
Figure 1
The model of library information resource sharing system.

Figure 2
The data flow diagram of the library information resource sharing system.
Table 1
Specific configuration parameters of different configuration documents.
| Configuration | Parameters |
|---|---|
| Configuration of port | System proxy port 6158, ICP port 3781. |
| Cache Configuration | Chained address which contains cgi-bin or starts with “https:\\” and scripts which are compiled by asp, cgi and php are not cached; cache capacity is set as 2 G, and the upper and lower limits are 80% and 90%; single document is not cached when it exceeds 10 MB or exceeds 512 KB in internal storage. |
| Authentication configuration | Set number of certification process as 500, and effective time of certification as 1 min. |
| Timeout configuration | Set the time-out time of Squid connecting with other host as 2 min, the maximum time of connecting proxy as 30s, the maximum time of return information as 5 min, and the time-out time of online connection as 2 min. |
| Access configuration | The security port of HTTP is set as 173.0.1.0/253.253.253, that of FTP as 22, that of https, snews as 445 564, and that of gopher as 71; IP field of LAN is 192.168.1.1/25; address file of MAC is “/usr/local/squid/localmac”; inside rule is let through; address which login in MAC address document is let through; administrators and non-administrators can visit local host; non-security port is not allowed to open; SSL port is not allowed to connect; in access list, there are all user visits. |
| Configuration of host name | Name of host is set as 172.15.81.16. |

Figure 3
The diagram of functions of the library information resource sharing system.

Figure 4
The schematic diagram of E-R model of the information resource sharing system.
Table 2
User list.
| Attribute name | Field | Length | Data type |
|---|---|---|---|
| User name | usename | 50 | Varchar |
| Actual name | name | 50 | Varchar |
| User ID | userID | 4 | Int |
| User group | readertype | 50 | Varchar |
| User state | active | 1 | Bit |
| Set password | readerpwd | 50 | Varchar |
| Security question | readerquestion | 50 | Varchar |
| Answer to security question | readeranswer | 50 | Varchar |
| Due time | enddate | 50 | Datetime |
| readeremail | 50 | Varchar | |
| Contact number | telphone | 50 | Varchar |
| Contact address | readeradd | 50 | Varchar |
| ID number | personID | 50 | Varchar |
| Postal code | readercode | 50 | Varchar |
| Department | readerdepartment | 50 | Varchar |
| Mark | mark | 50 | Varchar |
Table 3
The test results of login function of the system.
| Input | System feedback output | Judgement results | |
|---|---|---|---|
| Account | Password | ||
| ABCD | 1234 | Page jumps and verification passes | Correct or wrong |
| ABCD | 1111 | Wrong password | Wrong |
| BBCD | 1234 | Wrong user name | Wrong |
| Blank | 1234 | Please input account number | Wrong |
| Blank | 1111 | Please input account number | Wrong |
| ABCD | Blank | Please input password | Wrong |
| BBCD | Blank | Please input password | Wrong |
| Blank | Blank | No response | Fail to judge |

Figure 5
The implementation process of system sharing.

Figure 6
The sharing entry interface.

Figure 7
Testing results of feedback speed of the designed system and third-party website.
