4288

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Program : Diploma in Cyber Forensics and Information Security

Course Title: Computer Network Engineering


Course Code : 4288
Lab

Semester : 6 Credits: 2.5

Course Category: Program Core

Periods per week: 4 (L:0 T:1 P:3) Periods per semester: 60

Course Objectives:

● Provide hands-on experience in computer networking.

Course Prerequisites:

Course
Topic / Description Course Title Semester
Code
Basic knowledge in IP addressing, Computer Communication
4
routing and networking devices and Networks

Course Outcomes:

On completion of the course, the students will be able to:

Duration
COn Description Cognitive Level
(Hours)

Identify and configure hardware components in a


CO1 11 Applying
network

CO2 Build Local Area Networks. 17 Applying

CO3 Plan and configure Routers. 13 Applying

CO4 Construct Virtual Local Area Network (VLAN) 16 Applying

Lab Exam 3
CO-PO Mapping

Course
PO1 PO2 PO3 PO4 PO5 PO6 PO7
Outcomes
CO1 3 3
CO2 3 3 3
CO3 3 3 3
CO4 3 3 3 3 3

3-Strongly mapped, 2-Moderately mapped, 1-Weakly mapped

Course Outline

Module Duration
Name of Experiment Cognitive Level
Outcomes (Hours)

CO1 Identify and configure hardware components in a network

Identify various types of networking cables and


M1.01 2 Understanding
connectors
Identify various networking devices such as
M1.02 2 Understanding
switch, router, wireless router etc.
M1.03 Practice Crimping. 4 Applying
Experiment with installation and configuration of
M1.04 3 Applying
wired and wireless NIC

CO2 Build Local Area Networks

M2.01 Demonstrate IP address and MAC address of NIC 2 Understanding


Demonstrate static and dynamic IP address
M2.02 2 Understanding
settings

M2.03 Experiment peer to peer networking. 3 Applying

M2.04 Implement Local Area Networks 3 Applying


Make use of basic network configuration
M2.05 2 Applying
commands like ping, ifconfig,tracert etc
Plan and configure a wireless router to access the
M2.06 3 Applying
Internet.
Identify simple problems in LAN and
M2.07 2 Applying
troubleshooting of LAN

Lab Exam – I 1.5


CO3 Plan and configure Routers.

M3.01 Demonstrate Network Simulator 1 Understanding

M3.02 Experiment with basic router commands 2 Applying

M3.03 Experiment network in a simulator with switches 2 Applying


Plan and configure Network in a simulator with
M3.04 4 Applying
two LAN’s and a router
Plan and configure Network in a simulator with
M3.05 2 Applying
two LAN’s and two routers
Plan and configure Network in a simulator with
M3.06 2 Applying
three routers

CO4 Construct Virtual Local Area Network (VLAN)

Experiment with MAC Address Table


M4.01 1 Applying
verification
Demonstrate creating and renaming VLANs in a
M4.02 1 Applying
Switch
Experiment assigning VLAN membership to
M4.03 2 Applying
switch ports
Experiment verifying VLAN information by
M4.04 2 Applying
show vlan brief command
Configure Inter-VLAN routing using L3
M4.05 2 Applying
Switch/Router
Experiment with testing the reachability between
M4.06 2 Applying
the users of VLANs .
Open Ended Experiments** 6

Lab Exam – II 1.5

**-Suggested Open-ended Experiments:


(Not for End Semester Examination but compulsory to be included in Continuous Internal
Evaluation. Students can do open-ended experiments as a group of 2-3. There is no
duplication in experiments between groups.)
1. Setup a LAN for the real world situation.
2. Resolve the problems in a LAN.
Text / Reference:

T/R Book Title / Author


Vikas Gupta, Comdex Hardware and Networking Course Kit, Dreamtech Press,
T1
2018
Todd Lammle, CCNA Routing and Switching Complete Study Guide, Sybex
T2
(Wiley) Publication, 2016, 2nd Edition

Online Resources:

Sl. No. Website Link


1 https://www.freeccnastudyguide.com/study-guides/icnd1-100-101/
2 https://study-ccna.com/
3 http://www.codesandtutorials.com/hardware/
4 https://www.omnisecu.com/cisco-certified-network-associate-ccna/index.php

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy