As part of a broader organisational restructure, data networking research at Swinburne University of Technology has moved from the Centre for Advanced Internet Architecture (CAIA) to the Internet For Things (I4T) Research Lab.

Although CAIA no longer exists, this website reflects CAIA's activities and outputs between March 2002 and February 2017, and is being maintained as a service to the broader data networking research community.

Remote unix Learning Environment (RULE)


Flexible Learning with RULE

There are a number of advantages to using remotely accessible virtual hosts compared to local access to physical machines.

Flexible Access

Not only does remote access allow simplified scalability, it also makes class scheduling significantly simpler, as it elimiates the demand for access to specialised equipment, which is usually the case with dedicated Unix labs.

With access available from any appropriately configured Windows lab, students can not only use their own virtual host from on campus computer labs, but if appropriate VPN access is available, students can access their virtual hosts from home. This level of flexibility is simply not possible with conventional Unix labs. Students no longer have to wait around for a free machine to work on an assignment, which can be especially frustrating with a looming deadline.

Flexible Class Preparation

As often lab classes require all students in the lab have access to a particular application or group of files, a controlled method of sharing applications and data is advantageous. RULE allows such controlled filesharing at the click of a button. Even CD images can be shared between all virtual hosts in a class, or even in a whole subject. Shared files can even be changed during a lab, and changes take effect immediately. The ability to change files used for lab experiments and assignments on the fly can be particularly useful when an error is discovered in lab material just before (or even during) a lab.

Simplified Troubleshooting in Lab Classes

Lab demonstrators quite often have their hands full in Unix labs, with a class of students who have come from a Windows background and need a helping hand to find their feet on Unix. With root access, sometimes students learn the powers of a Unix super-user account the hard way. A common problem with students and Unix accounts seems to be forgotten (or with root access accidently changed) passwords. Although resetting a password manually is possible it is a time consuming process and difficult to do in the middle of a class. With JHT Administrator a lab demonstrator can jump into a virtual host even when the normal avenues or remote access have failed, user and root passwords can be changed from within the virtual host or directly from the GUI in a single click.

JHT Administrator also displays the state of a class of virtual hosts graphically to alert the lab demonostrator (or possibly system administrator) of potential problems in a timely manner. Timley solutions to problems in the lab keep students and demonstrators happy.

System Administration

Having multiple virtual hosts on the same physical machine also has a number of advantages. Controlling the type and speed of network traffic entering and leaving a class of virtual hosts is simple compared with implementing such measures on a network of physical machines, saving system administrators time.

Monitor and Collect Student Work

As FreeBSD's jailed host configuration allows a (super) user on the primary host machine to view and manipulate the filesystems of running virtual hosts, automated collection of files becomes a trivial task. Files that you may want to automatically collect (and possibly analyse) include student work (assignments or practicals) and log files. Along with log files program process identifiers or PIDs can be used to detect plagiarism with relative ease. Being able to monitor student logins and requesting the PIDs of programs run as part of the lab to be included in the lab report makes detection of plagiarism much simpler. Depending on configuration it may be possible to determine not only which assignments are copies, but which one was the original.



Teaching Unix with RULE

Using and Maintaining RULE

 

Last Updated: Monday 5-Jun-2006 18:34:32 AEST | Maintained by: Jason But (jbut@swin.edu.au) | Authorised by: Grenville Armitage ( garmitage@swin.edu.au)