SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1387
Methodologies to the Strategy of Computer Networking Research
laboratory
Mr. Sagar R. Mali1, Mr. Yogesh B. Amane2
1,2 Assistant Professor, Dept. of Computer Science and Engineering, AITRC Vita, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The preparation of computer networking
laboratories is a required task for academic platforms that
clarify computer networking connected issues. The following
paper delivers a study of the features and possible
development of different types of laboratory strategies
traditionally used in educational institutions.
Key Words: Research laboratory, Networking, Strategy,
Topology, Philosophy etc.....
1. INTRODUCTION
The significance of computer networking tools types the
devices and facilities used in the delivery and innovation of
knowledge related to them very important in theplanningof
curricular activities at any educational institution.Computer
networking laboratories are a essential element for
organizations that communicate computer networking
related issues. A sufficiently designed laboratory design
should allow for easy organization and flexibility in the type
of involvements that can be performed in it. Consuming a
onward looking attitude is essential in the preparation of
these services to ensure a lasting educational impact. Also
relevant is the acceptable planning of the involvements that
the students will conduct in the lab so that they estimatedor
duplicate real world experiences is also relevant. This work
provides an analysis of the methods to the strategy of
computer networking laboratories. For this analysis, a
review of the collected works related to the operation
methods for these facilities as well as the technical
experiences of one the authorshave been used.Thecommon
types of laboratory designs will be analyzed; the effect on
teaching methods for each design and the issue of remote
accessto a computer networking laboratory facilitywillalso
be addressed. The main types are laboratories based on a
physical, virtual organization. Among thechallengestosetup
these facilities are the allocation of physical universe, their
cost to shape and maintain. Reproduction software allows
one to build networks and instantiate network devices at
will through the software’s graphical user interface. When
Arranged properly, the software will simulate the network
asif it were a real one. Some advantagesof this type of setup
include that there is no real network to possibly damageand
therefore simulation provides a very safe environment for
learning. The size of the simulated network depends on the
computational power and time allocated to this effort. The
problem with this type of design is that the results of the
simulation are only as good as the code written into the
software and therefore there is a risk of not getting accurate
or accurate results from the simulations.Virtualisimportant
to understand that the term ‘virtual’ has recently taken on
several different meanings. In some examples ‘virtual’ has
come to mean remote access. For our purposes, a virtual
networking lab is one that uses virtualization software to
create virtual images of the software and hardware
components of a network. Figure 1 illustrates the different
design approaches for computer network laboratories.
2. LITERATURE SURVEY
The following section will survey some of the literature
already published about designing networking laboratories.
Again, this is neither a thorough nor mutually private list
only an effort to provide some reasoningbehindthedifferent
approaches to laboratory design. Their design also makes
use of virtualization technology. The use of virtualization
allows for the managers to easily create virtual OS images
that can be easily transferred to the student’s computers.
According to the authors a 75% reduction in time required
to set up the lab can be attained by using virtualization
methods to arrange 18 student computers for the many
types of lab involvements supported. This is an example of
how the use of virtualization and physical organization are
not mutually select in lab development. Vivar and Magna
[10] propose creating a physical networking lab that
connects to a central hub that is then connected to the
internet allowing for a physical lab available to anyone
remotely. There are many references featuring the virtual
lab as the most actual method of teaching students about
networking.
Girds and Tilley [6] propose using a virtual laboratory to
solve three issues.
i. High upfront costs
ii. Space constraints
iii. Cost of maintenance and monitoring
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1388
They note that cost savings for hardware are rather
moderated by the need for high performance machines
capable of running multiple virtual machines.
Baumgartner et al. [3] describe the use of virtual routers to
match physical networks. Virtual routers are individual
software procedures that process data packets just as a real
router would. They are not subject to the problems of
simulations nor are they subject to the high cost involved
with using physical networking hardware. Although there
are many advantages to using virtual routers one must be
careful when running multiple virtual routers on one
machine as the host OS will allocate resources according to
itsown commands and therefore may interfere withthereal
time processing of packets.
Perez-Hardy [11] proposes the use of network simulation
tools in an effort to solve the following problems
i. Cost of monitoring equipment
ii. Maintaining hardware and software
iii. Scalability
iv. Remote access
Remote access abilities to laboratories are a topic of rising
interest in the design of computer networking lab facilities.
The independent of remote access is to provide students
with the ability to control and arrange physical,simulatedor
virtualized hardware and software from a location other
than that where the hardware and software are physically
presented. Sloan [12] notes that although there are many
benefits to remote access the designer needs to take into
account three important challenges.
i. Safety
ii. Manageability
iii. Authenticity
Security refers to the ability of adjusting access to the lab’s
resources. Manageability is the quality of making the lab
easy to change, modify and repair. Authenticity is the ability
to provide thought irritating activities that help capable
learning of important concepts.
3. SELECTING A DESIGN
The following analysis is not designed to reach a conclusion
as to which type of design is the best but, just to associate
and contrast the different typesof designs so othersmayuse
this to help them make choices about which design to
implement based on academic and budget purposes.
Concessions are recognized on the basis of accessibility of
physical space and of funds for the laboratory, costs of
software licenses and previously installed infrastructure to
just mention a few. Physical labs, as discussed above, are
established using physical hardware and associated
software. There are two topologies for a physical lab setup:
centralized and spread. A centralized topology, asillustrated
in Figure 2 refers to having only one set of network
hardware devices centrally located for easy access and
maintenance. This however limitsthe disposaltostudentsas
only one group can work at a time.
A distributed (decentralized) topology, as illustrated in
Figure 3 is collected of several worktables each with itsown
network devices agreeing more than one group to work at a
time and even interconnect worktables. This style however
is more costly and its management requires more planning.
The most important advantage to using a physical
organization is that it delivers true hands-on experiencethat
is most similar to the environment students will be working
on when they leave school. Although some might consider
that communications with physical hardware are of
restricted value asmost equipment outlineisdonethrougha
software interface [6], it is the task of the mentor to design
laboratory involvements that will go elsewhere having the
student blindly use the guides provided by a software
interface and instead help serious sophisticated and hands-
on work. The greatest disadvantagesto setting up a physical
lab are space, cost and power. Simulation is a great option
for those whohave limited funds, and lackingorganizationto
support physical hardware. All one needs is a personal
computer capable of running the software. One of the most
visible problemswith simulation is the assumed accuracyof
the software. If the software is not developed correctly the
network will not work properly and students may not get
accurate results. Without constant updates simulation
software may not provide for capabilities that follow the
latest technology changesbut updating simulation software
is generally easier than updating or upgrading real
networking devices. Virtualized laboratories take some
aspects of physical hardware and simulation based labs.
Virtualization allows many physical devices and software
examples to be instantiated within a singlephysicalmachine.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1389
Elements such as hosts with different operating systems,
router devices and the connections between them can be
virtualized. An example of a virtual network might look
something like Figure 4. The use of virtualization for
laboratory operation involves using limited amounts of
physical systems and creating virtual instances of operating
systems and networking hardware includingroutersinthem
[3]. Virtual labs can be seen as cooperation between a
completely physical organization design and a simulation
based design. An attractive feature of virtual labs is that one
can growth the size of the lab by adding limited amounts of
new physical hardware and instantiating in them new
network hosts/devices.
A general choice in labs with virtualization is to setup
student PC’s using virtual images of the proper operating
system setup. This allowsthe lab administratortocreateone
correct setup and easily transfer it to eachstudentcomputer.
There are several Marketable software applicationsthatwill
help to create and manage a virtual lab. The most popular is
VMware’ssuite of applications that are used for creatingand
managing virtual machines. For setting OS permissions and
virtual image management Microsoft Application
Virtualization provides a good solution. In an effort to
summarize some of the features of the different lab designs
methods table 1 provides a comparison among them.
A popular decision in labs with virtualization is to setup
student PC’s using virtual images of the proper operating
system setup. This allowsthe lab administratortocreateone
correct setup and easily transfer it to eachstudentcomputer.
There are several commercial software applicationsthatwill
help to create and administer a virtual lab. The mostpopular
is VMware’s suite of applications that are used for creating
and managing virtual machines.
4. REMOTE ACCESS TO COMPUTER NETWORKING
LABS
In a world of growing inter-connectedness, physical
boundaries are increasing and lab designers need to take
into account those who strength need or want access to the
lab from remote locations. Any of the three design
approaches mentioned earlier can be prepared for remote
access.
A physical lab can be connected to a web server that is
available to anyone with an internet connection and can
authenticate user identifications to allow access to
equipment. In general, if remote access to physicaldevicesin
a lab infrastructure is a difficult undertaking that requires
alert planning. Redundancy of connections to the lab and
availability to its configuration platform need to be
measured.
Table 1. Comparison of lab design approaches
Remote access to simulation based labs can be provided
through remote desktop technology or byhavingthestudent
install the simulation software on a personal computer.
Virtual labs can also be accessed with the use of remote
desktop technology and if all of laboratory’s functionalities,
including connectivity setup are implemented through
virtualization software, the remote access wouldprovidean
almost equal involvement to the remote user as that of the
user.
5. INSTRUCTION AND LAB STRATEGY
The design of an instructional lab must be based on well-
informed academic purposes which aim at effectively
providing involvements to students that enhance their
learning and understanding.
Lawson and Stack pole [8] performed an experiment with
their Introduction to Network Administration class at RIT.
They had one group using remote access to a VMwareserver
and another group using a physical lab with VMware
workstations installed. Therefore one group was using a
physical lab with virtual machine images installed and the
other group used a remotely Available virtual environment.
The experiment found using a 95% confidence interval that
the students’ success was not depending uponthetypeoflab
that they used.
Students mentioned problems with self-motivation while
using the completely virtuallab due to the addeddifficultyof
using the virtualization software. Students using the virtual
lab expressed their desire in not being forced by lab access
which is one thing their peers had complained about.
Students using the in-class lab however had easier access to
the instructors.
Students in the in-class group scored better on all three
direct assessment measures: Lab Execution, Exams and
Workshop. The variations were: 5%, 5%, and 8%
respectively. Qualitative surveyswere administered to both
groups; some obvious differences arose. Remote students
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1390
found the teaching assistantsmore helpful but alsoreported
feeling the pace of the class was too quick. Some students in
the remote group also experienced technicaldifficultieswith
the remote interface. An exciting assumption was that the
remote lab provides a very good environment for repeating
lab projects even if the students had access to the physical
lab the first time.
From these studies we can see that learningoutcomescanbe
similar if not equal when comparing remote access to local
access. This issue needs further testing but is very
interesting to the authors.
6. SUMMARY AND CONCLUSION
Laboratory involvement is a necessary element in computer
networking courses as a solid base of theory is of no use
without the knowledge of how to put it into exercise. When
building a new networking laboratory it is necessary to
decide upon the type of approach to use: physical, virtual,
simulated, or some grouping of the three depending on
which one better suits academic goals and needs.
Among the issues to consider when deciding which type of
lab to use include the following: cost, space, power,
availability, remote access, course requirements, and
commercial support. Cost will likely be the causal factor but
sometimes a higher upfront cost will allow for greater
accessibility, better devices and therefore greater use of the
facility. If current trendsare any sort of model for the future,
remote access will be one of the most important features of
any laboratory facility for the teaching of computer
networking topics and their design, management and
academic value should be explored further.
REFERENCES
[1] Sam Disston and Carlos E. Caicedo,” Approaches to the
Design of Computer Networking Laboratories” in ITERA
conference, Nashville TN, in 2010
[2] S. Abbott-McCune, A. J. Newtson, J. Girard, and B. S. Goda,
"Developing a reconfigurable network lab," in 9th ACM
SIGITE conference on Information technology education,
2008, pp. 255-258.
[3] F. Baumgartner, et al. "Virtual Routers: A Tool for
Networking Research and Education." Computer
Communications Review 33 (2003): pp. 127-135.
[4] C. E. Caicedo and W. Cerroni, "Design of a Computer
Networking Laboratory for Efficient Manageability and
Effective Teaching," in ASEE/IEEE Frontiers in Education
Conference San Antonio, TX, 2009.
[5] P. Dillenbourg, "What do you mean by 'collaborative
learning'?" in Collaborative Learning: Cognitive and
Computational Approaches. Advances in Learning and
Instruction Series. New York: Elsevier Science,Inc.,1999,pp.
1-15.
[6] J. Girds and S. Tilley, "A conceptual overview of the
virtual networking laboratory," in 8th ACM SIGITE
conference on Information technology education, 2007, pp.
75-82.
[7] C. Gravier, et al. "State of the Art About Remote
LaboratoriesParadigms-FoundationsofOngoingMutations."
IJOE 4.1 (2008): 19-25.
[8] E. A. Lawson and W. Stackpole, "Does a virtual
networking laboratory result in similarstudentachievement
and satisfaction?," in 7th conference on Information
technology education: ACM, 2006.
[9] P. Roy, I. Altas, and J. Howarth, "An Implementation of a
Remote Virtual Networking Laboratory for Educational
Purposes," in Information Technology Based Higher
Education and Training, 2006. ITHET '06. 7th International
Conference on, 2006, pp. 71-76.
[10] M. A. Vivar and A. R. Magna, "Design, implementation
and use of a remote network lab as an aid to support
teaching computer network," in Digital Information
Management, 2008. ICDIM 2008. Third International
Conference on, 2008, pp. 905-909.
[11] S. Perez-Hardy, "The use of network simulation to
enhance network curriculum," in 4th conference on
Information technology curriculum:ACMNewYork,NY,USA,
2003, pp. 93-95.
[12] J. D. Sloan, "A remotely accessible networking
laboratory," Journal of Computing Sciences in Colleges, vol.
18, pp. 215-222, 2002.
BIOGRAPHIES
Mr. Sagar R. Mali, M. Tech CSE
Worked as Assistant Professor
AITRC, Vita. Sangli,
Shivaji University Kolhapur,
Maharashtra, India.
Mr. Yogesh B. Amane, M. Tech CSE
Worked as Assistant Professor
AITRC, Vita. Sangli,
Shivaji University Kolhapur,
Maharashtra, India.

Weitere ähnliche Inhalte

Was ist angesagt?

Ben gurion university_data_desert
Ben gurion university_data_desertBen gurion university_data_desert
Ben gurion university_data_desert
xband
 
Fyp slide presentation muiz
Fyp slide presentation muizFyp slide presentation muiz
Fyp slide presentation muiz
Muhd Mu'izuddin
 
Final_Project_Report_DT021_4_2011_Charlie_Weld
Final_Project_Report_DT021_4_2011_Charlie_WeldFinal_Project_Report_DT021_4_2011_Charlie_Weld
Final_Project_Report_DT021_4_2011_Charlie_Weld
Charlie Weld
 

Was ist angesagt? (19)

IRJET- Chest Abnormality Detection from X-Ray using Deep Learning
IRJET- Chest Abnormality Detection from X-Ray using Deep LearningIRJET- Chest Abnormality Detection from X-Ray using Deep Learning
IRJET- Chest Abnormality Detection from X-Ray using Deep Learning
 
Compe
CompeCompe
Compe
 
Ben gurion university_data_desert
Ben gurion university_data_desertBen gurion university_data_desert
Ben gurion university_data_desert
 
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELS
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELSTHE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELS
THE REMOVAL OF NUMERICAL DRIFT FROM SCIENTIFIC MODELS
 
Application of VLSI In Artificial Intelligence
Application of VLSI In Artificial IntelligenceApplication of VLSI In Artificial Intelligence
Application of VLSI In Artificial Intelligence
 
IRJET- Circuit BuildAR: Interactive Circuit Designing and Simulating
IRJET- Circuit BuildAR: Interactive Circuit Designing and SimulatingIRJET- Circuit BuildAR: Interactive Circuit Designing and Simulating
IRJET- Circuit BuildAR: Interactive Circuit Designing and Simulating
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
 
Fyp slide presentation muiz
Fyp slide presentation muizFyp slide presentation muiz
Fyp slide presentation muiz
 
WiPAt
WiPAtWiPAt
WiPAt
 
Federated learning
Federated learningFederated learning
Federated learning
 
Monitoring and Visualisation Approach for Collaboration Production Line Envir...
Monitoring and Visualisation Approach for Collaboration Production Line Envir...Monitoring and Visualisation Approach for Collaboration Production Line Envir...
Monitoring and Visualisation Approach for Collaboration Production Line Envir...
 
Final_Project_Report_DT021_4_2011_Charlie_Weld
Final_Project_Report_DT021_4_2011_Charlie_WeldFinal_Project_Report_DT021_4_2011_Charlie_Weld
Final_Project_Report_DT021_4_2011_Charlie_Weld
 
A Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse EngineeringA Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse Engineering
 
9 ijcse-01223
9 ijcse-012239 ijcse-01223
9 ijcse-01223
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
 
Cloak-Reduce Load Balancing Strategy for Mapreduce
Cloak-Reduce Load Balancing Strategy for MapreduceCloak-Reduce Load Balancing Strategy for Mapreduce
Cloak-Reduce Load Balancing Strategy for Mapreduce
 
TexGen: Open Source Software for Modelling of Textile Composites
TexGen: Open Source Software for Modelling of Textile CompositesTexGen: Open Source Software for Modelling of Textile Composites
TexGen: Open Source Software for Modelling of Textile Composites
 
A Survey on Heuristic Based Techniques in Cloud Computing
A Survey on Heuristic Based Techniques in Cloud ComputingA Survey on Heuristic Based Techniques in Cloud Computing
A Survey on Heuristic Based Techniques in Cloud Computing
 
Study on reliability optimization problem of computer By Dharmendra Singh[Srm...
Study on reliability optimization problem of computer By Dharmendra Singh[Srm...Study on reliability optimization problem of computer By Dharmendra Singh[Srm...
Study on reliability optimization problem of computer By Dharmendra Singh[Srm...
 

Ähnlich wie IRJET- Methodologies to the Strategy of Computer Networking Research laboratory

Server virtualization in higher educational institutions: a case study
Server virtualization in higher educational institutions: a case  studyServer virtualization in higher educational institutions: a case  study
Server virtualization in higher educational institutions: a case study
IJECEIAES
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Journals
 
Iaetsd pinpointing performance deviations of subsystems in distributed
Iaetsd pinpointing performance deviations of subsystems in distributedIaetsd pinpointing performance deviations of subsystems in distributed
Iaetsd pinpointing performance deviations of subsystems in distributed
Iaetsd Iaetsd
 

Ähnlich wie IRJET- Methodologies to the Strategy of Computer Networking Research laboratory (20)

Wise6 davidson
Wise6 davidsonWise6 davidson
Wise6 davidson
 
chapter 5.docx
chapter 5.docxchapter 5.docx
chapter 5.docx
 
chapter 5.pdf
chapter 5.pdfchapter 5.pdf
chapter 5.pdf
 
Final Year Project Report Example
Final Year Project Report ExampleFinal Year Project Report Example
Final Year Project Report Example
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENTA STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
 
Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
 
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
 
Server virtualization in higher educational institutions: a case study
Server virtualization in higher educational institutions: a case  studyServer virtualization in higher educational institutions: a case  study
Server virtualization in higher educational institutions: a case study
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
En35793797
En35793797En35793797
En35793797
 
Benchmarking Techniques for Performance Analysis of Operating Systems and Pro...
Benchmarking Techniques for Performance Analysis of Operating Systems and Pro...Benchmarking Techniques for Performance Analysis of Operating Systems and Pro...
Benchmarking Techniques for Performance Analysis of Operating Systems and Pro...
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
Iaetsd pinpointing performance deviations of subsystems in distributed
Iaetsd pinpointing performance deviations of subsystems in distributedIaetsd pinpointing performance deviations of subsystems in distributed
Iaetsd pinpointing performance deviations of subsystems in distributed
 
Email Spam Detection Using Machine Learning
Email Spam Detection Using Machine LearningEmail Spam Detection Using Machine Learning
Email Spam Detection Using Machine Learning
 
Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)
 
An approach of software engineering through middleware
An approach of software engineering through middlewareAn approach of software engineering through middleware
An approach of software engineering through middleware
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Kürzlich hochgeladen (20)

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 

IRJET- Methodologies to the Strategy of Computer Networking Research laboratory

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1387 Methodologies to the Strategy of Computer Networking Research laboratory Mr. Sagar R. Mali1, Mr. Yogesh B. Amane2 1,2 Assistant Professor, Dept. of Computer Science and Engineering, AITRC Vita, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The preparation of computer networking laboratories is a required task for academic platforms that clarify computer networking connected issues. The following paper delivers a study of the features and possible development of different types of laboratory strategies traditionally used in educational institutions. Key Words: Research laboratory, Networking, Strategy, Topology, Philosophy etc..... 1. INTRODUCTION The significance of computer networking tools types the devices and facilities used in the delivery and innovation of knowledge related to them very important in theplanningof curricular activities at any educational institution.Computer networking laboratories are a essential element for organizations that communicate computer networking related issues. A sufficiently designed laboratory design should allow for easy organization and flexibility in the type of involvements that can be performed in it. Consuming a onward looking attitude is essential in the preparation of these services to ensure a lasting educational impact. Also relevant is the acceptable planning of the involvements that the students will conduct in the lab so that they estimatedor duplicate real world experiences is also relevant. This work provides an analysis of the methods to the strategy of computer networking laboratories. For this analysis, a review of the collected works related to the operation methods for these facilities as well as the technical experiences of one the authorshave been used.Thecommon types of laboratory designs will be analyzed; the effect on teaching methods for each design and the issue of remote accessto a computer networking laboratory facilitywillalso be addressed. The main types are laboratories based on a physical, virtual organization. Among thechallengestosetup these facilities are the allocation of physical universe, their cost to shape and maintain. Reproduction software allows one to build networks and instantiate network devices at will through the software’s graphical user interface. When Arranged properly, the software will simulate the network asif it were a real one. Some advantagesof this type of setup include that there is no real network to possibly damageand therefore simulation provides a very safe environment for learning. The size of the simulated network depends on the computational power and time allocated to this effort. The problem with this type of design is that the results of the simulation are only as good as the code written into the software and therefore there is a risk of not getting accurate or accurate results from the simulations.Virtualisimportant to understand that the term ‘virtual’ has recently taken on several different meanings. In some examples ‘virtual’ has come to mean remote access. For our purposes, a virtual networking lab is one that uses virtualization software to create virtual images of the software and hardware components of a network. Figure 1 illustrates the different design approaches for computer network laboratories. 2. LITERATURE SURVEY The following section will survey some of the literature already published about designing networking laboratories. Again, this is neither a thorough nor mutually private list only an effort to provide some reasoningbehindthedifferent approaches to laboratory design. Their design also makes use of virtualization technology. The use of virtualization allows for the managers to easily create virtual OS images that can be easily transferred to the student’s computers. According to the authors a 75% reduction in time required to set up the lab can be attained by using virtualization methods to arrange 18 student computers for the many types of lab involvements supported. This is an example of how the use of virtualization and physical organization are not mutually select in lab development. Vivar and Magna [10] propose creating a physical networking lab that connects to a central hub that is then connected to the internet allowing for a physical lab available to anyone remotely. There are many references featuring the virtual lab as the most actual method of teaching students about networking. Girds and Tilley [6] propose using a virtual laboratory to solve three issues. i. High upfront costs ii. Space constraints iii. Cost of maintenance and monitoring
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1388 They note that cost savings for hardware are rather moderated by the need for high performance machines capable of running multiple virtual machines. Baumgartner et al. [3] describe the use of virtual routers to match physical networks. Virtual routers are individual software procedures that process data packets just as a real router would. They are not subject to the problems of simulations nor are they subject to the high cost involved with using physical networking hardware. Although there are many advantages to using virtual routers one must be careful when running multiple virtual routers on one machine as the host OS will allocate resources according to itsown commands and therefore may interfere withthereal time processing of packets. Perez-Hardy [11] proposes the use of network simulation tools in an effort to solve the following problems i. Cost of monitoring equipment ii. Maintaining hardware and software iii. Scalability iv. Remote access Remote access abilities to laboratories are a topic of rising interest in the design of computer networking lab facilities. The independent of remote access is to provide students with the ability to control and arrange physical,simulatedor virtualized hardware and software from a location other than that where the hardware and software are physically presented. Sloan [12] notes that although there are many benefits to remote access the designer needs to take into account three important challenges. i. Safety ii. Manageability iii. Authenticity Security refers to the ability of adjusting access to the lab’s resources. Manageability is the quality of making the lab easy to change, modify and repair. Authenticity is the ability to provide thought irritating activities that help capable learning of important concepts. 3. SELECTING A DESIGN The following analysis is not designed to reach a conclusion as to which type of design is the best but, just to associate and contrast the different typesof designs so othersmayuse this to help them make choices about which design to implement based on academic and budget purposes. Concessions are recognized on the basis of accessibility of physical space and of funds for the laboratory, costs of software licenses and previously installed infrastructure to just mention a few. Physical labs, as discussed above, are established using physical hardware and associated software. There are two topologies for a physical lab setup: centralized and spread. A centralized topology, asillustrated in Figure 2 refers to having only one set of network hardware devices centrally located for easy access and maintenance. This however limitsthe disposaltostudentsas only one group can work at a time. A distributed (decentralized) topology, as illustrated in Figure 3 is collected of several worktables each with itsown network devices agreeing more than one group to work at a time and even interconnect worktables. This style however is more costly and its management requires more planning. The most important advantage to using a physical organization is that it delivers true hands-on experiencethat is most similar to the environment students will be working on when they leave school. Although some might consider that communications with physical hardware are of restricted value asmost equipment outlineisdonethrougha software interface [6], it is the task of the mentor to design laboratory involvements that will go elsewhere having the student blindly use the guides provided by a software interface and instead help serious sophisticated and hands- on work. The greatest disadvantagesto setting up a physical lab are space, cost and power. Simulation is a great option for those whohave limited funds, and lackingorganizationto support physical hardware. All one needs is a personal computer capable of running the software. One of the most visible problemswith simulation is the assumed accuracyof the software. If the software is not developed correctly the network will not work properly and students may not get accurate results. Without constant updates simulation software may not provide for capabilities that follow the latest technology changesbut updating simulation software is generally easier than updating or upgrading real networking devices. Virtualized laboratories take some aspects of physical hardware and simulation based labs. Virtualization allows many physical devices and software examples to be instantiated within a singlephysicalmachine.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1389 Elements such as hosts with different operating systems, router devices and the connections between them can be virtualized. An example of a virtual network might look something like Figure 4. The use of virtualization for laboratory operation involves using limited amounts of physical systems and creating virtual instances of operating systems and networking hardware includingroutersinthem [3]. Virtual labs can be seen as cooperation between a completely physical organization design and a simulation based design. An attractive feature of virtual labs is that one can growth the size of the lab by adding limited amounts of new physical hardware and instantiating in them new network hosts/devices. A general choice in labs with virtualization is to setup student PC’s using virtual images of the proper operating system setup. This allowsthe lab administratortocreateone correct setup and easily transfer it to eachstudentcomputer. There are several Marketable software applicationsthatwill help to create and manage a virtual lab. The most popular is VMware’ssuite of applications that are used for creatingand managing virtual machines. For setting OS permissions and virtual image management Microsoft Application Virtualization provides a good solution. In an effort to summarize some of the features of the different lab designs methods table 1 provides a comparison among them. A popular decision in labs with virtualization is to setup student PC’s using virtual images of the proper operating system setup. This allowsthe lab administratortocreateone correct setup and easily transfer it to eachstudentcomputer. There are several commercial software applicationsthatwill help to create and administer a virtual lab. The mostpopular is VMware’s suite of applications that are used for creating and managing virtual machines. 4. REMOTE ACCESS TO COMPUTER NETWORKING LABS In a world of growing inter-connectedness, physical boundaries are increasing and lab designers need to take into account those who strength need or want access to the lab from remote locations. Any of the three design approaches mentioned earlier can be prepared for remote access. A physical lab can be connected to a web server that is available to anyone with an internet connection and can authenticate user identifications to allow access to equipment. In general, if remote access to physicaldevicesin a lab infrastructure is a difficult undertaking that requires alert planning. Redundancy of connections to the lab and availability to its configuration platform need to be measured. Table 1. Comparison of lab design approaches Remote access to simulation based labs can be provided through remote desktop technology or byhavingthestudent install the simulation software on a personal computer. Virtual labs can also be accessed with the use of remote desktop technology and if all of laboratory’s functionalities, including connectivity setup are implemented through virtualization software, the remote access wouldprovidean almost equal involvement to the remote user as that of the user. 5. INSTRUCTION AND LAB STRATEGY The design of an instructional lab must be based on well- informed academic purposes which aim at effectively providing involvements to students that enhance their learning and understanding. Lawson and Stack pole [8] performed an experiment with their Introduction to Network Administration class at RIT. They had one group using remote access to a VMwareserver and another group using a physical lab with VMware workstations installed. Therefore one group was using a physical lab with virtual machine images installed and the other group used a remotely Available virtual environment. The experiment found using a 95% confidence interval that the students’ success was not depending uponthetypeoflab that they used. Students mentioned problems with self-motivation while using the completely virtuallab due to the addeddifficultyof using the virtualization software. Students using the virtual lab expressed their desire in not being forced by lab access which is one thing their peers had complained about. Students using the in-class lab however had easier access to the instructors. Students in the in-class group scored better on all three direct assessment measures: Lab Execution, Exams and Workshop. The variations were: 5%, 5%, and 8% respectively. Qualitative surveyswere administered to both groups; some obvious differences arose. Remote students
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1390 found the teaching assistantsmore helpful but alsoreported feeling the pace of the class was too quick. Some students in the remote group also experienced technicaldifficultieswith the remote interface. An exciting assumption was that the remote lab provides a very good environment for repeating lab projects even if the students had access to the physical lab the first time. From these studies we can see that learningoutcomescanbe similar if not equal when comparing remote access to local access. This issue needs further testing but is very interesting to the authors. 6. SUMMARY AND CONCLUSION Laboratory involvement is a necessary element in computer networking courses as a solid base of theory is of no use without the knowledge of how to put it into exercise. When building a new networking laboratory it is necessary to decide upon the type of approach to use: physical, virtual, simulated, or some grouping of the three depending on which one better suits academic goals and needs. Among the issues to consider when deciding which type of lab to use include the following: cost, space, power, availability, remote access, course requirements, and commercial support. Cost will likely be the causal factor but sometimes a higher upfront cost will allow for greater accessibility, better devices and therefore greater use of the facility. If current trendsare any sort of model for the future, remote access will be one of the most important features of any laboratory facility for the teaching of computer networking topics and their design, management and academic value should be explored further. REFERENCES [1] Sam Disston and Carlos E. Caicedo,” Approaches to the Design of Computer Networking Laboratories” in ITERA conference, Nashville TN, in 2010 [2] S. Abbott-McCune, A. J. Newtson, J. Girard, and B. S. Goda, "Developing a reconfigurable network lab," in 9th ACM SIGITE conference on Information technology education, 2008, pp. 255-258. [3] F. Baumgartner, et al. "Virtual Routers: A Tool for Networking Research and Education." Computer Communications Review 33 (2003): pp. 127-135. [4] C. E. Caicedo and W. Cerroni, "Design of a Computer Networking Laboratory for Efficient Manageability and Effective Teaching," in ASEE/IEEE Frontiers in Education Conference San Antonio, TX, 2009. [5] P. Dillenbourg, "What do you mean by 'collaborative learning'?" in Collaborative Learning: Cognitive and Computational Approaches. Advances in Learning and Instruction Series. New York: Elsevier Science,Inc.,1999,pp. 1-15. [6] J. Girds and S. Tilley, "A conceptual overview of the virtual networking laboratory," in 8th ACM SIGITE conference on Information technology education, 2007, pp. 75-82. [7] C. Gravier, et al. "State of the Art About Remote LaboratoriesParadigms-FoundationsofOngoingMutations." IJOE 4.1 (2008): 19-25. [8] E. A. Lawson and W. Stackpole, "Does a virtual networking laboratory result in similarstudentachievement and satisfaction?," in 7th conference on Information technology education: ACM, 2006. [9] P. Roy, I. Altas, and J. Howarth, "An Implementation of a Remote Virtual Networking Laboratory for Educational Purposes," in Information Technology Based Higher Education and Training, 2006. ITHET '06. 7th International Conference on, 2006, pp. 71-76. [10] M. A. Vivar and A. R. Magna, "Design, implementation and use of a remote network lab as an aid to support teaching computer network," in Digital Information Management, 2008. ICDIM 2008. Third International Conference on, 2008, pp. 905-909. [11] S. Perez-Hardy, "The use of network simulation to enhance network curriculum," in 4th conference on Information technology curriculum:ACMNewYork,NY,USA, 2003, pp. 93-95. [12] J. D. Sloan, "A remotely accessible networking laboratory," Journal of Computing Sciences in Colleges, vol. 18, pp. 215-222, 2002. BIOGRAPHIES Mr. Sagar R. Mali, M. Tech CSE Worked as Assistant Professor AITRC, Vita. Sangli, Shivaji University Kolhapur, Maharashtra, India. Mr. Yogesh B. Amane, M. Tech CSE Worked as Assistant Professor AITRC, Vita. Sangli, Shivaji University Kolhapur, Maharashtra, India.