Web Application Design Chapter 14 Randy Connolly and

Web Application Design Chapter 14 Randy Connolly and

Web Application Design Chapter 14 Randy Connolly and Ricardo Hoar Fundamentals of Web Development

Textbook to be published by Pearson Ed2015 in early Pearson 2014 http://www.funwebdev.com Objectives

1 3 5 7 Real World Web Software Design

Design Patterns in Web Context Presentation Patterns 2 4

Principle of Layering Data and Domain Patterns Section 1 of 5

REAL WORLD WEB SOFTWARE DESIGN Real-World Software Design Software design can mean many things. In general, it is used to refer to the planning activity that happens between gathering requirements and actually writing code.

This chapter has an overview of some of the typical approaches used in the software design of web applications Challenges In designing real-world applications it is quite possible to create complex web applications

with little to no class design. The page-oriented development approach sees each page contain most of the programming code it needs to perform its operations. For sites with few pages and few requirements, such an approach is quite acceptable. Challenges

In designing real-world applications Real software projects are notoriously vulnerable to shifting requirements; web projects are probably even more so. New features will be added and other features will be dropped. The data model and its storage requirements will

change. The execution environment will change from the developers laptops to a testing server, a production server, or perhaps a farm of web servers Section 2 of 5 PRINCIPLE OF LAYERING

Challenges In designing real-world applications It is in this type of web development environment that rapid ad-hoc design practices may cause more harm than benefit, Rapidly thought-out systems are rarely able to handle

unforeseen changes in an elegant way. For these reasons, many web developers make use of a variety of software design principles and patterns Layering Break apart a complicated system A layer is simply a group of classes that are

functionally or logically related; that is, it is a conceptual grouping of classes. Each layer in an application should demonstrate cohesion (how much they belong together) The goal of layering is to distribute the functionality of your software among classes so that the coupling of a given class to other classes is minimized.

A dependency is a relationship between two elements where a change in one affects the other. Layering See the relationships The fact that some are higher than others means something

Tiers A tier refers to a processing boundary Not to be mixed up with layering Layers

Benefits The application should be more maintainable and adaptable to change since the overall coupling in the application has been lowered When an application has a reliable and clearly specified application architecture, much of the pages processing will move from the page to the

classes within the layers. A given layer may be reusable in other applications, especially if it is designed with reuse in mind Layers Disadvantages The numerous layers of abstraction can make the

resulting code hard to understand at first the extra levels of abstraction might incur a small performance penalty at run time Common Layering Schemes Principle Software Layers

Presentation Principally concerned with the display of information to the user, as well as interacting with the user. Domain/Business The main logic of the application. Some developers call this the business layer since it is modeling the rules and processes of the business for which the application is being written. Data Access Communicates with the data sources

used by the application. Often a database, but could be web services, text files, or email systems. Sometimes called the technical services layer. Two Layer Model A Common Layering Scheme Two Layer Model

A Common Layering Scheme The advantage of the two-layer model is that it is relatively easy to understand and implement. In a two-layer model, each table typically will have a matching class responsible for CRUD (create, retrieve, update, and delete) functionality for that table. The drawbacks of the two-layer model is its hard to

implement business rules and processes. ** I envision that well be using this for our projects. If there is some business rules we can implement case-by-case Business Rules What are they?

A business rule refers not only to the usual user-input validation and the more complex rules for data that are specific to an organizations methods for conducting its business. Do they belong within the PHP of the order form? Do they belong instead in the data access layer? (implemented in the database or sql call)

Business Rules Where do they go? Case where they sell works of art Business Rules

Add another layer Business Rules In the middle layer Classes within the middle layer of a three-layer model as business objects; Also entities or domain objects.

Regardless of what they are called, business objects represent both the data and behavior of objects that correspond to the conceptual domain of the business. Business Layer The middle layer Business Layer

An example complex layer Remind you of actually shopping? Section 3 of 5

DESIGN PATTERNS IN THE WEB CONTEXT Software Design Patterns Same old problem What are design patterns? Over time as programmers repeatedly solved whole classes of problems, consensus on best practices

emerged for how to design software systems to solve particular problems. These best practices were generalized into reusable solutions that could be adapted to many different software projects. They are commonly called design patterns, and they are useful tools in the developers toolbox.

Software Design Patterns Will not solve all your problems, but they will help you design better code if used thoughtfully. It is a clear and concise way to describe algorithms/code The most common design patterns are those that were identified and named in the classic 1995 book Design Patterns: Elements of Reusable Object-Oriented

Software Adapter Pattern The Adapter pattern is used to convert the interface of a set of classes that we need to use to a different but preferred interface. The Adapter pattern is frequently used in web projects as a way to make use of a database API (such as PDO

or mysqli) without coupling the pages over and over to that database API. PDO PHP Data Objects mysqli mysql improved Adapter Pattern Adapter Pattern

Below, a legacy Rectangle component's display() method expects to receive "x, y, w, h" parameters. But the client wants to pass "upper left x and y" and "lower right x and y". This incongruity can be reconciled by adding an additional level of indirection i.e. an Adapter object. http://sourcemaking.com/design_patterns/adapter Adapter Pattern

UML Diagram For the database adapter Adapter Pattern Interface for adaptor

Adapter Pattern Concrete Classes (partial implementation) Adapter Pattern Concrete Classes (partial implementation) Any client classes (or pages) that needs to make use of the database will do so via the concrete adapter:

$connect = array(DBCONNECTION, DBUSER, DBPASS); $adapter = new DatabaseAdapterPDO($connect); $sql = 'SELECT * FROM ArtWorks WHERE ArtWorkId=?'; $results = $adapter->runQuery($sql, array(5)); This code sample contains a dependency via the explicit instantiation of the DatabaseAdapterPDO class. If you at some point switch to a different adapter, you will need to change every

instantiation to the appropriate concrete adapter. Simple Factory Addresses the dependency of Adaptor A factory is a special class that is responsible for the creation of subclasses, so that clients are not coupled to specific subclasses or implementations.

Since PHP is a late-binding language (type at run time), you can create a factory class that avoids conditional logic by dynamically specifying at run time the specific class name to instantiate $adapter = DatabaseAdapterFactory::create('PDO', $connectionValues); $results = $adapter->runQuery('SELECT * FROM Artists'); Simple Factory

Addresses the dependency of Adaptor Template Method Pattern In the Template Method pattern, one defines an algorithm in an abstract superclass and defers the algorithm steps that can vary to the subclasses. Like a shell with starter functions/classes

Game example Template Method Pattern Template Method Pattern Abstract Superclass Template Method Pattern

Example Subclasses Dependency Injection reduce the number of dependencies its purpose is to reduce the number of dependencies within a class, injecting potential dependencies into a class rather than hardcoding them.

Configures from the outside vs. inside. Pass the needed dependencies into the constructor Consider the TableDataGateway class The class needs an object that implements the DatabaseAdapterInterface in order to perform queries. One approach would be to provide a private data member in the TableDataGateway and instantiate the object in the constructor:

Dependency Injection Example $connect = array(DBCONNECTION, DBUSER, DBPASS); $dbAdapter = DatabaseAdapterFactory::create(ADAPTERTYPE,$connect); $gate = new ArtistTableGateway($dbAdapter);

Section 4 of 5 DATA AND DOMAIN PATTERNS Enterprise Patterns Enterprise patterns - provide best practices for the common type of big-picture architectural problems

Table Data Gateway Pattern Data access Object A gateway is simply an object that encapsulates access to some external resource. Thus a table data gateway provides CRUD access to a database table (or perhaps joined tables).

Table Data Gateway Pattern In UML Domain Model Pattern In the Domain Model pattern , the developer implements an object model:

A variety of related classes that represent objects in the problem domain of the application. The classes within a domain model will have both data and behavior Natural location for implementing business rules. It can add precision and focus to discussion Similar to database schema

Getters and Setters In Domain Objects Creating the properties along with their getters and setters for all the domain objects in a model can be very tedious. PHP does provide its own type of shortcut via the __get() and __set() magic methods The __get() method is called when a client of a class tries to

access a property that is not accessible. Magic occurs with the idea of Variable variables that PHP allows $this-> is used to refer to an instance of an object inside on of the object's methods. Getters and Setters Magic

We could replace all of the property getters in the next slide with the following magic method: public function __get($name) { if ( isset($this->$name) ) { return $this->$name; } return null; }

Variable Variables Magic Indeed For instance if $name contains the string 'yearOfBirth'

then $this->$name == $this->yearOfBirth. __Set() Example usage

Example Example Domain Model Example Example Domain Class Domain Object and Gateway

Retrieving and Saving Active Record Pattern Interface with the database You may be wondering what class would have the responsibility of populating the domain objects from the database data or of writing the data within the

domain object back out to the database. Keep in mind the idea of the Activation Record in general programming, the temporary area in RAM. It seems this relates to that but with full database data and methods. Active Record Pattern Interface with the database

Active Record Pattern Retrieving and Saving Section 5 of 5 PRESENTATION PATTERNS

Model View Controller MVC The Model-View-Controller (MVC) pattern actually predates the whole pattern movement. The model represents the data of the application The view represents the display aspects of the user interface.

The controller acts as the brains of the application and coordinates activities between the view and the model. Describes a way to structure an application, its responsibilities and interactions for each part How about the WWW ? Model View Controller

for Web Model View Controller example Advantages: Separate presentation and application logic

On-line book store Model View Controller MVC split between client and browser Model View Controller MVC split between client and browser (illustrated response)

Front Controller Pattern The Front Controller pattern consolidates all request handling into a single-handler class. The rationale for the front controller is that in more complex websites every request requires similar types of processing. One approach to this standardized behavior is to provide this functionality to each page via common include files.

A more object-oriented approach is to use a front controller, in which one (or a small number) script or class is responsible for handling every incoming request and then delegating the rest of the handling to the appropriate handler. Front Controller Pattern

What Youve Learned 1 3 5 7 Real World Web

Software Design Design Patterns in Web Context Presentation Patterns 2 4

Principle of Layering Data and Domain Patterns

Recently Viewed Presentations

  • dbserc.pitt.edu


    Vesicle matching to the target organelle. Table 13-1 . Molecular Biology of the Cell (© Garland Science 2008) ... Paper trail. Peer-review. System that helps with hierarchical organization (priorities and relations) of knowledge. Is mindmapping the solution?
  • Exodus 2-10 - Brigham Young University-Idaho

    Exodus 2-10 - Brigham Young University-Idaho

    Exodus 2-10. Moses was a pure descendant of Levi through his father, Amram and his mother Jochebed. Moses was trained as a youth. God does not leave us alone. Stephen (in the New Testament) related, "And Moses was learned in...
  • Presenting: The Harlem Renaissance

    Presenting: The Harlem Renaissance

    Poets and other authors included: Langston Hughes, James Weldon Johnson, Nella Larsen, and Zora Neale Hurston Also, black entertainers such as Paul Robeson and Josephine Baker became well-known Painters such as William H. Johnson and Lois Mailou Jones became famous...


    The process of learning works better if it is problem-based and collaborative rather than didactic, and emphasises equality between the teacher and learner. Knowles identified the six key principles of adult learning outlined below: Adults need to know why, what...
  • Ethical Considerations in The Treatment of Child Trauma

    Ethical Considerations in The Treatment of Child Trauma

    KC is a 13 year old female who was raped by an older male. KC's case was a statutory rape case. KC also reported molestation as a child. KC was removed from mother's home and placed with father. KC's treatment...
  • AML with myelodysplasia-related changes Case 374

    AML with myelodysplasia-related changes Case 374

    Definition of CK not entirely standard: most consider >3 abnormalities and a few consider >5 abnormalities. Monosomal karyotype = two autosomal monosomies, or one autosomal monosomy associated with at least one structural abnormality. Most AMLs that fulfill criteria for CK...
  • Managing Raw Material Risks - Supply chain

    Managing Raw Material Risks - Supply chain

    Managing Sourcing Risks Dirk De Waart Management Consultants Where Innovation Operates * * * * * * * * * Agenda PRTM Introduction Supply Chain Risk A New Model For Managing Sourcing Risks Case Study PRTM Introduction Our Focus: Defining...
  • IBM IOD 2010 - Michigan DB2 Users Group -- Home Page

    IBM IOD 2010 - Michigan DB2 Users Group -- Home Page

    DBAs/App DBAs, DB2 system administrators, and technical management Contact your IBM sales rep for more details and to schedule * Best practice tip for DB2 utilities: the DB2 Utilities Solution Pack During DB2 utilities sort processing, reduce CPU usage and...