Computer Networks Lab detailed syllabus for CSE (Cyber Security) (CSECS), 2nd Year 2nd Sem R22 regulation has been taken from the JNTUH official website and presented for the B.Tech students affiliated to JNTUH course structure. For Course Code, Subject Names, Theory Lectures, Tutorial, Practical/Drawing, Credits, and other information do visit full semester subjects post given below. We make sure the result links and syllabus uploaded here is latest and up to date, also the syllabus PDF files can also be downloaded from the universities official website.
For CSE (Cyber Security) (CSECS) 2nd Year 2nd Sem R22 Regulation Scheme, do visit CSECS 2nd Year 2nd Sem R22 Scheme. The detailed syllabus for computer networks lab is as follows.
Computer Networks Lab Subject Syllabus for CSECS 2nd Year 2nd Sem R22 Regulation
Course Objectives:
For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier..
Course Outcomes:
- Implement data link layer farming methods
- Analyze error detection and error correction codes.
- Implement and analyze routing and congestion issues in network design.
- Implement Encoding and Decoding techniques used in presentation layer
- To be able to work with different network tools
List of Experiments:
- Implement the data link layer framing methods such as character, character – stuffing and bit stuffing.
- Write a program to compute CRC code for the polynomials CRC – 12, CRC – 16 and CRC CCIP
- Develop a simple data link layer that performs the flow control using the sliding window protocol, and loss recovery using the Go – Back – N mechanism.
- Implement Dijsktra’s algorithm to compute the shortest path through a network
- Take an example subnet of hosts and obtain a broadcast tree for the subnet.
- Implement distance vector routing algorithm for obtaining routing tables at each node.
- Implement data encryption and data decryption
- Write a program for congestion control using Leaky bucket algorithm.
- Write a program for frame sorting techniques used in buffers.
- Wireshark
- Packet Capture Using Wire shark
- Starting Wire shark
- Viewing Captured Traffic
- Analysis and Statistics and Filters.
- How to run Nmap scan
- Operating System Detection using Nmap
- Do the following using NS2 Simulator
- NS2 Simulator – Introduction
- Simulate to Find the Number of Packets Dropped
- Simulate to Find the Number of Packets Dropped by TCP/UDP
- Simulate to Find the Number of Packets Dropped due to Congestion
- Simulate to Compare Data Rate and Throughput.
- Simulate to Plot Congestion for Different Source/Destination
- Simulate to Determine the Performance with respect to Transmission of Packets
TEXT BOOKS:
For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier..
REFERENCE BOOKS:
- An Engineering Approach to Computer Networks, S.Keshav, 2nd Edition, Pearson Education
- Data Communications and Networking – Behrouz A. Forouzan. 3rd Edition, TMH.
For detailed syllabus of all the other subjects of B.Tech 2nd Year CSE (Cyber Security) (CSECS), visit CSE (Cyber Security) (CSECS) 2nd Year Syllabus Subjects.
For results of CSE (Cyber Security) (CSECS) 2nd Year 2nd Sem R22 Regulation, visit CSECS 2nd Year 2nd Sem R22 Regulation results direct link.