Open main menu

CDOT Wiki β

Changes

Proxy

892 bytes added, 18:02, 16 January 2007
no edit summary
==Proxy Design Pattern==
 
When a request is made to a Proxy, the real object is then instantiated and from then on any further requests are made to the real object. There are many situations in which a proxy pattern is required:
 
<ul>
<li><b>Remote Proxy</b> - provides a local representative that is located in a different
address space.</li>
<li><b>Virtual Proxy</b> - creates expensive objects only when that object's information is
required.</li>
<li><b>Protection Proxy</b> - provides access controls for different clients to a specified
target object.</li>
<li><b>Smart Reference Proxy</b> - performs additional actions when a specific object is
referenced such as counting the number of references, loading an object into memory when
first referenced, and checking that the object is locked before access so that no other
object may change it.</li>
</ul>
 
==Links==
[[BTP600]]
<br />
[http://en.wikipedia.org/wiki/Proxy_pattern Wikipedia article on the Proxy Pattern]
1
edit