CS INTERNET PROGRAMMING Lecture Notes.» CS INTERNET PROGRAMMING Lecture Notes. Lecture notes Provided by. Einstein college of. CS INTERNET COMPUTING UNIT – I. FUNDAMENTALS. PART A. 1. What is the difference between node and host? A node is any addressable device. Anna University Chennai B.E Computer Science CS – INTERNET PROGRAMMING Question paper.

Author: Tausho Dolkree
Country: Dominican Republic
Language: English (Spanish)
Genre: History
Published (Last): 4 November 2017
Pages: 217
PDF File Size: 4.95 Mb
ePub File Size: 4.85 Mb
ISBN: 127-1-50877-890-7
Downloads: 25731
Price: Free* [*Free Regsitration Required]
Uploader: Vokora

What is the difference between node and host? A node is any addressable device connected to a network whereas the host is a more specific descriptor that refers to a networked general-purpose computer rather than a single purpose device such as a printer. What is the purpose of routers?

Router operates progrmming electronic postal workers that evaluate and forward packets between networks. A protocol is a formal set of rules that must be followed in order to communicate. Why are the protocols layered?

Layering protocols simplifies the task of communicating over the network and it allows for reuse of layers that are not specific to a particular application. Placing the data inside a package of headers is known as encapsulation. A port is a logical channel to an application running on a host. What do you mean by well-known ports?

Port numbers can range from 1 tohowever ports 1 to are reserved. These reserved ports are referred to as we1l-known ports because the Internet Assigned Numbers Authority publicly documents the applications that use them. What is meant by Name Resolution? Name Cs1401-interet is the process of mapping a hostname to its corresponding IP Address.

One way to translate a hostname to an IP address is to look it up in a simple text file. The second way is the domain name service, which is a distributed database containing all registered hostnames on the Internet and their IP addresses. Protocol tunneling is the process of encapsulating one protocol within programming protocol that operates on the same layer.

It identifies an object on cs1401-intsrnet Internet. It is a specification for identifying an object such as a cs1401-itnernet, newsgroup, CGI program or e-mail address by indicating the exact location on the internet. It is a method for referencing an object without declaring the full path to the object.

The components are host, an optional port, path, filename, section and query string. What are the issues of next generation IP? The issues to be considered in IP next generation are 1. Addresses Space Growth 2.

Support large Global networks 3. A clear way of transition from the existing IP to new IP next generation Connection less protocol Datagram service No guarantee of delivery. What does ICMP provide? Demand reply functions It is Internet Group Management protocol. List the goals of SGML. To manage the flow of millions of pages. For structuring information exchange 3. For modeling inter-document linkages 4. For managing information flows between departments and weapons systems What is the role of server?


Manages application tasks 2. Handles accounting and distribution What are the necessities of using HTML forms? Gathering user information 2. What are the sequences of steps for each HTTP request from a client to the server? Making the connection 2. Making a request 3.

Closing the connection List the predefined MIME content types. It is a simple page description language, which enables document creation for the web. What is meant by loop back address? A zone that enables the server to direct traffic to itself. The host number is almost always The program could be written in. CGI programs are the most common way for Web servers to interact dynamically with users. Another increasingly common way to provide dynamic feedback for Web users is to include scripts or programs that run on the user’s machine rather than the Web server.

These programs can be Java applets, Java scripts, or ActiveX controls. These technologies are known collectively as client-side solutions, while the use of CGI is a server-side solution because the processing occurs on the Web server. For busy Web sites, this can slow down the server noticeably. Another increasingly popular solution is to use Java servlets. Because IIS is tightly integrated with the operating system, it is relatively easy to administer.

ISAPI enables programmers to develop Web-based applications that run much faster than conventional CGI programs because they’re more tightly integrated with the Web server. A set of routines, protocols, and tools for building software applications. A good API makes it easier to develop a program by providing all the building blocks.

A programmer puts the blocks together. Most operating environments, such as MS- Windows, provide an API so that programmers can write applications consistent with the operating environment. Although APIs are designed for programmers, they are ultimately good for users because they guarantee that all programs using a common API will have similar interfaces. This makes it easier for users to learn new programs.

A small program that runs on a server, the term usually refers to a Java applet that runs within a Web server environment. This is analogous to a Java applet that runs within a Web browser environment.

Java servlets are becoming increasingly popular as an alternative to CGI programs. The biggest difference between the two is that a Java applet is persistent. This means that once it is started, it stays in memory and can fulfill multiple requests. In contrast, a CGI program disappears once it has fulfilled a request.


CS1401 Internet Programming Syllabus

The persistence of Java applets makes them faster because there’s no wasted time in setting up and tearing down the process. A program designed to be executed from within another application. Unlike an application, applets cannot be executed directly from the operating system. With the growing popularity of OLE object linking and embeddingapplets are becoming more prevalent. A well-designed applet can be invoked from many different applications. Web browsers, who are often equipped with Java virtual machines, can interpret applets from Web servers.

What do you mean by Server-side? Occurring on the server side of a client-server system. In contrast, JavaScript scripts are client-side because they are executed by your browser the client. Java applets probramming be either server-side or cs1401-intdrnet side depending on which computer the server or the client executes them. What is a protocol? An agreed-upon format for transmitting data between two devices.

The protocol determines the following: The type of error checking to be used 2. Data Compression method, if any 3.


How the sending device will indicate that it has finished sending a message 4. How the receiving device will indicate that it has received a message There are a variety of standard protocols from which programmers can choose. Each has particular advantages and disadvantages; for example, some are simpler than others, some are more reliable, and some are faster.

The protocol can be implemented either in hardware or in software. A loosely defined set of technologies developed by Microsoft for sharing information among different applications.

As a moniker, ActiveX can be very confusing because it applies to a whole set of COM-based technologies. Most people, however, think only of ActiveX controls, which represent cs1401-intefnet specific way of implementing ActiveX technologies.

Write a note on ActiveX controls. A control using ActiveX technologies. An ActiveX control can be automatically downloaded and executed by a Web browser. ActiveX is not a programming language, but rather a set of rules for how applications should share information.

An ActiveX control is similar to a Java applet. Unlike Java applets, however, ActiveX controls have full access to the Windows operating system. This gives them much more power than Java applets, but with this power comes a certain risk that the applet may damage software or data on your machine.