Browse Definitions :
Definition

monolithic architecture

Contributor(s): Ivy Wigmore

A monolithic architecture is the traditional unified model for the design of a software program.

monolithic, in this context, means composed all in one piece. Monolithic software is designed to be self-contained; components of the program are interconnected and interdependent rather than loosely coupled as is the case with modular software programs. In a tightly-coupled architecture, each component and its associated components must be present in order for code to be executed or compiled.

Furthermore, if any program component must be updated, the whole application has to be rewritten, whereas in a modular application, any separate module (such as a microservice) can be changed without affecting other parts of the program. Modular architectures reduce the risk that a change made within one element will create unanticipated changes within other elements, because modules are relatively independent. Modular programs also lend themselves to iterative processes more readily than monolithic programs.

However, there are benefits to monolithic architectures as well. Monolithic programs typically have better throughput than modular approaches, such as the microservice architecture (MSA) and they can be easier to test and debug because, with fewer elements there are fewer variables that come into play.

This was last updated in May 2016

Continue Reading About monolithic architecture

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

Database server(s), application server(s), and front-end - it's all modular. Not exactly "one piece". It just scales differently comparing to micro-services.
Cancel
When should I use monolithic, layered and SOA?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close