Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Patterns for Building Enterprise Solutions
Figure 1.1: Singleton pattern, abbreviated
Figure 1.2: Quote application layers
Figure 1.3: Layers pattern, abbreviated
Figure 1.4: Three-Layered Application, abbreviated
Figure 1.5: Three-Layered Services Application, abbreviated
Figure 1.6: Three-Layered Services Application applied to the quote application
Figure 1.7: Refinement of related patterns
Figure 1.8: A cluster of patterns
Chapter 2: Organizing Patterns
Figure 2.1: A set of patterns
Figure 2.2: Pattern relationships represented as lines
Figure 2.3: Pattern clusters
Figure 2.4: Levels of abstraction
Figure 2.5: Adding viewpoints
Figure 2.6: The Pattern
F
rame
Figure 2.7: Root constraints of the Pattern
F
rame
Chapter 3: Web Presentation Patterns
Figure 3.1: Web Presentation patterns cluster
Figure 3.2: MVC class structure
Figure 3.3: Behavior of the passive model
Figure 3.4: Using Observer to decouple the model from the view in the active model
Figure 3.5: Behavior of the active model
Figure 3.6: Example Web page
Figure 3.7: Page Controller structure
Figure 3.8: Using BaseController to eliminate code duplication
Figure 3.9: Separating the Web-dependent and Web-independent code
Figure 3.10: Simple page
Figure 3.11: Simple page displaying user input
Figure 3.12: Banner displaying dynamic content
Figure 3.13: Structure of the code-behind pages implementation
Figure 3.14: Page request sequence
Figure 3.15: Front Controller structure
Figure 3.16: Front Controller, typical scenario
Figure 3.17: Handler portion of the front controller
Figure 3.18: Command portion of the front controller
Figure 3.19: Structure of the code-behind classes of the view
Figure 3.20: Chain of composable filters
Figure 3.21: Intercepting Filter class diagram
Figure 3.22: Intercepting Filter sequence diagram
Figure 3.23: Decorator class diagram
Figure 3.24: Decorator sequence diagram
Figure 3.25: Event-driven intercepting filters
Figure 3.26: Intercepting filter that does not intervene in the message flow
Figure 3.27: Intercepting filter that redirects the message flow
Figure 3.28: Basic page cache configuration
Figure 3.29: Sequence for a cache miss (when the page is not in the cache)
Figure 3.30: Sequence for a cache hit (when the page is in the cache)
Figure 3.31: Basic Observer structure
Figure 3.32: Basic Observer interaction
Figure 3.33: Using a helper class to avoid inheriting from the Subject class
Figure 3.34: Separating DomainObject and Subject
Figure 3.35: State propagation using the pull model
Figure 3.36: Extraneous notifications
Figure 3.37: Modifying object state from within Update causes an infinite loop
Figure 3.38: Example UML static diagram
Figure 3.39: Observer class diagram
Figure 3.40: Modified Observer class diagram
Chapter 4: Deployment Patterns
Figure 4.1: Deployment cluster
Figure 4.2: Layers
Figure 4.3: UML representation of layers composed of subsystems
Figure 4.4: Sequence diagram of a top-down scenario
Figure 4.5: Sequence diagram of a bottom-up scenario
Figure 4.6: Three-Layered Services Application
Figure 4.7: Single-tiered distribution
Figure 4.8: Two-tiered distribution
Figure 4.9: Three-tiered distribution
Figure 4.10: Four-tiered distribution
Figure 4.11: Three-tiered distribution
Figure 4.12: Three-Layered Services Application
Figure 4.13: Simple Web application deployment
Figure 4.14: Complex Web application deployment
Figure 4.15: Extended enterprise application deployment
Figure 4.16: Smart client application deployment
Chapter 5: Distributed Systems Patterns
Figure 5.1: Patterns in the Distributed Systems cluster
Figure 5.2: Structure with no distribution
Figure 5.3: Structure with distribution
Figure 5.4: Behavior with distribution
Figure 5.5: Broker structure with server look-up
Figure 5.6: Broker behavior with server look-up
Figure 5.7: Structure of Broker serving as intermediary
Figure 5.8: Behavior of Broker serving as intermediary
Figure 5.9: HttpChannel implementation
Figure 5.10: TcpChannel/binary serialization implementation
Figure 5.11: Structure for the HttpChannel/SOAP example
Figure 5.12: Structure of the hybrid approach
Figure 5.13: Remote calls without a DTO
Figure 5.14: Reducing the number of calls by using a DTO
Figure 5.15: Using an
Assembler
to load data into the DTO
Figure 5.16: Behavior of a typical user request
Figure 5.17: Schema for sample application
Figure 5.18: Behavior of a typical user request
Figure 5.19: Schema for sample application
Figure 5.20: Visual Studio .NET DataSet file type
Figure 5.21: Singleton structure
Chapter 6: Services Patterns
Figure 6.1: Invocation of a service in an SOA
Figure 6.2: Communication channel and TCP/IP protocol stacks
Figure 6.3: Communication protocol stacks with addition of HTTP
Figure 6.4: Service elements
Figure 6.5: Service elements
Figure 6.6: Service Interface class diagram
Figure 6.7: Service Gateway consuming the service of a service interface
Figure 6.8: Application structure
Figure 6.9: Example Web application
Figure 6.10: Structural view of example Web application
Chapter 7: Performance and Reliability Patterns
Figure 7.1: Performance and Reliability patterns cluster
Figure 7.2: Basic clustering concepts
Figure 7.3: Asymmetric cluster
Figure 7.4: Symmetric cluster
Figure 7.5: Load balancing components
Figure 7.6: Load balancing and centralized state management
Figure 7.7: Load balancing and asynchronous session state management
Figure 7.8: Basic solution with a single application server
Figure 7.9: Solution with a scalable application tier
Figure 7.10: Non-failover solution with single point of failure
Figure 7.11: Solution with failover data tier
Previous page
Table of content
Next page
Enterprise Solution Patterns Using Microsoft. NET 2003
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 107
BUY ON AMAZON
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Presenting InfoPath 2003 SP-1
Creating Forms
Adding Basic Controls and Lists
Setting Form Template and Digital Signing Options
Designing InfoPath Web Service Clients
Snort Cookbook
Uninstalling Snort from Windows
Debugging Snort Rules
Detecting Malware
Running Snortsnarf Automatically
Port Knocking
Cisco IOS Cookbook (Cookbooks (OReilly))
Enabling Absolute Timeouts on VTY Lines
Tunneling with Dynamic Routing Protocols
Using an Internal ISDN PRI Module
Connecting VLAN Trunks with 802.1Q
Configuring a Basic MPLS P Router
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
Built-in Application Services
Remote Method Calls with ASP.NET AJAX
Building AJAX Applications with ASP.NET
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
Form Presentation and Validation with Struts
Building a Data Access Tier with ObjectRelationalBridge
Templates and Velocity
Creating a Search Engine with Lucene
Building the JavaEdge Application with Ant and Anthill
Understanding Digital Signal Processing (2nd Edition)
DESIGNING A DISCRETE HILBERT TRANSFORMER
BLOCK FLOATING-POINT BINARY FORMAT
Appendix C. Time Reversal and the DFT
Section G.5. REAL FSF TRANSFER FUNCTION
Section G.6. TYPE-IV FSF FREQUENCY RESPONSE
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies