1、微信公众号设计外文翻译文献微信公众号设计外文翻译文献 (文档含中英文对照即英文原文和中文翻译) 微信公众号后台设计下面来介绍一下本系统的总体设计思路。1 总体结构首先是结构图如图5-1-1所示。图5-1-1 总体结构图1.1 功能分配通过对上面功能需求的分析总结得出,各项功能需求的实现同各块程序的分配关系如表5-1-2所示。表5-1-2 功能分配表用户资讯图片添加修改删除查看2 数据结构设计数据结构是代码实现的先决条件,一个良好的数据设计可以使各部分功能实现起来更加轻松。2.1 逻辑结构设计 数据库的逻辑设计是将各局部的结构图进行分解、合并后重新组织起来形成数据库全局逻辑结构,包括所确定的关键
2、字和属性、重新确定的记录结构、所建立的各个数据之间的相互关系。根据本系统需求分析,系统的数据库包括了身份验证、管理员身份、用户身份、数据同居和论坛检索等几个部分。2.2 物理结构设计此处只列举出部分数据库表的设计数据结构和程序关系数据结构为关系型数据库,所以,在程序中可以通过标准的SQL语句与数据结构进行交互,交互过程中采用通用的数据库访问接口。为了保持良好的程序架构,对数据库访问采用DAO设计模式实现,提高维护性及扩展性。物理数据结构主要用于各模块之间信息的传递,借口传递的信息将是以数据结构封装了得数据,以参数传递或返回值的形式在各模块之间传输。3 运行设计运行设计包括运行模块组合、运行控制
3、和运行时间。3.1 运行模块组合本程序主要是以一个网页为模块,一般一个网页完成一个特定的功能,主网页通过打开另一个子网页来实现各个模块之间不同的功能的连接和组合。各个模块之间相对独立,程序的可移植性好。各个模块之间主要以传递数据项的引用来实现模块之间的合作和数据共享。运行控制只要符合操作说明书,用户可以自由控制,不额外限定用户输入,异常程序内部进行处理,给出相应的提示信息。3.2 运行时间由用户决定,但每次操作的响应时间上限控制在3s以内4 出错处理设计我认为,只要是人做出来的系统是不可能没有出错的时候,更何况是我这样刚毕业的新手。所以我还设计了出错处理,主要是对我能想到的可能出现的错误或者说
4、bug进行的分析和处理。4.1 数据库连接错误这类错误主要是数据库设置不正确引起的,我们只要取消本次操作,提醒维护人员自己检查数据库问题即可。4.2 输入错误主要是用户输入不规范造成的,我们在尽量减少用户出错的条件的情况下对用户进行提醒,然后再次操作。4.3 乱码主要发生在提交汉字信息的情况下,这是我们只需要对提交的汉字从新进行编码即可。4.4 操作错误对于用户的不正当操作,有可能是程序发生错误。我们主要是种植操作,并提醒用户种植的原因和操作规范。4.5 不可预知错误程序也会有一些我们无法预知或没有考虑完全的错误,我们对此不可能做出完全的异常处理,为了保证数据的安全,要经常对数据库进行备份。然
5、后犯规错误信息,以逐步完善程序。5 安全保密设计5.1 系统安全常见的系统安全有网络蠕虫侵害,系统漏洞与补丁,以及客户信息丢失等。应对知识库进行安全的开发与管理。以及定时发布安全信息警告。常用的系统安全措施有:1. 安装安全工具,在使用论坛时,一定要为电脑安装安全工具,同时把效验码放到安全的地方,以便日后对系统进行检查。2. 配置防火墙对网络进行预防。3. 根据CERT的UNIX/NT配置指南检查系统的安全性。CERT的UNIX/NT配置指南可以帮助你检查系统中容易被入侵者利用的配置问题。5.2 数据安全数据安全主要包括以下几个方面:1. 对数据用户进行身份鉴别。2. 访问主体、访问对象的控制
6、策略和实现方法。3. 数据加密方法。6 维护设计A. 基础数据维护:对于一些基础数据,安排管理员进行维护B. 数据库备份和恢复:利用Navicat for MySQL自身提供的备份和恢复功能实现。C. 系统升级维护:根据用户使用效果调查表,筛选用户提出的功能要求,对于合理的要求予以采纳,并安排人员对系统进行修改和完善。D. 定期建立数据库备份,一旦服务器数据库被破坏,可以使用最近的一份数据库副本进行还原。E. 为防止服务器故障,预备另外一台服务器,主要主服务器出现故障,可以迅速启动预备服务器运行系统。F. 恢复及再启动技术说明将使用的恢复再启动技术,使软件从故障点恢复执行或使软件从头开始重新运
7、行的方法。WeChatpublic No. backgrounddesign1 system designTo introduce the followingdesign ideasof the system.1.1 overall structureThe first isthe structurediagramas shown in figure 5-1-1.Figure 5-1-1schematic structure1.2 distributionfunctionThrough the analysis of the functional requirements of the abo
8、ve are summarized, the functional requirements to achieve table 5-1-2 shown with each block distribution relationship.Table 5-1-2functionallocation tableUserInformationPictureAdd toModifyDeletecheck2 data structure designData structure is the code to achieve the prerequisites, a good data design can
9、 make the function of each part can be more easily.2.1 Logical structure designLogic design of the database is decomposition, merger and re organized into global database logic structure of the various parts of the structure, including the relationship between the determined keywords and attributes,
10、 to determine the record structure, the establishment of various data.According to the system demand analysis, system database includes authentication, administrator, user identity, cohabitation data and forum retrieval several parts.2.2 Physical structure designHereonly to enumeratepart of the desi
11、gn ofdata structure and programdatabase tablerelationshipData structure for the relational database, so in the program can interact via standard SQL statements and data structure, interaction process in the general database access interface.In order tomaintain a goodprogram structure,access to the d
12、atabaseusing DAO designmode,improve themaintainability and scalability.Physical structure of the data is mainly used for the information transfer between each module, an excuse to deliver the information will be encapsulated in the data structure of terrible data, to pass parameters or return values
13、 of transmission between the modules.3 Operation designThe operation designincludes the operationmodule combination,operation controland operationtime.3.1 operationmoduleThis procedure is mainly to a web page module, general a web page complete a specific function, the main page through open another
14、 sub page to realize each module between different functional connections and combinations.Each moduleis independent,programportability.Each modulebetween the mainreferencetothe data itemto achievedata sharingandcooperationbetween modules.Operation controlAs long as it meets the operating instructio
15、ns, the user can control the free, no extra limited user input, internal program exception processing are the corresponding message.3.2 Run timeThe decision by the user,but the response timelimitof each operationwithin 3S.4 Design of the errorI believe that as long as people make it out to the syste
16、m is not possible without error when, not to mention I just graduated from the novice.So I designed the error handling, mainly is to I can think of possible error or bug analysis and processing.4.1 database connection errorThis type of error is mainly database settings incorrect caused, we just canc
17、el the operation remind maintenance personnel to check their database can be.4.2 input errorIs mainly user input caused by irregular, we in minimizing the error to the user for reminding a user, and then retry the operation again.4.3 GarbledMainly occurs in thecase ofinformationsubmittedChinese char
18、acters,this iswe only need tosubmitthecodetothe newChinese characters.4.4 Operation errorTheimproperoperation of the user,theremay be an errorprogram.Weareplanting,reasonsand operating rulesand alerts the userof theplant.4.5 unpredictableerrorProcedures will be some we can not predict or not conside
19、red completely wrong, we this could make a complete exception handling, often make a backup copy of the database to ensure data security.Then foulerror information,in order to gradually improve theprogram.5 Securitydesign5.1 system securityCommonsystem securitynetworkworminfringement,system vulnerab
20、ilities andpatches,and theloss of customer informationetc.To deal with theknowledge basefor the development and managementof safety.Safetywarninginformationand timed release.System securitymeasuresare commonly used:installation security tools, in the use of the forum, be sure to install security too
21、ls for computer, at the same time, the checksum into a safe place, for the future of the system are examined.configurethe firewall to networkprevention.according to theUNIX/NT securityconfiguration guideinspection systemof CERT.UNIX/NT configuration guideCERT canhelp youto check the systemconfigurat
22、iontointruders use.5.2 data securityData securitymainly includes the following several aspects:of the datauseridentification.the mainaccesscontrol strategyand realization method ofaccess object.data encryption method.6 maintenance designA.basic data maintenance:for some of the basicdata,arrange them
23、aintenanceadministratorB. database backup and recovery:using NavicatforMySQLto provideitsbackup and recoveryfunctions.C. system upgrade and maintenance: according to the user the use effectiveness questionnaire, screening the user functional requirements, for the reasonable requirements should be ad
24、opted, and arrange to amend and perfect the system.D. regular establishment of database backup, once the database server is destroyed, can use a recent copy of the database to restore.E. in order to prevent the server failure, prepare another one server, the main server failure, can quickly start the backup server operating system.F. recovery and restart technology that will use the recovery restart technique, the software execution or make the software from scratch re run the recovery from the point of failure.
copyright@ 2008-2022 冰豆网网站版权所有
经营许可证编号:鄂ICP备2022015515号-1