MTech Computer Networks And Iot Laboratory syllabus for 1 Sem 2018 scheme 18SCNL16

Module-1 LABORATORY WORK 50 hours

PART – A

Computer Network LABORATORY WORK

Note:

Implement the following using C/C++ or equivalent with LINUX/Windows environment:

1. Write a program to archive Traffic management at Flow level by implementing Closed Loop Control technique. (Leaky Bucket Algorithm)

2. Write a program to implement dynamic routing strategy in finding optimal path for data transmission. (Bellman ford algorithm).

3. Write a program to implement Link State Routing (Dijkstra Algorithm).

4. Write a program for providing security for transfer of data in the network. (RSA Algorithm)

5. Write a program for encrypting 64 bit playing text using DES algorithm.

6. Apply the RSA algorithm on a text file to produce cipher text file.

7. Develop a mechanism to setup a security channel using Diffie-Hellman Key Exchange between client and server

8. Implement secure hash algorithm for Data Integrity. Implement MD5 and SHA-1 algorithm, which accepts a string input, and produce a fixed size number - 128 bits for MD5; 160 bits for SHA-1, this number is a hash of the input. Show that a small change in the input results in a substantial change in the output.

 

Simulation Programs using OPNET /NS2/NS3 or any other equivalent software

9. Simulate a 3 node point to point network with duplex links between them. Set the Queue size and vary the bandwidth and find the number of packets dropped.

10. Simulate a four-node point-to-point network, and connect the links as follows: n0->n2, n1- >n2 and n2->n3. Apply TCP agent changing the parameters and determine the number of packets sent/received by TCP/UDP

 

PART – B IOT LABORATORY WORK

1. Transmit a string using UART

2. Point-to-Point communication of two Motes over the radio frequency.

3. Multi-point to single point communication of Motes over the radio frequency.LAN (Subnetting).

4. I2C protocol study

5. Reading Temperature and Relative Humidity value from the sensor

 

Course Outcomes

The students should be able to:

• Apply key Internet applications and their protocols, and ability to develop their own applications (e.g. Client Server applications, Web Services) using the sockets API.

• Design and evaluate application layer protocol

• Analyze the vulnerabilities in any computing system and hence be able to design a security solution.

• Identify the security issues in the network and resolve it.

• Evaluate security mechanisms using rigorous approaches, including theoretical.