An Integrated Multimedia Based Platform For Teachi
An Integrated Multimedia Based Platform For Teachi
An Integrated Multimedia Based Platform For Teachi
Experimental results have shown that when instruction is able to use and clearly understand the system under
based on SMDs students develop a rich conceptual model consideration. Accordingly Nielsen developed criteria for
that is strongly aligned with that of an expert [5]. a successful user interface [9]. This was further developed
Significantly the SMD method is universally applicable by Johnston who proposed a security Human Computer
and it has been demonstrated that this method of device Interface (HCI-S) [10]. Certainly each method, CLI, SDM
and network protocol modeling can be used for all network and SMD each have their strengths and weaknesses (table
devices (switch, router, wireless access points etc) and 1). However it has been argued that:
associated protocols (routing, switching etc) [6].
Furthermore the SMD method has been found to be The SMD method user interface represents an intermediate
particularly useful when configuring complex security to the CLI and SDM. The SMD provides granular
devices and protocols such as PIX devices and Zone Based configuration control by means of independent but closely
Firewalls (ZBFs) [7]. It should be recognized that correct coupled functional groups [7].
network device configuration is of paramount importance.
evaluate the effects, if any, of remote access to users in Proceedings of the sixth ACM symposium on Access
other countries with communication links that may be control models and technologies, 2001.
problematic. [9] J. Nielsen and R. Molich, "Heuristic evaluation of user
interfaces," Proceedings of the SIGCHI conference on
Our trials accessing the system found that an average hour
Human factors in computing systems: Empowering people,
data consumption rate was around 218MB, which can be 1990.
calculated at approximately 0.48 Mbps or 496 Kbps [10] J. Johnston, J.H.P. Eloff, and L. Labuschagne, "Security and
bandwidth consumption. This was tested via a 7497/975 human computer interfaces," Computers & Security, vol.22,
Kbps ADSL connection. Some acceptable delay, of about pp.675-684, 2003.
2 seconds, may occur with this high bit rate. However, [11] Frequency asked questions: new CCNA curricula (2009),
when testing at the lower bandwidth 64kbps, the response December 2nd 2009,
rate of the system fell drastically. Delay was increased to http://www.cisco.com/web/learning/netacad/downloads/pdf/
10 seconds for any GUI action undertaking. As expected, newCCNAfaq.pdf
[12] W. Makasiranondh, S.P. Maj, and D. Veal, "A pedagogical
CLI commands could be used normally as they are purely
rich interactive on-line learning platform for Network
text based and were not affected by this slower connection. Technology students in Thailand," Thirteen Australasian
Computing Education Conference, In print.
[13] J. Piaget, The origins of intelligence in children, New York:
6. Conclusions International Universities Press 1952.
[14] P.T.J. James, "Academic staff perceptions of ICT and
This paper has demonstrated that remote, on-line access eLearning a Thai he case study," Turkish Online Journal of
may be considerably enhanced by incorporating three Educational Technology, vol.7, pp.36-45, 2008.
network configuration tools – the Command Line Interface, [15] M. Doms and C. Forman, Prices for local area network
State Model Diagrams and the Security Device Manager. equipment. Working papers in applied economic theory,
Despite the higher bandwidth overheads during 2003.
preliminary trials there was no measurable deterioration in
A/Prof S. P. Maj has been highly
performance except when using in the lower speed successful in linking applied research with
connection. Further work is needed in this important area curriculum development. He was awarded
of remote laboratory access. an ECU Research Leader of the Year in
2000, and Vice-Chancellor’s Excellence in
References Teaching Award in 2002, and 2009. He
[1] S.P. Maj, D. Veal, and L. Yassa, "A Preliminary Evaluation received a National Carrick Citation in
of the new Cisco Network Security Course," International 2006. He is the only Australian judge for
journal of computer science and network security, vol.10, the annual IEEE International Student
pp.183-187, 2010. Competition and was the first Australian
[2] S.P. Maj and D. Veal, "Using State Model Diagrams to reviewer for the American National Science Foundation (NSF)
Manage Secure Layer 2 Switches," International journal of Courses, Curriculum and Laboratory Improvement (CCLI)
computer science and network security, vol.10, pp.141-144, program.
2010.
[3] S.P. Maj, G. Murphy, and G. Kohli. "State models for Dr. David Veal is a Senior Lecturer at
internetworking technologies," Frontiers in Education, 2004. Edith Cowan University. He is the
FIE 2004. 34th Annual, F2G-10-15 2004. manager of Cisco Network Academy
[4] S.P. Maj and D. Veal, "State Model Diagrams as a Program at Edith Cowan University and be
Pedagogical Tool: An International Evaluation," Education, a unit coordinator of all Cisco network
IEEE Transactions on, vol.50, pp.204-207, 2007. technology units. His research interests are
[5] S.P. Maj, G. Kohli, and T. Fetherston, "A pedagogical in Graphical User Interface for the visually
evaluation of new state model diagrams for teaching handicapped and also computer network
internetwork technologies," Proceedings of the Twenty- modeling.
eighth Australasian conference on Computer Science -
Volume 38, 2005. Woratat Makasiranondh received the
[6] S.P. Maj and D. Veal, "An Evaluation of State Model B.Eng in Telecommunication Engineering
Diagrams for Secure Network Configuration and from Suranaree University of Technology,
Management," International journal of computer science and and M.S. degrees in Computer Science
network security, vol.10, pp.66-72, 2010. from Rangsit University in 2001 and 2005,
[7] S.P. Maj, W. Makasiranondh, and D. Veal, "An evaluation respectively. After working in the IT
of Firewall configuration methods," International journal of industry he became an academic member
computer science and network security, vol.10, pp.1-7, 2010. of Rangsit University. He is currently on
[8] T. Van den Akker, Q.O. Snell, and M.J. Clement, "The study leave and undertaking his doctorate
YGuard access control model: set-based access control," research at Edith Cowan University in the field of network
technology education.