Skip to main content

CSL 332 Networking Lab- Scheme

CSL332 NETWORKING LAB

CATEGORY     L T P Credit     Year of Introduction

            PCC        0 0 3     2                 2019

Preamble:

The course enables the learners to get hands-on experience in network programming using Linux System calls and network monitoring tools. It covers implementation of network protocols andalgorithms, configuration of network services and familiarization of network simulators. This helps the learners to develop, implement protocols and evaluate its performance for real world
networks.

Prerequisite: Sound knowledge in Programming in C, Data Structures and Computer Networks

Course Outcomes: After the completion of the course the student will be able to

Course Outcomes

CO1

Use network related commands and configuration files in Linux Operating System.
(Cognitive Knowledge Level: Understand).

CO2

Develop network application programs and protocols.
(Cognitive Knowledge Level: Apply)

CO3

Analyze network traffic using network monitoring tools.
(Cognitive Knowledge Level: Apply)

CO4

Design and setup a network and configure different network protocols.
(Cognitive Knowledge Level: Apply)

CO5

Develop simulation of fundamental network concepts using a network simulator.
(Cognitive Knowledge Level: Apply)

Assessment Pattern

Bloom’s Category         Continuous Assessment    End Semester

                                        Marks in percentage

Remember                         20                                         20

Understand                         20                                         20

Apply                                 60                                         60


Mark Distribution

Total Marks CIE Marks         ESE Marks         ESE Duration

150                 75                         75                     3 hours

Continuous Internal Evaluation Pattern:

Attendance : 15 marks

Continuous Evaluation in Lab : 30 marks

Continuous Assessment Test : 15 marks

Viva voce : 15 marks

Internal Examination Pattern:

The Internal examination shall be conducted for 100 marks, which will be converted to out of 15, while calculating Internal Evaluation marks. The marks will be distributed as,

Algorithm - 30 marks, Program - 20 marks, Output - 20 marks and Viva - 30 marks.

End Semester Examination Pattern:

The End Semester Examination will be conducted for a total of 75 marks and shall be distributed as, Algorithm - 30 marks, Program - 20 marks, Output - 20 marks and Viva- 30marks.

Operating System to Use in Lab : Linux

Compiler/Software to Use in Lab : gcc, NS2

Programming Language to Use in Lab : Ansi C

Fair Lab Record:

All the students attending the Networking Lab should have a Fair Record. Every experiment conducted in the lab should be noted in the fair record. For every experiment, in the fair record, the right hand page should contain experiment heading, experiment number, date of experiment, aim of the experiment, procedure/algorithm followed, other such details of the experiment and final result. The left hand page should contain a print out of the respective code with sample input and corresponding output obtained. All the experiments noted in the  fair record should be verified by the faculty regularly. The fair record, properly certified by the faculty, should be produced during the time of End Semester Examination for theverification by the examiners.


Comments

Popular posts from this blog

Server/Client Communication-python

The basic mechanisms of client-server setup are: A client app send a request to a server app.  The server app returns a reply.  Some of the basic data communications between client and server are: File transfer - sends name and gets a file.  Web page - sends url and gets a page.  Echo - sends a message and gets it back.  Client server communication uses socket.              To connect to another machine, we need a socket connection. What's a connection?  A relationship between two machines, where two pieces of software know about each other. Those two pieces of software know how to communicate with each other. In other words, they know how to send bits to each other. A socket connection means the two machines have information about each other, including network location (IP address) and TCP port. (If we can use anology, IP address is the phone number and the TCP port is the extension).  A so...

Banker's Algorithm

Banker's algorithm is a deadlock avoidance algorithm. It is named so because this algorithm is used in banking systems to determine whether a loan can be granted or not. Consider there are n account holders in a bank and the sum of the money in all of their accounts is S. Everytime a loan has to be granted by the bank, it subtracts the loan amount from the total money the bank has. Then it checks if that difference is greater than S. It is done because, only then, the bank would have enough money even if all the n account holders draw all their money at once. Banker's algorithm works in a similar way in computers. Whenever a new process is created, it must exactly specify the maximum instances of each resource type that it needs. Let us assume that there are n processes and m resource types. Some data structures are used to implement the banker's algorithm. They are: Available: It is an array of length m . It represents the number of available resourc...

Inter Process Communication-Message Queue

Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system. This allows a program to handle many user requests at the same time. Since even a single user request may result in multiple processes running in the operating system on the user's behalf, the processes need to communicate with each other. The IPC interfaces make this possible. Each IPC method has its own advantages and limitations so it is not unusual for a single program to use all of the IPC methods . Message Based Communication Messages are a very general form of communication. Messages can be used to send and receive formatted data streams between arbitrary processes. Messages may have types. This helps in message interpretation. The type may specify appropriate permissions for processes. Usually at the receiver end, messages are put in a queue. Messages may also be fo...