- Shopping Bag ( 0 items )
As the need for resource management is often discovered late in the software development lifecycle, and changing the system design at this...
As the need for resource management is often discovered late in the software development lifecycle, and changing the system design at this late stage is difficult, it is important that such tasks are performed early in the lifecycle. Since systems belonging to different domains have different system constraints and requirements, a technique that works well in a particular system or configuration might not be so effective in another.
POSA 3 uses patterns to present techniques for implementing effective resource management in a system. The patterns are covered in detail, making use of several examples, and, as in previous POSA volumes, directions are given on how to implement the presented patterns. Additionally, the volume presents a thorough introduction into resource management, and two case studies where the patterns are applied to the domains of ad hoc networking and mobile radio networks. The patterns are grouped by different areas of resource management and hence address the complete lifecycle of resources: resource acquisition, coordination and release.
Foreword by Steve Vinoski.
About This Book.
About The Authors.
Structure of the Book.
Guide to the Reader.
About The Authors.
1.1 Overview of Resource Management.
1.2 Scope of Resource Management.
1.3 Usage of Patterns.
1.4 Patterns in Resource Management.
1.5 Related Work.
1.6 Pattern Form.
2. Resource Acquisition.
3. Resource Lifecycle.
Resource Lifecycle Manager.
4. Resource Release.
5. Guidelines for Applying Resource Management.
6. Case Study: Ad Hoc Networking.
7. Case Study: Mobile Network.
8. The Past, Present, and Future of Patterns.
8.1 The Past Four Years at a Glance.
8.2 Where Patterns are Now.
8.3 Where Will Patterns Go Tomorrow?
8.4 A Brief Note about the Future of Patterns.
9. Concluding Remarks.
Index of Patterns.
Posted March 17, 2005
Kircher and Jain provide an advanced text on describing patterns, found when you have to code for the management of resources. Where you might have one computer or many scattered across a network that you do not control. (Think Internet.) But text explanations they offer are lucid. And the readership is expected to be highly experienced. So it's very reasonable that you can take high level descriptions of translate these into design documents and ultimately, a functioning system. Of all their patterns, the first one, Lookup, is perhaps the easiest to understand and leads logically into the other more specialised patterns. Also, for Lookup, there is a rather comprehensive list of use cases. Very instructive, in showing that this very first pattern has such wide scope. As in LDAP, CORBA, UDDI, JNDI, Jini and p2p implementations like JXTA. All these have some variant of Lookup as a core and non-trivial central feature. Yet this may be the simplest pattern of the book! A good treatment, to motivate you to continue further and appreciate the other patterns.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.