Deploying and Administering COM+ Applications

7 篇文章 0 订阅
4 篇文章 0 订阅

Deploying and Administering COM+ Applications

                                                                ----jenry 

一、    Deployment Requirements

 

1.    Server Requirements

A COM+ application must run on a server. Therefore, when deploying a COM+ application, you must first consider how to package the application so that it installs and runs correctly on a server. There are several techniques, including XCOPY deployment, using the Regsvcs.exe tool, programmatic deployment,and application export and replication.

The following software must be installed on the server to ensure a successful deployment:

l       Com+ running on Microsoft Windows 2000 or Microsoft Windows XP

l       The .Net common language runtime

l       Any additional software required by the application

2.    Client Requirements

Clients create serviced components and call methods to perform work. You must configure client applications to access the correct server.

The following techniques make a COM+ application available to a client:

l       You can make the COM+ application available to the client over the Internet or intranet through XML Web services.

l       You can create an application proxy that configures the client appropriately by using the Component Services administrative tool.

二、    Dynamic Registeration

1.    Dynamic registration

l       Configure the component using EnterpriseServices attributes and build the assembly

l       Deploy the assembly using XCOPY

l       When a serviced component is first used, the assembly and type library are registered, and the COM+ catalog is configured from the attributes

 

2.    Limitations

l       No install-time feedback on Regsvcs.exe errors

l       Dynamic registration does not install application assemblies to GAC

l       Application user must be a member of the Administrators group

l       Not all COM+ catalog properties can be configured with attributes Example: Running an application as a Windows NT–based service

 

三、    Use the Regsvcs.exe Tool

四、    Use the RegistrationHelper Class

五、    How to Export and Install Applications

The Component Services tool creates an installation package for a COM+ application and application proxies

The export creates an .msi file which contains:

COM registration info

l       Application attributes

l       Assemblies and type libraries

l       Use the .msi file created in the export process

 

六、How to Use the Component Services Tool to Deploy Proxies

l       Proxies allow you to access a COM+ application from another computer

l       Client contains a subset of attributes of the server application called a proxy

l       Proxy/stub DLLS, type libraries

l       You can use the Component services tool to create and install proxies

l       Proxies can be installed on versions of Windows that

l       do not include COM+ services

六、    How to Expose a COM+ Application as an XML Web Service

COM+ version 1.5 allows you to expose a COM+ application as an XML Web Service.

l       Doing this allows any type of client to call a COM+application through SOAP

l       Use Component Services administrative tool to createa SOAP VRoot

l       Create the client proxy by using Visual Studio .NET,Wsdl.exe, or SoapSuds.exe

 

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
How to Get the Most out of This Book Here are some things to know so you can get the most out of this book: First, to indicate that you need to select a command from a menu, the menu and command are sepa- rated by an arrow symbol. For example, if we tell you to select a tool from the Start menu, the instruc- tions will say to choose Start ➪ Tool. Parts I and II are entirely dedicated to operating system deployment and getting your Windows Vista infrastructure ready. Parts III and IV explain how to manage, administer, secure, and protect the com- puter systems that run Vista once the deployment is complete. For information on deployment project management, look to The Definitive Guide to Vista Migration, a free eBook written by Danielle and Nelson for which you’ll find a link to on the companion CD-ROM. This is a real-world deployment and administration book: We’ve worked hard to ensure that our les- sons, examples, and explanations are based on professional conventions. We’ve also culled these prac- tices from the myriad deployment projects we’ve all worked on as well as drawn administration techniques from the many support projects of which we have been a part. The CD-ROM that accompanies this book contains many of the third-party tools discussed in each chapter as well as documentation templates that can be used in support of your own deployment project. Icons: What Do They Mean? Although the icons are pretty standard and self-explanatory (they have their names written on them!), here’s a brief explanation of what they are and what they mean. TIP Tips offer you extra information that further explains a given topic or technique, often suggesting alternatives or workarounds to a listed procedure. NOTE Notes provide supplementary information to the text, shedding light on background pro- cesses or miscellaneous options that aren’t crucial to the basic understanding of the material. CAUTION When you see the Caution icon, make sure you’re following along closely to the tips and techniques being discussed.
Product Description RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books. For security professionals needing to get up and running fast with the topic of RFID, this How to Cheat approach to the topic is the perfect "just what you need to know" book! * For most business organizations, adopting RFID is a matter of when * The RFID services market is expected to reach $4 billion by 2008 About the Author Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion. In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information." An expert in multiple fields including computer networks and physics (the parent fields of RFID), Dr. Paul Sanghera is an educator, technologist, and an entrepreneur living in Silicon Valley, California. With a Master degree in Computer Science from Cornell University and a Ph.D. in Physics from Carleton University, he has authored and co-authored more than 100 technical papers published in well reputed European and American research journals. He has earned several industry certifications including CompTIA Network+, CompTIA Project+, CompTIA Linux+, Sun Certified Java Programmer, and Sun Certified Business Component Developer. Dr. Sanghera has contributed to building the world class technologies such as Netscape Communicator, and Novell's NDS. He has taught technology courses at various institutes including San Jose Sate University and Brooks College. As an engineering manager, he has been at the ground floor of several startups. He is the author of the following four books: SCJP Exam for J2SE 5: A Concise and Comprehensive Study Guide for The Sun Certified Java Programmer Exam; In Depth: Project Management Professional Study Guide for PMP and CAPM Exams; Sun Certified System Administrator for Solaris 10 Study Guide; SCBCD Exam Study Kit: Java Business Component Developer Certification For EJB.

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值