{"id":1296,"date":"2006-02-19T01:41:58","date_gmt":"2006-02-18T17:41:58","guid":{"rendered":"http:\/\/ihower.idv.tw\/blog\/archives\/1296"},"modified":"2006-02-21T13:33:27","modified_gmt":"2006-02-21T05:33:27","slug":"patterns-of-enterprise-application-architecture-layering","status":"publish","type":"post","link":"https:\/\/ihower.tw\/blog\/1296-patterns-of-enterprise-application-architecture-layering","title":{"rendered":"P of EAA : Layering"},"content":{"rendered":"<p>Layering \u662f\u8edf\u9ad4\u8a2d\u8a08\u5e2b\u6700\u5e38\u7528\u7684\u6280\u5de7\uff0c\u53ef\u4ee5\u5c07\u8907\u96dc\u7684\u8edf\u9ad4\u7cfb\u7d71\u6253\u6563\u3002\u4e0a\u5c64\u4f9d\u8cf4\u4e0b\u5c64\uff0c\u4e0b\u5c64\u4e0d\u77e5\u9053\u4e0a\u5c64\u3002\u6700\u597d\u7684\u4f8b\u5b50\u5c31\u662f\u6211\u5011\u7684\u7db2\u8def <a href=\"http:\/\/zh.wikipedia.org\/wiki\/TCP\/IP%E5%8F%82%E8%80%83%E6%A8%A1%E5%9E%8B\">OSI<\/a> \u4e03\u5c64\u67b6\u69cb\u4e86(\u73fe\u5728\u901a\u5e38\u7c21\u5316\u70ba<a href=\"http:\/\/zh.wikipedia.org\/wiki\/TCP\/IP%E5%8F%82%E8%80%83%E6%A8%A1%E5%9E%8B\">\u56db\u5c64<\/a>\u4e86)\u3002<!--more--><\/p>\n<p>Layering \u7684\u597d\u8655\u5f88\u591a\uff0c\u4f60\u53ef\u4ee5\u53ea\u77e5\u9053\u4e00\u5c64\u4e0d\u7528\u77e5\u9053\u5168\u90e8\u3001\u53ef\u4ee5\u66ff\u63db\u4efb\u4e00\u5c64\u3001\u5bb9\u6613\u6a19\u6e96\u5316\u3001\u4e0a\u5c64\u53ef\u4ee5\u6709\u5404\u7a2e\u9078\u64c7\u7b49(\u4f8b\u5b50\u60f3OSI\u5427)\u3002\u7f3a\u9ede\u662f\u53ef\u80fd\u6703\u5e36\u4f86 cascading changes (\u56e0\u70ba\u6bcf\u5c64layer\u5305\u4e86\u67d0\u4e9b\u6771\u897f\uff0c\u4f46\u662f\u53c8\u6c92\u6709\u5168\u90e8\u90fd\u5305\u7684\u597d\u597d\u7684)\uff0c\u4f60\u5982\u679c\u8981\u5728UI\u591a\u4e00\u500b\u6b04\u4f4d\uff0c\u55ef\uff0c\u90a3\u500b\u6b04\u4f4d\u4e5f\u8981\u5728database\uff0c\u55ef\uff0c\u6bcf\u4e00\u5c64\u90fd\u8981\u52a0\u4e0a\u90a3\u500b\u6b04\u4f4d\u7684\u8655\u7406&#8230; XD\u3002\u53e6\u4e00\u500b\u7f3a\u9ede\u5c31\u662f\u591a\u9918\u7684Layer\u6703\u964d\u4f4e\u6574\u9ad4\u6548\u80fd\uff0c\u4f46\u5f80\u597d\u8655\u60f3\uff0c\u67d0\u4e00\u5c64\u505a\u597d\u6700\u4f73\u5316\uff0c\u4e0a\u9762\u7684\u90fd\u6703\u53d7\u76ca\u3002<\/p>\n<p>\u56f0\u96e3\u7684\u5730\u65b9\u5728\u65bc\u5404\u5c64\u8981\u6709\u4ec0\u9ebc\u4ee5\u53ca\u6bcf\u4e00\u5c64\u61c9\u8a72\u8981\u6709\u7684\u8cac\u4efb\u3002<\/p>\n<p>\u672c\u66f8\u4f7f\u7528 Three Principal Layers \u4f86\u8a0e\u8ad6\u00a0: <strong>Presentation, Domain (Logic), and Data Source<\/strong> \u3002\u4f60\u61c9\u8a72\u53ef\u4ee5\u60f3\u5230\u5927\u6982\u662f\u600e\u6a23\u4e86\uff0c\u6211\u5c31\u4e0d\u5beb\u4e86 :p<\/p>\n<p>\u5e7e\u500b\u91cd\u9ede\u50cf\u662f domain \u8ddf data source \u4e0d\u61c9\u4f9d\u8cf4 presentation\uff0c\u4fdd\u6301\u66ff\u63db Presentation \u7684\u7a7a\u9593\u3002\u800c domain \u548c data source \u4e4b\u9593\u7684\u95dc\u4fc2\u5247\u8981\u770b\u4f60\u7528\u7684 architectural patterns \u4e86\u3002<\/p>\n<p>\u4e00\u500b\u56f0\u96e3\u9ede\u6c7a\u5b9a\u54ea\u4e9b logic \u5728 domain\uff0c\u56e0\u70ba\u6211\u5011\u5e38\u628a domain logic \u653e\u5230 presentation \u53bb\u3002\u4f5c\u8005\u63d0\u4e86\u4e00\u500b\u7c21\u55ae\u7684\u6e2c\u8a66\u65b9\u6cd5\uff0c\u8acb\u4f60\u60f3\u50cf\u53e6\u4e00\u7a2e\u5f88\u4e0d\u540c\u7684 layer\u00a0\u60c5\u6cc1\uff0c\u5982\u628a web interface \u63db\u6210 command-line \uff0c\u770b\u770b\u662f\u4e0d\u662f\u6709\u529f\u80fd\u91cd\u8907\u4e86\uff0c\u5982\u679c\u6709\u5c31\u61c9\u8a72\u642c\u5230 domain logic \u53bb\u3002<\/p>\n<p>\u672c\u7ae0\u6700\u5f8c\u8ac7\u9078\u64c7 \u4f60\u8981\u5728\u54ea\u88e1\u8dd1\u4f60\u7684 layer\u3002\u901a\u901a\u8dd1\u5728 server \u662f\u6700\u7c21\u55ae\u7684\u4f5c\u6cd5(\u5982\u7528web browser\u7576client)\uff0c\u56e0\u70ba\u5bb9\u6613\u5347\u7d1a\u8ddf\u88dc\u91d8\u56c9\u3002\u770b\u8d77\u4f86\u90fd\u8dd1 server \u5c31\u597d\u5566\uff0c\u4f46\u662f\u70ba\u4e86<strong>\u00a0responsiveness \u56de\u61c9\u901f\u5ea6 \u6216 disconnected \u96e2\u7dda\u4f7f\u7528<\/strong> \u9019\u5169\u500b\u539f\u56e0\uff0c\u4f60\u4e5f\u8a31\u5f97\u8dd1\u6771\u897f\u5728 client \u4e0a\u3002<\/p>\n<p>\u672c\u66f8\u5047\u8a2d data source \u90fd\u5728server\u8dd1\uff0c\u56e0\u70ba\u82e5\u662f\u8981\u8dd1\u96e2\u7dda\u7684\u60c5\u6cc1\uff0c\u5c31\u5f97\u8655\u88e1 client \u8ddf server \u540c\u6b65\u7684\u60c5\u6cc1\uff0c\u55ef\uff0c\u4f5c\u8005\u8aaa\u9019\u4e0d\u5728\u672c\u66f8\u7bc4\u570d :p \u5f8c\u8a18: \u4f60\u53ef\u4ee5\u627e\u627e<a href=\"http:\/\/msdn.microsoft.com\/library\/en-us\/dnpatterns\/html\/DP.asp\"> Data Patterns<\/a> \u7684\u8cc7\u6e90<\/p>\n<p>presentation \u5982\u4f55? \u9019\u8981\u770b\u4f60\u7684 user interface \u985e\u578b\u4e86\uff0c\u8dd1\u8996\u7a97\u986f\u7136\u4f60\u5f97\u653e\u5728 client\uff0c\u8dd1web\u5c31\u662f\u653eserver\u56c9(\u6709\u500b\u4f8b\u5916\u662fX servers in Unix)\u3002<\/p>\n<p>domain logic \u653e server \u5bb9\u6613\u7dad\u8b77\uff0c\u800c\u6703\u653e client \u7684\u7406\u7531\u5c31\u662f\u70ba\u4e86\u56de\u61c9\u901f\u5ea6\u8ddf\u96e2\u7dda\u3002\u5169\u908a\u90fd\u653e\u4e00\u9ede\u986f\u7136\u6703\u8b8a\u8907\u96dc\uff0c\u76e1\u91cf\u4e0d\u8981\u91ac\u5b50\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Layering \u662f\u8edf\u9ad4\u8a2d\u8a08\u5e2b\u6700\u5e38\u7528\u7684\u6280\u5de7\uff0c\u53ef\u4ee5\u5c07\u8907\u96dc\u7684\u8edf\u9ad4\u7cfb\u7d71\u6253\u6563\u3002\u4e0a\u5c64\u4f9d\u8cf4\u4e0b\u5c64\uff0c\u4e0b\u5c64\u4e0d\u77e5\u9053\u4e0a\u5c64\u3002\u6700\u597d\u7684\u4f8b\u5b50 &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/ihower.tw\/blog\/1296-patterns-of-enterprise-application-architecture-layering\" class=\"more-link\">\u95b1\u8b80\u5168\u6587<span class=\"screen-reader-text\">\u3008P of EAA : Layering\u3009<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9,5],"tags":[],"class_list":["post-1296","post","type-post","status-publish","format-standard","hentry","category-books","category-programming","entry"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1q6tG-kU","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/posts\/1296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/comments?post=1296"}],"version-history":[{"count":0,"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/posts\/1296\/revisions"}],"wp:attachment":[{"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/media?parent=1296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/categories?post=1296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ihower.tw\/blog\/wp-json\/wp\/v2\/tags?post=1296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}