1. User module: query the book function and view the details of book borrowing;
2. Management module: administrator identity management, database management and user module function management.
(1) server-side module
● Data management module: connect to the database and perform different operations on the database according to the commands sent by the client.
● Network management module: manage client connection information, including connection status and quantity.
(2) Client module
● Network connection module: used to connect the server.
● Book lending management module: used to manage book lending information, including functions such as book lending, book return and payment of fines by readers, and operated by the system and senior administrators.
● Book information management module: managing books and materials, mainly including two parts: book category management and book information management, which have the functions of adding and querying respectively, and are operated by the system and senior administrators.
● Reader information management module: used to manage readers' data, which mainly includes three functions: adding readers, deleting readers and querying readers' information. It is operated by the system and senior administrators.
● Administrator management information module: used to manage administrator data, mainly including the functions of adding administrators, deleting administrators, querying administrator information, etc., operated by the system administrator.
● Book borrowing statistics module: used for the statistics of book borrowing records, which mainly realizes the ranking and statistics functions of book borrowing times, and is operated by the system and senior administrators.
● Book borrowing reservation module: used for the reservation function of book borrowing, which mainly realizes online book reservation processing, which can save time and improve efficiency more effectively, and is mainly operated by students.
● Book renewal function: it is used to postpone the borrowing of books, mainly to renew the borrowing of books by students and extend the borrowing time. Students apply and administrators reply.
Network book management system, security requirements:
1. This system is used by librarians to manage books, so no one is allowed to use it except librarians.
2. The system has three levels: general administrator, senior administrator and system administrator, which are used to manage books of different levels.
3. Unregistered personnel can't enter the system to manage books, which ensures the security and confidentiality of book management.
The network environment has a profound impact on the construction of information resources in network libraries. Real collection construction, network information resources development and virtual collection construction. Since the new millennium, the network has promoted important changes in the resource structure of libraries. The network library transcends the traditional concept of literature, including traditional literature, electronic publications, network information and other information resources. The goal of information resource construction of network library is resource sharing.
1. Information resource construction is a variable term. With the change of network environment, the collection determines the collection supplement, collection construction, literature resources construction and information resources construction.
2. The change of network environment determines the type of information resources. There are five kinds of document carriers in network libraries: printed, audio-visual, machine-readable, CD-ROM and network. CD is called the literature carrier revolution. According to the distribution of information resources, there are real collections and virtual collections. Virtual collection refers to the information resources outside the library that the library has no ownership, but has the right to use, and can be obtained with or without compensation through the computer network.
3. The greening of online library information resources, its systematization, integrity and authority, and the improvement of the collection rate of electronic publications all depend on a perfect bibliographic database.
4. Fully develop the massive information on the Internet, standardize the disordered state of resources, and download and organize online information resources.
5. Purchase or lease the right to use the online retrieval database. Online search, contract payment, remote login and online utilization.