100% found this document useful (1 vote)
27 views

(Ebook) Software Architecture Design Patterns in Java by Partha Kuchana ISBN 0849321425 - The ebook in PDF and DOCX formats is ready for download

The document provides information about various ebooks related to software architecture and design patterns in Java, including titles by authors such as Partha Kuchana and Vaskaran Sarcar. It includes links to download these ebooks and a brief overview of the contents of 'Software Architecture Design Patterns in Java.' Additionally, it lists other related publications and provides a detailed table of contents for the featured book.

Uploaded by

valeyancud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
27 views

(Ebook) Software Architecture Design Patterns in Java by Partha Kuchana ISBN 0849321425 - The ebook in PDF and DOCX formats is ready for download

The document provides information about various ebooks related to software architecture and design patterns in Java, including titles by authors such as Partha Kuchana and Vaskaran Sarcar. It includes links to download these ebooks and a brief overview of the contents of 'Software Architecture Design Patterns in Java.' Additionally, it lists other related publications and provides a detailed table of contents for the featured book.

Uploaded by

valeyancud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

Visit ebooknice.

com to download the full version and


explore more ebooks or textbooks

(Ebook) Software Architecture Design Patterns in


Java by Partha Kuchana ISBN 0849321425

_____ Click the link below to download _____


https://ebooknice.com/product/software-architecture-design-
patterns-in-java-2353132

Explore and download more ebooks or textbooks at ebooknice.com


Here are some recommended products that we believe you will be
interested in. You can click the link to download.

(Ebook) Software Architecture Design Patterns in Java by Partha


Kuchana ISBN 9780849317156, 0849317150

https://ebooknice.com/product/software-architecture-design-patterns-
in-java-1270088

(Ebook) Java Design Patterns: A tour of 23 gang of four design


patterns in Java by Vaskaran Sarcar ISBN 9781484218013, 1484218019

https://ebooknice.com/product/java-design-patterns-a-tour-of-23-gang-
of-four-design-patterns-in-java-5470384

(Ebook) Java design patterns: a tour of 23 gang of four design


patterns in Java by Vaskaran Sarcar ISBN 9781484218013, 9781484218020,
1484218019, 1484218027

https://ebooknice.com/product/java-design-patterns-a-tour-of-23-gang-
of-four-design-patterns-in-java-11863206

(Ebook) Java Design Patterns: a tour of 23 gang of four design


patterns in Java by Vaskaran Sarcar ISBN 9781484218013, 9781484218020,
1484218019, 1484218027

https://ebooknice.com/product/java-design-patterns-a-tour-of-23-gang-
of-four-design-patterns-in-java-43169370
(Ebook) Software Architecture Patterns: Understanding Common
Architecture Patterns And When To Use Them by Mark Richards ISBN
9781491924242, 1491924241

https://ebooknice.com/product/software-architecture-patterns-
understanding-common-architecture-patterns-and-when-to-use-
them-36349374

(Ebook) Modern Java EE design patterns : building scalable


architecture for sustainable enterprise development by Markus Eisele
ISBN 9781491939826, 1491939826

https://ebooknice.com/product/modern-java-ee-design-patterns-building-
scalable-architecture-for-sustainable-enterprise-development-43712804

(Ebook) Java Design Patterns by Mr. Devendra Singh ISBN 9781537192352,


1537192353

https://ebooknice.com/product/java-design-patterns-6769402

(Ebook) Design Patterns mit Java by Olaf Musch ISBN 9783658354916,


3658354917

https://ebooknice.com/product/design-patterns-mit-java-36497394

(Ebook) Hands-On Software Architecture with Java by Giuseppe Bonocore


ISBN 9781800206144, 1800206143

https://ebooknice.com/product/hands-on-software-architecture-with-
java-45200498
Software
Architecture
Design Patterns
in Java

© 2004 by CRC Press LLC


Other CRC/Auerbach Publications in Software Development,
Software Engineering, and Project Management
The Complete Project Management Six Sigma Software Development
Office Handbook Christine Tanytor
Gerard M. Hill 0-8493-1193-4
0-8493-2173-5
Software Architecture Design Patterns
Complex IT Project Management: 16 Steps in Java
to Success Partha Kuchana
Peter Schulte 0-8493-2142-5
0-8493-1932-3 Software Configuration Management
Creating Components: Object Oriented, Jessica Keyes
Concurrent, and Distributed Computing 0-8493-1976-5
in Java
Software Engineering for Image Processing
Charles W. Kann Phillip A. Laplante
0-8493-1499-2 0-8493-1376-7
Dynamic Software Development: Software Engineering Handbook
Manging Projects in Flux Jessica Keyes
Timothy Wells 0-8493-1479-8
0-8493-129-2
Software Engineering Measurement
The Hands-On Project Office: Guaranteeing John C. Munson
ROI and On-Time Delivery 0-8493-1503-4
Richard M. Kesner
0-8493-1991-9 Software Engineering Processes: Principles
and Applications
Interpreting the CMMI®: A Process Yinxu Wang, Graham King, and Saba Zamir
Improvement Approach 0-8493-2366-5
Margaret Kulpa and Kent Johnson
Software Metrics: A Guide to Planning,
0-8493-1654-5
Analysis, and Application
Introduction to Software Engineering C.R. Pandian
Ronald Leach 0-8493-1661-8
0-8493-1445-3 Software Testing: A Craftsman’s Approach,
ISO 9001:2000 for Software and Systems 2e
Providers: An Engineering Approach Paul C. Jorgensen
Robert Bamford and William John Deibler II 0-8493-0809-7
0-8493-2063-1 Software Testing and Continuous Quality
Improvement, Second Edition
The Laws of Software Process:
William E. Lewis
A New Model for the Production
and Management of Software 0-8493-2524-2
Phillip G. Armour IS Management Handbook, 8th Edition
0-8493-1489-5 Carol V. Brown and Heikki Topi, Editors
0-8493-1595-9
Real Process Improvement Using
the CMMI® Lightweight Enterprise Architectures
Michael West Fenix Theuerkorn
0-8493-2109-3 0-9493-2114-X

AUERBACH PUBLICATIONS
www.auerbach-publications.com
To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401
E-mail: [email protected]
© 2004 by CRC Press LLC
Software
Architecture
Design Patterns
in Java
Partha Kuchana

AUERBACH PUBLICATIONS
A CRC Press Company
Boca Raton London New York Washington, D.C.

© 2004 by CRC Press LLC


Library of Congress Cataloging-in-Publication Data

Kuchana, Partha.
Software architecture design patterns in Java / Partha Kuchana.
p. cm.
Includes bibliographical references and index.
ISBN 0-8493-2142-5 (alk. paper)
1. Java (Computer program language) 2. Computer Software. 3. Computer architecture.
4. Software patterns. I. Title.

QA76.73.J38K83 2004
005.13′3—dc22 2003070897

This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted
with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been
made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the
validity of all materials or for the consequences of their use.

Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system,
without prior permission in writing from the publisher.

The consent of CRC Press LLC does not extend to copying for general distribution, for promotion, for creating new
works, or for resale. Specific permission must be obtained in writing from CRC Press LLC for such copying.

Direct all inquiries to CRC Press LLC, 2000 N.W. Corporate Blvd., Boca Raton, Florida 33431.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation, without intent to infringe.

Visit the Auerbach Publications Web site at www.auerbach-publications.com

© 2004 by CRC Press LLC


Auerbach is an imprint of CRC Press LLC

No claim to original U.S. Government works


International Standard Book Number 0-8493-2142-5
Library of Congress Card Number 2003070897
Printed in the United States of America 1 2 3 4 5 6 7 8 9 0
Printed on acid-free paper

© 2004 by CRC Press LLC


DEDICATION

To my family

© 2004 by CRC Press LLC


CONTENTS

SECTION I: AN INTRODUCTION TO DESIGN PATTERNS


1 Design Patterns: Origin and History
Architectural to Software Design Patterns
What Is a Design Pattern?
More about Design Patterns
About This Book
Source Code
Source Code Disclaimer

SECTION II: UNIFIED MODELING LANGUAGE (UML)


2 UML: A Quick Reference
Structure Diagrams
Behavior Diagrams
Model Management Diagrams
Class Diagrams
Class
Inner Class
Access Specifiers
Static
Abstract Class/Method
Exception
Note
Generalization
Interface
Realization
Dependency
Class Association
Multiplicity
Navigability
Composition
Aggregation
Sequence Diagrams
Object
Message
Self Call

© 2004 by CRC Press LLC


SECTION III: BASIC PATTERNS
3 Interface
Description
Example
Practice Questions

4 Abstract Parent Class


Description
Example
Abstract Parent Class versus Interface
Practice Questions

5 Private Methods
Description
Example
Practice Questions

6 Accessor Methods
Description
Accessor Method Nomenclature
Example
Direct Reference versus Accessor Methods
Practice Questions

7 Constant Data Manager


Description
Example
Practice Questions

8 Immutable Object
Description
Example
Practice Questions

9 Monitor
Description
Example
Practice Questions

SECTION IV: CREATIONAL PATTERNS


10 Factory Method
Description
Example
Practice Questions

11 Singleton
Description
Who Should Be Responsible?
Example
Make the Constructor Private
Static Public Interface to Access an Instance
Practice Questions

© 2004 by CRC Press LLC


12 Abstract Factory
Description
Abstract Factory versus Factory Method
Example I
Example II
Logical Flow When the Application Is Run
Practice Questions

13 Prototype
Description
Shallow Copy versus Deep Copy
Shallow Copy Example
Deep Copy Example
Example I
Design Highlights of the HostingPlanKit Class
Example II
Redesign the UserAccount Class
Create a Prototype Factory Class
Practice Questions

14 Builder
Description
Example I
A Side Note
Back to the Example Application
Example II
Example III
Practice Questions

SECTION V: COLLECTIONAL PATTERNS


15 Composite
Description
Example
Design Approach I
FileComponent
getComponentSize()
DirComponent
addComponent(FileSystemComponent)
getComponent(int)
getComponentSize()
Design Approach II
Practice Questions

16 Iterator
Description
Iterators in Java
Filtered Iterators
Internal versus External Iterators
Example: Internal Iterator
Client/Container Interaction
Example: External Filtered Iterator
Practice Questions

© 2004 by CRC Press LLC


17 Flyweight
Description
How to Design a Flyweight in Java
Design Highlights
Example
Design Approach I
Design Approach II
Practice Questions

18 Visitor
Description
Design Idea 1
Design Idea 2
Defining New Operations on the Object Collection
Adding Objects of a New Type to the Collection
Example
Design Approach I
Design Approach II
Design Approach III (Composite Pattern)
Design Approach IV (The Visitor Pattern)
Application Flow
Defining a New Operation on the Order Object Collection
Adding a New Order Type to the Collection
Practice Questions

SECTION VI: STRUCTURAL PATTERNS


19 Decorator
Description
Characteristics of a Decorator
Example
Concrete Logger Decorators
HTMLLogger
EncryptLogger
Adding a New Message Logger
Adding a New Decorator
Practice Questions

20 Adapter
Description
Class Adapters versus Object Adapters
Class Adapter
Object Adapter
Example
Address Adapter as an Object Adapter
Practice Questions

21 Chain of Responsibility
Description
Example
Practice Questions

© 2004 by CRC Press LLC


22 Façade
Description
Example
Important Notes
Practice Questions

23 Proxy
Description
Proxy versus Other Patterns.
Proxy versus Decorator
Proxy versus Façade
Proxy versus Chain of Responsibility
RMI: A Quick Overview
RMI Components
RMI Communication Mechanism
RMI and Proxy Pattern
Example
Additional Notes
Compilation and Deployment Notes
Practice Questions

24 Bridge
Description
Example
Abstraction Implementation Design
Abstraction Interface Design
Design Highlights of the Abstraction Interface Classes
Bridge Pattern versus Adapter Pattern
Practice Questions

25 Virtual Proxy
Description
Advantage
Disadvantage
Example
Practice Questions

26 Counting Proxy
Description
Example
Practice Questions

27 Aggregate Enforcer
Description
Example
Design Approach I (On-Demand Initialization)
Design Approach II (Early Initialization)
Design Approach III (Final Variables)
Practice Questions

28 Explicit Object Release


Description
The finalize Method

© 2004 by CRC Press LLC


When an Object Goes Out of Scope, It Is Believed to
Be Garbage Collected Immediately
The Garbage Collection Process Runs as a Low-Level
Background Daemon Thread
The finally Statement
Example
Best Case Scenario
Exception Scenario 1
Exception Scenario 2
Practice Questions

29 Object Cache
Description
Example
Practice Questions

SECTION VII: BEHAVIORAL PATTERNS


30 Command
Description
Example I
Example II
Application Flow
Practice Questions

31 Mediator
Description
Mediator versus Façade
Example I
Client Usage of the Mediator
User Interface Objects: Mediator Interaction
Example II
Practice Questions

32 Memento
Description
Example
DataConverter (Originator)
ID
Memento
process
createMemento
setMemento
DCClient (Client)
MementoHandler
Practice Questions

33 Observer
Description
Adding New Observers
Example
Subject–Observer Association
Logical Flow

© 2004 by CRC Press LLC


Practice Questions

34 Interpreter
Description
Example
Infix-to-Postfix Conversion (Listing 34.8)
Construction of the Tree Structure (Listing 34.9)
Postorder Traversal of the Tree
Additional Notes
Infix-to-Postfix Conversion
Infix Expression
Postfix Expression
Conversion Algorithm
Example
Binary Tree Traversal Techniques
Preorder (Node-Left-Right)
In-Order (Left-Node-Right)
Postorder (Left-Right-Node)
Level-Order
Practice Questions

35 State
Description
Stateful Object: An Example
Example
Practice Questions

36 Strategy
Description
Strategies versus Other Alternatives
Strategy versus State
Example
SimpleEncryption
CaesarCypher
SubstitutionCypher
CodeBookCypher
Practice Questions

37 Null Object
Description
Example
Practice Questions

38 Template Method
Description
Abstract Class
Concrete Class
Example
Additional Notes
Mod 10 Check Digit Algorithm
Practice Questions

39 Object Authenticator
Description

© 2004 by CRC Press LLC


Example
Practice Questions

40 Common Attribute Registry


Description
Example
Practice Questions

SECTION VIII: CONCURRENCY PATTERNS


41 Critical Section
Description
Example
Approach I (Critical Section)
Approach II (Static Early Initialization)
Practice Questions

42 Consistent Lock Order


Description
Example
Practice Questions

43 Guarded Suspension
Description
Example
Use of wait() and notify() in the ParkingLot Class Design
Practice Questions

44 Read-Write Lock
Description
Design Highlights of the ReadWriteLock Class
Lock Statistics
Lock Methods
Lock Release
Example
Practice Questions

SECTION IX: CASE STUDY


45 Case Study: A Web Hosting Company
Objective
KPS Hosting Solutions: A Brief Overview
Requirements
Functional
Technical
Business Objects and Their Association
Framework for Application Processing
Enterprise Service Level
Generic Interface Contract
Sample Interface Contract
Task Level
Generic Task-Handler Mapping
Sample Task-Handler Mapping

© 2004 by CRC Press LLC


Error Processing
Enterprise Services Design
Address Validation
Credit Card Service
Validation
Search Management
Customer Management
Conclusion

SECTION X: APPENDICES
Appendix A: List of Design Patterns
Appendix B: References

© 2004 by CRC Press LLC


FOREWORD

Partha Kuchana is an experienced enterprise systems architect. He understands


that patterns are not about things that are just good ideas, but that patterns are
about capturing knowledge bred from experience. This hard-won knowledge is
what Partha is sharing with readers of his book. Here are some of the things I
really like about what he has to say.
The book presents 42 design patterns, which include the 23 GoF patterns.
These patterns are categorized as follows:

䡲 7 Basic patterns
䡲 5 Creational patterns
䡲 4 Collectional patterns
䡲 11 Structural patterns
䡲 11 Behavioral patterns
䡲 4 Concurrency patterns

The discussion of each pattern includes an example implemented in Java.


Further, the source code for all examples is found on the following Web site for
this book: http://www.crcpress.com/e_products/downloads/download.asp. The
source code and the easily understood examples make this format work well.
Partha takes complex material and clearly explains the ideas so they are easy-
to-understand, an important consideration for both the novice encountering the
material for the first time and the experienced developer who quickly wants to
extract the important bits for immediate use. Each pattern discussion also includes
Practice Questions for exactly that — your own use to improve your skills or, if
this book were to be chosen as a text, to help the time-pressured instructor.
Partha takes the time to compare and contrast the patterns. For example, in the
discussion on the Mediator pattern, a table shows similarities and differences
between Mediator and Façade. The reader will find that this analysis leads to a
clearer understanding than simply trying to focus on each pattern in isolation. The
text also includes consideration of relationships between patterns. For example, in
the discussion on the Mediator pattern there is a reference to a previous design
example for the Command pattern.

© 2004 by CRC Press LLC


Finally, at the end of the book, the reader will be happy to find a case study
that pulls some of the patterns together to illustrate how a more complicated
problem would be tackled and how the patterns work together. As those who
have studied the work of Christopher Alexander realize—patterns are not applied
in isolation but collaborate within a specific domain to address large and small
problems.
It has been ten years since the GoF book was published. A lot of patterns
have been identified and captured in that time. A lot of patterns books have been
written. This book is like the GoF book, a catalog; probably not one you will
read cover-to-cover in a single setting, but which will find a place on your
bookshelf. Keep it handy for all those “How do I do this in Java?” questions
where you wish you had an expert in the office next door to provide answers.
This book is the next best thing.
Linda Rising
Phoenix, AZ

© 2004 by CRC Press LLC


ABOUT THE AUTHOR

Partha Kuchana is an experienced enterprise systems architect. He has eleven


years of experience in all aspects of project delivery management (onsite/offshore
models), enterprise architecture, design, development, mentoring and training. He
is a Sun certified enterprise architect.
During the last several years, he has worked on numerous client–server, E-
business, Web portal and enterprise application integration (EAI) projects at various
client sites in the United Kingdom and the United States, involving iterative design
methodologies such as Rational Unified Process (RUP) and extreme programming.
He has extensive experience applying design patterns in application architec-
ture and design. He has successfully architected and designed business-to-business
systems and complex heterogeneous systems integration using Web services,
middleware and messaging products from various vendors. He has several pub-
lished software-related publications.

Home page: http://members.ITJobsList.com/partha


E-mail: [email protected]

© 2004 by CRC Press LLC


ACKNOWLEDGMENTS

First and foremost, I would like to thank my wife for her patience and support,
for taking some of my workload especially in the ar eas of UML and Java
programming and for her inspirational contributions at the time of frustrating
moments. I would like to thank my parents, my sister, my brother and my dear
friends whose support and encouragement throughout my life have made it
possible for me to build the skill set necessary to succeed.
I would like to thank Venu Kuchana and D.R. Sudhakar for their contributions
in terms of writing different Java programs. I would like to thank BalaLingam
Kuchana for his contributions in the area of UML and for being in charge of
creating the formatted version of my draft.
I would like to thank the entire team at Auerbach publications for their
contributions in this project and for making this a remarkable experience. In
particular, I have a deep sense of gratitude towards my acquisitions editor, John
Wyzalek, for sharing my enthusiasm and providing me with great advice and
help. I also would like to thank the managing editor, Claire Miller, for her
invaluable advice and contribution in arranging the book in a presentable form.
My sincere thanks to Linda Rising for writing the Foreword.
I am truly appreciative and thankful to the following reviewers who have
taken the time to read the draft and provide me with feedback.

䡲 Pradyumn Sharma, CEO, Pragati Software Pvt. Ltd.


䡲 Carsten Kuckuk, project lead, Design Patterns Study Group Stuttgart, RIB
Software AG
䡲 Tim Kemper, Boulder Design Patterns Group
䡲 Geoffrey Sparks, CEO, Sparx Systems P/L
䡲 Edward L. Howe, software architect, Employease, Inc.
䡲 Christopher R. Gardner, software developer, McKesson Information Solutions
䡲 David Deriso, senior software engineer, Employease, Inc.
䡲 Mike Heinrich, software engineer, Canada
䡲 Rodney Waldoff, director of systems architecture, Encyclopedia Brittanica
Inc.
䡲 Thomas SMETS, software engineer, Belgium
䡲 Linda Rising, Ph.D., independent software consultant, Arizona State University
䡲 Ray Tayek, coordinator LAJUG/OCJUG

© 2004 by CRC Press LLC


In particular, thanks to Pradyumn Sharma, Carsten Kuckuk, and Tim Kemper
for their insightful recommendations, their thoroughness, and their invaluable
suggestions, including questions that an inquisitive reader might have about design
patterns.
I would like to thank Mark Grand for his encouragement and advice on various
aspects of writing a patterns book. I am sure I have forgotten someone important;
please accept my sincere apologies.

© 2004 by CRC Press LLC


Random documents with unrelated
content Scribd suggests to you:
On Thursday morning, just at sunrise, the ponderous engine began
to crawl forward on its half-mile journey. Slowly but surely it crept
along, till at ten o’clock it was less than three hundred yards from
the ranch. In vain did the White Caps concentrate their fire on the
moving fortress; their bullets were absorbed by the hay as water by
a sponge. Inside the beleaguered ranch all was excitement and
terror. Only too well did they know the fate that awaited them unless
the grim monster advancing on them was checked. Benton called his
boys together. “Boys, we must stop that fort or die like rats in a
trap,” he said. “I want twenty men to follow me. Each will take a
torch in one hand and his six-shooter in the other, and I promise one
thousand dollars to the first man to fire the hay walls of the fort.”

The moving fort was now less than a hundred yards from the house,
and the furious fire from the hills and pits that had covered its
advance died down as the Rustlers lay, with their loaded rifles silent,
waiting for some move on the part of the White Caps.

Within the ranch-house all was quiet. The twenty men selected for
the dash stood with their right hands clenched around the butts of
their heavy Colts and their lefts grasping kerosene-soaked torches.
All eyes were fixed on their leader, who stood next to big Ben
Williams, who was noiselessly removing the bars from the door.
“Ready, boys!” came in clear, low tones from Benton as the last bar
was lifted from its socket. Every man braced himself for the leap—
ready, in fact, anxious, to have the dreadful suspense at an end,
though each well knew that the opening of the door would be a
signal for five hundred rifles to sweep the space between the house
and the fort with a perfect hail of lead. Quickly the door swung
open, and Benton leaped out. His eyes swept the surrounding hills;
then he turned and tried to leap back into the protection of the log
walls again. But all in vain! Quicker than thought came a flash of fire
from a loophole in the fort, and Benton fell in the doorway with a
bullet from Tom Champion’s rifle through his lungs.
“Keep back, boys!” he gasped. “Stay inside. You’re saved—the troops
are coming.” They dragged him in, but these were his last words;
the heavy hand of the avenging angel had fallen on him, and he had
gone for a final reckoning.

“To the loopholes, boys!” shouted Williams, who had now taken
command. “Shoot as you never shot before. If we can hold them in
check for five minutes we are saved.”

From loopholes and cracks thirty-five rifles concentrated their fire on


the hay fort, and the furious storm of lead caused Champion and the
twenty men behind the bales to lie low and hug the ground. They
knew that the fire could not long be sustained at that rate, and that
when it slackened they could advance with fewer casualties.
Glancing from a loophole to the north, Tom Champion saw two lines
of brown-coated men, riding furiously in the midst of a cloud of dust,
sweep over the hills less than a mile away. “Boys, the troops are
coming!” he shouted. “Quick! light a fuse and try a throw from here.”

Hastily the bomb was prepared and thrown. The five-pound parcel of
dynamite circled through the air and fell only ten feet short of the
wall. For an instant there was silence; then came the explosion, and
for a few minutes all was hid in a blinding cloud of dust. When it
settled it revealed a gaping hole in the side of the house and the dim
forms of men inside striving desperately to replace the dislocated
logs.

“To the loopholes, boys! Pick them off!” cried Champion, but before
a shot could be fired, between them and the house swept a line of
cavalry, and the fight at the A—-T had passed into history.

Clothed in the uniform and authority of the United States army, fifty
men from the Thirteenth Cavalry robbed five hundred raging
Rustlers of their prey. No true American can fire on the army
uniform, and cursing and furious, but powerless to interfere, the
Rustlers could only stand by and watch thirty-five men—all that were
left of the invaders—come forth and surrender themselves to
Captain Watterson and his men, to be transported to Cheyenne for
trial for the murder of Ray, Champion, and others. They were
ultimately released without the formality of a trial after some of the
moneyed cattle kings had conferred with the State officials.

“BENTON FELL IN THE DOORWAY WITH A BULLET FROM TOM CHAMPION’S


RIFLE THROUGH HIS LUNGS.”

Dr. Hays, Ben Williams, and other of the leading cattlemen fled from
the country, never to return. Their buildings were burned, their
horses and cattle shot on sight by the Rustlers, while their calves
bore the brand of the first man to see them. Many a wealthy rancher
in that district to-day owes his start to the calves he gathered up
when the big outfits went to pieces.

So ended one of the most sanguinary cattle wars that the West has
ever witnessed. All that remains to-day to recall it is a group of
bullet-scarred buildings, surrounded by weed-grown rifle-pits, some
two hours’ ride south-east of Buffalo, near the junction of Muddy
Creek with the north fork of the Crazy Woman.
THE WIDE WORLD: In Other
Magazines

A HETEROGENEOUS COLLECTION.

F or one wishing to study the ways of the lowest dregs of this earth,
I would advise him to give the slums of London a rest, and watch
the throngs who besiege the offices of the agents who undertake to
supply the cattlemen with help at Montreal. German and Russian
Jews, Dukhobhors, Italians, negroes, Dr. Barnardo boys, homesick
for their beloved slums; broken-down “sharks” and “confidence men”
from the large cities of the States; one-time moneyed youths from
the larger English towns, who have run through the capital given
them to start in business, and are returning on the chance of getting
more. All bustling and hustling each other after the same prize—a
free passage to London, the home, and often the grave, of the
desperate.—“THE CAPTAIN.”

TRAVELLING IN ICELAND.

By the average individual (unless he happens to be a salmon-


fisher) Iceland is imagined to be a place somewhere within the
region of the Arctic Circle and to be a land of eternal winter. The
fishing enthusiast knows it only as a paradise of his craft and values
it accordingly. Some tourists visit the island for a week or so in
summer, and get as far as Thingvellir, or if they are not too saddle-
sore they may see Geysir. But only a very select few have travelled
for weeks on the hardy little ponies and known to the full the
exceeding delight of day after day spent in the wonderful Icelandic
air and of riding through the green valleys and fording the
numberless rivers and streams of Iceland. To those who can ride and
are keen on an open-air life and who are lovers of scenery the island
should appeal, and this should apply even more so to those tired of
the ways of cities, for there are no railways in Iceland, no motors,
and there were until very recently no telegraphs.—“WOMAN’S LIFE.”

A LUCKY FALL OF SNOW.


O n the Trans-Siberian Railway not long ago some train-wreckers,
anticipating the Continental express, had been busily engaged for
some hours tearing up the permanent way. But, in the meantime, so
heavy a fall of snow had occurred that the mail had been completely
blocked some few miles before reaching the work of destruction. In
this way the robbers were defeated of their prey, and the gangs of
workmen who afterwards went out to clear the line discovered the
damage on digging away the snow.—“TIT-BITS.”

WOMEN’S SPORT IN SWEDEN.

In no other European country do sports occupy so large a place in


women’s lives as they do in Sweden. This is especially the case in
winter, when traffic and social intercourse are hindered by the snow
and, but for outdoor games and exercises, life in the great castles
and country estates would be monotonous and dull for the women
of the upper classes. This is the time, however, when the Swedish
ladies most enjoy themselves, for they pass their days in skating,
skiing, tobogganing, coasting, and in training for the races which
take place at Stockholm and in most of the more populated parts of
the country.—“THE LADIES’ FIELD.”

AN UNCONVENTIONAL AMUSEMENT.

T he “Mengeleusha,” or “slippery place,” near Kuala Kangsar, Perak,


Federated Malay States, is a solid piece of granite, about seventy
or eighty feet long, standing in a stream of water and forming a sort
of waterfall. The water flowing down this rock makes it as slippery
as glass, and the amusement is to slide down the rock and splash
into the pool beneath. This snapshot shows an Englishman half-way
down the slide.—“THE STRAND MAGAZINE.”
Odds and Ends.
A Battle-Royal “You Dirty Boy”—
Bavarian “Death-Boards”—An
Extraordinary Sacrifice, etc., etc.

UR first photograph represents what must have been a


battle-royal, and one which ended fatally for all concerned.
It took place during the night, in the back yard of a house
in Central Queensland, Australia, and the combatants were all found
dead in the morning exactly as seen in the photograph. It is
supposed that the snake must have bitten the kitten, and the
mother cat, coming to its rescue, fought the snake and broke its
back, but not before she had been fatally bitten herself. Cats are well
known to be very clever at breaking snakes’ backs with their claws.
A BATTLE ROYAL WHICH ENDED FATALLY FOR ALL CONCERNED—THE SNAKE
KILLED THE KITTEN, AND THE MOTHER, COMING TO THE RESCUE, KILLED THE
SERPENT, BUT SUCCUMBED HERSELF TO THE SNAKE’S BITE.
From a Photograph.

The top snapshot on the next page was taken during a tramp
through the jungly district around Sourabaya, a small town in Java.
The picture shows a Javanese woman washing her child under a
falling stream of water. Evidently the youngster is not enjoying the
performance, and evinces his disapproval of the proceedings by
kicking out in all directions and struggling vigorously. As a result of
these contortions the outline of his body in the picture is rather
obscure. It is interesting to note how the water has been brought to
the rudely-constructed circle of masonry which serves as a reservoir.
Having no system of pipes to facilitate the distribution of water, the
natives fall back on Nature to assist them in this direction. They cut
down betelnut trees, split them in half from top to bottom, and
scoop out the inside substance, thus making a series of cylindrical
troughs. These are dried in the sun, after which a number of them,
joined end to end and placed at a gentle slope, will convey water
from any natural source to within convenient distance of a village or
group of houses. The end of one of these artificial water-courses is
seen in the picture.

“YOU DIRTY BOY”—A JAVANESE MOTHER WASHING HER CHILD IN A “HOME-


MADE AQUEDUCT.”
From a Photograph.
Here is a curious little snapshot from Java. The ancient cannon seen
in the photograph is situated near the railway station at Batavia, the
capital of the island, and is believed by the natives to possess the
peculiar power—particularly strange in the case of so incongruous an
object as a cannon—of enabling childless married people to raise a
family. In pursuance of this strange belief many offerings are placed
by the superstitious near the cannon; three are seen in the
foreground of the photograph. Another legend which attaches to this
particular gun is to the effect that when it and another piece of
ordnance, which is also situated somewhere in the island, are
brought together, the Javanese will become a great and independent
nation.

AN ANCIENT CANNON TO WHICH PEOPLE MAKE OFFERINGS IN THE BELIEF


THAT IT ASSIST THEM TO RAISE A FAMILY.
From a Photograph.
In the eastern half of Bavaria, on the borders of Bohemia, lies the
so-called Bavarian Forest. This part of the country, although it boasts
beautiful scenery, is seldom visited by tourists, probably for the
reason that the charms of the region are little known even in
Germany. This part of Bavaria has been in many ways untouched by
civilization, and owing to its seclusion from the outer world some
very strange customs are still in vogue, strongly reminding one of
the Middle Ages. One of these strange customs, strictly observed by
the population, is the way in which they keep alive the memory of
their dead by the erection of what are called “totenbretter,” or
“death-boards.” These are wooden planks cut in the shape of
tombstones and roughly painted. Sometimes they bear also the
image of a saint. They are erected—often in a row of thirty and
more—on the roadside, in fields and meadows, near chapels and
crucifixes, in the village streets—in short, everywhere; they are even
nailed to houses and barns. They do not mark burial-places, as
might be supposed. As soon as a person has died the corpse is put
on a board, and there it lies in state until it is put into the coffin
shortly before the funeral. These boards, then, are the so-called
“death-boards,” and after the funeral they are cut into a suitable
shape, and decorated with an inscription containing the name of the
deceased, his age, and, in most cases, some lines of poetry. These
short poems, which are, of course, meant in sober earnest, are
occasionally very amusing. The boards are then stuck somewhere
near the road, or in the fields, where they sometimes accumulate to
an alarming number. In the poorer districts these boards are not
always cut into shape and painted, but are simply deposited just as
they are at the foot of some crucifix, where they remain untouched
until they moulder away. It must be admitted that the custom,
though interesting, seems open to objection from a hygienic point of
view, nor is it very exhilarating for the tourist to be reminded of
death wherever he may turn.
BAVARIAN “DEATH-BOARDS”—THEY DO NOT MARK BURIAL-PLACES, AND ARE TO
BE FOUND IN ALL SORTS OF ODD SITUATIONS.
From a Photo. by Kester, Berlin.

This wonderful fungus, found in the Garo Hills in Assam, has been
supplied by Nature with a delicate network of fine translucent
material, which seems to be intended to protect the stalk from the
attacks of insect life. The head of the plant, on the other hand, is
covered with some substance which attracts minute flies in great
numbers. For further defence Nature has given this weird fungus the
power of spreading around it a most offensive smell.
AN EXTRAORDINARY FUNGUS—IT GROWS IN A NIGHT AND BY MID-DAY HAS
ENTIRELY WITHERED.
From a Photograph.

The beautiful white tracery grows up in the night, commences to


droop as soon as the first rays of the sun reach it, and by midday
has entirely withered away.

IN SOME PARTS OF CHINA IT IS STILL CONSIDERED A VERY MERITORIOUS ACT


FOR A WIDOW TO COMMIT SUICIDE AFTER THE DEATH OF HER HUSBAND—THIS
PHOTOGRAPH SHOWS A WIDOW ABOUT TO MAKE AWAY WITH HERSELF IN THE
PRESENCE OF AN IMMENSE AND ADMIRING CROWD.

Old customs die very hard in China, and in several parts of the
Celestial Empire it is still considered a high act of virtue for a woman
to commit suicide after the death of her husband. According to the
law the proceeding is actually legal in some provinces, and such is
the state of public opinion that in districts where it is officially
prohibited the authorities rarely interfere. The striking photograph
which we reproduce on this page shows one of these extraordinary
voluntary sacrifices about to take place, with the widow herself, clad
in white—the Chinese mourning colour—the gallows erected for the
occasion, and the immense crowd gathered to witness the gruesome
spectacle.

AN ARIZONA BEDROOM—SO HOT IS THE CLIMATE, AND SO NUMEROUS THE


INSECTS AND REPTILIAN PESTS, THAT THE DWELLERS ON THE VERGE OF THE
DESERT FIND IT NECESSARY TO SLEEP IN WIRE CAGES SIMILAR TO THAT HERE
SHOWN.
From a Photograph.

The desert bordering on the Colorado River, in Southern Arizona, is


probably the hottest part of the United States in summer, where the
condition humorously generalized at “a hundred and forty in the
shade, and no shade,” prevails from June until September. The
intense heat of the sun-baked houses then makes them unbearable
even at night to the average sleeper, and open-air sleeping
apartments are accordingly needful for comfort. The photograph
shows one of these airy adjuncts to a desert home. The wire screen
that encloses the little room, like a bird-cage, serves to keep out
pestiferous insects, snakes, and other vermin.

THE MAP-CONTENTS OF “THE WIDE WORLD MAGAZINE,” WHICH SHOWS AT A


GLANCE THE LOCALITY OF EACH ARTICLE AND NARRATIVE OF ADVENTURE IN
THIS NUMBER.

Transcriber's Note:

Table of Contents added.


Inconsistent spelling and hyphenation are as in the original.
*** END OF THE PROJECT GUTENBERG EBOOK THE WIDE WORLD
MAGAZINE, VOL. 22, NO. 131, FEBRUARY, 1909 ***

Updated editions will replace the previous one—the old editions


will be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States
copyright in these works, so the Foundation (and you!) can copy
and distribute it in the United States without permission and
without paying copyright royalties. Special rules, set forth in the
General Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the


free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree
to abide by all the terms of this agreement, you must cease
using and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only


be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project Gutenberg™
works in compliance with the terms of this agreement for
keeping the Project Gutenberg™ name associated with the
work. You can easily comply with the terms of this agreement
by keeping this work in the same format with its attached full
Project Gutenberg™ License when you share it without charge
with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and
with almost no restrictions whatsoever. You may copy it,
give it away or re-use it under the terms of the Project
Gutenberg License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country
where you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of
the copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute


this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebooknice.com

You might also like