Flylib.com
List of Code Examples
Previous page
Table of content
Chapter 3: Remoting in Action
Example 3-1: The Interface Definition That Will Be Compiled to a DLL
Example 3-2: A Simple Client Application
Example 3-3: The Complete Server Implementation
Example 3-4: A Server That Offers a Client-Activated Object
Example 3-5: The Client Accesses the Client-Activated Object
Example 3-6: The Factory Design Pattern
Example 3-7: The Shared Interfaces for the Factory Design Pattern
Example 3-8: The Server-Side Factory Pattern's Implementation
Example 3-9: The Client Uses the Factory Pattern
Example 3-10: A Client That Calls a Timed-Out CAO
Example 3-11: The Shared Assembly's Source Code
Example 3-12: A Server with Some Long-Running Methods
Example 3-13: The First Client Calls the Methods Synchronously
Example 3-14: Using a Delegate in a Local Application
Example 3-15: The New Client Now Using Asynchronous Delegates
Example 3-16: The Shared Interfaces DLL Defines the One-Way Method
Example 3-17: Try/Catch Blocks Are Added to the Client
Example 3-18: Removing the
[OneWay()]
Attribute
Example 3-19: Using Abstract Base Classes in the Shared Assembly
Example 3-20: The First Server
Example 3-21: The Second Server
Example 3-22: Server That Presents a SAO
Example 3-23: Wrapped Proxies Simplify the Client's Source Code
Example 3-24: A SoapSuds-Generated Wrapped Proxy
Example 3-25: The Client with a Nonwrapped Proxy
Chapter 4: Configuration and Deployment
Example 4-1: A Shared [Serializable] Class
Example 4-2: The Server-Side Implementation of CustomerManager
Example 4-3: The SoapSuds-Generated server.cs File
Example 4-4: The Working Client Application (Excluding server.cs)
Example 4-5: A Baseline Windows Service
Example 4-6: A Basic Windows Service Installer
Example 4-7: A Simple Windows Service to Host Your Remote Components
Example 4-8: Server-Side Implementation of the SAO
Example 4-9: An Anonymous Client
Chapter 5: Securing .NET Remoting
Example 5-1: Client That Uses IIS' Built-In Authentication Methods
Example 5-2: Checking the Membership in Windows Groups When Hosting in IIS
Chapter 6: In-Depth .NET Remoting
Example 6-1: Implementation Showing the Effects of Different Lifetime Settings
Example 6-2: The Client Calling the Various SAOs with Different Delays
Example 6-3: This Class Is the Base for the Following Examples
Example 6-4: Catching the Exception When Calling an Expired Object
Example 6-5: Registering the Sponsor to Avoid Premature Termination of the Object
Example 6-6: The Server-Side Sponsor That Is Pinged by the Client
Example 6-7: Version 1.0.0.1 of the Server
Example 6-8: Version 1.0.0.1 of the Client Application
Example 6-9: The New Version 2.0.0.1 of the Server
Example 6-10: The SoapSuds-Generated Nonwrapped Proxy's Source
Example 6-11: The First Version of the Serializable Object
Example 6-12: Manual Serialization Allows More Sophisticated Versioning
Example 6-13: Trying to Use a Delegate with a SoapSuds-Generated Proxy
Example 6-14: SoapSuds -gc Output for a Simple SAO
Example 6-15: The SoapSuds-Generated server.cs After Removing the Attribute
Example 6-16: The Client Using a Wrapper Function
Example 6-17: The RemotingHelper Called with typeof(ISomeInterface)
Example 6-18: The IBroadcaster Interface (Nonworking Sample)
Example 6-19: The Server-Side Implementation of IBroadcaster
Example 6-20: The First Client's Implementation, That Won't Work
Example 6-21: The Shared Assembly Now Contains the BroadcastEventWrapper
Example 6-22: The New Listening Client's Source Code
Example 6-23: EventInitiator Simply Calls BroadcastMessage()
Example 6-23: Invoking Each Delegate on Your Own
Chapter 9: Extending .NET Remoting
Example 9-1: A Skeleton IClientChannelSink
Example 9-2: Class Returning Compressed or Uncompressed Streams
Example 9-3: A Basic IServerChannelSink
Example 9-4: The Client-Side Sink Provider
Example 9-5: The Server-Side Sink Provider
Example 9-6: A Complete Keyfile Generator
Example 9-7: The EncryptionHelper Encapsulates the Details of the Cryptographic Process
Example 9-8: The EncryptionClientSink
Example 9-9: The EncryptionServerSink
Example 9-10: The EncryptionClientSinkProvider
Example 9-11: The EncryptionServerSinkProvider
Example 9-12: The Complete PriorityEmitterSink
Example 9-13: The Client-Side PriorityEmitterSinkProvider
Example 9-14: The Server-Side PriorityChangerSink
Example 9-15: The Server-Side PriorityChangerSinkProvider
Example 9-16: The Test Client
Example 9-17: The UrlAuthenticator Stores Usernames and Passwords
Example 9-18: The UrlAuthenticationSink
Example 9-19: The UrlAuthenticationSinkProvider
Example 9-20: A Skeleton Custom Remoting Proxy
Example 9-21: Using a Custom Proxy
Example 9-22: This Custom Proxy Dumps the Request and Response Messages' Contents
Chapter 10: Developing a Transport Channel
Example 10-1: Encapsulating the Lower-Level SMTP Protocol
Example 10-2: A Retrieved and Parsed Message
Example 10-3: IChannel and IChannelSender
Example 10-4: The SMTPClientTransportSinkProvider
Example 10-5: IChannel and IChannelReceiver
Example 10-6: IChannelSinkBase and IServerChannelSink
Example 10-7: The SMTPChannel
Chapter 11: Context Matters
Example 11-1: The First Version of the Organization Object
Example 11-2: A ContextAttribute That Allows You to Intercept Calls
Example 11-3: The IContextProperty Interface
Example 11-4: The IContributeObjectSink Interface
Example 11-5: The CheckableContextProperty
Example 11-6: The CheckerSink's First Iteration
Example 11-7: The Organization Now Is a ContextBoundObject
Example 11-8: This Client Is Using the ContextBoundObject
Example 11-9: The CheckAttribute
Example 11-10: The CheckerSink
Example 11-11: This Client Does Not Honor the Business Logic Constraints
Previous page
Table of content
Advanced .NET Remoting (C# Edition)
ISBN: 1590590252
EAN: 2147483647
Year: 2002
Pages: 91
Authors:
Ingo Rammer
BUY ON AMAZON
Image Processing with LabVIEW and IMAQ Vision
Some Definitions
Other Image Sources
Image Standards
Digital Imaging and Communication in Medicine (DICOM)
Gray-Scale Operations
FileMaker Pro 8: The Missing Manual
Building a New Database
Creating Layouts for Reports
Lookups
Working with Windows
FileMaker Network Sharing
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Part Three. Office Programming in VSTO
Adding Windows Forms Controls to Your Document
Adding Controls at Runtime
Strong Names
Moving Away from COM Add-Ins
Understanding Digital Signal Processing (2nd Edition)
REFERENCES
PHASE RESPONSE OF FIR FILTERS
IMPULSE INVARIANCE IIR FILTER DESIGN METHOD
COHERENT AVERAGING
SPECTRAL PEAK LOCATION ALGORITHM
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Objects, Interfaces, and Patterns
Network Programming
ASP.NET Web Applications
Web Services
Security and Cryptography
Digital Character Animation 3 (No. 3)
Chapter Three. Rigging Characters
Animating Walks
Animating the Face
Reptiles
Acting and the Body
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies