Chapter 15

The Name Pipes

 

 

 

COMPLETED PROJECT DOWNLOAD

 

What do we have in this chapter?

 

  1. Named Pipe Implementation Details

  2. Named Pipe Naming Conventions

  3. Byte Mode and Message Mode

  4. Compiling Applications

  5. Error Codes

  6. Basic Server and Client

  7. Server Details

  8. Building Null DACLs

  9. Advanced Server

  10. Threads

  11. Overlapped I/O

  12. Security Impersonation

  13. Client Details

  14. Other API Calls

  15. Program Examples

  16. Name Pipe Client Example 1

  17. Name Pipe Client Example 2

  18. The Name Pipe Overlapped Server Example

  19. Multithreaded Pipe Server Example

  20. Another Named Pipe Server Using Overlapped I/O

  21. Name Pipe Client Example 3

  22. Named Pipe Server Using Completion Routines Example

 

Summary

 

This chapter introduced the named pipe networking technology, which provides a simple client/server data-communication architecture that reliably transmits data. The interface relies on the Windows redirector to transmit data over a network. A major benefit of named pipes is that it takes advantage of Windows NT platform security features, an advantage offered by no other networking technology described in this book.

 

 

 

 

HOME

 

 
Custom Search

< Chap 14: The mailslots | Part 1 | Part 2 | Part 3 | Part 4 | Part 5 | Part 6 | End! >