Pattern-Oriented Software Architecture, a System of Patterns by Frank Buschmann & Regine Meunier & Hans Rohnert & Peter Sommerlad & Michael Stal

Pattern-Oriented Software Architecture, a System of Patterns by Frank Buschmann & Regine Meunier & Hans Rohnert & Peter Sommerlad & Michael Stal

Author:Frank Buschmann & Regine Meunier & Hans Rohnert & Peter Sommerlad & Michael Stal
Language: eng
Format: epub
ISBN: 9781118725269
Publisher: Wiley
Published: 2013-04-03T16:00:00+00:00


See Also

The Microkernel architectural pattern (171) supports adaptation and change by providing a mechanism for extending the software with additional or customer-specific functionality. The central component of this architecture—the microkernel—serves as a socket for plugging in such extensions and for coordinating their collaboration. Modifications can be made by exchanging these ‘pluggable’ parts.

An earlier version of this pattern appeared in [PLoP95].

Credits

One of the first works on reflection is the Ph.D. thesis by Brian Cantwell Smith [Smi82]. This describes reflection in the context of procedural languages. An overview of reflective concepts can be found in [Mae87].

We thank the members of PLoP’95 Working Group 1 for their valuable criticism and suggestions for improvement of an earlier version of this pattern, especially Douglas C. Schmidt and Aamod Sane. Special thanks also go to Linda Rising and David E. DeLano from AG Communication Systems, and Brian Foote and Ralph Johnson from the University of Illinois at Urbana Champaign. Their detailed review of an earlier version of this pattern helped to shape this description.

1. The Java bytecodes can be transformed into an ASCII representation that is a kind of object-oriented assembler code. This code can be read, but only with some pain!

2. Input/output buffering in higher layers is often intended to have the inverse effect—better performance than undisciplined direct use of lower-level system calls.

3. ATM (Asynchronous Transfer Mode) provides much higher data rates (ranging from 155Mbps to 2.4Gbps) and functionality (such as quality of service guarantees) than conventional low-speed networks such as Ethernet and Token Ring. In addition, ATM can emulate the behavior of Ethernet in a LAN, which allows it to be integrated seamlessly into existing networks. See [HHS94] for more information on ATM.

4. Any similarities in names, persons, or events are coincidental and unintended.

5. Note that all UNIX filters are active by this definition. Passive filters may be an unfamiliar concept. We introduce it to show that the Pipes and Filters pattern can be implemented without the overhead of context switches and data transfers and still remain a viable concept.

6. A ‘phone’ is the smallest unit of sound within a spoken language. This is distinct from ‘phoneme’, which is the smallest subdivision of a spoken language that conveys a distinct meaning. A phoneme can be represented by different phones. For example, the German hard ‘r’ sound and the English rolled ‘r’ sound are different phones, but belong to the same phoneme [Fel84].

7. We consider the problem of when to accept or reject top-level solutions in the Implementation section.

8. For more information on pipeline architectures, refer to the Pipes and Filters pattern (53) where we explain in more detail why building compilers according to Pipes and Filters is usually not a good idea.

9. The scheduling queue does not implicitly determine the sequence of elements to be removed, as a LIFO- or FIFO-queue does. Instead the Scheduler determines the sequence by repeatedly calculating priorities. Therefore, according to our terminology, the HEARSAY-II ‘scheduling queue’ is a container and not a queue.

10. In this pattern description servers are responsible for implementing services.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Whisky: Malt Whiskies of Scotland (Collins Little Books) by dominic roskrow(73940)
What's Done in Darkness by Kayla Perrin(26971)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(20866)
De Souza H. Master the Age of Artificial Intelligences. The Basic Guide...2024 by Unknown(20626)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(20543)
The Fifty Shades Trilogy & Grey by E L James(19481)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19391)
Shot Through the Heart by Mercy Celeste(19248)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(17396)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(17369)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(17206)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(17120)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16728)
The Subtle Art of Not Giving a F*ck by Mark Manson(14857)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14447)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(14243)
Cozy crochet hats: 7 Stylish and Beginner-Friendly Patterns from Baby Beanies to Trendy Bucket Hats by Vanilla Lazy(13519)
Scorched Earth by Nick Kyme(13111)
Reichel W. Numerical methods for Electrical Engineering, Meteorology,...2022 by Unknown(12986)
Drei Generationen auf dem Jakobsweg by Stein Pia(11276)