Chapter 244: The Test, Is It the Same as the Real One?

Although Lin Dong said it was simple before, in fact, software programming is not so simple.

After all, this is to build a huge similar LAN alone, and it is a function to re-access after the flower search is blocked, so it is necessary to re-engage in a set of procedures.

In Teng Qingyuan and Liao Zijie, Lin Dong has seen the separate network of the public security system, the protocol used is relatively old, and it is assigned separately, this is actually a closed network system, this is simple, what Lin Dong has to do is to connect this separate system with the Internet system currently used by netizens.

What Lin Dong wants to see most is another system that is directly and completely independent of the Internet, just like the public security system, so that it will not be controlled by others at all, but this is a large amount of work, and now netizens are used to using the Internet, and he will not be accepted at all if he does one alone.

So we can only settle for the second, first to keep the flower search not controlled by others, then you need to plant the flower search server backup, with a new coordination, and then make a conversion system out, plus an early warning mechanism, once the flower search is blocked, the emergency mechanism starts, then the backup server immediately replaces the main server function, play a role.

Of course, in order for users to be able to use it normally when the flower search is blocked, it is necessary to let the user know in advance the new backup server of the flower search, or the address obtained by the conversion system.

In fact, if you are not afraid of trouble, you can apply for more top-level applications, and rotate them after the master is sealed, but Lin Dong is not satisfied with such a situation, after all, even if he applies for more, he is still under the control of others. But as long as he makes this conversion system, unless Lao Mei seals all of Huaxia, he can completely use the conversion system to fight against Lao Mei's possible control over him.

And if it is true that even if the whole of China is sealed, then there is no Lin Dong who clearly knows that our country is not without countermeasures, and there was a riot in the Western Regions in 9 years. There was a period of time when the Western Regions were shut down for a year, and there were some networks in the Western Regions that were still running, and Lin Dong was not the only one with a sense of crisis!

Analyze the situation clearly. Lin Dong began to divide the tasks he had to complete: first, to design and program the conversion system, second, to back up the server, and third, to do a good job of the emergency automatic conversion mechanism, once the flower planting search was blocked, the backup server and the conversion system would be started immediately. The user clicks on the link to search for the blocked flower and will automatically go to the backup server.

After distinguishing the tasks, Lin Dong immediately began to write the program.

Because there are ready-made examples in mind, parallel later generations, similar situations are not uncommon, many countries have opinions on the hegemony of the United States in the Internet, and there are many countermeasures, similar to the giant Internet like Huaxia has also engaged in a lot, and then there are Internet companies in order to avoid the blockade and hegemony of the United States and engage in a similar conversion system, which is still carried out by a company in Huaxia. However, it was not as mature as Lin Dong at that time, after all, the conditions were different.

Now Lin Dong doesn't have to worry about hardware problems, he only needs to write good software, which is not a very difficult thing for him to have a precedent of planting flower search and Xiaotianyan system.

However, in two days, Lin Dong came up with the framework content of the entire conversion system, and after four days of careful improvement, Lin Dong came up with a complete set of systems.

After the program was completed, Lin Dong did not take it out immediately. Instead, he repeatedly scrutinized it in the computer, line by line, sentence by sentence, although it would not cause problems like He Dongcheng's before, but he had to ensure that he engaged in this conversion program. It will not be pushed backwards from the Internet by others, whether it is security or vulnerability, it is a place that must be paid attention to.

He doesn't want such a good emergency mechanism to be hacked by others to control him, and it will become a big joke!

After a day of repeated activities, Lin Dong was relieved. this system. It should have been.

However, this is only something in the computer, and it needs to be checked to ensure that it functions as expected.

With the current financial resources of Changying Group, it is not difficult to conduct testing, Lin Dong directly opened a large computer room on the company's floor, set up a restricted network according to his own ideas, and set up a separate server as a backup server, and then began to test.

In the whole process, except for Ji Yao, no one else in the company was allowed to participate. Although these political reviews and assessments are all carried out, no one can guarantee that this news will not be leaked, and if it is leaked, with the current speed of network transmission and deterioration, no one dares to guarantee what will become after it is spread.

"Installed?" Ji Yao not only had no opinion on Lin Dong's caution, but was very satisfied, but she knew that this was not a long-term solution, but as long as these systems and software programs were successfully tested, it was not impossible to notify the company's reliable senior management later.

Seeing Lin Dong withdraw from the disk, she opened her mouth and said, "Is it possible to run now?" โ€

"That's it." Although the network designed by Lin Dong is not there, it is enough to simulate the network environment he designed. "You start the flower search first, and I'll cut off the flower search in the server after a while, and then see how you visit Wรจn."

"Okay." Ji Yao began to operate the computer and began to enter the search for planting flowers.

Because it's a local area network, the flower search is just a separate program at this time, and there is no link, she just keeps refreshing the program.

"Okay, I'm disconnected!" Lin Dong said at the LAN server; "You keep refreshing."

Ji Yao responded for a while, keeping the refresh unchanged, and then felt that the refresh time suddenly changed from about .5 seconds to 1 second now, during which the mouse pointer became an hourglass shape, waiting, but it didn't take long for the page to be displayed again.

"It worked!" Although it was only a test, there was no difference between the simulated environment and the real Internet environment, and as soon as she saw that the webpage could be refreshed, Ji Yao immediately shouted happily: "It's okay!" โ€

Seeing Ji Yao's happy expression, Lin Dong smiled, although it was only a test, but it could be successfully tested in such an environment, which showed that the program he wrote, at least in a small area, could stand the test!

The rest depends on the individual fiber optic cable and server system.

As long as you get these things done, then you can worry much less! (To be continued.) )