Solved

N-Tier Architecture using Remoting, Web Service and WCF - C# / VB.NET / ASP.NET

Posted on 2012-12-28
2
846 Views
Last Modified: 2013-01-14
Hi,

I have BusinessObject (BO). And i do have UI Layer --> Web Server Layer --> App Server Layer --> DB Server Layer. Now my Web Server Layer is accessing BO and App Server Layer is accessing BO.

UI Layer is IE / FireFox.
Web Server Layer (IIS) is where Web Site is hosted.
App Server Layer is where Business Logic DLLs are hosted.
DB Server Layer is SQL Server.

The communication between Web Server Layer and App Server Layer is done by using Remoting, Web Services or WCF as they are on different machines.

Now my question is : How to send the objects between the Web Server Layer and App Server Layer ? Do we need to serialize them (BusinessObject (BO)) and send them across layers ?

Please provide me how to do architecture by using Remoting / Web Services / WCF.

Appreciate your great help !!

Thanks
0
Comment
Question by:milani_lucie
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 19

Assisted Solution

by:Melih SARICA
Melih SARICA earned 250 total points
ID: 38728831
.net Remoting does it for u ..

All classes must be in all layers excpet DB(if u dont ave any CLR commands) .

Classes must ave been good attribute settings for example( xmlserialization Attributes)

Serialize class on the any layer and send it to an other layer. then deserialize the object and get ur running class..  

Binary serialization can be a good alternative if u ave complex classes otherwise xml serialization works fine
0
 
LVL 83

Accepted Solution

by:
CodeCruiser earned 250 total points
ID: 38729762
Do the app servers host WCF/Webservices/Remoting? I think these provide serialization by default.
0

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Performance in games development is paramount: every microsecond counts to be able to do everything in less than 33ms (aiming at 16ms). C# foreach statement is one of the worst performance killers, and here I explain why.
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question