{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:02Z","timestamp":1750307522340,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,10,22]],"date-time":"2009-10-22T00:00:00Z","timestamp":1256169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,10,22]]},"DOI":"10.1145\/1631728.1631742","type":"proceedings-article","created":{"date-parts":[[2009,10,27]],"date-time":"2009-10-27T13:27:28Z","timestamp":1256650048000},"page":"37-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["An instructional design of open source networking laboratory and curriculum"],"prefix":"10.1145","author":[{"given":"Dongqing","family":"Yuan","sequence":"first","affiliation":[{"name":"University of Wisconsin-Stout, Menomonie, WI, USA"}]},{"given":"Jiling","family":"Zhong","sequence":"additional","affiliation":[{"name":"Troy University, Troy, AL, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"George Tech \"Hands On","author":"Abler R.","year":"2006","unstructured":"Abler , R. , Contis , D. , Grizzard , J. ,&amp; Owen , H. ( 2006 ). George Tech \"Hands On \" Network Security Laboratory. IEEE Transactions on Education, 212--225. Abler, R., Contis, D., Grizzard, J.,&amp;Owen, H. (2006). George Tech \"Hands On\" Network Security Laboratory. IEEE Transactions on Education, 212--225.","journal-title":"Network Security Laboratory. IEEE Transactions on Education, 212--225."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1248453.1248458"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/282991.283014"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047344.1047383"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 11th Colloquium for Information Systems Security Education, 167--171","author":"Chen L.","year":"2007","unstructured":"Chen , L. ,&amp; Lin , C. ( 2007 ). Combining Theory with Practice in Information Security Education . Proceedings of the 11th Colloquium for Information Systems Security Education, 167--171 . Chen, L.,&amp;Lin, C. (2007). Combining Theory with Practice in Information Security Education. Proceedings of the 11th Colloquium for Information Systems Security Education, 167--171."},{"key":"e_1_3_2_1_6_1","volume-title":"Implementing a Networking Component in a CS\/IT Curriculum: An Experience Report","author":"Chenoweth J.","year":"2003","unstructured":"Chenoweth , J. , Pfeiffer , P. ,&amp; Yuan , Q. ( 2003 ). Implementing a Networking Component in a CS\/IT Curriculum: An Experience Report . Consortium for Computing Sciences in Colleges . Chenoweth, J., Pfeiffer, P.,&amp;Yuan, Q. (2003). Implementing a Networking Component in a CS\/IT Curriculum: An Experience Report. Consortium for Computing Sciences in Colleges."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/377435.377669"},{"key":"e_1_3_2_1_8_1","volume-title":"Hands-on networking with internet technologies","author":"Comer D.","year":"2004","unstructured":"Comer , D. ( 2004 ). Hands-on networking with internet technologies ( 3 rd ed.). Prentice Hall . Comer, D. (2004). Hands-on networking with internet technologies (3rd ed.). Prentice Hall.","edition":"3"},{"key":"e_1_3_2_1_9_1","volume-title":"The Systematic design of instruction","author":"Dick W.","year":"1996","unstructured":"Dick , W. ,&amp; Carey , L. ( 1996 ). The Systematic design of instruction ( 4 th ed.). New York : Harper Collins . Dick, W.,&amp;Carey, L. (1996). The Systematic design of instruction (4th ed.). New York: Harper Collins.","edition":"4"},{"key":"e_1_3_2_1_10_1","volume-title":"Sixth Australasian Computing Education Conference', ACM Press.","author":"Erlinger M.","year":"2004","unstructured":"Erlinger , M. , Molle , M. , Winters , T. , Shea , R. &amp; Lundberg , C. ( 2004 ), Tinkernet: A low-cost networking laboratory, in 'Computing Education 2004 , Sixth Australasian Computing Education Conference', ACM Press. Erlinger, M., Molle, M., Winters, T., Shea, R.&amp;Lundberg, C. (2004), Tinkernet: A low-cost networking laboratory, in 'Computing Education 2004, Sixth Australasian Computing Education Conference', ACM Press."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/584955.584961"},{"key":"e_1_3_2_1_12_1","first-page":"191","article-title":"Reinforce Networking Theory with OPNET Simulation","volume":"6","author":"Guo J.","year":"2007","unstructured":"Guo , J. , Xiang W. ,&amp; Wang , S. ( 2007 ). Reinforce Networking Theory with OPNET Simulation . Journal of Information Technology Education , Volume 6 , 191 -- 198 . Guo, J., Xiang W.,&amp;Wang, S. (2007). Reinforce Networking Theory with OPNET Simulation. Journal of Information Technology Education, Volume 6, 191--198.","journal-title":"Journal of Information Technology Education"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168812.1168845"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352222"},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved January 16th, 2009","author":"ACM.","year":"2008","unstructured":"IEEE\/ ACM. ( 2008 ). CC-2008 Task Force, Computing Curriculum (Final Draft) . Retrieved January 16th, 2009 from http:\/\/www.acm.org\/\/education\/curricula\/IT2008%20Curriculum.pdf IEEE\/ACM. (2008). CC-2008 Task Force, Computing Curriculum (Final Draft). Retrieved January 16th, 2009 from http:\/\/www.acm.org\/\/education\/curricula\/IT2008%20Curriculum.pdf"},{"issue":"2","key":"e_1_3_2_1_16_1","first-page":"47","article-title":"Educational technology: a critique","volume":"38","author":"Kearsley G.","year":"1998","unstructured":"Kearsley , G. ( 1998 ). Educational technology: a critique . Educational Technology , 38 ( 2 ), 47 -- 51 . Kearsley, G. (1998). Educational technology: a critique. Educational Technology, 38(2), 47--51.","journal-title":"Educational Technology"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the sixth conference on Australasian Computing Education, Vol(30)","author":"Kneale B.","year":"2004","unstructured":"Kneale , B. , Horta , A. Y. ,&amp; Box , L. ( 2004 ). Velnet:Virtual Environment for Learning Networking . Proceedings of the sixth conference on Australasian Computing Education, Vol(30) , 161--169. Kneale, B., Horta, A. Y.,&amp;Box, L. (2004). Velnet:Virtual Environment for Learning Networking. Proceedings of the sixth conference on Australasian Computing Education, Vol(30), 161--169."},{"key":"e_1_3_2_1_18_1","volume-title":"Curriculum Designs and Education Challenges. ACM SIGCOMM Workshop on Computer Networking.","author":"Kurose J.","year":"2002","unstructured":"Kurose , J. , Liebeherr , J. , Ostermann , S. ,&amp; Ott-Boisseau , T. ( 2002 ). Curriculum Designs and Education Challenges. ACM SIGCOMM Workshop on Computer Networking. Kurose, J., Liebeherr, J., Ostermann, S.,&amp;Ott-Boisseau, T. (2002). Curriculum Designs and Education Challenges. ACM SIGCOMM Workshop on Computer Networking."},{"key":"e_1_3_2_1_19_1","volume-title":"The Practice of Constructivism in Science Education, 91--119.","author":"Linn M. C.","year":"1993","unstructured":"Linn , M. C. &amp; Burbules , N. C. ( 1993 ) Construction of knowledge and group learning . In Kenneth Tobin (Ed.), The Practice of Constructivism in Science Education, 91--119. Linn, M. C.&amp;Burbules, N. C. (1993) Construction of knowledge and group learning. In Kenneth Tobin (Ed.), The Practice of Constructivism in Science Education, 91--119."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352247"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1384271.1384276"},{"issue":"3","key":"e_1_3_2_1_22_1","first-page":"30","article-title":"Instructional transaction theory: An instructional design model based on knowledge objects","volume":"36","author":"Merrill M. D.","year":"1996","unstructured":"Merrill , M. D. ( 1996 ). Instructional transaction theory: An instructional design model based on knowledge objects . Educational Technology , 36 ( 3 ), 30 -- 37 . Merrill, M. D. (1996). Instructional transaction theory: An instructional design model based on knowledge objects. Educational Technology, 36(3), 30--37.","journal-title":"Educational Technology"},{"key":"e_1_3_2_1_23_1","first-page":"191","article-title":"Networking Education for the New Economy","volume":"2","author":"Minch R.","year":"2003","unstructured":"Minch , R. ,&amp; Tabor , S. ( 2003 ). Networking Education for the New Economy . Journal of Information Technology Education , Vol 2 , 191 -- 217 . Minch, R.,&amp;Tabor, S. (2003). Networking Education for the New Economy. Journal of Information Technology Education, Vol 2, 191--217.","journal-title":"Journal of Information Technology Education"},{"key":"e_1_3_2_1_24_1","volume-title":"20th Annual Conference of the National Advisory Committee on Computing Qualifications, 53--59","author":"Morgan C.","year":"2007","unstructured":"Morgan , C. , Erlinger , M. , Davoli , R. ,&amp; Goldweber , M. ( 2007 ). Environments for a Networking Laboratory . 20th Annual Conference of the National Advisory Committee on Computing Qualifications, 53--59 . Morgan, C., Erlinger, M., Davoli, R.,&amp;Goldweber, M. (2007). Environments for a Networking Laboratory. 20th Annual Conference of the National Advisory Committee on Computing Qualifications, 53--59."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2003.1263296"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/782941.782998"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/343048.343056"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1118178.1118212"},{"key":"e_1_3_2_1_29_1","first-page":"2000","article-title":"Linux in Higher Education: Open Source, Open Minds","volume":"21","author":"Pfaffenberger B.","year":"2000","unstructured":"Pfaffenberger , B. ( 2000 ). Linux in Higher Education: Open Source, Open Minds , Social Justice. Linux Journal . March 21 , 2000 . http:\/\/linuxjournal.com\/article.php?sid=5071 {accessed February 2009}. Pfaffenberger, B.(2000). Linux in Higher Education: Open Source, Open Minds, Social Justice. Linux Journal. March 21, 2000. http:\/\/linuxjournal.com\/article.php?sid=5071 {accessed February 2009}.","journal-title":"Social Justice. Linux Journal"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","DOI":"10.4324\/9780203824283","volume-title":"Instructional Design Theories and Models","author":"Reigeluth C. M.","year":"1983","unstructured":"Reigeluth , C. M. ( 1983 ). Instructional Design Theories and Models . Hillsdale, NJ : Lawarence Erlbaum . Reigeluth, C. M. (1983). Instructional Design Theories and Models. Hillsdale, NJ: Lawarence Erlbaum."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/365076.357712"},{"key":"e_1_3_2_1_32_1","volume-title":"Teaching TCP\/IP Networking Using Hands-on Laboratory Experience. The second International Conference on Innovations in Information Technology (IIT'05)","author":"Sarkar N. I.","year":"2005","unstructured":"Sarkar , N. I. , Al-Qirim , N. A. Y. ( 2005 ). Teaching TCP\/IP Networking Using Hands-on Laboratory Experience. The second International Conference on Innovations in Information Technology (IIT'05) . Sarkar, N. I., Al-Qirim, N. A. Y. (2005). Teaching TCP\/IP Networking Using Hands-on Laboratory Experience. The second International Conference on Innovations in Information Technology (IIT'05)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","DOI":"10.4324\/9781410610560","volume-title":"Curriculum, plans, and processes in instructional design: International perspectives","author":"Seel N. M.","year":"2004","unstructured":"Seel , N. M. ,&amp; Dijkstra , S. ( 2004 ). Curriculum, plans, and processes in instructional design: International perspectives . Mahwah, NJ : Erlbaum . Seel, N. M.,&amp;Dijkstra, S. (2004). Curriculum, plans, and processes in instructional design: International perspectives. Mahwah, NJ: Erlbaum."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/611892.611984"},{"key":"e_1_3_2_1_35_1","volume-title":"Just for Fun: The Story of an Accidental Revolution","author":"Torvalds L.","year":"2001","unstructured":"Torvalds , L. ,&amp; Diamond , D. ( 2001 ). Just for Fun: The Story of an Accidental Revolution . New York : Harper Business . Torvalds, L.,&amp;Diamond, D. (2001). Just for Fun: The Story of an Accidental Revolution. New York: Harper Business."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1227310.1227473"},{"key":"e_1_3_2_1_37_1","volume-title":"FECS","author":"Wright J.","year":"2007","unstructured":"Wright , J. , Carpin , S. , Cerpa , A. ,&amp; Gavilan , G. ( 2007 ). An open Source Teaching and Learning Facility for Computer Science and Engineering Education . FECS 2007, 368--373. Wright, J., Carpin, S., Cerpa, A.,&amp;Gavilan, G. (2007). An open Source Teaching and Learning Facility for Computer Science and Engineering Education. FECS 2007, 368--373."},{"key":"e_1_3_2_1_38_1","first-page":"1","article-title":"Journal of Information Technology Education","volume":"5","author":"Ekstrom J.","year":"2006","unstructured":"Ekstrom , J. , Gorka , S. , Kamali , R. , Lawson , E. , Lunt , B. , Miller , J. , Reichgelt , H. ( 2006 ). Journal of Information Technology Education . The Information Technology Model Curriculum , 5 , 1 -- 19 . Ekstrom, J., Gorka, S., Kamali, R., Lawson, E., Lunt, B., Miller, J., Reichgelt, H. (2006). Journal of Information Technology Education. The Information Technology Model Curriculum, 5, 1--19.","journal-title":"The Information Technology Model Curriculum"},{"key":"e_1_3_2_1_39_1","volume-title":"The Employment Outlook in Today's Increasingly Competitive IT Job Market. Retrieved","author":"The Information Technology Association of America (ITAA).","year":"2004","unstructured":"The Information Technology Association of America (ITAA). ( 2004 ). Adding Value&amp;Growing Careers , The Employment Outlook in Today's Increasingly Competitive IT Job Market. Retrieved 5 June, 2009, http:\/\/www.itaa.org\/workforce\/docs\/04workforcestudy.pdf The Information Technology Association of America (ITAA). (2004). Adding Value&amp;Growing Careers, The Employment Outlook in Today's Increasingly Competitive IT Job Market. Retrieved 5 June, 2009, http:\/\/www.itaa.org\/workforce\/docs\/04workforcestudy.pdf"}],"event":{"name":"SIGITE '09: ACM Special Interest Group for Information Technology Education Conference","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Fairfax Virginia USA","acronym":"SIGITE '09"},"container-title":["Proceedings of the 10th ACM conference on SIG-information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1631728.1631742","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1631728.1631742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:18Z","timestamp":1750249098000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1631728.1631742"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,22]]},"references-count":39,"alternative-id":["10.1145\/1631728.1631742","10.1145\/1631728"],"URL":"https:\/\/doi.org\/10.1145\/1631728.1631742","relation":{},"subject":[],"published":{"date-parts":[[2009,10,22]]},"assertion":[{"value":"2009-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}