Migrating Large Object-Oriented Applications Into Component-Based Ones Instantiation and Inheritance Transformation

Migrating Large Object-Oriented Applications Into Component-Based Ones Instantiation and Inheritance Transformation

GPCE’15 Migrating Large Object-oriented Applications into Component-based ones Instantiation and Inheritance Transformation Zakarea Alshara Abdelhak-Djamel Seriai Chouki Tibermacine Hinde Lilia Bouziane Christophe Dony Anas Shatnawi LIRMM, CNRS and University of Montpellier, France falshara, seriai, tibermacin, bouziane, dony, [email protected] Abstract architecture views, and it is easy to reuse their coarse-grained en- Large object-oriented applications have complex and numerous de- tities [5, 9]. Thus migrating these OO applications to CB ones pendencies, and usually do not have explicit software architectures. contributes to improve their maintainability, in addition to their Therefore they are hard to maintain, and parts of them are difficult reusability by feeding existing component repositories [12]. to reuse. Component-based development paradigm emerged for im- The migration process is composed of two main steps [1]: the proving these aspects and for supporting effective maintainability first step is CB architecture recovery where components and their and reuse. It provides better understandability through a high-level dependencies are identified. The second step is code transformation architecture view of the application. Thereby migrating object- where OO code is transformed into equivalent CB one. oriented applications to component-based ones will contribute to The step of CB architecture recovery was largely treated in the improve these characteristics (maintainability and reuse). In this literature [2–4, 7, 9]. Most of these works aim to identify compo- paper, we propose an approach to automatically transform object- nents as clusters of classes. They use clustering algorithms, among oriented applications to component-based ones. More particularly, other techniques, aiming at maximizing intra-component cohesion the input of the approach is the result provided by software ar- and minimize inter-component coupling to identify the architec- chitecture recovery: a component-based architecture description. tural elements (components and connectors). CB architecture re- Then, our approach transforms the object-oriented source code in covery aims to identify components and connectors but not to cre- order to produce deployable components. We focus in this paper ate them. It does not transform these clusters of classes into a con- on the transformation of source code related to instantiation and in- crete component model. Moreover, the dependencies between clus- heritance dependencies between classes that are in different com- ters remain OO ones. ponents. We experimented the proposed solution in the transforma- Code transformation (The second step) aims at creating pro- tion of a collection of Java applications into the OSGi framework. gramming level components by transforming OO code. It aims The experimental results are discussed in this paper. at creating components based on given clusters of classes. Com- ponent encapsulation (i.e., Interaction through explicit provided Keywords Component, Object, Code Transformation, Refactor- and required interfaces) is a main characteristic of components ing, Inheritance, Encapsulation, Class Instantiation, Java, OSGi and therefore a major difference between the component and ob- ject concepts [16]. Thus, object to component transformation con- 1. Introduction sists on transforming OO dependencies between classes belong- ing to different clusters to interactions through interfaces to avoid Most existing large legacy applications are object-oriented (OO) [19]. component encapsulation violation. It needs the transformation of These applications have complex and numerous internal depen- OO mechanisms used at the implementation level (i.e. instantia- dencies. Usually, they do not have explicit architectures, in which tion, inheritance, exception handling, etc.) into ones related to CB coarse-grained high-level entities and their dependencies are de- (interface-based connections) [12]. scribed. This makes these applications hard to maintain (understand This paper proposes a method that automatically transforms an and change), and hard to reuse. OO application code to a CB one. We assume that an existing CB Conversely, component-based (CB) applications have coarse- architecture recovery method provides us architecture descriptions grained high-level architecture views [7]. They have loosely cou- as an input to our method. Based on the taxonomy of component pled and highly cohesive entities that have explicit dependencies. models proposed in [11], we chose, as the target of our transfor- Therefore, these applications are easy to understand through their mation, an object-based component model (i.e. components imple- mented based on OO source code). These component models are implemented as an extension of mainstream OO programming lan- guages (e.g. OSGI is an extension of Java [13], CCM is an exten- sion of C++ [11]). This choice allows us to reuse the OO source code to be migrated. In this work, we experimented the proposed solution on the transformation of Java applications into the OSGi framework. The remainder of this paper is organized as follows. Section 2 presents the migration process and its related issues. Section 3 ex- [Copyright notice will appear here once ’preprint’ option is removed.] plains the proposed solution to transform class instantiation depen- Transform instantiation and inheritance for decoupling classes in different components 1 2015/8/24 dencies. Section 4 describes our solution to transform OO inheri- Screen). And the boundary classes are classes that have depen- tance relationships. Section 5 presents implementation and exper- dencies with classes placed into other clusters (e.g. TimeZone and imental results. Before concluding, we present the related work in Clock). We consider a component-based architecture as a set of Section 6. components connected via interfaces, where interfaces are identi- fied from boundary classes. 2. Problem Statement To better illustrate the problem and solutions related to the OO- to-component migration, we introduce an example of a simple Java application. This application simulates the behavior of an information screen (e.g. a software system which displays on a bus’s screen information about stations, time, etc.). In Figure 1, ContentProvider class implements methods which send text messages (instances of Message), and time information obtained trough Clock instances based on the data returned by TimeZone instances. The DisplayManager is responsible for view- ing the provided information through a Screen. Figure 2. Architecture recovery for the information screen. 2.2 Code Transformation In this paper we use clusters of classes obtained based on recovery approaches as an input of the source code transformation step. To Figure 1. Information screen class diagram. transform clusters of classes to components we need to solve two main problems: 1) Explicit component encapsulation violation: the component must hide its internal structure and behavior [16]. It should provide 2.1 Component-based Architecture Recovery its services without exposing the classes that implement it. Two Architecture recovery was largely studied in the literature [3]. In source code expressions fall under this category. First, “class in- these works a software component is recovered as a cluster (set) of stantiation”, where a class (in one component) creates an instance classes that collaborate with each other to provide the component of another class (residing in a different component). For exam- functionalities [6]. In most of these works, a cluster is identified ple, Clock class creates an object of TimeZone class, while these based on the definition of a fitness function and a clustering algo- classes belong to two different clusters. Second, “method invoca- rithm. For example, in our previous works [4, 9], we have proposed tion”, where a method defined in a given class of a cluster invokes an approach which aims to recover component-based architectures a method defined in a class placed in another cluster. based on a fitness function and a search-based algorithm. The fit- 2) Implicit component encapsulation violation: It is related to ness function is based on quality measurements on the component- implicit dependency between components caused by OO mech- based architecture (i.e. maintainability, reliability, autonomy, speci- anisms, such as inheritance, exception handling and event han- ficity and composability). The search-based algorithm aims to max- dling. For instance, for the inheritance mechanism, a class and imize this fitness function. its subclasses cannot be necessarily placed in the same cluster. Figure 2 shows the result of architecture recovery step applied This is the case in Figure 2 for Clock and Message subclasses of on our example. The recovery step identifies five clusters, each Content Class. In this case, the inheritance relationship between cluster contains one or several classes. For example Component1 these classes crosses component boundaries, facing an implicit de- is responsible for displaying information on the screen through the pendency between the underlying components. Since component collaboration of its classes, Screen and DisplayManager. A cluster models do not all support inheritance (e.g. ComponentJ, COM, is composed of two types of classes: internal classes and bound- etc.) [15], source code related to inheritance need to be trans- ary classes. Internal classes are classes that do not have depen- formed. dencies (e.g. a

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us