TITLE

Content-Based Computer Simulation of a Networking Course: An Assessment

AUTHOR(S)
Javidi, Giti; Sheybani, Ehsan
PUB. DATE
March 2008
SOURCE
Journal of Computers;Mar2008, Vol. 3 Issue 3, p64
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This paper presents a successful lab simulation experience to teach signal modulation and demodulation concepts in communication and computer networks to computer science and computer engineering students. Two sections of the same college course with a total of 80 subjects participated in this study. After receiving the same lecture at the same time, the subjects in each course were randomly split into two treatment groups. One group completed two laboratory experiments using the computerized simulation program, while the other completed the same two laboratory experiments using the traditional physical laboratory equipments. Upon the completion of the laboratory assignments, the performance instrument was individually administered to each student. The groups were compared on understanding the concepts, remembering the concepts, and displaying a positive attitude toward the treatment tools. Scores on a validated Concepts Test were collected once after the treatment and another time after three weeks in order to gain some insight on students' knowledge retention. The validated Attitude Survey and qualitative study was administered at the completion of the treatment. The findings of this research indicate that conceptual simulation programs could be feasible substitute for hands-on exercises.
ACCESSION #
31949206

 

Related Articles

  • Content-Based Computer Simulation of a Networking Course: An Assessment. Giti Javidi; Ehsan Sheybani // Journal of Computers;Feb2008, Vol. 3 Issue 2, p64 

    This paper presents a successful lab simulation experience to teach signal modulation and demodulation concepts in communication and computer networks to computer science and computer engineering students. Two sections of the same college course with a total of 80 subjects participated in this...

  • A Simple Amplify-and-Forward Relaying Scheme Based on Clipping and Forwarding for Dual-Hop Transmissions. Xiao Juan Zhang; Yi Gong // Journal of Communications;Apr2010, Vol. 5 Issue 4, p348 

    In this paper, we propose a simple relaying protocol, namely clip-amplify-forward (CAF), for dual-hop transmissions. In the CAF relaying protocol, the received signal at the relay node is clipped firstly and then amplified with a fixed amplification gain before retransmission. Only a hard...

  • A new approach to QPSK: mechanism, simulation and implementation. Abuelmaatti, Ali; Abuelma'atti, Muhammad Taher; Thayne, Iain; Beaumont, Steve // International Journal of Electrical Engineering Education;Jul2010, Vol. 47 Issue 3, p343 

    The work reported in this paper serves two purposes. First, an alternative comprehensive approach is proposed for the understanding of the mechanism behind QPSK. This focuses on how a QPSK modulator decides to represent each pair of bits to be transmitted, by which of its four possible phase...

  • A Frame Synchronization Method with Robustness to the Effects of Initial SFO in DRM Systems. Ki-Won Kwon; Seong-Jun Kim; Park, Yong-Suk; Jong-Ho Paik // International Journal of Software Engineering & Its Applications;Jul2012, Vol. 6 Issue 3, p117 

    In this paper, we propose a synchronization method for Digital Radio Mondiale (DRM) receivers. In order to satisfy the advanced synchronization requirement of DRM receivers, the proposed method eliminates the initial sampling frequency synchronization (SFO) process in conventional...

  • MMFSK-EOD System Using Binary Hopping Pattern in FH/SS Communications. Hasegawa, Suguru; Tachikawa, Shin'ichi; Marubayashi, Gen // Journal of Communications;Mar2009, Vol. 4 Issue 2, p119 

    In this paper a detailed explanation of our newly proposed frequency hopped spread spectrum system named "MMFSK-EOD System Using Binary Hopping Pattern" (8) is presented. First, to make clear the concept of FH/M-ary Multilevel FSK modulation (abb. FH/ MMFSK or MMFSK), the waveform and the...

  • Best Mechanism for Increasing the Data Method for Controlling and Maintaining Efficient Technique in MANET. Karthick, S.; Adhimugasivasakthi, D.; Ganesan, M.; Laxmareddy, A.; Vetrivel, P. // International Journal of Computer Science Engineering & Technolo;Apr2014, Vol. 4 Issue 4, p92 

    A high performance and low power architecture is devised for a 8Mbps infrared wireless communication system dedicated to the mobile ad hoc network in this architectured, 8PPM (4-Pulse Position Modulations)infrared is signals detected by an infrared receiver are digitized pulses are demodulated...

  • Reliable Communication Using Topology Control in Mobile Ad-hoc Network. Deokule, Sunil; Malvadkar, Nivedita; Nimbalkar, Rupali // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 2, p991 

    The measurability of Mobile ad hoc network (MANET) is the precondition of its management, performance optimization and network resources re-allocations. The traditional network interior measurement technique performs measurement on the nodes or links directly, and obtains the node or link...

  • Modulation and Demodulation Techniques in Indoor Visible Light Communication System. Wang Hao; han zeyu // Applied Mechanics & Materials;2014, Issue 685, p306 

    Visible light communication technology is a emerging wireless and optical communication technology developed after invention and application of white LED.In this paper, we have a research based on indoor visible light communication system of lighting white LED,discuss of the visible light...

  • Modeling and Analysis of Security Protocols Using Colored Petri Nets. Yang Xu; Xiaoyao Xie // Journal of Computers;Jan2011, Vol. 6 Issue 1, p19 

    Security protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols function correctly. However, it is difficult to design security protocols that are immune to malicious attack, since good analysis techniques are lacking. In this paper, the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics