Tuesday, October 12, 2010

For the B / S structure, to understand the point



I would like to say a few words on the B / S structure software ideas, I hope you criticize.

For the B / S structure has a common characteristic is the user, identity, roles and permissions.

I think these four concepts I am also a long time, according to what I would like to say a few words:

First look at the following examples:

Users 鈫?Permissions 鈫?Identity 鈫?role

These three concepts, a unit of a class

Joe Smith 鈫?鈫?soldier 鈫?artillery shelling

Artillery 鈫?鈫?鈫?John Doe soldiers loaded eggs (loading)

Wang V 鈫?monitor 鈫?鈫?Command artillery shelling, feed, shelling

Zhao six soldiers 鈫?鈫?鈫?to artillery master kitchen cooking

The above examples are present in a class system among the artillery, each user has its own identity and role, status and role of the decision of his authority.

User: access to all systems are operating, or a virtual person. In the system we assume that each person has only one user name and password, then each of us in the system is a separate user. Of course, sometimes a man has a lot of user name and password, then he may play in the system multiple identities and roles, but in his name to a user access to the system later, we still think he is an independent person. Like a person can be both teachers and can be the same as Olympic volunteers, the identity and role in society and can do, but in a particular environment, the identity of his role is unique.

Identity: refers to a large environment with a specific function or group. The so-called environment is a user on the system definition, and is made with the highest authority of system administrators, managers and non-administrators, and sometimes administrators may also many different kinds. Identity in the larger environment in general is relatively stable. This is the forum as the most typical, each version has its own owner, can also be a number, the highest in the forum administrators have permissions to other users, compared with non-administrator. The above example, the identity of this class is mainly artillery squad leader and soldiers, namely, simple system administrators and non-administrator, if there is general administrator of this arrangement as exists.

Role: only in a small environment or setting a user or multiple users in the identity of the type specified. This is dynamic, it can be said to change frequently. The same as acting, actor is a user's identity, but the role is different as the game changes constantly occurring. In the B / S structure of the system always exist VIP users, registered users, advanced users, ordinary users, the role of tourists, what do they do in fact are non-relationship management class. Then we say that is what they call the above role, the situation in the forum is more typical. Many sites integral to how much or how much money paid will be allowed to do what the system's operation, in fact, doing the role change. Artillery on the above example can be divided into (I do not know, absurd) loading member of the ignition member, rub runner, Win gun carriage drivers. Shelling of their operations in a work is completely different, only one is identified, they can only play a role in a session, but not from the global to control.

Permissions: Permissions is the so-called powers and limitations, it means you can do what in the system operation. Each system is a number of functions can also be said to have a number of permissions, each operating system, or whether it is for the system in a part of the identity and the different roles will be based on one or a given number of users. Therefore, the general permission will not be owned by a user, in the above example can be seen, not only shelling of a role can not only be loading a role, so permissions can be cross sometimes used.

Finally finished the four concepts (sensory nonsense) It is clear that our system is composed of these elements then how they work? Process

Do people know that the test trials process, bug handling process, in fact, each system has its own operating procedures. For the above example, I think that the simple process should be as follows:

Various parts of the artillery gun carriage transport loaded gun carriage open 鈫?will be shipped to the destination unloaded gun 鈫?assembly 鈫?鈫?Debug 鈫?Proofing 鈫?artillery loader ready 鈫?鈫?鈫?unloaded gun fire 鈫?income 鈫?the artillery gun mounted on the car parts 鈫?gun carriage will be transported back to the camp opened and the gun carriage gun 鈫?鈫?Income maintenance warehouse

Qi Shi and a lot of steps to hike to judge if the judge whether it's a step back to the previous restart.

Obviously, I do not want to explain the case to a status or role in the process of a part to play with what authority, what kind of role we should be very clear and clear.

Personally think that doing B / S test when the main function of the test line should be like this:

1. Permissions are correct for each test.

2. More authority with the functionality of whether an error occurred.

3. Test whether the correct permissions to roles

4. Roles with the permissions are correct, whether there are missing or there should not have permissions.

5. In the specific identity of the roles have permissions to change what will happen.

6. When the occurrence of cross-role is an identity can play multiple roles in the time of the cross would not have permission error.

7. In the process of testing whether the competence of the function in question (here, the process must ensure that cover all branches).

8. When the interruption of the treatment process.

Of course, such tests are sometimes a problem, that is, B / S structure, sometimes there can be done in any case the operation. Such as view, query, sort, class action, so this type of operation should be tested separately.

I was testing new, just end of the training, these are all they want out, has never practiced in large projects, that if there is an error, please, thank you brothers and sisters for their support.







相关链接:



Photoshop TO create an alternative form of gorgeous flowers!



ASF To MPEG



Harbin Engineering University, the world's five major classification societies in hand



Good Basic Or VB Or VB DotNet



MJPEG To AVI



2007 College Graduates in Beijing reached 200 000



3 years 68 million PHS users delisting where flow (Figure)



Ali power to HELP her mother five years beyond the traditional media blog



How to change asf files to iriver p35



Neusoft transition stranded behind THE overall market rejections



Five European giants CEO signed a LETTER opposed to reform the EU patent law



Expert Security And Privacy:



MTS to MOV



Liang No. 400 400 640 074 008 Take your pick



Jobs sick industry concerns raised



No comments:

Post a Comment