CINXE.COM
{"title":"Authentic Learning for Computer Network with Mobile Device-Based Hands-On Labware","authors":"Kai Qian, Ming Yang, Minzhe Guo, Prabir Bhattacharya, Lixin Tao","volume":79,"journal":"International Journal of Computer and Information Engineering","pagesStart":894,"pagesEnd":900,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/16312","abstract":"<p>Computer network courses are essential parts of college computer science curriculum and hands-on networking experience is well recognized as an effective approach to help students understand better about the network concepts, the layered architecture of network protocols, and the dynamics of the networks. However, existing networking labs are usually server-based and relatively cumbersome, which require a certain level of specialty and resource to set up and maintain the lab environment. Many universities\/colleges lack the resources and build-ups in this field and have difficulty to provide students with hands-on practice labs. A new affordable and easily-adoptable approach to networking labs is desirable to enhance network teaching and learning. In addition, current network labs are short on providing hands-on practice for modern wireless and mobile network learning. With the prevalence of smart mobile devices, wireless and mobile network are permeating into various aspects of our information society. The emerging and modern mobile technology provides computer science students with more authentic learning experience opportunities especially in network learning. A mobile device based hands-on labware can provide an excellent ‘real world’ authentic learning environment for computer network especially for wireless network study. In this paper, we present our mobile device-based hands-on labware (series of lab module) for computer network learning which is guided by authentic learning principles to immerse students in a real world relevant learning environment. We have been using this labware in teaching computer network, mobile security, and wireless network classes. The student feedback shows that students can learn more when they have hands-on authentic learning experience. <\/p>\r\n","references":"<p>[1] M. Zyda, D. Thukral, J. Ferrans, \"Incorporating Mobile Games into a\r\nComputer Science Game Degree Program,\" Microsoft Academic Days\r\nConference on Game Development in Computer Science (GDCSE),\r\n2008.\r\n[2] D. Metcalf, S. Raasch, M. Milrad, A. Hamilton, D. Cheek, \"My Sports\r\nPulse: Increasing Student Interest in STEM Disciplines through Sports\r\nThemes,\" In Proceedings of Fifth IEEE International Conference on\r\nWireless, Mobile, and Ubiquitous Technology in Education, March 23-\r\n26, 2008.\r\n[3] Q. Mahmoud, A. Dyer, \"Mobile Devices in an Introductory\r\nProgramming Course,\" Computer, vol. 41, no. 6, pp. 105, 106-107, June\r\n2008.\r\n[4] M. Lombardi, \"Authentic Learning for the 21st Century: An Overview,\"\r\nELI White Papers, EDUCAUSE Learning Initiative (ELI), 2007,\r\navailable at http:\/\/www.educause.edu\/library\/resources\/authenticlearning-\r\n21st-century-overview, retrieved on Dec. 1, 2012.\r\n[5] J. Brown, A. Collins, and P. Duguid, \"Situated Cognition and the\r\nCulture of Learning, Educational Researcher, 18, n1, pp.32-42, 1989.\r\n[6] J. Lave and E. Wenger, Situated Learning: Legitimate Peripheral\r\nParticipation (Learning in Doing: Social, Cognitive and Computational\r\nPerspectives), Cambridge University Press, 1991.\r\n[7] J. Herrington and R. Oliver, \"An instructional design framework for\r\nauthentic learning environments,\" Educational Technology Research\r\nand Development, 48(3), pp. 23-48. 2000.\r\n[8] J. Herrington, J. Mantei, A. Herrington, I. Olney, and B. Ferry, New\r\ntechnologies, new pedagogies: Mobile technologies and new ways of\r\nteaching and learning, (eds.), University of Wollongong, 2009, 138p,\r\nISBN: 978-1-74128-169-9.\r\n[9] S. Caltagirone, P. Ortman, S. Melton, D. Manz, K. King, and P.W.\r\nOman, \"RADICL: A Reconfigurable Attack-Defend Instructional\r\nComputing Laboratory,\" Security and Management, Jun. 20-23, 2005,\r\nLas Vegas, Nevada, USA.\r\n[10] W. Yurcik and D. Doss, \"Different Approaches in the Teaching of\r\nInformation Systems Security,\" in Proceedings of the 2001 Information\r\nSystems Education Conference (ISECON'01), Nov. 2001, Cincinnati,\r\nOH, USA.\r\n[11] A. Koch, \"DroidSheep,\" http:\/\/droidsheep.de, accessed on Oct. 29,\r\n2012.\r\n[12] R. Rosauro, \"DroidWall - Android Firewall,\"\r\nhttp:\/\/code.google.com\/p\/droidwall, accessed on Oct. 29, 2012.<\/p>\r\n","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 79, 2013"}