Microsoft Download Center Archive

Partitioning and Layering a Software Application (Examples in C#)

  • Published:
  • Version: 1.0
  • Category: Document
  • Language: English

This course focuses on techniques such as interface-based design, proper use of inheritance, inversion of control, factories, single responsibility, facades, and other patterns and techniques that help develop software layers.

  • How do you design your software to be more adaptable to changing technologies, fixing bugs and new requirements? Everyone answers: use layering. And that is correct; but exactly how do you develop software layers, or create application interfaces that allow you to make these changes. This course will focus on techniques such as interface-based design, proper use of inheritance, inversion of control, factories, single responsibility, facades, and other patterns and techniques that facilitate this. It will demostrate these principles by walking through the process of transforming a tightly coupled application into a properly layered one. The examples are in C#, but the principles apply to any programming language.

Files

Status: Live

This download is still available on microsoft.com. The downloads below will come directly from the Microsoft Download Center.

FileSize
01-Article Partitioning and Layering Fundamentals.docx
SHA1: 1fd3280f11af1d1914477f67e77f8dc5ef14528c
38 KB
01-Examples Partitioning and Layering Fundamentals.zip
SHA1: 9f33e0240b74e292146e6fc2b045ff471f14a96c
20 KB
01-PowerPoint Partitioning and Layering Fundamentals.pptx
SHA1: 77978c03b691631673bacd1fb16cf4eb8ab89e36
170 KB
02-Article Extending Interfaced Based Design.docx
SHA1: 8e415f964250dc5837f66daf2cf0dfa98ed93021
39 KB
02-Examples Extending Interface Based Design.zip
SHA1: fcca8b57a5a98029c1df59c7eeb91f0fe62aecb7
21 KB
02-PowerPoint Extending Interface Based Design.pptx
SHA1: a7ba70597eb5d5950728387c3e05f233bb7e1370
162 KB
03-Article Domain and Persistence Patterns.docx
SHA1: 6ef44e6dfa12198874a01959b55fbbf7be9e6dea
39 KB
03-Example Domain and Persistence Patterns.zip
SHA1: ac75a4eba6505f204bd6724716eb3a66d6a8106d
100 KB
03-PowerPoint Domain and Persistence Patterns.pptx
SHA1: 8ad6caf7e5fd423f8cab9dac5659b72a8c3a19e9
163 KB
04-Article Inversion of Control and MVC.docx
SHA1: fe5ed23c5c700b248eff95a42262f34d9eb2bb67
39 KB
04-Examples Inversion of Control.zip
SHA1: 22e581ce41c8ce4718bfb321f94b2236fa846baf
61 KB
04-PowerPoint Inversion of Control and MVC.pptx
SHA1: 47edafec3cc1a0080e16212940205a6025ec0e50
166 KB
05-Article Transforming the Application.docx
SHA1: 4a8d076d966eed477f046b2d41bb7ad50caff789
37 KB
05-Examples Transforming the Application.zip
SHA1: 1d789c52a75694fb5b1fe6824586d1fe0461f8d3
163 KB
05-PowerPoint Transforming the Application.pptx
SHA1: ab70c66136c91896840a06216395e72676c170fa
164 KB

File sizes and hashes are retrieved from the Wayback Machine’s indexes. They may not match the latest versions of files hosted on Microsoft servers.

System Requirements

Operating Systems: Windows 2000, Windows 7, Windows Server 2003, Windows Vista, Windows XP

  • Windows 7, Microsoft Windows Vista, Microsoft Windows XP, Microsoft Windows 2000, Microsoft Windows Server 2003 are supported

Installation Instructions

  • Click the content you want to consume and then either Open or Save the file locally.