If you have any comments or suggestions, please send mail to mgrand@mindspring.com
. Synopsis of the design patterns
in volume 1 and the patterns in
volume 2 are available on a separate page.
Transaction Patterns | ACID Transaction
Audit Trail Composite Transaction Two Phase Commit |
Distributed Architecture Patterns | Object Request Broker
Demilitarized Zone High Availability Mobile Agent Object Replication Process Pair Shared Object |
Distributed Computing Patterns | Connection Multiplexing
Heartbeat Heavyweight/Lightweight Object Mailbox Object Identifier Protection Proxy Publish-Subscribe Registry |
Concurrency Patterns | Session Object
Data Lock Lock File Optimistic Concurrency Client-Dispatcher-Server Master-Slave Thread Pool Read/Write Consistency Cache Consistency Shallow Transaction Nesting Deep Transaction Nesting |
Temporal Patterns | 13 Temporal Relationships
Time Server Versioned Object Effective Dates |
Database Patterns | Persistence Layer
CRUD SQL Code Description Attribute Mapping Methods Type Conversion Change Manager Object ID Manager Transaction Manager Connection Manager Table Manager Database Authenticates Program Represent Relational Database Tables as Objects Represent Objects as Relational Database Tables |
Related patterns are
Return Mutable Objects from Accessor Method
The Return Mutable Objects from Accessor Method (described in Volume
2) can be used to help ensure the isolation property of transactions.
Related patterns are
Related patterns are
Related patterns are
Related patterns are
Related patterns are
Related patterns are
Related pattern are
Related pattern are
Related patterns are
Related patterns are
Related patterns are
Related patterns are:
Related Patterns are:
Related patterns are:
Related patterns are
Reelated patterns are