Web
Web Software Architecture Principles
First, the directory structure is clear, should not be too deep, complex, the path is best with relative addressSecond, the naming appropriateThird, constant variable content, interface to make the template betterFour, the common public Information unified storageFive, include files can not be embedded moreSix, the directory can not store too many content filesSeven,
2017-12-29 10:09:01Two data access policies to help the organization persist layer:
Repository
Data Access Objects (there is a one-to-one match between DAO and data table)
Data patterns and principles that gracefully address data access needs:
Lazy Loading
Identity Map
Unit of work
Query Object
OrmNhibernate/ms Entity FrameworkThe basis of the DAL strategy: Transaction management, data integrity, data query.---------------------------------------------
according to the configuration file (Struts-config.xml) Delegate the request received by Actionservlet to the appropriate action handler. In the business layer, the spring IOC container that manages the serviced component is responsible for delivering the business model component to the action and the component's collaboration Object data Processing (DAO) component to complete the business logic and to provide container components such as transaction processing, buffer pooling to improve system
=" Wkiol1srm8vr_ovaaapzikcrxtw457.jpg "/>Then, go to the Node1 server to view the HDFs file system, whether the relevant files and directories are generated:To view the generated directory:650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/58/2E/wKioL1SrnD2T4tjMAANsBMDhnlw258.jpg "title=" QQ picture 20150106162233.png "alt=" Wkiol1srnd2t4tjmaansbmdhnlw258.jpg "/>View the file inside the specific log:Hadoop fs-cat/apache/20150106_16/access.log.node1.test.com650) this.width=650; "src=" Htt
Tags: blog HTTP Io OS ar use for strong sp1. "Open-Close" principle (OCP)Software entities shocould be open for extension, but closed for modification.It is open to extensions and closed to modifications.2. Lishi replacement principle (LSP)Where the base class is applicable, the subclass must be applicable.3. Dependency reversal principle (DIP)Dependency abstraction is required.4. dummit's Law)An object should have as little understanding as possible
data that can be freed after the call has ended. For example, CGA contains a direct IO cache, information about recursive calls, heap space for expression evaluation (when a query plan is generated), and some other temporary data.
Java call memory is also allocated in CGA. It is divided into three parts: heap space, new space and old space. During the call (the length and length of the call depends on the duration and size of the usage), the memory segment that is no longer used in the new spa
pointer array fops is registered in the system's API management array.6. The system is classified management of the drive, it has a record of each driver interface function pointer array Base address array, each driver in advance in order to contract, such as the first element of the group is the key driver Key_fops, and the second is the LCD driver lcd_fops, and so on. When a driver is loaded, the driver logs the corresponding FoPs through the API-managed interface to the corresponding locatio
Inversion of control inversion controls: The applied process is not controlled by the application, but is controlled by the framework.
Default Behavior: The framework defines a series of default behaviors.
Extensibility Extensibility: Apps can extend the functionality of the framework, or you can modify the default behavior of the framework.
The Non-modifiable Framework code framework itself cannot be changed: When the framework is expanded, its own code does not need to be changed.
PMT-II
Function Model
Deployment model
1. Maintain separation of concerns
High Cohesion and low coupling
2. Component Classification
Business process component: Business Process Model
Business Service Components: Methods
Technical components: struts, etc.
System software components:
Ø hardware components:
It also includes their responsibilities and dependencies.
Component Composition System.
A component is not a component in. Net/EJB in development.
to more reasons for its changes. This will lead to dependency between duties and affect each other, greatly damaging their cohesion and coupling. A single responsibility usually means a single function. Therefore, do not implement too many function points for the class to ensure that the entity has only one reason for its change.
Therefore, the core of the SRP principle is to require only one change to the class. classes that violate this principle should be reconstructed, for example, separa
Recently, a B/S application software was just completed, which was written in vs2003 using VB. NET. A simple software registration function is added to the software at the customer's requirement. The main principle is to first obtain the machine cpu id, then add the unit name into a string, and then encrypt the string with MD5 to obtain the registration code.
The
Types of software Evolution
Software evolution is like biological evolution, some mutations are beneficial to species, and some are harmful.
The key to differentiate the type of software evolution is whether the quality of the program is increased or decreased in this process. The second is that this evolution is the result of the process of the construction of t
the years 6 months, Google published Worldwide Top 1000 website. Facebook is the champion.
With Facebook's current size, many traditional server technologies will collapse or simply fail to support them. So how will Facebook's engineers make the site run smoothly in the face of 500 million of active users? Bole Online – This article in the Workplace blog will showcase the software that Facebook's engineers have used to accomplish this daunting task
Boundary, is a certain range of clear distinction, with the boundary, there is a scope, there is scope for the work of the goals and tasks. The clarity of boundaries is the basic basis for defining responsibility and controlling costs. Imagine a job with no boundaries and no scope, so how can you possibly finish the job. The boundaries of the software are some limitations on our software, and we can mak
Reprint please mark: Shu Xiaolong http://www.cnblogs.com/shuxiaolong/articles/2893157.html
A year ago, I published several blogs in csdn:
On the software development in my heart: http://blog.csdn.net/sxl514286339/article/details/7331875
Code Design of a Web UI: http://blog.csdn.net/sxl514286339/article/details/7258105
Concept-Oriented Programming: The maximum UI code public: http://blog.csdn.net/sxl514286339/article/details/7220163
First of all, I h
Module division
The "planning" of module division refers to planning, which means how to reasonably divide a large software into a series of functional independent parts to fulfill the system requirements. C language, as a structured programming language, is mainly based on functions in module division (Division by function becomes an error in object-oriented design, and Newton's Law encounters relativity ), modular C LanguageProgramThe design sh
2.2 lazy acquisition mode
The lazy acquisition mode delays the resource acquisition to the last point of the system execution, so as to optimize resource usage.
1. Problem
Limited resource availability is a constraint on all software systems. In addition, if the available resources are not properly managed, it may cause bottlenecks to the system and significantly affect the system performance and stability. To ensure that resources are availa
interaction. pipeline filters increase progressively, with low latency in data results, processing localization during input, and feedback and interaction.
.1.2 MPs queue/Filter
Each component has a set of inputs and outputs. The component reads the input data streams, which are internally processed and then generates output data streams. This process is usually completed through the transformation and incremental computing of the input stream, including the enrichment of data by computing and
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.