Build a service-oriented WCF application series course (video course instructor: Fu Zhongkai)

Source: Internet
Author: User

Build a WCF Service-Oriented Application series course (15): extensibility. Zip

Lecture content: Just like the rich features provided by WCF, developers can use the service model to expand more features. For example, the following lists the reasons why developers need to customize WCF extensions: Standardized coding habits, providing default operations for host and channel initialization, and adding new actions for message processing, controls how messages are processed, provides standardized error processing semantics, and extends the security model to support custom verification...
[Preview]

Build a WCF Service-Oriented Application series course (7): News pattern. Zip

Lecture content: when we build a distributed enterprise system, various types of message exchange can meet the needs of different communication modes. In this course, we will demonstrate how to use different message modes to meet different deployment and communication requirements in services. For example, using MTOM and stream technology to process big messages, discussing how to use the classic message exchange mode and the design of service contracts...
[Preview]

Build a WCF Service-Oriented Application series course (1): wcf .zip

Lecture content: Windows Communication Foundation (WCF) is a message platform provided by Microsoft to build a service-oriented application (SOA. This platform is released along with the Windows Vista operating system as part of. NET Framework 3.0. WCF unifies the development model for how components communicate with services...
[Preview]

Build a service-oriented WCF application series course (8): Development Model .zip

Lecture content: by configuring the WCF Service, the life cycle of the service instance can be restricted during the request process and the duration of the Client Session (proxy instance, it is even "always" in a single-piece service ". Depending on the client's expected call mode, status processing needs, and the expected throughput of service requests, different applications have different options for the service life cycle. In WCF, instance model control...
[Preview]

Build a service-oriented WCF application series course (12): interest. Zip

Lecture content: When we send a message to a remote service, we usually need to confirm that the message has been delivered. If a message is not sent, we usually want to try again or take appropriate actions. Generally, these message delivery guarantees are provided by some transmission protocols, such as the TCP protocol or named pipe. However, these measures can ensure point-to-point situations. If there is an intermediary between the sender and the receiver in the communication process ,...
[Preview]

Build a WCF Service-Oriented Application series course (3): contract processing. Zip

Lecture content: the client relies on the contract defined by the Web Services (Web Services Description Language) to communicate with the service. The WSDL contract describes the operations available in each service endpoint and the format and outline of the messages related to each operation. Changing a published contract may cause compatibility issues for existing clients. To ensure its...
[Preview]

Build a WCF Service-Oriented Application series course (5): Binding (bindings0000.zip

Lecture: we have learned how to use some standard bindings (such as NetTcpBinding and BasicHttpBinding) to expose service endpoints. In fact, each endpoint of the service must be associated with a specific binding. The binding describes the transmission protocol, the data encoding format, and the message protocol required to define the communication channel. In this course, we will introduce how to bind the configuration...
[Preview]

Build a service-oriented WCF application series course (6): Cebu (hosting).zip

Lecture content: for a service that can provide access at runtime, it must run in the host of the hosted process. The WCF Service can use IIS 6.0 and IIS 7.0 installed with the new WAS (Windows Process Activation Service) or any hosted application processes (such as the console, Windows Form, WPF, w...
[Preview]

Build a service-oriented WCF application series (9): concurrency, traffic and traffic limit. Zip

Lecture content: as part of a large-scale enterprise system, deploying a service usually has conflicting goals. On the one hand, we need to be able to process as many concurrent requests as possible. On the other hand, requests may need to be throttled so that the server load will not be too heavy. In this course, we will explore the features that WCF provides to manage concurrent access and throttling access. Learn how to configure the service to allow the thread to re-import or...
[Preview]

Build a service-oriented WCF application series course (2): wcfcontract design. Zip

Lecture content: the client communicates with the server by exchanging serialized messages and deserializing the messages at their respective endpoints to the runtime type in the public language. In the simplest scenario, the client and server developers operate on each other only through objects, and all serialization operations are hidden for execution. WCF provides this hidden operation. Web Services Description Language (WSDL) describes the arrival...
[Preview]

Build a service-oriented WCF application series course (4): exception and error handling. Zip

Lecture content: in a distributed system, remote exceptions must pass through the boundaries of processes or computers before reaching the client. In a Service-Oriented Architecture (SOA), a boundary may be a service boundary located in the same process, or a process or computer boundary. In addition to these distributed boundaries, there are still many technical and platform boundaries. In this webcast, we will introduce SOAP errors and their...
[Preview]

Build a service-oriented WCF application series (10): Security Basics. Zip

Lecture content: by providing a large number of default security settings at the transmission and message level, WCF is secure by default. However, to provide appropriate security restrictions, we usually need to modify the configuration of the WCF binding. In this course, we will start with the basic concepts of security, such as authentication, authorization, message-level security, and how to apply digital signatures and encryption. Then, we will explore a variety of common services in enterprise systems...
[Preview]

Build a WCF Service-Oriented Application series course (13): transactions. Zip

Lecture content: transactions are a key part of a high-reliability system. When two or more operations are required to be completed in an atomic task, transaction requirements are usually required to ensure ACID (atomicity, consistency, isolation, and durability. During development, these features of transactions can be achieved through transaction programming. On the. NET platform, advanced features such as transaction initialization are provided starting from version 2.0. Using these services...
[Preview]

Build a service-oriented WCF application series course (14): Events. Zip

Lecture content: in Distributed Systems, queue calling is another way to achieve reliability. When a developer uses the classic request/response mode to send a message, the response usually indicates whether the request is successful. In the case of one-way messages, it is very difficult to confirm that the messages have successfully arrived at the destination and are processed successfully because there is no response. According to the application scenario, in one-way call, although the developer may not close it...
[Preview]

Build a WCF Service-Oriented Application series course (11): Joint Security .zip

Lecture content: In WCF, security models support a wide range of declarative authentication methods. In fact, any security token can be expressed as a set of declarations, such as Windows authentication, user name and password, or X509 certificates. The canonicalized statement is the core of the federated security model. It allows developers to deploy tokens to a set of specified domains and verify the token based on these declarations for loose coupling. In this time...
[Preview]

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.