Skip to content

Latest commit

 

History

History
75 lines (40 loc) · 6.13 KB

File metadata and controls

75 lines (40 loc) · 6.13 KB

Boundaries

  • Overview
  • Implementation
  • Boundary Crossing
  • What Data Crosses The Boundaries
  • Monolith example

Overview

Software architecture is the art of drawing lines called boundaries. The architecture of the system is defined by a set of software components and the boundaries that separate them.

Boundaries separate software elements from one another, and restrict those on one side from knowing about those on the other.

You draw lines between things that matter and things that don't. The GUI doesn't matter to the business rules, so there should be a line between them. The database doesn't matter to the GUI, so there should be a line between them.

Some boundaries are drawn very early in a project's life, even before any code is written. Others are drawn much later. Those that are drawn early are drawn for the purposes of deferring decisions for as long as possible, and of keeping those decisions from polluting the core business logic.

Note the two arrows leaving DatabaseAccess class. That means that none of these classes knows the class exists.

As architects, we have to be aware that boundaries, when fully implemented, are expensive. At the same time, we have to recognize that when such boundaries are ignored, they are very expensive to add in later. You must guess intelligently, weigh the costs and determine where the architectural boundaries lie, which should be fully implemented, which should be partially implemented, and which should be ignored.

This is not a one-time decision. You watch. You pay attention as the system evolves. You note where boudnaries may be required, and the ncarefully watch for the first inkling of friction because those boundaries don't exist. At that point, you weigh the costs of implementing those boundaries versus the cost of ignoring them, and you review that decision frequently. Your goal is to implement the boundaries right at the inflection point where the cost of implementing becomes less than the cost of ignoring.

Implementation

Boundaries objects are Interfaces, that are implemented usually by Interactors.

example

Data goes into an Interactor, through Boundary, and goes out from an Interactor also through a Boundary.

Boundary Crossing

At runtime, a boundary crossing is nothing more than a function on one side of the boundary calling a function on the other side and passing along some data. The trick to creating an appropriate boundary crossing is to manage source code dependencies.

At the lower right of the diagram is an example of how we cross the circle boundaries. It shows the Controllers and Presenters communicating with the Use Cases in the next layer. It begins in the controller, moves through the use case, and then winds up executing in the presenter. Note also the source code dependencies. Each one points inwards towards the use cases.

We usually resolve this apparent contradiction by using the Dependency Inversion Principle.

In a language like Java, for example, we would arrange interfaces and inheritance relationships such that the source code dependencies oppose the flow of control at just the right points across the boundary.

For example, consider that the use case needs to call the presenter. However, this call must not be direct because that would violate The Dependency Rule. No name in an outer circle can be mentioned by an inner circle. So we have the use case call an interface (Use Case Output Port) in the inner circle, and have the presenter in the outer circle implement it.

The same technique is used to cross al the boundaries in the architectures. We take advantage of dynamic polymorphism to create source code dependencies that oppose thw flow of control so that we can conform to The Dependency Rule no matter what direction the flow of control is going in.

Which Data Crosses The Boundaries

Typically the data that crosses the boundaries is simple data structures. You can use basic structs or Data Transfer objects if you like. The important thing is that isolated, simple, data structures are passed across the boundaries. We don't want the data to have any kind of dependency that violates The Dependency Rule.

For example, many database frameworks return a convenient data format in response to a query. We might call this a RowStructure. We don't want to pass that row structure inwards across a boundary. That would violate The Dependency Rule because it would force an inner circle to know something about an outer circle.

So when we pass data across a boundary, it is always in the form that is most convenient for the inner circle.

Monolith Example

The simplest and most common of the architectural boundaries has no strict physical representation. It is simply a disciplined segregation of functions and data within a single processor and a single address space.

When a higher-level client needs to invoke a lower-level service, dynamic polymoprhism is used to invert the dependency against the flow of control. The runtime dependency opposes the compile-time dependency.

In the figure, the flow of control crosses the boundary from left to right. The Client calls function f() on the Service. It passes along an instance of Data (data structure). The Data may be passed as a function argument or by some other more elaborate means. Note that the definition of the Data is on the called side of the boundary.

The boundary is crossed as flow of control, from a higher level to a lower level. We want to avoid this.

In the latest figure, the flow of control crosses the boundary from left to right as before. The high-level Client calls the f() function of the lower level ServiceImpl through the Service interface. Note, however, that all dependencies cross the boundary from right to left toward the higher-level component. Note, also, that the definition of the data structure is on the calling side of the boundary.

Crossing the boundary against the flow of control allows higher-level components to remain independent of lower-level details.