JNTUH CSE-AIML COMPUTER NETWORKS LAB SYLLABUS

JNTUH CSE-AIML COMPUTER NETWORKS LAB SYLLABUS

Course Objectives:
1. To understand the working principle of various communication protocols.
2. To understand the network simulator environment and visualize a network topology and observe its performance
3. To analyze the traffic flow and the contents of protocol frames
Course Outcomes:
1. Implement data link layer farming methods
2. Analyze error detection and error correction codes.
3. Implement and analyze routing and congestion issues in network design.
4. Implement Encoding and Decoding techniques used in presentation layer
5. To be able to work with different network tools
List of Experiments
1. Implement the data link layer framing methods such as character, character-stuffing and bit stuffing.
2. Write a program to compute CRC code for the polynomials CRC-12, CRC-16 and CRC CCIP
3. Develop a simple data link layer that performs the flow control using the sliding window protocol,
and loss recovery using the Go-Back-N mechanism.
4. Implement Dijsktra’s algorithm to compute the shortest path through a network
5. Take an example subnet of hosts and obtain a broadcast tree for the subnet.
6. Implement distance vector routing algorithm for obtaining routing tables at each node.
7. Implement data encryption and data decryption
8. Write a program for congestion control using Leaky bucket algorithm.
9. Write a program for frame sorting techniques used in buffers.
10. Wireshark
i. Packet Capture Using Wire shark
ii. Starting Wire shark
iii. Viewing Captured Traffic
iv. Analysis and Statistics & Filters.
11. How to run Nmap scan
12. Operating System Detection using Nmap
13. Do the following using NS2 Simulator
i. NS2 Simulator-Introduction
ii. Simulate to Find the Number of Packets Dropped
iii. Simulate to Find the Number of Packets Dropped by TCP/UDP
iv. Simulate to Find the Number of Packets Dropped due to Congestion
v. Simulate to Compare Data Rate& Throughput.
vi. Simulate to Plot Congestion for Different Source/Destination
vii. Simulate to Determine the Performance with respect to Transmission of Packets
TEXT BOOK:
1. Computer Networks, Andrew S Tanenbaum, David. j. Wetherall, 5th Edition. Pearson Education/PHI
REFERENCE BOOKS:
1. An Engineering Approach to Computer Networks, S.Keshav, 2nd Edition, Pearson Education
2. Data Communications and Networking – Behrouz A. Forouzan. 3rd Edition, TMH.

CSE-AIML

SEMESTER SUBJECT CODE SUBJECT Lession Plan Lecturer Notes & Question Bank SYLLABUS ABOUT TUTOR
I MA101BS Mathematics – I Click Here
I AP102BS Applied Physics Click Here
I CS103ES Programming for Problem Solving Click Here
I ME104ES Engineering Graphics Click Here
I AP105BS Applied Physics Lab Click Here
I CS106ES Programming for Problem Solving Lab Click Here
I MC109ES Environmental Science Click Here
II MA201BS Mathematics – II Click Here
II CH202BS Chemistry Click Here
II EE203ES Basic Electrical Engineering Click Here
II ME205ES Engineering Workshop Click Here
II EN205HS English Click Here
II CH206BS Engineering Chemistry Lab Click Here
II EN207HS English Language and Communication Skills Lab Click Here
II EE208ES Basic Electrical Engineering Lab Click Here
II-I CS310PC Discrete Mathematics Click Here
II-I CS302PC Data Structures Click Here
II-I MA313BS Mathematical and Statistical Foundations Click Here
II-I CS304PC Computer Organization and Architecture Click Here
II-I CS311PC Python Programming Click Here
II-I SM306MS Business Economics & Financial Analysis Click Here
II-I CS307PC Data Structures Lab Click Here
II-I CS312PC Python Programming Lab Click Here
II-I MC309 Gender Sensitization Lab Click Here
II-II CS416PC Formal Language and Automata Theory Click Here
II-II CS417PC Software Engineering Click Here
II-II CS403PC Operating Systems Click Here
II-II CS404PC Database Management Systems Click Here
II-II CS412PC Object Oriented Programming using Java Click Here
II-II CS406PC Operating Systems Lab Click Here
II-II CS407PC Database Management Systems Lab Click Here
II-II CS408PC Java Programming Lab Click Here
II-II MC409 Constitution of India Click Here
III-I Design and Analysis of Algorithms Click Here
III-I Machine Learning Click Here
III-I Computer Networks Click Here
III-I Compiler Design Click Here
III-I Graph Theory (PE1) Click Here
III-I Introduction to Data Science(PE1) Click Here
III-I Web Programming(PE1) Click Here
III-I Image Processing(PE1) Click Here
III-I Computer Graphics(PE1) Click Here
III-I Software Testing Methodologies(PE2) Click Here
III-I Information Retrieval Systems(PE2) VIJAYANAND S
III-I Pattern Recognition(PE2) Click Here
III-I Computer Vision and Robotics(PE2) Click Here Click Here
III-I Data Warehousing and Business Intelligence(PE2) Click Here
III-I Machine Learning Lab Click Here
III-I Computer Networks Lab Click Here
III-I Advanced Communication Skills Lab Click Here
III-I Intellectual Property Rights Click Here
III-II Artificial Intelligence Click Here Click Here
III-II DevOps Click Here Click Here
III-II Natural Language Processing Click Here Click Here
III-II Internet of Things(PE3) Click Here Click Here
III-II Data Mining(PE3) Click Here Click Here
III-II Scripting Languages(PE3) Click Here Click Here
III-II Mobile Application Development(PE3) Click Here Click Here
III-II Cryptography and Network Security(PE3) Click Here Click Here
III-II Artificial Intelligence and Natural Language Processing Lab Click Here Click Here
III-II DevOps Lab Click Here Click Here
IV-I Neural Networks & Deep Learning Click Here Click Here
IV-I Reinforcement Learning Click Here Click Here
IV-I Quantum Computing(PE4) Click Here Click Here
IV-I Expert Systems(PE4) Click Here Click Here
IV-I Cloud Computing(PE4) Click Here Click Here
IV-I Game Theory(PE4) Click Here Click Here
IV-I Mobile Computing(PE4) Click Here Click Here
IV-I Expert Systems(PE4) Click Here Click Here
IV-I Cloud Computing(PE4) Click Here Click Here
IV-I Game Theory(PE4) Click Here Click Here
IV-I Mobile Computing(PE4) Click Here Click Here
IV-I Social Network Analysis(PE5) Click Here Click Here
IV-I Federated Machine Learning(PE5) Click Here Click Here
IV-I Augmented Reality & Virtual Reality(PE5) Click Here Click Here
IV-I Web Security(PE5) Click Here Click Here
IV-I Ad-hoc & Sensor Networks Click Here Click Here
IV-I Deep Learning Lab Click Here Click Here
IV-II Organizational Behaviour Click Here Click Here
IV-II Speech and Video Processing(PE6) Click Here Click Here
IV-II Robotics Process Automation(PE6) Click Here Click Here
IV-II Randomized Algorithms(PE6) Click Here Click Here
IV-II Cognitive Computing(PE6) Click Here Click Here
IV-II Semantic Web(PE6) Click Here Click Here

Add Comment

Your email address will not be published. Required fields are marked *

Style switcher RESET
Body styles
Color settings
Link color
Menu color
User color
Background pattern
Background image