Flylib.com
List of Code Examples
Previous page
Table of content
Chapter 3: Remoting in Action
Example 3-1: The Interface Definition That Will Be Compiled to a DLL
Example 3-2: A Simple Client Application
Example 3-3: The Complete Server Implementation
Example 3-4: A Server That Offers a Client-Activated Object
Example 3-5: The Client Accesses the Client-Activated Object
Example 3-6: The Factory Design Pattern
Example 3-7: The Shared Interfaces for the Factory Design Pattern
Example 3-8: The Server-Side Factory Pattern's Implementation
Example 3-9: The Client Uses the Factory Pattern
Example 3-10: A Client That Calls a Timed-Out CAO
Example 3-11: The Shared Assembly's Source Code
Example 3-12: A Server with Some Long-Running Methods
Example 3-13: The First Client Calls the Methods Synchronously
Example 3-14: Using a Delegate in a Local Application
Example 3-15: The New Client Now Using Asynchronous Delegates
Example 3-16: The Shared Interfaces DLL Defines the One-Way Method
Example 3-17: Try/Catch Blocks Are Added to the Client
Example 3-18: Removing the
[OneWay()]
Attribute
Example 3-19: Using Abstract Base Classes in the Shared Assembly
Example 3-20: The First Server
Example 3-21: The Second Server
Example 3-22: Server That Presents a SAO
Example 3-23: Wrapped Proxies Simplify the Client's Source Code
Example 3-24: A SoapSuds-Generated Wrapped Proxy
Example 3-25: The Client with a Nonwrapped Proxy
Chapter 4: Configuration and Deployment
Example 4-1: A Shared [Serializable] Class
Example 4-2: The Server-Side Implementation of CustomerManager
Example 4-3: The SoapSuds-Generated server.cs File
Example 4-4: The Working Client Application (Excluding server.cs)
Example 4-5: A Baseline Windows Service
Example 4-6: A Basic Windows Service Installer
Example 4-7: A Simple Windows Service to Host Your Remote Components
Example 4-8: Server-Side Implementation of the SAO
Example 4-9: An Anonymous Client
Chapter 5: Securing .NET Remoting
Example 5-1: Client That Uses IIS' Built-In Authentication Methods
Example 5-2: Checking the Membership in Windows Groups When Hosting in IIS
Chapter 6: In-Depth .NET Remoting
Example 6-1: Implementation Showing the Effects of Different Lifetime Settings
Example 6-2: The Client Calling the Various SAOs with Different Delays
Example 6-3: This Class Is the Base for the Following Examples
Example 6-4: Catching the Exception When Calling an Expired Object
Example 6-5: Registering the Sponsor to Avoid Premature Termination of the Object
Example 6-6: The Server-Side Sponsor That Is Pinged by the Client
Example 6-7: Version 1.0.0.1 of the Server
Example 6-8: Version 1.0.0.1 of the Client Application
Example 6-9: The New Version 2.0.0.1 of the Server
Example 6-10: The SoapSuds-Generated Nonwrapped Proxy's Source
Example 6-11: The First Version of the Serializable Object
Example 6-12: Manual Serialization Allows More Sophisticated Versioning
Example 6-13: Trying to Use a Delegate with a SoapSuds-Generated Proxy
Example 6-14: SoapSuds -gc Output for a Simple SAO
Example 6-15: The SoapSuds-Generated server.cs After Removing the Attribute
Example 6-16: The Client Using a Wrapper Function
Example 6-17: The RemotingHelper Called with typeof(ISomeInterface)
Example 6-18: The IBroadcaster Interface (Nonworking Sample)
Example 6-19: The Server-Side Implementation of IBroadcaster
Example 6-20: The First Client's Implementation, That Won't Work
Example 6-21: The Shared Assembly Now Contains the BroadcastEventWrapper
Example 6-22: The New Listening Client's Source Code
Example 6-23: EventInitiator Simply Calls BroadcastMessage()
Example 6-23: Invoking Each Delegate on Your Own
Chapter 9: Extending .NET Remoting
Example 9-1: A Skeleton IClientChannelSink
Example 9-2: Class Returning Compressed or Uncompressed Streams
Example 9-3: A Basic IServerChannelSink
Example 9-4: The Client-Side Sink Provider
Example 9-5: The Server-Side Sink Provider
Example 9-6: A Complete Keyfile Generator
Example 9-7: The EncryptionHelper Encapsulates the Details of the Cryptographic Process
Example 9-8: The EncryptionClientSink
Example 9-9: The EncryptionServerSink
Example 9-10: The EncryptionClientSinkProvider
Example 9-11: The EncryptionServerSinkProvider
Example 9-12: The Complete PriorityEmitterSink
Example 9-13: The Client-Side PriorityEmitterSinkProvider
Example 9-14: The Server-Side PriorityChangerSink
Example 9-15: The Server-Side PriorityChangerSinkProvider
Example 9-16: The Test Client
Example 9-17: The UrlAuthenticator Stores Usernames and Passwords
Example 9-18: The UrlAuthenticationSink
Example 9-19: The UrlAuthenticationSinkProvider
Example 9-20: A Skeleton Custom Remoting Proxy
Example 9-21: Using a Custom Proxy
Example 9-22: This Custom Proxy Dumps the Request and Response Messages' Contents
Chapter 10: Developing a Transport Channel
Example 10-1: Encapsulating the Lower-Level SMTP Protocol
Example 10-2: A Retrieved and Parsed Message
Example 10-3: IChannel and IChannelSender
Example 10-4: The SMTPClientTransportSinkProvider
Example 10-5: IChannel and IChannelReceiver
Example 10-6: IChannelSinkBase and IServerChannelSink
Example 10-7: The SMTPChannel
Chapter 11: Context Matters
Example 11-1: The First Version of the Organization Object
Example 11-2: A ContextAttribute That Allows You to Intercept Calls
Example 11-3: The IContextProperty Interface
Example 11-4: The IContributeObjectSink Interface
Example 11-5: The CheckableContextProperty
Example 11-6: The CheckerSink's First Iteration
Example 11-7: The Organization Now Is a ContextBoundObject
Example 11-8: This Client Is Using the ContextBoundObject
Example 11-9: The CheckAttribute
Example 11-10: The CheckerSink
Example 11-11: This Client Does Not Honor the Business Logic Constraints
Previous page
Table of content
Advanced .NET Remoting (C# Edition)
ISBN: 1590590252
EAN: 2147483647
Year: 2002
Pages: 91
Authors:
Ingo Rammer
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Project Size
Practice: Process and Practice Tailoring
Scope Evolution
Structure and Tools
Implementing the Vision
The CISSP and CAP Prep Guide: Platinum Edition
Information Security and Risk Management
Legal, Regulations, Compliance, and Investigations
Understanding Certification and Accreditation
Appendix A Answers to Assessment Questions
Appendix F Security Control Catalog
Adobe After Effects 7.0 Studio Techniques
Study a Shot like an Effects Artist
Masks
Effective Motion Tracking
Film and Video Looks
Details
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Retail Logistics: Changes and Challenges
Relationships in the Supply Chain
Fashion Logistics and Quick Response
Temperature-Controlled Supply Chains
The Development of E-tail Logistics
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
Creating a Struts-based MVC Application
Form Presentation and Validation with Struts
Managing Business Logic with Struts
Creating a Search Engine with Lucene
Building the JavaEdge Application with Ant and Anthill
Web Systems Design and Online Consumer Behavior
Chapter II Information Search on the Internet: A Causal Model
Chapter III Two Models of Online Patronage: Why Do Consumers Shop on the Internet?
Chapter VI Web Site Quality and Usability in E-Commerce
Chapter XII Web Design and E-Commerce
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies