|
fat_boy wrote: No one hardly ever does this, and often follow the following:
Thanks,
My cousine already needs it. She is studying MCA final year.
She has developed a MFC application but as you know to document it
was harder as it was a bit complex application.
Ok anyway I will tell her to draw some bocks to the no of classes.
Put class methods in them then at the bottom of class block put method descriptions. put some class heirarchy, few UMLs. Put some explanation of critical code used. over all introduction, put some summary. thats it.
No one is going to understand project on this explanation anyway.
anyhow those should fill 100 pages.
pathak
|
|
|
|
|
pathakr wrote: My cousine already needs it. She is studying MCA final year.
MCA as in Microsoft Certified Archetect? If so then...
1) Why would anyone get this? Surley they know this is just a money grab to Micro$oft.
2) If she really is working on this should she already know how to do all this documentation. I mean that's a big part of what archetects do. It would be like a building engeneer not being able to write a blueprint.
E=mc2 -> BOOM
|
|
|
|
|
Albert Einstein. wrote: MCA
MASTER of computer application (in india)
pathak
|
|
|
|
|
Hi Pathak,
I really appreciate the format which you have given and other guyz suggestions, but it will make your cousin's life easier if he/she also consider following tips:
1. As more and more Projects are failing due to poor problem formulation, thus industry is seriously taking steps to cope with that issue through:
a. CSH (Classification of Stakeholders)
b. QCoH(Qualitative classes of stakeholders
c. defining issues through rich pictures
d. using Cogitive Maps (CM) instead of conventional DFD's, ERD,s etc.
2. Do not forget to include
a. Operational Fesibility (consider user's of the system)
b. Political Feasibility (consider user's and organization as a whole, mainly organization's internal environment)
c. Schedualing Feasibility (very very very important, its Time Management)
3. And i agree with other guys that since it is a OO application, then you "should" use class diagrams to define the attributes and methods.
and in the end, all i can say is "Wish your cousin all the best".
cheeerz
"Being a Simplebeing means Human Being"
|
|
|
|
|
Hi guys
How can use this interface ?
I tried by calling 'ExternalInterface.Call("function","Args")' in the action script of my swf file(On Button press ) . Then this swf file is loaded to a flash activex control.
The documentation says that it will rais an event named "FlashCall". But it
is not working ..
I am able to set variable usig m_pFlash->SetVariable() function
Any idea about the usage of external interface ???
Thanks & Regards
Krishnan
If u can Dream... U can do it
|
|
|
|
|
how r u doing?
SaRath
|
|
|
|
|
SaRath C wrote: how r u doing?
Fine, Just freaking around here
"Opinions are neither right nor wrong. I cannot change your opinion. I can, however, change what influences your opinion." - David Crow
cheers,
Alok Gupta
VC Forum Q&A :- I/ IV
Support CRY- Child Relief and You
|
|
|
|
|
1. List dirs on a remote machine.
2. Select a dir, list the files of the dir. It's better to support thumbnail.
|
|
|
|
|
Do you need to read one directory in ftp?
whitesky
|
|
|
|
|
and its sub dirs
no ftp server
|
|
|
|
|
See Here[^] maybe it is some helpful to you
whitesky
|
|
|
|
|
followait wrote: 1. List dirs on a remote machine.
2. Select a dir, list the files of the dir. It's better to support thumbnail.
Is there is any client/ Application of yours at Remote Machine
"Opinions are neither right nor wrong. I cannot change your opinion. I can, however, change what influences your opinion." - David Crow
cheers,
Alok Gupta
VC Forum Q&A :- I/ IV
Support CRY- Child Relief and You
|
|
|
|
|
I'm implementing both the client and the server.
Do you mean I should do a protocol myself?
I don't know if there is a easy way, because access control is also needed.
|
|
|
|
|
followait wrote: Do you mean I should do a protocol myself?
Yeap thats the easiest way i can found
"Opinions are neither right nor wrong. I cannot change your opinion. I can, however, change what influences your opinion." - David Crow
cheers,
Alok Gupta
VC Forum Q&A :- I/ IV
Support CRY- Child Relief and You
|
|
|
|
|
Hi,
What is the difference between Socket and Port.
If I use
CSocket sock.
sock.Create(200); // for server side willit create port
and for Cleint side
CSocket sock
sock.Create(); // will it create socket
thanks
Regards.
|
|
|
|
|
From MSDN:
"Definition of a Socket
A socket is a communication endpoint — an object through which a Windows Sockets application sends or receives packets of data across a network. A socket has a type and is associated with a running process, and it may have a name. Currently, sockets generally exchange data only with other sockets in the same “communication domain,” which uses the Internet Protocol Suite.
"
"Port
A port identifies a unique process for which a service can be provided. In the present context, a port is associated with an application that supports Windows Sockets. The idea is to identify each Windows Sockets application uniquely so you can have more than one Windows Sockets application running on a machine at the same time.
"
End of MSDN quotes.
Normally you don't choose the port to use unless you are a server, and that is only the listener port that is defined. You do however, have a choice to let the server listen on a particualr network if your box is multi-homed (multiple NICs or network cards). This is called "Binding". If your providing a common well known service, it is customary to listen on the port conventionally used for that service. Lets say port 25 for SMTP. When your "accept" returns, the socket connection will actually use a different port for it's communication with the client (usually the next available port) from that point forward leaving the common port to listen for further connection attempts via additional calls to one of the forms of "accept" available.
The client usually does not pick the port it will use on it's end. It usually states which family, port, and address it wants to connect to. This means it is saying it wants to connect to port 25 on the server at address whatever. The local port used is arbitrary and is usually just the next available port and in no way required to be any specific port.
|
|
|
|
|
From the above answer:
"......The client usually does not pick the port it will use on it's end. It usually states which family, port, and address it wants to connect to. This means it is saying it wants to connect to port 25 on the server at address whatever. The local port used is arbitrary and is usually just the next available port and in no way required to be any specific port."
----------------------------
As I undersand the Client get the local next available port , but if the Firewall is intalled on Client end, then Firewall can block the ports to be open by any application. then would it fail to open the any next avaible port on cleint side
Regards.
|
|
|
|
|
I am not sure how firewalls work to be honest. Bits and pieces here and there but nothing substantial enough to claim an understanding.
I have not looked into the layers of the OSI model below that needed to implement sockets so I'd be a little reluctant to venture there.
I do know that when my socket apps attempt to connect to a server, even through a loopback address (long story) the local firewalls usually catch it and prompt the user. It's almost consistent with your statements so I would guess your on the right track.
Sorry I can't be much help.
|
|
|
|
|
Firewalls are mainly used to block incoming packets rather than outgoing packets. If it is a firewall blocking outgoing packets unless that application is a "trusted" application, then it would have to be manually added by the user anyway. The usefulness of a firewall filtering outgoing connections is debatable, because this means that the malicious software is already installed on the client computer so the battle is more or less already lost.
The actual port number for outgoing sockets is usually not important and it's usually some rather high number (as the lower port numbers are all reserved for specific applications, eg 21 for ftp, 80 for http)
http://www.iana.org/assignments/port-numbers[^]
|
|
|
|
|
Help me
Now I want to design a project that use Splitter dialog in a CView
Can you send to my a example for it
Thank you so much
|
|
|
|
|
suppose there are 100 members in a group.
when member A want speak ,he write the message and push the send button.
Problem is :
How is the message sended?
Is it sended to the other 99 members by member A directly ?
Is it sended to server and then transmited to other members by the server?
Or,there are other method?
Thanks!
Bruspark
|
|
|
|
|
definitely to the server and let the server dispatch it.
Some VPN's aren't set up as a mesh and users at the leafs cannot directly communicate to other leafs. Think of a star like VPN where there is one (or a few) central firewalls that only provide rules for each of the nodes but not between them. In the type of network where Security administrators limit the traffic between nodes, the server application would fit in well as it is usually easier getting teeth pulled than convincing a security admin to add a rule for your application.
I used to be geographically situated at one of the central locations and took it for granted that I could see all the network resources. I quickly realized that when at one of the non-central locations, something as simple as logging into an email server on another non-central node wouldn't work.
|
|
|
|
|
Hi,bob16972. thank you for your reply.
in case there are lots of images in the group chat, the server will busy with transferring message and can't do other work.
another problem is :
once a member send a message,the server have to tranmit it for 99 times to other 99 client.
when all of the 100 members start to tall...
the server have to do 99*100 times transfer!
and further more ,if there are many groups ,how can the server deal with it?
thanks
bruspark
|
|
|
|
|
That's what a messaging server is there for. They should be busy getting their butt kicked else why spend all that money on the server rooms, redundant air conditioning systems, Large scale UPS systems, back up generators, RAID configurations that cost a boatload not to mention overpriced server configurations with multiple CPU's, gobs of memory running on gigabit backbones and licensing fees up the yingyang from software vendors for enterprise server Operating systems, databases, and collaboration software. Use them if you got 'em.
If I log into a chat session, and receive my security token (whatever form it may be in) and I send a message to another user, how does that user verify that I'm authenticated if the message was not sent through the server? How does that user verify that I'm me and not pretending to be me if the message was not sent through the server? How do we prevent users who have been banned from our chat or forum because of rude or inappropriate behaviour if messages don't need to be sent through the server?
Anyway, I'm sure you'll find arguments that support each approach. I just work in an environment with various geographical locations connected by a VPN that is administered in such a way that the client/server approach is the only practical way to set up centralized services like email and Instant Messaging.
Take care
|
|
|
|
|
Thank you very much! bob16972
|
|
|
|