


What is the difference between WeChat development for 10 million fans and a few thousand fans?
(ps: I was tortured when I went to a big company for an interview. I went back and looked for information and found that there was very little in this area, and I was still confused.)
For example:
1. High concurrency and large traffic,
2. Disconnection and reconnection
3. The amount of data is too large and the request times out
4. Pushed text user synchronization and other issues.
I hope experienced experts can share with you how to develop in the case of large traffic. When developing with low user volume, you often don’t pay attention to the pits you dig and step on the thunder; and how to build large traffic samples for testing. , as well as learning directions and recommended books in this area.
(I am a back-end scumbag with 1 year of experience, thank you for your attention and answers) over!
Reply content:
(ps: I was tortured when I went to a big company for an interview. I went back and looked for information and found that there was very little in this area, and I was still confused.)
For example:
1. High concurrency and large traffic,
2. Disconnection and reconnection
3. The amount of data is too large and the request times out
4. Pushed text user synchronization and other issues.
I hope experienced experts can share with you how to develop in the case of large traffic. When developing with low user volume, you often don’t pay attention to the pits you dig and step on the thunder; and how to build large traffic samples for testing. , as well as learning directions and recommended books in this area.
(I am a back-end scumbag with 1 year of experience, thank you for your attention and answers) over!
Nowadays, interviewers like to ask these pretentious questions. Few of them know how to actually operate it. What they know is just theory. If you are not a technical director, you will not be given the opportunity to implement it. 10 interviewers asked this question 9 are show-offs.
Let me talk about what I have used
1 First of all, tens of millions of users depends on what kind of project you are. Ordinary projects do not have many 1,000,000-level users, because ordinary projects will not have user activity at all
2 Definition of high concurrency: same The number of IP requests per second. From my personal understanding, high concurrency refers to two aspects, one is your service, and the other is your program business logic.
Services: apache, nginx + fastcgi
Programming: I personally think this is the key point, because the bottleneck of web applications lies in the database. Your business logic will add, delete, check and modify the database. Therefore, when the current request volume reaches a certain base, it is likely to cause the memory occupied by the database to increase, and even cause your table to deadlock, or the database to crash.
To solve this problem: 1. First, you need to write a log at the entrance of your program to record the address and parameters of each request. 2 Analyze which requests have too high access frequency based on your logs (it is impossible for every request to access high frequency) 3 Find out the addresses with too high access requests, analyze the corresponding business logic, optimize the code and SQL statements, and do it according to functional requirements Proper caching
Database aspects: 1. Based on the above analysis results, tables that require frequent operations are obtained. Most of them are database query operations. (Generally, tables with frequent operations include: user information table. General tables with large amounts of data: financial record table, user log table.) Then divide the tables according to business logic. 1. Put the fields that are frequently queried in the user table into one table. 2. Put the user statistical information and unusual data into another table or tables. 3 For tables with large amounts of data, you can use time periods to divide tables, such as one financial record table and user log table for a month or a week. Another way is to divide tables according to business logic, such as one table for active user information and one table for inactive users. Another table is divided into tables according to user ID. For example, a table with the first digit of user ID being 1, a table with 2, and so on to create 10 tables.
Then use read-write separation to establish a master-slave library. There are many more things to say in a more detailed direction. But for general companies, there is really no need. If you have such a large number of users, it means that the company has money. If the company has money, many things can be improved through hardware, and it can hire full-time personnel at high prices. You are just interviewing PHP. I don’t have a log table and I haven’t done anything about the daily increase of 10 million.
3 Don’t be intimidated by this kind of people, just go to Baidu and memorize the answers, and memorize them for you next time you meet them.
Maybe their company is not hiring, but they just encountered such a problem and didn’t want to spend money, so they made it an interview question. . .

The main advantages of using database storage sessions include persistence, scalability, and security. 1. Persistence: Even if the server restarts, the session data can remain unchanged. 2. Scalability: Applicable to distributed systems, ensuring that session data is synchronized between multiple servers. 3. Security: The database provides encrypted storage to protect sensitive information.

Implementing custom session processing in PHP can be done by implementing the SessionHandlerInterface interface. The specific steps include: 1) Creating a class that implements SessionHandlerInterface, such as CustomSessionHandler; 2) Rewriting methods in the interface (such as open, close, read, write, destroy, gc) to define the life cycle and storage method of session data; 3) Register a custom session processor in a PHP script and start the session. This allows data to be stored in media such as MySQL and Redis to improve performance, security and scalability.

SessionID is a mechanism used in web applications to track user session status. 1. It is a randomly generated string used to maintain user's identity information during multiple interactions between the user and the server. 2. The server generates and sends it to the client through cookies or URL parameters to help identify and associate these requests in multiple requests of the user. 3. Generation usually uses random algorithms to ensure uniqueness and unpredictability. 4. In actual development, in-memory databases such as Redis can be used to store session data to improve performance and security.

Managing sessions in stateless environments such as APIs can be achieved by using JWT or cookies. 1. JWT is suitable for statelessness and scalability, but it is large in size when it comes to big data. 2.Cookies are more traditional and easy to implement, but they need to be configured with caution to ensure security.

To protect the application from session-related XSS attacks, the following measures are required: 1. Set the HttpOnly and Secure flags to protect the session cookies. 2. Export codes for all user inputs. 3. Implement content security policy (CSP) to limit script sources. Through these policies, session-related XSS attacks can be effectively protected and user data can be ensured.

Methods to optimize PHP session performance include: 1. Delay session start, 2. Use database to store sessions, 3. Compress session data, 4. Manage session life cycle, and 5. Implement session sharing. These strategies can significantly improve the efficiency of applications in high concurrency environments.

Thesession.gc_maxlifetimesettinginPHPdeterminesthelifespanofsessiondata,setinseconds.1)It'sconfiguredinphp.iniorviaini_set().2)Abalanceisneededtoavoidperformanceissuesandunexpectedlogouts.3)PHP'sgarbagecollectionisprobabilistic,influencedbygc_probabi

In PHP, you can use the session_name() function to configure the session name. The specific steps are as follows: 1. Use the session_name() function to set the session name, such as session_name("my_session"). 2. After setting the session name, call session_start() to start the session. Configuring session names can avoid session data conflicts between multiple applications and enhance security, but pay attention to the uniqueness, security, length and setting timing of session names.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

Atom editor mac version download
The most popular open source editor

SublimeText3 Chinese version
Chinese version, very easy to use

Dreamweaver Mac version
Visual web development tools

Zend Studio 13.0.1
Powerful PHP integrated development environment
