Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Sciences

Studying The Performance Of A Firewall In Network Courses, José M. Garrido Dec 2005

Studying The Performance Of A Firewall In Network Courses, José M. Garrido

Faculty and Research Publications

This paper presents a simple simulation model of a firewall to derive several performance metrics and briefly argues on the importance and value of modeling and simulation in courses that study various aspects of perimeter defense in network security.

The simulation model mentioned previously is part of an effort by faculty of our department to develop a multi-disciplinary repository of computational models that includes object-oriented discrete-event simulation models. One of the goals of this repository is to build resources that help educate students of computer science, software engineering, and information technology, in modeling and information security.

This and other network …


Using An Easy-To-Use And Free Tool In Teaching And Researching Networks And Security Issues, Victor A. Clincy Dec 2005

Using An Easy-To-Use And Free Tool In Teaching And Researching Networks And Security Issues, Victor A. Clincy

Faculty and Research Publications

ITGuru is a powerful simulation environment developed by OpNET Corporation. ITGuru is unique because of its ability to model the entire networking domain, including its routers, switches, protocols, servers, and the individual applications they support. ITGuru improves network researchers' and instructors' ability to identify and solve problems throughout the network. The OpNET Corporation provides a FREE academic copy of their simulation environment to universities for both teaching and research.


J2me Programming, Chong-Wei Xu Dec 2005

J2me Programming, Chong-Wei Xu

Faculty and Research Publications

Handheld devices, such as programmable cell phones and personal digital assistants (PDAs), have already become more numerous than PCs. Students need to be prepared today to work on the most widely available computing platforms of tomorrow. With their small size and mobility, these handheld devices present both new opportunities and unique software engineering challenges. J2ME stands for Java 2 Micro Edition that is one of the three Java Editions (J2SE, J2EE, and J2ME) specially designed for handheld devices. J2ME plus handheld devices are the platforms for wireless Internet and mobile business in the future.


Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade Oct 2005

Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade

Faculty and Research Publications

Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …


A Taxonomy Of Free Network Sniffers For Teaching And Research, Victor A. Clincy, Halaweh Abu Nael Oct 2005

A Taxonomy Of Free Network Sniffers For Teaching And Research, Victor A. Clincy, Halaweh Abu Nael

Faculty and Research Publications

Today's networking environment has become very complex. Networks have been growing in size rapidly and have come to support more complex applications. As result, troubleshooting and maintaining networks has become cumbersome and has created the need for new specialized tools such as Network Protocol Analyzers, better known as "Network Sniffers".Network Sniffers have become critical tools in today's networking management and troubleshooting processes. They enable network managers to evaluate and examine the data running through their network by troubleshooting network performance problems and identifying certain network faults. Network Sniffers can help identify network attacks and detect security threats; they can be …