Network Simulation Tools for Supporting Teaching in Computer Networks

Author(s):  
Shao Ying Zhu ◽  
Gerald Schaefer

Computer networks have evolved dramatically in recent years and consequently qualified and experienced network administrators are highly sought after, which in turn has led to the development of specialised computer networking courses at many universities. In this chapter, the authors investigate the use of network simulation tools as an alternative to be employed in computer networking laboratories. Network simulation tools provide students with the opportunity to freely experiment with virtual computer networks and equipment without the expensive costs associated with real networking hardware. The results of their research show that students appreciate the use of network simulators and see them as an effective approach to learning computer networking concepts and gaining the relevant experience. This was also confirmed by the actual performance of students who experienced different levels of exposure to networks simulators during their studies. The authors furthermore investigate the use of interactive, electronically assessed lab sessions, where students get immediate and interactive feedback while they are going through lab exercises. Their research shows that this approach not only releases the lecturer from less demanding students to better support weaker students, but that this will also lead to improved student performance and better student retention.

Author(s):  
Miguel Jose Hernandez y Lopez ◽  
Carlos Francisco Lerma Resendez

This chapter discusses the basic aspects of Honeypots, how they are implemented in modern computer networks, as well as their practical uses and implementation in educational environments, providing the reader with the most important points regarding the main characteristics of Honeypots and Honeynets. Honeypots are defined as “closely monitored network decoys” that can be set by network administrators to deal with a wide variety of attacks and interact with users in different levels (Provos, 2004). The implementation of Honeypots provides an answer to a common question posted by the field of information security and forensics: How to dissect the elements that make up an attack against a computer system. The chapter will summarizes the different features and capabilities of Honeypots once they are set up in a production environment to clarify the elements that are needed to be configured in order for a Honeypot to accomplish its main tasks and in order for it to be considered an effective tool. The end of the chapter will shift towards the analysis of virtualization as an important tool that maximizes the practical use of Honeypots in controlled environments that are focused towards the study of attacks, responses and analysis methods.


Author(s):  
М.Ю. Сергеев ◽  
Т.И. Сергеева

Описан подход к проектированию корпоративных компьютерных сетей с применением моделирующих систем. Предложена методика проектирования сети, выбора компонентов сети, настройки параметров работы сети, проверки работоспособности сети. Методика проектирования базируется на использовании CASE-средств моделирования сетей. Приведен алгоритм применения моделирующей системы Cisco Packet Tracer для проектирования компьютерной сети. An approach to the design of corporate computer networks using simulation systems is described. A methodology for designing a network, selecting network components, adjusting the parameters of the network, checking the operability of the network is proposed. The design methodology is based on the use of CASE network simulation tools. An algorithm for using the Cisco Packet Tracer simulation system for designing a computer network is presented.


Author(s):  
Nishesh Jain ◽  
Esfand Burman ◽  
Dejan Mumovic ◽  
Mike Davies

To manage the concerns regarding the energy performance gap in buildings, a structured and longitudinal performance assessment of buildings, covering design through to operation, is necessary. Modelling can form an integral part of this process by ensuring that a good practice design stage modelling is followed by an ongoing evaluation of operational stage performance using a robust calibration protocol. In this paper, we demonstrate, via a case study of an office building, how a good practice design stage model can be fine-tuned for operational stage using a new framework that helps validate the causes for deviations of actual performance from design intents. This paper maps the modelling based process of tracking building performance from design to operation, identifying the various types of performance gaps. Further, during the operational stage, the framework provides a systematic way to separate the effect of (i) operating conditions that are driven by the building’s actual function and occupancy as compared with the design assumptions, and (ii) the effect of potential technical issues that cause underperformance. As the identification of issues is based on energy modelling, the process requires use of advanced and well-documented simulation tools. The paper concludes with providing an outline of the software platform requirements needed to generate robust design models and their calibration for operational performance assessments. Practical application The paper’s findings are a useful guide for building industry professionals to manage the performance gap with appropriate accuracy through a robust methodology in an easy to use workflow. The methodological framework to analyse building energy performance in-use links best practice design stage modelling guidance with a robust operational stage investigation. It helps designers, contractors, building managers and other stakeholders with an understanding of procedures to follow to undertake an effective measurement and verification exercise.


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


2000 ◽  
Vol 37 (2) ◽  
pp. 136-145 ◽  
Author(s):  
G. B. Jones ◽  
E. Stipidis ◽  
E. T. Powner

The paper describes the use of computer assistance in teaching communications engineering. Today, the fast evolution of network communications makes teaching and learning a huge task. Commercial packages such as COMNET III greatly ease this aspect of learning and allow the student to experiment with ‘change and play’ scenarios.


2021 ◽  
Vol 32 (2) ◽  
pp. 6-25
Author(s):  
Zoltán Imre

The Budapest premiere of Henrik Ibsen’s Kísértetek (Gengangere) was on 17 October 1908 by the Thália Társaság, a Hungarian independent theatre. Though banned earlier, by 1908, Ibsen’s text had already been played all over Europe. Between 1880 and 1908, the search of IbsenStage indicates 402 records, but probably the actual performance number was higher. The popularity of the text can be seen in the fact that all the independent theatres staged it, and most of the famous and less famous travelling companies and travelling stars also kept it in their repertoires. Though, usually, the high-artistic independent and the commercial international and regional travelling companies are treated separately, here, I argue for their close real and/or virtual interconnections, creating such a theatrical and cultural network, in which the local, the regional, the national, and the transnational interacted with and were influenced by each other. At the turn of the nineteenth and twentieth centuries, such interaction among different forces and agents on different levels was one of the special features of cultural mobility (Greenblatt) which characterized intercultural theatre culture, existing in Europe and America, and extending its influence almost all over the globe.


KOMTEKINFO ◽  
2020 ◽  
Vol 7 (2) ◽  
pp. 159-170
Author(s):  
Heri Yanto ◽  
Febri Hadi

Network security is an important factor in guaranteeing data. Guaranteed security can avoid losses caused by attacks that occur in the network. Administrators play an important role in maintaining data or file security, but administrators cannot at all times monitor the security of the network. This problem can be overcome by adding a system for data traffic detection or called IDS. IDS will be linked by SMS Alert so that administrators can receive notifications of interruptions on the network. In this study, researchers conduct analysis and testing of problems that arise so that it will produce a system that is able to detect attacks or disruptions on the network quickly and can provide warnings to network administrators, so that administrators can take steps to anticipate these disruptions. Attacks can be detected from the pattern of attacks that are in the IDS rule so that intruders who try to enter will be detected and the system will send an SMS notification to the administrator.


Author(s):  
Sujitha S. ◽  
Manikandan M. S. K. ◽  
Ashwini G.

Designing and organizing networks has become extra innovative over the past few years with the assistance of SDN (software-defined networking). The software implements network protocols that undergo years of equivalence and interoperability testing. Software-defined networking (SDN) is a move toward computer networking that allows network administrators to programmatically initialize, manage, alter, and direct network behavior dynamically through open interfaces and abstraction of lower-level functionality. SDN controller is an application in software-defined networking (SDN) that manages run control to permit clever networking. SDN controllers are based on protocols, such as OpenFlow, that permit servers to inform switches where to send packets. This chapter explores SDN controllers.


F1000Research ◽  
2018 ◽  
Vol 6 ◽  
pp. 2120
Author(s):  
Adva Yeheskel ◽  
Adam Reiter ◽  
Metsada Pasmanik-Chor ◽  
Amir Rubinstein

Motivation: Many biologists are discouraged from using network simulation tools because these require manual, often tedious network construction. This situation calls for building new tools or extending existing ones with the ability to import biological pathways previously deposited in databases and analyze them, in order to produce novel biological insights at the pathway level. Results: We have extended a network simulation tool (BioNSi), which now allows merging of multiple pathways from the KEGG pathway database into a single, coherent network, and visualizing its properties. Furthermore, the enhanced tool enables loading experimental expression data into the network and simulating its dynamics under various biological conditions or perturbations. As a proof of concept, we tested two sets of published experimental data, one related to inflammatory bowel disease condition and the other to breast cancer treatment. We predict some of the major observations obtained following these laboratory experiments, and provide new insights that may shed additional light on these results. Tool requirements: Cytoscape 3.x, JAVA 8 Availability: The tool is freely available at http://bionsi.wix.com/bionsi, where a complete user guide and a step-by-step manual can also be found.


Author(s):  
Luis Gonzalez-Naharro ◽  
Jesus Escudero-Sahuquillo ◽  
Pedro J. Garcia ◽  
Francisco J. Quiles ◽  
Jose Duato ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document