Creating a Solid Web Application Architecture Using Angular 2+, ASP.NET Core, and Web API Richard Taylor Tech Lead/Sr. Developer Logical Advantage http://www.logicaladvantage.com Twitter: @rightincode Blog: http://www.rightincode.com

Who am I? Web/Mobile Application Development Huntersville, NC Co-Organizer of Modern Devs Charlotte Organizer of Charlotte Xamarin Developers @rightincode / http://www.rightincode.com Richard Taylor - @rightincode

@LogicalAdv http://www.logicaladvantage.com Technical Lead/Sr. Software Developer Charlotte, NC

Basic Rules of Architecting Software Systems 1. 2. 3. 4. 5.

Scalability Extensibility Separation of Concerns/Responsibilities Security Availability

Richard Taylor - @rightincode

Applying the Basic Rules Business Logic Layer

Data Access Layer

Business Components

Business Workflows

Load Balancer

External Web Services

Load Balancer

Business Entities

Entity 1

Entity 3

CRUD

CRUD

Entity 2

Entity x

CRUD

CRUD

Security - Exception Handling - Logging - Validation

Richard Taylor - @rightincode

Data Layer

Load Balancer

Presentation Layer

Clustering/ Replication

DEMO

Richard Taylor - @rightincode

Speaker Register Application Architecture ASP.NET Core Web Application - Identity Server 4

Data Store - SQL Server

Angular - SPA

ASP.NET Core MVC Web API

Richard Taylor - @rightincode

Future Development

Speaker Register Angular SPA Architecture App.Module App.Routing App.Component PageNotFound.Component

Conference.Module

Speaker.Module Speaker.Routing SpeakerHome.Component

TokenService HttpHelperService

Conference.Routing Conference.Component

SpeakerList.Component

ConferenceList.Component

SpeakerDetail.Component

ConferenceDetail.Component

SpeakerService

ConferenceService

Richard Taylor - @rightincode

Resources ● ● ● ● ● ● ● ●

Source Code: https://github.com/rightincode/speakerregister Official Site: https://angular.io/ Typescript: https://www.typescriptlang.org/ ASP.NET Core: https://www.asp.net/core Build a Web API with ASP.NET Core MVC: https://docs.microsoft.com/en-us/aspnet/core/tutorials/first-web-api IdentityServer 4 - http://docs.identityserver.io/en/dev/index.html Dapper: https://github.com/StackExchange/dapper-dot-net Plurasight: http://www.pluralsight.com ○ John Papa - Angular 2: First Look ○ Deborah Kurata - Angular 2: Getting Started ○ Joe Eames - Angular 2: Preparing for and Migrating Applications to Angular 2

Richard Taylor - @rightincode

Questions???

Richard Taylor - @rightincode

Creating a Solid Web App Architecture Using Angular 2+, ASP.NET ...

Whoops! There was a problem loading more pages. Creating ... b API.pdf. Creating ... b API.pdf. Open. Extract. Open with. Sign In. Details. Comments. General Info. Type. Dimensions. Size. Duration. Location. Modified. Created. Opened by me. Sharing. Description. Download Permission. Main menu. Displaying Creating a ...

356KB Sizes 3 Downloads 184 Views

Recommend Documents

CREATING A REAL-TIME dashboard APP FOR TWITTER USING ...
When something could have changed, re-render everything to a new DOM-representation. 2.Diff new output with previous output. 3.Update only what has ...

CREATING A REAL-TIME dashboard APP FOR TWITTER USING ...
CREATING A REAL-TIME dashboard APP FOR TWITTER USING. REACT.JS. // Erik Wendel, BEKK Consulting .... but main goal = simplify development. 48 ...

pdf-0725\aspnet-web-developers-guide-by-syngress.pdf
pdf-0725\aspnet-web-developers-guide-by-syngress.pdf. pdf-0725\aspnet-web-developers-guide-by-syngress.pdf. Open. Extract. Open with. Sign In.

Creating Personal Histories from the Web using ...
Jun 2, 2005 - It is said that queries containing a person's name account for 5-10% of all Web ... increase as Web relationships become more and more common, as evidenced by the explosion of social networking services such as MySpace.

Chapter 2 Web App (PHP).pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

web app security.pdf
... via the mistakes developers made when building them. Using any one. of a long list of common Web application vulnerabilities, an attacker can make. the software misbehave in any number of ways, including granting access to. unauthorized data. For