E-Learning Network System Design and Analysis

Authors

  • Zaid Hashim Jaber Department of Computer Science, College of Science, Baghdad University, Iraq
  • Hayder Ayad Dawood College of Business Administration , Albayan University, Iraq
  • Mamoun Jassim Mohammed Department of Computer Engineering , College of Engineering Al-Iraqia University, Iraq

DOI:

https://doi.org/10.33193/IJSER.0.00.2021.23

Keywords:

E-Learning Network, LMS

Abstract

E-learning system implies skill and knowledge transference in a computerized and networking-based way. Technologies have started to create a difference in education. Accordingly, many universities have adopted learning management system (LMS) to enhance both teaching and learning processes. Mostly, LMS is used in student registration, the delivery and tracking of e-learning courses and content, and in testing as well. However, building such a learning system might lead to encounter certain issues related to scalability, management, and security. The proposed network design has been set to solve such problems. Basically, to manage the accounts’ accessibility and privileges, the domain controller server has been used.  Network segmentation is proposed to separate the network into multiple broadcast domains to avoid problems related to broadcast like that of a broadcast storm. Lastly, to achieve the scalability, VPN secured tunnels are used to connect several far distance sites through the Internet.

References

[1] Akin T.," Hardening Cisco Routers," O’Reilly & Associates, 2002.
[2] Kim J., Lee K., Lee C.," Design and Implementation of Integrated Security Engine for Secure Networking," In Proceedings International Conference on Advanced Communication Technology, 2004.
[3] Chen S., Iyer R., and Whisnant K., “Evaluating the Security Threat of Firewall Data Corruption Caused by Instruction Transient Errors," In Proceedings of the 2002 International Conference on Dependable Systems & Network, Washington, D.C., 2002.
[4] Kim H., "Design and Implementation of a Private and Public Key Crypto Processor and Its Application to a Security System," IEEE Transactions on Consumer Electronics, vol. 50, no. 1, FEBRUARY 2004.
[5] Security Problems in Campus Network and Its Solutions, 1Lalita Kumari, 2Swapan Debbarma, 3Radhey Shyam, Department of Computer Science1-2, NIT Agartala, India, National Informatics Centre, India.
[6] Network Security: History, Importance, and Future “University of Florida Department of Electrical and Computer Engineering Bhavya Daya ”.
[7] Ramaswamy Chandramouli, "Analysis of Network Segmentation Techniques in Cloud Data Centers", National Institute of Standards & Technology 100 Bureau Drive, Gaithersburg, MD, USA.
[8] Wagner, Neal & Sahin, Cem Safak & Pena, Jaime & Riordan, James & Neumayer, Sebastian. (2017). Capturing the Security Effects of Network Segmentation via a Continuous-Time Markov Chain Model. 17. 10.22360/springsim.2017.anss.032.
[9] Kong, Jiejun & Gerla, Mario & S Prabhu, B & Gadh, Rajit. (2018). Providing multi-layer security support for wireless communications across multiple trusted domains.
[10] Hodeghatta Rao, Umesh. (2011). Challenges of Implementing Network Management Solution. International Journal of Distributed and Parallel systems. 2. 10.5121/ijdps.2011.2506.
[11] P. Oliveira, C. Cunha and M. Nakayama, "Learning Management Systems (LMS) and e-learning management: an integrative review and research agenda", JISTEM, vol.13 no.2, Aug. 2016

Published

2022-03-17

How to Cite

Jaber, Z. H., Dawood, H. A., & Mohammed, M. J. (2022). E-Learning Network System Design and Analysis. Al-Iraqia Journal for Scientific Engineering Research, (00), 42–62. https://doi.org/10.33193/IJSER.0.00.2021.23

Issue

Section

Articles

Most read articles by the same author(s)