Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: The Moon is Blue
Figure 1-1: Current application topology at Contoso, Ltd.
Figure 1-2: A service-oriented alternative
Figure 1-3: WCF in context
Chapter 2: Service Orientation
Figure 2-1: Message flow at Contoso Boomerang Corporation
Figure 2-2: Message flow at Contoso Boomerang Corporation with a messaging router
Figure 2-3: A simple message exchange
Figure 2-4: A traditional component-oriented application
Figure 2-5: Scaling a component-oriented application
Figure 2-6: Using services
Chapter 3: Message Exchange Patterns, Topologies, and Choreographies
Figure 3-1: The datagram MEP
Figure 3-2: The Request/Reply MEP
Figure 3-3: The Duplex MEP
Figure 3-4: Forward-only point-to-point message topology
Figure 3-5: Brokered topology
Figure 3-6: Peer-to-peer topology
Chapter 4: WCF 101
Figure 4-1: Endpoints, addresses, bindings, contracts, and behaviors
Figure 4-2: The ServiceModel layer and the Channel layer
Figure 4-3: How the ABCs of WCF influence the ServiceModel layer and the Channel layer
Chapter 6: Channels
Figure 6-1: A typical channel stack
Figure 6-2: The channel state machine embodied in CommunicationObject
Figure 6-3: Channel stack with a WS-ReliableMessaging protocol channel
Figure 6-4: A shaping channel
Chapter 7: Channel Managers
Figure 7-1: The channel listener stack
Chapter 10: Dispatchers and Clients
Figure 10-1: The roles of a ChannelDispatcher object
Figure 10-2: ChannelDispatcher anatomy.
Figure 10-3: EndpointDispatcher anatomy
Figure 10-4: DispatchRuntime anatomy
Previous page
Table of content
Next page
Inside Windows Communication Foundation (Pro Developer)
ISBN: 0735623066
EAN: 2147483647
Year: 2007
Pages: 106
Authors:
Justin Smith
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Agile Practices
Practice: Project Data Sheet
Practice: Customer Team-Developer Team Interface
Practice: Product Feature List
Summary
Inside Network Security Assessment: Guarding Your IT Infrastructure
Introduction to Assessing Network Vulnerabilities
Encryption
Common Risk-Assessment Methodologies and Templates
Post-Assessment Activities
Security Standards
MySQL Clustering
Common Errors While Importing Tables
The Structure of config.ini
MySQL Clusters Native Backup Tool
Security and Management
Indexes
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Internet Protocol Version 6 (IPv6)
User Datagram Protocol
Windows Internet Name Service (WINS)
File and Printer Sharing
Virtual Private Networks (VPNs)
An Introduction to Design Patterns in C++ with Qt 4
Inlining versus Macro Expansion
QObject
Validation and Regular Expressions
Event-Driven Parsing
Storage Class
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 15. Control Your Computer from Your Palm
Hack 31. Analyze Traffic with Ethereal
Hack 73. Run Linux on the Zipit Wireless Messenger
Hack 74. Capture Wireless Users with NoCatAuth
Appendix A. Wireless Standards
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies