Network Programming in .NET (eBook)
541 Seiten
Elsevier Science (Verlag)
978-0-08-049195-0 (ISBN)
This is the second book in the Digital Press Software Development Series.
?Coverage of lower level protocols allows implementation of performance-centric applications
?Demonstrates the feasibility of developing telephony solutions in-house rather than outsourcing
?Written in VB.NET and C# to assist readers working in either language
?Coverage of Email, FTP and the WWW allows implementation of applications in all three areas"
The purpose of this book is to provide tools to design and implement network-orientated applications in .NET. It is also a guide for software designers to choose the best and most efficient way to implement mission critical solutions. The book addresses real-world issues facing professional developers, such as using third-party components as opposed in-house development. It differentiates itself from existing .NET publications because it is aimed at experienced professionals and concentrates on practical, ready-to-use information. The book is written in two languages C# and VB.NET, and covers never-before published information on Telephony in .NET and packet-level networking. This is the second book in the Digital Press Software Development Series. - Coverage of lower level protocols allows implementation of performance-centric applications- Demonstrates the feasibility of developing telephony solutions in-house rather than outsourcing- Written in VB.NET and C# to assist readers working in either language- Coverage of Email, FTP and the WWW allows implementation of applications in all three areas
Front Cover 1
Network Programming in .NET With C# and Visual Basic .NET 4
Copyright Page 5
Contents 8
Preface 16
Who should read this book? 16
What hardware and software do you need? 17
How this book is organized 17
Conventions used in this book 18
Further information 19
Acknowledgments 20
Chapter 1. Understanding the Internet and Network Programming 22
1.1 Introduction 22
1.2 Why network programming in .NET? 23
1.3 What can a network program do? 23
1.4 IP addresses 24
1.5 The network stack 27
1.6 Ports 28
1.7 Internet standards 28
1.8 What is .NET? 30
1.9 Getting started 32
1.10 Using Visual Studio .NET 33
1.11 Using the .NET SDK 37
1.12 Conclusion 41
Chapter 2. I/O in the .NET Framework 42
2.1 Introduction 42
2.2 Streams 42
2.3 Conclusion 75
Chapter 3. Working with Sockets 76
3.1 Introduction 76
3.2 What is a socket? 76
3.3 Creating a simple “hello world” application 77
3.4 Using TCP/IP to transfer files 83
3.5 Debugging network code 94
3.6 Socket-level networking in .NET 96
3.7 Conclusion 107
Chapter 4. HTTP: Communicating with Web Servers 108
4.1 Introduction 108
4.2 HTTP 109
4.3 Web servers 134
4.4 System.Net.HttpWebListener 145
4.5 Mobile Web browsers 149
4.6 Conclusion 151
Chapter 5. SMTP and POP3: Communicating with email Servers 152
5.1 Introduction 152
5.2 Sending an email 152
5.3 SMTP 153
5.4 Post office protocol 3 161
5.5 System.Web.Mail 169
5.6 Mail application programming interface 174
5.7 Conclusion 182
Chapter 6. FTP: Communicating with File Servers 184
6.1 Background 184
6.2 Microsoft file sharing 184
6.3 Netware file sharing 185
6.4 An overview of FTP 186
6.5 Conclusion 215
Chapter 7. Securing a Network: Firewalls, Proxy Servers, and Routers 216
7.1 Introduction 216
7.2 Building an enterprise network 220
7.3 Tunneling out of an enterprise network 224
7.4 Avoiding the networking pitfalls 226
7.5 Conclusion 228
Chapter 8. Protecting Data: Encryption 230
8.1 Introduction 230
8.2 Cryptanalysis 230
8.3 Terminology 233
8.4 Asymmetric encryption 233
8.5 Using RSA as asymmetric encryption 234
8.6 Symmetric encryption 239
8.7 Piracy protection 245
8.8 Conclusion 246
Chapter 9. Controlling User Access: Authentication and Authorization 248
9.1 Introduction 248
9.2 Authentication techniques 248
9.3 Microsoft .NET Passport authentication 251
9.4 Hashing information 253
9.5 SSL 257
9.6 Certificates 257
9.7 Server certificates 259
9.8 Client certificates 260
9.9 Permissions in .NET 265
9.10 Financial network security 267
9.11 Conclusion 270
Chapter 10. Programming for Scalability 272
10.1 Introduction 272
10.2 Case study: The Google search engine 272
10.3 Replication and redundancy 274
10.4 Scalable network applications 275
10.5 Future proofing 276
10.6 Thread pooling 277
10.7 Avoiding deadlocks 282
10.8 Load balancing 283
10.9 Conclusion 293
Chapter 11. Optimizing Bandwidth Utilization 296
11.1 Introduction 296
11.2 Tricks and tips to increase performance 296
11.3 Multicast UDP 303
11.4 Data compression 310
11.5 Lossless compression 311
11.6 Lossy compression 317
11.7 Conclusion 324
Chapter 12. Ping, DNS, and WHOIS: Monitoring your Network 326
12.1 Introduction 326
12.2 DNS 326
12.3 Ping 335
12.4 WHOIS 342
12.5 Other members of the TCP/IP suite 348
12.6 WMI 350
12.7 Conclusion 357
Chapter 13. Analyzing Network Packets 358
13.1 Introduction 358
13.2 IP-level network tapping 360
13.3 Layer 2 network tapping 375
13.4 Physical network tapping 387
13.5 Conclusion 397
Chapter 14. Adding Digital Telephony 400
14.1 Introduction 400
14.2 Basic telephony 401
14.3 Listening for incoming phone calls 403
14.4 DTMF tones 420
14.5 Audio playback 422
14.6 Conclusion 438
Chapter 15. Message Queues 440
15.1 Introduction 440
15.2 MSMQ 441
15.3 Implementing a message queue 441
15.4 Timeouts 460
15.5 Journal 462
15.6 Queued Components 464
15.7 Security 468
15.8 Scalability 470
15.9 Performance issues 472
15.10 Conclusion 473
Chapter 16. IPv6: Programming for the Next-generation Internet 474
16.1 Introduction 474
16.2 What is IPv6? 474
16.3 The history of IPv6 475
16.4 So what changes? 476
16.5 IPv6 naming conventions 477
16.6 Installing IPv6 478
16.7 Using IPv6 utilities 479
16.8 IPv6 routing 485
16.9 IPv6 coexistence 490
16.10 IPv6 in .NET 494
16.11 Conclusion 500
Chapter 17. Web Services and Remoting 502
17.1 Introduction 502
17.2 Creating a Web service 502
17.3 Using a Web service 507
17.4 Asynchronous calls to Web services 510
17.5 Interoperability 514
17.6 Performance 515
17.7 Security 516
17.8 Web services enhancements 518
17.9 .NET remoting 521
17.10 Conclusion 518 539
Index 540
Erscheint lt. Verlag | 1.7.2004 |
---|---|
Sprache | englisch |
Themenwelt | Sachbuch/Ratgeber |
Mathematik / Informatik ► Informatik ► Netzwerke | |
Mathematik / Informatik ► Informatik ► Software Entwicklung | |
ISBN-10 | 0-08-049195-2 / 0080491952 |
ISBN-13 | 978-0-08-049195-0 / 9780080491950 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich