1、Let us look at some of the most important operational level and that level division guidelines :Separation of the UI code and business logic. This includes preparation coupled with the UI code, such as the use of ASP components MTS internal target it with the business logic code separation, as in a
2、different DLL.affair will be separated with the ASP page. Services ASP in certain cases beyond compare, but the components and multi-storey applications will change this situation. Components should not be dependent on the client layer to manage their affairs and business logic semantics.Will be exp
3、ressed components (use solicit and responsive components) and Web server on the same machine and / or tenor. If the use of ASP internal components of the target objects on remote machines, then all of the internal components will be available in retail form. Server client access is COM+ server, whic
4、h significantly reduced the performance and security of complicated. These markings will be lay in COM+ applications mark as library activated .ASP exist in server, ASP pages must be consistent with resource sharing rules, and remember to flexibility. Look at the following details :In the conversati
5、on, management should avoid user specific state. Keep ASP stateless and where possible to allow resources pool.Mode operation:In evaluating whether a code of business logic layer or expressed, may I ask myself: If I have to use click-phone applications to replace my ASP page, then the code are there
6、?/SPAN/PP class=Mso Normal style=TEXT-JUSTIFY: inter-ideograph; MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justifySPAN lang=EN-USFONT face=Times New Roman size=3If the answer is yes , then it could try to business logic code into machine code or user interface to help.If changed after the client code can not
7、be used, or if it is constructed with the help of the user interface, the code is expressed services layer. It ASP page, or in the internal components used ASP components. It does not belong to the operational targets of components. Understanding of the distinction between desktop and ASP clientIt w
8、as modular incumbent engine,different tables top tradition uniline ran win32 application from that asp. Key distinction generalize as follows: Thread management : ASP is a multi-client threads. This means that it can have many activities in the operation, perhaps at the same time dealing with differ
9、ent ASP page. This shows that it is not the only pseudo-objects to exclusive system users. This may be unexpected reactions, for example, into a bad habit : the object stored in ASP application variables or conversation.Security environment : ASP is the Web site of the Internet Information Services
10、5.0 implementation, a low, medium, high three separate degrees. The Web site can even have different security setup, or refuse to allow anonymous access, for customer and so on. All these have generated a lot of programs, namely, the use of different end-user account is your object.Easy rose : This
11、is not a technical issue, but Web applications provide facilities Deputy effect. Traditionally, the increase in user base for desktop applications, the number of requests carefully planned well known to the client transferred. ASP has changed the process in motion and operational, ASP-Visual Basic a
12、pplications can be conveniently opened for local or worldwide for all staff, all business partners and customers all use. This approach can be used to describe - owned super links individual e-mail users can make a tenfold increase in the base. To prepare for your applications? The only way to under
13、stand the intensity of Web sites for testing to obtain the expected value of the actual performance. Detailed information on the intensity of the test, please refer to the application life cycle section.In the use of Visual Basic ASP should target? In the context of the establishment and abolition o
14、f pages of your audience. In other words, as far as possible so that no state ASP pages only in a state of dependence conversation or temporary applications variables. Not to target storage applications in English or variables. This will lock in your conversation ASP systems, the expected value of f
15、lexibility may cancel all. In other words, the Web servers handle no more than a few dozens of users. If required, in English or applications stored content, please turn it into the data rather than objects. There are many other criteria can be observed. We recommend that you read MSDN Voices, .J.D.
16、 Meier compose the column Servin SPAN style=mso-spacerun: yes It Up. The column includes a lot of technology, practice and skills development can contribute to the expansion and reliable ASP components and applications.Not to be quoted or applications memory at conversation all the inserted object c
17、omponents are Visual Basic 6.0 cell thread, that is to say they are operating in the Inter module. This means that if the thread established targets, then the object of all resources must use the same threads. Many threads (from it Web site users) use the same examples Agency targets, raises a serie
18、s of activities, the application process may become bottlenecks.In addition, in conversation with Server .Create Object stored within the object STA to be implemented threads can be effectively linked to the current user, thus it will be the largest applications to give users a few restrictions the
19、20xN (N = number of processors).If you according to our suggest to take object stateless, are not used for storage of a client, and stored in the context of their applications. Client will be able to establish an independent, use and cancellation of their own target. This reduces the need for mainta
20、ining conversation - because they do not retain the skills unique to the state. Recommended approach is to target a state, it needs a database or other storage area to visit (such as cookies and LDAP). If applications require the use of English or the scope of the data, the data should instead deal
21、with the subject of data stored in it. The dispose of the you could begin one genera,came encapsulation versus desirable value.ASP security management :The basic concept of security managementSafety management is based on information and ASP solution to manage the security strategy has set the secur
22、ity level definition process. Including management of the response to violations of the security act. ASP can be controlled without fear of attack and ASP clients business continuity, so to be able to deal with malicious attacks could really an art.Safety management in large measure dependent on the
23、 security strategy. These strategies could produce from different sources. To be considered when designing security strategy are :Service level agreement on the definition of external customer needs external security law requires external suppliers within the ASP security strategy and security strat
24、egy in the ASP environment integrated customer circumstances, the internal / external security strategy, For each solution, ASP must be defined security strategy. The strategy should be based on the various aspects of the most reliable Hop. According to customer needs, and even the basic structure w
25、ill be very different design. Usually use three safety design:The dedicated network joint of the both asp solution and safety precautions completeness by asp proceed end-to-end Control usually,these purport asp versus proprietary basic structure subassembly possess full control,include asp and clien
26、t of compartment. Public : ASP solutions and security measures by ASP component control. Usually, this means that within the ASP is in control of its own website, but does not guarantee to provide solutions to the public network with control. However, the ASP can be used as virtual private network (
27、VPN) to carry out such technical links between ASP and client security.Mixed : the solution is a combination of the previous two. dedicated and common solutions are used. In ensuring security solutions, and also involves ASP customers.There are five dimensions of the process needed to improve the MO
28、F model : planning : planning activities including in customer requirements, as well as internal and external strategies based on the legitimate demands of the SLA security component. In a dialogue with clients at the same time, it may be necessary to establish or adjust internal security strategy. Of course we should decide whether to do so by the ASP. This resulted in a level of security planning, including all aspects of the security strategy and design (infrastructure, personnel, steps, the environment, basic contracts, etc.).Implementation : Put stratification plane e
copyright@ 2008-2022 冰豆网网站版权所有
经营许可证编号:鄂ICP备2022015515号-1