SlideShare a Scribd company logo
3SC – Q6 Dudy Fathan Ali S.Kom
Review Materi ASP.NET
3SC – Q6
Dudy Fathan Ali, S.Kom (DFA)
2014
CEP - CCIT
Fakultas Teknik Universitas Indonesia
Consuming Web Services in a Web Application
3SC – Q6 Dudy Fathan Ali S.Kom
Consuming Web Services in a Web Application
Web services are the application components that
can be used by other Web applications.
You can create a Web service and publish it on a Web
server, thereby, making it available for other Web
applications to use.
Consuming Web Services in a Web Application
3SC – Q6 Dudy Fathan Ali S.Kom
Invoking Web Services
A Web service:
Is a self-describing Web component that exposes its functionality to
the consumers through open standards such as XML and Simple
Object Access Protocol (SOAP).
Is a widely used method for implementing Service-Oriented
Architecture (SOA).
Allows integration of applications developed in different languages
and running on different platforms.
Communicates by using a standard protocol called SOAP. SOAP defines
a standard way of passing the XML-encoded data.
Developing ASP.NET Web services starts by creating an .asmx
file and hosting it on a Web server, such as IIS.
A Web service once hosted or published on the server can be
consumed by any client.
Consuming Web Services in a Web Application
3SC – Q6 Dudy Fathan Ali S.Kom
Invoking Web Services
The client locates the service by adding a Web reference.
This adds a proxy class on the client side, which exposes the
methods, parameters, and return types of the methods
contained in the Web service.
After adding the proxy class, the client application creates an
instance of the proxy class and accesses the methods provided
by the Web service through the instance.
The client requests are then handled by the proxy class.
After processing the request, the response is also sent as a
SOAP message to the proxy.
The proxy then converts this SOAP message into method return
value, which is returned to the client.
Consuming Web Services in a Web Application
3SC – Q6 Dudy Fathan Ali S.Kom
Invoking Windows Communication Foundation Services
In distributed computing, Web services along with various other
technologies, such as COM+, .NET Remoting, Message Queues,
and Web Service Enhancement (WSE) were used to provide a
wide range of functionality.
WCF:
Unifies features of such discreet technologies under one single
framework.
Provides a unified programming model used to build a secure, reliable,
and robust Web service.
Aims at providing encoding, hosting, messaging patterns, networking,
security, and interoperability in a single infrastructure.
Consuming Web Services in a Web Application
3SC – Q6 Dudy Fathan Ali S.Kom
Invoking Windows Communication Foundation Services
The following figure shows the WCF architecture.
Consuming Web Services in a Web Application
3SC – Q6 Dudy Fathan Ali S.Kom
Invoking Windows Communication Foundation Services
The following set of APIs is unified in the WCF architecture:
ASP.NET Web Services (ASMX)
WSE
System.Messaging
Enterprise Services
Remoting
The design goals for building WCF services are:
Unification
Interoperability
Service orientation
Creating Rich Internet Applications Using AJAX
3SC – Q6 Dudy Fathan Ali S.Kom
AJAX is a technology, which when implemented in
Web applications makes the interaction between the
client and the server asynchronous.
AJAX implementation:
Allows users to interact with the Web application while
waiting for a response from the server.
Enables partial updates in Web applications.
Explaining the AJAX Framework
Creating Rich Internet Applications Using AJAX
3SC – Q6 Dudy Fathan Ali S.Kom
AJAX is a Web development technique that:
Is used for creating dynamically interactive applications.
Enables Web applications to retrieve data from the server,
asynchronously in the background, without interfering with
the display and behavior of the existing page.
To understand the concept of AJAX, you need to
understand the relevance of the following terms:
Asynchronous communication
JavaScript
XML
Understanding AJAX
Creating Rich Internet Applications Using AJAX
3SC – Q6 Dudy Fathan Ali S.Kom
AJAX-enabled Web applications offer:
Quick response to a user’s request
Asynchronous communication that allows a user to
interact with the rest of the Web page while the
application is processing the changed or updated parts of
the Web page
Auto-generated proxy classes that are used to call Web
service methods from client script such as JavaScript
Support for the widely used Web browsers such as
Microsoft Internet Explorer, Mozilla Firefox, and Apple
Safari
Advantages of AJAX-Enabled Web Applications
Creating Rich Internet Applications Using AJAX
3SC – Q6 Dudy Fathan Ali S.Kom
Some of the limitations of AJAX-enabled Web
applications are:
Browser Integration
Dependency on JavaScript
Limitations of AJAX-Enabled Web Applications
Creating Rich Internet Applications Using AJAX
3SC – Q6 Dudy Fathan Ali S.Kom
The ASP.NET AJAX Web applications consist of client-side and
server-side scripts.
The following figure displays the ASP.NET AJAX architecture.
Architecture of ASP.NET AJAX
Creating Rich Internet Applications Using AJAX
3SC – Q6 Dudy Fathan Ali S.Kom
Architecture of ASP.NET AJAX
The preceding figure shows that the ASP.NET AJAX
architecture consists of the following components:
Client-based Microsoft AJAX library
Server-based AJAX features for ASP.NET
Creating Rich Internet Applications Using AJAX
3SC – Q6 Dudy Fathan Ali S.Kom
Architecture of ASP.NET AJAX
Client-based Microsoft AJAX library:
The ASP.NET AJAX client architecture provides features that
enable you to create rich, intuitive, responsive, and
interactive Web applications. This architecture includes the
ASP.NET AJAX library that includes:
Components
Browser compatibility
Networking
Core services
Creating Rich Internet Applications Using AJAX
3SC – Q6 Dudy Fathan Ali S.Kom
Architecture of ASP.NET AJAX
Server-based AJAX features for ASP.NET:
The ASP.NET AJAX server architecture provides the
functionalities for the following server-based AJAX
features:
Script support
Web services
Application services
Server controls
Implementing Internationalization and Accessibility
3SC – Q6 Dudy Fathan Ali S.Kom
Implementing Internationalization
To make an international application customizable, you need to
understand the following phases that are involved in developing an
internationalized application:
• Globalization: Globalization is the process of designing and
developing a Web application in such a way that it is culture-neutral
and language-neutral.
• Localizability: Localizability is an intermediate process that ensures
that a globalized Web application is ready for implementing
localization.
• Localization: Localization is the process of customizing the
globalized Web application to a specific locale and culture. In this
phase, various resources, such as images and text, for the
designated locale are created.
Implementing Internationalization and Accessibility
3SC – Q6 Dudy Fathan Ali S.Kom
Factors Related to Creating International Applications
Application developers need to attend to locale considerations
when they develop international applications because negligence
of these considerations can lead to issues. The factors that need
to be considered while designing an internationalized application
are:
• Language issues
• Formatting issues
• String-related issues
• User-interface issues
Implementing Internationalization and Accessibility
3SC – Q6 Dudy Fathan Ali S.Kom
Factors Related to Creating International Applications
Language issues
Languages around the world differ in display, alphabets,
grammar, and syntactical rules. For example, some languages
such as Arabic are written from right-to-left, whereas other
languages are written from left-to-right. Some languages include
uppercase and lowercase characters, whereas others do not even
have the concept of uppercase and lowercase. Languages differ in
the number of characters, storage requirements, keyboard
layouts, and code representations. This diversity makes it difficult
to share data between cultures. It is even more difficult to create
a multilingual user interface.
Implementing Internationalization and Accessibility
3SC – Q6 Dudy Fathan Ali S.Kom
Factors Related to Creating International Applications
Formatting issues
Formatting is the main source of differences in applications
designed for multiple languages or cultures. Formatting
differences may arise in the addresses, currency, dates,
numerals, telephone numbers, time, and units of measure of
various languages.
Implementing Internationalization and Accessibility
3SC – Q6 Dudy Fathan Ali S.Kom
Factors Related to Creating International Applications
String-related issues
When developing international applications, programmers must
consider issues related to strings. When strings are translated
from one language to another, the translated strings may be
longer than the original strings. In strings, the order of alphabets
varies in different languages. This causes major problems in
sorting and comparison of strings. Issues also arise when strings
are concatenated because these strings may convey different
meanings in different languages.
Implementing Internationalization and Accessibility
3SC – Q6 Dudy Fathan Ali S.Kom
Factors Related to Creating International Applications
User-interface issues
Various user interfaces are associated with the design of an
international application. The size of user interface elements
should be larger than that required for accommodating
English strings. This is because strings in other languages are
usually longer than strings in the English language. When
messages grow in size as a result of translation to another
language, they should be allowed to wrap to subsequent lines.
You should also ensure that all the access-key and shortcut-key
combinations are available on international keyboards. This is
because every language has a different keyboard layout, and
some characters do not exist on all keyboards.
Implementing Internationalization and Accessibility
3SC – Q6 Dudy Fathan Ali S.Kom
Implementing Accessibility
Accessibility:
Refers to the degree of ease with which an application can be used by a
variety of people.
Helps people having disabilities to work with the application easily.
Enables users to interact with the application more efficiently.
ASP.NET provides some guidelines that you should consider
while designing your Web application to achieve high
accessibility.
Implementing Internationalization and Accessibility
3SC – Q6 Dudy Fathan Ali S.Kom
Fundamentals of Designing an Accessible Application
The features of a Web application that are used frequently
should have a high degree of accessibility.
Therefore, a developer should strictly follow the accessibility
guidelines while designing this feature.
The principles that should be followed while implementing
accessibility support in an application are:
Flexible user interface
Flexible input and output features
Simple and Intuitive
Implementing Internationalization and Accessibility
3SC – Q6 Dudy Fathan Ali S.Kom
Accessibility Design Guidelines for the Web
Some guidelines for implementing accessibility in an
application are:
Standardize font styles
Support keyboard navigation
Standardize the use of images
Standardize the use of tables
Minimize the use of style sheets
Use controls properly
Implementing Internationalization and Accessibility
3SC – Q6 Dudy Fathan Ali S.Kom
Assistive Technologies Used for Accessibility of the Web
People with disabilities use various assistive technologies for
accessing a Web application.
Some assistive technologies used by the people with
disabilities are:
Braille and refreshable Braille
Scanning software
Screen magnifiers
Screen readers
Visual notifier
Securing Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Introducing the ASP.NET Security Model
The ASP.NET security model:
Allows you to implement security in your Web
applications.
Provides restricted levels of access to secure website
information from unauthorized access.
Helps in maintaining data integrity and confidentiality.
Securing Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Introducing the ASP.NET Security Model
The following figure displays the architecture of the ASP.NET
security model.
Web Clients
ASP.NET Applications
.NET Framework
Windows Operating System
IIS
Securing Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Introducing the ASP.NET Security Model
The working of the ASP.NET security model is described in the
following steps:
1. Internet Information Services (IIS) receives a request from a Web
client.
2. IIS attempts to authenticate the user.
3. If ASP.NET authenticates the user, it allows requests to the specified
Web page.
4. When the ASP.NET code requests resources, the operating system
performs its own security checks to verify that the authenticated user
is allowed access to the specified file and directory.
5. If access is granted, the requested resource is returned through IIS.
Securing Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Configuring IIS for Implementing Security
IIS authenticates the user who has requested for the application by using
a specific type of authentication.
The type of authentication depends on how the security for Web
applications is configured on IIS.
You need to configure security on IIS to authenticate users before they
are permitted access to a Web application.
IIS provides the following types of authentication to control access to
your Web application:
Anonymous
Basic
Digest
Integrated Windows
Securing Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Configuring an ASP.NET Application for Security
ASP.NET uses its own security mechanism to authenticate
users.
To be able to use ASP.NET security mechanism, you need to
configure the security settings in the web.config file of the
Web application.
These security settings include configuring authentication,
authorization, and impersonation for accessing resources in
your application.
Securing Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Configuring Authentication
Authentication is the process of validating the identity of a
user before granting access to a restricted resource.
Authentication in a Web application can be configured by
using the <authentication> element in the web.config
file.
The <authentication> element specifies the
authentication type that is used by an application to
authenticate the user.
The authentication type can be specified by using the mode
attribute of the <authentication> element.
Securing Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Configuring Authentication
The mode attribute can have the following values:
Windows: This mode specifies that the authentication is performed
by IIS by using basic, digest, or Integrated Windows authentication.
Forms: This mode specifies that the user will be authenticated by
using form-based authentication method.
Passport: This mode specifies that the user will be authenticated by
using Microsoft Passport authentication method.
None: This mode specifies that no authentication mechanism is set
and that any anonymous user can access the Web application.
Securing Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Configuring Impersonation
When a user requests an ASP.NET application, the request goes
to IIS.
IIS authenticates the user and forwards the request to ASP.NET.
If ASP.NET impersonation is disabled, irrespective of the user
who has logged on, the ASP.NET application will be executed by
using a fixed machine-specific account.
In Windows XP, this account is automatically created by
ASP.NET and is named as ASPNET.
Securing Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Configuring Impersonation
Impersonation is the process of executing code under the
authenticated user identity and not under the ASPNET
account.
Impersonation involves the following steps:
1. When a request from a remote client is received, IIS carries out
authentication. If the client is authenticated, it passes the request to
the ASP.NET application.
2. The application impersonates the client and uses the authentication
given by IIS to access the restricted resources.
3. If authorized to access resources, the ASP.NET application returns the
requested resources to the client through IIS.
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Implementing Tracing in Web Applications
To ensure that the application is working properly and is not
giving unexpected results, you need to keep track of the
execution of your Web application.
ASP.NET provides you with the tracing feature that enables
you to track the program execution, thereby ensuring that
your Web application runs properly.
You can use tracing feature to:
View diagnostic information about a particular Web page.
Display custom tracing information about the execution of an
application.
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Implementing Tracing in Web Applications
Tracing can be implemented at any of the following
levels:
Page level
Application level
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Implementing Tracing in Web Applications
Page-level tracing:
Page-level tracing is used to generate diagnostic
information at the end of page rendering.
The diagnostic information includes all the information
about the requests made to the page and their responses.
To enable page-level tracing, you need to perform the
following steps:
1. Include the following directive at the top of the page:
<%@ Page Trace="True" %>
2. Include the TraceMode attribute in the @ Page directive to
specify the sort order for your trace messages.
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Implementing Tracing in Web Applications
The following information is displayed when page-level tracing is
enabled:
Request details
Trace information
Control tree
Session state
Application state
Request Cookies Collection
Response Cookies Collection
Headers Collection
Response Headers Collection
Form Collection
Querystring Collection
Server Variables
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Implementing Tracing in Web Applications
Application-level tracing:
Application-level tracing is used to trace information for every Web page in a
Web application.
A special page named trace.axd is used to view this trace information.
To use the trace.axd page, you have to first enable
application-level tracing within the Web.config file for your application.
You can use the following attributes of the <trace> element to change the
tracing settings of your website:
enabled
requestLimit
pageOutput
traceMode
localOnly
mostRecent
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Writing Trace Information
When a Web application is in the development stage, you
often use several Response.Write statements in the
program code to display debugging information, which is used
to troubleshoot the application.
The messages displayed using Response.Write
statements are required for debugging and should not be
displayed to an end user.
The process of tracing enables you to insert debugging code
within an application such that the debugging code does not
need to be removed at the time of deployment.
The Trace property of the Page class returns a Trace
object, which can be used to write custom trace statements.
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Writing Trace Information
The Trace object:
Is an instance of the TraceContext class.
Provides a set of methods and properties that help you to trace the
execution of your application.
The properties of the Trace object are:
IsEnabled: Denotes whether tracing is enabled for the current
request.
TraceMode: Sets the trace modes such as sortByCategory or
sortByTime.
Some of the methods of the Trace object are:
Warn: Displays the trace information in red color.
Write: Displays the trace information in black color.
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Using Trace Listeners
Trace listeners are used to:
Collect, store, and route tracing messages.
Redirect the tracing information to logs, windows, or text files.
ASP.NET provides three types of predefined trace listeners:
TextWriterTraceListener
EventLogTraceListener
DefaultTraceListener
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Using Trace Listeners
Adding a trace listener:
To add a trace listener in the web.config file, you need to include the
following markup in the web.config file:
<configuration>
<system.diagnostics>
<trace>
<listeners>
<add name="MyListener"
type="System.Diagnostics.
TextWriterTraceListener"
initializeData="D:myListener.txt" />
</listeners>
</trace>
</system.diagnostics>
</configuration>
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Using Trace Listeners
To enable ASP.NET to route tracing information to a
System.Diagnostics listener, you need to include the
following entry in the web.config file:
<system.web>
<trace writeToDiagnosticsTrace = “true” />
<customErrors mode=”off” />
</system.web>
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Using Trace Listeners
Removing a trace listener:
To remove a trace listener from the listeners collection, you need to
include the following markup in the web.config file:
<configuration>
<system.diagnostics>
<trace>
<listeners>
<remove name="MyListener"/>
</listeners>
</trace>
</system.diagnostics>
</configuration>
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Using Trace Listeners
You can control the tracing output by using trace switches.
Trace switches can be configured to provide filtered tracing output.
You can also enable and disable certain tracing output using trace switches.
The two types of trace switches are:
BooleanSwitch
TraceSwitch
To initialize a TraceSwitch, you need to first create its object.
The following code snippet shows how you can create and initialize a
TraceSwitch:
System.Diagnostics.TraceSwitch MyTraceSwitch = new
System.Diagnostics.TraceSwitch("MySwitch", "Entire
application");
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Monitoring Web Applications
After deploying a Web application, a System Administrator
needs to constantly monitor the application for its proper
functioning.
By monitoring a Web application, you can detect the problems
occurring in the application and troubleshoot them.
Monitoring and troubleshooting are required to improve the
performance of a Web application.
To help you track monitor a Web application, ASP.NET provides
you with the following two features:
Health monitoring
Performance monitoring
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Health Monitoring
ASP.NET health monitoring system:
Enables you to monitor the status of the deployed Web
applications.
Is used to track system events and errors, which can hamper
the performance of a Web application.
Enables you to get the detailed run-time information about
ASP.NET resources used by a Web application.
Is implemented by using the System.Web.Management
namespace.
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Health Monitoring
You can configure applications to use built-in or
customized monitoring providers.
To use the health monitoring system you need to:
Configure and enable Web events to monitor.
Configure and enable event providers that listen for and
process various Web events.
Web events contain information about the health of a
Web application.
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Health Monitoring
There are several events that you can trap to monitor the
health of a Web application. Some of the important events
are:
WebBaseEvent
WebBaseErrorEvent
WebHeartbeatEvent
WebRequestEvent
WebErrorEvent
WebApplicationLifetimeEvent
WebRequestErrorEvent
WebAuditEvent
WebFailureAuditEvent
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Health Monitoring
The event providers are used to listen for Web events that are
raised by a Web application. Some of the built-in providers are:
EventLogWebEventProvider
SqlWebEventProvider
SimpleMailWebEventProvider and TemplatedMailWebEventProvider
TraceWebEventProvider
WmiWebEventProvider
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Performance Monitoring
Performance is an important factor in making a Web
application or project successful.
You need to monitor a Web application to troubleshoot any
performance-related issues.
You need to keep a track of such errors to improve the
performance of your Web application.
ASP.NET provides you with several performance counters,
such as Application Restarts, Requests Queued, and Errors
Total to help you keep track of the execution of your Web
application.
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Performance Monitoring
ASP.NET supports the following two groups of performance
counters:
System performance counters
Application performance counters
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Performance Monitoring
The following table lists some of the system performance
counters.
System Performance Counter Description
Application Running Represents the number of applications running
simultaneously on a Web server.
Requests Disconnected Represents the number of requests that have been
disconnected due to a communication failure.
Request Wait Time Represents the number of milliseconds that the most
recent request waited in the queue for being processed by
the server.
State Server Sessions Active Represents the number of user sessions that have become
inactive because of some user action. This counter is
available only on the computer where the state server
service, aspnet_state is running.
Worker Process Running Represents the number of worker processes running on a
Web server.
Tracing and Monitoring Web Applications
3SC – Q6 Dudy Fathan Ali S.Kom
Performance Monitoring
The following table lists some of the application performance
counters.
Application Performance Counter Description
Anonymous Requests Represents the number of requests that are using
anonymous authentication.
Anonymous Requests/Sec Represents the number of requests per second that
are using anonymous authentication.
Cache Total Entries Represents the total number of entries in the
cache.
Cache Total Hits Represents the total number of hits from the cache.
Debugging Requests Represents the number of requests that occur while
debugging is enabled.
3SC – Q6 Dudy Fathan Ali S.Kom
Thank You!
Dudy Fathan Ali S.Kom
dudy.fathan@eng.ui.ac.id
Source : NIIT Courseware Q6M2

More Related Content

What's hot

Thomas Georgeson CV Jan16
Thomas Georgeson CV Jan16Thomas Georgeson CV Jan16
Thomas Georgeson CV Jan16
Thomas Georgeson
 
Mandar_Kamate_Resume _DotNet
Mandar_Kamate_Resume _DotNetMandar_Kamate_Resume _DotNet
Mandar_Kamate_Resume _DotNet
Mandar Kamate
 
Vb net xp_15
Vb net xp_15Vb net xp_15
Vb net xp_15
Niit Care
 
Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015
Peter Gervais
 
Viktor Aleksandrov-Resume-2015
Viktor Aleksandrov-Resume-2015Viktor Aleksandrov-Resume-2015
Viktor Aleksandrov-Resume-2015
Viktor Aleksandrov
 
Pathway,I Ts Web Client Programming Manual
Pathway,I Ts Web Client Programming ManualPathway,I Ts Web Client Programming Manual
Pathway,I Ts Web Client Programming Manual
guest2dfc87
 
BhanuChand_Resume
BhanuChand_ResumeBhanuChand_Resume
BhanuChand_Resume
Bhanu Chand
 
Best things to know about .net framework
Best things to know about .net frameworkBest things to know about .net framework
Best things to know about .net framework
Shelly Megan
 
Rakshatha_Resume
Rakshatha_ResumeRakshatha_Resume
Rakshatha_Resume
Rakshatha C Shekar
 
Resume for Ladan Jamali
Resume for Ladan JamaliResume for Ladan Jamali
Resume for Ladan Jamali
Ladan Jamali
 
Subramanyam_Nalam
Subramanyam_NalamSubramanyam_Nalam
Subramanyam_Nalam
Subramanyam Nalam
 
Bmp_Resume
Bmp_ResumeBmp_Resume
Bmp_Resume
Bal Patel
 
IR-CV
IR-CVIR-CV
Varun Rajasekaran-TIBCO
Varun Rajasekaran-TIBCOVarun Rajasekaran-TIBCO
Varun Rajasekaran-TIBCO
Varun Rajasekaran
 
Saravanan rajalingam
Saravanan rajalingamSaravanan rajalingam
Saravanan rajalingam
Saravanan Rajalingam
 
William-Timpany-2016-03-09-v4-Resume
William-Timpany-2016-03-09-v4-ResumeWilliam-Timpany-2016-03-09-v4-Resume
William-Timpany-2016-03-09-v4-Resume
William Timpany
 

What's hot (16)

Thomas Georgeson CV Jan16
Thomas Georgeson CV Jan16Thomas Georgeson CV Jan16
Thomas Georgeson CV Jan16
 
Mandar_Kamate_Resume _DotNet
Mandar_Kamate_Resume _DotNetMandar_Kamate_Resume _DotNet
Mandar_Kamate_Resume _DotNet
 
Vb net xp_15
Vb net xp_15Vb net xp_15
Vb net xp_15
 
Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015
 
Viktor Aleksandrov-Resume-2015
Viktor Aleksandrov-Resume-2015Viktor Aleksandrov-Resume-2015
Viktor Aleksandrov-Resume-2015
 
Pathway,I Ts Web Client Programming Manual
Pathway,I Ts Web Client Programming ManualPathway,I Ts Web Client Programming Manual
Pathway,I Ts Web Client Programming Manual
 
BhanuChand_Resume
BhanuChand_ResumeBhanuChand_Resume
BhanuChand_Resume
 
Best things to know about .net framework
Best things to know about .net frameworkBest things to know about .net framework
Best things to know about .net framework
 
Rakshatha_Resume
Rakshatha_ResumeRakshatha_Resume
Rakshatha_Resume
 
Resume for Ladan Jamali
Resume for Ladan JamaliResume for Ladan Jamali
Resume for Ladan Jamali
 
Subramanyam_Nalam
Subramanyam_NalamSubramanyam_Nalam
Subramanyam_Nalam
 
Bmp_Resume
Bmp_ResumeBmp_Resume
Bmp_Resume
 
IR-CV
IR-CVIR-CV
IR-CV
 
Varun Rajasekaran-TIBCO
Varun Rajasekaran-TIBCOVarun Rajasekaran-TIBCO
Varun Rajasekaran-TIBCO
 
Saravanan rajalingam
Saravanan rajalingamSaravanan rajalingam
Saravanan rajalingam
 
William-Timpany-2016-03-09-v4-Resume
William-Timpany-2016-03-09-v4-ResumeWilliam-Timpany-2016-03-09-v4-Resume
William-Timpany-2016-03-09-v4-Resume
 

Viewers also liked

Parallelminds.asp.net with sp
Parallelminds.asp.net with spParallelminds.asp.net with sp
Parallelminds.asp.net with sp
parallelminder
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
nilesh67
 
Your First ASP_Net project part 1
Your First ASP_Net project part 1Your First ASP_Net project part 1
Your First ASP_Net project part 1
Biswadip Goswami
 
Chapter 1 (asp.net over view)
Chapter 1 (asp.net over view)Chapter 1 (asp.net over view)
Chapter 1 (asp.net over view)
let's go to study
 
Miao
MiaoMiao
Asp dot net long
Asp dot net longAsp dot net long
Asp dot net long
Amelina Ahmeti
 
ASP.NET - Introduction to Web Forms and MVC
ASP.NET - Introduction to Web Forms and MVCASP.NET - Introduction to Web Forms and MVC
ASP.NET - Introduction to Web Forms and MVC
Bilal Amjad
 
E sampark with c#.net
E sampark with c#.netE sampark with c#.net
E sampark with c#.net
Abhijeet Singh
 
Java CRUD Mechanism with SQL Server Database
Java CRUD Mechanism with SQL Server DatabaseJava CRUD Mechanism with SQL Server Database
Java CRUD Mechanism with SQL Server Database
Dudy Ali
 
ASP.NET Lecture 1
ASP.NET Lecture 1ASP.NET Lecture 1
ASP.NET Lecture 1
Julie Iskander
 
Asp.Net 3 5 Part 1
Asp.Net 3 5 Part 1Asp.Net 3 5 Part 1
Asp.Net 3 5 Part 1
asim78
 
Computer Notes
Computer Notes Computer Notes
Computer Notes
Ahisham Shah
 
Asp.Net 3.5 Part 2
Asp.Net 3.5 Part 2Asp.Net 3.5 Part 2
Asp.Net 3.5 Part 2
asim78
 
ASP
ASPASP
Computer Notes
Computer NotesComputer Notes
Computer Notes
EHSAN KHAN
 
Bai giang asp.net full
Bai giang asp.net fullBai giang asp.net full
Bai giang asp.net full
Ly hai
 
ASP.NET Web form
ASP.NET Web formASP.NET Web form
ASP.NET Web form
Md. Mahedee Hasan
 
Intro To Asp Net And Web Forms
Intro To Asp Net And Web FormsIntro To Asp Net And Web Forms
Intro To Asp Net And Web Forms
SAMIR BHOGAYTA
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
 
Web forms in ASP.net
Web forms in ASP.netWeb forms in ASP.net
Web forms in ASP.net
Madhuri Kavade
 

Viewers also liked (20)

Parallelminds.asp.net with sp
Parallelminds.asp.net with spParallelminds.asp.net with sp
Parallelminds.asp.net with sp
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Your First ASP_Net project part 1
Your First ASP_Net project part 1Your First ASP_Net project part 1
Your First ASP_Net project part 1
 
Chapter 1 (asp.net over view)
Chapter 1 (asp.net over view)Chapter 1 (asp.net over view)
Chapter 1 (asp.net over view)
 
Miao
MiaoMiao
Miao
 
Asp dot net long
Asp dot net longAsp dot net long
Asp dot net long
 
ASP.NET - Introduction to Web Forms and MVC
ASP.NET - Introduction to Web Forms and MVCASP.NET - Introduction to Web Forms and MVC
ASP.NET - Introduction to Web Forms and MVC
 
E sampark with c#.net
E sampark with c#.netE sampark with c#.net
E sampark with c#.net
 
Java CRUD Mechanism with SQL Server Database
Java CRUD Mechanism with SQL Server DatabaseJava CRUD Mechanism with SQL Server Database
Java CRUD Mechanism with SQL Server Database
 
ASP.NET Lecture 1
ASP.NET Lecture 1ASP.NET Lecture 1
ASP.NET Lecture 1
 
Asp.Net 3 5 Part 1
Asp.Net 3 5 Part 1Asp.Net 3 5 Part 1
Asp.Net 3 5 Part 1
 
Computer Notes
Computer Notes Computer Notes
Computer Notes
 
Asp.Net 3.5 Part 2
Asp.Net 3.5 Part 2Asp.Net 3.5 Part 2
Asp.Net 3.5 Part 2
 
ASP
ASPASP
ASP
 
Computer Notes
Computer NotesComputer Notes
Computer Notes
 
Bai giang asp.net full
Bai giang asp.net fullBai giang asp.net full
Bai giang asp.net full
 
ASP.NET Web form
ASP.NET Web formASP.NET Web form
ASP.NET Web form
 
Intro To Asp Net And Web Forms
Intro To Asp Net And Web FormsIntro To Asp Net And Web Forms
Intro To Asp Net And Web Forms
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Web forms in ASP.net
Web forms in ASP.netWeb forms in ASP.net
Web forms in ASP.net
 

Similar to Review Materi ASP.NET

Food borne human diseases
Food borne human diseasesFood borne human diseases
Food borne human diseases
AmalMohammedNasserSa
 
Asp.net Web Development | SEO Expert Bangladesh LTD
Asp.net Web Development | SEO Expert Bangladesh LTDAsp.net Web Development | SEO Expert Bangladesh LTD
Asp.net Web Development | SEO Expert Bangladesh LTD
Tasnim Jahan
 
SOA & WCF
SOA & WCFSOA & WCF
SOA & WCF
Dev Raj Gautam
 
Enterprise Software Architecture
Enterprise Software ArchitectureEnterprise Software Architecture
Enterprise Software Architecture
rahmed_sct
 
Tech Lead-Sachidanand Sharma
Tech Lead-Sachidanand SharmaTech Lead-Sachidanand Sharma
Tech Lead-Sachidanand Sharma
Sachidanand Semwal
 
Web 2 0 Fullfeatures
Web 2 0 FullfeaturesWeb 2 0 Fullfeatures
Web 2 0 Fullfeatures
vsnmurthy
 
Web 2 0 Fullfeatures
Web 2 0 FullfeaturesWeb 2 0 Fullfeatures
Web 2 0 Fullfeatures
guest9b7f4753
 
OWIN (Open Web Interface for .NET)
OWIN (Open Web Interface for .NET)OWIN (Open Web Interface for .NET)
OWIN (Open Web Interface for .NET)
Folio3 Software
 
Web 2 0 Fullfeatures
Web 2 0 FullfeaturesWeb 2 0 Fullfeatures
Web 2 0 Fullfeatures
Ratna Prashanth
 
Online furniture management system
Online furniture management systemOnline furniture management system
Online furniture management system
Yesu Raj
 
Getting started with dotnet core Web APIs
Getting started with dotnet core Web APIsGetting started with dotnet core Web APIs
Getting started with dotnet core Web APIs
Knoldus Inc.
 
Community platform for job seekers | web application for job seekers | case s...
Community platform for job seekers | web application for job seekers | case s...Community platform for job seekers | web application for job seekers | case s...
Community platform for job seekers | web application for job seekers | case s...
Mike Taylor
 
IRJET- Cross-Platform Supported E-Learning Mobile Application
IRJET- Cross-Platform Supported E-Learning Mobile ApplicationIRJET- Cross-Platform Supported E-Learning Mobile Application
IRJET- Cross-Platform Supported E-Learning Mobile Application
IRJET Journal
 
UNIT 3 web iiiBCA.pptx
UNIT 3 web iiiBCA.pptxUNIT 3 web iiiBCA.pptx
UNIT 3 web iiiBCA.pptx
VijayKumarLokanadam
 
A Deep Dive into Android App Development 2.0.pdf
A Deep Dive into Android App Development 2.0.pdfA Deep Dive into Android App Development 2.0.pdf
A Deep Dive into Android App Development 2.0.pdf
lubnayasminsebl
 
Angular JS Basics
Angular JS BasicsAngular JS Basics
Angular JS Basics
Mounish Sai
 
Important Backend Frameworks To Remember For Businesses In 2023
Important Backend Frameworks To Remember For Businesses In 2023Important Backend Frameworks To Remember For Businesses In 2023
Important Backend Frameworks To Remember For Businesses In 2023
Netizens Technologies
 
Assignment3.2
Assignment3.2Assignment3.2
Assignment3.2
Fina KHosravi
 
sMash_for_zOS-users
sMash_for_zOS-userssMash_for_zOS-users
sMash_for_zOS-users
Otto Kee LeakPeng
 
Secc tutorials development and deployment of rest web services in java_v2.0
Secc tutorials development and deployment of rest web services in java_v2.0Secc tutorials development and deployment of rest web services in java_v2.0
Secc tutorials development and deployment of rest web services in java_v2.0
Aravindharamanan S
 

Similar to Review Materi ASP.NET (20)

Food borne human diseases
Food borne human diseasesFood borne human diseases
Food borne human diseases
 
Asp.net Web Development | SEO Expert Bangladesh LTD
Asp.net Web Development | SEO Expert Bangladesh LTDAsp.net Web Development | SEO Expert Bangladesh LTD
Asp.net Web Development | SEO Expert Bangladesh LTD
 
SOA & WCF
SOA & WCFSOA & WCF
SOA & WCF
 
Enterprise Software Architecture
Enterprise Software ArchitectureEnterprise Software Architecture
Enterprise Software Architecture
 
Tech Lead-Sachidanand Sharma
Tech Lead-Sachidanand SharmaTech Lead-Sachidanand Sharma
Tech Lead-Sachidanand Sharma
 
Web 2 0 Fullfeatures
Web 2 0 FullfeaturesWeb 2 0 Fullfeatures
Web 2 0 Fullfeatures
 
Web 2 0 Fullfeatures
Web 2 0 FullfeaturesWeb 2 0 Fullfeatures
Web 2 0 Fullfeatures
 
OWIN (Open Web Interface for .NET)
OWIN (Open Web Interface for .NET)OWIN (Open Web Interface for .NET)
OWIN (Open Web Interface for .NET)
 
Web 2 0 Fullfeatures
Web 2 0 FullfeaturesWeb 2 0 Fullfeatures
Web 2 0 Fullfeatures
 
Online furniture management system
Online furniture management systemOnline furniture management system
Online furniture management system
 
Getting started with dotnet core Web APIs
Getting started with dotnet core Web APIsGetting started with dotnet core Web APIs
Getting started with dotnet core Web APIs
 
Community platform for job seekers | web application for job seekers | case s...
Community platform for job seekers | web application for job seekers | case s...Community platform for job seekers | web application for job seekers | case s...
Community platform for job seekers | web application for job seekers | case s...
 
IRJET- Cross-Platform Supported E-Learning Mobile Application
IRJET- Cross-Platform Supported E-Learning Mobile ApplicationIRJET- Cross-Platform Supported E-Learning Mobile Application
IRJET- Cross-Platform Supported E-Learning Mobile Application
 
UNIT 3 web iiiBCA.pptx
UNIT 3 web iiiBCA.pptxUNIT 3 web iiiBCA.pptx
UNIT 3 web iiiBCA.pptx
 
A Deep Dive into Android App Development 2.0.pdf
A Deep Dive into Android App Development 2.0.pdfA Deep Dive into Android App Development 2.0.pdf
A Deep Dive into Android App Development 2.0.pdf
 
Angular JS Basics
Angular JS BasicsAngular JS Basics
Angular JS Basics
 
Important Backend Frameworks To Remember For Businesses In 2023
Important Backend Frameworks To Remember For Businesses In 2023Important Backend Frameworks To Remember For Businesses In 2023
Important Backend Frameworks To Remember For Businesses In 2023
 
Assignment3.2
Assignment3.2Assignment3.2
Assignment3.2
 
sMash_for_zOS-users
sMash_for_zOS-userssMash_for_zOS-users
sMash_for_zOS-users
 
Secc tutorials development and deployment of rest web services in java_v2.0
Secc tutorials development and deployment of rest web services in java_v2.0Secc tutorials development and deployment of rest web services in java_v2.0
Secc tutorials development and deployment of rest web services in java_v2.0
 

More from Dudy Ali

Distributed Application Development (Introduction)
Distributed Application Development (Introduction)Distributed Application Development (Introduction)
Distributed Application Development (Introduction)
Dudy Ali
 
Network Socket Programming with JAVA
Network Socket Programming with JAVANetwork Socket Programming with JAVA
Network Socket Programming with JAVA
Dudy Ali
 
XML Schema Part 2
XML Schema Part 2XML Schema Part 2
XML Schema Part 2
Dudy Ali
 
XML Schema Part 1
XML Schema Part 1XML Schema Part 1
XML Schema Part 1
Dudy Ali
 
Rendering XML Document
Rendering XML DocumentRendering XML Document
Rendering XML Document
Dudy Ali
 
Pengantar XML
Pengantar XMLPengantar XML
Pengantar XML
Dudy Ali
 
Pengantar XML DOM
Pengantar XML DOMPengantar XML DOM
Pengantar XML DOM
Dudy Ali
 
Pengantar ADO.NET
Pengantar ADO.NETPengantar ADO.NET
Pengantar ADO.NET
Dudy Ali
 
Database Connectivity with JDBC
Database Connectivity with JDBCDatabase Connectivity with JDBC
Database Connectivity with JDBC
Dudy Ali
 
XML - Displaying Data ith XSLT
XML - Displaying Data ith XSLTXML - Displaying Data ith XSLT
XML - Displaying Data ith XSLT
Dudy Ali
 
Algorithm & Data Structure - Algoritma Pengurutan
Algorithm & Data Structure - Algoritma PengurutanAlgorithm & Data Structure - Algoritma Pengurutan
Algorithm & Data Structure - Algoritma Pengurutan
Dudy Ali
 
Algorithm & Data Structure - Pengantar
Algorithm & Data Structure - PengantarAlgorithm & Data Structure - Pengantar
Algorithm & Data Structure - Pengantar
Dudy Ali
 
Object Oriented Programming - Value Types & Reference Types
Object Oriented Programming - Value Types & Reference TypesObject Oriented Programming - Value Types & Reference Types
Object Oriented Programming - Value Types & Reference Types
Dudy Ali
 
Object Oriented Programming - Inheritance
Object Oriented Programming - InheritanceObject Oriented Programming - Inheritance
Object Oriented Programming - Inheritance
Dudy Ali
 
Object Oriented Programming - File Input & Output
Object Oriented Programming - File Input & OutputObject Oriented Programming - File Input & Output
Object Oriented Programming - File Input & Output
Dudy Ali
 
Object Oriented Programming - Constructors & Destructors
Object Oriented Programming - Constructors & DestructorsObject Oriented Programming - Constructors & Destructors
Object Oriented Programming - Constructors & Destructors
Dudy Ali
 
Object Oriented Programming - Abstraction & Encapsulation
Object Oriented Programming - Abstraction & EncapsulationObject Oriented Programming - Abstraction & Encapsulation
Object Oriented Programming - Abstraction & Encapsulation
Dudy Ali
 
Web Programming Syaria - Pengenalan Halaman Web
Web Programming Syaria - Pengenalan Halaman WebWeb Programming Syaria - Pengenalan Halaman Web
Web Programming Syaria - Pengenalan Halaman Web
Dudy Ali
 
Web Programming Syaria - PHP
Web Programming Syaria - PHPWeb Programming Syaria - PHP
Web Programming Syaria - PHP
Dudy Ali
 
Software Project Management - Project Management Knowledge
Software Project Management - Project Management KnowledgeSoftware Project Management - Project Management Knowledge
Software Project Management - Project Management Knowledge
Dudy Ali
 

More from Dudy Ali (20)

Distributed Application Development (Introduction)
Distributed Application Development (Introduction)Distributed Application Development (Introduction)
Distributed Application Development (Introduction)
 
Network Socket Programming with JAVA
Network Socket Programming with JAVANetwork Socket Programming with JAVA
Network Socket Programming with JAVA
 
XML Schema Part 2
XML Schema Part 2XML Schema Part 2
XML Schema Part 2
 
XML Schema Part 1
XML Schema Part 1XML Schema Part 1
XML Schema Part 1
 
Rendering XML Document
Rendering XML DocumentRendering XML Document
Rendering XML Document
 
Pengantar XML
Pengantar XMLPengantar XML
Pengantar XML
 
Pengantar XML DOM
Pengantar XML DOMPengantar XML DOM
Pengantar XML DOM
 
Pengantar ADO.NET
Pengantar ADO.NETPengantar ADO.NET
Pengantar ADO.NET
 
Database Connectivity with JDBC
Database Connectivity with JDBCDatabase Connectivity with JDBC
Database Connectivity with JDBC
 
XML - Displaying Data ith XSLT
XML - Displaying Data ith XSLTXML - Displaying Data ith XSLT
XML - Displaying Data ith XSLT
 
Algorithm & Data Structure - Algoritma Pengurutan
Algorithm & Data Structure - Algoritma PengurutanAlgorithm & Data Structure - Algoritma Pengurutan
Algorithm & Data Structure - Algoritma Pengurutan
 
Algorithm & Data Structure - Pengantar
Algorithm & Data Structure - PengantarAlgorithm & Data Structure - Pengantar
Algorithm & Data Structure - Pengantar
 
Object Oriented Programming - Value Types & Reference Types
Object Oriented Programming - Value Types & Reference TypesObject Oriented Programming - Value Types & Reference Types
Object Oriented Programming - Value Types & Reference Types
 
Object Oriented Programming - Inheritance
Object Oriented Programming - InheritanceObject Oriented Programming - Inheritance
Object Oriented Programming - Inheritance
 
Object Oriented Programming - File Input & Output
Object Oriented Programming - File Input & OutputObject Oriented Programming - File Input & Output
Object Oriented Programming - File Input & Output
 
Object Oriented Programming - Constructors & Destructors
Object Oriented Programming - Constructors & DestructorsObject Oriented Programming - Constructors & Destructors
Object Oriented Programming - Constructors & Destructors
 
Object Oriented Programming - Abstraction & Encapsulation
Object Oriented Programming - Abstraction & EncapsulationObject Oriented Programming - Abstraction & Encapsulation
Object Oriented Programming - Abstraction & Encapsulation
 
Web Programming Syaria - Pengenalan Halaman Web
Web Programming Syaria - Pengenalan Halaman WebWeb Programming Syaria - Pengenalan Halaman Web
Web Programming Syaria - Pengenalan Halaman Web
 
Web Programming Syaria - PHP
Web Programming Syaria - PHPWeb Programming Syaria - PHP
Web Programming Syaria - PHP
 
Software Project Management - Project Management Knowledge
Software Project Management - Project Management KnowledgeSoftware Project Management - Project Management Knowledge
Software Project Management - Project Management Knowledge
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 

Review Materi ASP.NET

  • 1. 3SC – Q6 Dudy Fathan Ali S.Kom Review Materi ASP.NET 3SC – Q6 Dudy Fathan Ali, S.Kom (DFA) 2014 CEP - CCIT Fakultas Teknik Universitas Indonesia
  • 2. Consuming Web Services in a Web Application 3SC – Q6 Dudy Fathan Ali S.Kom Consuming Web Services in a Web Application Web services are the application components that can be used by other Web applications. You can create a Web service and publish it on a Web server, thereby, making it available for other Web applications to use.
  • 3. Consuming Web Services in a Web Application 3SC – Q6 Dudy Fathan Ali S.Kom Invoking Web Services A Web service: Is a self-describing Web component that exposes its functionality to the consumers through open standards such as XML and Simple Object Access Protocol (SOAP). Is a widely used method for implementing Service-Oriented Architecture (SOA). Allows integration of applications developed in different languages and running on different platforms. Communicates by using a standard protocol called SOAP. SOAP defines a standard way of passing the XML-encoded data. Developing ASP.NET Web services starts by creating an .asmx file and hosting it on a Web server, such as IIS. A Web service once hosted or published on the server can be consumed by any client.
  • 4. Consuming Web Services in a Web Application 3SC – Q6 Dudy Fathan Ali S.Kom Invoking Web Services The client locates the service by adding a Web reference. This adds a proxy class on the client side, which exposes the methods, parameters, and return types of the methods contained in the Web service. After adding the proxy class, the client application creates an instance of the proxy class and accesses the methods provided by the Web service through the instance. The client requests are then handled by the proxy class. After processing the request, the response is also sent as a SOAP message to the proxy. The proxy then converts this SOAP message into method return value, which is returned to the client.
  • 5. Consuming Web Services in a Web Application 3SC – Q6 Dudy Fathan Ali S.Kom Invoking Windows Communication Foundation Services In distributed computing, Web services along with various other technologies, such as COM+, .NET Remoting, Message Queues, and Web Service Enhancement (WSE) were used to provide a wide range of functionality. WCF: Unifies features of such discreet technologies under one single framework. Provides a unified programming model used to build a secure, reliable, and robust Web service. Aims at providing encoding, hosting, messaging patterns, networking, security, and interoperability in a single infrastructure.
  • 6. Consuming Web Services in a Web Application 3SC – Q6 Dudy Fathan Ali S.Kom Invoking Windows Communication Foundation Services The following figure shows the WCF architecture.
  • 7. Consuming Web Services in a Web Application 3SC – Q6 Dudy Fathan Ali S.Kom Invoking Windows Communication Foundation Services The following set of APIs is unified in the WCF architecture: ASP.NET Web Services (ASMX) WSE System.Messaging Enterprise Services Remoting The design goals for building WCF services are: Unification Interoperability Service orientation
  • 8. Creating Rich Internet Applications Using AJAX 3SC – Q6 Dudy Fathan Ali S.Kom AJAX is a technology, which when implemented in Web applications makes the interaction between the client and the server asynchronous. AJAX implementation: Allows users to interact with the Web application while waiting for a response from the server. Enables partial updates in Web applications. Explaining the AJAX Framework
  • 9. Creating Rich Internet Applications Using AJAX 3SC – Q6 Dudy Fathan Ali S.Kom AJAX is a Web development technique that: Is used for creating dynamically interactive applications. Enables Web applications to retrieve data from the server, asynchronously in the background, without interfering with the display and behavior of the existing page. To understand the concept of AJAX, you need to understand the relevance of the following terms: Asynchronous communication JavaScript XML Understanding AJAX
  • 10. Creating Rich Internet Applications Using AJAX 3SC – Q6 Dudy Fathan Ali S.Kom AJAX-enabled Web applications offer: Quick response to a user’s request Asynchronous communication that allows a user to interact with the rest of the Web page while the application is processing the changed or updated parts of the Web page Auto-generated proxy classes that are used to call Web service methods from client script such as JavaScript Support for the widely used Web browsers such as Microsoft Internet Explorer, Mozilla Firefox, and Apple Safari Advantages of AJAX-Enabled Web Applications
  • 11. Creating Rich Internet Applications Using AJAX 3SC – Q6 Dudy Fathan Ali S.Kom Some of the limitations of AJAX-enabled Web applications are: Browser Integration Dependency on JavaScript Limitations of AJAX-Enabled Web Applications
  • 12. Creating Rich Internet Applications Using AJAX 3SC – Q6 Dudy Fathan Ali S.Kom The ASP.NET AJAX Web applications consist of client-side and server-side scripts. The following figure displays the ASP.NET AJAX architecture. Architecture of ASP.NET AJAX
  • 13. Creating Rich Internet Applications Using AJAX 3SC – Q6 Dudy Fathan Ali S.Kom Architecture of ASP.NET AJAX The preceding figure shows that the ASP.NET AJAX architecture consists of the following components: Client-based Microsoft AJAX library Server-based AJAX features for ASP.NET
  • 14. Creating Rich Internet Applications Using AJAX 3SC – Q6 Dudy Fathan Ali S.Kom Architecture of ASP.NET AJAX Client-based Microsoft AJAX library: The ASP.NET AJAX client architecture provides features that enable you to create rich, intuitive, responsive, and interactive Web applications. This architecture includes the ASP.NET AJAX library that includes: Components Browser compatibility Networking Core services
  • 15. Creating Rich Internet Applications Using AJAX 3SC – Q6 Dudy Fathan Ali S.Kom Architecture of ASP.NET AJAX Server-based AJAX features for ASP.NET: The ASP.NET AJAX server architecture provides the functionalities for the following server-based AJAX features: Script support Web services Application services Server controls
  • 16. Implementing Internationalization and Accessibility 3SC – Q6 Dudy Fathan Ali S.Kom Implementing Internationalization To make an international application customizable, you need to understand the following phases that are involved in developing an internationalized application: • Globalization: Globalization is the process of designing and developing a Web application in such a way that it is culture-neutral and language-neutral. • Localizability: Localizability is an intermediate process that ensures that a globalized Web application is ready for implementing localization. • Localization: Localization is the process of customizing the globalized Web application to a specific locale and culture. In this phase, various resources, such as images and text, for the designated locale are created.
  • 17. Implementing Internationalization and Accessibility 3SC – Q6 Dudy Fathan Ali S.Kom Factors Related to Creating International Applications Application developers need to attend to locale considerations when they develop international applications because negligence of these considerations can lead to issues. The factors that need to be considered while designing an internationalized application are: • Language issues • Formatting issues • String-related issues • User-interface issues
  • 18. Implementing Internationalization and Accessibility 3SC – Q6 Dudy Fathan Ali S.Kom Factors Related to Creating International Applications Language issues Languages around the world differ in display, alphabets, grammar, and syntactical rules. For example, some languages such as Arabic are written from right-to-left, whereas other languages are written from left-to-right. Some languages include uppercase and lowercase characters, whereas others do not even have the concept of uppercase and lowercase. Languages differ in the number of characters, storage requirements, keyboard layouts, and code representations. This diversity makes it difficult to share data between cultures. It is even more difficult to create a multilingual user interface.
  • 19. Implementing Internationalization and Accessibility 3SC – Q6 Dudy Fathan Ali S.Kom Factors Related to Creating International Applications Formatting issues Formatting is the main source of differences in applications designed for multiple languages or cultures. Formatting differences may arise in the addresses, currency, dates, numerals, telephone numbers, time, and units of measure of various languages.
  • 20. Implementing Internationalization and Accessibility 3SC – Q6 Dudy Fathan Ali S.Kom Factors Related to Creating International Applications String-related issues When developing international applications, programmers must consider issues related to strings. When strings are translated from one language to another, the translated strings may be longer than the original strings. In strings, the order of alphabets varies in different languages. This causes major problems in sorting and comparison of strings. Issues also arise when strings are concatenated because these strings may convey different meanings in different languages.
  • 21. Implementing Internationalization and Accessibility 3SC – Q6 Dudy Fathan Ali S.Kom Factors Related to Creating International Applications User-interface issues Various user interfaces are associated with the design of an international application. The size of user interface elements should be larger than that required for accommodating English strings. This is because strings in other languages are usually longer than strings in the English language. When messages grow in size as a result of translation to another language, they should be allowed to wrap to subsequent lines. You should also ensure that all the access-key and shortcut-key combinations are available on international keyboards. This is because every language has a different keyboard layout, and some characters do not exist on all keyboards.
  • 22. Implementing Internationalization and Accessibility 3SC – Q6 Dudy Fathan Ali S.Kom Implementing Accessibility Accessibility: Refers to the degree of ease with which an application can be used by a variety of people. Helps people having disabilities to work with the application easily. Enables users to interact with the application more efficiently. ASP.NET provides some guidelines that you should consider while designing your Web application to achieve high accessibility.
  • 23. Implementing Internationalization and Accessibility 3SC – Q6 Dudy Fathan Ali S.Kom Fundamentals of Designing an Accessible Application The features of a Web application that are used frequently should have a high degree of accessibility. Therefore, a developer should strictly follow the accessibility guidelines while designing this feature. The principles that should be followed while implementing accessibility support in an application are: Flexible user interface Flexible input and output features Simple and Intuitive
  • 24. Implementing Internationalization and Accessibility 3SC – Q6 Dudy Fathan Ali S.Kom Accessibility Design Guidelines for the Web Some guidelines for implementing accessibility in an application are: Standardize font styles Support keyboard navigation Standardize the use of images Standardize the use of tables Minimize the use of style sheets Use controls properly
  • 25. Implementing Internationalization and Accessibility 3SC – Q6 Dudy Fathan Ali S.Kom Assistive Technologies Used for Accessibility of the Web People with disabilities use various assistive technologies for accessing a Web application. Some assistive technologies used by the people with disabilities are: Braille and refreshable Braille Scanning software Screen magnifiers Screen readers Visual notifier
  • 26. Securing Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Introducing the ASP.NET Security Model The ASP.NET security model: Allows you to implement security in your Web applications. Provides restricted levels of access to secure website information from unauthorized access. Helps in maintaining data integrity and confidentiality.
  • 27. Securing Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Introducing the ASP.NET Security Model The following figure displays the architecture of the ASP.NET security model. Web Clients ASP.NET Applications .NET Framework Windows Operating System IIS
  • 28. Securing Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Introducing the ASP.NET Security Model The working of the ASP.NET security model is described in the following steps: 1. Internet Information Services (IIS) receives a request from a Web client. 2. IIS attempts to authenticate the user. 3. If ASP.NET authenticates the user, it allows requests to the specified Web page. 4. When the ASP.NET code requests resources, the operating system performs its own security checks to verify that the authenticated user is allowed access to the specified file and directory. 5. If access is granted, the requested resource is returned through IIS.
  • 29. Securing Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Configuring IIS for Implementing Security IIS authenticates the user who has requested for the application by using a specific type of authentication. The type of authentication depends on how the security for Web applications is configured on IIS. You need to configure security on IIS to authenticate users before they are permitted access to a Web application. IIS provides the following types of authentication to control access to your Web application: Anonymous Basic Digest Integrated Windows
  • 30. Securing Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Configuring an ASP.NET Application for Security ASP.NET uses its own security mechanism to authenticate users. To be able to use ASP.NET security mechanism, you need to configure the security settings in the web.config file of the Web application. These security settings include configuring authentication, authorization, and impersonation for accessing resources in your application.
  • 31. Securing Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Configuring Authentication Authentication is the process of validating the identity of a user before granting access to a restricted resource. Authentication in a Web application can be configured by using the <authentication> element in the web.config file. The <authentication> element specifies the authentication type that is used by an application to authenticate the user. The authentication type can be specified by using the mode attribute of the <authentication> element.
  • 32. Securing Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Configuring Authentication The mode attribute can have the following values: Windows: This mode specifies that the authentication is performed by IIS by using basic, digest, or Integrated Windows authentication. Forms: This mode specifies that the user will be authenticated by using form-based authentication method. Passport: This mode specifies that the user will be authenticated by using Microsoft Passport authentication method. None: This mode specifies that no authentication mechanism is set and that any anonymous user can access the Web application.
  • 33. Securing Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Configuring Impersonation When a user requests an ASP.NET application, the request goes to IIS. IIS authenticates the user and forwards the request to ASP.NET. If ASP.NET impersonation is disabled, irrespective of the user who has logged on, the ASP.NET application will be executed by using a fixed machine-specific account. In Windows XP, this account is automatically created by ASP.NET and is named as ASPNET.
  • 34. Securing Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Configuring Impersonation Impersonation is the process of executing code under the authenticated user identity and not under the ASPNET account. Impersonation involves the following steps: 1. When a request from a remote client is received, IIS carries out authentication. If the client is authenticated, it passes the request to the ASP.NET application. 2. The application impersonates the client and uses the authentication given by IIS to access the restricted resources. 3. If authorized to access resources, the ASP.NET application returns the requested resources to the client through IIS.
  • 35. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Implementing Tracing in Web Applications To ensure that the application is working properly and is not giving unexpected results, you need to keep track of the execution of your Web application. ASP.NET provides you with the tracing feature that enables you to track the program execution, thereby ensuring that your Web application runs properly. You can use tracing feature to: View diagnostic information about a particular Web page. Display custom tracing information about the execution of an application.
  • 36. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Implementing Tracing in Web Applications Tracing can be implemented at any of the following levels: Page level Application level
  • 37. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Implementing Tracing in Web Applications Page-level tracing: Page-level tracing is used to generate diagnostic information at the end of page rendering. The diagnostic information includes all the information about the requests made to the page and their responses. To enable page-level tracing, you need to perform the following steps: 1. Include the following directive at the top of the page: <%@ Page Trace="True" %> 2. Include the TraceMode attribute in the @ Page directive to specify the sort order for your trace messages.
  • 38. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Implementing Tracing in Web Applications The following information is displayed when page-level tracing is enabled: Request details Trace information Control tree Session state Application state Request Cookies Collection Response Cookies Collection Headers Collection Response Headers Collection Form Collection Querystring Collection Server Variables
  • 39. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Implementing Tracing in Web Applications Application-level tracing: Application-level tracing is used to trace information for every Web page in a Web application. A special page named trace.axd is used to view this trace information. To use the trace.axd page, you have to first enable application-level tracing within the Web.config file for your application. You can use the following attributes of the <trace> element to change the tracing settings of your website: enabled requestLimit pageOutput traceMode localOnly mostRecent
  • 40. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Writing Trace Information When a Web application is in the development stage, you often use several Response.Write statements in the program code to display debugging information, which is used to troubleshoot the application. The messages displayed using Response.Write statements are required for debugging and should not be displayed to an end user. The process of tracing enables you to insert debugging code within an application such that the debugging code does not need to be removed at the time of deployment. The Trace property of the Page class returns a Trace object, which can be used to write custom trace statements.
  • 41. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Writing Trace Information The Trace object: Is an instance of the TraceContext class. Provides a set of methods and properties that help you to trace the execution of your application. The properties of the Trace object are: IsEnabled: Denotes whether tracing is enabled for the current request. TraceMode: Sets the trace modes such as sortByCategory or sortByTime. Some of the methods of the Trace object are: Warn: Displays the trace information in red color. Write: Displays the trace information in black color.
  • 42. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Using Trace Listeners Trace listeners are used to: Collect, store, and route tracing messages. Redirect the tracing information to logs, windows, or text files. ASP.NET provides three types of predefined trace listeners: TextWriterTraceListener EventLogTraceListener DefaultTraceListener
  • 43. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Using Trace Listeners Adding a trace listener: To add a trace listener in the web.config file, you need to include the following markup in the web.config file: <configuration> <system.diagnostics> <trace> <listeners> <add name="MyListener" type="System.Diagnostics. TextWriterTraceListener" initializeData="D:myListener.txt" /> </listeners> </trace> </system.diagnostics> </configuration>
  • 44. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Using Trace Listeners To enable ASP.NET to route tracing information to a System.Diagnostics listener, you need to include the following entry in the web.config file: <system.web> <trace writeToDiagnosticsTrace = “true” /> <customErrors mode=”off” /> </system.web>
  • 45. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Using Trace Listeners Removing a trace listener: To remove a trace listener from the listeners collection, you need to include the following markup in the web.config file: <configuration> <system.diagnostics> <trace> <listeners> <remove name="MyListener"/> </listeners> </trace> </system.diagnostics> </configuration>
  • 46. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Using Trace Listeners You can control the tracing output by using trace switches. Trace switches can be configured to provide filtered tracing output. You can also enable and disable certain tracing output using trace switches. The two types of trace switches are: BooleanSwitch TraceSwitch To initialize a TraceSwitch, you need to first create its object. The following code snippet shows how you can create and initialize a TraceSwitch: System.Diagnostics.TraceSwitch MyTraceSwitch = new System.Diagnostics.TraceSwitch("MySwitch", "Entire application");
  • 47. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Monitoring Web Applications After deploying a Web application, a System Administrator needs to constantly monitor the application for its proper functioning. By monitoring a Web application, you can detect the problems occurring in the application and troubleshoot them. Monitoring and troubleshooting are required to improve the performance of a Web application. To help you track monitor a Web application, ASP.NET provides you with the following two features: Health monitoring Performance monitoring
  • 48. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Health Monitoring ASP.NET health monitoring system: Enables you to monitor the status of the deployed Web applications. Is used to track system events and errors, which can hamper the performance of a Web application. Enables you to get the detailed run-time information about ASP.NET resources used by a Web application. Is implemented by using the System.Web.Management namespace.
  • 49. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Health Monitoring You can configure applications to use built-in or customized monitoring providers. To use the health monitoring system you need to: Configure and enable Web events to monitor. Configure and enable event providers that listen for and process various Web events. Web events contain information about the health of a Web application.
  • 50. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Health Monitoring There are several events that you can trap to monitor the health of a Web application. Some of the important events are: WebBaseEvent WebBaseErrorEvent WebHeartbeatEvent WebRequestEvent WebErrorEvent WebApplicationLifetimeEvent WebRequestErrorEvent WebAuditEvent WebFailureAuditEvent
  • 51. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Health Monitoring The event providers are used to listen for Web events that are raised by a Web application. Some of the built-in providers are: EventLogWebEventProvider SqlWebEventProvider SimpleMailWebEventProvider and TemplatedMailWebEventProvider TraceWebEventProvider WmiWebEventProvider
  • 52. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Performance Monitoring Performance is an important factor in making a Web application or project successful. You need to monitor a Web application to troubleshoot any performance-related issues. You need to keep a track of such errors to improve the performance of your Web application. ASP.NET provides you with several performance counters, such as Application Restarts, Requests Queued, and Errors Total to help you keep track of the execution of your Web application.
  • 53. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Performance Monitoring ASP.NET supports the following two groups of performance counters: System performance counters Application performance counters
  • 54. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Performance Monitoring The following table lists some of the system performance counters. System Performance Counter Description Application Running Represents the number of applications running simultaneously on a Web server. Requests Disconnected Represents the number of requests that have been disconnected due to a communication failure. Request Wait Time Represents the number of milliseconds that the most recent request waited in the queue for being processed by the server. State Server Sessions Active Represents the number of user sessions that have become inactive because of some user action. This counter is available only on the computer where the state server service, aspnet_state is running. Worker Process Running Represents the number of worker processes running on a Web server.
  • 55. Tracing and Monitoring Web Applications 3SC – Q6 Dudy Fathan Ali S.Kom Performance Monitoring The following table lists some of the application performance counters. Application Performance Counter Description Anonymous Requests Represents the number of requests that are using anonymous authentication. Anonymous Requests/Sec Represents the number of requests per second that are using anonymous authentication. Cache Total Entries Represents the total number of entries in the cache. Cache Total Hits Represents the total number of hits from the cache. Debugging Requests Represents the number of requests that occur while debugging is enabled.
  • 56. 3SC – Q6 Dudy Fathan Ali S.Kom Thank You! Dudy Fathan Ali S.Kom dudy.fathan@eng.ui.ac.id Source : NIIT Courseware Q6M2