Object-oriented transaction platform architecture based on pan data
Summary
In the field of computer applications, information data resources are widely distributed. How to architecture can protect data integrity, based on object-oriented software systems, is the difficulties and focus of the industry, which is intended to conduct in-depth research and applications for these issues.
Key words
Database, object-oriented, transaction, interface, inheritance.
introduction
With the rapid development of IT, it is constantly increasing and improved in individual information resources, corporate business, medical, insurance, education, and government office.
Enterprise business is expanding, and the collection of information data is increasingly. At the same time, the mechanism industry is defined or geographically constrained by the administrative level, forming a variety of complex information data. Data files in various formats of a variety of formats are constructed from these general data. How to dig out the largest interest or implicit business secrets such as the company, the pre-analysis of the best decision-making and task, and the data sampling of the scientific research is more accurate, thereby using better data-based data The accessible programming method of the subject is to achieve the above interest is the challenge in the software engineering project.
Data Application Interface Design (DBAPI)
Since the application is more complicated, the storage format of the information data is also different, and the development platform is not exactly the same, so that a complete set of interfaces should be defined so that there is no barrier-free communication in various differences.
1.1 Certification Identification Interface
1.2 Data Configuration (CNDBCONFIG)
In applications, we need to access extensive information data distribution, while the various types of information data formats are different. Therefore, the following information is required: machine name or machine IP (IPv6) address, data file name, user login account and password, port number when communicating, etc., data format contains Oracle, SQLServer, DB2, Sybase, Access , XML, Excel, Word, etc. The UML map is as follows:
Figure 1: Data configuration
1.3 Data Connection Interface (idbconnectionable)
The interface is responsible for returning a data connection handle by the authentication identification interface. If a database returns a database connection handle, if a file returns a file handle. Invalid, throw a system-level serious error, enter the user authentication, failing or reaching the current connection maximum allowable connection license.
Figure 2: Data connection interface
1.4 Data Operation Interface (IDBoperationable)
This interface needs to meet various types of operations of information data in applications, such as writing data, read data. At the same time, it is necessary to support standard SQL (T-SQL99), stored procedure call execution, and operation of files.
1.5 Data Transaction Interface (IDBTRANSACTION)
Transaction: Employment, consistency, integrity, and isolation (AUID) for information data. It is possible to trust enterprise business or administrative decisions. Such as orders contracts in business activities, credit issues in banking systems, data collection and reporting, administrative and approved and review in the administrative work. In short, business is everywhere in real activities. Therefore, how to ensure the success of the software system when the characteristics of the transaction are one of the important signs of the software system.
1.6 Object Operation Interface (IOperationable)
In response to the software system structure, there is an inevitable information data, and you need to interact with the information data associated with the resource: including write data and read data. Basically matched with the data operation interface. At the same time, including the status of the object and whether the object is empty, the data resource index, the data set and other content.
1.7 Object Basic Interface (IBASE)
This interface describes some of the basic elements of the software system. Such as numbers, codes, keys, names. Ability to operate the operation identification, the object version, and the like.
1.8 Security Interface (Isafe)
How to protect the security of sensitive information such as username and password provided in the authentication marking, read data, and write data. Encryption is one of a valid means, usually symmetrical encryption and asymmetric encryption. Here, symmetrical encryption is used to effectively protect with important information data. Design Patterns
The design pattern makes people more easily and easily reuse successful design and architecture. It will also make new system developers easier to understand their design ideas. Design mode help makes a choice for system multiplexing to avoid designing damage to system reuse. Design patterns can even improve the validity of document management and system maintenance of the system.
2. Abstract factory model
Provide an interface to create a series or interdependent object without specifying the specific classes thereof.
2.2 Unique mode
Ensure that a class has only one instance and provides a global access point access to it.
2.3 Status mode
Allow an object to change its behavior when it is changed inside.
System object design
3.1 Data Resource Type (DBTYPE)
This is required to distinguish this because there are many resources to be co-deposited in the system. For example, DB2, SQLSERVER, ACEESS, ORACLE, etc. in the database, such as Word, Excel, XML, etc.
3.2 Data Type (CNDATYPE)
From so many data resources, the data type is also very rich. In order to resolve the differences in data types of information data, seamless access and interaction, and uniformly solve individual differences by the defined data type.
3.3 Parameter object parameter object set
When writing data and reading data, it may be necessary to access the parameter object to form a set of parameter objects. This parameter object includes elements such as data types.
3.4 Data Configuration Object Class
This object is responsible for valid access for specific data resources. This class implements the authentication identifier interface. Simultaneous use of the security interface to encrypt and write data on important information data.
3.5 Data Connection Object
This object is responsible for providing access to resources that implements data connection interfaces.
3.6 Data Repository Objects (CNDATABASE)
This object is responsible for writing data and reading data for the specified valid resource, which implements data operation interface and data transaction interface. In transaction-level information data, ensure transaction feature.
3.7 System Basic Objects (CNBaseObject)
This object is responsible for completing the business object seamless difference writing data and reading data from the specified data resource. The object is lightweight, which is only nested in a single resource operation object.
3.8 Information data object
This object carries various operations of information data. Includes reading data, write data, query data, transaction operation, and more.
This object implements the IOPERATIONABLE interface, read data, and query data results are reflected on the data source among the interfaces.
Read data:
Get data to the data source.
Get data to the specified file format.
Get data is displayed on page.
Get data to the reader.
Write data:
Update the data to the specified data source.
Write new data to the specified data source.
Delete data is in the specified data source.
Transaction operation:
Share transactions.
Excise business.
3.9 Operation enumeration object
This object mainly describes the client object. The main types of operations are:
to sum up
Object-oriented transaction architecture based on pan data, has been inspected with multiple application system, and has achieved high professional levels, gaining huge economic benefits and social benefits.
references