This document provides a summary of key concepts in Windows Communication Foundation (WCF) including configuration, contracts, bindings, behaviors, and more. It explains that WCF provides an abstraction layer over transports that allows developers to focus on message types rather than transport details. Contracts define message structure, bindings describe how messages are sent, and addresses specify where messages are sent. The document provides overviews of common WCF configuration sections and the purpose of various contracts, bindings, and behaviors.
The document discusses steps for deploying a successful virtual network, including designing the network, building and configuring hardware, and configuring the virtual machine manager. It covers providing isolation through techniques like VLANs and software defined networking. Topics include logical network addressing, host configuration options, and creating logical switches. Tenant configuration using network virtualization is described for isolation.
Semantic Reasoning in Context-Aware Assistive Environments to Support Ageing ...IPALab
Robust solutions for ambient assisted living are numerous, yet predominantly specific in their scope of usability. In this paper, we de- scribe the potential contribution of semantic web technologies to building more versatile solutions — a step towards adaptable context-aware en- gines and simplified deployments. Our conception and deployment work in hindsight, we highlight some implementation challenges and require- ments for semantic web tools that would help to ease the development of context-aware services and thus generalize real-life deployment of se- mantically driven assistive technologies. We also compare available tools with regard to these requirements and validate our choices by providing some results from a real-life deployment.
Cassandra & the Acunu Data Platform
Tom Wilkie discusses how the Acunu data platform provides significant performance improvements for Cassandra. Acunu uses a doubling array technique for inserts and range queries that is over 100x faster than standard Cassandra for small random operations. It bridges the performance gap between traditional and modern distributed databases through its shared memory interface and kernel optimizations.
The document discusses the seven layers of the OSI model:
1) The physical layer deals with physical connectivity including cables and connectors.
2) The data link layer handles MAC addressing and encapsulation of data into frames.
3) The network layer routes packets based on IP addressing and protocols like ICMP and ARP.
4) The transport layer handles reliable transmission of data through protocols like TCP and UDP.
5) The session, presentation, and application layers deal with establishing connections between applications and formatting data.
Castle is a storage system that uses a doubling array (DA) to transform random I/O into sequential I/O for distributed, shared-nothing databases handling big data workloads. The DA improves on B-Trees by allowing for faster small random inserts and range queries after inserts compared to traditional storage systems. Castle also uses snapshots and clones to address problems with supporting new big data workloads, such as reducing space blowup from copy-on-write operations. Based on benchmarks inserting 3 billion rows and performing subsequent small random queries, Castle provides over an order of magnitude better performance than standard Cassandra for these workloads.
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...Naoki Shibata
Shibata, N., Yasumoto, K., and Mori, M.: P2P Video Broadcast based on Per-Peer Transcoding and its Evaluation on PlanetLab, Proc. of 19th IASTED Int'l. Conf. on Parallel and Distributed Computing and Systems (PDCS2007), pp. 478-483, (November 2007).
http://ito-lab.naist.jp/themes/pdffiles/071121.shibata.pdcs2007.pdf
We have previously proposed a P2P video broadcast method called MTcast for simultaneously delivering video to user peers with different quality requirements. In this paper, we design and implement a prototype system of MTcast and report the results of its performance evaluation in the real Internet environment. MTcast relies on each peer to transcode and forward video to other peers. We conducted experiments on 20 PlanetLab nodes, evaluated startup delay and recovery time from peer leaving/failure, and confirmed that MTcast achieves practical performance in a real environment.
Diameter is the next generation Authentication, Authorization and Accounting (AAA) protocol that consists of a base specification and applications. It allows for roaming between networks by authenticating users through their home network and granting access on remote networks. Several organizations are working on Diameter specifications and applications to support different access technologies and services. Further work is still needed to complete specifications for Mobile IP, SIP, and other network applications.
The document discusses steps for deploying a successful virtual network, including designing the network, building and configuring hardware, and configuring the virtual machine manager. It covers providing isolation through techniques like VLANs and software defined networking. Topics include logical network addressing, host configuration options, and creating logical switches. Tenant configuration using network virtualization is described for isolation.
Semantic Reasoning in Context-Aware Assistive Environments to Support Ageing ...IPALab
Robust solutions for ambient assisted living are numerous, yet predominantly specific in their scope of usability. In this paper, we de- scribe the potential contribution of semantic web technologies to building more versatile solutions — a step towards adaptable context-aware en- gines and simplified deployments. Our conception and deployment work in hindsight, we highlight some implementation challenges and require- ments for semantic web tools that would help to ease the development of context-aware services and thus generalize real-life deployment of se- mantically driven assistive technologies. We also compare available tools with regard to these requirements and validate our choices by providing some results from a real-life deployment.
Cassandra & the Acunu Data Platform
Tom Wilkie discusses how the Acunu data platform provides significant performance improvements for Cassandra. Acunu uses a doubling array technique for inserts and range queries that is over 100x faster than standard Cassandra for small random operations. It bridges the performance gap between traditional and modern distributed databases through its shared memory interface and kernel optimizations.
The document discusses the seven layers of the OSI model:
1) The physical layer deals with physical connectivity including cables and connectors.
2) The data link layer handles MAC addressing and encapsulation of data into frames.
3) The network layer routes packets based on IP addressing and protocols like ICMP and ARP.
4) The transport layer handles reliable transmission of data through protocols like TCP and UDP.
5) The session, presentation, and application layers deal with establishing connections between applications and formatting data.
Castle is a storage system that uses a doubling array (DA) to transform random I/O into sequential I/O for distributed, shared-nothing databases handling big data workloads. The DA improves on B-Trees by allowing for faster small random inserts and range queries after inserts compared to traditional storage systems. Castle also uses snapshots and clones to address problems with supporting new big data workloads, such as reducing space blowup from copy-on-write operations. Based on benchmarks inserting 3 billion rows and performing subsequent small random queries, Castle provides over an order of magnitude better performance than standard Cassandra for these workloads.
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...Naoki Shibata
Shibata, N., Yasumoto, K., and Mori, M.: P2P Video Broadcast based on Per-Peer Transcoding and its Evaluation on PlanetLab, Proc. of 19th IASTED Int'l. Conf. on Parallel and Distributed Computing and Systems (PDCS2007), pp. 478-483, (November 2007).
http://ito-lab.naist.jp/themes/pdffiles/071121.shibata.pdcs2007.pdf
We have previously proposed a P2P video broadcast method called MTcast for simultaneously delivering video to user peers with different quality requirements. In this paper, we design and implement a prototype system of MTcast and report the results of its performance evaluation in the real Internet environment. MTcast relies on each peer to transcode and forward video to other peers. We conducted experiments on 20 PlanetLab nodes, evaluated startup delay and recovery time from peer leaving/failure, and confirmed that MTcast achieves practical performance in a real environment.
Diameter is the next generation Authentication, Authorization and Accounting (AAA) protocol that consists of a base specification and applications. It allows for roaming between networks by authenticating users through their home network and granting access on remote networks. Several organizations are working on Diameter specifications and applications to support different access technologies and services. Further work is still needed to complete specifications for Mobile IP, SIP, and other network applications.
The document provides examination tips for the OL Mathematics 4024 exam. It discusses general advice, as well as specific tips for Paper 1 (non-calculator) and Paper 2 (calculator). Some key points are: Paper 1 has shorter questions while Paper 2 has longer questions requiring more working; write in dark blue or black pen and show your working to earn partial credit; double check units, order of operations, and rounding of answers; and read questions carefully to know what is being asked.
The document presents a seminar on cloud computing. It introduces cloud computing as on-demand access to shared computing resources like networks, servers, storage, applications and services via the internet. It discusses key characteristics like agility, APIs, cost-effectiveness, and scalability. The document also covers types of clouds, providers, advantages like reduced costs and improved access, difficulties like availability and security, and concludes that cloud computing provides many on-demand services.
Este documento describe las diferentes tecnologías utilizadas en la Escuela Ana Neri. Se mencionan herramientas como computadoras, impresoras, retroproyectores, televisión, video, DVD y sala multifuncional que los profesores usan para preparar lecciones dinámicas y convertir contenidos teóricos en videos e imágenes. El objetivo es facilitar la comprensión de los contenidos para los estudiantes. También se enumeran otros equipos como ventiladores, caja de sonido, cámara digital y radio con CD y USB.
Este documento presenta las diferentes opciones disponibles para los estudiantes en un aula virtual, incluyendo actualizar su perfil, participar en foros, enviar mensajes, configurar su correo estudiantil, crear una firma electrónica, formar grupos de interés y compartir documentos.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The document summarizes the diagnosis and management of otitis media. It defines acute otitis media as a bacterial or viral infection of the middle ear lining characterized by an abnormal eardrum. The most common organisms causing acute and chronic otitis media are discussed. Conservative management includes pain medication and antibiotics if needed. Antibiotic treatment depends on the severity and duration of symptoms. Chronic otitis media may require surgery if associated with hearing loss or infection. Guidelines recommend watchful waiting for most cases of otitis media with effusion without risk factors.
PowerPoint 2010 introduces new features to help users author, enrich, and deliver presentations more effectively. Some key features include expanded templates and section organization tools to kick off authoring; enhanced photo and video editing capabilities like effects, bookmarks and trimming; simultaneous co-authoring for collaboration; and new broadcast, recording, and sharing tools to deliver presentations to wider audiences.
The document summarizes events from a high school football game between Van Nuys High School and Huntington Park High School. It describes people arriving at the stadium and buying tickets. It shows the home team warming up on the field in their uniforms. It also depicts the marching band practicing tunes while the football players warmed up. It details various rituals before the game like the national anthem and a moment of silence. The game resulted in a loss for Van Nuys with a score of 26 to 31, but both teams displayed sportsmanship by shaking hands afterwards.
The document summarizes HD Radio technology which allows radio stations to broadcast both digital signals and analog signals simultaneously. It describes how HD Radio transmitters work by taking audio and data from studios and broadcasting the digital signals using COFDM modulation with audio compression, while also transmitting the analog signals. Receivers can then receive either signal type. The document outlines the key components of HD Radio transmitters including importers, exgines, exporters and synchronizers. It also discusses the differences between HD Radio implementation for AM and FM bands.
This document provides instructions for folding napkins into several different shapes, including the pyramid, arrow, bird of paradise, diamond, cone, French, bishop's hat, rosebud, sail, slide, and crown folds. The steps typically involve folding the napkin in half, quarters, and diagonally in various configurations to create the different napkin shapes. Some folds may be easier to achieve with a stiffer napkin or using an iron.
Cefdinir and its role in otitis media, clinical study, indications, dosages, advantage, role of clavunalic acid, hepatotoxicity role all the research features are includes here to be prepared for Rajshahi Medical College, Focusing ENT specialist
Otitis is one of the most frequent diseases in early childhood and one of the reasons for first prescription of antibiotics.
Most frequently reported pediatric bacterial infection, with up to 85% of children experiencing an episode by the age of 3 years and many of them have to treat with medicine and surgical management is restricted
This document provides an overview of the Service Component Architecture (SCA) assembly model and its key features. SCA provides a programming model and assembly model for building applications and solutions using SOA principles. It allows components to be built from new or existing code in any language and assembled into composite applications. SCA supports loose coupling between services, flexibility in replacing components, and heterogeneity in languages and communication mechanisms.
Quantum is an OpenStack project to provide network connectivity as a service between interface devices. It will enable cloud tenants to create rich networking topologies, build advanced network services and innovative network capabilities.
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...virtual-campus
This document describes a learning package on SLA-aware service infrastructures that aim to 1) hide differences between service infrastructures, 2) support higher layers of service-based applications through SLA-constrained autonomous decisions, and 3) allow for SLA-oriented self-adaptation and violation propagation across layers through monitoring and adaptation mechanisms. The research focuses on autonomous behavior in service infrastructures while considering constraints from SLAs agreed to at higher composition and business process layers.
The unified data center for cloud david yendeepersnet
The document discusses Cisco's vision for the unified data center and cloud. It describes how data center demands are driving the need to evolve from distributed to fabric-based and application-driven architectures. Cisco's strategy involves delivering an integrated fabric and cloud world with many clouds through innovations in computing, networking, storage, security and management. This will provide business value through service-centric provisioning, flexibility, and scaling of physical and virtual resources.
Viestinnän seminaari 8.11.2012 / ExchangeSalcom Group
The document announces a Microsoft Exchange Server preview workshop on October 2012 that will be led by a senior trainer/consultant and will cover Exchange from all versions, certification services, and server infrastructure. The workshop will discuss how Exchange enables remaining in control of communications both online and on-premises, helping users be more productive across devices, and keeping the organization safe by protecting information and meeting compliance requirements.
The document provides examination tips for the OL Mathematics 4024 exam. It discusses general advice, as well as specific tips for Paper 1 (non-calculator) and Paper 2 (calculator). Some key points are: Paper 1 has shorter questions while Paper 2 has longer questions requiring more working; write in dark blue or black pen and show your working to earn partial credit; double check units, order of operations, and rounding of answers; and read questions carefully to know what is being asked.
The document presents a seminar on cloud computing. It introduces cloud computing as on-demand access to shared computing resources like networks, servers, storage, applications and services via the internet. It discusses key characteristics like agility, APIs, cost-effectiveness, and scalability. The document also covers types of clouds, providers, advantages like reduced costs and improved access, difficulties like availability and security, and concludes that cloud computing provides many on-demand services.
Este documento describe las diferentes tecnologías utilizadas en la Escuela Ana Neri. Se mencionan herramientas como computadoras, impresoras, retroproyectores, televisión, video, DVD y sala multifuncional que los profesores usan para preparar lecciones dinámicas y convertir contenidos teóricos en videos e imágenes. El objetivo es facilitar la comprensión de los contenidos para los estudiantes. También se enumeran otros equipos como ventiladores, caja de sonido, cámara digital y radio con CD y USB.
Este documento presenta las diferentes opciones disponibles para los estudiantes en un aula virtual, incluyendo actualizar su perfil, participar en foros, enviar mensajes, configurar su correo estudiantil, crear una firma electrónica, formar grupos de interés y compartir documentos.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The document summarizes the diagnosis and management of otitis media. It defines acute otitis media as a bacterial or viral infection of the middle ear lining characterized by an abnormal eardrum. The most common organisms causing acute and chronic otitis media are discussed. Conservative management includes pain medication and antibiotics if needed. Antibiotic treatment depends on the severity and duration of symptoms. Chronic otitis media may require surgery if associated with hearing loss or infection. Guidelines recommend watchful waiting for most cases of otitis media with effusion without risk factors.
PowerPoint 2010 introduces new features to help users author, enrich, and deliver presentations more effectively. Some key features include expanded templates and section organization tools to kick off authoring; enhanced photo and video editing capabilities like effects, bookmarks and trimming; simultaneous co-authoring for collaboration; and new broadcast, recording, and sharing tools to deliver presentations to wider audiences.
The document summarizes events from a high school football game between Van Nuys High School and Huntington Park High School. It describes people arriving at the stadium and buying tickets. It shows the home team warming up on the field in their uniforms. It also depicts the marching band practicing tunes while the football players warmed up. It details various rituals before the game like the national anthem and a moment of silence. The game resulted in a loss for Van Nuys with a score of 26 to 31, but both teams displayed sportsmanship by shaking hands afterwards.
The document summarizes HD Radio technology which allows radio stations to broadcast both digital signals and analog signals simultaneously. It describes how HD Radio transmitters work by taking audio and data from studios and broadcasting the digital signals using COFDM modulation with audio compression, while also transmitting the analog signals. Receivers can then receive either signal type. The document outlines the key components of HD Radio transmitters including importers, exgines, exporters and synchronizers. It also discusses the differences between HD Radio implementation for AM and FM bands.
This document provides instructions for folding napkins into several different shapes, including the pyramid, arrow, bird of paradise, diamond, cone, French, bishop's hat, rosebud, sail, slide, and crown folds. The steps typically involve folding the napkin in half, quarters, and diagonally in various configurations to create the different napkin shapes. Some folds may be easier to achieve with a stiffer napkin or using an iron.
Cefdinir and its role in otitis media, clinical study, indications, dosages, advantage, role of clavunalic acid, hepatotoxicity role all the research features are includes here to be prepared for Rajshahi Medical College, Focusing ENT specialist
Otitis is one of the most frequent diseases in early childhood and one of the reasons for first prescription of antibiotics.
Most frequently reported pediatric bacterial infection, with up to 85% of children experiencing an episode by the age of 3 years and many of them have to treat with medicine and surgical management is restricted
This document provides an overview of the Service Component Architecture (SCA) assembly model and its key features. SCA provides a programming model and assembly model for building applications and solutions using SOA principles. It allows components to be built from new or existing code in any language and assembled into composite applications. SCA supports loose coupling between services, flexibility in replacing components, and heterogeneity in languages and communication mechanisms.
Quantum is an OpenStack project to provide network connectivity as a service between interface devices. It will enable cloud tenants to create rich networking topologies, build advanced network services and innovative network capabilities.
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...virtual-campus
This document describes a learning package on SLA-aware service infrastructures that aim to 1) hide differences between service infrastructures, 2) support higher layers of service-based applications through SLA-constrained autonomous decisions, and 3) allow for SLA-oriented self-adaptation and violation propagation across layers through monitoring and adaptation mechanisms. The research focuses on autonomous behavior in service infrastructures while considering constraints from SLAs agreed to at higher composition and business process layers.
The unified data center for cloud david yendeepersnet
The document discusses Cisco's vision for the unified data center and cloud. It describes how data center demands are driving the need to evolve from distributed to fabric-based and application-driven architectures. Cisco's strategy involves delivering an integrated fabric and cloud world with many clouds through innovations in computing, networking, storage, security and management. This will provide business value through service-centric provisioning, flexibility, and scaling of physical and virtual resources.
Viestinnän seminaari 8.11.2012 / ExchangeSalcom Group
The document announces a Microsoft Exchange Server preview workshop on October 2012 that will be led by a senior trainer/consultant and will cover Exchange from all versions, certification services, and server infrastructure. The workshop will discuss how Exchange enables remaining in control of communications both online and on-premises, helping users be more productive across devices, and keeping the organization safe by protecting information and meeting compliance requirements.
The document discusses various concepts related to Windows Communication Foundation (WCF) services such as:
1. The key differences between ASMX and WCF web services and how WCF allows for more flexible message exchange.
2. What WCF service endpoints are and how they define the address, binding, and contract for communicating with a service.
3. The possible ways of hosting a WCF service including self-hosting, IIS hosting, and Windows Service hosting.
4. Core WCF concepts like contracts, bindings, security modes, and instance management techniques.
5. Advanced topics like operation overloading, message exchange patterns, data contract serialization, and throttling.
This paper is written to give basic knowledge of Network function virtualisation in network system. In this paper the work on NFV done till now has been collaborated. It describes how the challenges faced by industry lead to NFV and what is meaning of NFV and NFV architecture model. It also explains NFV Infrastructure is managed and the forwarding path on which packets traverse in NFV. A relationship of NFV with SDN and current research ongoing on NFV policies is discussed.
with 100 Mbps capacity each. During the event, we observed the
traffic demands of each SDTN, and dynamically changed the
1) The document proposes a novel Software Defined Transport Network amount of resources allocated to each SDTN according to the
(SDTN) architecture that enables network virtualization and demands. This demonstrated the dynamic resource allocation
programmability at the transport layer, allowing multiple virtual mechanism.
networks to coexist on a shared multi-layer network infrastructure. 3) Network failure recovery: We also conducted an experiment of
failure recovery at the transport layer. By letting the SDTNs to
2) Key aspects of the architecture include a Physical
Here are the key steps to migrate from Exchange 2010 to Exchange 2013:
1. Prepare - Install Exchange 2010 SP3 across the organization, prepare Active Directory with Exchange schema extensions, validate Exchange 2010 Client Access connectivity
2. Deploy Exchange 2013 servers - Install new Exchange 2013 Mailbox and Client Access servers
3. Obtain and deploy certificates - Obtain and deploy SSL certificates on the Exchange 2013 Client Access servers
4. Cutover mailboxes - Use cutover or staged migration to move mailboxes from Exchange 2010 to Exchange 2013 servers
5. Redirect clients to Exchange 2013 - Update autodiscover and DNS records to redirect clients to the new Exchange 2013 Client Access servers
SecuraNET communication server system is designed as an out-of the box communications and collaboration system. It is based on our SecuraNET OS hardened operating system. Here there is no requirement to purchase, install or have expertise in operating systems. Communications Server is a Mailing System that is administered thru a web browser.
This document introduces Cisco's Wireless CleanAir solution for managing unlicensed radio spectrum. It explains the requirements for deploying CleanAir and the products selected, including the CleanAir access point. The guide is intended for readers wanting to understand radio resource management challenges and how to add CleanAir to an existing network to better manage wireless challenges. It provides details on deploying the Wireless Control System and Mobility Services Engine to configure Cisco's wireless solution for CleanAir spectrum monitoring and troubleshooting.
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...virtual-campus
This document discusses service level agreements (SLAs) in the context of multi-layered adaptation of service-based applications. It describes 3 main problem areas: 1) diversity of service infrastructure models, 2) lack of cross-layer monitoring and adaptation, and 3) rigidness of infrastructure. The objectives are to 1) hide infrastructure differences, 2) support higher layers of service-based applications, and 3) enable SLA-oriented self-adaptation. It proposes a SLA-aware service infrastructure architecture using a meta-negotiator, meta-broker, brokers, and automatic service deployers to achieve autonomous behavior while respecting SLAs.
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01Hussein Elmenshawy
This document discusses IP tunneling and VPN concepts. It provides an overview of various L2 and L3 tunneling techniques that allow VPN implementation. VPNs offer flexibility, scalability, and lower network costs by extending private networks over shared public infrastructure. Cisco routers and IOS software provide tools to implement VPNs with security, management, and related features.
Configuration management benefits for everyone - Rudder @ FLOSSUK Spring Conf...RUDDER
Sharing and reusing configurations, rolling out upgrades, ensuring a security policy is correctly applied, automating repetitive tasks, preparing for disaster recovery... these are all missions for configuration management tools.
Rudder is a new, open source approach to this domain, built on existing and reliable components. By allowing experts and power-users to create reusable templates and configurations based on best practices, it enables other actors in the IT department to benefit from the advantages of configuration management: using a web-based interface, junior sysadmins can quickly setup new servers while learning and respecting best practices and company policy, while service managers and security officers can get instant reports on their policies compliance level.
This talk introduces Rudder and show some illustrative use cases before describing the architecture of it's main components and how they interact (a web interface written in Scala, the CFEngine 3 infrastructure used to manage hosts, OpenLDAP as an inventory and configuration data store...), including how to write your own techniques and extend existing ones.
Energy efficient cluster-based service discovery in wireless sensor networksambitlick
1) The document proposes an energy-efficient service discovery protocol for wireless sensor networks that exploits a cluster-based network overlay.
2) Clusterhead nodes form a distributed service registry to minimize communication costs during service discovery and maintenance.
3) The performance of the proposed integrated clustering and service discovery solution is evaluated through simulations under different network conditions.
This document discusses the need for a policy-driven approach to software-defined networking (SDN). It argues that manually configuring networks hinders service velocity and that developers need an abstracted view of networking that expresses connectivity and policy requirements without low-level network constructs. The document proposes using policy templates to map application requirements to network services, allowing automatic implementation when applications are deployed. It presents Nuage Networks' policy-driven SDN solution which has provided such abstractions since 2013.
The document describes an architecture for integrating Microsoft Learning Gateway tools like Microsoft SharePoint and Microsoft Exchange with ItsLearning, an e-learning platform. It details how ItsLearning is installed and configured to use Active Directory for user authentication and provisioning of user data. Finally, it shows how ItsLearning provides web parts that can be integrated into the SharePoint portal to display course and project information for single sign-on access across applications.
The document discusses component-based software engineering (CBSE). It defines key CBSE concepts like components, component models, and the CBSE development process. It also covers issues in component composition like interface incompatibility and the need for adaptors. The document emphasizes that CBSE supports reuse but composition requires resolving requirements and interface mismatches between components.
This document discusses network virtualization and OpenStack Networking (Quantum). It provides an overview of OpenStack Networking concepts like virtual networks, ports, and subnets. It also describes the plugin architecture and various networking plugins. The document outlines how OpenStack Networking can be extended to support layer 3 constructs and hybrid cloud networking. It provides examples of networking architectures using plugins like Cisco Nexus with OpenStack Networking.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Rc111 010d-wcf
1. #111
Get More Refcardz! Visit refcardz.com
CONTENTS INCLUDE:
About WCF
Getting Started with
n
n
Configuration Overview
WCF Contracts
Windows Communication Foundation 4.0
n
n
Bindings
n
Behaviors
Hosted Services and more...
By Scott Seely
n
diagnostics Diagnostic settings for WCF, including WMI, performance
ABOUT WCF counter, message filters, and other settings.
extensions Defines configuration extensions for the bindings, behaviors,
Since .NET 3.0, Windows Communication Foundation (WCF) is the bindingElement (for extending CustomBinding configuration),
and standardEndpoints.
preferred messaging system in .NET applications. It provides an
abstraction layer over transports. This abstraction allows developers machineSettings Allows the user to log personally identifiable information
to focus on the types of messages their applications need to send in traces and message logs via the XML attribute,
enableLoggingKnownPii. This section can only be edited in
and receive. It removes the need for developers to have intimate machine.config, located in the framework directory.
knowledge of how the messages themselves are sent and received.
protocolMapping Used to map a protocol to a binding for easier configuration.
Instead, developers focus on a concept called an endpoint which serviceHostingEnvironment Used to configure services hosted in ASP.NET.
listens for and receives messages. Endpoints are built using three
services Defines which contracts a service instance will listen for
items: Address, Binding, and Contract. messages on and any base addresses the service will use. A
service may also add metadata and discovery endpoints via this
The address defines where a message is sent. mechanism.
http://www.dzone.com/ is an address.
standardEndpoints Contains configuration for endpoints specified by the kind
attribute on any service endpoint configuration.
www.dzone.com
A binding describes how to send the message. The binding
contains information such as the transport to use, how to encode routing Provides message routes that a routing service uses to move
messages closer to its final destination.
messages, and security requirements.
tracking Defines tracking settings for a workflow service.
A contract defines how a message is structured. The contract
defines the message exchange pattern (MEP) used for each
exchange as well as which messages initiate a conversation or stop a WCF CONTRACTS
conversation. All message exchanges fall into one of three message
exchange patterns, or MEPs: one-way, request-response, and
duplex. One-way messages can act as event notifications. Request- WCF developers create two types of contracts: service contracts
response messages send some data and expect a response in a and data contracts. Service contracts inform the WCF runtime how
particular format. Duplex messages are a conversation. In duplex, to read, write, and dispatch received messages. Data contracts
when one caller initiates a conversation, that caller promises to inform the serialization infrastructure how to translate CLR objects
make a set of one-way and request-response messages available to to and from an XML Infoset representation.
the callee. Typically, duplex MEPs make use of sessions as well.
Service Contracts
Getting Started with Windows Communication Foundation 4.0
The WCF runtime creates the infrastructure to host services and
CONFIGURATION OVERVIEW dispatch messages. Developers declare the pieces of infrastructure
they need by marking up classes with attributes. The WCF runtime
Configuration is a big feature in WCF. It permeates much of the then uses this information to allow for communication with callers
messaging framework. This section provides a map of configuration. and the hosted classes. This information is also shared via Web
The configuration section group, <system.configuration>, Services Description Language (WSDL) that WCF services can
contains all WCF configuration settings. Within this configuration generate. To declare a class or interface represents the contract for
section group, 14 different configuration sections exist. Some a WCF service, mark the class with [ServiceContract].
of those sections have relationships with other sections. One,
system.serviceModel/extensions, is a configuration section for
configuration only!
behaviors Contains configuration for shared behaviors that can be applied
Get over 90 DZone Refcardz
bindings
to endpoints and services.
Contains information for shared bindings used to create
FREE from Refcardz.com!
message processing pipelines. A computer program that can
run independently and can propagate a complete working
version of itself onto other hosts on a network.
client Contains information for clients to communicate with services.
Lookups are performed using a two part key: the name of the
configuration and the name of the contract.
comContracts An integration point used between COM+ and WCF to
configure the name and namespace for any hosted services.
This mimics the functionality normally provided by the
[ServiceContract] attribute via the Name and Namespace
properties.
commonBehaviors Defines a collection of behaviors applied to all services and
endpoints. These behaviors add to any others already present
on a service.
DZone, Inc. | www.dzone.com
2. 2
Getting Started with Windows Communication Foundation 4.0
[System.ServiceModel.ServiceContract] The commonly set properties on [DataContract] are:
public interface IMyService {
}
Namespace Defines the URL used as the targetNamespace in the XSD describing the
type and used when serializing the data contract as an XML Infoset.
Through [ServiceContract], you will normally set the following
Name Defines the name of the item when read and written to an XML Infoset.
properties about the collection of operations on the service:
The commonly set properties on [DataMember] are:
Namespace Sets the default namespace for the XML Schema Documents (XSD) for the
request and response messages. Default is http://tempuri.org.
Name Defines the name of the item when read and written to an XML Infoset.
SessionMode One of three values: Allowed, Required, NotAllowed. By default,
IsRequired Set to true if the field must be present when the type is deserialized.
SessionMode is Allowed. If your contract requires session semantics,
set this value to System.ServiceModel.SessionMode.Required. If your Default value is false.
contract will fail with sessions, set it to System.ServiceModel.SessionMode.
NotAllowed. EmitDefaultValue Indicates whether or not to write the member when set to the default
value. The default value of this member is true.
CallbackContract CallbackContract: If the contract implements a duplex MEP, set this to the Order An integer used to alter the ordering of values when read or written.
interface representing the other side of the duplex conversation. By default, values are read and written in alphabetic order. The default
value of Order is 0. Members with the same Order value are serialized
To make methods visible to external callers, mark the methods with alphabetically. Order is sorted ascending.
[OperationContract].
[System.ServiceModel.ServiceContract(
Namespace = “http://www.dzone.com/WCF”)]
BINDINGS
public interface IMyService
{
[System.ServiceModel.OperationContract] WCF supports messaging through a messaging pipeline. The
string SayHi(string name);
} pipeline itself must have stages that represent the transport and
the serialization mechanism. In WCF, the pipeline is created by a
The commonly set properties on [OperationContract] are: type derived from System.ServiceModel.Channels.Binding and the
stages are created by types derived from System.ServiceModel.
IsOneWay Can only be set on methods that return void. Use this to indicate that the Channel.BindingElement. Besides the transport and serialization
method does not send a response. Default is false.
mechanism, the BindingElement also adds stages for security,
IsInitiating Use this to state that a given method can be called to instantiate a new reliability, and transactions. When creating a Binding, the
service. Default value is true.
developer of the Binding decides how to surface the underlying
IsTerminating Use this to state that when a given method is called, the current instance can BindingElement properties. Some settings will be easily set, others
be disposed. Default value is false. If this value is set to true, you must also set
ServiceContractAttribute.SessionMode to SessionMode.Required. made private, and still others surfaced as different concepts.
Your code may also return exceptions to callers. In SOAP messaging, Every binding has settings for timeouts: OpenTimeout,
errors are returned as Fault messages. A given operation may ReceiveTimeout, CloseTimeout. These set the amount of time the
return zero or more faults. One declares the types of faults being user of the Binding will wait for the pipeline to Open, Receive a
returned through [FaultContract]. [FaultContract] has a constructor message, or Close. A Binding also identifies its URL scheme, which
that accepts a type describing what the fault details will look like. is the scheme used by its transport. WCF ships with Bindings
This description is used by the callers to read any faults your service supporting the following schemes: http, https, net.msmq, net.pipe,
might return. net.p2p, and net.tcp. WCF also supports soap.udp, but only in an
internal class used to support WS-Discovery.
[System.ServiceModel.ServiceContract(
Namespace = “http://www.dzone.com/WCF”)]
public interface IMyService
{
Each of the Bindings has a common set of properties
[System.ServiceModel.OperationContract()] not required by the base class, Binding:
[FaultContract(typeof(FaultDetails))]
string SayHi(string name);
}
EnvelopeVersion Sets the version of any SOAP Envelope. Normally, this is set to None,
Soap11, Soap12. Use None for REST or other non-SOAP messaging;
Data Contracts Soap11 to send a SOAP 1.1 envelope and related headers; Soap12 to
WCF reads and writes objects to and from different formats using send a SOAP 1.2 envelope and related headers.
serialization (write) and deserialization (read). WCF supports
MaxBufferPoolSize Most messages are received into memory. The buffer pool is used to
serialization through several mechanisms: System.Xml.Serialization,
allocate memory for receiving messages. By default, each buffer in the
System.ISerializable, [System.Serializable], and through System. pool is 65536 bytes. Adjust this value to change the size of the individual
Runtime.Serialization. The first three mechanisms exist to support buffers.
legacy code. When developing your own declarations, you will
ReaderQuotas This sets quotas on reading inbound messages. The type,
normally use System.Runtime.Serialization to describe your data System.Xml.XmlDictionaryReaderQuotas is found in
contracts. In WCF 4.0, an unattributed type will automatically read System.Runtime.Serialization. The quotas set limits which limit the
and write any public fields or properties using the name of the damage a denial of service attack or poorly formed XML document
property in the generated format. To control what gets written, mark can do. By default, arrays can be no longer that 16384 elements
the type with [DataContract] and any members to be written with (MaxArrayLength), strings must be less than 8192 characters
(MaxStringContentLength), and XML nodes must be no more than 32
[DataMember].
levels deep (MaxDepth).
[System.Runtime.Serialization.DataContract] Scheme Identifies the scheme used by the underlying transport protocol.
public class Name
{
[System.Runtime.Serialization.DataMember]
public string FirstName { get; set; } Depending on which protocol you want to use, you have different
bindings available. Most of the bindings in WCF support HTTP.
[System.Runtime.Serialization.DataMember]
public string LastName { get; set; } The rest of the supported protocols are represented by one
}
binding. The following table shows which bindings support
When you explicitly mark a member with [DataMember], that duplex communications, message level security, reliable
field will be read and written regardless if the member is private, messaging, flowing transactions, and workflow context. Transport
protected, or public. level security is available through all bindings in WCF.
DZone, Inc. | www.dzone.com
3. 3
Getting Started with Windows Communication Foundation 4.0
Binding Duplex Message level Reliable Transactions [ServiceBehavior] contains several properties. The most commonly
security used are:
BasicHttpBinding *
ConcurrencyMode Controls the internal threading model to enable support
BasicHttpContextBinding *
for reentrant or multithreaded services. By default,
MsmqIntegrationBinding concurrency is single threaded per instance.
NetMsmqBinding InstanceContextMode Controls how instances are created for the service. By
NetNamedPipeBinding default, each session gets a new service instance. Set
this property to PerSCall to allow for a new instance for
NetPeerTcpBinding every method call. Set this property to Single if you need
singleton behavior for the service.
NetTcpBinding
NetTcpContextBinding IncludeExceptionDetailsInFaults Returns exception details to clients when debugging
services. This property requires a request-response or
WS2007FederationHttpBinding duplex capable binding.
WS2007HttpBinding
WSDualHttpBinding [DeliveryRequirements], a contract behavior, allows a contract to
specify information about reliable messaging requirements imposed
WSFederationHttpBinding
on the service delivery.
WSHttpBinding
WSHttpContextBinding [CallbackBehavior], an endpoint behavior, provides configuration
settings for the callback contract on a duplex service. The settings
* The BasicHttpBinding and BasicHttpContextBinding will sign the are the same as the [ServicBehavior] except for settings for
timestamp on the message, but not sign and encrypt the body. For instancing and transactions.
full message level signing and encryption, use WSHttpBinding and In configuration, you can declare information about security,
WSHttpContextBinding. diagnostics, discovery, and throttling.
Bindings appear in configuration in the system.serviceModel/ WCF contains many configuration elements. Here, we focus on
bindings section under configuration that matches a camelCased the commonly configured behaviors for services. The following
version of the binding name. For example, the collection behaviors allow you to configure your service behaviors as
of WSHttpBinding can be found in system.serviceModel/
part of configuration within system.serviceModel/behaviors/
bindings/wsHttpBinding. Each configured binding has a
serviceBehaviors/:
name. A binding without a name becomes the default set of
settings for that particular binding. For example, to create a
reliable WSHttpBinding, use the following configuration: serviceCredentials Allows the service to pick how it authenticates itself using X.509,
Windows, username/password, and other valid tokens.
<system.serviceModel> serviceDebug Allows you to set up the HttpHelp page and to include exception
<bindings> details in faults.
<wsHttpBinding>
<binding name=”reliable”> serviceDiscovery Enables the WS-Discovery endpoint.
<reliableSession enabled=”true”/>
</binding> serviceMetadata Enables the WS-MetadataExchange endpoint.
</wsHttpBinding>
</bindings>
</system.serviceModel>
On an endpoint, you can configure other behaviors. The following
commonly used behaviors allow you to configure your endpoint
behaviors as part of configuration within system.serviceModel/
BEHAVIORS behaviors/endpointBehaviors/:
Behaviors influence the hosting environment for a service. They callbackDebug Allows you to state if a callback contract should include exception details
are used to handle instancing, expose metadata, enhance in faults.
discoverability, and more. There are four types of behaviors: service, clientCredentials Allows the client to pick how it authenticates itself using X.509, Windows,
contract, endpoint, and operation. All behaviors may be applied username/password, and other valid tokens.
in code. Service and endpoint behaviors may also be applied by enableWebScript Enables a Web Script endpoint on the service. This allows the service
configuration. (Note: There is no notion of contract configuration to return JavaScript when the URL end in /js or /jsdebug. This behavior
anywhere in WCF.) Service and contract behaviors are normally is automatically included if using the System.ServiceModel.Activation.
applied via attributes in code. WebScriptServiceHostFactory on a .SVC.
webHttp Allows the endpoint to dispatch messages based on URL. This behavior
A service behavior applies to a service instance and may alter is automatically included if using the System.ServiceModel.Activation.
aspects of the service, all endpoints, and all contracts. A contract WebScriptServiceHostFactory or System.ServiceModel.Activation.
behavior applies to a contract and all implementations of the WebServiceHostFactory as the factory name on a .SVC.
contract. Endpoint behaviors apply to a specific endpoint instances.
Finally, operation behaviors apply to specific operations.
HOSTING SERVICES
Attribute-based Behaviors
There are two service behaviors: WCF services can listen for messages anywhere: Windows
[AspNetCompatibilityRequirements] and [ServiceBehavior]. Services, desktop applications, and Internet Information Services
[AspNetCompatibilityRequirements] has a single property, (IIS). All environments use the same configuration elements. In
RequirementsMode, that allows a service to declare that ASP all cases, an instance of a ServiceHost will be used to reflect over
features such as identity impersonation are Required, Allowed, or a service implementation to determine service requirements.
NotAllowed (default). When set to Required, configuration must The ServiceHost then marries the code with any configuration
enable compatibility too: to produce an entity that can listen for, dispatch, and respond
to messages that arrive over the various transports.
<system.serviceModel>
<serviceHostingEnvironment aspNetCompatibilityEnabled=”true”/>
</system.serviceModel>
To demonstrate hosting, we use the following contract:
DZone, Inc. | www.dzone.com
4. 4
Getting Started with Windows Communication Foundation 4.0
namespace DZone.Contracts private ServiceHost _host;
{
[System.ServiceModel.ServiceContract( protected override void OnStart(string[] args)
Namespace = “http://www.dzone.com/WCF”)] {
public interface IMyService ThreadPool.QueueUserWorkItem(StartListening, this);
{ }
[System.ServiceModel.OperationContract]
string SayHi(string name); static void StartListening(object state)
} {
} var service = state as DemoService;
Implemented by the following class: if (service != null)
namespace DZone.Services {
{ service._host = new ServiceHost(typeof(MyService));
public class MyService : DZone.Contracts.IMyService service._host.Faulted +=
{ (s, e) =>
public string SayHi(string name) {
{ service.StopListening();
return string.Format(“Console: Hello, {0}”, name); service._host = null;
} StartListening(service);
} };
} }
}
and use the following configuration: protected override void OnStop()
{
StopListening();
}
<configuration>
<system.serviceModel> void StopListening()
<behaviors> {
<serviceBehaviors> try
<behavior name=”MyServiceBehavior”> {
<serviceMetadata httpGetEnabled=”true”/> ((IDisposable)_host).Dispose();
</behavior> }
</serviceBehaviors> catch (CommunicationObjectFaultedException ex)
</behaviors> {
<services> // TODO: add code to log
<service name=”DZone.Services.MyService” }
behaviorConfiguration=”MyServiceBehavior”> }
<host>
<baseAddresses>
<add baseAddress=”http://localhost/Demo”/>
</baseAddresses>
The preceding code executes the initialization logic on a
</host> separate thread via ThreadPool.QueueUserWorkItem. The
<endpoint contract=”DZone.Contracts.IMyService”
binding=”basicHttpBinding” address=”/MyService”/> ServiceHost will run for a long time. If the ServiceHost gets
<endpoint kind=”mexEndpoint” address=”/mex” into a situation where it can no longer listen for messages by
binding=”mexHttpBinding” />
</service> entering the Faulted state, the code should start up a new
</services>
</system.serviceModel>
instance of the ServiceHost. When the service is done listening,
</configuration> a CommunicationObjectFaultedException may be thrown on
Dispose. Because this exception is expected, the code will log
The configuration declares that there is a serviceBehavior the exception. When the service stops, we call StopListening. If
named MyServiceBehavior which supports metadata exchange. you want to support Pause and Resume, add the following:
This behavior is attached to a service instance whose name is
DZone.Services.MyService and matches the name of the service protected override void OnPause()
implementation. The host has a base address of http://localhost/ {
StopListening();
Demo. This base address is used for any bindings that support the base.OnPause();
http scheme. The service exposes two endpoints. One endpoint }
exposes an implementation of the DZone.Contracts.IMyService protected override void OnContinue()
{
contract listening off the http base address at /MyService. The other ThreadPool.QueueUserWorkItem(StartListening, this);
endpoint hosts metadata exchange using a predefined binding base.OnContinue();
}
named mexHttpBinding listening off the http base address at /Mex.
Hosting in IIS
Hosting in a Console/GUI application
To host a service in IIS, you create a .svc file which is
Using this configuration, we can host the service in a
hosted at a path of your choosing in your web application.
Console application with the following code:
That will give you a file that looks like this:
var host = new ServiceHost(typeof(MyService))
<%@ ServiceHost Service=”DZone.Services.MyService” %>
host.Open();
Console.WriteLine(“Press [Enter] to exit”);
Console.ReadLine(); The config remains largely the same. IIS will automatically set
try
the http base address for the host to be the address of the
{ .svc file.
((IDisposable)host).Dispose();
}
catch (CommunicationObjectFaultedException ex) In IIS 7 and later, you can also host services with NetTcpBinding and
{
// TODO: add code to log NetNamedPipeBinding. To do this, run the following commands:
}
TCP Activation:
Once the using block exits, host.Dispose() is called. You
can do something similar in a WinForm/WPF application by 1. Run the following command (on one line):
opening the service on window Load and explicitly calling
ServiceHost.Dispose() when the window is closed/unloaded. %windir%system32inetsrvappcmd.exe set site “Default Web Site” -+bindings.
[protocol=’net.tcp’,bindingInformation=’808:*’]
Hosting in a Windows Service
A Windows Service requires you to be able to respond to 2. un the following command to enable the http and net. pipe
R
Start and Resume events very quickly. In order to do this, you protocol on your site (on one line):
do not want to block in the start if at all possible. Creating a
single WCF ServiceHost does not normally take much time. %windir%system32inetsrvappcmd.exe set app
However, we should always be prepared for things to take a “Default Web Site/[your v-dir]” /enabledProtocols:http,net.tcp
while and have the services behave nicely. To host the same
WCF service in a Windows Service, write the following code: Named Pipe Activation
DZone, Inc. | www.dzone.com
5. 5
Getting Started with Windows Communication Foundation 4.0
1. Run the following command (on one line): var client = new DZoneService.MyServiceClient(
“BasicHttpBinding_IMyService”);
try
{
%windir%system32inetsrvappcmd.exe set site “Default Web Site”
Console.WriteLine(client.SayHi(“DZone”));
-+bindings.[protocol=’net.pipe’,bindingInformation=’*’]
}
catch (TimeoutException timeoutException)
{
2. un the following command to enable the http and net. pipe
R client.Abort();
protocol on your site (on one line): }
catch (FaultExceptionKnownFaultType faultException)
{
client.Abort();
%windir%system32inetsrvappcmd.exe set app }
“Default Web Site/[your v-dir]” /enabledProtocols:http,net.pipe catch (FaultException faultException)
{
client.Abort();
With Vista SP1 and Server 2008, you can also enable these protocols }
catch (CommunicationException communicationException)
in the IIS Manager. {
client.Abort();
}
For the demo application, remove the host base
addresses and add in these two endpoints:
DIAGNOSTICS
endpoint contract=”DZone.Contracts.IMyService” address=”/MyService”
binding=”netTcpBinding” /
endpoint contract=”DZone.Contracts.IMyService” address=”/MyService”
binding=”netNamedPipeBinding” / WCF also comes with a rich set of diagnostics information.
Unlike other aspects of WCF, diagnostics can only be set in
configuration. The diagnostics allows for tracing, message
OperationContext
logging, WMI inspection, and performance counters.
Every incoming message is associated with an OperationContext.
Think of OperationContext as WCF’s version of HttpContext.
OperationContext.Current yields the current operation context
Tracing/WMI
All production applications should be deployed with System.
with pointers to the following commonly used properties:
ServiceModel tracing configured but turned off. WMI
should be enabled so that an administrator can enable
IncomingMessageHeaders Headers on the incoming message. tracing through WMI. The configuration looks like this:
OutgoingMessageHeaders Can use this to add more headers to the response.
system.diagnostics
IncomingMessageProperties The message properties serve as a mechanism to send sources
information in between layers within the message processing source name=”System.ServiceModel”
pipeline about a specific message. switchValue=”Off”
propagateActivity=”true”
listeners
ServiceSecurityContext Gain access to the identity of the currently logged in user. add name=”ServiceModelTraceListener” /
Also available through ServiceSecurityContext.Current. /listeners
Contains a property, AuthorizationContext, where you can /source
/sources
investigate the ClaimSets for the current user. sharedListeners
add initializeData=”.logsweb_tracelog.svclog”
type=”System.Diagnostics.XmlWriterTraceListener, System,
The OperationContext also has two often used methods: Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089”
name=”ServiceModelTraceListener”
SetTransactionComplete() Allows the service to complete a transaction in code instead traceOutputOptions=”Timestamp” /
/sharedListeners
of automatically on exit. /system.diagnostics
system.serviceModel
GetCallbackChannelT() For duplex services, allows the service to send messages diagnostics wmiProviderEnabled=”true” /
back to the service. /system.serviceModel
If, in production, something goes wrong, the administrator
can run the following Powershell commands to update
CONSUMING SERVICES the switchValue, capture data, change the switchValue
back to Off, and send the traces off to development:
When consuming services, you will typically create a proxy via
the Visual Studio ‘Add Service Reference’ tool. Enter the WSDL $appDomain = Get-WmiObject -Namespace rootServiceModel
AppDomainInfo
or MetadataExchange endpoint for the service, typically just the
address of the .svc file for IIS hosted services, and then pick out the $appDomain.TraceLevel = “Verbose, ActivityTracing”
service. Visual Studio will do the rest of the work, including adding $appDomain.put()
configuration. The developer may need to edit the application
configuration file (named [app name].exe.config if the client is Note: the line to get the WMI object will change depending
an executable or web.config if the client is a web application) to on how many AppDomains hosting WCF endpoints are
enter in security credentials, but otherwise the work is done. running on the computer. Each AppDomainInfo has a
corresponding ProcessID and AppDomainId to help you pick
When consuming the previous service, write the following code, the right instance. Once that is done, you can set the trace
catching the TimeoutException, CommunicationException, level as above and call put() to save the data. Above turns on
and FaultException since any of these may be returned. For ActivityTracing which allows WCF to assign IDs to related traces
both the CommunicationException and TimeoutException, and show how one group of activity flows from another. Use
the code may want to have some retry logic built in to get a SvcTraceViewer.exe (part of the Windows SDK and ships as a
new client instance and try again up to n times, logging the part of Visual Studio) to view and interpret the traces. When the
exception each time. In all cases, the code should Abort the administrator is done collecting data, turn tracing back off:
connection to release all resources on the client machine.
$appDomain.TraceLevel = “Off”
When the configuration is generated for the client, the endpoints
will have names like binding_Contract. For IMyService, the $appDomain.put()
client endpoint is named BasicHttpBinding_IMyService
in configuration. The endpoint can then be created by Note that changes to the trace level do not get saved to the
instantiating the generated proxy using the configured name. configuration file as this would cause the AppDomain to restart
A call to a IMyService implementation looks like this: on IIS.
DZone, Inc. | www.dzone.com