I. Full-text search
Lecene framework <Research and Implementation of LUCENE-based search engines>
Ii. Cache
Implement page-level URL caching <effective web crawler-based URL caching>
3. generate static files
Bytes
4. static files are stored on independent servers.
CSS, JS, images, files, etc. Use an Apache server to process requests
V. distributed development
Data synchronization between servers: synchronization of server data in the same region as Sina; easy to use server integration, servers can be divided: WEB server, Session server, database server, static file server, etc. a web service may be integrated by dozens of machines to provide services.
6. Database splitting
Database Table splitting and database table field splitting
VII. Search Engine Optimization
SEO
8. Access monitoring
JMS
9. unit test and high-concurrency access test
10. Production of development documents
E-R diagram, class relationship diagram, Requirement Specification, detailed design specification, data dictionary and other E-R Diagram
The E-RE-R Diagram, the Entity Relationship divisor, provides a way to represent the Entity, attributes, and associations to describe the conceptual models of the real world. E-R method: is short for Entity-Relationship Approach. It is an effective method to describe the conceptual structure model of the real world. The basic elements of a E-R diagram are solid shape, attributes, and links. The representation is as follows: Entity: entities with the same attributes have the same characteristics and properties, abstract and portray similar entities with entity name and attribute name set; In the E-R diagram, it is represented by a rectangle, the entity name is indicated in the rectangle box; for example, the student Zhang Sanfeng, student Li xunhuan are entity. If the object is a weak object, the solid rectangle is placed outside the rectangle. · Attribute: a feature of an object. An object can be characterized by several attributes. In the E-R diagram, it is represented by an elliptical shape and connected with the corresponding entity with an undirected edge; for example, the student's name, student ID, gender, are attributes. If it is a multi-value attribute, then the real-line elliptic is placed outside the elliptical shape. If it is a derived property, it is represented by a dotted-line elliptic. · Relationship: A link is also known as a link. in the information world, the link between entities or entities is reflected. The internal links of an object usually refer to the links between attributes of an object. The links between entities usually refer to the links between different entity sets. In the E-R diagram, the contact name is indicated in the diamond box, and connected with the relevant entities with the undirected edge respectively, and the type of the contact on the undirected edge mark (1: n or m: n ). For example, there is a relationship between the teacher's teaching and the student's course selection. If it is the relationship between weak entities, then the diamond is placed outside the diamond. Steps for creating a E-R diagram:
(1) determine all object sets (2) Select the attributes that the object set should contain (3) determine the relationship between object sets (4) determine the keywords of the object set, use an underscore to indicate the Attribute combination of keywords to determine the contact type. When a line is used to contact the contact's diamond box to the entity set, it indicates 1 or n (multiple) next to the line) to indicate the contact type.
11. dynamic deployment
Ant and other tools
12. Form submission Verification
For client verification and server verification, note that after the server verification fails, you must return to the page before submitting the customer form, all the information entered before submission by the customer is displayed, prompting the customer where an error occurred for modification. It is best to define some global verification rules, if the E-mail Verification
XIII. Use of AJAX asynchronous calling Technology
The use of the mask layer is applied to the verification of some data. If the login name is used, a prompt indicating loading wait information is displayed.
Iv. Data Backup
An independent backup server is available for synchronous data backup.