Experiential Learning of Networking Technologies

2017 ◽  
Author(s):  
Ram P. Rustagi ◽  
Viraj Kumar

At the undergraduate level, most Computer Networking curricula aim to familiarize students with key networking technologies and standards, with an emphasis on breadth rather than depth of understanding. This is detrimental to students in two ways. First, students obtain a rudimentary or incomplete understanding of inherently complex yet fundamental concepts. Second, students are often unable to translate their limited understanding into diagnosis and action while troubleshooting networks. In this series of articles, we describe a small set of hands-on experiments (which have been iteratively refined over six years) that offer learners opportunities to reflect on their understanding. The feedback collected from our students confirms that this experiential learning helps students gain a lasting understanding of the workings of computer networks. All experiments can be conducted as 1-2 hour exercises in a networking lab, or even at home with minimal setup.

2018 ◽  
Author(s):  
Ram P. Rustagi ◽  
Viraj Kumar

With the rapid increase in the volume of e-commerce, the security of web-based transactions is of increasing concern. A widespread but dangerously incorrect belief among web users is that all security issues are taken care of when a website uses HTTPS (secure HTTP). While HTTPS does provide security, websites are often developed and deployed in ways that make them and their users vulnerable to hackers. In this article we explore some of these vulnerabilities. We first introduce the key ideas and then provide several experiential learning exercises so that readers can understand the challenges and possible solutions to them in a hands-on manner.


Itinerario ◽  
1996 ◽  
Vol 20 (3) ◽  
pp. 69-86 ◽  
Author(s):  
Pamela McVay

It is common wisdom among the historians of the Dutch East Indies that everyone in the Dutch East India Company engaged in private trade. That is, ‘everyone’ traded in goods supposedly monopolized by the Company and ‘everyone’ abused his or her position to squeeze graft from the Company's trade. It was, supposedly, to get their hands on the private trade and graft that people joined the Dutch East India Company (VOC: Vereenigde Oost-Indische Compagnie) in the first place. But back in the Netherlands the VOC's Board of Directors (the Heeren XVII) objected vociferously to private trade, which drained Company profits and shareholder revenue. To appease the Heeren XVII back at home, the various Governors-General and Councillors of the Indies (Raad van Indië), who represented the Heeren XVII in Asia, issued annual placards forbidding private trade while the High Court (Raad van Justitie) carried out infrequent desultory trials for private trade. But these prosecutions were inevitably doomed to failure, so the story goes, because everyone engaged in private trade would ‘cover’ for everyone else.


2017 ◽  
Author(s):  
Lianne Jeffs ◽  
Trevor Jamieson ◽  
Marianne Saragosa ◽  
Geetha Mukerji ◽  
Arsh K Jain ◽  
...  

BACKGROUND Early research in the area of virtual care solutions with peritoneal dialysis (PD) patients has focused on evaluating the outcomes and impact of these solutions. There has been less attention focused on understanding the factors influencing the uptake, usability, and scalability of virtual care for chronic kidney disease (CKD) patients receiving PD at home. OBJECTIVE In this context, a study was undertaken to (1) assess and understand the factors influencing the uptake of a virtual care solution and (2) provide recommendations for the scalability of a virtual care solution aimed at enhancing CKD patients’ outcomes and experiences. METHODS This study used a qualitative design with semistructured interviews and a thematic analysis approach. A total of 25 stakeholders—6 patients and 3 caregivers, 6 health care providers, 2 vendors, and 8 health system decision makers—participated in this study. RESULTS The following three primary mechanisms emerged to influence the usability of the virtual care solution: (1) receiving hands-on training and ongoing communication from a supportive team, (2) adapting to meet user needs and embedding them into workflow, and (3) being influenced by patient and caregiver characteristics. Further, two overarching recommendations were developed for considerations around scalability: (1) co-design locally, embed into the daily workflow, and deploy over time and (2) share the benefits and build the case. CONCLUSIONS Study findings can be used by key stakeholders in their future efforts to enhance the implementation, uptake, and scalability of virtual care solutions for CKD and managing PD at home.


2017 ◽  
Vol 15 (1) ◽  
pp. 42-56 ◽  
Author(s):  
Eyal Eckhaus ◽  
Galit Klein ◽  
Jeffrey Kantor

Management studies have been criticized for lagging behind the actual needs of organizations, ignoring experiential dimensions. We address this issue by applying experiential learning theory using an accountancy-oriented board game designed to help participants learn about cost management. The game was played in a pricing course with an enrolment of 104 accountancy students. We examined the impact levels of game entertainment and comprehensibility on the course material comprehension as well as the game’s impact on the final grade in the course. Results show that game participants had significantly higher grades than students that did not participate in the game, and that entertainment and comprehensibility of the game predict the understanding of course material. We also found that managerial employment capability can be predicted by level of challenge participants derive from the game. This study addresses the gap between traditional management education and practice. It provides empirical evidence of the value of hands-on gameplay experience for assimilation of course concepts and strategies. The results confirmed the importance of exposing players through an entertaining game simulation to challenges that arise in the business world. In addition, we lay the ground for future studies on the novel usage of the game as a tool to assess management skills.


Author(s):  
Daniel Roy Pearce ◽  
Mayo Oyama ◽  
Danièle Moore ◽  
Yuki Kitano ◽  
Emiko Fujita

In Japan, where there is a bias toward English-only in foreign language education, there are also grassroots efforts to introduce greater plurality in the classroom. However, introducing diverse languages and cultures into the classroom can lead to folklorization, the delivering of essentialized information in pre-packaged formats, which can potentially delegitimize other languages and cultures. This contribution examines a collaborative integrative plurilingual STEAM practice at an elementary school in Western Japan. In the ‘school lunches project,' the children experience various international cuisine, leading up to which they would engage with related languages and cultures through collaboratively produced plurilingual videos and museum-like exhibits of cultural artifacts. The interdisciplinary, hands-on, experiential learning within this project helped the children to develop an investigative stance toward linguistic and cultural artifacts, nurture a deeper awareness of languages and openness to diversity, foster reflexivity, and encourage interdisciplinary engagement.


Author(s):  
Peter J. Hawrylak ◽  
Chris Hartney ◽  
Mauricio Papa ◽  
John Hale

The Smart Grid will incorporate computer networking technologies into the electrical generation, transmission, and distribution sectors. Thus, there will be an underlying Critical Information Infrastructure (CII) based on these network connections. This CII is vulnerable to traditional cyber or computer based attacks typically geared toward disabling devices or networks. However, the Smart Grid is also vulnerable to physical attacks where sensors are tricked into reporting false conditions that cause the control system to react in an inappropriate manner. Cyber-physical attacks blending both cyber and physical attack components are also a possibility. Techniques to model cyber-attacks exist, and this chapter presents a modeling methodology, termed hybrid attack graphs, to model cyber-physical attacks. The hybrid attack graph formalism can be applied to develop best practice guidelines and security patches for the Smart Grid. This formalism can also be applied to other cyber-physical domains as well to help bridge the gap between the physical, logical, and network domains.


Sign in / Sign up

Export Citation Format

Share Document