Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 4 |
Descriptor
Author
| Copeland, J. A. | 1 |
| Fairbanks, K. D. | 1 |
| Lee, C. P. | 1 |
| Lunsford, Dale L. | 1 |
| Marquez Hernandez, F. A. | 1 |
| Mateo Sanguino, T. J. | 1 |
| Mayrath, Michael Charles | 1 |
| Serrano Lopez, C. | 1 |
| Uluagac, A. S. | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Descriptive | 2 |
| Dissertations/Theses -… | 1 |
| Reports - Evaluative | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mateo Sanguino, T. J.; Serrano Lopez, C.; Marquez Hernandez, F. A. – IEEE Transactions on Education, 2013
A new educational simulation tool designed for the generic study of wireless networks, the Wireless Fidelity Simulator (WiFiSim), is presented in this paper. The goal of this work was to create and implement a didactic tool to improve the teaching and learning of computer networks by means of two complementary strategies: simulating the behavior…
Descriptors: Computer Simulation, Telecommunications, Information Networks, Computer Science Education
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Mayrath, Michael Charles – ProQuest LLC, 2009
This study examined the effects of manipulating the modality (text-only, voice-only, voice+text) of a tutorial and restriction (restricted vs. unrestricted) of a simulation's interface on retention and transfer of tutorial content. The tutorial prepared novice students to use Packet Tracer, a simulation developed by Cisco that teaches network…
Descriptors: Multiple Choice Tests, Interaction, Educational Technology, Computer Networks

Peer reviewed
Direct link
