{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:11Z","timestamp":1750307531144,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,10,22]],"date-time":"2009-10-22T00:00:00Z","timestamp":1256169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,10,22]]},"DOI":"10.1145\/1631728.1631776","type":"proceedings-article","created":{"date-parts":[[2009,10,27]],"date-time":"2009-10-27T13:27:28Z","timestamp":1256650048000},"page":"178-181","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Using a protocol analyzer to introduce communications protocols"],"prefix":"10.1145","author":[{"given":"Gerry W.","family":"Cross","sequence":"first","affiliation":[{"name":"Mount Royal University, Calgary, AB, Canada"}]}],"member":"320","published-online":{"date-parts":[[2009,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Supplement to Computer Networking: A Top-Down Approach Featuring the Internet","author":"Ethereal Labs","unstructured":"Ethereal Labs : Supplement to Computer Networking: A Top-Down Approach Featuring the Internet , 3 rd ed. J. Kurose and K. Ross , http:\/\/www-net.cs.umass.edu\/ethereal-labs\/. Ethereal Labs: Supplement to Computer Networking: A Top-Down Approach Featuring the Internet, 3rd ed. J. Kurose and K. Ross, http:\/\/www-net.cs.umass.edu\/ethereal-labs\/.","edition":"3"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 7th Australasian Computing Education Conference, Newcastle, NSW Australia","author":"Goldstein C.","year":"2005","unstructured":"Goldstein , C. , Leisten , S. , Stark , K. , and Tickle , A . 2005. Using a network simulation tool to engage students in active learning enhances their understanding of complex data communications concepts . In Proceedings of the 7th Australasian Computing Education Conference, Newcastle, NSW Australia , 2005 , 223--228. Goldstein, C., Leisten, S., Stark, K., and Tickle, A. 2005. Using a network simulation tool to engage students in active learning enhances their understanding of complex data communications concepts. In Proceedings of the 7th Australasian Computing Education Conference, Newcastle, NSW Australia, 2005, 223--228."},{"volume-title":"Lab Manual for Network+ Guide to Networks","author":"Grice M.","key":"e_1_3_2_1_3_1","unstructured":"Grice , M. 2006. Lab Manual for Network+ Guide to Networks , Fourth Edition. Thomson Course Technology. ISBN 0-619-21744-8. Grice, M. 2006. Lab Manual for Network+ Guide to Networks, Fourth Edition. Thomson Course Technology. ISBN 0-619-21744-8."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352322.1352222"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083431.1083457"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/782941.782998"},{"key":"e_1_3_2_1_7_1","unstructured":"VMware Workstation: http:\/\/www.vmware.com\/.  VMware Workstation: http:\/\/www.vmware.com\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Wireshark: http:\/\/www.wireshark.org\/.  Wireshark: http:\/\/www.wireshark.org\/."}],"event":{"name":"SIGITE '09: ACM Special Interest Group for Information Technology Education Conference","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Fairfax Virginia USA","acronym":"SIGITE '09"},"container-title":["Proceedings of the 10th ACM conference on SIG-information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1631728.1631776","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1631728.1631776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:10Z","timestamp":1750249390000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1631728.1631776"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,22]]},"references-count":8,"alternative-id":["10.1145\/1631728.1631776","10.1145\/1631728"],"URL":"https:\/\/doi.org\/10.1145\/1631728.1631776","relation":{},"subject":[],"published":{"date-parts":[[2009,10,22]]},"assertion":[{"value":"2009-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}