Lecturer(s)
|
|
Course content
|
Course contents and syllabus: 1. Introduction - network environment and its possibilities, overview of approaches to communication of Internet applications. 2. Basic technologies for the design of Internet applications - web, programming languages, development environments. 3. Asynchronous and synchronous solutions on the server side - principles, differences, Node.js, Java. 4. Communication between applications and their components - AJAX, Long-polling, WebSockets. 5. Other communication techniques - sockets, streaming, WebRTC, specifics of IoT. 6. Advanced API - Google, Microsoft, IBM - standards, principles, practical use in various cases. 7. Virtualization of Internet applications - cloud and container solutions, complex systems. 8. Identity management. 9. Role based access control. The practical part of the course (tutorials) copies the content of lectures. During the tutorials, students will apply and practice theoretical knowledge from lectures. The use of teamwork and project teaching is also expected.
|
Learning activities and teaching methods
|
Monologic (reading, lecture, briefing), Demonstration, Practical training, Case studies
- Class attendance
- 56 hours per semester
- Preparation for exam
- 26 hours per semester
- Preparation for classes
- 48 hours per semester
|
Learning outcomes
|
The aim of the course is to provide students with knowledge related to the design and operation of network applications. Emphasis in lectures and exercises is placed on the most common procedures and technologies, so that students are able to apply them in practice. Thematically, the course focuses mainly on rapid prototyping, communication, security features and efficient operation of Internet applications.
Upon completion of the course the student will be able to use modern technologies for web applications usage. He will also be able to design applications using appropriate network communication and integrate other services available on the Internet into the proposed applications. In the field of security, the student will have knowledge of identity management and setting of security constraints based on roles, including their integration into their own applications.
|
Prerequisites
|
A prerequisite for this course is successful completion of the course OOP I and II.
|
Assessment methods and criteria
|
Written examination, Analysis of student's work activities (technical works), Test
To successfully complete the course, it is necessary to solve continuous and homework tasks in exercises, pass a theoretical test, and pass an oral exam.
|
Recommended literature
|
-
HASSAN, Qusay F. (ed.). Internet of things A to Z: technologies and applications. John Wiley & Sons, 2018.. ISBN 9781119456773.
-
KANE, Sean P.; MATTHIAS, Karl. Docker: Up & Running: Shipping Reliable Containers in Production. O'Reilly Media, 2018.. ISBN 9781492036746.
-
KUMAR, Akshi. Web Technology: Theory and Practice. CRC Press, 2018. ISBN 9781351029896.
-
W3Schools. Online web tutorials.
|