大众媒体新媒体外文翻译文献综述(文档含中英文对照即英文原文和中文翻译)微信公众号后台设计下面来介绍一下本系统的总体设计思路。
1 总体结构首先是结构图如图5-1-1所示。
图5-1-1 总体结构图1.1 功能分配通过对上面功能需求的分析总结得出,各项功能需求的实现同各块程序的分配关系如表5-1-2所示。
表5-1-2 功能分配表2 数据结构设计数据结构是代码实现的先决条件,一个良好的数据设计可以使各部分功能实现起来更加轻松。
2.1 逻辑结构设计数据库的逻辑设计是将各局部的结构图进行分解、合并后重新组织起来形成数据库全局逻辑结构,包括所确定的关键字和属性、重新确定的记录结构、所建立的各个数据之间的相互关系。
根据本系统需求分析,系统的数据库包括了身份验证、管理员身份、用户身份、数据同居和论坛检索等几个部分。
2.2 物理结构设计此处只列举出部分数据库表的设计数据结构和程序关系数据结构为关系型数据库,所以,在程序中可以通过标准的SQL语句与数据结构进行交互,交互过程中采用通用的数据库访问接口。
为了保持良好的程序架构,对数据库访问采用DAO设计模式实现,提高维护性及扩展性。
物理数据结构主要用于各模块之间信息的传递,借口传递的信息将是以数据结构封装了得数据,以参数传递或返回值的形式在各模块之间传输。
3 运行设计运行设计包括运行模块组合、运行控制和运行时间。
3.1 运行模块组合本程序主要是以一个网页为模块,一般一个网页完成一个特定的功能,主网页通过打开另一个子网页来实现各个模块之间不同的功能的连接和组合。
各个模块之间相对独立,程序的可移植性好。
各个模块之间主要以传递数据项的引用来实现模块之间的合作和数据共享。
运行控制只要符合操作说明书,用户可以自由控制,不额外限定用户输入,异常程序内部进行处理,给出相应的提示信息。
3.2 运行时间由用户决定,但每次操作的响应时间上限控制在3s以内4 出错处理设计我认为,只要是人做出来的系统是不可能没有出错的时候,更何况是我这样刚毕业的新手。
所以我还设计了出错处理,主要是对我能想到的可能出现的错误或者说bug进行的分析和处理。
4.1 数据库连接错误这类错误主要是数据库设置不正确引起的,我们只要取消本次操作,提醒维护人员自己检查数据库问题即可。
4.2 输入错误主要是用户输入不规范造成的,我们在尽量减少用户出错的条件的情况下对用户进行提醒,然后再次操作。
4.3 乱码主要发生在提交汉字信息的情况下,这是我们只需要对提交的汉字从新进行编码即可。
4.4 操作错误对于用户的不正当操作,有可能是程序发生错误。
我们主要是种植操作,并提醒用户种植的原因和操作规范。
4.5 不可预知错误程序也会有一些我们无法预知或没有考虑完全的错误,我们对此不可能做出完全的异常处理,为了保证数据的安全,要经常对数据库进行备份。
然后犯规错误信息,以逐步完善程序。
5 安全保密设计5.1 系统安全常见的系统安全有网络蠕虫侵害,系统漏洞与补丁,以及客户信息丢失等。
应对知识库进行安全的开发与管理。
以及定时发布安全信息警告。
常用的系统安全措施有:1.安装安全工具,在使用论坛时,一定要为电脑安装安全工具,同时把效验码放到安全的地方,以便日后对系统进行检查。
2.配置防火墙对网络进行预防。
3.根据CERT的UNIX/NT配置指南检查系统的安全性。
CERT的UNIX/NT配置指南可以帮助你检查系统中容易被入侵者利用的配置问题。
5.2 数据安全数据安全主要包括以下几个方面:1.对数据用户进行身份鉴别。
2.访问主体、访问对象的控制策略和实现方法。
3.数据加密方法。
6 维护设计A.基础数据维护:对于一些基础数据,安排管理员进行维护B.数据库备份和恢复:利用Navicat for MySQL自身提供的备份和恢复功能实现。
C.系统升级维护:根据用户使用效果调查表,筛选用户提出的功能要求,对于合理的要求予以采纳,并安排人员对系统进行修改和完善。
D.定期建立数据库备份,一旦服务器数据库被破坏,可以使用最近的一份数据库副本进行还原。
E.为防止服务器故障,预备另外一台服务器,主要主服务器出现故障,可以迅速启动预备服务器运行系统。
F.恢复及再启动技术说明将使用的恢复再启动技术,使软件从故障点恢复执行或使软件从头开始重新运行的方法。
WeChat public No. background design1 system designTo introduce the following design ideas of the system.1.1 overall structureThe first is the structure diagram as shown in figure 5-1-1.Figure 5-1-1 schematic structure1.2 distribution functionThrough the analysis of the functional requirements of the above are summarized, the functional requirements to achieve table 5-1-2 shown with each block distribution relationship.Table 5-1-2 function allocation table2 data structure designData structure is the code to achieve the prerequisites, a good data design can make the function of each part can be more easily.2.1 Logical structure designLogic design of the database is decomposition, merger and re organized into global database logic structure of the various parts of the structure, including the relationship between the determined keywords and attributes, to determine the record structure, the establishment of various data. According to the system demand analysis, system database includes authentication, administrator, user identity, cohabitation data and forum retrieval several parts.2.2 Physical structure designHere only to enumerate part of the design of data structure and program database tablerelationshipData structure for the relational database, so in the program can interact via standard SQL statements and data structure, interaction process in the general database access interface.In order to maintain a good program structure, access to the database using DAO designmode, improve the maintainability and scalability. Physical structure of the data is mainly used for the information transfer between each module, an excuse to deliver the information will be encapsulated in the data structure of terrible data, to pass parameters or return values of transmission between the modules.3 Operation designThe operation design includes the operation module combination, operation control and operation time.3.1 operation moduleThis procedure is mainly to a web page module, general a web page complete a specific function, the main page through open another sub page to realize each module between different functional connections and combinations. Each module is independent, programportability. Each module between the main reference to the data item to achieve data sharingand cooperation between modules. Operation controlAs long as it meets the operating instructions, the user can control the free, no extra limited user input, internal program exception processing are the corresponding message.3.2 Run timeThe decision by the user, but the response time limit of each operation within 3S.4 Design of the errorI believe that as long as people make it out to the system is not possible without error when, not to mention I just graduated from the novice. So I designed the error handling, mainly is to I can think of possible error or bug analysis and processing.4.1 database connection errorThis type of error is mainly database settings incorrect caused, we just cancel the operation remind maintenance personnel to check their database can be.4.2 input errorIs mainly user input caused by irregular, we in minimizing the error to the user for reminding a user, and then retry the operation again.4.3 GarbledMainly occurs in the case of information submitted Chinese characters, this is we only need tosubmit the code to the new Chinese characters.4.4 Operation errorThe improper operation of the user, there may be an error program. We are planting, reasonsand operating rules and alerts the user of the plant.4.5 unpredictable errorProcedures will be some we can not predict or not considered completely wrong, we this could make a complete exception handling, often make a backup copy of the database to ensure data security. Then foul error information, in order to gradually improve the program.5 Security design5.1 system securityCommon system security network worm infringement, system vulnerabilities and patches, and the loss of customer information etc.. To deal with the knowledge base for the development and management of safety. Safety warning information and timed release. System securitymeasures are commonly used:installation security tools, in the use of the forum, be sure to install security tools for computer, at the same time, the checksum into a safe place, for the future of the system are examined.configure the firewall to network prevention.according to the UNIX/NT security configuration guide inspection system of CERT. UNIX/NT configuration guide CERT can help you to check the system configuration to intruders use.5.2 data securityData security mainly includes the following several aspects:of the data user identification.the main access control strategy and realization method of access object.data encryption method.6 maintenance designA. basic data maintenance: for some of the basic data, arrange the maintenance administratorB. database backup and recovery: using Navicat for MySQL to provide its backup and recovery functions.C. system upgrade and maintenance: according to the user the use effectiveness questionnaire, screening the user functional requirements, for the reasonable requirements should be adopted, and arrange to amend and perfect the system.D. regular establishment of database backup, once the database server is destroyed, can use a recent copy of the database to restore.E. in order to prevent the server failure, prepare another one server, the main serverfailure, can quickly start the backup server operating system.F. recovery and restart technology that will use the recovery restart technique, the software execution or make the software from scratch re run the recovery from the point of failure.。