Software Architecture Patterns - O'Reilly Media

3y ago
1.6K Views
408 Downloads
5.14 MB
54 Pages
Last View : 2d ago
Last Download : 3m ago
Upload by : Sutton Moon
Transcription

Software ArchitecturePatternsUnderstanding Common ArchitecturePatterns and When to Use ThemMark Richards

Software Architecture Patternsby Mark RichardsCopyright 2015 O’Reilly Media, Inc. All rights reserved.Printed in the United States of America.Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA95472.O’Reilly books may be purchased for educational, business, or sales promotional use.Online editions are also available for most titles (http://oreilly.com/safari). For moreinformation, contact our corporate/institutional sales department: 800-998-9938 orcorporate@oreilly.com.Editor: Heather SchererProduction Editor: Colleen LobnerCopyeditor: Amanda KerseyFebruary 2015:Interior Designer: David FutatoCover Designer: Ellie VolckhausenIllustrator: Rebecca DemarestFirst EditionRevision History for the First Edition2015-02-24:2015-03-30:2017-06-22:First ReleaseSecond ReleaseThird ReleaseThe O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Software Architec‐ture Patterns, the cover image, and related trade dress are trademarks of O’ReillyMedia, Inc.While the publisher and the author have used good faith efforts to ensure that theinformation and instructions contained in this work are accurate, the publisher andthe author disclaim all responsibility for errors or omissions, including without limi‐tation responsibility for damages resulting from the use of or reliance on this work.Use of the information and instructions contained in this work is at your own risk. Ifany code samples or other technology this work contains or describes is subject toopen source licenses or the intellectual property rights of others, it is your responsi‐bility to ensure that your use thereof complies with such licenses and/or rights.978-1-491-92424-2[LSI]

Table of ContentsIntroduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v1. Layered Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Pattern DescriptionKey ConceptsPattern ExampleConsiderationsPattern Analysis135782. Event-Driven Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Mediator TopologyBroker TopologyConsiderationsPattern Analysis111417183. Microkernel Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21Pattern DescriptionPattern ExamplesConsiderationsPattern Analysis212324254. Microservices Architecture Pattern. . . . . . . . . . . . . . . . . . . . . . . . . . . . 27Pattern DescriptionPattern TopologiesAvoid Dependencies and OrchestrationConsiderationsPattern Analysis2729323334iii

5. Space-Based Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37Pattern DescriptionPattern DynamicsConsiderationsPattern Analysis38394243A. Pattern Analysis Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45iv Table of Contents

IntroductionIt’s all too common for developers to start coding an applicationwithout a formal architecture in place. Without a clear and welldefined architecture, most developers and architects will resort tothe de facto standard traditional layered architecture pattern (alsocalled the n-tier architecture), creating implicit layers by separatingsource-code modules into packages. Unfortunately, what oftenresults from this practice is a collection of unorganized source-codemodules that lack clear roles, responsibilities, and relationships toone another. This is commonly referred to as the big ball of mudarchitecture anti-pattern.Applications lacking a formal architecture are generally tightly cou‐pled, brittle, difficult to change, and without a clear vision or direc‐tion. As a result, it is very difficult to determine the architecturalcharacteristics of the application without fully understanding theinner-workings of every component and module in the system.Basic questions about deployment and maintenance are hard toanswer: Does the architecture scale? What are the performancecharacteristics of the application? How easily does the applicationrespond to change? What are the deployment characteristics of theapplication? How responsive is the architecture?Architecture patterns help define the basic characteristics andbehavior of an application. For example, some architecture patternsnaturally lend themselves toward highly scalable applications,whereas other architecture patterns naturally lend themselvestoward applications that are highly agile. Knowing the characteris‐tics, strengths, and weaknesses of each architecture pattern is neces‐v

sary in order to choose the one that meets your specific businessneeds and goals.As an architect, you must always justify your architecture decisions,particularly when it comes to choosing a particular architecture pat‐tern or approach. The goal of this report is to give you enough infor‐mation to make and justify that decision.vi Introduction

CHAPTER 1Layered ArchitectureThe most common architecture pattern is the layered architecturepattern, otherwise known as the n-tier architecture pattern. Thispattern is the de facto standard for most Java EE applications andtherefore is widely known by most architects, designers, and devel‐opers. The layered architecture pattern closely matches the tradi‐tional IT communication and organizational structures found inmost companies, making it a natural choice for most business appli‐cation development efforts.Pattern DescriptionComponents within the layered architecture pattern are organizedinto horizontal layers, each layer performing a specific role withinthe application (e.g., presentation logic or business logic). Althoughthe layered architecture pattern does not specify the number andtypes of layers that must exist in the pattern, most layered architec‐tures consist of four standard layers: presentation, business, persis‐tence, and database (Figure 1-1). In some cases, the business layerand persistence layer are combined into a single business layer, par‐ticularly when the persistence logic (e.g., SQL or HSQL) is embed‐ded within the business layer components. Thus, smallerapplications may have only three layers, whereas larger and morecomplex business applications may contain five or more layers.Each layer of the layered architecture pattern has a specific role andresponsibility within the application. For example, a presentationlayer would be responsible for handling all user interface and1

browser communication logic, whereas a business layer would beresponsible for executing specific business rules associated with therequest. Each layer in the architecture forms an abstraction aroundthe work that needs to be done to satisfy a particular businessrequest. For example, the presentation layer doesn’t need to knowor worry about how to get customer data; it only needs to displaythat information on a screen in particular format. Similarly, thebusiness layer doesn’t need to be concerned about how to formatcustomer data for display on a screen or even where the customerdata is coming from; it only needs to get the data from the persis‐tence layer, perform business logic against the data (e.g., calculatevalues or aggregate data), and pass that information up to the pre‐sentation layer.Figure 1-1. Layered architecture patternOne of the powerful features of the layered architecture pattern isthe separation of concerns among components. Components withina specific layer deal only with logic that pertains to that layer. Forexample, components in the presentation layer deal only with pre‐sentation logic, whereas components residing in the business layerdeal only with business logic. This type of component classificationmakes it easy to build effective roles and responsibility models intoyour architecture, and also makes it easy to develop, test, govern,and maintain applications using this architecture pattern due towell-defined component interfaces and limited component scope.2 Chapter 1: Layered Architecture

Key ConceptsNotice in Figure 1-2 that each of the layers in the architecture ismarked as being closed. This is a very important concept in the lay‐ered architecture pattern. A closed layer means that as a requestmoves from layer to layer, it must go through the layer right below itto get to the next layer below that one. For example, a request origi‐nating from the presentation layer must first go through the busi‐ness layer and then to the persistence layer before finally hitting thedatabase layer.Figure 1-2. Closed layers and request accessSo why not allow the presentation layer direct access to either thepersistence layer or database layer? After all, direct database accessfrom the presentation layer is much faster than going through abunch of unnecessary layers just to retrieve or save database infor‐mation. The answer to this question lies in a key concept knownas layers of isolation.The layers of isolation concept means that changes made in onelayer of the architecture generally don’t impact or affect componentsin other layers: the change is isolated to the components within thatlayer, and possibly another associated layer (such as a persistencelayer containing SQL). If you allow the presentation layer directaccess to the persistence layer, then changes made to SQL within theKey Concepts 3

persistence layer would impact both the business layer and the pre‐sentation layer, thereby producing a very tightly coupled applicationwith lots of interdependencies between components. This type ofarchitecture then becomes very hard and expensive to change.The layers of isolation concept also means that each layer is inde‐pendent of the other layers, thereby having little or no knowledge ofthe inner workings of other layers in the architecture. To understandthe power and importance of this concept, consider a large refactor‐ing effort to convert the presentation framework from JSP (JavaServer Pages) to JSF (Java Server Faces). Assuming that the contracts(e.g., model) used between the presentation layer and the businesslayer remain the same, the business layer is not affected by the refac‐toring and remains completely independent of the type of userinterface framework used by the presentation layer.While closed layers facilitate layers of isolation and therefore helpisolate change within the architecture, there are times when it makessense for certain layers to be open. For example, suppose you wantto add a shared-services layer to an architecture containing com‐mon service components accessed by components within the busi‐ness layer (e.g., data and string utility classes or auditing and loggingclasses). Creating a services layer is usually a good idea in this casebecause architecturally it restricts access to the shared services to thebusiness layer (and not the presentation layer). Without a separatelayer, there is nothing architecturally that restricts the presentationlayer from accessing these common services, making it difficult togovern this access restriction.In this example, the new services layer would likely reside below thebusiness layer to indicate that components in this services layer arenot accessible from the presentation layer. However, this presents aproblem in that the business layer is now required to go through theservices layer to get to the persistence layer, which makes no sense atall. This is an age-old problem with the layered architecture, and issolved by creating open layers within the architecture.As illustrated in Figure 1-3, the services layer in this case is markedas open, meaning requests are allowed to bypass this open layer andgo directly to the layer below it. In the following example, since theservices layer is open, the business layer is now allowed to bypass itand go directly to the persistence layer, which makes perfect sense.4 Chapter 1: Layered Architecture

Figure 1-3. Open layers and request flowLeveraging the concept of open and closed layers helps define therelationship between architecture layers and request flows and alsoprovides designers and developers with the necessary information tounderstand the various layer access restrictions within the architec‐ture. Failure to document or properly communicate which layers inthe architecture are open and closed (and why) usually results intightly coupled and brittle architectures that are very difficult to test,maintain, and deploy.Pattern ExampleTo illustrate how the layered architecture works, consider a requestfrom a business user to retrieve customer information for a particu‐lar individual as illustrated in Figure 1-4. The black arrows showthe request flowing down to the database to retrieve the customerdata, and the red arrows show the response flowing back up to thescreen to display the data. In this example, the customer informa‐tion consists of both customer data and order data (orders placed bythe customer).Pattern Example 5

The customer screen is responsible for accepting the request and dis‐playing the customer information. It does not know where the datais, how it is retrieved, or how many database tables must be queriesto get the data. Once the customer screen receives a request to getcustomer information for a particular individual, it then forwardsthat request onto the customer delegate module. This module isresponsible for knowing which modules in the business layer canprocess that request and also how to get to that module and whatdata it needs (the contract). The customer object in the business layeris responsible for aggregating all of the information needed by thebusiness request (in this case to get customer information). Thismodule calls out to the customer dao (data access object) module inthe persistence layer to get customer data, and also the order daomodule to get order information. These modules in turn executeSQL statements to retrieve the corresponding data and pass it backup to the customer object in the business layer. Once the customerobject receives the data, it aggregates the data and passes that infor‐mation back up to the customer delegate, which then passes thatdata to the customer screen to be presented to the user.Figure 1-4. Layered architecture exampleFrom a technology perspective, there are literally dozens of waysthese modules can be implemented. For example, in the Java plat‐form, the customer screen can be a (JSF) Java Server Faces screen6 Chapter 1: Layered Architecture

coupled with the customer delegate as the managed bean compo‐nent. The customer object in the business layer can be a local Springbean or a remote EJB3 bean. The data access objects illustrated inthe previous example can be implemented as simple POJO’s (PlainOld Java Objects), MyBatis XML Mapper files, or even objectsencapsulating raw JDBC calls or Hibernate queries. From a Micro‐soft platform perspective, the customer screen can be an ASP (activeserver pages) module using the .NET framework to access C# mod‐ules in the business layer, with the customer and order data accessmodules implemented as ADO (ActiveX Data Objects).ConsiderationsThe layered architecture pattern is a solid general-purpose pattern,making it a good starting point for most applications, particularlywhen you are not sure what architecture pattern is best suited foryour application. However, there are a couple of things to considerfrom an architecture standpoint when choosing this pattern.The first thing to watch out for is what is known as the architecturesinkhole anti-pattern. This anti-pattern describes the situation whererequests flow through multiple layers of the architecture as simplepass-through processing with little or no logic performed withineach layer. For example, assume the presentation layer responds to arequest from the user to retrieve customer data. The presentationlayer passes the request to the business layer, which simply passesthe request to the persistence layer, which then makes a simple SQLcall to the database layer to retrieve the customer data. The data isthen passed all the way back up the stack with no additional pro‐cessing or logic to aggregate, calculate, or transform the data.Every layered architecture will have at least some scenarios that fallinto the architecture sinkhole anti-pattern. The key, however, is toanalyze the percentage of requests that fall into this category. The80-20 rule is usually a good practice to follow to determine whetheror not you are experiencing the architecture sinkhole anti-pattern. Itis typical to have around 20 percent of the requests as simple passthrough processing and 80 percent of the requests having somebusiness logic associated with the request. However, if you find thatthis ratio is reversed and a majority of your requests are simple passthrough processing, you might want to consider making some of theConsiderations 7

architecture layers open, keeping in mind that it will be more diffi‐cult to control change due to the lack of layer isolation.Another consideration with the layered architecture pattern is that ittends to lend itself toward monolithic applications, even if you splitthe presentation layer and business layers into separate deployableunits. While this may not be a concern for some applications, it doespose some potential issues in terms of deployment, general robust‐ness and reliability, performance, and scalability.Pattern AnalysisThe following table contains a rating and analysis of the commonarchitecture characteristics for the layered architecture pattern. Therating for each characteristic is based on the natural tendencyfor that characteristic as a capability based on a typical implementa‐tion of the pattern, as well as what the pattern is generally knownfor. For a side-by-side comparison of how this pattern relates toother patterns in this report, please refer to Appendix A at the endof this report.Overall agilityRating: LowAnalysis: Overall agility is the ability to respond quickly to aconstantly changing environment. While change can be isolatedthrough the layers of isolation feature of this pattern, it is stillcumbersome and time-consuming to make changes in thisarchitecture pattern because of the monolithic nature of mostimplementations as well as the tight coupling of componentsusually found with this pattern.Ease of deploymentRating: LowAnalysis: Depending on how you implement this pattern,deployment can become an issue, particularly for larger applica‐tions. One small change to a component can require aredeployment of the entire application (or a large portion of theapplication), resulting in deployments that need to be planned,scheduled, and executed during off-hours or on weekends.As such, this pattern does not easily lend itself toward a contin‐uous delivery pipeline, further reducing the overall rating fordeployment.8 Chapter 1: Layered Architecture

TestabilityRating: HighAnalysis: Because components belong to specific layers in thearchitecture, other layers can be mocked or stubbed, makingthis pattern is relatively easy to test. A developer can mock apresentation component or screen to isolate testing within abusiness component, as well as mock the business layer to testcertain screen functionality.PerformanceRating: LowAnalysis: While it is true some layered architectures can per‐form well, the pattern does not lend itself to high-performanceapplications due to the inefficiencies of having to go throughmultiple layers of the architecture to fulfill a business request.ScalabilityRating: LowAnalysis: Because of the trend toward tightly coupled and mon‐olithic implementations of this pattern, applications build usingthis architecture pattern are generally difficult to scale. You canscale a layered architecture by splitting the layers into separatephysical deployments or replicating the entire application intomultiple nodes, but overall the granularity is too broad, makingit expensive to scale.Ease

The most common architecture pattern is the layered architecture pattern, otherwise known as the n-tier architecture pattern. This pattern is the de facto standard for most Java EE applications and therefore is widely known by most architects, designers, and devel‐ opers. The layered architecture pattern closely matches the tradi‐

Related Documents:

Software Design and Development Conference 2015 Mark Richards Hands-on Software Architect Author of Enterprise Messaging Video Series (O’Reilly) Author of Java Message Service 2nd Edition (O’Reilly) Co-author of Software Architecture Fundamenta

LLinear Patterns: Representing Linear Functionsinear Patterns: Representing Linear Functions 1. What patterns do you see in this train? Describe as What patterns do you see in this train? Describe as mmany patterns as you can find.any patterns as you can find. 1. Use these patterns to create the next two figures in Use these patterns to .

Greatest advantage of patterns: allows easy CHANGEof applications (the secret word in all applications is "CHANGE"). 3 Different technologies have their own patterns: GUI patterns, Servlet patterns, etc. (c) Paul Fodor & O'Reilly Media Common Design Patterns 4 Factory Singleton Builder Prototype Decorator Adapter Facade Flyweight Bridge

1. Transport messages Channel Patterns 3. Route the message to Routing Patterns 2. Design messages Message Patterns the proper destination 4. Transform the message Transformation Patterns to the required format 5. Produce and consume Endpoint Patterns Application messages 6. Manage and Test the St Management Patterns System

Contents 1 Software Architecture 2 Architectural Styles Layered Architecture 3 Design Patterns GoF Design Patterns Enterprise Design Patterns Other Useful Patterns 4 Spring Web Application Architecture 5 Conclusions Martin Ledvinka (martin.ledvinka@fel.cvut.cz) Application

Basic Concepts Software Architecture Lecture 3 2 Software Architecture Foundations, Theory, and Practice What is Software Architecture? Definition: A software system’s architecture is the set of principal design decisions about the system Software architecture is the blu

Distributed Systems Stream Groups Local Patterns Global Patterns Figure 1: Distributed data mining architecture. local patterns (details in section 5). 3) From the global patterns, each autonomous system further refines/verifies their local patterns. There are two main options on where the global patterns are computed. First, all local patterns

Introduction, Description Logics Petr K remen petr.kremen@fel.cvut.cz October 5, 2015 Petr K remen petr.kremen@fel.cvut.cz Introduction, Description Logics October 5, 2015 1 / 118. Our plan 1 Course Information 2 Towards Description Logics 3 Logics 4 Semantic Networks and Frames 5 Towards Description Logics 6 ALCLanguage Petr K remen petr.kremen@fel.cvut.cz Introduction, Description Logics .