Data Access Patterns: Database Interactions in Object-Oriented Applications (Software Patterns Series)
by Clifton Nock25 proven patterns for improving data access and application performance Efficient, high-quality data access code is crucial to the performance and usability of virtually any enterprise application--and there's no better way to improve an existing system than to optimize its data access code. Regardless of database engine, platform, language, or application,… See more details below
Overview
25 proven patterns for improving data access and application performance Efficient, high-quality data access code is crucial to the performance and usability of virtually any enterprise application--and there's no better way to improve an existing system than to optimize its data access code. Regardless of database engine, platform, language, or application, developers repeatedly encounter the same relational database access challenges. In Data Access Patterns, Clifton Nock identifies 25 proven solutions, presenting each one in the form of a clear, easy-to-use pattern.
These patterns solve an exceptionally wide range of problems including creating efficient database-independent applications, hiding obscure database semantics from users, speeding database resource initialization, simplifying development and maintenance, improving support for concurrency and transactions, and eliminating data access bottlenecks.
Every pattern is illustrated with fully commented Java/JDBC code examples, as well as UML diagrams representing interfaces, classes, and relationships. The patterns are organized into five categories:
- Decoupling Patterns: Build cleaner, more reliable systems by decoupling data access code from other application logic
- Resource Patterns: Manage relational database resources more efficiently
- Input/Output Patterns: Simplify I/O operations by translating consistently between "physical" relational data and domain object representations of that data
- Cache Patterns: Use caching strategically, to optimize the tradeoffs between data access optimization and cache overhead
- Concurrency Patterns: Implement concurrency and transactions more effectively and reliably
Data Access Patterns demystifies techniques that have traditionally been used only in the most robust data access solutions--making those techniques practical for every software developer, architect, and designer.
Product Details
- ISBN-13:
- 9780131401570
- Publisher:
- Addison-Wesley
- Publication date:
- 09/15/2003
- Series:
- Software Patterns Series
- Edition description:
- New Edition
- Pages:
- 469
- Product dimensions:
- 7.12(w) x 9.62(h) x 1.22(d)
Table of Contents
Preface | ||
Acknowledgments | ||
Introduction | ||
Pt. 1 | Decoupling Patterns | 1 |
Data Accessor | 9 | |
Active Domain Object | 33 | |
Object/Relational Map | 53 | |
Layers | 75 | |
Pt. 2 | Resource Patterns | 95 |
Resource Decorator | 103 | |
Resource Pool | 117 | |
Resource Timer | 137 | |
Resource Descriptor | 159 | |
Retryer | 171 | |
Pt. 3 | Input and Output Patterns | 185 |
Selection Factory | 191 | |
Domain Object Factory | 203 | |
Update Factory | 215 | |
Domain Object Assembler | 227 | |
Paging Iterator | 253 | |
Pt. 4 | Cache Patterns | 267 |
Cache Accessor | 271 | |
Demand Cache | 281 | |
Primed Cache | 291 | |
Cache Search Sequence | 305 | |
Cache Collector | 325 | |
Cache Replicator | 345 | |
Cache Statistics | 361 | |
Pt. 5 | Concurrency Patterns | 371 |
Transaction | 379 | |
Optimistic Lock | 395 | |
Pessimistic Lock | 405 | |
Compensating Transaction | 417 | |
Afterword | 431 | |
Glossary | 433 | |
Bibliography | 441 | |
Index | 445 |
Customer Reviews
Average Review: