The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes the use of learning by teaching (LBT) as an instructional strategy to promote standards education in an undergraduate computer science course. The main objective of this instructional strategy is to make students understand how standards and computer network technologies are fundamental resources to create and use both internet infrastructure and services in a multitude of devices...
Hubs and switches have been actively used devices in computer networks vision, over two (2) decades. As results, numerous approaches have been used with varying degrees of success to evaluate the performances of these devices in computer networks. A class of approach that has shown substantial promise is one that gives clear and predictive results regarding the numbers of workstations, servers and...
The exponential growth in mobile computing technology has resulted in the form of newer mobile devices with variable features and capabilities. Hence to maximise the utilisation of such devices, the mobile applications also need to be designed with capabilities to address the real-time as well as non-real-time services requirements using virtualization and distributed computing techniques. The prime...
This paper presents a new curriculum for the Computer Networks Design course intended as advanced course for computer science students. We have developed an adaptive curriculum, which introduces two CISCO CCNA 3 (LAN Switching) and 4 (WAN Technologies) courses instead of the existing (regular) tutorials and laboratory exercises. The students can choose whether they would like to learn the course by...
Traditional physical networking components form the basis of the Internet and the backbone of most enterprise networks. Virtual networking is essential in connecting virtual machines among themselves and to the physical world in any virtualization platform. In order to produce work ready IT graduates with practical, hands-on networking experience, it is desirable to provide an integrated virtual and...
In order to meet the needs for the curriculum reform of Electronic Engineering Department of Tsinghua University, we constructed routing and switching experimental platform using the control network technology based on ZTE's switches and three-layer routers. The platform supports the computer network experiment course and practice in open extracurricular for undergraduate.
The design of a technical education course based on the application of the PIGMALION method, which includes the use of active methodologies for adaptation to the EHEA, is presented. Key aspects of the method are described, and accompanied by examples, like the definition of specific objectives, creating a detailed activities plan using a variety of objectives, creating a detailed activities plan using...
This paper reports on a large-scale project to document the origins of the ARPANET, Packet Radio Net, SATnet, Ethernet, the NSFnet and most recently the Internet. The main objective is to create and collect, source material and preserve it for the future. Traditional oral history interviews are used along with new research methods and tools, such as distributed editing, or “collective memory experiments...
Networking is an important concept in the field of computing in the contemporary world. While networking equipment are readily available on the market, people in need of computer networks however often turn to other trained and qualified networking personnel to set up their required local area network. The fact that a network can physically and logically be represented and configured in different...
The self-similarity becomes one of the method of anomaly detection. The multi-layer `on-off' model of traffic source is developed. The generator implemented according this model allows generate traffic flow characterized by self-similarity. The ability of generation of traffic similar to malicious one is verified by experiments. The results confirm that proposed model is useful to produce traffic...
The cooperative assessment system promotes teamwork, increases the mental practice and develops the social skills that are so necessary in the working life. In this paper we present the experiences and methodologies undertaken to assess the subjects “Local Area Networks” and “Networks Integration” of the Degree in Technical Engineering in Telecommunications of the Higher Polytechnic School of Gandia...
Because of computer networks courses have its own characteristics the students pay more attention to the network capacity such as understanding and design applications. So it is suitable for decomposition of the task-driven teaching style. In this paper, we study the network technology and application of integrated design experiment, and design the network to form a task-driven experiment teaching...
The necessity of the HVDC centralized control system is analyzed, and studies confirm its feasibility. Building a HVDC centralized control system to integrate all of the independent HVDC systems, is helpful to: (1) reducing the requirements of human resources and equipments, centralizing and strengthening the maintenance team, enhancing maintenance capabilities internally, (2) achieving the state...
Combined with the characteristics of this course and the authors' teaching experience, a teaching method that seeks to innovate in teaching objective, teaching concept, teaching content, and teaching resources is proposed in this paper after deep consideration into the necessity to conduct teaching reform in the era in which computer networks is highly developed.
The e-learning systems using campus network of Hebei University and North China Electric Power University in China are introduced in this paper. The system composition, module function and interface of the e-learning systems are described respectively. These e-learning systems can be accessed anywhere by using personal computer terminal which is connected to the campus network. E-learning system based...
The increase in network traffic has lead to the concept of congestion in computer networks. The problem of network congestion control remains a major issue in today's computer networks. Despite various methods and algorithms that has been proposed, however due to the dynamic nature of computer networks, no universal control method has been widely accepted. This paper reviews various conventional methods...
When teaching computer networks as part of a computer engineering degree, emphasis is placed on higher-layer protocols while physical and data-link layers usually play a secondary role. Physical aspects of data communication are sometimes taught as an independent, not-related, topic whereas data-link concepts are ??hard?? to our students. We propose a new lab experience in which students can see IEEE...
Network vulnerability assessment has carried out a certain degree of research work in relative field. The common method for vulnerability assessment is hierarchical asset vulnerability assessment, in which vulnerability value is fixed and the weight of service is subjective. Thus the accuracy of calculation depends on experience and judgment. In this paper, according to CVSS (Common Vulnerability...
With the increasing of the complexity of computer networks, the research of network management system has become more and more important. Firstly, in order to make the network performance management satisfy the need of the fault-tolerant, learning ability and organizational ability, network performance multilevel control model is researched in this paper by combining with multi-Agent technology and...
It is desirable to work on different machines with the uniform consistent desktop computing environment when outside the familiar work place. This paper proposes a system called VirtHome, which aims to present users with such a consistent environment, including customized software, personal data and other abilities on any computer attached to a TCP/IP network, enabling users to work anywhere as if...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.