Flylib.com
List of Code Examples
Previous page
Table of content
Chapter 3: Remoting in Action
Example 3-1: The Interface Definition That Will Be Compiled to a DLL
Example 3-2: A Simple Client Application
Example 3-3: The Complete Server Implementation
Example 3-4: A Server That Offers a Client-Activated Object
Example 3-5: The Client Accesses the Client-Activated Object
Example 3-6: The Factory Design Pattern
Example 3-7: The Shared Interfaces for the Factory Design Pattern
Example 3-8: The Server-Side Factory Pattern's Implementation
Example 3-9: The Client Uses the Factory Pattern
Example 3-10: A Client That Calls a Timed-Out CAO
Example 3-11: The Shared Assembly's Source Code
Example 3-12: A Server with Some Long-Running Methods
Example 3-13: The First Client Calls the Methods Synchronously
Example 3-14: Using a Delegate in a Local Application
Example 3-15: The New Client Now Using Asynchronous Delegates
Example 3-16: The Shared Interfaces DLL Defines the One-Way Method
Example 3-17: Try/Catch Blocks Are Added to the Client
Example 3-18: Removing the
[OneWay()]
Attribute
Example 3-19: Using Abstract Base Classes in the Shared Assembly
Example 3-20: The First Server
Example 3-21: The Second Server
Example 3-22: Server That Presents a SAO
Example 3-23: Wrapped Proxies Simplify the Client's Source Code
Example 3-24: A SoapSuds-Generated Wrapped Proxy
Example 3-25: The Client with a Nonwrapped Proxy
Chapter 4: Configuration and Deployment
Example 4-1: A Shared [Serializable] Class
Example 4-2: The Server-Side Implementation of CustomerManager
Example 4-3: The SoapSuds-Generated server.cs File
Example 4-4: The Working Client Application (Excluding server.cs)
Example 4-5: A Baseline Windows Service
Example 4-6: A Basic Windows Service Installer
Example 4-7: A Simple Windows Service to Host Your Remote Components
Example 4-8: Server-Side Implementation of the SAO
Example 4-9: An Anonymous Client
Chapter 5: Securing .NET Remoting
Example 5-1: Client That Uses IIS' Built-In Authentication Methods
Example 5-2: Checking the Membership in Windows Groups When Hosting in IIS
Chapter 6: In-Depth .NET Remoting
Example 6-1: Implementation Showing the Effects of Different Lifetime Settings
Example 6-2: The Client Calling the Various SAOs with Different Delays
Example 6-3: This Class Is the Base for the Following Examples
Example 6-4: Catching the Exception When Calling an Expired Object
Example 6-5: Registering the Sponsor to Avoid Premature Termination of the Object
Example 6-6: The Server-Side Sponsor That Is Pinged by the Client
Example 6-7: Version 1.0.0.1 of the Server
Example 6-8: Version 1.0.0.1 of the Client Application
Example 6-9: The New Version 2.0.0.1 of the Server
Example 6-10: The SoapSuds-Generated Nonwrapped Proxy's Source
Example 6-11: The First Version of the Serializable Object
Example 6-12: Manual Serialization Allows More Sophisticated Versioning
Example 6-13: Trying to Use a Delegate with a SoapSuds-Generated Proxy
Example 6-14: SoapSuds -gc Output for a Simple SAO
Example 6-15: The SoapSuds-Generated server.cs After Removing the Attribute
Example 6-16: The Client Using a Wrapper Function
Example 6-17: The RemotingHelper Called with typeof(ISomeInterface)
Example 6-18: The IBroadcaster Interface (Nonworking Sample)
Example 6-19: The Server-Side Implementation of IBroadcaster
Example 6-20: The First Client's Implementation, That Won't Work
Example 6-21: The Shared Assembly Now Contains the BroadcastEventWrapper
Example 6-22: The New Listening Client's Source Code
Example 6-23: EventInitiator Simply Calls BroadcastMessage()
Example 6-23: Invoking Each Delegate on Your Own
Chapter 9: Extending .NET Remoting
Example 9-1: A Skeleton IClientChannelSink
Example 9-2: Class Returning Compressed or Uncompressed Streams
Example 9-3: A Basic IServerChannelSink
Example 9-4: The Client-Side Sink Provider
Example 9-5: The Server-Side Sink Provider
Example 9-6: A Complete Keyfile Generator
Example 9-7: The EncryptionHelper Encapsulates the Details of the Cryptographic Process
Example 9-8: The EncryptionClientSink
Example 9-9: The EncryptionServerSink
Example 9-10: The EncryptionClientSinkProvider
Example 9-11: The EncryptionServerSinkProvider
Example 9-12: The Complete PriorityEmitterSink
Example 9-13: The Client-Side PriorityEmitterSinkProvider
Example 9-14: The Server-Side PriorityChangerSink
Example 9-15: The Server-Side PriorityChangerSinkProvider
Example 9-16: The Test Client
Example 9-17: The UrlAuthenticator Stores Usernames and Passwords
Example 9-18: The UrlAuthenticationSink
Example 9-19: The UrlAuthenticationSinkProvider
Example 9-20: A Skeleton Custom Remoting Proxy
Example 9-21: Using a Custom Proxy
Example 9-22: This Custom Proxy Dumps the Request and Response Messages' Contents
Chapter 10: Developing a Transport Channel
Example 10-1: Encapsulating the Lower-Level SMTP Protocol
Example 10-2: A Retrieved and Parsed Message
Example 10-3: IChannel and IChannelSender
Example 10-4: The SMTPClientTransportSinkProvider
Example 10-5: IChannel and IChannelReceiver
Example 10-6: IChannelSinkBase and IServerChannelSink
Example 10-7: The SMTPChannel
Chapter 11: Context Matters
Example 11-1: The First Version of the Organization Object
Example 11-2: A ContextAttribute That Allows You to Intercept Calls
Example 11-3: The IContextProperty Interface
Example 11-4: The IContributeObjectSink Interface
Example 11-5: The CheckableContextProperty
Example 11-6: The CheckerSink's First Iteration
Example 11-7: The Organization Now Is a ContextBoundObject
Example 11-8: This Client Is Using the ContextBoundObject
Example 11-9: The CheckAttribute
Example 11-10: The CheckerSink
Example 11-11: This Client Does Not Honor the Business Logic Constraints
Previous page
Table of content
Advanced .NET Remoting (C# Edition)
ISBN: 1590590252
EAN: 2147483647
Year: 2002
Pages: 91
Authors:
Ingo Rammer
BUY ON AMAZON
Strategies for Information Technology Governance
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Measuring ROI in E-Commerce Applications: Analysis to Action
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
The Evolution of IT Governance at NB Power
A+ Fast Pass
Domain 2 Diagnosing and Troubleshooting
Domain 3 Preventive Maintenance
Domain 4 Motherboard/Processors/Memory
Domain 3 Diagnosing and Troubleshooting
Domain 4 Networks
C++ GUI Programming with Qt 3
Using the Reference Documentation
Storing Settings
Reading XML with DOM
Working with Threads
Communicating with the GUI Thread
SQL Hacks
Hack 25. Keep a Running Total
Hack 54. Denormalize Your Tables
Hack 79. Identify Updates Uniquely
Hack 86. Set Up Queuing in the Database
Hack 96. Create an Audit Trail
Mastering Delphi 7
The Run-Time Library
Internet Programming: Sockets and Indy
Web Programming with WebBroker and WebSnap
Delphi for .NET Preview: The Language and the RTL
Appendix B Extra Delphi Tools from Other Sources
Twisted Network Programming Essentials
Web Clients
Accessing a Password-Protected Page
Using the REST Architecture for Web Services
Sharing Python Objects with Perspective Broker
Running a Basic NNTP Server
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies