Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Patterns for Building Enterprise Solutions
Figure 1.1: Singleton pattern, abbreviated
Figure 1.2: Quote application layers
Figure 1.3: Layers pattern, abbreviated
Figure 1.4: Three-Layered Application, abbreviated
Figure 1.5: Three-Layered Services Application, abbreviated
Figure 1.6: Three-Layered Services Application applied to the quote application
Figure 1.7: Refinement of related patterns
Figure 1.8: A cluster of patterns
Chapter 2: Organizing Patterns
Figure 2.1: A set of patterns
Figure 2.2: Pattern relationships represented as lines
Figure 2.3: Pattern clusters
Figure 2.4: Levels of abstraction
Figure 2.5: Adding viewpoints
Figure 2.6: The Pattern
F
rame
Figure 2.7: Root constraints of the Pattern
F
rame
Chapter 3: Web Presentation Patterns
Figure 3.1: Web Presentation patterns cluster
Figure 3.2: MVC class structure
Figure 3.3: Behavior of the passive model
Figure 3.4: Using Observer to decouple the model from the view in the active model
Figure 3.5: Behavior of the active model
Figure 3.6: Example Web page
Figure 3.7: Page Controller structure
Figure 3.8: Using BaseController to eliminate code duplication
Figure 3.9: Separating the Web-dependent and Web-independent code
Figure 3.10: Simple page
Figure 3.11: Simple page displaying user input
Figure 3.12: Banner displaying dynamic content
Figure 3.13: Structure of the code-behind pages implementation
Figure 3.14: Page request sequence
Figure 3.15: Front Controller structure
Figure 3.16: Front Controller, typical scenario
Figure 3.17: Handler portion of the front controller
Figure 3.18: Command portion of the front controller
Figure 3.19: Structure of the code-behind classes of the view
Figure 3.20: Chain of composable filters
Figure 3.21: Intercepting Filter class diagram
Figure 3.22: Intercepting Filter sequence diagram
Figure 3.23: Decorator class diagram
Figure 3.24: Decorator sequence diagram
Figure 3.25: Event-driven intercepting filters
Figure 3.26: Intercepting filter that does not intervene in the message flow
Figure 3.27: Intercepting filter that redirects the message flow
Figure 3.28: Basic page cache configuration
Figure 3.29: Sequence for a cache miss (when the page is not in the cache)
Figure 3.30: Sequence for a cache hit (when the page is in the cache)
Figure 3.31: Basic Observer structure
Figure 3.32: Basic Observer interaction
Figure 3.33: Using a helper class to avoid inheriting from the Subject class
Figure 3.34: Separating DomainObject and Subject
Figure 3.35: State propagation using the pull model
Figure 3.36: Extraneous notifications
Figure 3.37: Modifying object state from within Update causes an infinite loop
Figure 3.38: Example UML static diagram
Figure 3.39: Observer class diagram
Figure 3.40: Modified Observer class diagram
Chapter 4: Deployment Patterns
Figure 4.1: Deployment cluster
Figure 4.2: Layers
Figure 4.3: UML representation of layers composed of subsystems
Figure 4.4: Sequence diagram of a top-down scenario
Figure 4.5: Sequence diagram of a bottom-up scenario
Figure 4.6: Three-Layered Services Application
Figure 4.7: Single-tiered distribution
Figure 4.8: Two-tiered distribution
Figure 4.9: Three-tiered distribution
Figure 4.10: Four-tiered distribution
Figure 4.11: Three-tiered distribution
Figure 4.12: Three-Layered Services Application
Figure 4.13: Simple Web application deployment
Figure 4.14: Complex Web application deployment
Figure 4.15: Extended enterprise application deployment
Figure 4.16: Smart client application deployment
Chapter 5: Distributed Systems Patterns
Figure 5.1: Patterns in the Distributed Systems cluster
Figure 5.2: Structure with no distribution
Figure 5.3: Structure with distribution
Figure 5.4: Behavior with distribution
Figure 5.5: Broker structure with server look-up
Figure 5.6: Broker behavior with server look-up
Figure 5.7: Structure of Broker serving as intermediary
Figure 5.8: Behavior of Broker serving as intermediary
Figure 5.9: HttpChannel implementation
Figure 5.10: TcpChannel/binary serialization implementation
Figure 5.11: Structure for the HttpChannel/SOAP example
Figure 5.12: Structure of the hybrid approach
Figure 5.13: Remote calls without a DTO
Figure 5.14: Reducing the number of calls by using a DTO
Figure 5.15: Using an
Assembler
to load data into the DTO
Figure 5.16: Behavior of a typical user request
Figure 5.17: Schema for sample application
Figure 5.18: Behavior of a typical user request
Figure 5.19: Schema for sample application
Figure 5.20: Visual Studio .NET DataSet file type
Figure 5.21: Singleton structure
Chapter 6: Services Patterns
Figure 6.1: Invocation of a service in an SOA
Figure 6.2: Communication channel and TCP/IP protocol stacks
Figure 6.3: Communication protocol stacks with addition of HTTP
Figure 6.4: Service elements
Figure 6.5: Service elements
Figure 6.6: Service Interface class diagram
Figure 6.7: Service Gateway consuming the service of a service interface
Figure 6.8: Application structure
Figure 6.9: Example Web application
Figure 6.10: Structural view of example Web application
Chapter 7: Performance and Reliability Patterns
Figure 7.1: Performance and Reliability patterns cluster
Figure 7.2: Basic clustering concepts
Figure 7.3: Asymmetric cluster
Figure 7.4: Symmetric cluster
Figure 7.5: Load balancing components
Figure 7.6: Load balancing and centralized state management
Figure 7.7: Load balancing and asynchronous session state management
Figure 7.8: Basic solution with a single application server
Figure 7.9: Solution with a scalable application tier
Figure 7.10: Non-failover solution with single point of failure
Figure 7.11: Solution with failover data tier
Previous page
Table of content
Next page
Enterprise Solution Patterns Using Microsoft. NET 2003
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 107
BUY ON AMAZON
Java I/O
Thread Safety
Server Socket Channels
Print Writers
Formatted I/O with java.text
The Local Device
Crystal Reports 9 on Oracle (Database Professionals)
Oracle Advanced SELECT Options
PL/SQL
Optimizing: Reducing Parses
Other Tips
Appendix B Functions
Snort Cookbook
Building a Distributed IDS (Plain Text)
Logging to a File Quickly
Logging to Email
Detecting Viruses
Creating HTML Log Analysis Output
MySQL Clustering
Before You Begin with MySQL Cluster
SQL Nodes
Backup and Recovery
Common Setups
Cluster Topographies
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Oracle and PL/SQL
Triggers
Running Operating System Commands
Appendix A Default Usernames and Passwords
Python Standard Library (Nutshell Handbooks) with
Data Representation
The pickle Module
The asyncore Module
The whatsound Module
The _winreg Module
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies