StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Classification of Design Patterns - Assignment Example

Cite this document
Summary
The paper "Classification of Design Patterns" outlines that in the system that is being created, there will be the creation and the use of design patterns. With the need to have a web-based information system, there will be the use of design patterns when undertaking the project. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
Classification of Design Patterns
Read Text Preview

Extract of sample "Classification of Design Patterns"

?Design patterns Number: Lecturer: In the system that is being created, there will be the creation and the use of design patterns. With the need to have a web-based information system, there will be the use of design patterns when undertaking the project. Because there are various objects that will be involved in the new Alpha Numeric Data Company (ANDC) system. The reason for this is that there will be various objects and the working of these objects will be behind the scenes. This paper will focus on the design patterns that will be used in ANDC. Name of design pattern: Data access object Classification: Design Problem: The problem that will be got is that the users will be exposed to complex working and operation of the program. This should not be the case as the users should only access simple interface without any much complications of the system. Solution: The solution that will be applied in the system is the use of DAO pattern. In the system, the use cases who will be involved include making an online purchase, making an online inquiry, and making payment. The use case diagram below show the use cases which will need the use of this design pattern in our case. Consequences The first design pattern that will be used is that of the data access object. Data access object is a design pattern that is used to hide the complexity of the program for the user. Users are not supposed to get the details of how the program has been developed. This is where the data access object comes in. The DAO helps data access mechanisms to be able to change without depending on the code that makes use of the data. It is tasked with the management of the connection to the source of data in order to get or retrieve the data. This design pattern helps users to access what they are supposed to access. Real world example: There are applications that are used in the world today that make use of DAO. An example is Facebook which makes use of this design pattern to hide the working of the system in the background and present the users with a simple interface. Design pattern: Dispatcher pattern Classification: Design Problem: There is a problem when passing messages in a hierarchical model of software architectures that are found in the world today. There is a need to have a communication between the objects that are found in the same tier. Solution: The use of dispatcher pattern helps to send communication messages between objects which are found in the same tier. In the ANDC system, there will be the use of the same use cases like that of DAO. Consequences The dispatcher is a design pattern that is used to give the requests of the client to the proper party object that is found on the same level of tiers. The client requests are essential issues that come into play when designing the user interface and large programs. It is important to take care of requests from the client. Both data access object and dispatcher are two design patterns that deal with the users. They are design patterns that concern how the data and users will interact with the system. The difference between these two design patterns is that data access pattern is concerned with users and data. It is more concerned with the integrity of the data. This is unlike dispatcher which is tasked with how requests are handled. It is, therefore, more oriented to the user than the data or how the program operates (Papp 2001). Design pattern: Factory design pattern Classification: Design Problem: There is a problem of having the same collection of objects that can be instantiated together. There is a need to have a collection of these objects so that they can be instantiated together. Solution The solution to this problem is that similar objects will be collected and instantiated together. A design pattern that will undertake this process was designed. The actors that will be involved in the design include the customer, ANDC staff, and administrators. There are common tasks that will be undertaken by these groups. The diagram will include all the actors and use cases who will be involved in the process: Consequences: The third design pattern that will be used in this information system for ANDC is that of the factory design pattern. This design pattern is focused on creating a group of objects which are related due to instantiation. The objects are related a because of subclasses which are related. Compared with the data access object, they are both design patterns that are concerned with how objects relate to other objects, data access objects with the data and factory with the subclasses. The difference between these two design patterns is that the factory design pattern is tasked with subclasses and how they are related to the classes. On the other hand, data access patterns are tasked with how users will access the programming complexity. Dispatcher design pattern is tasked with ensuring that the requests of the users get access to the right tier. It is therefore tasked with the requests (Trauth & Howcroft 2005). Other design patterns which will be involved in the design process include: The model design pattern is tasked with models and the states of the functions. It shows how states are modeled and the functions that these models have. It is comparable to factory model. This is because this model shows the functions and how these functions are related and connected in the system. The factory design pattern is tasked with classes and they are related to the subclasses in that system. It is important to note that the two design patterns deal with how the system work. It is similar to DAO in that they are both concerned with the internal workings of the system. This not the case with many applications. The fifth pattern is view pattern. This design pattern was created so that the presentation layer can be analyzed and assessed. This is the same us data access object. This is because they are both concerned with how data are handled. The difference that comes with the use of this pattern is that it does not handle the data and the internal architecture of the system per se, but rather shows how they are presented. There is nothing major that is changed in this model. References Papp, R 2001, Strategic information technology: Opportunities for competitive advantage, Idea Group Inc., Pennsylvania. Trauth, EM & Howcroft, D 2005, Handbook of Critical information systems research, Edward Elgar. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Project Assignment week 5 Example | Topics and Well Written Essays - 1000 words”, n.d.)
Project Assignment week 5 Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1464871-project-assignment-week
(Project Assignment Week 5 Example | Topics and Well Written Essays - 1000 Words)
Project Assignment Week 5 Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1464871-project-assignment-week.
“Project Assignment Week 5 Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1464871-project-assignment-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF Classification of Design Patterns

Classification and Assessment of Abnormal Behavior

ognitive Model “emphasizes the role of thinking and information processing in mental disorders; attempts to find causal links between thought patterns and mental illnesses” (Models of Mental Illness, n.... Cognitive Model “emphasizes the role of thinking and information processing in mental disorders; attempts to find causal links between thought patterns and mental illnesses” (Models of Mental Illness, n.... The weaknesses are tendencies for shallow interventions and possibilities of manipulating variables in the design....
3 Pages (750 words) Essay

Software Design Defects Detection and Classification

This review ''Software design Defects Detection and Classification'' focuses on the design of software and the relation to the overall product.... Generally, it ties software quality management to the success of the software process and classifies the software design defects that stem from poor design of software.... On a detailed elucidation of quality, software design defects come into the picture.... Given the software process as earlier mentioned morphs the information from one form to another, errors are likely to occur in any of the forms (user needs, design, code etc....
8 Pages (2000 words) Literature review

Literature Review: The Use of Patterns in Architecture

The authors proposed that the classification of architectural patterns can be done through consideration of architectural views.... An essay "Literature Review: The Use of patterns in Architecture" claims that architecture patterns seek to bring forth usable ideas through which people and communities can follow in the construction of their buildings.... The use of patterns in architecture represents the view of using archetypal and reusable descriptions as representations of architectural design ideas....
8 Pages (2000 words) Essay

Design Patterns - Behavioral, Creational, Structural

There are several classifications of design patterns - this essay focus on three designs, including memento for behavioral patterns, singleton for creational patterns and lastly facade for structural patterns.... design patterns ITEC N452: Advanced Object Oriented Analysis & Design University name 3rd June 2013 Contents Introduction 3 Memento Pattern 3 Benefits and drawbacks 4 Singleton pattern 4 Benefits and drawbacks 4 Facade Pattern 5 Benefits and drawbacks 5 References 7 Introduction In software engineering, a design pattern represents a re-usable solution to a recurrent problem for a certain context....
3 Pages (750 words) Research Paper

Developing a Website

Ian Graham's, the father of WU (Web Usability) language (Wu patterns, A pattern language for web usability www.... Adding DetailsThis section shows the more abstract patterns employed to provide details on making the site more user-friendly and smart.... o;jsessionid=aiTqxc1VL2X5 ), depicts these patterns.... This language followed the pattern of establishing the use case (79 patterns in all), and follow the links.... The 79 patterns were categorized into 4 sections: ...
4 Pages (1000 words) Assignment

Future of Business Intelligence, Data Classification and Prediction

Finding patterns in data is a common way of analysis.... Scientists want to discover the pattern and use the patterns for developing theories that can be extended beyond the concerned data in allied fields.... Data mining is using the existing data to solve problems and discovering patterns in data.... The paper "Future of Business Intelligence, Data classification and Prediction" highlights that information overload is as damaging as lack of it as too much information may lead to action paralysis....
8 Pages (2000 words) Coursework

Software Design Defects Detection and Classification

he main objective of this paper is to analyse the design defects of software design and the classification of these.... This paper ''Software design Defects Detection and Classification'' is about the focus in the practices of software management adopted to counter software defects and detect the defects.... Most importantly, the main idea is using established processes to catch the software design defects.... On a detailed elucidation of quality, software design defects come into the picture....
10 Pages (2500 words) Research Paper

Issues and Solutions Utilizing an Information Classification Schema

In this paper "Issues and Solutions Utilizing an Information classification Schema", the author is an Information Security Manager tasked with reporting and researching on the protection of the product development information now and in the future.... Conducting research to find out an appropriate outline to solve a specific problem utilizing an information scheme is challenging due to the lack of a scientific classification scheme for a security outline.... An appropriate classification scheme assists in the retrieval of information and efficient storage, which is an added advantage for both outline navigators and program pattern miners....
12 Pages (3000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us