Learn your way! Get started

.NET Remoting Using Visual C# 2005

with expert Barry Solomon


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack
  • Power Pack Plus

Release date Release date 8/7/2007
Level Level Advanced
Runtime Runtime 9h 22m
Closed captioning Closed captioning N/A
Transcript Transcript N/A
eBooks / courseware eBooks / courseware Included
Hands-on labs Hands-on labs Included
Sample code Sample code Included
Exams Exams Included
Platform Platform Internet Explorer Only


Enterprise Solutions
Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Remoting allows programs and software components to interact across application domains, processes and machine boundaries. This course covers many aspects of .NET remoting in-depth. You will learn how the .NET remoting architecture provides a means of establishing and working with secure, distributed enterprise level applications. You will also build a solid foundation for the development of remoting, and gain an understanding of client- and server-activated objects.

Prerequisites

This course assumes that students have some programming background and is appropriate for experienced application developers with more than three years of development and at minimum one year experience with .NET. Specific experience with Visual Studio 2005 or the .NET Framework is extremely useful. This course moves quickly through a broad range of advanced programming topics. Prior knowledge of distributed technologies such as DCOM or COM+ is useful.

Meet the expert

Barry Solomon Barry Solomon has over 23 years of experience as a consultant. He has developed with Fortran, C, C , Visual Basic, Java, and Visual C#. His extensive database experience includes working with Microsoft Access, Microsoft SQL Server, MySQL, and Oracle. His expertise now includes working with big data, Hadoop in particular, and all of its attending ecosystems as the limitations have been exceeded in most modern database systems.


Course outline



Module 1

Remoting Basics (51:10)
  • Introduction (02:15)
  • Overview: Remoting (04:29)
  • Remoting Basics (04:57)
  • Serialization (04:39)
  • Activation Modes (00:27)
  • Remoting Classes (11:30)
  • Object Lifetime (02:42)
  • Hosting (05:09)
  • Activation (03:19)
  • Channels (04:07)
  • Remote Objects/Hosts (03:42)
  • Demo: Remoting Object (03:24)
  • Summary (00:22)
The Hosting Application (30:53)
  • Introduction (00:42)
  • Overview (02:39)
  • Programmatic Config (00:49)
  • User Config Files (03:33)
  • Demo: Prog Config (10:44)
  • Demo: User Config Files (05:50)
  • Debugging / Deployment (02:16)
  • Client Deployment (01:25)
  • SoapSuds (02:04)
  • Summary (00:46)
Remoting and Serialization (19:44)
  • Introduction (00:36)
  • Version Tolerant (03:11)
  • Serialization Callbacks (03:09)
  • OptionalField (01:43)
  • Versioning Practices (02:52)
  • Demo: Serialization (07:35)
  • Summary (00:34)

Module 2

Formatters / Interfaces (36:09)
  • Introduction (00:44)
  • Formatters / Comm Channels (01:53)
  • Customized Channels (00:49)
  • Sink Providers (00:53)
  • Marshal by Value (02:56)
  • Marshal by Reference (01:34)
  • Interface Usage (03:55)
  • Demo: Interface Usage (05:47)
  • Version Compatibility (07:05)
  • Interface Versioning (01:46)
  • Hosting App Settings (00:47)
  • Client App Settings (00:45)
  • Demo: Work w/Versions (06:05)
  • Summary (01:02)
Generics (11:51)
  • Introduction (00:33)
  • Overview (02:40)
  • Demo: Set Up Interface (00:36)
  • Demo: Remoting Class (02:22)
  • Demo: Set Up Host (00:53)
  • Demo: Set Up Client (02:53)
  • Demo: Run Client App (01:10)
  • Summary (00:42)
Async Operations (36:01)
  • Introduction (00:48)
  • Overview (01:59)
  • SoapSuds (01:36)
  • Delegates (01:29)
  • Polling (01:56)
  • BeginInvoke/EndInvoke (01:35)
  • Demo: Async/Sync Delegates (08:15)
  • Callbacks (03:47)
  • Threads (01:39)
  • Demo: Callbacks (05:57)
  • Demo: Threads (06:12)
  • Summary (00:43)

Module 3

Events / One Way Methods (24:02)
  • Introduction (00:33)
  • Overview: Events (02:30)
  • Customized Remoting Events (00:50)
  • Events as Delegates (01:10)
  • Demo: Events (07:49)
  • Delegates in lieu of Events (01:49)
  • One-Way Method (01:55)
  • Demo: One-Way Method (06:38)
  • Summary (00:44)
Lifetime Management/Leases (40:13)
  • Introduction (01:05)
  • Overview (02:36)
  • Initialize the Lifetime (01:34)
  • Leases (02:44)
  • Lease Properties (02:35)
  • Lease Methods (00:40)
  • Lease State (00:42)
  • LifetimeServices Object (06:11)
  • Leases/Remote Objects (04:31)
  • Lease Renewal Props (01:36)
  • Demo: Lease Renewal (15:09)
  • Summary (00:45)
Lifetime Cycle / Sponsors (32:45)
  • Introduction (00:36)
  • Lease Managers (01:53)
  • Expiration Exceptions (01:52)
  • General Exceptions (01:12)
  • Remoting Exceptions (01:50)
  • Remote Timeout Exceptions (00:20)
  • Socket Exceptions (00:33)
  • Remote Object Life Cycle (05:23)
  • Lifetime Sponsors (04:14)
  • Sponsors (02:28)
  • Sponsor Lease Renewal (01:27)
  • Demo: Sponsors (09:40)
  • Summary (01:12)

Module 4

Message Queues (31:46)
  • Introduction (00:35)
  • Overview (02:36)
  • Create a Queue (03:29)
  • Demo: Check MSMQ (00:49)
  • Demo: Setup MSMQ (01:14)
  • Demo: Examine MSMQ (01:04)
  • Create Queue w/MSMQ (03:44)
  • Create Queue w/Prog. (05:53)
  • Send Messages (02:50)
  • Transactions (01:23)
  • Demo: Send Messages (02:59)
  • Demo: Transactional Types (04:33)
  • Summary (00:31)
Objects/Serviced Components (22:09)
  • Introduction (00:48)
  • Objects (01:00)
  • Receive Messages (01:44)
  • Demo: Objects (00:47)
  • Demo: Generics (04:41)
  • Demo: Receive Messages (01:58)
  • MSMQ/Serviced Components (02:44)
  • Demo: Serviced Components (07:36)
  • Summary (00:47)
Security/IIS Integration (48:29)
  • Introduction (01:16)
  • Overview (01:20)
  • Permissions (01:14)
  • Handle Perms in MMC (00:52)
  • Handle Perms in Code (01:48)
  • Demo: Perms in MMC (02:10)
  • Demo: Perms in Code (06:36)
  • Encryption (02:14)
  • Message Enumeration (01:30)
  • Demo: Encryption (03:04)
  • Demo: Certificates (03:36)
  • Demo: Message Enumeration (04:00)
  • Improvements and Changes (01:46)
  • Triggers (01:04)
  • Rules (00:55)
  • Demo: Rules (04:11)
  • Demo: View a Trigger (00:26)
  • Demo: View Rules (01:40)
  • Invocation Parameters (00:37)
  • Demo: Create New Rule (01:52)
  • Demo: Triggers (04:47)
  • Summary (01:19)

Module 5

Overview: Serviced Comp. (41:39)
  • Introduction (00:56)
  • Overview (03:58)
  • Why Serviced Components (00:47)
  • JIT Activation (01:43)
  • Loosely Coupled Events (LCE) (01:07)
  • Object Construction (00:43)
  • Object Pooling (00:36)
  • Private/Queued Components (01:49)
  • Role-based Security (01:03)
  • SOAP Services (00:50)
  • Synchronization (01:06)
  • Transactions (02:13)
  • The Serviced Component (03:57)
  • Inherit from (00:50)
  • DefaultConstructors (00:36)
  • ComVisible (01:12)
  • Activation (00:40)
  • Strong Naming (01:14)
  • Registration Methods (03:43)
  • Demo: Serviced Component (11:35)
  • Summary (00:51)
Attributes / Security (30:02)
  • Introduction (01:18)
  • Serviced Component Attribs (00:58)
  • JIT Activation (02:02)
  • Object Construction (01:01)
  • Object Pooling (04:11)
  • Private Components (00:31)
  • Queued Components (01:29)
  • Transactions (04:10)
  • Role-based Security (02:20)
  • Demo: Serviced Comp Attribs (11:05)
  • Summary (00:52)
Interfaces / COM+ (12:21)
  • Introduction (00:53)
  • Overview (02:08)
  • Consume Serviced Comp. (01:01)
  • Side-by-side Versioning (01:49)
  • Demo: Interfaces (05:45)
  • Summary (00:43)

Module 6

IIS Security (27:29)
  • Introduction (01:18)
  • Activation Agent (04:10)
  • IIS Authentication (02:49)
  • IIS Integration (02:28)
  • Demo: Examine IIS Interface (03:21)
  • Demo: Examine Client Code (02:54)
  • Demo: Set Up IIS (09:29)
  • Summary (00:55)
Code Access Security (CAS) (29:52)
  • Introduction (01:14)
  • .NET 2.0 Security (03:28)
  • Code Access Security (CAS) (01:27)
  • CAS - Permissions (01:15)
  • CAS - Group Permissions (01:02)
  • CAS - Permissions Types (01:34)
  • CAS - Membership Conditions (01:59)
  • CAS - Built in Permission Sets (02:06)
  • Frmwrk Configuration Tools (02:39)
  • Demo: Permission Sets (05:13)
  • Demo: Code Groups (07:14)
  • Summary (00:36)
Programmatic Security (35:28)
  • Introduction (00:40)
  • Working with Code (05:09)
  • Declarative Security (02:40)
  • Role-based Security (01:41)
  • Encryption (01:30)
  • Security Libraries (01:18)
  • Demo: Security (05:43)
  • Demo: Encryption (03:08)
  • Demo: Role-based Security (01:00)
  • Run the Security App (12:07)
  • Summary (00:28)