluetooth (IEEE 802.15)12, WiMAX (802.16)13, etc. The CIT program6 in the Department ofComputer Science7 at Northern Kentucky University17 offers several courses in networking andsystem administration. In general, students learn about many networking systems, but had rareopportunity to learn wireless networking technologies. A newly designed special topic course ofMobile and Wireless Network with hands-on laboratory experiments has demonstratedeffectiveness in teaching the concepts of different wireless network technologies. This course hasbeen offered to provide a practical view of mobile and
utilize the available network resources at home and gain some hands-on practice.Most of the laboratories designed for the computer networking courses are set up on campusnetworks11, 14, 15. The labs run on real devices which needs a budget. Those networks aremaintained by technical staff and shared by all the users, so students only have limited access tothe networks. Besides the traditional networking laboratories performed on real devices, there aresome other approaches to teach networking labs, such as virtual lab software13 and simulationtools. Simulation software1,5,8 can be used to simulate the network environment, so realequipment and networks are not necessary. For example, VMWare1,12 is used widely in theteaching of computer networks
AC 2007-913: UTILIZING VIRTUAL SOFTWARE TO PROVIDE HANDS-ONEXPERIENCE WITH SYSTEMS AND APPLICATIONS SOFTWARE FOR ISSTUDENTSJulie Mariga, Purdue University Julie R. Mariga Associate Professor Department of Computer and Information Technology (CIT) College of Technology Purdue University 401 North Grant Street Knoy Hall Rm 255 West Lafayette, IN 47907-2021 765-494-0879 jrmariga@purdue.edu Professor Mariga teaches in the Department of Computer and Information Technology (CIT) at Purdue University, in West Lafayette, IN. Her areas of interest include virtual technologies and increasing the number of women students within CIT. CIT offers degrees in both information systems
AC 2008-129: BUILDING AN EDUCATION PROGRAM FOR ENGINEERS INDIGITAL FORENSICSDavid Dampier, Mississippi State University Page 13.264.1© American Society for Engineering Education, 2008 Building an Education Program for Engineers in Digital Forensics David A. Dampier Jansen Cohoon Department of Computer Science and Engineering Mississippi State University dampier@cse.msstate.edu; jec9@msstate.eduAbstractThis paper describes an innovative laboratory based program that offers life-long learningactivities to working professionals in the law
HPC, one for undergraduates and onefor graduate students, that provides students with hands-on experience in designing, developing,and testing commodity-based supercomputing systems. In this paper, we describe a cost-effective and scalable approach that we developed for this course, which has been successfullydelivered over several semesters. We describe the curricular context, pedagogical approach, andoutcomes along with a detailed description of the approaches and strategies we used to develop ahands-on laboratory component that can be replicated by others seeking to develop similarcourses. We believe that our results will be useful to departments and institutions interested indeveloping curricula to answer the increasing needs presented by
Pusey’s statement concerning funding for a computer laboratory:“Harvard did not get to be where it is by spending old money on new things.”3It is possible that the Second World War delayed the academic progress of computing bydiverting academics such as Vannevar Bush and John von Neumann into national service;however the government resources that continued to be poured into computing followingthe war followed these scholars and others back to university laboratories upon theirreturn. The result was thriving university research at facilities that were well connected.The first academic computer activity consisted of course offerings to graduate studentsfollowing the war. At MIT, Caldwell began teaching a course in digital computers in theelectrical
AC 2009-858: ASSESSMENT OF THE WORLD WIDE WEB ANDTECHNOLOGY-ENHANCED LEARNING AT MIAMI UNIVERSITYMysore Narayanan, Miami University DR. MYSORE NARAYANAN obtained his Ph.D. from the University of Liverpool, England in the area of Electrical and Electronic Engineering. He joined Miami University in 1980 and teaches a wide variety of electrical, electronic and mechanical engineering courses. He has been invited to contribute articles to several encyclopedias and has published and presented dozens of papers at local, regional , national and international conferences. He has also designed, developed, organized and chaired several conferences for Miami University and conference sessions for a
exploration. Our simulation model has since been made available for free download on MathworksMATLAB Central. This simulation model is applicable for design space exploration forclassroom/laboratory teaching of wireless communication courses at both undergraduate andgraduate levels. Page 14.682.2IntroductionThe IEEE 802.11n is a currently emerging WLAN standard capable of providing dramaticallyincreased throughput, as well as improved range, reduced signal fading, over the existing IEEE802.11a/g WLAN standards. These benefits are achieved through use of MIMO (Multiple-Input,Multiple-Output) technology. The latest draft for IEEE 802.11n describes
knowledge of the field and also investconsiderable effort and resources in updating their technical curricula and laboratories toaccommodate these new developments in their field. Therefore instructional design in thisenvironment needs to respond to this continually changing technical landscape. Page 15.1109.1On the other hand, faculty tenure and promotion decisions in computing disciplines arefrequently based on successful research and peer-reviewed publication. Upgrading curricula isseldom well recognized and rewarded for faculty in higher education academic environments.Thus, updating of curricula places additional stress on busy faculty members
. Page 11.974.1© American Society for Engineering Education, 2006 Open Source Software and Live Linux CDs: Elements of Successful Lab ModulesIntroductionIn addition to the intellectual effort, hands-on lab development can require substantial budget,labor, and laboratory resources. Often, commercial software can require a significant budgetcommitment. At the same time, system configuration and software installation can also require asignificant labor commitment. In many colleges, incorporating laboratory activities into a classnecessitates the dedication of a physical room to a single course section. In many environments,obtaining the necessary budget, labor, and room resources for hands-on lab modules
. Nakagawa, H. Suda, M. Ukigai, Y. Miida, “An innovative hands-on laboratory for teaching a networking course”, Proceedings of the 33 rd ASEE/IEEE Frontiers in Education Conference, 14-20, Boulder, CO, USA. November 5-8, 2003.8. G. Steffen G, “Teaching Local Area Networking in a Secure Virtual Environment”, Proceedings of 2004 ASEE Annual Conference and Exposition, Salt Lake City, UT, USA, June 2004.9. http://www.virtualbox.org/wiki/VBox_vs_Others, retrieved February 3, 200910. S. Averitt, M. Bugaev, A. Peeler, H. Shaffer, E. Sills, S. Stein, J. Thompson and M. Vouk, “Virtual Computing Laboratory (VCL)”, Proceedings of the International Conference on the Virtual Computing Initiative, Research Triangle Park, North Carolina, USA, May
the middle of the summer, internsusually begin scheduling and coordinating their own extracurricular events. These activities arecritical to the team building and warm environment fostered at SPIRE-EIT.The Research EnvironmentThe architecture and interior design of the SPIRE-EIT research environment promotes opendiscussion and teamwork. The laboratory is located in the Engineering Teaching and ResearchComplex (ETRC), central to Iowa State University’s efforts to strengthen engineering education,research, and outreach. The workspace consists of five “pods” of three computers, one pod foreach research team of three participants. The space is open and flexible with the one wall servingas a whiteboard and projection space for five different
• Configuring IPv6 routing on Linux Fedora machines running the Quagga routing suite Page 12.988.9Further details on the lab configurations and the remote access tools used for this course arecovered in a separate paper; Teaching a Laboratory Based IPv6 Course in a Distance EducationEnvironment submitted by the authors.Student research papersEach student was required to write a research paper. Papers were submitted in standard IEEEconference paper format. Grading was done by panel of faculty and by student peers.Papers submitted by students covered the following topics. • IP Upgrade – An Engineering Exercise or a Necessity? • IPv6 and wireless
. Page 13.925.7Bibliography1. DeHart, J., Kuhns, F., Parwatikar, J., Turner, J., Wiseman, C., and Wong, K., "The Open Network Laboratory," Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, 2006 (pp 107-111).2. Elsharnouby, T., Udaya Shankar, A., "Using SeSFJava in Teaching Introductory Network Courses," Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, 2005 (pp 67-71).3. Halsall, F., "Computer Networking and the Internet," (Fifth Edition), Addison-Wesley, 2005.4. Kurose, J., and Ross, K., "Computer Networking," (Third Edition), Addison-Wesley, 2005.5. Shay W., "Understanding Data Communications and Networks," (Third Edition), Brooks/Cole, 2004.6
hypermedia system users are needed to maximize the usability,functionality, and success measures of adaptive hypermedia systems.Cognitive Styles: Definition, Models, and RelationshipsResearch on cognitive styles dates back to laboratory studies by Witkin et al. 10 with their ideasof field dependence-independence becoming one of the most widely studied dimensions of anindividual’s preferred and habitual approach to accepting, organizing, and representinginformation 14. Witkin et al. (1977) introduced the term cognitive style to describe the conceptthat “individuals consistently exhibit stylistic preferences for the ways in which they organizestimuli and construct meanings for themselves out of their experiences.” Witkin’s definition ofcognitive style
manager (Ernst and Young Consulting Turkey), where she added important values within 5 years. Also she worked in SAP Business for a long time and managed various SAP/ERP projects in Turkey and also abroad. Now she is serving in ERP, CRM and e-business categories as senior consultant and lecturing at various universities. Additional to these she is sometimes giving conference seminars and company trainings in her expertise areas. Dr. Baloglu has about 15 professional and academic papers, published in various technology magazines and books. And she currently works for Marmara University - Dept. of Computer Engineering under title of Asst. Prof and also teaches the some courses in