Download presentation
Presentation is loading. Please wait.
Published byBruno Horn Modified over 8 years ago
1
Text Introduction to.NET Framework
2
CONFIDENTIAL Agenda .NET Training – Purpose What is.NET? Why.NET? Advantages Architecture Components: CLR, CTS, CLS and IL Assembly and Namespaces Q & A
3
CONFIDENTIAL.NET Training– Purpose Sharpening the saw Examples from On-Going Projects Understanding ‘ WHY ’ Introduction to projects across the account
4
CONFIDENTIAL What is.NET Framework? Software platform Language neutral In other words:.NET is not a language but runtime and a library for writing and executing written programs in any compliant language. Operating System + Hardware.NET Framework.NET Application
5
CONFIDENTIAL Why.NET? Before.NET Windows GUI development: Win32 API, MFC, Visual Basic Web development: ASP Java – “Write once, run anywhere.” Customize Now A new framework for developing web-based and windows-based applications within the Microsoft environment. Single unified UI framework across technologies and languages
6
CONFIDENTIAL History of.NET VersionVersion numberRelease dateVisual StudioDistributed with 1.01.0.3705.013 February 2002Visual StudioVisual Studio.NET Windows XP Tablet and Media Center Editions [5] [5] 1.11.1.4322.57324 April 2003 Visual Studio.NET 2003 Windows Server 2003 2.02.0.50727.427 November 2005Visual Studio 2005 Windows Server 2003 R2 3.03.0.4506.306 November 2006 Windows Vista, Windows Server 2008 3.53.5.21022.819 November 2007Visual Studio 2008 Windows 7, Windows Server 2008 R2 4.04.0.30319.112 April 2010Visual Studio 2010 4.54.5.5070915 August 2012Visual Studio 2012 Windows 8, Windows Server 2012 Reference: WikipediaWikipedia
7
CONFIDENTIAL Architecture Base Class Library Common Language Specification Common Language Runtime ADO.NET: Data and XML VBVC++VC# Visual Studio.NET ASP.NET: Web Services and Web Forms JScript… Windows Forms
8
CONFIDENTIAL.NET in action
9
CONFIDENTIAL Common Language Runtime (CLR) Program Execution Garbage Collection: CLR automatically manages memory thus eliminating memory leaks. When objects are not referred GC automatically releases those memories thus providing efficient memory management. Code Access Security: CAS grants rights to program depending on the security configuration of the machine. Example the program has rights to edit or create a new file but the security configuration of machine does not allow the program to delete a file. CAS will take care that the code runs under the environment of machines security configuration. Code Verification :- This ensures proper code execution and type safety while the code runs. It prevents the source code to perform illegal operation such as accessing invalid memory locations etc. IL( Intermediate language )-to-native translators and optimizer’s: CLR uses JIT and compiles the IL code to machine code and then executes. CLR also determines depending on platform what is optimized way of running the IL code.
10
CONFIDENTIAL Common Type System (CTS) A system with which two languages can communicate smoothly. Example in VB you have “Integer” and in C++ you have “long” these data types are not compatible so the interfacing between them is very complicated. In order to able that two different languages can 1. Basic.NET Framework99 communicate Microsoft introduced Common Type System. So “Integer” datatype in VB6 and “int” datatype in C++ will convert it to System.int32 which is datatype of CTS.
11
CONFIDENTIAL Common Language Specification (CLS) A subset of the CTS which all.NET languages are expected to support. Helps to unite all different languages in to one umbrella. Microsoft has defined CLS which are nothing but guidelines that language to follow so that it can communicate with other.NET languages in a seamless manner.
12
CONFIDENTIAL Intermediate Language (IL) Also known as MSIL (Microsoft Intermediate Language) or CIL (Common Intermediate Language). All.NET source code is compiled to IL. IL is then converted to machine code at the point where the software is installed, or at run-time by a Just-In-Time (JIT) compiler.
13
CONFIDENTIAL Managed Code Managed code is the code that runs inside the environment of CLR i.e..NET runtime. In short all IL are managed code. But if you are using some third party software example VB6 or VC++ component they are unmanaged code as.NET runtime (CLR) does not have control over the source code execution of the language.
14
CONFIDENTIAL Assembly Assembly is unit of deployment like EXE or a DLL. An assembly consists of one or more files (dlls, exe’s, html files etc.), and represents a group of resources, type definitions, and implementations of those types. An assembly may also contain references to other assemblies. These resources, types and references are described in a block of data called a manifest. The manifest is part of the assembly, thus making the assembly self-describing. An assembly contains metadata information, which is used by the CLR for everything from type checking and security to actually invoking the components methods.
15
CONFIDENTIAL Types of Assembly Private assembly: It is normally used by a single application, and is stored in the application's directory, or a sub-directory beneath. Shared assembly: It is normally stored in the global assembly cache, which is a repository of assemblies maintained by the.NET runtime. Shared assemblies are usually libraries of code which many applications will find useful. They are stored in Global Assembly Cache (GAC)
16
CONFIDENTIAL Namespaces Namespace Logically groups the types. Example: System.Web.UI logically groups our UI related features. In Object Oriented world many times its possible that programmers will use the same class name. By qualifying Namespace with class name this collision is able to be removed. Assembly is physical grouping of logical units. Namespace logically groups classes. Namespace can span multiple assembly.
17
CONFIDENTIAL.NET Framework Stack (Next Sessions)
18
Text Questions?
19
Text Thank You
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.