AC 2009-1453: REVISING A NETWORK ENGINEERING CURRICULUM TOREFLECT CURRENT INDUSTRY AND STUDENT TRENDSPhil Rawles, Purdue UniversityAnthony Smith, Purdue UniversityRaymond Hansen, Purdue UniversityJeffrey Sprankle, Purdue University Page 14.1033.1© American Society for Engineering Education, 2009 Revising a Network Engineering Curriculum to Reflect Current Industry and Student TrendsAbstractOne of the fastest changing areas of technology education is information technology. Within theInformation Technology (IT) field, the area of network engineering and security is changingespecially quickly. Ongoing issues such as machine and network security
F 55Along with the students’ identification numbers and course grade, the data file recorded the raw Page 14.496.5survey response data, the number of responses that are identified as reflecting introvertpersonalities, and the percent of the total responses that were introvert responses.Table 3 shows the summary statistics taken from the raw data files. The mean reflects theaverage number of responses that were “introvert” in nature. For example, in the CIT 155 class,the 102 students averaged about three introvert-based answers from the seven statements posedon the questionnaire. (We used the numeric count values rather than
program model and driven by a set of well-chosen learning outcomes. This curriculumuses the IS2002 model curriculum as a basis and is designed to reflect the UAE needs forgraduates that are well prepared to enter the workforce and to assume their place ofresponsibility in the nation. The goal of the College is to produce graduates having strongtechnology and communication skills as well as a good understanding of business practices andwork ethics.The academic program model is driven by two sets of learning outcomes at both the college andUniversity levels. All IS courses are developed to address College and University level learningoutcomes. Master course syllabi are developed to show the course contributions to variouslearning outcomes. During
, interest, surprise,contempt, disgust, shame, fear, anger, distress, sadness, and anxiety. Richard Lazarus (ascited in Priesmeyer et al.15) confirmed many of the basic emotions in this list through hisown research and provided much discussion about the interaction of emotions thatdirectly contributed to the interpretation and analysis of emotional dynamics in theEmogram system. An important step in the development of Emogram was the creation ofprecise photographs depicting varying degrees of the eleven basic emotions.The Emogram system provides measures of each of the emotions by combining responsesto low, medium, and extreme expressions of each. It also computes an overall EmotionalQuality (E-Quality) score that reflects the overall emotional
different platforms. Most hands-on exercises can be donelocally without Internet connection.Compared to the centralized remote lab, the virtual lab is very portable, inexpensive, can be runon the students’ computers, anywhere, and at any time. We have experimented with virtualmachines in a number of labs with a high degree of success. Feedback from students indicatedsatisfaction.1. IntroductionInformation and computer technology programs are plagued by several major challenges. First,computing technologies are evolving at a rapid pace, making it difficult for schools to maintainup-to-date technologies in physical labs due to budget constraints. Second, lab exercisesdeveloped by faculty have short life span and need to be updated to reflect new
/g standards bymore than ten times. In addition, techniques such as space-time block coding and beamformingprovide the potential of increasing signal strength at the receiver with optimal efficiency, basedon the diversity order used. In this paper, we present a brief historical narrative of the development of the standard, thenwe describe the three main proposals for the physical (PHY) layers in the original mainproposals for the 11n amendment (the TGn Sync, WWiSE and TGn Joint proposals). The JointProposal was adopted and it reflects the current PHY layer architecture described in Draft 3.0 forthe 11n amendment. Several design choices were made in the TGn Joint proposal regarding the areas of channelestimation (considering the use of
standard (omitting detailedpenetration analyses, as noted below). The course also covers roughly 80% of the core andelective learning outcomes of the Information Technology computing curriculum proposed in2005 by the Association for Computing Machinery2.2. Boundaries and FlowsThese two concepts were chosen as the organizing concepts or “themes” of the course.A boundary separates two elements of a system and may thereby provide a degree of protection.As stated in the US government’s Information Assurance Technical Framework (the IATF),“Information assets exist in physical and logical locations, and boundaries exist between theselocations”8. This statement reflects the fact that students must consider a system’s physical aswell as logical elements
colleagues assigned with the responsibility of promoting interest and enthusiasm for learning. Instructors are also encouraged to act as cognitive coaches who can nurture an environment that can support open inquiry. (Barrows, 2000). It is important that the aims and objectives of problem-based learning are reflected in every aspect of the learning environment created. Problem-based curriculum should document accomplishments at the upper levels of Bloom's Taxonomy Triangle. (Boud & Feletti, 1991). Scholars in the area of cognitive science and educational psychology have identified four features that clearly separate a problem-based curriculum from a traditional, topic-based curriculum. (Nickerson, et. al. 1985). In this
goalsin technical disciplines.This hidden assumption of product orientation in engineering and technology capstone courses isa significant issue because building a product or system for a customer provides an authenticlearning experience for the students. (“Authentic” here is used in the instructional design sense,IE a learning experience that closely reflects the professional practice the students will enter intoupon graduation.) Students pursuing authentic experiences in this manner show great enthusiasmfor learning both because the degree of control they perceive that they have over the process andbecause they sense that they are engaged in projects that are important to a real customer, IE theyare aware of and motivated by the authenticity of
interns, helping the faculty and graduatestudents with ongoing projects. This approach is valuable, but can lead to a sense of isolation ifthe participants cannot easily reflect with each other on their new experience. Other programsassign small groups of students to labs in order to decrease the potential for isolation. Thisresearch reports on the structure of a highly-successful REU site with a relatively rareconfiguration: 15 participants are co-located in a single lab but grouped in teams of three, andeach team works on an existing research project. This approach attempts to establish a intenselearning community1,2 within the REU, as discussed by other REU Site principle investigators3 inwhich students learn not only the relevant research
management response, transportation planning and control, forestry and agricultural management, tourism, and personal navigation. These applications illustrate the tremendous variation in both the geographic scale of the problem or issue being addressed and use of geographic information in these applications (7 Longley et al., 2005). Several agencies of the Federal government have recognized the need to increase the supply of Geospatial Technology professionals. These needs are reflected in the following research reports issues by the Federal government: The 2004 U.S. Department of Labor report Geospatial Industry Snapshot identified 12 diverse geospatial-related occupations, and employment in each was projected to increase
were diverse due to the varyingcircumstances of interference in the 2.4 GHz band. The outcomes reflected the fact that thereis some sort of interference that will occur depending on the different sources of interference.As the Bluetooth and IEEE 802.11 continue to grow and gain popularity, it becomes apparentthat more studies should be conducted to avoid the interference issue in the 2.4 GHz band. Toachieve this, IEEE 802.15.2 Task Group has been formed specifically to consider proposalsfor mechanisms to improve the level of coexistence between Bluetooth and IEEE 802.11devices and to come up with recommended practices derived from these.Although different authors discussed the effect of Bluetooth on IEEE802.11b and vice versa,none of them have
. Page 11.110.7 • Attacks based on timing are difficult to accurately emulate. • Network size is limited. • The large file sizes associated with virtual machines effects the file server performance.A configuration similar to Figure 5 using AMI MegaRACK IP-KVM switches, aWindows-based laboratory host OS, and VMWare Workstation version 5 was used toteach an advanced network security course with 21 students during the fall semester of2005 and used only two lab PCs. Remote laboratory access was available 24/7. Informalstudent surveys indicated general student acceptance and success. Formal assessmentstudies that reflect student learning, remote lab comfort level, and hardware usage will bepublished as data is
documents, mailing lists, and electronic data interchange forms from vendors andcustomers, social security numbers, and credit card numbers6,16,17,18,19. These critical data andinformation reported in the literature provide and initial understanding to the question addressedin this research.Research Methodology: Focus GroupThis section discusses the methodology used in this research, namely a focus group discussion,and demonstrates its appropriateness for addressing the research questions. The value of thismethodology lies not only in the individual responses of the participants but also in thediscussions that arise among the respondents that reflect a shared, social understanding of aparticular topic. Additionally the opportunity exists for
support team projects. • Selecting appropriate tools. • Learning to use tools effectively. • Assessment and reflection.2. OSS ToolsOSS tools can support specific team activities. However, teams usually perform a variety ofactivities, which could benefit from different tools. Teams can approach this situation in twoways. First, they can use a tool that provides multiple functions, and try to adapt it to multipleactivities. Second, they can use multiple tools, and try to make the tools work well together. Thefollowing sections describe some specific functions and tools, and then ways of combining them.2.1. Version ControlTeam members need reliable access to the most current version of a document, and they mayalso need access to
that all the various labels and descriptors for cognitive style could be grouped into twoorthogonal and bipolar dimensions: information processing and information coding. Commondescriptors along the information-processing dimension include Riding’s wholist/analytic,Allinson and Haye’s intuition-analysis, Kirton’s adaptor-innovator, and Witkin’s fielddependence-independence divisions of cognitive style. Each refers to the preferred way anindividual processes information 11. The second dimension identified by Riding is the verbal-imager dimension. This dimension reflects how individuals perceive or mentally codeinformation. Both dimensions are mutually exclusive and position on one dimension does notaffect position on the other.Differences
EC related course topics among overall importance, education and current known. Inorder to make the study more complete, we conducted a series of follow-up interviews with 12responding software engineers with most knowledge “learned in education”, and 12 respondentswith most knowledge “learned on the job”. Also, we compared the curriculum of IT departmentof a well-know vocational college in the southern part of Taiwan and interview the relevantfaculty of the IT department who are currently teaching the related EC-related topics torigorously justify our research results.All of the interviewees including the relevant faculty members asserted that the findings in thisstudy regarding the knowledge levels of each course can accurately reflect the
higher level.The Cognitive TheoryIt is widely known that programming, even at a simple level, is a difficult activity to learn. Why isthis so? Are novice difficulties really inherent in programming or are they related to the nature ofthe programming tools currently given to novices? Bonar and Soloway11 presented evidence thatcurrent programming languages do not accurately reflect the cognitive strategies used by noviceprogrammers. Instead, Bonar and Soloway11 have found that novice programmers possessknowledge and experience with step-by-step specifications in natural language. This knowledgeand experience gives them powerful intuitions for using a programming language. Programminglanguages, however, are not designed to appeal to these
protocol, wireless distribution system, and the classic wirednetwork.1. IntroductionThe introduction of wireless networking has allowed people the freedom to access networks,including the Internet, from almost any location. This fact has been reflected, in part, by a surgein laptop sales over the recent years. Vice president of Gartner’s worldwide computingplatforms, Charles Smulders, states that “Consumers are flocking to notebooks because of lowerprices, better performance, and an increased appreciation for wireless technologies.”5 Theincreased appreciation here stems from the transparently bridging technologies. According to anengineer at Qualcomm, “One of the fundamental design goals for 802.11 is to provide servicesthat are consistent
many students as opposed to Java or C++. Therefore, it was used in two coreprogramming courses (CIT 225 and CIT 320).Figure 2 shows the adopted sequence of courses from the second to the fourth year of thecurriculum. The levels in problem solving and critical thinking increase with the course contentand this is reflected by the change in color in the diagram that lists the sequence.Each course shows the leaning outcome that is associated with it and the master course syllabusclearly identifies that outcome.The master course syllabus is a critical component of the IT curriculum that addresses theintegration of desired learning outcomes into various courses of the curriculum. A master coursesyllabus was developed for all core and elective
. The GOMS model helped theauthor to reflect on the completeness, consistency, and efficiency of the concept mapdesign compared to the LMS design. The GOMS models for both interfaces are shown inTable 1.Table 1 Comparison of Tasks to Goal for Two Interfaces GOMS Task Description for Accomplishing the Same Goal with Two Different System Interfaces TECH 1313 via WebCT TECH 1313 via Course Map Method for accomplishing goal of: Complete Method for accomplishing goal of: CompleteActivities for TECH 1313 for the Week Activities for TECH 1313 for the WeekStep 1 Log on to WebCT and select TECH1313 course
in advancing computationtechnology. “The field is the product of the convergences of various disparate disciplinesand activities: library science, computer science (and its antecedent punched-cardtechnology), documentation of research and development, abstracting, indexing,communications science, behavioral science, micro- and macro-publishing, and video andoptical science, among others.”10 In the years since this has been written, this perspectiveof the inclusiveness of IS has perhaps become even broader.The origins of these programs reflect the discipline’s breadth. For example, a 1972 paperfrom Ohio State speaks of the Computer and Information Science department existent at
Page 12.878.4As is good practice, the highest risk aspects of the project were investigated first. To begin with,this was to determine the plausibility of a portable, bootable hard disk. Setting up an externaldrive to boot from is not difficult, but this project required that the disk be mobile to varioussystems, and easily boot them all. The operating systems of interest to the project wereWindows XP and Linux, so these were both investigated for suitability.When attempting to install Windows XP on a USB drive, problems immediately arose, when theinstaller halted before loading the OS. A call to Microsoft Technical Support revealed thatinstalling to an external disk is purposely disabled. A moment’s reflection brought therealization that boot
isproblematic.This paper describes elements of a methodology for creating hands-on lab activities thatminimize budget and support requirements. We have used this methodology to create hands-onactivities in Operating System, Networking, and Security contexts. These activities providestudents with concrete experience that the student can, in most cases, duplicate and extendoutside of the laboratory environment. These structured activities are accompanied by questionsand assignments that provoke reflection and stimulate critical thinking.Our experience has been that Open Source Tools and Live CDs are critical elements in thedesign of our hands-on learning activities. These two elements produce a synergy that facilitatesthe creation of learning experiences that
cost.Pedagogical ApproachProviding one form of education through lecture and reading alone is known to be an effective Page 15.637.4approach for only a subset of learners. In Kolb’s theory of experiential learning,11 the mosteffective learning environment provides learning in several modes: abstraction conceptualization,concrete experience, reflective observation, and active experimentation. The pedagogicalapproach to the courses seeks to provide a range of learning experiences in each of these areasthrough a combination of lectures, discussions, laboratory assignments, and challenges requiringstudents to solve at least one difficult problem in the
a required first-year engineering course with enrollments of as many as 1700 students in agiven semester. The earliest MEA implementations had student teams write a single solution to aproblem in the form of a memo to the client and receive feedback from their TA. For researchpurposes, a simple static online submission form, a static feedback form, and a single databasetable were quickly developed. Over time, research revealed that students need multiple feedback,revision, and reflection points to address misconceptions and achieve high quality solutions. As aresult, the toolset has been expanded, patched, and re-patched multiple developers to increaseboth the functionality and the security of the system. Because the class is so large and
implementation plan.The ImplicationsThe bottom line in this approach is that it provides an agile and essential Business ProcessManagement (BPM) analysis that is useful to sort out the processes for improvement. As in thisexample consider capturing the context envelope about who, what, where, when, how, and whysomething is needed with sufficient detail so that it can be engineered. This is the data about theorganization and this is referred to as the organization’s metadata. It is always part of thefundamental requirements. (Laware, 1993) These descriptive statements reflect the current ordesired needs by providing specific organizational data about who, what, where, when, how, andwhy something is needed. We can see that this information (location
by the Bro-ids and transformed into the Network connection datasuitable for data mining.Bro is an intrusion detection system that works by passively watching traffic seen on a networklink. It is built around an event engine that pieces network packets into events that reflectdifferent types of activity. Some events are quite low-level, such as the monitor seeing aconnection attempt; some are specific to a particular network protocol, such as an FTP request orreply; and some reflect fairly high-level notions, such as a user that was successfullyauthenticated during a login session. Bro runs the events produced by the event engine through apolicy script supplied to it by the administrator. Bro scripts are made up of event handlers thatspecify
for the LinksysStudents observe various MAC layer setting of Linksys wireless routers such as authenticationtype, CTS protection mode, beacon interval, DTIM interval, fragmentation threshold, and RTSthreshold. Students get knowledge about each of these parameters and how they affect theperformance of wireless networks. Students write a reflection report by including thoseparameters. 172.31.11.44/29 Lab Router Internet 10.255.1.1/16 10.255.1.2/16 Linksys Wireless
changesin the system dynamics 28. A self-tuning scheme is initially implemented using the poleassignment technique with JBC control. The hybrid collocated and non-collocated controlscheme is then realized with an adaptive JBC position controller and an inverse end-point-modelvibration controller. A recursive least squares algorithm is utilized to obtain an inverse model ofthe plant in parametric form. The problem of controller instability arising from the non-minimum phase characteristics exhibited in the plant model is resolved by reflecting the non-invertible zeros into the stability region. The performances of both schemes are investigatedwithin a flexible manipulator simulation facility. An alternative to the parametric approach described