Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles                Instructions

A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The subject matter of a course is described in various texts.

BIE-SIP.21 Network Programming Extent of teaching: 2P+2C
Instructor: Fesl J. Completion: Z
Department: 18104 Credits: 5 Semester: Z

Annotation:
The course covers fundamental topics of programming network applications. It consists of 4 parts. The introductory part is focused on low-level programming using BSD sockets. The second part is devoted to designing communication protocols and their verification. The third part introduces the principles and applications of middleware technologies. The final part introduces basic modern models of distributed computing - P2P and blockchain. All topics will be first explained theoretically and then practices in computer labs using a chosen programming language environment.

Lecture syllabus:
1. Network interface programming - protocols TCP and UDP.
2. Network interface programming - blocking and nonblocking operations.
3. Network interface programming - group-oriented communications.
4. Secure network applications - protocols SSL and TLS.
5. Best practices for programming of secure networks applications.
6. Design and implementation of network protocols.
7. Prototyping and verification of network protocols.
8. Middleware technologies - remote procedure calls.
9. Middleware technologies - producer/consumer concept.
10. Implementation of network applications, debugging and best practices for their implementation.
11. Design and implementation of peer-to-peer network applications.
12. The blockchain model and its application for programming of network applications.
13. Debugging of distributed network applications.

Seminar syllabus:
The exercises correlate with the syllabus of lectures and demonstrate the current topic practically.
1. Network interface programming - protocols TCP and UDP.
2. Network interface programming - blocking and nonblocking operations.
3. Network interface programming - group-oriented communications.
4. Secure network applications - protocols SSL and TLS.
5. Best practices for programming of secure networks applications.
6. Design and implementation of network protocols.
7. Prototyping and verification of network protocols.
8. Middleware technologies - remote procedure calls.
9. Middleware technologies - producer/consumer concept.
10. Implementation of network applications, debugging and best practices for their implementation.
11. Design and implementation of peer-to-peer network applications.
12. The blockchain model and its application for programming of network applications.
13. Debugging of distributed network applications.

Literature:
1. Stevens R. W. et al : Unix Network Programming, Volume 1: The Sockets Networking API (3rd Edition). Addison-Wesley, 2004. ISBN 978-0131411555.
2. Stevens R. W. : Unix Network Programming, Volume 2: Interprocess Communications (2nd Edition). Addison-Wesley, 1998. ISBN 978-0132974295.
3. Raval S. : Decentralized Applications: Harnessing Bitcoin's Blockchain Technology. OReilly, 2016. ISBN 978-1491924549.
4. Colouris G. : Distributed Systems: Concepts and Design (5th Edition). Addison-Wesley, 2011. ISBN 978- 0132143011.

Requirements:

Chybí webová strana předmětu

The course is also part of the following Study plans:
Study Plan Study Branch/Specialization Role Recommended semester
BIE-SI.21 Software Engineering 2021 V 5
BIE-PV.21 Computer Systems and Virtualization 2021 V 5
BIE-IB.21 Information Security 2021 (Bachelor in English) V 5
BIE-PS.21 Computer Networks and Internet 2021 PS 5
BIE-TI.21 Computer Science 2021 V 5
BIE-PI.21 Computer Engineering 2021 V 5


Page updated 28. 3. 2024, semester: Z/2023-4, L/2019-20, L/2022-3, Z/2019-20, Z/2022-3, L/2020-1, L/2023-4, Z/2020-1, Z,L/2021-2, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška