Enhancement of e-Learning Systems and Methodologies through Advancements in Distributed Computing Technologies

Enhancement of e-Learning Systems and Methodologies through Advancements in Distributed Computing Technologies

Luca Caviglione (Institute of Intelligent Systems for Automation (ISSIA), Italy) and Mauro Coccoli (University of Genoa, Italy)
DOI: 10.4018/978-1-4666-0161-1.ch002
OnDemand PDF Download:


The evolution of the Internet, distributed architectures, and Grid-oriented frameworks can change the way people acquire and disseminate both knowledge and experience, thus the way they learn. Therefore, one can envisage new e-learning models, based on a more efficient users’ interaction, that also empowers the hands-on experience. This will improve learning outcomes, while reducing the need of physical devices and removing the inherent boundaries. Moreover, this reduces costs by promoting the sharing of resources and learning assets. From this perspective, the chapter discusses the integration of classical e-learning paradigms with new advancements of distributed computing, such as: 1) the usage of Peer-to-Peer (P2P) to produce network-independent overlays, also by enabling direct student-to-student exchanges; 2) the integration, through grid-based middleware, of real or virtual devices, plants and Sensors Network (SN) within the e-learning environment; and 3) the adoption of a distributed e-learning system to spread culture through mobile devices, with an emphasis on satellite communications.
Chapter Preview


The continuous advancements in the field of Information and Communication Technology (ICT) lead to fast changes in the scenario of content management and sharing. New systems influence the way people acquire knowledge and disseminate their experience. Nevertheless, such evolution enhances how individuals achieve results by means of e-learning systems and services, in education and at work (Rosenberg, 2001). As a consequence, also e-learning environments are experiencing a paradigm shift. This can happen owing to many important technological enablers. We mention, among the others: the mobile and broadband Internet, distributed computing architectures, Grid-oriented frameworks, and the Peer-to-Peer (P2P) communication paradigm. Therefore, it is possible to envisage new models for sharing both knowledge and information. As an example, an intrinsic added value concerns the efficient circulation and delivery of ideas, which can be produced or consumed by different bodies, e.g., Universities, Companies, and “common” people. Additionally, the sharing can be not limited only to knowledge, but it can be also extended to “machineries,” in order to perform hands-on experiences to grant a more successful learning process.

To give a better understanding, we perform a short introduction of architectural blueprints and components commonly adopted for e-learning purposes. In standard set-ups a well-defined centralized entity, usually defined as the Learning Management System (LMS), is responsible of: 1) providing basic functionalities for the e-learning services, such as authentication, accounting and monitoring; 2) allowing data delivery, for instance the digital contents for educational purposes. Such learning assets are made available in the form of Learning Objects (LOs) (Ip, Morrison, & Currie, 2001), and they can be locally archived into a Learning Content Management System (LCMS), or distributed among different Learning Object Repositories (LORs). The most adopted solution relies upon a unique LCMS. Notwithstanding, if multiple LORs are employed, each LOR must have at least indexing and archiving functionalities, to handle specific policies, ranging from requirements of data protection, to the widest possible diffusion of the knowledge. To this aims, people as well as software applications, can access LORs, simply with a Web browser (thus requiring a proper server-side Web-oriented logic), or through duly developed access interfaces.

In this perspective, the engineering of the LMS can be a complex task, since it could embrace different constraints. In fact, it should be properly tweaked for specific user needs (e.g., the desired level of interaction among students and accessibility issues), the chosen learning strategies (i.e., associative, cognitive, or situative), and the specific pedagogical model (i.e., constructivism, constructionism, or reflection). Depending on the chosen approach, different applications are feasible and must be made available. To handle such a variety of choices, the LMS platform is designed to deliver a set of standard services, which can be further composed to provide more sophisticated functionalities. However, they could not be sufficient, and then an Application Programming Interface (API) is often supplied, to inter-connect with external tools and third-party products, and to allow access to internal data and services. This concept can be further pushed owing to Web 2.0 technology, used to merge the LMS with other “full-featured” services or with remote devices/laboratories, exported through standard interfaces, such as Web-Services (Okon, et al., 2006). As an example, the integration of a LMS can range from a static link to a forum or a blog, to the transparent internetwork with complex social network platforms. At the same time, the functionalities provided by the mashup concept, allow the retrieval and the aggregation of heterogeneous contents published outside the LMS.

Complete Chapter List

Search this Book:
Table of Contents
Jemal H. Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan, Mustafa Mat Deris
Chapter 1
Alaa Ghaleb-Seddik, Yacine Ghamri-Doudane, Sidi Mohammed Senouci
The authors present, in this chapter, the work done in order to improve TCP performance and to cope with new data transmission network technologies... Sample PDF
TCP for Wireless Internet: Solutions and Challenges
Chapter 2
Luca Caviglione, Mauro Coccoli
The evolution of the Internet, distributed architectures, and Grid-oriented frameworks can change the way people acquire and disseminate both... Sample PDF
Enhancement of e-Learning Systems and Methodologies through Advancements in Distributed Computing Technologies
Chapter 3
Hairulnizam Mahdin, Jemal H. Abawajy
Radio Frequency Identification (RFID) technology is becoming increasingly popular as an automated tool for object monitoring and identification in a... Sample PDF
An Approach to Faulty Reader Detection in RFID Reader Network
Chapter 4
Harinda Sahadeva Fernando, Jemal H. Abawajy
In the last decade RFID technology has become a major contender for managing large scale logistics operations and generating and distributing the... Sample PDF
A Security Framework for Networked RFID
Chapter 5
Bellarmine Ezumah, Suraj Olunifesi Adekunle
This chapter serves as a collection of works that were done in the area of cybersecurity in Africa—with a focus on four countries representing the... Sample PDF
A Review of Privacy, Internet Security Threat, and Legislation in Africa: A Case Study of Nigeria, South Africa, Egypt, and Kenya
Chapter 6
Mukaddim Pathan, Doug Palmer, Ali Salehi
The widespread use of sensor networks in a range of applications has given rise to various programming approaches. It is a long standing concept... Sample PDF
A Walk through Sensor Network Programming Models
Chapter 7
Dennis P. Mirante, Habib M. Ammari
Wireless Sensor Networks (WSNs) are a rapidly growing area for research and commercial development. Originally used in military applications, their... Sample PDF
Wireless Sensor Network Security Attacks: A Survey
Chapter 8
Enamul Haque, Norihiko Yoshida
Applications of Wireless Sensor Networks (WSN) have been expanded from industrial operation to daily common use. With the pace of development, a... Sample PDF
Clustering in Wireless Sensor Networks: Context-Aware Approaches
Chapter 9
Anar Abdel Hady, Sherine M. Abd El-kader, Hussein S. Eissa, Ashraf Salem, Hossam M.A. Fahmy
Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power... Sample PDF
A Comparative Analysis of Hierarchical Routing Protocols in Wireless Sensor Networks
Chapter 10
Yupeng Hu, Rui Li
As an enabling network technology, energy efficient Medium Access Control (MAC) protocol plays a vital role in a battery-powered distributed sensor... Sample PDF
Energy-Efficient MAC Protocols in Distributed Sensor Networks
Chapter 11
Basma M. Mohammad El-Basioni, Sherine M. Abd El-Kader, Hussein S. Eissa, Mohammed M. Zahra
But, as the energy-efficiency is critical for periodical data gathering applications in wireless sensor networks, it has the highest priority in... Sample PDF
Low Loss Energy-Aware Routing Protocol for Data Gathering Applications in Wireless Sensor Network
About the Contributors