Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30309
Authentic Learning for Computer Network with Mobile Device-Based Hands-On Labware

Authors: Kai Qian, Ming Yang, Minzhe Guo, Prabir Bhattacharya, Lixin Tao

Abstract:

Computer network courses are essential parts of college computer science curriculum and hands-on networking experience is well recognized as an effective approach to help students understand better about the network concepts, the layered architecture of network protocols, and the dynamics of the networks. However, existing networking labs are usually server-based and relatively cumbersome, which require a certain level of specialty and resource to set up and maintain the lab environment. Many universities/colleges lack the resources and build-ups in this field and have difficulty to provide students with hands-on practice labs. A new affordable and easily-adoptable approach to networking labs is desirable to enhance network teaching and learning. In addition, current network labs are short on providing hands-on practice for modern wireless and mobile network learning. With the prevalence of smart mobile devices, wireless and mobile network are permeating into various aspects of our information society. The emerging and modern mobile technology provides computer science students with more authentic learning experience opportunities especially in network learning. A mobile device based hands-on labware can provide an excellent ‘real world’ authentic learning environment for computer network especially for wireless network study. In this paper, we present our mobile device-based hands-on labware (series of lab module) for computer network learning which is guided by authentic learning principles to immerse students in a real world relevant learning environment. We have been using this labware in teaching computer network, mobile security, and wireless network classes. The student feedback shows that students can learn more when they have hands-on authentic learning experience. 

Keywords: Mobile Computing, Network, android, labware

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1086975

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1679

References:


[1] M. Zyda, D. Thukral, J. Ferrans, "Incorporating Mobile Games into a Computer Science Game Degree Program," Microsoft Academic Days Conference on Game Development in Computer Science (GDCSE), 2008.
[2] D. Metcalf, S. Raasch, M. Milrad, A. Hamilton, D. Cheek, "My Sports Pulse: Increasing Student Interest in STEM Disciplines through Sports Themes," In Proceedings of Fifth IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education, March 23- 26, 2008.
[3] Q. Mahmoud, A. Dyer, "Mobile Devices in an Introductory Programming Course," Computer, vol. 41, no. 6, pp. 105, 106-107, June 2008.
[4] M. Lombardi, "Authentic Learning for the 21st Century: An Overview," ELI White Papers, EDUCAUSE Learning Initiative (ELI), 2007, available at http://www.educause.edu/library/resources/authenticlearning- 21st-century-overview, retrieved on Dec. 1, 2012.
[5] J. Brown, A. Collins, and P. Duguid, "Situated Cognition and the Culture of Learning, Educational Researcher, 18, n1, pp.32-42, 1989.
[6] J. Lave and E. Wenger, Situated Learning: Legitimate Peripheral Participation (Learning in Doing: Social, Cognitive and Computational Perspectives), Cambridge University Press, 1991.
[7] J. Herrington and R. Oliver, "An instructional design framework for authentic learning environments," Educational Technology Research and Development, 48(3), pp. 23-48. 2000.
[8] J. Herrington, J. Mantei, A. Herrington, I. Olney, and B. Ferry, New technologies, new pedagogies: Mobile technologies and new ways of teaching and learning, (eds.), University of Wollongong, 2009, 138p, ISBN: 978-1-74128-169-9.
[9] S. Caltagirone, P. Ortman, S. Melton, D. Manz, K. King, and P.W. Oman, "RADICL: A Reconfigurable Attack-Defend Instructional Computing Laboratory," Security and Management, Jun. 20-23, 2005, Las Vegas, Nevada, USA.
[10] W. Yurcik and D. Doss, "Different Approaches in the Teaching of Information Systems Security," in Proceedings of the 2001 Information Systems Education Conference (ISECON'01), Nov. 2001, Cincinnati, OH, USA.
[11] A. Koch, "DroidSheep," http://droidsheep.de, accessed on Oct. 29, 2012.
[12] R. Rosauro, "DroidWall - Android Firewall," http://code.google.com/p/droidwall, accessed on Oct. 29, 2012.