Cryptography and Network Security Assurance Laboratory

  • DoS or DDoS or Honeypots
  • Trojans or Virus or Enumeration
  • Sniffer or Spoofing
  • PKI or Authentication or Steganography
  • RC4 or RSA
  • S-DES or T-SDES
  • MD5
  • Block Cipher Modes
  • SQL Injection
  • Buffer overflow
  • Web-based Password Capturing

LAN-Trainer

  • Aloha
  • CSMA
  • CSMA/CD
  • CSMA/CA
  • Token Bus
  • Token Ring
  • Stop and Wait
  • Stop and Wait with BER
  • Sliding Window Go Back N
  • Sliding Window Go Back N with BER
  • Sliding Window Selective Repeat
  • Sliding Window Selective Repeat with BER
  • Packet Transmission
  • File transfer and Packet Sniffing
  • RC4 Key
  • Encrypting a file using RC4 algorithm
  • File transfer using Socket FTP
  • Distance vector routing protocol
  • Link state routing protocol

Computer Networks Training System

  • MAC Table Formation
  • Shared, Switched Bandwidth Utilization and Comparison
  • Spanning Tree Protocol
  • Spanning Tree Protocol – Loop Detection
  • Port based VLAN
  • Tag based VLAN
  • Throughput Measurement Setup – Multiple Clients
  • Throughput Measurement Setup – Power Variation
  • Throughput Measurement Setup
  • Access Point as Repeater
  • Radio Survey for Wireless LAN
  • Performance of Routing Information Protocol – RIP
  • Performance of Open Shortest Path First
  • Convergence time in OSPF
  • Network and Port Address Translation
  • Network Access Control Using Firewall
  • Stateful Inspection technique using Firewall – packets dropping
  • L2 switch – MAC Address Table
  • L2 switch – Spanning Tree
  • L2 switch – Tag Based VLAN
  • L2 switch – Port Based VLAN

Wireless communication

  • Baseband digital communication link
  • Equalization techniques
  • Quadrature modulation schemes
  • GSM
  • OFDM synchronization
  • Basic aspects of CDMA – DS (direct sequence)
  • Linear Adaptive equalizer
  • Decision Feedback equalizer
  • GMSK
  • OFDM

WLAN – Experiments

  • Setting up of WLAN-T
  • mpact of Transmission power in a WLAN
  • Distance factor for a node in WLAN

IoT – Internet of Things

  • Sensor data over UART-I2C, SPI, Analog, Digital
  • Sensor values using RIME
  • Node Networking Map
  • RPL BRP
  • Sensing & controlling using CoAP
  • Packet Sniffing
  • Charting of sensor values using IPV6/6LoWPAN
  • Storing sensor values in cloud
  • Controlling DC Relay within LAN