Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Event Logging, Protected Variations, Law of Demeter, From Mud to Structure, Mediator, Command Processor, Master-Slave, Patterns in Software Engineering, Exam Paper, Department of Computer Engineering, Raman Ramsin, Sharif University of Technology, Iran.
Typology: Exams
1 / 1
Event Logging Protected Variations Law of Demeter “Descendants should not expect more or provide less” From Mud to Structure ﻫﺎﻳی ﺑﺎ ﻳکﺪﻳگﺮ ﺩﺍﺭﻧﺪ؟ﺕﻫﺎ ﻭ ﺗﻔﺎﻭﻫﺖﺎ ﺒ State Mediator Broker Command Processor ﻭ ﻣﻔﻴﺪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ؟ ﺗﻮ(ﻃﺮﺍﺣی ﻳﺎ ﻣﻌﻤﺎﺭی) ﻫﺮﻳک ﺍﺯ ﻣﻮﻗﻌﻴﺘﻬﺎی ﺯﻳﺮ، ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ چﻪ ﺍﻟگﻮ ﻳﺎ ﺍﻟگﻮﻫﺎﻳی ﻣﺘﻨﺎﻇﺮ ﺍﺳﺖ GRASP کﻪ ﺩﺭ ﻫﺮ ﻣﻮﻗﻌﻴﺖ، ﺭﺍﻩ ﺣﻞ پﻴﺸﻨﻬﺎﺩی ﺩﺭ چﻪ ﻣﻮﺍﺭﺩی ﻭ چگﻮﻧﻪ ﺑﺎ ﺍﻟگﻮﻫﺎی ﺩﻳﺪﻫﺎی ﻣﺨﺘﻠﻔﺎ ﺩﺭ ﻳک ﺍﻧﺒﺎﺭﻩ ﻣﺮکﺰی ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﻭﻫﺩﺍﺩﻩ،ﺷﺪﻩ ﺗﻌﺎﻣﻠی ﺗﻮﺯﻳﻊ ﺑﻪ ﺻﻮﺭﺕ ﺗﻮﺯﻳﻊﻫﺎﺩﺍﺩﻩﻭ ﻧﻤﺎﻳﺶپﺮﺩﺍﺯﺵپﻴچﻴﺪﻩﻫﺎیﺳﺮﻭﻳﺲ.ﺷﻮﺩﺍﺭﺍﺋﻪ ﻣی ﻣﺨﺘﻠﻒ ﺩﺳﺘﺮﺳی.گﻴﺮﻧﺪﺩﺭ ﺍﺧﺘﻴﺎﺭ کﺎﺭﺑﺮﺍﻥ ﻗﺮﺍﺭ ﻣیﺎ ﺗﺄﻣﻴﻦ ﺷﻔﺎﻓﻴﺖ ﻣکﺎﻧی ﻣﺘﻌﺪﺩ ﻗﺮﺍﺭ گﺮﻓﺘﻪ ﻭ ﺑ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻥ ﺩﺍﺩﻩﺩﻳﺪﻫﺎیﺭﺩﻠﻪﺑﻼﻓﺎﺻﺑﺎﻳﺪﺩ ﺷﻮﺩ، ﻭ ﺍﻳﻦ ﻣﺤﺪﻭﺩﻳﺖﻣﺤﺪﻭ ﺗﻮﺳﻂ ﻣﺪﻳﺮﺍﻥ ﺳﻴﺴﺘﻢ ﺧﻮﺍﻫﻴﻢ ﺳﻴﺴﺘﻢ ﻃﻣی.گﺮﺩﺩ(پﻨﺠﺮﻩ ﻧﻤﺎﻳﺶ)ﺩﻳﺪ ﺗﻮﺍﻧﺪ ﺣﺘی ﻣﻨﺠﺮ ﺑﻪ ﺑﺴﺘﻪ ﺷﺪﻥ ﻳک ﺳﻴﺴﺘﻢ ﻭﺑﻪ ﺭﺍﺣﺘیﺑﺘﻮﺍﻥﺩ ﺑﻪ ﻃﻮﺭی کﻪکﻢ ﺷﻮﺍﺟﺰﺍﺀﺑﻴﻦ ﻭﺍﺑﺴﺘگی ﻴﺴﺘﻢ ﻭ ﺯﻳﺮﺳﻴﺴﺘﻢﺳﻣﻨﻴﺖﺍ.ﻫﻢ ﺩﺭ ﺗﻌﺎﻣﻞ ﻫﺴﺘﻨﺪﺑﺎﺯﻳﺮﺳﻴﺴﺘﻢﺗﻌﺪﺍﺩی ﺩﺭ ﻳک ﺳﻴﺴﺘﻢ ﺑﺤﺮﺍﻧی، ﺪﻧﻗﺮﺍﺭ گﻴﺮﺣﻔﺎﻇﺖﻣﻮﺭﺩﺑﺎﻳﺪﻫﺎﺳﻴﺴﺘﻢ کﻞ ﺳﻴﺴﺘﻢ ﻭ ﻫﺮﻳک ﺍﺯ ﺯﻳﺮ کﻨﺪ کﺮﺩﻥ ﺳﻴﺴﺘﻢ، ﻫﻤﻴﺸﻪ ﺑﻪ ﺻﻮﺭﺕ ﻳکﺴﺎﻥﺻﺮﻑ ﻣﻨﺎﺑﻊ ﻭﺑﻪ ﺩﻟﻴﻞﺭﻭﺷﻬﺎی ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ.ﺷﻮﺩ ﻧﻈﺎﺭﺕ ﺯﻳﺮﺳﻴﺴﺘﻢﺍﺯﻳکﻫﺮﺩﺭ،ﻢﺳﻴﺴﺘکﻞﺳﻄﺢﺩﺭ)ﺍﻳﻦ ﺭﻭﺷﻬﺎ ِﻋﻤﺎﻝﺍ ﺧﻮﺍﻫﻴﻢ ﺳﻴﺴﺘﻢ ﻃﻮﺭی ﻃﺮﺍﺣی ﺷﻮﺩ کﻪﻣی.ﺑﺴﺘگی ﺩﺍﺭﺩﻓﻌﻠی ﻣﺨﺎﻃﺮﻩ ﻭﺿﻌﻴﺖ .گﺮﺩﺩﺗﺄﻣﻴﻦﻣﻮﺭﺩ ﻧﻈﺮ ﺍﻣﻨﻴﺖ
Event Logging. a Protected Variations. b Law of Demeter. c should not expect more or provide less”. d From Mud to Structure. e ﺒﺷچﻪﺍﻟگﻮﻫﺎی ﺯﻳﺮﺯﻭﺝ - ۲ State ﻭ Bridge. a Mediator ﻭ PAC. b Broker ﻭ Layers. c Master-Slave. d ﻫﺮﻳک ﺍﺯ ﻣﻮﻗﻌﻴﺘﻬﺎی ﺯﻳﺮ، ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ چﻪ ﺍﻟگﻮ ﻳﺎ ﺍﻟگﻮﻫﺎﻳیﺩﺭ - ۳ کﻪ ﺩﺭ ﻫﺮ ﻣﻮﻗﻌﻴﺖ، ﺭﺍﻩ ﺣﻞ پﻴﺸﻨﻬﺎﺩی ﺩﺭ چﻪ ﻣﻮﺍﺭﺩی ﻭ چگﻮﻧﻪ ﺑﺎ ﺍﻟگﻮﻫﺎی ﺗﻌﺎﻣﻠی ﺗﻮﺯﻳﻊک ﺳﻴﺴﺘﻢﻳﺩﺭ. a ﻣﺨﺘﻠﻒکﺎﺭﺑﺮﺍﻥ ﺑﻪ ﻣﺘﻌﺪﺩ ﻗﺮﺍﺭ گﺮﻓﺘﻪ ﻭ ﺑ ﺗﻮﺳﻂ ﻣﺪﻳﺮﺍﻥ ﺳﻴﺴﺘﻢ ﺗﻮﺍﻧﺪ ﺣﺘی ﻣﻨﺠﺮ ﺑﻪ ﺑﺴﺘﻪ ﺷﺪﻥ ﻳک ﻣی ﻭﺍﺑﺴﺘگی ﻧﻴﺎﺯﻫﺎی ﻓﻮﻕ، .ﺴﺘﺮﺵ ﺩﺍﺩ گ ﺩﺭ ﻳک ﺳﻴﺴﺘﻢ ﺑﺤﺮﺍﻧی،. b کﻞ ﺳﻴﺴﺘﻢ ﻭ ﻫﺮﻳک ﺍﺯ ﺯﻳﺮ، ﺗﺄﻣﻴﻦ ﺁﻥ ﻫﺎ ﻧﻴﺰ ﺯﻳﺮﺳﻴﺴﺘﻢ ِﻋﻤﺎﻝﺍ:ﺷﻮﻧﺪ ِﻋﻤﺎﻝ ﻧﻤیﺍ ﻭﺿﻌﻴﺖﻭﻄﻠﻮﺏ ﺍﻣﻨﻴﺘی ﻣ ﺍﻣﻨﻴﺖ ﻣﻨﺎﺑﻊ ﺳﻴﺴﺘﻢ،