Learn your way! Get started

.NET Remoting Using Visual Basic 2005

with expert Barry Solomon


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack
  • Power Pack Plus

Release date Release date 6/8/2007
Level Level Advanced
Runtime Runtime 9h 22m
Closed captioning Closed captioning N/A
Transcript Transcript N/A
eBooks / courseware eBooks / courseware Included
Hands-on labs Hands-on labs Included
Sample code Sample code Included
Exams Exams Included
Platform Platform Internet Explorer Only


Enterprise Solutions
Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Remoting allows programs and software components to interact across application domains, processes and machine boundaries. This course covers many aspects of .NET remoting in-depth. You will learn how the .NET remoting architecture provides a means of establishing and working with secure, distributed enterprise level applications. You will also build a solid foundation for the development of remoting, and gain an understanding of client- and server-activated objects.

Prerequisites

This course assumes that students have some programming background and is appropriate for experienced application developers with more than three years of development and at minimum one year experience with .NET. Specific experience with Visual Studio 2005 or the .NET Framework is extremely useful. This course moves quickly through a broad range of advanced programming topics. Prior knowledge of distributed technologies such as DCOM or COM+ is useful.

Meet the expert

Barry Solomon Barry Solomon has over 23 years of experience as a consultant. He has developed with Fortran, C, C , Visual Basic, Java, and Visual C#. His extensive database experience includes working with Microsoft Access, Microsoft SQL Server, MySQL, and Oracle. His expertise now includes working with big data, Hadoop in particular, and all of its attending ecosystems as the limitations have been exceeded in most modern database systems.


Course outline



Module 1

Remoting Basics (37:42)
  • Introduction (02:15)
  • Overview: Remoting (03:09)
  • Remoting Basics (02:55)
  • Serialization (03:21)
  • Remoting Classes (04:41)
  • Activation Modes (05:01)
  • Object Lifetime (02:47)
  • Hosting (02:44)
  • Activation (02:32)
  • Channels (02:36)
  • Remote Objects/Hosts (02:34)
  • Demo: Remoting Object (02:40)
  • Summary (00:22)
The Hosting Application (28:27)
  • Introduction (00:42)
  • Overview (03:10)
  • Progammatic Config (01:25)
  • User Config Files (03:35)
  • Demo: Prog Config (07:03)
  • Demo: User Config Files (05:36)
  • Debugging / Deployment (01:59)
  • Client Deployment (02:20)
  • SoapSuds (01:45)
  • Summary (00:46)
Remoting and Serialization (16:52)
  • Introduction (00:36)
  • Version Tolerant (03:59)
  • Serialization Callbacks (02:08)
  • OptionalField (01:12)
  • Versioning Practices (02:17)
  • Demo: Serialization (06:03)
  • Summary (00:34)

Module 2

Formatters / Interfaces (34:35)
  • Introduction (00:44)
  • Formatters / Channels (02:49)
  • Customized Channels (00:47)
  • Sink Providers (00:52)
  • Marshal by Value (02:34)
  • Marshal by Reference (01:30)
  • Interface Usage (03:35)
  • Demo: Interface Usage (04:19)
  • Version Compatibility (07:08)
  • Interface Versioning (02:08)
  • Hosting App Settings (01:17)
  • Client App Settings (00:42)
  • Demo: Work w/Versions (05:02)
  • Summary (01:02)
Generics (14:04)
  • Introduction (00:33)
  • Overview (03:29)
  • Demo: Set Up Interface (00:34)
  • Demo: Remoting Class (01:51)
  • Demo: Set Up Host (01:09)
  • Demo: Set Up Client (04:02)
  • Demo: Run Client App (01:41)
  • Summary (00:42)
Async Operations (40:25)
  • Introduction (00:48)
  • Overview (02:39)
  • SoapSuds (02:20)
  • Delegates (01:16)
  • Polling (01:32)
  • BeginInvoke/EndInvoke (01:31)
  • Demo: Invoke/Delegates (05:01)
  • Demo: Delegates (04:46)
  • Callbacks (04:36)
  • Threads (02:12)
  • Demo: Callbacks (05:59)
  • Demo: Threads (06:55)
  • Summary (00:43)

Module 3

Events / One Way Methods (22:21)
  • Introduction (00:33)
  • Overview: Events (03:32)
  • Customized Remoting Events (01:05)
  • Events as Delegates (01:04)
  • Demo: Events (04:47)
  • Events in lieu of Delegates (02:39)
  • One-Way Method (02:17)
  • Demo: One-Way Method (05:34)
  • Summary (00:44)
Lifetime Management/Leases (42:39)
  • Introduction (01:05)
  • Overview (02:44)
  • Initialize the Lifetime (02:28)
  • Leases (02:55)
  • Lease Properties (02:39)
  • Lease Methods (00:50)
  • Lease State (01:55)
  • LifetimeServices Object (05:23)
  • Leases/Remote Objects (05:31)
  • Lease Renewal Props (02:51)
  • Demo: Lease Renewal (13:29)
  • Summary (00:45)
Lifetime Cycle / Sponsors (40:56)
  • Introduction (00:36)
  • Lease Managers (03:29)
  • Expiration Exceptions (00:16)
  • General Exceptions (01:01)
  • Remoting Exceptions (06:06)
  • Remote Object Life Cycle (07:35)
  • Lifetime Sponsors (03:58)
  • Sponsors (05:14)
  • Sponsor Lease Renewal (02:54)
  • Demo: Sponsors (08:31)
  • Summary (01:12)

Module 4

Message Queues (30:45)
  • Introduction (00:35)
  • Overview (03:07)
  • Create a Queue (05:10)
  • Demo: Check MSMQ (01:01)
  • Demo: Setup MSMQ (00:58)
  • Demo: Create a Queue (05:34)
  • Demo: Examine Queue (01:08)
  • Send Messages (02:22)
  • Transactions (01:34)
  • Demo: Send Messages (08:41)
  • Summary (00:31)
Objects/Serviced Components (24:02)
  • Introduction (00:48)
  • Objects (01:26)
  • Receive Messages (02:37)
  • Demo: Objects (02:34)
  • Demo: Receive Messages (01:39)
  • Demo: Generics (06:24)
  • MSMQ/Serviced Components (02:28)
  • Demo: Serviced Components (05:15)
  • Summary (00:47)
Security/IIS Integration (59:43)
  • Introduction (01:16)
  • Overview (01:00)
  • Permissions (04:34)
  • Handle Perms in MMC (01:11)
  • Handle Perms in Code (05:24)
  • Encryption (03:08)
  • Message Enumeration (01:38)
  • Demo: Encryption (04:15)
  • Demo: Certificates (05:42)
  • Demo: Message Enumeration (10:11)
  • Improvements and Changes (02:49)
  • Triggers (02:27)
  • Demo: Triggers (03:33)
  • Demo: Integrate with IIS (00:54)
  • Demo: Rules (03:36)
  • Demo: New Rule (01:47)
  • Demo: View Rules (02:59)
  • Demo: View MSMQ (01:51)
  • Summary (01:19)

Module 5

Overview: Serviced Comp. (36:09)
  • Introduction (00:56)
  • Overview (13:07)
  • Using Serviced Components (10:51)
  • Demo: Set Up Components (02:56)
  • Demo: Set Up Strong Name (01:52)
  • Demo: Sign Project (00:41)
  • Demo: Register Component (01:30)
  • Demo: Start Component (01:00)
  • Demo: Component Props (02:22)
  • Summary (00:51)
Attributes / Security (30:01)
  • Introduction (01:18)
  • Serviced Component Attribs (01:04)
  • JIT Activation (01:49)
  • Object Construction (01:21)
  • Object Pooling (05:01)
  • Private Components (00:44)
  • Queued Components (01:24)
  • Transactions (06:20)
  • Role-based Security (02:54)
  • Demo: Serviced Comp Attribs (07:10)
  • Summary (00:52)
Interfaces / COM+ (15:33)
  • Introduction (00:53)
  • Overview (03:54)
  • Consume Serviced Comp. (00:46)
  • Side-by-side Versioning (01:40)
  • Demo: Interfaces (02:26)
  • Demo: Put it All Together (05:06)
  • Summary (00:43)

Module 6

IIS Security (21:33)
  • Introduction (01:18)
  • Activation Agent (03:52)
  • Authentication (04:05)
  • IIS Integration (02:39)
  • Demo: Set Up IIS (05:55)
  • Demo: Create Web App (02:46)
  • Summary (00:55)
Code Access Security (CAS) (29:52)
  • Introduction (01:14)
  • .NET 2.0 Security (04:57)
  • Code Access Security (CAS) (01:16)
  • CAS - Permissions (02:20)
  • CAS - Group Permissions (00:52)
  • CAS - Permissions Types (02:04)
  • CAS - Membership Conditions (03:18)
  • CAS - Built in Permission Sets (02:16)
  • Frmwrk Configuration Tools (01:39)
  • Demo: Permission Sets (03:08)
  • Demo: Code Groups (06:06)
  • Summary (00:36)
Programmatic Security (36:17)
  • Introduction (00:40)
  • Working with Code (08:33)
  • Declarative Security (02:17)
  • Role-based Security (01:08)
  • Encryption (01:09)
  • Security Libraries (01:05)
  • Demo: Security (04:01)
  • Demo: Role-based Security (01:58)
  • Demo: Encryption (02:33)
  • Run the Security App (12:19)
  • Summary (00:28)