Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Virtual square (V2) in computer science education

Published: 27 June 2005 Publication History

Abstract

It is common to name as virtual the imaginary space that can be created by software using computers and networks. This space is not only a set of processing and communications means and methods but it is also a space where humans can "meet," exchange ideas, leave messages etc. Students in computer science must learn how to design, implement, manage and debug the systems and networks that create this virtual space. Furthermore, CS students need an experimental environment --a playground-- where they can develop their skills at creating and supporting these virtual environments.For this "playground" we propose a virtual world made up of emulated computer systems and emulated networks. This emulated world will be the students' testing environment, where they can run their own services, administer their own machines and set up security attacks without any danger to real networks and systems. It is a virtual space based on virtual machines and virtual networks but it is also a meeting place for computer science students, where they can test the effectiveness of their ideas.This "space" therefore is a twice virtual space, which we call virtual to the second power or virtual squared (V2). It is a virtual environment that is a also virtual location (i.e. a town square) where different real computers, virtual systems and people can meet and communicate.

References

[1]
R. R. Adams and C. Erickson. Linux in education: Teaching system administration with linux. Linux Journal, 2001.
[2]
R. Davoli. Ale4net sourceforge home page. http://ale4net.sourceforge.net.
[3]
R. Davoli. Virtual square home page. http://www.virtualsquare.org/.
[4]
R. Davoli. Teaching operating systems administration with user-mode linux. In Proc. of the 9th {ITiCSE} Conference on Innovation and Technology in Computer Science Education}, 2004.
[5]
R. Davoli. VDE: Virtual distributed ethernet. In Proc. of Tridentcom, 2005.
[6]
R. Davoli and M. Goldweber. New directions in operating systems courses using hardware simulators. In Proc. of International Conference on Simulation and Multimedia in Engineering Education (ICSEE), 2003.
[7]
S. B. et al. Pearpc home page. http://pearpc.sourceforge.net.
[8]
M. Goldweber, R. Davoli, and M. Morsiani. The Kaya OS project and the μMPS hardware simulator. In Proc. of the 10th {ITiCSE} Conference on Innovation and Technology in Computer Science Education, 2005.
[9]
K. Lawton. Bochs project home page. http://bochs.sourceforge.net.
[10]
M. Morsiani and R. Davoli. Learning operating system structure and implementation through the MPS computer system simulator. In Proc. of the 30th SIGCSE Technical Symposium on Computer Science Education, 1999.
[11]
Free operating system zoo project home page.
[12]
Qemu cpu emulator. http://fabrice.bellard.free.fr/qemu/index.org.html.
[13]
Slirp project home page.
[14]
The Computer Networks Research Group: University of Rome 3. Netkit: The poor man system for experimenting computer networks. http://www.netkit.org/.
[15]
VTUN virtual tunnel project home page.
[16]
User-mode linux. http://www.usermodelinux.org/.

Cited By

View all
  • (2015)Teaching Virtualization by Building a HypervisorProceedings of the 46th ACM Technical Symposium on Computer Science Education10.1145/2676723.2677254(424-429)Online publication date: 24-Feb-2015
  • (2024)Capability Ambient DO – A Usable Tool for Linux System SecurityComputer Safety, Reliability, and Security. SAFECOMP 2024 Workshops10.1007/978-3-031-68738-9_22(284-295)Online publication date: 17-Sep-2024
  • (2015)Teaching Virtualization by Building a HypervisorProceedings of the 46th ACM Technical Symposium on Computer Science Education10.1145/2676723.2677254(424-429)Online publication date: 24-Feb-2015
  • Show More Cited By

Recommendations

Reviews

Edgar R. Weippl

The space formed by networked computers is often referred to as being virtual. Students of computer science need to learn about computers and networks in a hands-on way; when teaching computer security in particular, a sandbox of networked systems is required to allow them to experiment in a safe environment. This sandbox is a virtual virtual space, thus the paper's title: "virtual square," V2. The V2 system is composed of virtual machines that are connected to a virtual network. Clearly, the performance of such a system suffers, but the system is very flexible, since the virtual machines can also be combined with real ones in a network. For instance, several real computers might attack a virtual server in a lab environment. The authors present a brief overview of software for emulated hosts and virtual networks. Most of the tools described were implemented by the authors, and are available as free and open software. While the approach described by the authors is certainly a very good one, a comparison to commercially available virtual machines (such as VMware or Virtual PC) would have been nice. VMware can also be used to set up virtual machines, and it offers different modes of networking between these virtual machines. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCSE Bulletin
ACM SIGCSE Bulletin  Volume 37, Issue 3
September 2005
418 pages
ISSN:0097-8418
DOI:10.1145/1151954
Issue’s Table of Contents
  • cover image ACM Conferences
    ITiCSE '05: Proceedings of the 10th annual SIGCSE conference on Innovation and technology in computer science education
    June 2005
    440 pages
    ISBN:1595930248
    DOI:10.1145/1067445
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 June 2005
Published in SIGCSE Volume 37, Issue 3

Check for updates

Author Tags

  1. administration
  2. laboratory
  3. networking
  4. operating systems
  5. security
  6. teaching
  7. virtual machine

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2015)Teaching Virtualization by Building a HypervisorProceedings of the 46th ACM Technical Symposium on Computer Science Education10.1145/2676723.2677254(424-429)Online publication date: 24-Feb-2015
  • (2024)Capability Ambient DO – A Usable Tool for Linux System SecurityComputer Safety, Reliability, and Security. SAFECOMP 2024 Workshops10.1007/978-3-031-68738-9_22(284-295)Online publication date: 17-Sep-2024
  • (2015)Teaching Virtualization by Building a HypervisorProceedings of the 46th ACM Technical Symposium on Computer Science Education10.1145/2676723.2677254(424-429)Online publication date: 24-Feb-2015
  • (2014)A network testbed for commercial telecommunications product testing2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)10.1109/SOFTCOM.2014.7039061(372-377)Online publication date: Sep-2014
  • (2011)Virtual heritage in the cloudProceedings of the 12th International conference on Virtual Reality, Archaeology and Cultural Heritage10.5555/2384495.2384520(153-160)Online publication date: 18-Oct-2011
  • (2011)A Structured Approach to Virtualization in Order to Support a Social Media Oriented Cloud ComputingProceedings of the 2011 First International Symposium on Network Cloud Computing and Applications10.1109/NCCA.2011.31(148-155)Online publication date: 21-Nov-2011
  • (2009)Secure Service-Oriented Grid Computing with Public Virtual Worker NodesProceedings of the 2009 35th Euromicro Conference on Software Engineering and Advanced Applications10.1109/SEAA.2009.73(555-562)Online publication date: 27-Aug-2009
  • (2008)View-OSProceedings of the 8th international conference on Computational Science, Part I10.1007/978-3-540-69384-0_34(287-296)Online publication date: 23-Jun-2008
  • (2006)On the Design of Virtual Machine Sandboxes for Distributed Computing in Wide-area Overlays of Virtual WorkstationsProceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing10.1109/VTDC.2006.8Online publication date: 17-Nov-2006

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media