A Study of Patterns in an ATC System

Total Page:16

File Type:pdf, Size:1020Kb

A Study of Patterns in an ATC System Department of Mathematics, Statistics and Computer Science Reports from MASDA - Rapporter från MASDA A Study of Patterns in an ATC System Mattias Blåman Robert Pratz Aug MASDA Report 9984 1999 Växjö University ISSN 1400-1942 S-351 95 VÄXJÖ ISRN VXU/MASDA/DA/E/--9984--SE Abstract The differences between an experienced software developer and a novice are knowledge and experience. There has always been a need for an effective way of passing along the knowledge and experiences of senior software developers to novices. A remedy to this problem lies in the use of patterns. Patterns help software developers build systems on the collective experience of expert software developers. Patterns encapsulate well-proven design solutions in software development in a reusable way and help to promote good design practice. Patterns distill and provide a means to reuse the design knowledge gained by experienced software developers. The importance and extent of software in defense systems constantly increases. FMV, the Swedish Defense Material Administration, has an interest in decreasing the costs of software system development and saving time and money. An attempt to achieve this is to introduce the use of patterns in the associated software development organizations. As an initial step in this project, FMV is examining a number of existing defense systems developed by different suppliers. One of these suppliers is Enator Telub AB in Växjö, which has developed the ATC (Air Traffic Control) system SIGMA/AMP. In this master thesis, we examine the SIGMA/AMP system to investigate whether patterns have been used during the development work or not. We will also discuss whether or not patterns are really useful in passing along knowledge and experience from one person to another. Preface During the spring and fall academic terms of 1999 we have conducted a thorough investigation of the formal topic of software patterns and then we have turned that knowledge to practical use by investigating the exact usage of patterns in a major software system development effort. We have mainly examined patterns on two different levels of abstraction; design and architecture. The outcome of this work has resulted in this computer science master thesis. Our target using organization was the Swedish Defense Material Administration and the assignment was conducted at Enator Telub AB in Växjö, Sweden. We would especially like to thank our tutor Per Christensen at Telub who has supported us the whole way. We would also like to thank Göran Henningsson at Telub and Torbjörn Svärd at Södra Skogsägarna in Växjö who were part of the original development team and who aided us in our interviews. Finally, we thank Ulf Cederling who has been our tutor at Växjö University and has commented on, and made useful suggestions about, the contents of this thesis. Växjö 06-08-99 Mattias Blåman Robert Pratz ã 1999 Mattias Blåman & Robert Pratz 1. Introduction ............................................................. 4 1.1 Background .......................................................................4 1.2 Problem ............................................................................4 1.3 Purpose.............................................................................4 1.4 Expectations ......................................................................5 1.5 Limitations ........................................................................5 1.6 Method .............................................................................5 2. Method .................................................................... 6 2.1 Philosophy of Science..........................................................6 2.1.1 Positivism .....................................................................6 2.1.2 Hermeneutics................................................................7 2.1.3 Phenomenology .............................................................7 2.2 Qualitative and Quantitative Methods....................................8 2.3 Data Collection Methods ......................................................8 2.3.1 Case Studies .................................................................9 2.3.2 Observations.................................................................9 2.3.3 Interviews ....................................................................9 2.3.4 Literature Studies ..........................................................9 2.4 Reliability and Validity....................................................... 10 2.5 Conclusions ..................................................................... 10 3. Introduction to Patterns ............................................12 3.1 Patterns Overview ............................................................ 12 3.2 What Patterns do.............................................................. 14 3.3 What patterns consist of.................................................... 15 3.4 Architectural Patterns ....................................................... 15 3.5 Design Patterns................................................................ 16 3.6 Implementation Patterns ................................................... 16 3.7 Differences between Architectural, Design, and Implementation patterns ................................................................................. 17 4. Architectural and Design Patterns ..............................18 4.1 Architectural Patterns ....................................................... 18 4.2 From Mud to Structure Patterns ......................................... 19 4.3 Distributed Systems Patterns ............................................. 19 4.4 Interactive Systems Patterns ............................................. 20 4.5 Adaptable Systems Patterns .............................................. 20 4.6 The Model-View-Controller Pattern ..................................... 20 4.6.1 MVC ........................................................................... 21 4.6.2 Problem...................................................................... 21 4.6.3 Solution...................................................................... 21 4.6.4 Consequences ............................................................. 22 4.7 Design Patterns................................................................ 24 4.8 Creational Patterns ........................................................... 25 4.9 Structural Patterns............................................................. 26 4.10 Behavioral Patterns .......................................................... 26 1 4.11 Design Pattern Description Models...................................... 26 4.12 Comparison between Description Models ............................. 28 4.13 The Singleton Pattern ....................................................... 28 4.13.1Intent......................................................................... 29 4.13.2Motivation................................................................... 29 4.13.3Applicability ................................................................ 29 4.13.4Structure .................................................................... 29 4.13.5Participants................................................................. 29 4.13.6Collaborations ............................................................. 30 4.13.7Consequences ............................................................. 30 4.13.8Implementation ........................................................... 30 4.13.9Known Uses ................................................................ 32 4.13.10 Related Patterns........................................................ 32 5. The SIGMA System ..................................................33 5.1 SIGMA Versions ............................................................... 33 5.2 SIGMA Product Platform .................................................... 34 5.3 The SIGMA/AMP Server..................................................... 36 5.4 The SIGMA/AMP Clients..................................................... 37 5.5 SIGMA Client Architecture ................................................. 38 6. Problems and Solutions in the SIGMA/AMP Client .........40 6.1 The Configuration Problem ................................................ 40 6.2 The Solution of the Configuration Problem ........................... 41 6.2.1 BasePage Functionality ................................................. 41 6.2.2 BaseSheet Functionality................................................ 42 6.2.3 BaseView Functionality ................................................. 42 6.2.4 BaseDocument Functionality ......................................... 42 6.3 Client Object Model........................................................... 42 7. Patterns in the SIGMA/AMP System............................45 7.1 Design Structures in the SIGMA/AMP Client ......................... 45 7.2 The Observer Pattern........................................................ 46 7.2.1 Area of Application....................................................... 47 7.2.2 Consequences ............................................................. 47 7.2.3 Structure .................................................................... 48 7.3 The Chain-of-Responsibility Pattern .................................... 48 7.3.1 Area of Application....................................................... 49 7.3.2 Consequences ............................................................
Recommended publications
  • Acceptor-Connector an Object Creational Pattern for Connecting and Initializing Communication Services
    Acceptor-Connector An Object Creational Pattern for Connecting and Initializing Communication Services Douglas C. Schmidt [email protected] Department of Computer Science Washington University St. Louis, MO 63130, USA An earlier version of this paper appeared in a chapter in TRACKING the book Pattern Languages of Program Design 3, edited SATELLITES STATION by Robert Martin, Frank Buschmann, and Dirke Riehle pub- PEERS lished by Addison-Wesley, 1997. 1Intent STATUS INFO The Acceptor-Connector design pattern decouples connec- WIDE AREA NETWORK tion establishment and service initialization in a distributed COMMANDS BULK DATA system from the processing performed once a service is ini- TRANSFER tialized. This decoupling is achieved with three compo- nents: acceptors, connectors,andservice handlers. A con- GATEWAY nector actively establishes a connection with a remote ac- ceptor component and initializes a service handler to pro- cess data exchanged on the connection. Likewise, an ac- LOCAL AREA NETWORK ceptor passively waits for connection requests from remote GROUND connectors, establishing a connection upon arrival of such a STATION PEERS request, and initializing a service handler to process data ex- changed on the connection. The initialized service handlers Figure 1: The Physical Architecture of a Connection- then perform application-specific processing and communi- oriented Application-level Gateway cate via the connection established by the connector and ac- ceptor components. The Gateway transmits data between its Peers using the connection-oriented TCP/IP protocol [1]. In our exam- 2 Example ple network configuration, each service is bound to a con- nection endpoint designated by an IP host address and a TCP To illustrate the Acceptor-Connector pattern, consider the port number.
    [Show full text]
  • Design Pattern Interview Questions
    DDEESSIIGGNN PPAATTTTEERRNN -- IINNTTEERRVVIIEEWW QQUUEESSTTIIOONNSS http://www.tutorialspoint.com/design_pattern/design_pattern_interview_questions.htm Copyright © tutorialspoint.com Dear readers, these Design Pattern Interview Questions have been designed specially to get you acquainted with the nature of questions you may encounter during your interview for the subject of Design Pattern. As per my experience good interviewers hardly plan to ask any particular question during your interview, normally questions start with some basic concept of the subject and later they continue based on further discussion and what you answer: What are Design Patterns? Design patterns represent the best practices used by experienced object-oriented software developers. Design patterns are solutions to general problems that software developers faced during software development. These solutions were obtained by trial and error by numerous software developers over quite a substantial period of time. What is Gang of Four GOF? In 1994, four authors Erich Gamma, Richard Helm, Ralph Johnson and John Vlissides published a book titled Design Patterns - Elements of Reusable Object-Oriented Software which initiated the concept of Design Pattern in Software development. These authors are collectively known as Gang of Four GOF. Name types of Design Patterns? Design patterns can be classified in three categories: Creational, Structural and Behavioral patterns. Creational Patterns - These design patterns provide a way to create objects while hiding the creation logic, rather than instantiating objects directly using new opreator. This gives program more flexibility in deciding which objects need to be created for a given use case. Structural Patterns - These design patterns concern class and object composition. Concept of inheritance is used to compose interfaces and define ways to compose objects to obtain new functionalities.
    [Show full text]
  • Learning Javascript Design Patterns
    Learning JavaScript Design Patterns Addy Osmani Beijing • Cambridge • Farnham • Köln • Sebastopol • Tokyo Learning JavaScript Design Patterns by Addy Osmani Copyright © 2012 Addy Osmani. All rights reserved. Revision History for the : 2012-05-01 Early release revision 1 See http://oreilly.com/catalog/errata.csp?isbn=9781449331818 for release details. ISBN: 978-1-449-33181-8 1335906805 Table of Contents Preface ..................................................................... ix 1. Introduction ........................................................... 1 2. What is a Pattern? ...................................................... 3 We already use patterns everyday 4 3. 'Pattern'-ity Testing, Proto-Patterns & The Rule Of Three ...................... 7 4. The Structure Of A Design Pattern ......................................... 9 5. Writing Design Patterns ................................................. 11 6. Anti-Patterns ......................................................... 13 7. Categories Of Design Pattern ............................................ 15 Creational Design Patterns 15 Structural Design Patterns 16 Behavioral Design Patterns 16 8. Design Pattern Categorization ........................................... 17 A brief note on classes 17 9. JavaScript Design Patterns .............................................. 21 The Creational Pattern 22 The Constructor Pattern 23 Basic Constructors 23 Constructors With Prototypes 24 The Singleton Pattern 24 The Module Pattern 27 iii Modules 27 Object Literals 27 The Module Pattern
    [Show full text]
  • Creational Patterns
    9. Creational Pattern Venkat Subramaniam CDP-1 Creational Patterns • Abstracts instantiation process • Makes system independent of how its objects are œ created œ composed œ represented • Encapsulates knowledge about which concrete classes the system uses • Hides how instances of these classes are created and put together Venkat Subramaniam CDP-2 Abstract Factory Provide an interface for creating families of related or dependent objects without specifying their concrete classes Venkat Subramaniam CDP-3 Example that would benefit from Abstract Factory ComputerModelA MemoryType A CPUTypeA ModemTypeA BuildComputer(ComputerModelA& comp) { comp.Add(new MemoryTypeA); comp.Add(new CPUTypeA); comp.Add(new ModemTypeA); } What if I want to build a Computer of Model B with Model B Memory,CPU and Modem? Venkat Subramaniam CDP-4 Using Abstract Factory ComputerFactory Client Computer createComputer() createMemory() createCPU() Computer Computer createModem() ModelA ModelB Memory CompFactoryB CompFactoryA createComputer() createComputer() Memory Memory createMemory() createMemory() ModelA ModelB createCPU() createCPU() createModem() createModem() Venkat Subramaniam CDP-5 Using Abstract Factory... BuildComputer(Computer& comp, ComputerFactory& compFactory) { comp.Add(compFactory.createMemory()) ; comp.Add(compFactory.createCPU()); comp.Add(compFactory.createModem()); } Venkat Subramaniam CDP-6 .hen to use Abstract Factory? • Use Abstract Factory when: œ system should be independent of how its products are created, composed and represented œ system should
    [Show full text]
  • Java Design Patterns I
    Java Design Patterns i Java Design Patterns Java Design Patterns ii Contents 1 Introduction to Design Patterns 1 1.1 Introduction......................................................1 1.2 What are Design Patterns...............................................1 1.3 Why use them.....................................................2 1.4 How to select and use one...............................................2 1.5 Categorization of patterns...............................................3 1.5.1 Creational patterns..............................................3 1.5.2 Structural patterns..............................................3 1.5.3 Behavior patterns...............................................3 2 Adapter Design Pattern 5 2.1 Adapter Pattern....................................................5 2.2 An Adapter to rescue.................................................6 2.3 Solution to the problem................................................7 2.4 Class Adapter..................................................... 11 2.5 When to use Adapter Pattern............................................. 12 2.6 Download the Source Code.............................................. 12 3 Facade Design Pattern 13 3.1 Introduction...................................................... 13 3.2 What is the Facade Pattern.............................................. 13 3.3 Solution to the problem................................................ 14 3.4 Use of the Facade Pattern............................................... 16 3.5 Download the Source Code.............................................
    [Show full text]
  • Design Patterns Chapter 3
    A Brief Introduction to Design Patterns Jerod Weinman Department of Computer Science Grinnell College [email protected] Contents 1 Introduction 2 2 Creational Design Patterns 4 2.1 Introduction ...................................... 4 2.2 Factory ........................................ 4 2.3 Abstract Factory .................................... 5 2.4 Singleton ....................................... 8 2.5 Builder ........................................ 8 3 Structural Design Patterns 10 3.1 Introduction ...................................... 10 3.2 Adapter Pattern .................................... 10 3.3 Façade ......................................... 11 3.4 Flyweight ....................................... 12 3.5 Proxy ......................................... 13 3.6 Decorator ....................................... 14 4 Behavioral Design Patterns 20 4.1 Introduction ...................................... 20 4.2 Chain of Responsibility ................................ 20 4.3 Observer ........................................ 20 4.4 Visitor ......................................... 22 4.5 State .......................................... 25 1 Chapter 1 Introduction As you have probably experienced by now, writing correct computer programs can sometimes be quite a challenge. Writing the programs is fairly easy, it can be the “correct” part that maybe is a bit hard. One of the prime culprits is the challenge in understanding a great number of complex interactions. We all have probably experienced the crash of some application program
    [Show full text]
  • Digital Notes on Design Patterns (R15a0528)
    DIGITAL NOTES ON DESIGN PATTERNS (R15A0528) B.TECH IV YEAR - I SEM (2019-20) DEPARTMENT OF INFORMATION TECHNOLOGY MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY (Autonomous Institution – UGC, Govt. of India) (Affiliated to JNTUH, Hyderabad, Approved by AICTE - Accredited by NBA & NAAC – ‘A’ Grade - ISO 9001:2015 Certified) Maisammaguda, Dhulapally (Post Via. Hakimpet), Secunderabad – 500100, Telangana State, INDIA. Design Patterns Page 1 MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY IV Year B.Tech IT – I Sem L T /P/D C 4 - / - / - 3 (R15A0528) DESIGN PATTERNS (Elective IV) OBJECTIVES: 1. Design patterns are a systematic approach that focus and describe abstract systems of interaction between classes, objects, and communication flow 2. Given OO design heuristics, patterns or published guidance, evaluate a design for applicability, reasonableness, and relation to other design criteria. 3. Comprehend the nature of design patterns by understanding a small number of examples from different pattern categories, and to be able to apply these patterns in creating an OO design. 4. Good knowledge on the documentation effort required for designing the patterns. UNIT I: Introduction: What Is a Design Pattern? Design Patterns in Smalltalk MVC, Describing Design Patterns, The Catalog of Design Patterns, Organizing the Catalog, How Design Patterns Solve Design Problems, How to Select a Design Pattern, How to Use a Design Pattern. UNIT II: A Case Study: Designing a Document Editor: Design Problems, Document Structure, Formatting, Embellishing the User Interface, and Supporting Multiple Look – and - Feel Standards, Supporting Multiple Window Systems, User Operations Spelling Checking and Hyphenation, Summary. UNIT III: Creational Patterns: Abstract Factory, Builder, Factory Method, Prototype, Singleton, Discussion of Creational Patterns.
    [Show full text]
  • Chap 5. Patterns
    Chap 5. Patterns 1. Introduction 2. Pattern Description and Application 3. Design Patterns 4. Architectural Patterns 5. Appendix: Other Patterns 1 1. Introduction Motivating Example Problem: You are building a quote application, which contains a class that is responsible for managing all of the quotes in the system. It is important that all quotes interact with one and only one instance of this class. How do you structure your design so that only one instance of this class is accessible within the application? Simple solution: ÷Create a QuoteManager class with a private constructor so that no other class can instantiate it. ÷This class contains a static instance of QuoteManager that is returned with a static method named GetInstance(). public class QuoteManager { //NOTE: For single threaded applications only private static QuoteManager _Instance = null; private QuoteManager() {} public static QuoteManager GetInstance() { if (_Instance==null) { _Instance = new QuoteManager (); } return _Instance; Recurring problems like this kind have } been observed by experienced developers //... functions provided by QuoteManager and a common solution has been distilled,2 } as the Singleton pattern. Pattern Overview - A classical engineering rule of thumb consists of reusing extensively available knowledge base for any kind of problem solving that occurs during system design. Method ÷ When the knowledge doesn't exist for the problem at hand,Theft Intuition then intuition takes the lead. ÷ Architectural styles or patterns define experience-based classes of designs along with their known characteristics. Classical system Method Theft Intuition - A pattern is a solution to a problem in a context •A pattern codifies specific knowledge collected from experience in a domain Unprecedented system •There are three kinds of patterns –Idioms: provide a solution for specific programming issues in given language.
    [Show full text]
  • Proceedings Template
    Supporting the Evolution of Service Oriented Web Applications using Design Patterns Manolis Tzagarakis Michalis Vaitis Nikos Karousos Computer Technology Institute University of the Aegean University of Patras 26500 Rion University Hill, GR-811 00 Mytilene 26500 Rion Greece Greece Greece +30 2610 960482 +30 22510 36433 +30 2610 960482 [email protected] [email protected] [email protected] ABSTRACT "Web systems that are kept running via continual stream of Web applications make increasingly use of services that are Patches or upgrades developed without systematic approaches” provided by external information systems to deliver advanced The problems are even more complicated, when web applications functionalities to end users. However, many issues regarding how are built upon service oriented architectures (SOA) that differ these services are integrated into web applications and how greatly fom traditional client server architectures. SOA exhibit service oriented web applications evolve, are reengineered and great flexibility with respect to services and require new refactored are still addressed in an ad hoc manner. In this paper, approaches to service integration. Within the hypermedia field, we present how design patterns can lessen the efforts required to Component-Based Hypermedia Systems (CB-OHS)[15] have integrate hypermedia services into web applications. In particular emerged, consisting of an underlying set of infrastructure services we present how evolution and maintenance issues are addressed that support the development and operation of an open set of within Callimachus, a CB-OHS that web applications need to components (called structure servers), providing structure services integrate in order to provide hypertext functionality to end users. for specific application domains.
    [Show full text]
  • Unit-Iii Pattern
    SOFTWARE ARCHITECTURE AND DESIGN PATTERN UNIT-III PATTERN: PATTERN DESCRIPTION Software patterns are reusable solutions to recurring problems that occur during software development. In general, a pattern has four essential elements: The pattern name is a handle we can use to describe a design problem, its solutions,andconsequencesinawordortwo.Namingapatternimmediatelyincreasesour designvocabulary.Itletsusdesignatahigherlevelofabstraction.Havingavocabularyfor patterns lets us talk about them with our colleagues, in our documentation, and even to ourselves.Itmakesiteasiertothinkaboutdesignsandtocommunicatethemandtheirtrade- offs to others. Finding good names has been one of the hardest parts of developing our catalog. Theproblem describes when to apply the pattern. It explains the problem and its context. It mightdescribespecificdesignproblemssuchashowtorepresentalgorithmsasobjects.It mightdescribeclassorobjectstructuresthataresymptomaticofaninflexibledesign. Sometimestheproblemwillincludealistofconditionsthatmustbemetbeforeitmakes sensetoapplythepattern. The solution describes the elements that make up the design, their relationships, responsibilities,andcollaborations.Thesolutiondoesn'tdescribeaparticularconcretedesign orimplementation,becauseapatternislikeatemplatethatcanbeappliedinmanydifferent situations.Instead,thepatternprovidesanabstractdescriptionofadesignproblemandhow ageneralarrangementofelements(classesandobjectsinourcase)solvesit. The consequences are the results and trade-offs of applying the pattern .Though consequences are
    [Show full text]
  • Factory Method Design Pattern Real World Example
    Factory Method Design Pattern Real World Example Preponderating and tasty Tyson wallpapers his calvities precools bratticed preposterously. Shannan is fixative: she unplait Jewishly and exploiter her quarrians. Startling Lucian overlooks or misuse some sabotages individualistically, however parentless Parrnell breveting humanly or silenced. Abhishek is not parameterized. The Factory Method defines an interface for creating objects but lets. Let's why how appropriate use the Abstract Factory hand to design this kind of system. Design Patterns for Humans Developer Roadmaps. ValueOf method is good praise which caches true whereas false boolean value. So cannot have to design in an a serve to reuse the Director to create rather complex objects I wait looking foe a practical example to mint this. The child class method's can facilitate different implementation depends on the. Factory Design Pattern in Java JournalDev. Abstract factory inside a creational design pattern which allows us to. Its methods to real world example of this method is a number of your post dedicated class at hand, how to add new values that? Factory method but you might believe because in real world examples and an earlier saved state and java is considered good examples to be in a lot. Design Patterns The pickle Factory Pattern. Simple factory and turn responsible to real factory world pattern example, you can apply the target class with composition over toppings array to! Finally we have just made my factory is that you, these techniques like you know about capturing and type of such a product type. Diagrams applicable scenarios java example showing usage of javautil.
    [Show full text]
  • Security Patterns
    Security Patterns Ronald Wassermann and Betty H.C. Cheng¤ Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing, Michigan 48824, USA Email: fwasser17,[email protected] Abstract Design patterns propose generic solutions to recurring design problems. Commonly, they present a solution in a well-structured form that facilitates its reuse in a di®erent context. Re- cently, there has been growing interest in identifying pattern-based designs for the domain of system security termed Security Patterns. Currently, those patterns lack comprehensive struc- ture that conveys essential information inherent to security engineering. This paper describes research into investigating an appropriate template for Security Patterns that is tailored to meet the needs of secure system development. In order to maximize comprehensibility, we make use of well-known notations such as the Uni¯ed Modeling Language (UML) to represent structural and behavioral aspects of design. Furthermore, we investigate how veri¯cation can be enabled by adding formal constraints to the patterns. ¤Please contact B. Cheng for all correspondences. i Contents 1 Introduction 1 2 Background 2 2.1 Viega's and McGraw's ten principles . 2 2.1.1 Principle 1: Secure the weakest link. 3 2.1.2 Principle 2: Practice defense in depth. 3 2.1.3 Principle 3: Fail securely. 3 2.1.4 Principle 4: Follow the principle of least privilege. 4 2.1.5 Principle 5: Compartmentalize. 4 2.1.6 Principle 6: Keep it simple. 4 2.1.7 Principle 7: Promote privacy. 5 2.1.8 Principle 8: Remember that hiding secrets is hard.
    [Show full text]