Enterprise Application Architecture Model

Source: Internet
Author: User
Tags xslt
Enterprise Application Architecture Model

Author: Martin Fowler/Wang huaimin/Zhou Bin
Translator: Wang huaimin/Zhou Bin
Press: Machinery Industry Press
Publishing year:
Page: 384
Pricing: 49.00
Frame loading: flat (no disk)
ISBN: 9787111143055

Douban: http://book.douban.com/subject/1230559/
Dangdang: http://product.dangdang.com/product.aspx? Product_id = 8873900

 

Directory Introduction 1
0.1 architecture 1
0.2 Enterprise Application 2
0.3 enterprise application types 3
0.4 Performance Considerations 4
0.5 mode 6
0.5.1 schema 7
Limitations of the 0.5.2 mode 9
Table 1
Chapter 12 hierarchy 12
1.1 Evolution of layers in enterprise applications 13
1.2 three basic levels 14
1.3 select a runtime environment for each layer 15
Chapter 2 Organizational domain logic 19
2.1 choice 22
2.2 service layer 23
Chapter 1 ing to relational database 25
3.1 architecture Mode 25
3.2 behavior problems 28
3.3 read data 29
3.4 structure ing mode 30
3.4.1 link ing 30
3.4.2 inherit 33
3.5 create a ing 34
3.6 use metadata 35
3.7 database connection 36
3.8 Other questions 38
3.9 Further Reading 38
Chapter 2 WEB presentation layer 39
4.1 view mode 41
4.2 input controller mode 43
4.3 Further reading 43
Chapter 4 concurrency 45
5.1 concurrency ISSUES 45
5.2 execution context 46
5.3 isolation and immutability 47
5.4 Optimistic Concurrency Control and pessimistic concurrency control 48
5.4.1 avoid inconsistent read 49
5.4.2 deadlock 49
5.5 transactions 50
5.5.1 acid 51
5.5.2 transaction resource 51
5.5.3 reduce transaction isolation to improve flexibility 52
5.5.4 business transactions and system transactions 53
5.6 offline concurrency control mode 54
5.7 Application Server concurrency 55
5.8 Further reading 56
Chapter 4 session status 57
6.1 stateless value 57
6.2 session Status 58
6.3 method 59 for storing session Status
Chapter 1 distribution policy 61
7.1 temptation of Distributed Objects 61
7.2 remote and local interfaces 62
7.3 where distribution is required 63
7.4 about the distributed boundary 64
7.5 distribution interface 64
Chapter 14 overall consideration 67
8.1 starting from the domain layer 67
8.2 go deep into the data source layer 68
8.2.1 transaction script data source 68
8.2.2 data source in Table module 69
8.2.3 domain model data source 69
8.3 presentation layer 69
8.4 some suggestions on specific technologies 70
8.4.1 Java and J2EE 70
8.4.2. Net 71
8.4.3 Stored Procedure 71
8.4.4 web services 72
8.5 other layering Methods 72
Part 2 Model
Chapter 1 domain logic model 76
9.1 transaction script 76
9.1.1 Operating Mechanism 76
9.1.2 use time 77
9.1.3 income confirmation 78
9.1.4 example: Income confirmation (Java) 78
9.2 domain model 81
9.2.1 Operating Mechanism 81
9.2.2 use time 83
9.2.3 further reading 83
9.2.4 example: Income confirmation (Java) 84
9.3 table module 87
9.3.1 Operating Mechanism 88
9.3.2 use time 90
9.3.3 example: Income Confirmation based on the table module (C #) 90
9.4 service layer 93
9.4.1 Operating Mechanism 94
9.4.2 use time 96
9.4.3 further reading 96
9.4.4 examples: Income confirmation (Java) 96
Chapter 2 Data Source Architecture Model 10th
10.1 table data gateway 101
10.1.1 Operating Mechanism 101
10.1.2 use time: 102
10.1.3 read more 102
10.1.4 example: Personnel portal (C #) 103
10.1.5 example: Use the ADO. Net dataset (C #) 104
10.2 row data gateway 106
10.2.1 operation mechanism 107
10.2.2 use time 108
10.2.3 example: Personnel Record (Java) 108
10.2.4 example: data holder for domain objects (Java) 111
10.3 active record 112
10.3.1 operating mechanism 112
10.3.2 time to use 113
Example 10: a simple person class (Java) 113
10.4 data ER 115
10.4.1 operating system 116
10.4.2 use time: 119
10.4.3 example: A simple data Er (Java) 119
10.4.4 examples: separated search (Java) 123
10.4.5 example: Create an empty object (Java) 126
Chapter 2 object-relationship Behavior Model 11th
11.1 unit of work 129
11.1.1 Operating Mechanism 129
11.1.2 use time: 133
11.1.3 example: working unit registered with objects (Java) 134
11.2 Identity map 137
11.2.1 Operating Mechanism 137
11.2.2 use time: 139
11.2.3 example: Method in ID ing (Java) 139
11.3 lazy load 140
11.3.1 Operating Mechanism 140
11.3.2 use time: 142
11.3.3 example: delayed initialization (Java) 142
11.3.4 example: Virtual proxy (Java) 142
11.3.5 example: Use the value holder (Java) 144
11.3.6 examples: Use the shadow (C #) 144
Chapter 2 object-link structure mode 12th
12.1 identity field 151
12.1.1 mechanism of Work 151
12.1.2 use time: 154
12.1.3 read more 154
12.1.4 example: integer key (C #) 154
12.1.5 example: Use a key table (Java) 155
12.1.6 examples: using the combination key (Java) 157
12.2 foreign key mapping (foreign key mapping) 166
12.2.1 Operating Mechanism 167
12.2.2 use time: 169
12.2.3 example: Single-value reference (Java) 169
12.2.4 example: Multi-Table query (Java) 172
12.2.5 example: reference set (C #) 173
12.3 Association tablemapping 175
12.3.1 Operating Mechanism 176
12.3.2 time of use: 176
12.3.3 example: employees and skills (C #) 177
12.3.4 example: Use Direct SQL (Java) 179
12.3.5 example: Use a single query to query multiple employees (Java) 182
12.4 dependent mapping 186
12.4.1 Operating Mechanism 186
12.4.2 use time: 187
12.4.3 example: records and tracks (Java) 188
12.5 embedded value (embedded value) 190
12.5.1 Operating Mechanism 190
12.5.2 use time: 190
12.5.3 read more 191
12.5.4 examples: simple value object (Java) 191
12.6 serialize lob (serialized LOB) 192
12.6.1 Operating Mechanism 193
12.6.2 use time 194
12.6.3 example: serialize a department-level (Java) 194 in XML
12.7 single table inheritance 196
12.7.1 Operating Mechanism 197
12.7.2 use time: 197
12.7.3 example: athlete's single table (C #) 198
12.7.4 load object 199 from the database
12.8 class Table inheritance 202
12.8.1 operating system 202
12.8.2 use time: 203
12.8.3 read more 203
12.8.4 examples: athletes and Their Families (C #) 203
12.9 specific table inheritance (concrete table inheritance) 208
12.9.1 Operating Mechanism 209
12.9.2 use time: 210
12.9.3 examples: Athletes (C #) 210
12.10 inherit (inheritance mappers) 214
12.10.1 Operating Mechanism 215
12.10.2 use time: 216
Chapter 2 object-relational metadata ing mode 13th
13.1 metadata mapping 217
13.1.1 Operating Mechanism 217
13.1.2 use time: 218
13.1.3 example: use metadata and reflection (Java) 219
13.2 query object 224
13.2.1 Operating Mechanism 225
13.2.2 time to use 225
13.2.3 read more 226
13.2.4 example: simple query object (Java) 226
13.3 resource library (repository) 228
13.3.1 Operating Mechanism 229
13.3.2 time of use: 230
13.3.3 read more 231
13.3.4 example: search for a department (Java) 231
13.3.5 example: resource pool switching Policy (Java) 231
Chapter 2 web performance model 14th
14.1 Model-View-controller (Model View Controller) 233
14.1.1 Operating Mechanism 233
14.1.2 use time: 234
14.2 page controller 235
14.2.1 Operating Mechanism 235
14.2.2 use time: 236
14.2.3 example: simple demonstration of servlet controller and JSP view (Java) 236
14.2.4 example: use JSP as the processing program (Java) 238
14.2.5 example: Page controller (C #) with code hiding 241
14.3 front-end controller 243
14.3.1 Operating Mechanism 244
14.3.2 time to use 245
14.3.3 further reading 246
14.3.4 example: simple display (Java) 246
14.4 template view 248
14.4.1 Operating Mechanism 249
14.4.2 use time: 251
14.4.3 example: the separated controller uses JSP as the view (Java) 252
14.4.4 example: ASP. NET Server Page (C #) 253
14.5 transform view 256
14.5.1 operating system 256
14.5.2 use time 257
14.5.3 example: simple conversions (Java) 257
14.6 two-step view (two step view) 259
14.6.1 Operating Mechanism 259
14.6.2 use time 260
14.6.3 example: Two-Step XSLT (XSLT) 264
14.6.4 examples: JSP and custom tag (Java) 266
14.7 application controller 269
14.7.1 Operating Mechanism 270
14.7.2 use time 271
14.7.3 read more 271
14.7.4 example: State Model Application controller (Java) 271
Chapter 1 distribution model 15th
15.1 remote facade 275
15.1.1 Operating Mechanism 276
15.1.2 use time: 278
15.1.3 example: Use the Java Session Bean as the remote appearance (Java) 278
15.1.4 example: Web Service (C #) 281
15.2 data transmission object 285
15.2.1 Operating Mechanism 285
15.2.2 time to use 288
15.2.3 read more 289
15.2.4 example: Transfer recording information (Java) 289
15.2.5 example: use XML for serialization (Java) 293
Chapter 2 offline concurrency mode 16th
16.1 optimistic offline lock (optimistic offline lock) 295
16.1.1 Operating Mechanism 296
16.1.2 use time 298
16.1.3 example: domain layer and data Er (Java) 298
16.2 pessimistic offline lock (pessimistic offline lock) 302
16.2.1 Operating Mechanism 303
16.2.2 use time: 305
16.2.3 example: simple lock management object (Java) 305
16.3 coarse-grained lock (coarse-grained lock) 310
16.3.1 Operating Mechanism 310
16.3.2 time to use 312
16.3.3 example: Shared optimistic offline lock (Java) 312
16.3.4 example: Shared pessimistic offline lock (Java) 316
16.3.5 example: Optimistic offline lock (Java) of the root object 317
16.4 implicit lock 318
16.4.1 Operating Mechanism 318
16.4.2 use time: 319
16.4.3 example: Implicit pessimistic offline lock (Java) 319
Chapter 2 session state mode 17th
17.1 client session state 321
17.1.1 operating system 321
17.1.2 use time 322
17.2 Server session state 322
17.2.1 Operating Mechanism 322
17.2.2 time to use 324
17.3 database session state 324
17.3.1 Operating Mechanism 324
17.3.2 use time 325
Chapter 1 Basic Mode 18th
18.1 entry (GATEWAY) 327
18.1.1 operating system 327
18.1.2 use time 328
18.1.3 example: private message service entry (Java) 329
18.2 Er (Mapper) 331
18.2.1 Operating Mechanism 332
18.2.2 use time 332
Layer supertype 18.3
18.3.1 operating system 332
18.3.2 time to use 333
18.3.3 example: Field object (Java) 333
18.4 separated interface (separated Interface) 333
18.4.1 operation mechanism 334
18.4.2 use time: 335
18.5 registry 335
18.5.1 operating system 336
18.5.2 use time 337
18.5.3 example: mona1 Registry (Java) 337
18.5.4 example: thread-safe Registry (Java) 338
18.6 value object 339
18.6.1 operating system 339
18.6.2 use time 340
18.7 currency (money) 340
18.7.1 Operating Mechanism 341
18.7.2 use time: 342
18.7.3 example: currency (Java) 343
18.8 special case (Special Case) 346
18.8.1 Operating Mechanism 347
18.8.2 use time: 347
18.8.3 read more 347
18.8.4 example: A simple empty object (C #) 347
18.9 plug-in (plugin) 348
18.9.1 Operating Mechanism 349
18.9.2 time to use 350
18.9.3 example: Id generator (Java) 350
18.10 service pile (Service stub) 352
18.10.1 Operating Mechanism 352
18.10.2 use time: 353
18.10.3 example: Sales Tax Service (Java) 353
18.11 record set 355
18.11.1 Operating Mechanism 355
18.11.2 time to use 356
References 359

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.