cisc 322
play

CISC 322 Software Architecture Lecture 09: Architecture Styles (4) - PowerPoint PPT Presentation

CISC 322 Software Architecture Lecture 09: Architecture Styles (4) Emad Shihab Adapted from Ahmed E. Hassan and Spiros Mancoridis Recap of Last Class Automated Stock Trading System Two architectures Pipe-and-Filter + Repository +


  1. CISC 322 Software Architecture Lecture 09: Architecture Styles (4) Emad Shihab Adapted from Ahmed E. Hassan and Spiros Mancoridis

  2. Recap of Last Class ■ Automated Stock Trading System ■ Two architectures – Pipe-and-Filter + Repository + (EB) Implicit Invocation – Object Oriented + Repository + (PS) Implicit Invocation

  3. Adapted from Taylor et al. 2010 Layered Style Clients C1 C2 C3 Network Server Virtual Machine Client-Server

  4. Taylor et al. 2010 Layered Style ■ Architecture is separated into ordered layers – A program in one layer may obtain services from a layer below it

  5. Layered Variants ■ Virtual Machine – An ordered sequence of layers – Each layer services the layer above it ■ Client-Server – Clients send service request to server – Server replies as needed with requested information

  6. Layered Style ■ Components – VM: Layers (comprised of one or more programs) – CS: Client and Server ■ Connectors – VM: Procedure calls – CS: Remote procedure calls

  7. Layered Style ■ Topology – VM: Linear; cross layer in special cases – CS: Two-level; client-to-client communication prohibited

  8. Layered Style Advantages ■ VM – Clear dependence structure – Upper levels immune to changes at lower levels – Lower levels are independent of upper levels ■ CS – Centralization of computation and data at server – Single powerful server can serve many clients

  9. Layered Style Disadvantages ■ VM – Having too many layers can be inefficient (may need to cross layers) – Not easy to divide software systems into layers ■ CS – Heavy dependence on communication network

  10. Layered Style Examples ■ VM – Operating systems – Network protocol stack ■ CS – Business applications

  11. Layered Style Example Virtual Machine Client-Server

  12. QA evaluation of Layered Style ■ Performance – VM: In some cases need to cross layers – CS: May be restricted by network capacity ■ Availability – VM: lower layers vs. higher layers? – CS: Failure at server affects all clients ■ Modifiability – Change to a layer will affect, at most, 2 layers ■ Portability?

  13. Architectural Styles Wrap Up

  14. Adapted from Taylor et al. 2010 Repository Use it when… Avoid it when… Summary Independent programs, order of processing interactions between the access and dynamically determined independent programs communicate exclusively and data-driven require complex through a global regulation repository

  15. Taylor et al. 2010 Pipe-and-Filter Use it when… Avoid it when… Summary Separate programs, aka problem easily interaction between filters, executed, formulated as a set of components required potentially concurrently. sequential, severable Pipes route data streams steps between filters

  16. Adapted from Taylor et al. 2010 Object Oriented Use it when… Avoid it when… Summary Objects encapsulate many complex and strong independence state and accessing interrelated data between components functions structures necessary.

  17. Adapted from Taylor et al. 2010 Implicit Invocation Use it when… Avoid it when… Summary (PB) Publishers subscription data is small middleware to support broadcast messages to and efficiently high-volume data is subscribers transported. unavailable. (EB) Independent components are guarantees on real-time components concurrent and processing of events is asynchronously emit and independent required receive events communicated over event buses

  18. Taylor et al. 2010 Layered Use it when… Avoid it when… Summary (VM) Virtual machine, or many applications can 1. many levels are a layer, offers services to be based upon a single, required (causes layers above it. common layer of inefficiency) services (CS) Clients request centralization of network bandwidth and service from a server. computation and data at reliability are limited a single location (the server) promotes manageability and scalability

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend