Chapter 244 Test, is it the same as the real one?
Although Lin Dong said it simply before, software programming is actually not that simple.
After all, this is to build a huge LAN-like structure separately, and to perform the function of re-accessing after being blocked by the search of the flower, you need to re-engage a set of programs.
In Tengqingyuan and Liao Zijie, Lin Dong had seen a separate network of the public security system. The protocols used were relatively old and were distributed separately. This was actually a closed network system. This was simple. What Lin Dong had to do was to connect this separate system with the Internet system currently used by netizens.
What Lin Dong wants to see most is another system that is directly independent of the Internet, just like the public security system, so that he will not be controlled by others at all. However, the project volume is too large, and now netizens are used to using the Internet. If he makes one alone, he will not be accepted at all.
Therefore, we can only settle for the second best. First, we must keep the flower search uncontrolled. Then we need to back up the server of flower search, use a new coordination, and then create a conversion system, and add an early warning mechanism. Once the flower search is blocked and the emergency mechanism is started, the backup server immediately replaces the main server function and plays a role.
Of course, in order to enable users to use it normally when the Zanhua Search is blocked, users must know in advance the new address of the Zanhua Search backup server, or the address obtained by the conversion system.
In fact, if you are not afraid of trouble, apply for more top-level applications and rotate after the main is blocked. However, Lin Dong is not satisfied with this situation. After all, even if you apply for more, it is still under the control of others. But as long as you make this conversion system, unless the Americans block all the Chinese ones, you can completely use the conversion system to fight against the Americans' possible control over themselves.
And if the whole of China is really blocked, there is nothing Lin Dong knows clearly that our country is not without countermeasures. There was a riot in the Western Regions in 9 years. There was a period of time when the Western Regions were shut down for a year, and some networks within the Western Regions were still operating. There was more than Lin Dong alone who had a sense of crisis!
After analyzing the situation clearly, Lin Dong began to divide the tasks he had to complete: first, design and program the conversion system, second, backup the server, and third, to develop an emergency automatic conversion mechanism. Once the flower search is blocked, the backup server and the conversion system will be started immediately. The user clicks the link of the flower search that is blocked and will automatically transfer to the backup server.
After distinguishing the tasks, Lin Dong immediately started writing the program.
Because there are ready-made examples in your mind, parallel future generations, similar situations are not uncommon. Many countries have opinions on the hegemony of the United States in the Internet and have many countermeasures. There have been many giant Internet like China. Later, Internet companies have developed similar conversion systems to avoid the US blockade and hegemony. This is still done by a company in China. However, Lin Dong was not as mature as Lin Dong, after all, the conditions are different.
Now Lin Dong doesn't have to worry about hardware issues, he just needs to write good software. For him, he has had a flower search and the small sky eye system has become the first, so it is not very difficult.
In just two days, Lin Dong produced the framework content of the entire conversion system. After four days of careful improvement, Lin Dong took out a complete system.
After the program was completed, Lin Dong did not take it out immediately. Instead, he repeatedly pondered it in the computer line by line. Although there would not be any problems like He Dongcheng's previous ones, he had to ensure that the conversion program he had done would not be reversed from the Internet by others. Whether it was security or vulnerabilities, it was something that must be paid attention to.
He doesn't want such a good emergency mechanism to be hacked into and controlled by others at that time, which will become a big joke!
After working it over and over again for a day, Lin Dong felt relieved. This system should have been done.
However, this is just something in the computer, and it needs to be tested to ensure that the function is as expected.
With Changying Group's current financial resources, it is not difficult to conduct testing. Lin Dong directly opened a large computer room on the company's floor, set up a limited network according to his own ideas, and set up a separate server as a backup server, and then started testing.
No one in the company was allowed to participate in the entire process except Ji Yao. Although these people passed the political review and assessment, no one can guarantee whether the news will be leaked. If it is leaked, with the current speed and degree of deterioration of the Internet, no one can guarantee what it will become after it is spread.
"Is it installed?" Ji Yao not only had no objection to Lin Dong's caution, but was very satisfied. However, she knew that this was not a long-term solution, but as long as these systems and software programs were successfully tested, it would be not impossible to inform the company's reliable senior management later.
Seeing Lin Dong exit the disk, she spoke, "Can you run now?"
"Okay." Although the network designed by Lin Dong is not there, it is enough to simulate the network environment he designed. "You start the Zanhua Search first. I will disconnect the Zanhua Search local network on the server, and then look at your access situation."
"Okay." Ji Yao started operating the computer and began to search for flower seeds.
Because it is a LAN, Zhonghua Search is just a separate program at this time, and there is no link to be expanded. She just keeps refreshing the program.
"Okay, I'm disconnected!" Lin Dong said on the LAN server; "You keep refreshing."
Ji Yao responded for a moment and kept the refresh unchanged. Then she felt that the refresh time suddenly changed from about 5 seconds to 1 second. During this period, the mouse pointer turned into an hourglass and was waiting, but before waiting for a long time, the page was displayed again.
"Success!" Although it was just a test, there was no difference between the simulated environment and the real Internet environment. As soon as I saw that the web page could be refreshed, Ji Yao immediately shouted happily: "It's OK!"
Seeing Ji Yao's happy expression, Lin Dong smiled. Although it was just a test, being able to successfully test in such an environment means that the program he wrote can stand the test at least on a small scale!
The rest depends on the separate optical cable and server system.
As long as you make these things, you will have much less worries at that time! (To be continued.)
Chapter completed!