Technical framework of E-business web site

Source: Internet
Author: User
Tags password protection website performance

A design principle the overall structure design of e-commerce platform should ensure the overall goal of the whole e-commerce platform from the aspects of system, function, information and process, in order to improve the market competition ability. The design of the overall structure should consider the following design principles: Rapid Response Principle: the opportunity is fleeting, the website should be able to respond quickly. On the one hand need to be able to update the content of the site according to business needs, on the other hand need to be able to quickly develop new website features, adapt to the new business model. High Availability principle: High availability contains multiple levels of meaning. First of all, the website must provide stable service, the website function remains at any time normal availability. Second, the interaction design focuses on the user experience. Finally, site performance must be excellent. These are based on the site of large user volume, high concurrent access to the premise. Security principle: The website platform must be able to ensure that the business data storage, transmission security, ensure that the data is not lost, not be unauthorized reading or modification. The open principle: the electronic commerce website must connect with the material management, the distribution and so on periphery system, in the design system architecture needs to consider the data integration demand comprehensively. The two-architecture system architecture is shown in 1. E-commerce platform integrates seamlessly with internal information management. Data on real-time sharing, business to open up the process, forming a joint effort to maximize the benefits of enterprise services. CLIP_IMAGE002 Figure 1 Architecture Three website Performance e-commerce website has the characteristics of large user volume, large traffic volume and high concurrency. Under normal conditions, the large data volume will degrade the performance of the website platform and slow down the system response speed. On the e-commerce site, users have high response speed requirements. In the design of the website architecture, the high performance of the website system will be maintained by the following methods: (a) dynamic separation and data cache database access performance is often the bottleneck of website performance. According to the experience data, when the user accesses the Internet station, more than 90% of the operation only reads the data, commits, modifies the data less than 10%. Therefore, you can generate static HTML pages for pages that are relatively fixed, primarily for users to browse, such as product display pages. Users can read HTML static files directly while accessing them without having to access the database. In this way, you can significantly improve site performance. For static content (Web pages, pictures, audio files, script files, etc.), you can choose the CDN (Content Delivery Network) to publish it, which improves the speed of website access through professional content publishing services. Frequently modified data can be processed using a cached approach. Memcach is powerful, easy to use, and supports distributed data processing, which can be used as a system caching scheme. (ii) DB cluster and application cluster can configure database cluster for read and write separation. Choose MySQL database, the main database is responsible for processing data write operations, for simple read operations, distributed to the database processing. When data changes, the primary database automatically synchronizes data to the slave database. thereby improving the overall performance of the database. You can configure as many servers as you want from the database serverService. can also be increased at any time according to business development. Different channels of the site are divided into different applications, support deployment to more than one server, targeted management. (iii) Rational planning of the network environment based on the estimation of business volume and user behavior analysis, you can calculate the bandwidth required for the website. According to the characteristics of user groups, reasonable choice of room. For the regional characteristics of the obvious site channel, you can set up a mirror site. For the country-wide Web site content, the need for telecommunications, netcom two-way access. Deploy bandwidth management devices and allocate bandwidth resources to different applications. (iv) Load balancing Configure load balancing for Application server and DB cluster, and make full use of system resources. (v) Database database system performance is the bottleneck of website performance. By configuring the database cluster to realize the read-write separation, the database access performance can also be improved through various techniques. As follows: Ø database sub-table: The same data table, different fields read and write frequency differences, or there are large segments, the use of vertical table, so as to reduce database I/O times, improve performance; When data entries in a database table increase and query performance is low, a horizontal table strategy is adopted to reduce the number of data entries in a single table. Ø make full use of index: Analyze user's query behavior and set up index reasonably. (vi) The program uses technical means to optimize programs and pages to make full use of the cache. Four security e-commerce sites exposed in the Internet environment, faced with a large security challenges. E-commerce website system needs to strengthen the system security from the following aspects: Server security, data transmission security, storage security. For the online business behavior, also need to have the identity authentication mechanism, realizes the non-repudiation. In order to achieve the goal, the following measures are required. (a) The establishment of a safety management system for the security of the website system, must be aimed at the security risks faced planning, formulate security policies, establish and at any time improve the security management system. You must regularly upgrade the software version, install patches, modify the security password, and back up important data according to the security management system. (ii) access control mechanism website platform should provide perfect user authentication and user password protection mechanism. Access to controlled information is protected through a variety of means. (iii) The architecture of the data encryption Internet and the TCP/IP protocol did not properly consider the need for security at the time of creation, so there were many security vulnerabilities and fundamental flaws that left attackers with an opportunity. Data is susceptible to eavesdropping, spoofing, and tampering during transmission over the network. Therefore, when a user transmits sensitive information to an e-commerce site or performs important operations, the transmitted data should be encrypted. It can be implemented by configuring the server to support the HTTPS protocol. can also be implemented by program control. According to the different types of key, the encryption algorithm can be divided into two kinds: symmetric key algorithm and asymmetric key algorithm. According to the different cipher system, it can be divided into sequence cipher algorithm and block cipher algorithm. In addition to providing the confidentiality of information, cryptographic algorithms combine with other technologies, such as hash functions, to provide integrity verification of information, ensuring that data is transmitted overThe process has not been tampered with. (iv) Digital signature in the real world, we often sign the document in order to prove responsibility for a particular file. In e-commerce, a similar mechanism is digital signature. The digital signature mechanism addresses the following security issues: Ø Denial: The sender does not acknowledge that the document was sent by him; Forge: Someone has forged a document, but claims to have been sent by someone; impersonate: send a file on the Internet as someone else's identity; O Tamper: The recipient has tampered with the contents of the file. The mechanism of digital signature is verifiable, non-repudiation, non-forgery and non-reusability. A forgery of a document may attempt to invent someone else's signature, or it may attempt to copy it from someone else's signature in his possession, so-called non-reusability is to eliminate the latter situation. (v) Data backup when a system crashes in the event of an unexpected condition, the damage can be greatly reduced if the data rebuilding system can be recovered quickly from the backup. The data that needs to be backed up includes web site programs, database data, and file system data. Database data can be configured by the database management system to automatically backup, you can deploy professional backup software to achieve file system backup. The server hard disk configuration raid (redundant array of independent disk, independent redundant array of disks), when the disk is damaged, can quickly recover data. Five openness although in the function of the internal information management system divided into multiple systems, in fact, the company's business is a whole, the information systems also naturally constitute a unified whole, each system is mutual infiltration, inseparable. The e-commerce platform must be seamlessly interfaced with other business systems and reserved for possible access systems. (i) Data planning in order to make the data effective and useful, it is necessary to plan the data in a holistic manner. Data planning must be based on the company's business, with the company's organizational structure and departmental settings. Data planning must take into account the full lifecycle of the data to ensure that a single source of data is single, traceable, and verifiable. E-commerce business can not be separated from the company's overall business, e-commerce platform and the company's other business systems must also maintain the data and business level of effective integration. (b) interface system due to the existence of a number of information systems, this is the application of e-commerce business Foundation. However, multiple system implementation techniques are different, the database format is different, and the data is generated at different organizational levels, which needs to be collected, aggregated and counted. Problems such as the non-uniformity of material coding among multiple systems need to be solved. In view of this situation, the data interface platform will be built to unify the data interaction among multiple information systems. and centralized management of core business data. The data interface platform simultaneously undertakes the task of collecting and synchronizing data between the organization level. (iii) Rapid response to business changes the e-commerce platform provides only system platforms. Both sides of the supply and demand can easily publish information in the system. Business data, such as product catalogs, can also be easily adapted to business needs. With the rapid development of e-commerce, with the user's behavior to understand, at any time canNeed to develop new system functions. The website uses the simple technology structure, takes full advantage of the program source code to generate automatically, encapsulates the common library, encapsulates the common page component and so on the method enhances the program development efficiency, in order to respond quickly the business change. Six system architectures in summary, System Architecture 2 shows. clip_image004

Technical framework of E-business web site

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.