Flylib.com
C++ Network Programming, Volume I: Mastering Complexity with ACE and Patterns
C++ Network Programming, Volume I: Mastering Complexity with ACE and Patterns
ISBN: 0201604647
EAN: 2147483647
Year: 2001
Pages: 101
Authors:
Douglas C. Schmidt
,
Stephen D. Huston
BUY ON AMAZON
Main Page
Table of content
Copyright
List of Figures
Foreword
About This Book
Intended Audience
Structure and Content
Related Material
Acknowledgments
Chapter 0. Design Challenges, Middleware Solutions, and ACE
0.1 Challenges of Networked Applications
0.2 Networked Application Design Dimensions
0.3 Object-Oriented Middleware Solutions
0.4 An Overview of the ACE Toolkit
0.5 Example: A Networked Logging Service
0.6 Summary
Part I: Object-Oriented Network Programming
Chapter 1. Communication Design Dimensions
1.1 Connectionless versus Connection-Oriented Protocols
1.2 Synchronous versus Asynchronous Message Exchange
1.3 Message Passing versus Shared Memory
1.4 Summary
Chapter 2. An Overview of the Socket API
2.1 An Overview of Operating System IPC Mechanisms
2.2 The Socket API
2.3 Limitations of the Socket API
2.4 Summary
Chapter 3. The ACE Socket Wrapper Facades
3.1 Overview
3.2 The ACE_Addr and ACE_INET_Addr Classes
3.3 The ACE_IPC_SAP Class
3.4 The ACE_SOCK Class
3.5 The ACE_SOCK_Connector Class
3.6 The ACE_SOCK_IO and ACE_SOCK_Stream Classes
3.7 The ACE_SOCK_Acceptor Class
3.8 Summary
Chapter 4. Implementing the Networked Logging Service
4.1 Overview
4.2 The ACE_Message_Block Class
4.3 The ACE_InputCDR and ACE_OutputCDR Classes
4.4 The Initial Logging Server
4.5 The Client Application
4.6 Summary
Part II: Concurrent Object-Oriented Network Programming
Chapter 5. Concurrency Design Dimensions
5.1 Iterative, Concurrent, and Reactive Servers
5.2 Processes versus Threads
5.3 ProcessThread Spawning Strategies
5.4 User, Kernel, and Hybrid Threading Models
5.5 Time-Shared and Real-Time Scheduling Classes
5.6 Task- versus Message-Based Architectures
5.7 Summary
Chapter 6. An Overview of Operating System Concurrency Mechanisms
6.1 Synchronous Event Demultiplexing
6.2 Multiprocessing Mechanisms
6.3 Multithreading Mechanisms
6.4 Synchronization Mechanisms
6.5 Limitations with OS Concurrency Mechanisms
6.6 Summary
Chapter 7. The ACE Synchronous Event Demultiplexing Wrapper Facades
7.1 Overview
7.2 The ACE_Handle_Set Class
7.3 The ACE_Handle_Set_Iterator Class
7.4 The ACE::select() Methods
7.5 Summary
Chapter 8. The ACE Process Wrapper Facades
8.1 Overview
8.2 The ACE_Process Class
8.3 The ACE_Process_Options Class
8.4 The ACE_Process_Manager Class
8.5 Summary
Chapter 9. The ACE Threading Wrapper Facades
9.1 Overview
9.2 The ACE_Thread_Manager Class
9.3 The ACE_Sched_Params Class
9.4 The ACE_TSS Class
9.5 Summary
Chapter 10. The ACE Synchronization Wrapper Facades
10.1 Overview
10.2 The ACE Guard Classes
10.3 The ACE Mutex Classes
10.4 The ACE ReadersWriter Lock Classes
10.5 The ACE Semaphore Classes
10.6 The ACE Condition Variable Classes
10.7 Summary
Appendix A. Design Principles for ACE C Wrapper Facades
A.1 Overview
A.2 Use Wrapper Facades to Enhance Type Safety
A.3 Simplify for the Common Case
A.4 Use Hierarchies to Enhance Design Clarity and Extensibility
A.5 Hide Platform Differences Whenever Possible
A.6 Optimize for Efficiency
A.7 Summary
Appendix B. The Past, Present, and Future of ACE
B.1 The Evolution of ACE
B.2 The Road Ahead
B.3 Concluding Remarks
Glossary
Bibliography
C++ Network Programming, Volume I: Mastering Complexity with ACE and Patterns
ISBN: 0201604647
EAN: 2147483647
Year: 2001
Pages: 101
Authors:
Douglas C. Schmidt
,
Stephen D. Huston
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Determining the Differences in Data Between Two DataSet Objects
Maintaining Database Integrity
Avoiding Referential Integrity Problems When Updating the Data Source
Creating Custom Columns in a Windows Forms DataGrid
Creating a Table in the Database from a DataTable Schema
Beginning Cryptography with Java
The JCA and the JCE
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
CMS and S/MIME
SSL and TLS
Certified Ethical Hacker Exam Prep
Linux
Trojan and Backdoor Countermeasures
Web Server Hacking, Web Applications, and Database Attacks
Study Strategies
Cryptography
Developing Tablet PC Applications (Charles River Media Programming)
The Tablet PC
Introduction to the VB .NET Language
Advanced Microsoft Agent
Power Management for the Tablet PC
Pong Game
SQL Hacks
Hack 5. Solve a Crossword Puzzle Using SQL
Hack 32. Cope with Rounding Errors
Hack 52. Display Columns As Rows
Hack 93. Auto-Create Database Users
Hack 96. Create an Audit Trail
C & Data Structures (Charles River Media Computer Engineering)
Introduction to the C Language
Data Types
Memory Allocation
Structures
Trees
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies