Professional Documents
Culture Documents
sruIncrease
oC eht fothe
ezifont
s tnosize
f ehof
t esthe
aerCourse
cnI .1 Name.
.egaP revoC e2.ht nuse
i rethe
daefollowing
h a sa gniwasolaloheader
f eht esin
u the
.2 Cover Page.
elcyC drihT eht ni )46.3:APGC( CA[Accredited
AN yb edarGwith
’+A’’A+’
htiwGrade
detidby
ercNAAC
cA[ (CGPA:3.64) in the Third Cycle
109 21
]CGU-DRHM yb ytisrevinU I–yrogeand
taC Graded
sa dedarasG Category–I
dna University by MHRD-UGC]
300 036 – IDUKIARA
KARAIKUDI
K – 630 003
NOITACUDE ECNATSIDDIRECTORATE
FO ETAROTCEOF
RIDDISTANCE EDUCATION
itnem sYou
a egaare
p reinstructed
voc eht etatodpupdate
u ot dethe
tcurcover
tsni erpage
a uoYas mentioned below:
.emaN e1.sruIncrease
oC eht fothe
ezifont
s tnosize
f ehof
t esthe
aerCourse
cnI .1 Name.
aP revoC e2.ht nuse
i rethe
daefollowing
h a sa gniwasolaloheader
f eht esin
u the
.2 Cover Page.
ISREVINUALAGAPPA
APPAGALAUNIVERSITY
Bachelor of Library & Information Science
INFORMATION COMMUNICATION
rihT eht ni )46.3:APGC( CA[Accredited
AN yb edarGwith
’+A’’A+’
htiwGrade
detidby
ercNAAC
cA[ (CGPA:3.64) in the Third Cycle
]CGU-DRHM yb ytisrevinU I–yrogeand
taC Graded
sa dedarasG Category–I
dna University by MHRD-UGC]
300 036 – IDUKIARA
KARAIKUDI
K – 630 003
TACUDE ECNATSIDDIRECTORATE
FO ETAROTCEOF
RIDDISTANCE EDUCATION TECHNOLOGIES IN LIBRARIES
II - Semester
ALAGAPPA UNIVERSITY
[Accredited with ‘A+’ Grade by NAAC (CGPA:3.64) in the Third Cycle
and Graded as Category–I University by MHRD-UGC]
(A State University Established by the Government of Tamil Nadu)
KARAIKUDI – 630 003
INFORMATION COMMUNICATION
TECHNOLOGIES IN LIBRARIES
Authors
Sanjay Saxena, Director, Total Synergy Consulting Pvt Ltd, New Delhi
Units (2.2, 5.4, 6)
Paulomi M Jindal, Academic Writer and Consultant
Units (3, 8.3, 12, 13.2, 14.2.1)
Rajneesh Agrawal, Senior Scientist, Department of Information Technology, Ministry of Communications and Information
Technology, Government of India
Units (4.2, 5.2, 5.3)
Bharat Kumar, Assistant Librarian, Management Development Institute, Gurgaon
Units (7, 10)
Richa Bhargava, Associate Professor, IILM Gurgaon
Units (9, 13.3)
Vikas® Publishing House, Units (1, 2.0-2.1, 2.3-2.8, 4.0-4.1, 4.3-4.8, 5.0, 5.1, 5.5-5.9, 8.0, 8.1-8.2, 8.4-8.9, 11, 13.0-13.1,
13.4-13.8, 14.0-14.1, 14.2, 14.3-14.7)
All rights reserved. No part of this publication which is material protected by this copyright notice
may be reproduced or transmitted or utilized or stored in any form or by any means now known or
hereinafter invented, electronic, digital or mechanical, including photocopying, scanning, recording
or by any information storage or retrieval system, without prior written permission from the Alagappa
University, Karaikudi, Tamil Nadu.
Information contained in this book has been published by VIKAS® Publishing House Pvt. Ltd. and has
been obtained by its Authors from sources believed to be reliable and are correct to the best of their
knowledge. However, the Alagappa University, Publisher and its Authors shall in no event be liable for
any errors, omissions or damages arising out of use of this information and specifically disclaim any
implied warranties or merchantability or fitness for any particular use.
Work Order No. AU/DDE/DE1-291/Preparation and Printing of Course Materials/2018 Dated 19.11.2018 Copies - 500
SYLLABI-BOOK MAPPING TABLE
Information Communication Technologies in Libraries
Syllabi Mapping in Book
Unit II: Introduction to computers, Components, Types, Advantages Unit 2: Introduction to Computers
(Pages 12-36)
Unit VI: System Software and Application Software Unit 6: Types of Software
(Pages 106-118)
Unit VIII: Open Sources software – GSDL, KOHA, Dspace Unit 8: Open Source Software
(Pages 145-156)
Unit IX: Library Automation of Library housekeeping operations Unit 9: House-keeping Operations
(Pages 157-183)
BLOCK V: DIGITAL LIBRARY
Unit X: Computerized Information Service management of Computerized Unit 10: Computerized
Library. Information Services
(Pages 184-204)
Unit XI: Digitization – Definition, Need, Purpose – process – methods Unit 11: Digitization
and Equipment (Pages 205-216)
Unit XII: Library and Information Networks, INFLIBNET - DELNET Unit 12: Library and Information
Networks
(Pages 217-238)
Unit XIII: Resource Sharing Networks, Internet. Unit 13: Resource Sharing Networks
(Pages 239-268)
Unit XIV: Metadata Standards – Doublincore – Z39.50 Unit 14: Metadata Standards
(Pages 269-276)
CONTENTS
INTRODUCTION
Self-Instructional
12 Material
Information Technology
BLOCK - I
INTRODUCTION TO ICT
NOTES
UNIT 1 INFORMATION
TECHNOLOGY
Structure
1.0 Introduction
1.1 Objectives
1.2 Introduction to Information Technology
1.2.1 Information Systems: Definition and Characteristics
1.2.2 Information Systems: Components, Applications and Types
1.2.3 Information Technology Act
1.3 Answers to Check Your Progress Questions
1.4 Summary
1.5 Key Words
1.6 Self Assessment Questions and Exercises
1.7 Further Readings
1.0 INTRODUCTION
Self-Instructional
Material 1
Information Technology
1.1 OBJECTIVES
Self-Instructional
2 Material
Management Information Systems (MIS). Information systems are housed in a Information Technology
computerized environment /platform to enable users to get accurate information
immediately.
1.2.1 Information Systems: Definition and Characteristics NOTES
According to Orlikowski (1992), ‘Nothing is more central to an organization’s
effectiveness than its ability to transmit accurate, relevant, understandable
information amongst its employees. All the advantages of an organization’s economy
of scale, financial and technical resources, diverse talents, and contacts are of no
practical value if the organization’s employees are unaware of what other employees
require of them.’
Information Systems Over the Years
Information systems have transformed remarkably in the last forty years of their
existence. Initially, information systems were designed to perform a specific task
quickly with very few errors. The concept of using information systems to take
decisions had not been thought of earlier. Organizations used information systems
only for data processing, be it salaries or bills. Those who worked on these systems
were familiar with the commands and the interface, which was character based. The
output was in the form of salary slips, bills and invoices. These were data processing
systems. These systems used file-based data storage systems on which a programme
would work, i.e., the programme would be able to access the data and organize it,
but it would store the data in a file. The problem with this type of system is that it leads
to replication of data and loss of consistency.
Over the years, information systems have changed. Now the focus is on
helping management by providing information useful for decision-making. Data
processing systems have become obsolete. Delivering the right information to the
right people at the right time is the priority. Information systems have become
faster, more accurate and user friendly. Those who work on information systems
nowadays know little about systems. They are normal users. New concepts, such
as client server architecture, networking, distributed computing, centralized
database, graphical user interface and the Internet, have emerged in the information
systems space to help organizations get better value for their money. Bulky and
expensive mainframe systems have been replaced by expensive software.
1.2.2 Information Systems: Components, Applications and Types
Information systems are data processing systems, which collect data from different
sources, process that data and generate information from the data which can further
be used for different applications within the organization. For example, in a business
context, an information system collects data from various systems such as finance
and sales systems from the supplier side. The information system processes the
data and generates information for the customer. Customers provide feedback to
the supplier depending on the information processed by the information system.
Figure 1.1 shows the information system in a business context.
Self-Instructional
Material 3
Information Technology
NOTES
Information systems are basically systems that help to maintain and manage
information. An information system helps to manage and store information to
perform various functions such as decision-making, documentation of business
activities and generation of reports for analysis of organizational operations. One
needs to understand the concept of information and system to acquire a basic
knowledge of information systems. Various terms used in information systems are
as follows:
Data is the raw material that can be a number, a fact, a sound, a picture
or a statement gathered from different sources. In the real world, data
can represent anything related to business processes and employee
details.
Information is meaningful data or processed data. It defines the relation
between the different data.
System refers to a collection of components that helps in achieving a
common objective. For example, in a human–machine system, the
machine element consists of hardware and software to perform
computation, and people make decisions based on this computation.
Components of Information Systems
A system consists of two types of components: abstract system components and
physical system components. Abstract system components perform such operations
as collecting input data, processing the data and generating information from that
data. Physical system components consist of various elements such as hardware,
software and human resources. There are a few more components of an information
system, such as:
Data: Input that the system takes to produce information.
Hardware: A computer and its peripheral equipment such as input, output
and storage devices.
Self-Instructional
4 Material
Software: Application programs or a set of instructions that process the Information Technology
input data using computers, generate information and store information for
future use.
Network: A collection of computer systems connected to each other to
NOTES
share the information.
Manpower: Information system professionals and users who perform various
organizational operations such as analysis of information, designing and
construction of the information system, and maintenance of the information
system. The workforce could comprise IT experts, managers and workers.
Graphical User Interface (GUI): This is an interface for the users of an
information system to work with information on the computer system. A
user can operate, process and retrieve information from the computer storage
using GUI.
The components of an information system describe the functioning of the
system. An information system takes the input data from the users of the information
system to perform business operations. The users interact with the computer to
process data using GUI. After processing data, information is retrieved at the
users’ end. Figure 1.2 shows the basic information system to perform business
operations.
Self-Instructional
Material 5
Information Technology Marketing
Accounting Finance
Management-Level Systems
Management Sales Inventory Annual Capital Relocation
Information management control budgeting investing analysis
Systems (MIS) analysis
Decision-Support Sales region Production Cost Pricing/profitability Contract cost
Systems (DSS) analysis scheduling analysis analysis analysis
Knowledge-Level Systems
Knowledge Work Engineering Graphics Managerial
Systems (KWS) workstations workstations workstations
Office Word Document Electronic
Systems processing imaging calenders
Operating-Level Systems
Machine control Securities Payroll Compensation
Transaction trading
Order tracking Plant scheduling Accounts Training and
Processing payable development
Systems Order processing Material Cash Accounts Employee
(TPS) movement control management receivable record keeping
Sales and Manufacturing Finance Accounting Human
Marketing Resources
Fig. 1.5 Various Types of Information Systems, their Levels and Functions Self-Instructional
Material 7
Information Technology 1.2.3 Information Technology Act
The Information Technology Act, 2000, is an Act of the Indian Parliament that
addresses the following issues:
NOTES Legal recognition of electronic documents, digital signatures, cyber offenses
and contraventions.
Dispensation of justice for cyber offenses and contraventions.
E-commerce has come in for severe security risks, which calls for proper
security. To ensure this, mechanisms like data encryption using digital signatures,
passwords, encrypted smart cards, bio-matrices and firewalls are to be employed.
For this reason, the IT Act, 2000, has made detailed provision on digital signatures.
Section 2(1)(p) of the Act has defined digital signatures as ‘digital signature means
authentication of any electronic record by a subscriber by means of an electronic
method or procedure in accordance with provisions of Section 3’. Section 2(1)(zc)
and Section 2(1)(zd) have defined ‘private key’ and ‘public key’ as ‘private key
means the key of a key pair used to create digital signature’ and ‘public key means
the key of a key pair used to verify a digital signature and listed in the Digital
Signature Certificate’.
E-World
E-World was an online service operated by Apple Inc. The services included e-
mail, news and a bulletin board system (community center). Users of E-World
were often referred to as E-People. E-world offers domain name registration
service as part of Web design, Web development and Web hosting packages and
also carries it out as an independent service. It is important to choose the right
kind of domain name for business. The domain name is selected in such a manner
that it reflects the company and encourages trust and professionalism. Any kind of
domain name can be registered with extension such as .com, .net, .org, .biz, .info
etc. E-World provides economical Web hosting solutions for Budget, Business
and enterprise clients.
Self-Instructional
8 Material
Information Technology
1.3 ANSWERS TO CHECK YOUR PROGRESS
QUESTIONS
1.4 SUMMARY
Self-Instructional
10 Material
Information Technology
1.6 SELF ASSESSMENT QUESTIONS AND
EXERCISES
1. What is IT?
2. List any three applications of ICT.
3. What is information system?
4. Define the following terms:
Data
Information
Network
Manpower
5. What is KWS?
Long Answer Questions
1. Give a detailed note on IT and ICT along with their applications.
2. Write a general account on IS.
3. What are the components of IS?
4. Write in detail about the applications of information software.
5. Elaborate a note on the types of IS.
6. Explain about information technology act and E-world.
Williams, Brian and Stacey Sawyer. 2009. Using Information Technology, 6th
edition. New Jersey: McGraw-Hill.
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2012. Operating System
Concepts, 9th edition. New Delhi: Wiley.
Black, Uyless D. 1993. Computer Networks: Protocols, Standards, and
Interfaces, 2nd edition. New Jersey: PTR Prentice Hall.
Nagpal, D.P. 2006. Web Design Technology (Theory and Techniques on the
Cutting Edge), 1st edition. New Delhi: S.Chand & Company.
Self-Instructional
Material 11
Introduction to Computers
UNIT 2 INTRODUCTION TO
COMPUTERS
NOTES
Structure
2.0 Introduction
2.1 Objectives
2.2 Computers and their Components
2.2.1 Advantages and Disadvantages of Computers
2.2.2 History of Computers
2.2.3 More Parts of a Computer System
2.3 Types of Computer
2.4 Answers to Check Your Progress Questions
2.5 Summary
2.6 Key Words
2.7 Self Assessment Questions and Exercises
2.8 Further Readings
2.0 INTRODUCTION
Self-Instructional
12 Material
Introduction to Computers
2.1 OBJECTIVES
Computers have undergone great transformation over the past decade; however,
the basic logical structure remains the same. A computer primarily constitutes of
three integral components, viz. input unit, Central Processing Unit (CPU) and
output unit. The CPU constitutes of the main memory, the Arithmetic Logic Unit
(ALU) and the control unit.
Apart from these three basic components, computers have secondary storage
devices known as auxiliary storage or backing storage that store data and instructions
on a long-term basis.
The following are the primary functions of a computer:
Inputting: The process in which the user specify a set of commands to
process data into the computer system.
Storing: The process of recording data and information so that it can be
retrieved for use whenever required.
Processing: This process implies performing arithmetic or logical
operations on data to convert them into useful information. Arithmetic
operations include addition, subtraction, multiplication and division, and
logical operations include comparisons, such as equal to, less than and
greater than.
Outputting: This is the process of providing results to the user. These
can be in the form of visual display and/or printed reports.
Controlling: This refers to directing the sequence and the manner in
which all the previous functions are carried out.
A detailed description of the components that perform these tasks is as follows:
Input Unit
Programs and data are required to be present in a computer system before any
operation can be performed. A program denotes the set of instructions which the
computer has to carry out and data is the information on which these instructions
are to be operated. If the task is to rearrange a list of telephone subscribers in
alphabetical order, the sequence of instructions that will guide the computer through
this operation is the program, while the list of names to be sorted is the data. Self-Instructional
Material 13
Introduction to Computers The input unit is responsible for transferring data and instructions from the
external environment into the computer system. Instructions and data enter the
input unit through the particular input device (such as keyboard, scanner and card
reader). These instructions and data are then converted into binary codes (computer
NOTES acceptable form) and sent to the computer system for further processing.
Central Processing Unit
The central processing unit is known as the brain of the computer. It is an important
part of the computer and includes the control unit, the ALU and the primary memory
that are described as follows:
Main Memory (Primary Storage): The main memory or the primary
storage of the computer system is responsible for storing all the instructions
and data temporarily. The data is then transferred to the arithmetic logical
unit for processing. After this, the final output is again stored back in the
primary storage, until it is further sent to the output device.
The primary storage also temporarily stores any intermediate result generated
by the ALU. So data and instructions move frequently between the ALU
and the primary storage before the processing is complete. It should be
noted that no processing occurs within the primary storage.
Arithmetic Logic Unit: In addition to the basic four arithmetic operations,
viz. addition, subtraction, multiplication and division, the ALU also performs
logic comparison operations including equal to, less than and greater than.
Control Unit: The function of the control unit is to ensure that according to
the stored instructions, the right operation is done on the right data at the
right time. The control unit receives instructions and commands from the
programs in the primary memory, processes them and ensures that the
commands are executed in the desired order by all the other units of the
computer system. In fact, the control unit is comparable to the central nervous
system of the human body.
Output Unit
Computers understand, process data and return the output in a binary form. The
basic function of the output unit is to convert these results into a human readable
form before providing the output through various output devices, such as terminals
and printers.
The storage capacity of the primary memory of the computer is limited.
Often, it is necessary to store large amounts of data. So, additional memory, called
secondary storage or auxiliary memory, is used in most computer systems.
Secondary storage is storage other than the primary storage. These are
peripheral devices connected to and controlled by the computer to allow permanent
storage of data and programs. Usually, hardware devices, such as magnetic tapes
and magnetic disks, fall in this category.
Self-Instructional
14 Material
2.2.1 Advantages and Disadvantages of Computers Introduction to Computers
The increasing popularity of the computer has proved that it is a powerful and
useful tool. Its usefulness is due to its following features:
Speed: Computers are very fast. They can process millions of instructions NOTES
every second. The speed is related to the amount of data it processes and
the time it takes to complete the processing task.
Storage: Computers can store vast amounts of information in the form of
files which can be recalled at any time. These files help in easy and speedy
retrieval of information. This type of storage is known as electronic storage
system.
Accuracy: In addition to being fast, computers are also accurate. The degree
of accuracy for a particular computer depends upon its design. Most errors
in computers are not of a technical nature but are human. Usually,
programmers are responsible for these errors.
Diligence: Computers can perform any complicated task accurately without
making any error. Computers do not suffer from carelessness, boredom or
tiredness. Moreover, their efficiency does not decrease with age.
Versatility: Computers perform various tasks depending upon the
instructions given to them and their hardware characteristics. They are
capable of performing any task, provided the task is reduced to a series of
logical steps. A computer can be used to prepare a Word document and in
between called to search for another document that is stored in its memory.
It can perform both tasks simultaneously.
Though computers can do better than human beings in terms of accuracy, speed
and memory, there are certain disadvantages of computer systems as they depend
on human beings for their operations and functions. The following are some of the
disadvantages of computers:
They depend on human beings who program them for efficient, accurate
and fast functioning.
Computers do not have their own intelligence and, thus, cannot think
intelligently or work independently like human beings. They can just follow
instructions given by programs or by users.
They can neither take decisions nor can correct wrong instructions.
Programmers or users maintain and update them.
As with many other modern appliances, computers also need electric power
to run.
2.2.2 History of Computers
The first mechanical adding machine was invented by a French mathematician,
physicist, inventor, writer and chritian philosopher Blaise Pascal in 1642. Later, in
1671, a German philosopher, mathematician and political advisor Baron Gottfried Self-Instructional
Material 15
Introduction to Computers Wilhelm von Leibniz invented the first calculator. Around this time, an American
inventor Herman Hollerith developed the concept of punched cards, which were
extensively used as an input medium in mechanical adding machines.
A mathematician, philosopher, inventor and mechanical engineer, Charles
NOTES
Babbage, a 19th century professor at Cambridge University, is considered the
father of the modern digital computer. During this period, mathematical and statistical
tables were prepared by a group of clerks. However, utmost care and precaution
could not eliminate human errors.
In 1842, Babbage came up with a new idea of the Analytical Engine, which
was meant to be completely automatic. This machine was capable of performing
basic arithmetic functions. However, these machines were difficult to manufacture
because the precision required to manufacture them was not available at that time.
The following is a brief description of the various generations of computers.
Mark I Computer (1937–44): This was the first fully automatic
calculating machine designed by an American physicist and a pioneer
in computing Howard H. Aiken, the design of which was based on
the technique of punching card machinery. In this technique, both
mechanical and electronic components were used.
Atanasoff-Berry Computer (1939–42): This computer was
developed by an American physicist and inventor Dr John Atanasoff
to solve certain mathematical equations. It used forty-five vacuum
tubes for internal logic and capacitors for storage.
The Electronic Numerical Integrator And Computer (ENIAC)
It (1943–46): It was the first electronic computer developed for
military requirements and was used for many years to solve ballistic
problems.
EDVAC (1946–52): One of the drawbacks of ENIAC was that its
programs were wired on boards, which made it difficult to change
them. To overcome the drawbacks of ENIAC, the Electronic Discrete
Variable Automatic Computer (EDVAC) was designed. The basic
idea behind this concept was that sequences of instructions could be
stored in the memory of the computer for automatically directing the
flow of operations.
EDSAC (1947–49): A British computer scientist Professor Maurice
Wilkes developed the Electronic Delay Storage Automatic Calculator
(EDSAC), by which addition and multiplication operations could be
accomplished.
The UNIVersal Automatic Computer (UNIVAC) (1951): It was
the first digital computer to be installed in the Census Bureau in 1951
and was used continuously for 10 years. In 1952, International
Business Machines (IBM) introduced a commercial computer IBM
Self-Instructional
701. This computer could be used for scientific and business purposes.
16 Material
Generations of Computer Introduction to Computers
The history of computer development can be divided into different phases which
are often referred to as generations of computing devices. ‘Generation’ in computer
terminology is a ‘step’ in technology. Each generation of computers is characterized NOTES
by a major technological development that fundamentally changes the way
computers operate, resulting in increasingly smaller, cheaper, more powerful, efficient
and reliable devices which has decreased the energy consumption and the heat
decipation.
Originally, the term ‘generation’ was used to distinguish between varying
hardware technologies, but nowadays, it includes both hardware and software.
The following are the characteristics of each generation of computers:
First Generation (1940–1956): Vacuum Tubes
The first generation computers used vacuum tubes in their electronic circuits and
magnetic drums for memory. A vacuum tube was a delicate glass device that used
filaments as a source of electrons, and could control and amplify electronic signals.
Figure 2.1 displays a vacuum tube.
Self-Instructional
18 Material
The ability to fit so much processing capability in an area so small, helped to Introduction to Computers
reduce the size and price of the computers. It also increased its power, efficiency
and reliability.
Initially, the IC technology was used only for constructing the processor,
NOTES
but it was soon discovered that the same technology could also be used for the
construction of memory. The first memory chip was constructed in 1970 and could
hold 256 bits. Figure 2.2 displays an IC chip.
As more and more components were fabricated on a single chip, fewer and
fewer chips were needed to construct the processor. The Intel 4004 chip, developed
in 1971, located all the components of the computer — from Central Processing
Unit and Memory to Input/Output controls—on a single chip. This was the first
microprocessor. Figure 2.3 displays the Intel pentium microprocessor chip.
IBM introduced its first personal computer in 1981 and in 1984 Apple also
introduced a personal computer, the Macintosh. Microprocessors also advanced
from the realm of desktop computers to advanced technologies, and many areas
of life as more and more everyday devices began to use microprocessors.
As computers increased in computing power, it was possible to connect
them together to form networks, which eventually led to the development of the
Internet. Fourth-generation computers also marked the development of Graphical
User Interfaces (GUIs), the mouse and various handheld devices.
Fifth Generation (Present and Beyond): Artificial Intelligence
The fifth generation computers are being developed using the technology of artificial
intelligence; for instance, voice recognition systems. Parallel processing and
supercomputers have lead to the further development of artificial intelligence. In
the future, quantum computation and molecular technology will tremendously
transform computers. The fifth generation aims at creating devices that respond to
input in natural language and are capable of learning and self organization. Table
2.1 provides a list of various computer generations.
Self-Instructional
Material 19
Introduction to Computers Table 2.1 Generation of Computers
Generation Time Hardware Features Examples
I 1942- Vacuum Tubes High-speed electronic switching ENIAC,
1955 device; memory type was EDVAC,
electromagnetic; bulky in size; EDSAC,
NOTES generated a large amount of heat; UNIVAC I
frequent technical faults; required
constant maintenance; used for
scientific purposes; air-conditioning
required
II 1955- Transistors Better electronic switching devices Livermore
1964 than vacuum tubes; made of Atomic
germanium semiconductors; Research
memory type was magnetic cores; Computer
powerful and more reliable; easy to (LARC),
handle; much smaller than vacuum IBM
tubes; generated less heat as
compared to vacuum tubes; used for
business and industries for
commercial data processing; air-
conditioning required
III 1964- Integrated ICs were smaller than transistors; Mainframe,
1975 Circuits (ICs) consumed less power; dissipated less Minicomputers
made up of heat as compared to transistors;
transistors, more reliable and faster than earlier
resistors and generations; capable of performing
capacitors fixed on about 1 million instructions per
single silicon chip second; large storage capacity; used
for both scientific and commercial
purposes; air-conditioning required
IV 1975- Microprocessor Microprocessor had control on Personal
1989 made up of Large logical instructions and memory; Computers
Scale Integration semiconductor memories; personal (PCs),
Circuits (LSI) and computers were assembled; used in LAN,
Very Large Scale LAN and WAN to connect multiple WAN,
Integration computers at a time; used graphical
Circuits (VLSI) user interface; smaller, more reliable CSCW
and cheaper than third-generation
computers; larger primary and
secondary storage memories; had
Computer Supported Cooperative
Working (CSCW); air-conditioning
not required
V 1989- Ultra Scale Large PCs were assembled – portable and Portable PCs,
Present Integration (USLI), non-portable, powerful desktop PCs Palmtop
Optical Disks and workstations; less prone to Computers,
hardware failure; user-friendly Laptop
features – Internet, e-mailing; air-
conditioning not required
outcomes that are stored in memory. Figure 2.4 displays a computer system.
NOTES
Motherboard
The main PCB (Printed Circuit Board) is sometimes alternatively known as a
logical board or a main board of a personal computer. In fact, any complex electronic
system is known as a motherboard. It includes a flat fibreglass platform which
hosts the CPU, the main electronic components, device controller chips, main
memory slots, slots for attaching the storage devices and other subsystems. Figure
2.5 displays a motherboard.
Self-Instructional
Material 21
Introduction to Computers Sockets and Ports
Main Power Socket: The top part of the rear of the computer locates the
main power cable socket, which supplies power from the electric mains to
NOTES the computer system. This socket is the part of the main power supply unit
of the computer.
Monitor Power Socket: The socket that supplies the power from the
computer system to the computer monitor and is located below the main
power cable socket. However, you might not find this socket in all computers
and you can plug in the monitor directly in main power supply.
PS/2 Mouse Port: Next you will find a small, round, green colored port
with seven holes and a small logo of the mouse printed next to it. This is
where your PS/2 mouse will be plugged in.
PS/2 Keyboard Port: Right next to mouse port you will find another similar
purple colored port with the keyboard logo printed next to it. This is where
your PS/2 keyboard will be plugged in.
Fan Housings: You will notice two fan housings at the back of your
computer. One fan housing is a part of the power supply unit and the other
will be somewhere below it to cool off the heat generated by the CPU.
Serial Ports: It is a 9-pin connector normally used to attach the old serial
port mouse, hand-held scanners, modems, joysticks, game pads and other
such devices.
Parallel Port: It is a 25-pin connector used to attach parallel port printers,
modems, external hard disk drives and other such devices.
Audio Jacks: There are three audio jacks in your computer system. One
jack is used for connecting your speakers or headphones, the second is
used to connect the microphone and the third to connect to another audio
device, such as a music system.
LAN Port: The LAN port (where LAN is Local Area Network) is where
the RJ45 connector of your LAN cable is plugged-in to connect your
computer to other computers or the Internet.
USB Ports: The USB port (where USB is Universal Serial Bus) is designed
to connect multiple peripheral devices in a single standardized interface,
and has a plug and play option that allows devices to be connected and
disconnected without having to restart the computer. It has replaced many
serial and parallel ports for devices, such as mouse, printers, modems,
joysticks, game pads, scanners, digital cameras and other such devices.
VGA Port: This is a 15-pin connector that connects the signal cable of the
monitor to the computer. Here VGA means Video Graphics Array.
Figure 2.6 displays power cables and sockets of monitor and CPU,
respectively.
Self-Instructional
22 Material
Introduction to Computers
Monitor Cable
Cable Socket
NOTES
Mouse Cable
Cable Socket
Keyboard Cable
Cable Socket
Cable Socket
Figure 2.7 displays a LAN cable and a printer cable with its socket.
LAN Cable
Cable
Memory
Storage and retrieval of instructions and data in a computer system is the
responsibility of the memory. In order to store data and instructions, the CPU
constitutes many registers, though these are capable of storing very few bytes. All
computers need storage space for temporarily storing instruction and data during
Self-Instructional
Material 23
Introduction to Computers the execution of the program as the CPU can process data at a higher speed than
the speed at which data can be transferred from disks to registers. This could lead
to the idle CPU which remains free most of the time. The primary or the main
memory is the temporary storage located in the computer hardware. Secondary
NOTES storage or auxiliary memory constitutes devices that can give backup storage,
such as magnetic tapes and disks. The memory is classified as follows:
(i) Internal Processor Memory: A small set of high-speed registers placed
inside a processor and used for storing temporary data while processing.
(ii) Primary Storage Memory: The main memory of the computer which
communicates directly with the processor. This memory is large in size and
fast, but not as fast as the internal memory of the processor. It comprises a
couple of integrated chips mounted on a printed circuit board plugged directly
on the motherboard. Random-Access Memory (RAM) is an example of
primary storage memory.
(iii) Secondary Storage Memory: This stores all the system software and
application programs, and is basically used for data backups. It is much
larger in size and slower than primary storage memory. Hard disk drives,
floppy disk drives and flash drives are a few examples of secondary storage
memory.
(iv) Memory Capacity: Capacity, in computers, refers to the number of bytes
that it can store in its main memory. This is usually stated in terms of Kilobytes
(KB) which is 1024 bytes or Megabytes (MB) which is equal to 1024 KB
(10,48,576 bytes). The rapidly increasing memory capacity of computer
systems has resulted in defining the capacity in terms of Gigabytes (GB)
which is 1024 MB (1,07,37,41,824 bytes). Thus, a computer system having
a memory of 256 MB is capable of storing (256 × 1024 × 1024)
26,84,35,456 bytes or characters.
Processors Used in PCs
The most significant part of the computer is the CPU. The CPU is mostly a
microprocessor-based chip located on a single or sometimes a multiple printed
circuit boards and is an internal component of the system. It is directly connected
to the motherboard; however, the compatibility of the motherboard and the CPU
depends on the specific series of the latter. Due to the tremendous amount of heat
generated by the CPU, it contains a heat sink and a cooling fan.
Popular microprocessors include Intel and AMD, which are compatible
with IBM CPUs.
The brands of CPUs are not the only differentiating factors between different
processors, there are various technical aspects to these processors which allow
us to differentiate between CPUs of different power, speed and processing
capability. Accordingly, each of these manufacturers sells numerous product lines
offering CPUs of different architecture, speed, price range and so on. The following
Self-Instructional
24 Material
are the most common aspects of modern CPUs that enable us to judge their Introduction to Computers
quality or performance:
32 or 64-bit Architecture: A bit is the smallest unit of data that a computer
processes. 32 or 64-bit architecture refers to the number of bits that the
NOTES
CPU can process at a time.
Clock Rate: The speed at which the CPU performs basic operations,
measured in Hertz (Hz) or in modern computers Megahertz MHz or
Gigahertz GHz.
Number of Cores: CPUs with more than one core are essentially multiple
CPUs running in parallel to enable more than one operation to be performed
simultaneously. Current ranges of CPUs offer up to eight cores. Currently,
the Dual-core (i.e., two cores) CPU is most commonly used for standard
desktops and laptops, and Quad-core (i.e., four cores) is popular for entry-
level servers.
Additional Technology or Instruction Sets: These refer to unique features
that a particular CPU or range of CPUs offer to provide additional processing
power or reduced running temperature. These range from Intel’s MMX,
SSE3, and HT to AMD’s 3DNOW, and Cool n Quiet.
These technical factors are the basic way to judge how a CPU will perform.
It is important to consider multiple factors when looking at a CPU rather than just
the clock speed or any one specification on its own. It is easy for a single-core
processor to run music videos, Internet applications or games individually, but
when multiple applications are run together, it starts to slow down. A system running
on a dual-core processor would be able to multitask better then a single-core
processor, while it is very easy for an 8-core processor to run all these applications
plus a lot more without showing any signs of slowing down. However, Intel's 4-
core processors are actually two dual-core processors combined in a single
processor, whereas AMD's 4-core processors are actually four processors built
in a single chip.
A combination of the above mentioned specifications, along with the operating
systems that the processor supports and the specific purpose for which the
computer is to be used, are the factors to be considered when deciding which
CPU is the most suitable for your needs.
Self-Instructional
Material 25
Introduction to Computers
2.3 TYPES OF COMPUTER
Computers can be classified on the basis of their size, processing speed and cost.
NOTES The various types of computers are as follows:
Personal Computers (PC)
Workstations
Notebook/laptop Computers
Tablet PC
PDA (Personal Digital Assistant)
Mainframe Computers
Supercomputers
Some other types of computers are discussed as follows:
Analog Computers
These types of computers are involved in industrial process controls and measure
physical quantities, such as pressure, temperature, and so on. These computers
do not use binary digits but use electrical signals to provide output with electrical
resistance, voltage, and so on. The memory of these computers is not much and
they can be used only for specific calculations; however, their speed is more than
digital computers.
These electrical properties allow calculations to be performed in real time
or even faster at the speed of light. The main mathematical operations it applies
include summation, inversion, exponentiation, logarithm, integration, differentiation,
multiplication and division.
Digital Computers
These types of computers are primarily involved in data processing and problem
solving for specific programs. In digital computers, data is stored as digits (numbers)
and processes. Letters, words, symbols and complete texts are digitally represented,
that is, using only two digits 0 and 1. Digital computers have a lot of memory for
storing data.
Digital computers constitute input-output devices, main memory, control
unit and arithmetic logic unit. Data is processed with logical circuits, also known
as digital circuits. All the circuits processing data inside a computer function in an
extremely synchronized mode; this is further controlled using a steady oscillator
acting as the computer’s ‘clock’. Hence, the digital computers operate on very
high speed and are able to perform trillions of logical or arithmetic operations per
second to provide quick solution to problems, which is not possible for a human
being to do manually.
Self-Instructional
26 Material
Hybrid Computers Introduction to Computers
Hybrid computers are a mixture of digital and analog computers. A hybrid computer
uses the best characteristics of digital and analog computers. It helps the user to
process both continuous and discrete data. Hybrid computers are generally used NOTES
for weather forecasting and industrial process control.
The digital component basically functions as a controller to provide logical
operations, whereas the analog component provides solutions of differential
equations. Remember that the hybrid computers are different from hybrid systems.
A hybrid system is a digital computer equipped with an analog-to-digital converter
for input and a digital-to-analog converter for output. The term ‘hybrid computer’
represents a combination of different digital technologies to process specific
applications with the help of various specific processor technologies.
General Purpose Computers
Workstations are high-end, general-purpose computers designed to meet the
computing needs of engineers, architects and other professionals who need
computers with greater processing power, larger storage and better graphic display
facilities. These are commonly used for Computer Aided Design (CAD) and for
multimedia applications, such as creating special audio-visual effects for television
programmes and movies. A workstation looks like a PC and can be used by only
one person at a time. The characteristics of a workstation, which are often used to
differentiate it from a PC, are as follows:
Display Facility: Most workstations have a large screen monitor (21 inches
or more) capable of displaying high resolution graphics as compared to
PCs, which have a small screen monitor (19 inches or less).
Storage Capacity: Workstations have a larger main memory than PCs,
which have only a few hundred MB of main memory. The hard disk capacity
of workstations is also more than that of PCs.
Processing Power: The processing power of workstations is several times
greater than that of PCs.
Operating System: PCs can run on any of the five major operating
systems—MS DOS (Microsoft Disk Operating System), MS-Windows,
Windows-NT, Linux and UNIX—but all workstations generally run the
UNIX operating system or a variation of it, such as AIX (used in IBM
workstations), Solaris (used in SUN workstations) and HPUX (used in HP
workstations).
Processor Design: PCs normally use CPUs (Central Processing Units)
based on the Complex Instruction Set Computer (CISC) technology,
whereas workstation CPUs are based on the Reduced Instruction Set
Computer (RISC) technology.
Self-Instructional
Material 27
Introduction to Computers Special Purpose Computers
These types of computers are digital or an analog computers which are specifically
designed to perform desired specific tasks. These are high performance computing
NOTES systems with special hardware architecture, which is dedicated to solve a specific
problem. This is performed with the help of specially programmed FPGA (Field
Programmable Gate Array) chips or custom VLSI (Very-Large-Scale Integration)
chips. They are used for special applications, for example, astrophysics
computations, GRAPE-6 (for astrophysics and molecular dynamics), Hydra (for
playing chess), MDGRAPE-3 (for protein structure computations), and so on.
Micro, Mini, Mainframe and Supercomputers
These are as follows:
Microcomputers
Microcomputers are developed from advanced computer technology. They are
commonly used at home, classroom and in the workplace. Microcomputers are
called home computers, personal computers, laptops, personal digital assistants,
and so on. They are powerful and easy to operate. In recent years, computers
were made portable and affordable. The major characteristics of a microcomputer
are as follows:
Microcomputers are capable of performing data processing jobs and solving
numerical programs. Microcomputers work rapidly like minicomputers.
Microcomputers have reasonable memory capacity which can be measured
in megabytes.
Microcomputers are reasonably priced. Varieties of microcomputers are
available in the market, which can be as per the requirement of smaller
business companies and educational institutions.
Processing speed of microcomputers is measured in megahertz. A
microcomputer running at 90 MHz works approximately at 90 MIPS.
Microcomputers have drives for floppy disks, compact disks and hard disks.
Only one user can operate a microcomputer at a time.
Microcomputers are usually dedicated to one job. Millions of people use
microcomputers to increase their personal productivity.
Useful accessory tools, such as clock, calendar, calculator, daily schedule
reminders, scratch pads, and so on, are available in a microcomputer.
Laptop computers, also called notebook computers, are microcomputers.
They use the battery power source. Laptop computers have a keyboard,
mouse, floppy disk drive, CD drive, hard disk drive and monitor. Laptop
computers are expensive in comparison to personal computers.
Self-Instructional
28 Material
Minicomputers Introduction to Computers
Self-Instructional
30 Material
written in a manner that can break up the original problem into smaller modules. Introduction to Computers
NOTES
2.5 SUMMARY
Self-Instructional
Material 35
Introduction to Computers Controlling: It refers to directing the sequence and the manner in which all
the previous functions are carried out.
Inputting: The process in which the user specify a set of commands to
process data into the computer system.
NOTES
Williams, Brian and Stacey Sawyer. 2009. Using Information Technology, 6th
edition. New Jersey: McGraw-Hill.
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2012. Operating System
Concepts, 9th edition. New Delhi: Wiley.
Black, Uyless D. 1993. Computer Networks: Protocols, Standards, and
Interfaces, 2nd edition. New Jersey: PTR Prentice Hall.
Nagpal, D.P. 2006. Web Design Technology (Theory and Techniques on the
Cutting Edge), 1st edition. New Delhi: S.Chand & Company.
Self-Instructional
36 Material
Networking
BLOCK - II
NETWORKING
NOTES
UNIT 3 NETWORKING
Structure
3.0 Introduction
3.1 Objectives
3.2 Concepts and Objectives
3.3 Types of Network
3.4 Answers to Check Your Progress Questions
3.5 Summary
3.6 Key Words
3.7 Self Assessment Questions and Exercises
3.8 Further Readings
3.0 INTRODUCTION
NOTES
3.1 OBJECTIVES
The use of computers and its related technology in the field of communication has
modified the way of storage and transmission of information in the libraries all over
the world. The computers form an integral information machine by linking the
computers and their communication circuits to other terminals or computers, thus,
forming a network of computers and introducing the ‘Network System’. Therefore,
a library, where a group of computers are used to store and exchange information,
may use a network of computers.
A network is defined as, ‘two or more libraries and/or other organizations
engaged in a common pattern of information exchange, through communications,
for some functional purpose. A network usually consists of a formal arrangement
whereby materials, information and services provided by a variety of libraries and
other organizations are available to all potential users. Libraries may be in different
jurisdictions but agree to serve one another on the same basis as each serves its
own constituents. Computer and telecommunications may be among the tools
used for facilitating communication among them.’
The above definition of network was given by the US National Commission
on Libraries and Information Science (NCLIS) in its National Program in 1975.
Another definition of computer networks was given by Information
Technology consultant and author James Martin. He stated that: ‘A network is a
group of individuals or organizations that are interconnected. The linking must
include a communication mechanism, and many networks exist for the express
purpose of facilitating certain types of communication among their members. In
the library world, institutions from network primarily to achieve better sharing of
resources—resources consisting of bibliographic information and of collection—
and better services to patrons.’ It must be emphasized that the particular focus in
this gathering will be on online networks, those using computers and linking members
to the computer resources by means of telecommunication connections.
When two or more libraries exchange information or, as described in the
layman’s language, talk to each other, it leads to the development of a network.
Self-Instructional
38 Material
The main functions performed by a library network where one library provides Networking
procured by them.
Creating of library networks helps the member libraries in providing
information services to its users by sharing their various resources. In this manner,
NOTES
the member libraries are mainly dependent on each other for accessing documents.
For example, the librarian of Library A would depend on the documents stored in
Library B or the collection of Library B documents that can be shared over the
library network. The main objectives and aims of a particular library network can
be stated as follows:
Encourages sharing of resources and cooperation activities among various
libraries. This can be done by following different methods of resource
sharing, both reliable and efficient in nature. Some of these are as follows:
o Maximizing the use of resources by promoting interlibrary loans.
o Helping to establish Document Delivery Services which enables sharing
of copies of those documents which are not available in a specific
library.
o Establishing communication links through interpersonal communication.
o Facilitating training of manpower and enabling refresher courses among
members. The different members of a library network and the library
staff can stand benefited by the various research activities conducted
in this manner.
o Gaining access to a large number of library documents, both national
as well as international.
Automating the various facilities at individual libraries, thus, helping in
improving utilization of resources along with the various service leveling
the following areas:
o Circulation of documents across libraries
o Fund accounting and acquisition of books and publications
o Helping member libraries with the process of cataloging of books and
non-book materials along with production of catalogs
o Serial control
o Rapid retrieval and communication of information in the libraries as a
result of implementing electronic services
Coordinating with different international, national and regional networks
that will aid in the exchange of documents and information. This can
then be accessed by various libraries and users.
Reduction in unnecessary duplication of documents wherever possible
along with proper coordination of efforts towards suitable collection
development process. This helps in:
Self-Instructional
Material 41
Networking o Reducing in the operational cost of the collection development process
o Using mutual cooperation to develop collection process
o Controlling the rate at which the cost of collection development has
NOTES increased over time
Creating a database of institutions, library specialists and projects that
can be utilized in online information services.
Developing a bibliographic database of books, non-book materials and
serials that will help in accessing and searching of books.
Maintaining and monitoring a catalog of search process by establishing
referral centers along with serials and non-book materials.
The main purpose of establishing library networks is to share the resources
to avoid unsolicited wastage of limited finance available. However, you cannot
categorize all the networks as library functions because of the functions they perform.
Some of the important functions so performed include:
Establishing of a tool that helps in sharing of resources
Rationalizing the function of acquiring, adapting and adhering to the
international standards for on-time delivery of documents and uniformity
of records
Creating certain tools that help in sharing resources, such as union
catalogs
Rationalizing the acquisition process
Based on the functions described above, the library functions can be
categorized as follows:
Providing Information Services to the Users: These functions are
primarily goal-oriented, thus, fulfilling the primary functions that a network
must perform. Some of the functions that may fall under this category
are as follows:
o Loan services performed across libraries where each member library
should have the facility of photocopying and delivering documents to
other libraries
o Reference and Referral facility where each library should have a
dedicated email facility along with a dedicated telephone line at its
disposal
o Having proper access to relevant databases to help them prepare
retrospective bibliography which will help in finding out if a particular
document is available or not
Providing Technical Services to the Member Libraries: Some of
the functions that are included in this category are as follows:
o Locating and identifying documents with the help of cataloging and
Self-Instructional other resource services
42 Material
o Using a system of circulation control Networking
NOTES
As shown in Figure 3.2, the central node O contains the records or databases
of all the bibliographic resources and all the other nodes (A, B, C, D and E) make
use of these resources. In the star network, the database is updated and maintained
by node O only.
Hierarchical Network: In this type of network, each member node
shares the resources at the local level. Therefore, each node, or in other
words the participating library, sends unfulfilled requests to other libraries
which may be at a level higher than this library. The unfulfilled requests
are termed as ‘library of last resort’ and are then shared with other
centers to help find the necessary books and material. Figure 3.3 shows
the configuration of the member libraries.
members generally find all the required resources at the lower nodes where all the
information is stored and retrieved at their respective libraries. Only the requests
that cannot be met and, hence, are unsatisfied are passed to the upper node A1. If
the requests are not even fulfilled at this level, as a last resort, they are passed to NOTES
the node D which may then check the centers, A2 and A3, respectively.
Distributed Network: In this type of network, all the members may
store different resources which can be shared with one another as and
when the need arises.
Self-Instructional
Material 45
Networking
NOTES
NOTES
LAN, MAN and WAN: The networks that are classified according to
the geographical or distance coverage fall under this category. Let us
know more about them:
o Local Area Network or LANs: When the computers that form a
part of LAN are located within the same building or at a distance that
ranges less than 1 kilometer from each other.
o Metropolitan Area Network or MANs: The computers connected
within a metropolitan city form a part of MANs. Good examples of
such networks are mobile or cellular phone networks.
o Wide Area Network or WANs: When the computers comprising a
network are distributed over a very large geographical region not only
in a particular state but all over the entire country as well, such a
network is called a Wide Area Network. The range of such networks
is generally more than 30 kilometers. Such networks either use satellite
connections, cable connections or microwave connections to get
connected with other networks. Many such Wide Area Networks are
maintained by large telephone companies. The Internet is a typical
example of a WAN that does not connect a number of LANs and
WANs together.
Self-Instructional
Material 47
Networking
3.4 ANSWERS TO CHECK YOUR PROGRESS
QUESTIONS
NOTES 1. A network is defined as, ‘two or more libraries and/or other organizations
engaged in a common pattern of information exchange, through
communications, for some functional purpose.
2. When two or more libraries exchange information or, as described in the
layman’s language, talk to each other, it leads to the development of a
network.
3. Creating of library networks helps the member libraries in providing
information services to its users by sharing their various resources.
4. Star network is a type of network, a centralized bibliographical database is
created and maintained by one of the member libraries or a node.
5. Hierarchical network is a type of network, that each member node shares
the resources at the local level.
6. Complex networks is a network that consist of a number of machines with
different hardware configurations where the configuration of one machine is
neither compatible nor understood by machines from other vendors.
3.5 SUMMARY
The use of computers and its related technology in the field of communication
has modified the way of storage and transmission of information in the libraries
all over the world. The computers form an integral information machine by
linking the computers and their communication circuits to other terminals or
computers, thus, forming a network of computers and introducing the
‘Network System’.
A network is defined as, ‘two or more libraries and/or other organizations
engaged in a common pattern of information exchange, through
communications, for some functional purpose. A network usually consists
of a formal arrangement whereby materials, information and services
provided by a variety of libraries and other organizations are available to all
potential users. Libraries may be in different jurisdictions but agree to serve
one another on the same basis as each serves its own constituents. Computer
and telecommunications may be among the tools used for facilitating
communication among them.’
When two or more libraries exchange information or, as described in the
layman’s language, talk to each other, it leads to the development of a
network. The main functions performed by a library network where one
library provides some kind of service to another library include bibliographic
Self-Instructional
48 Material
exchange in different forms and interlibrary loan. In a library network, a Networking
development process?
4. What are the functions performed by library functions?
5. Define the following terms: NOTES
Star network
Hierarchical network
Distributed network
6. Brief a note on Peer-to-Peer network.
Long Answer Questions
1. What are the main aims and objectives of a particular library network?
2. List the library function of library networks.
3. Give an elaborated note on the types of networks.
4. Distinguish between client/server based networks and complex networks.
Williams, Brian and Stacey Sawyer. 2009. Using Information Technology, 6th
edition. New Jersey: McGraw-Hill.
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2012. Operating System
Concepts, 9th edition. New Delhi: Wiley.
Black, Uyless D. 1993. Computer Networks: Protocols, Standards, and
Interfaces, 2nd edition. New Jersey: PTR Prentice Hall.
Nagpal, D.P. 2006. Web Design Technology (Theory and Techniques on the
Cutting Edge), 1st edition. New Delhi: S.Chand & Company.
Self-Instructional
Material 51
Telecommunication
UNIT 4 TELECOMMUNICATION
NOTES Structure
4.0 Introduction
4.1 Objectives
4.2 Wired and Wireless Communication
4.2.1 Transmission Concepts and Terms
4.2.2 Twisted Pair (Copper Conductors)
4.2.3 Unshielded Twisted Pair (UTP)
4.2.4 Shielded Copper or STP
4.2.5 Coaxial Cable
4.2.6 Optical Fibre
4.2.7 Unguided Media
4.3 Wi-Fi
4.4 Answers to Check Your Progress Questions
4.5 Summary
4.6 Key Words
4.7 Self Assessment Questions and Exercises
4.8 Further Readings
4.0 INTRODUCTION
The guided media includes all wired media, also referred to as conducted or
bounded media.
Unguided media includes all traditional wireless media, also referred to as
radiated, or unbounded.
In the transmission of signal the data is encoded to energy and then energy
is transmitted. Similarly, at the receiving end the energy is decoded back to data.
This energy can be electrical, light and radio, etc. Therefore this transmitted energy
is carried through a medium, which depends upon the type of energy being
transmitted. The energy in different forms have different properties and therefore
cannot be transmitted using the single media. They have different requirements for
transmission including standard specified hardware for data encoding and creating
links to transmission medium. Media can be copper, glass and air as bounded and
unbounded media respectively.
4.2.1 Transmission Concepts and Terms
Before discussing the different kinds of transmission medium, it becomes necessary
to know about the basic concepts and terminologies associated with the
transmission of a signal.
Frequency Spectrum
The symbols in Table 4.1 have the following meanings:
K (Kilo) = 1,000,
M (Mega) = 1,000,000 (1 million),
G (Giga) = 1,000,000 (1 billion)
T (Tera) = 1,000,000,000 (1 trillion)
cm = centimeter (1/100 metre)
mm = millimeter (1/1,000 metre)
µ = micron (1/1,000,000 metre) Self-Instructional
Material 53
Telecommunication In the transmission of data the range of carrier frequencies is based on the
nature of the medium and the requirements of the applications supported. Therefore,
frequency spectrum may be defined as the range of frequencies being supported
by a particular transmission medium. The actual range of frequencies supporting a
NOTES given communication is known as a pass band. These are given in Table 4.1.
Bandwidth
In a very general way bandwidth may be defined as the range of frequencies, which
a channel is allowed to pass through the signals between that frequency ranges. In
other words we may say that bandwidth is the difference between the highest and
the lowest frequencies of a band and is expressed in Hertz. In general, the greater
the bandwidth, the higher will be the data transmission rate or throughput. It should
be noted that bandwidth and data transmission rate are very closely interrelated to
each other. Clearly, any transmission system becomes more attractive if the available
bandwidth is greater, introduced errors are fewer, and the maximum distance between
various network elements (amplifiers, repeaters, and antennae) is greater.
Table 4.1 Frequency Spectrums
Low Frequency (LF) Radio 30 Hz–300 kHz 10–1 Km Radio Navigation, Maritime
Communications
Medium Frequency (MF) 300 kHz–3 MHz 1 Km–100 m Radio Navigation, AM Radio
Radio
High Frequency (HF) 3 MHz–30 MHz 100–10 m Citizens Band (CB) Radio
The higher frequency signals offer greater bandwidth; they also generally suffer to
a greater extent from signal attenuation than lower frequencies. This fact results in
more errors in transmission, unless the amplifiers/repeaters are spaced more closely NOTES
together. It clearly demonstrates the close and direct relationship between
bandwidth, distance, and error performance.
Bandwidth, in this context, refers to the raw amount of bandwidth the medium
supports. Error performance refers to the number or percentage of errors, which
are introduced in the process of transmission. Distance refers to the minimum and
maximum spatial separation between devices over a link, in the context of a
complete, end-to-end circuit.
Propagation Delay
Propagation delay is the time taken by a signal to travel from transmitter to receiver
across a data communication system. The speed of the electromagnetic energy is
roughly the speed of light (30,000 km per second) in free space. The speed of
propagation for twisted pair or coaxial cable is a fraction of this figure. The nature
of the data communication system will have considerable influence on the level of
propagation delay. In other words, the total length of the circuit directly influences
the length of time it takes for the signal to reach the receiver.
Security
Security, in the context of transmission systems, addresses the protection of data
from interception as it transverses the network. Particularly in the case of data
networking, it is also important that access to a remote system and the data resident
on it be limited to authorised users; that so, methods of authentication must be
employed to verify that the access request is legitimate and authentic.
Resistance to Environmental Conditions
Resistance to environmental conditions applies specially especially to wired systems.
Twisted pair, coaxial, and fibre optic cables are manipulated physically as they are
deployed and reconfigured. Clearly, each has certain physical limits to the amount
of bending and twisting (flex strength) it can tolerate, as well as the amount of
weight or longitudinal stress it can support (tensile strength), without breaking
(break strength). Fibre optic cables are notoriously susceptible in this regard.
Cables hung from poles expand and contract with changes in ambient temperature;
while glass fibre optic cables expand and contract relatively little, twisted pair
copper wire is more expansive.
The issue of resistance to environmental conditions also applies to airwave
systems, as reflective dishes, antennae, and other devices used in microwave,
satellite, and infrared technologies must be mounted securely to deal with wind
and other forces of nature. Additionally, the towers, walls and roofs on which they
Self-Instructional
Material 55
Telecommunication are mounted must be constructed and braced properly in order to withstand such
forces.
Physical Dimensions
NOTES The physical dimensions of a transmission system must be considered as well.
This is true, in the case of wired systems. The weight of a cable system must be
considered as one attempts to deploy it effectively. Additionally, the bulk (diameter)
of the cable is of importance, as conduit and raceway space often is at a premium.
The physical dimensions of airwave systems also must be considered, as the size
and weight of the reflective dish and mounting system (for example, bracket and
tower) may require support.
Cost and Ease of Installation
Cost issues abound in the selection of an appropriate transmission medium. Such
issues include the cost of acquisition, deployment, operation, and maintenance
(O&M), and upgrade or replacement. Without a lengthy discussion of each cost
issue, it is particularly noteworthy to compare the costs of deployment of wired
versus wireless media.
Wired transmission systems require a right-of-way and this should be secured.
Wired transmission involves a cost component in the form infrastructure. The
infrastructure includes digging of trenches and boring of holes so that cable can be
pulled and poles may be mounted. In addition, amplifiers or repeaters may be
placed. Such costs are not trivial. Unlike wired system, wireless systems require
secured right-of-way and antennae. It may be inferred that the deployment of
wired systems certainly speak of a set of cost issues that often can be more
problematic.
Selection Criteria
When choosing the most effective transmission media, consider the above
mentioned transmission characteristics which are listed below:
Bandwidth/Transmission rate
Distances
Propagation delay
Security
Resistance to environmental conditions
Physical dimensions
Cost and ease of installation
Bounded media
Bounded media or wired transmission systems employ physical media, which are
tangible. Also known as conducted systems, wired media employs a metallic or
Self-Instructional
56 Material
glass conductor which serves to conduct, electromagnetic energy. The twisted Telecommunication
pair and coaxial cable systems conduct electrical energy through a copper medium.
Fibre optic systems conduct light or optical energy, generally using a glass
conductor. The term bounded or guided media means that the signal is contained
within an enclosed physical path. It also refers to the fact that some form of shield, NOTES
cladding, and/or insulation is employed to bind the signal within the core medium,
thereby improving signal strength over a distance and enhancing the performance
of the transmission system in the process. Twisted pair as unshielded and shielded,
coaxial and fibre optic cable systems fall into this category.
4.2.2 Twisted Pair (Copper Conductors)
A twisted pair as shown in Figure 4.1 is a pair of copper wires in which each wire
has diameter in the range of 0.4-0.8 mm is used. They are twisted together and
wrapped with a plastic coating. The twisting improves the electrical noise immunity
and decreases the error rate of the data communication system. Each conductor
is separately insulated by some low smoke and fires retardant substance.
Polyethylene, polyvinyl chloride, flouropolymer resin and Teflon are some substances
that are used for insulation purposes.
A UTP cable normally may enclose about up to 4200 twisted pairs. The UTP
offers advantages that include flexibility, cost effective transmission medium and
they are subtly used for both voice and data communications. However, the limited
bandwidth offered by UTP is its greatest weakness and therefore it does not find
deployment for long distance transmission and low error rates.
4.2.4 Shielded Copper or STP
Shielded twisted pair (STP) differs from UTP in that a metallic shield or screen
surrounds the pairs, which may or may not be twisted. As illustrated in Figure 4.3,
the pairs can be individually shielded. A single shield can surround a cable containing
multiple pairs or both techniques can be employed in tandem. The shield itself is
made of aluminum, steel, or copper. This is in the form of a metallic foil or woven
meshes and is electrically grounded. Although less effective, the shield sometimes
is in the form of nickel and/or gold plating of the individual conductors.
Self-Instructional
58 Material
Telecommunication
NOTES
Advantages
Shielded copper offers the advantage of enhanced performance for reasons of
reduced emissions and reduction of electromagnetic interference. Reduction of
emissions offers the advantage of maintaining the strength of the signal through the
confinement of the electromagnetic field within the conductor. In other words,
signal loss is reduced. An additional benefit of this reduction of emissions is that
high-frequency signals do not cause interference in adjacent pairs or cables.
Immunity from interference is realized through the shielding process, which reflects
electromagnetic noise from outside sources, such as electric motors, other cables
and wires, and radio systems.
Disadvantages
Shielded twisted pair, on the other hand, has several disadvantages. First, the raw
cost of acquisition is greater as the medium is more expensive to produce. Second,
the cost of deployment is greater as the additional weight of the shield makes it
more difficult to deploy. Additionally, the electrical grounding of the shield requires
more time and effort.
General Properties of Twisted Pair
Gauge: Gauge is a measure of the thickness of the conductor. The thicker
the wire, the lesser the resistance, is the stronger the signal over a given
distance, and the better the performance of the medium. Thicker wires also
offer the advantage of greater break strength. The gauge numbers are
retrogressive. In other words, the larger is the number, the smaller is the
conductor.
Configuration: In a single pair configuration, the pair of wires is enclosed
in a sheath or jacket, made of polyethylene, polyvinyl chloride or Teflon.
Usually, multiple pairs are so bundled in order to minimise deployment costs
associated with connecting multiple devices (e.g., electronic PBX or KTS
telephone sets, data terminals, and modems) at a single workstation.
Bandwidth: The effective capacity of twisted pair cable depends on several
factors, including the gauge of the conductor, the length of the circuit and
the spacing of the amplifiers/repeaters. One must also recognise that a high-
Self-Instructional
Material 59
Telecommunication bandwidth (high frequency) application may cause interference with other
signals on other pairs in close proximity.
Error Performance: Signal quality is always important, especially relative
to data transmission. Twisted pair is especially susceptible to the impacts of
NOTES
outside interference, as the lightly insulated wire act as antennae and, thereby,
absorbs such errant signals. Potential sources of Electro Magnetic
Interference (EMI) include electric motors, radio transmissions and
fluorescent light boxes. As transmission frequency increases, the error
performance of copper degrades significantly with signal attenuation
increasing approximately as the square root of frequency.
Distance: Twisted pair is distance limited. As distance between network
elements increases, attenuation (signal loss) increases and quality decreases
at a given frequency. As bandwidth increases, the carrier frequency increases,
attenuation becomes more of a issue, and amplifiers/repeaters must be
spaced more closely.
Security: Twisted pair is inherently an insecure transmission medium. It is
relatively simple to place physical taps on UTP. Additionally, the radiated
energy is easily intercepted through the use of antennae or inductive coils,
without the requirement for placement of a physical tap.
Cost: The acquisition, deployment and rearrangement costs of UTP are
very low, at least in inside wire applications. In, high-capacity, long distance
applications, such as inter-office trunking, however, the relative cost is very
high, due to the requirements for trenching or boring, conduit placement,
and splicing of large, multi pair cables. Additionally, there are finite limits to
the capacity and other performance characteristics of UTP, regardless of
the inventiveness of technologists. Hence, the popularity of alternatives such
as microwave and fibre-optic cable.
Applications: UTP’s low cost including recently developed methods of
improving its performance has increased its application in short-haul
distribution systems or inside wire applications. Current and continuing
applications include the local loop, inside wire and cable, and terminal-to-
LAN. Generally speaking, UTP no longer is deployed in long haul or outside
the premises transmission systems.
The additional cost of shielded copper limits its application to inside wire
applications. Specifically, it generally is limited to application in high-noise
environments. It also is deployed where high frequency signals are transmitted
and there is concern about either distance performance or interference with adjacent
pairs. Examples include LANs and image transmission.
4.2.5 Coaxial Cable
The main limiting factor of a twisted pair cable is caused by a phenomenon known
as the skin effect. As the frequency of the transmitted signal increases, the current
Self-Instructional
60 Material
flowing in the wires tends to flow only on the outer surface of the wire, thus using Telecommunication
the less of the available cross section. This increases the electrical resistance of the
wires for higher frequency signals leading to higher attenuation. In addition, at
higher frequencies, more signal power is lost as a result of radiation effects. Hence
for applications that demand higher frequencies, another type of transmission NOTES
medium must be used. Coaxial cable minimizes both these effects.
Coaxial Cable as shown in Figure 4.4 is a very robust shielded copper wire
two-conductor cable in which a solid centre conductor runs concentrically (coaxial)
inside a solid outer circular conductor. This forms an electromagnetic shield around
the former that serves to greatly improve signal strength and integrity. The two
conductors are separated by insulation. A layer of dielectric (nonconductive)
material, such as PVC or Teflon then protects the entire cable.
allows fibre to bend (some!) without breaking. Light emitting diode (LED) or
laser injects light into fibre for transmission. Light sensitive receiver at other end
translates light back into data.
NOTES
Fig. 4.6 Glass Fibre Optic Cable, Side View, and Cross Section
The light pulse travels down the center core of the glass fibre. Surrounding
the inner core is a layer of glass cladding, with a slightly different refractive index.
The cladding serves to reflect the light waves back into the inner core. Surrounding
the cladding is a layer of protective plastic coating that seals the cable and provides
mechanical protection. This is shown in Figure 4.6. Typically, multiple fibers are
housed in a single sheath, which may be heavily armored.
Light propagates along the optical fibre core in one of the following ways
depending on the type and width of core material used.
Multimode Fibre
Here, the core diameter is relatively large compared to a wavelength of light. Core
diameter ranges from 50 micrometers (µm) to 1,000 µm, compared to the
wavelength of light of about 1 µm. This means that light can propagate through the
fibre in many different ray paths, or modes, hence the name multimode. Multimode
fibre is less expensive to produce and inferior in performance because of the larger
Self-Instructional
Material 63
Telecommunication diameter of the inner core. When the light rays travel down the fibre, they spread
out due to a phenomenon known as modal dispersion. Although reflected back
into the inner core by the cladding, they travel different distances and, therefore,
arrive at different times. The received signal thus has a wider pulse width than the
NOTES input signal with a corresponding decrease in the speed of transmission. As a
result, multimode fibre is relegated to applications involving relatively short distances
and lower speeds of transmission, for example, LANs and campus environments.
Two basic types of multimode fibres exist. The simpler and older type is a ‘step
index’ fibre, where the index of refraction (the ability of a material to bend light) is
the same all across the core of the fibre.
Step Index Multimode Fibre
This is shown in Figure 4.7. With all these different ray paths or modes of
propagation, different rays travel different distances, and take different amounts of
time to transit the length of a fibre. This being the case, if a short pulse of light is
injected into a fibre, the various rays emanating from that pulse will arrive at the
other end of the fibre at different times, and the output pulse will be of longer
duration than the input pulse. This phenomenon is called ‘modal dispersion’ (pulse
spreading), and limits the number of pulses per second that can be transmitted
down a fibre and is still recognised as separate pulses at the other end. This,
therefore, limits the bit rate or bandwidth of a multimode fibre. For step index
fibers, wherein no effort is made to compensate for modal dispersion, the bandwidth
is typically 20 to 30 MHz over a length of one kilometer of fibre, expressed as
‘MHz - km’.
has a variable refractive index. In such multimode graded index fibre light is refracted
by an increasing amount as it moves away from the core as shown in Figure 4.8.
This has the effect of narrowing the pulse width of the received signal compared
with stepped index fibre, allowing a corresponding increase in the speed of NOTES
transmission. They therefore can support a much higher bit rate or bandwidth.
Typical bandwidths of graded index fibers range from 100 MHz-km to well over
1GHz-km. The actual bandwidth depends on how well a particular fibre’s index
profile minimizes modal dispersion, and on the wavelength of light launched into
the fibre.
Monomode/Singlemode Fibre
This has a thinner inner core. The core diameter of about 9 µm is much closer in
size to the wavelength of light being propagated, about 1.3 µm. This limits the light
transmission to a single ray or mode of light to propagate down the core of the
fibre as shown in Figure 4.9. All the multiple-mode or multimode effects described
above are eliminated. However, one pulse-spreading mechanism remains. Just as
in the multimode fibres, different wavelengths of light travel at different speeds,
causing short pulses of light injected into the fibre to spread as they travel. This
phenomenon is called ‘chromatic dispersion’.
Self-Instructional
66 Material
Telecommunication
NOTES
Self-Instructional
Material 67
Telecommunication Cost: While the acquisition, deployment, and rearrangement costs of fibre
are relatively high, the immense bandwidth can outweigh that cost in
bandwidth-intensive applications. At Gbps speeds, a single set of fibers
can carry huge volumes of digital transmissions over longer distances than
NOTES alternative systems, thereby lowering the transport cost per bit and cost per
conversation to fractions of a penny per minute.
Applications: Applications for fibre optic transmission systems are
bandwidth intensive. Such applications include backbone carrier networks,
international submarine cables, backbone LANs (FDDI), interoffice trunking,
computer-to-computer distribution networks (CATV and Information
Superhighway) and fibre to the desktop (Computer Aided Design).
Bounded Media Comparison Chart
Two transmitters cannot share the same frequency band because of the
mutual interference and therefore band usage is regulated. The International
Telecommunication Union (ITU) regulates international use of the radio spectrum.
Domestic use of the radio spectrum is regulated by national agencies such as
Wireless Planning and Coordination (WPC) in India. WPC assigns each
transmission source a band of operation, a transmitter radiation pattern, and a
maximum transmitter power. The Table 4.1 shows the bands and frequency ranges.
Omni directional or directional antennas are used to broadcast radio waves
depending upon band. The transceiver unit, which is consisted of transmitter and
receiver along with the antenna, determines the power of RF signal. Other
characteristics of radio waves is that in vacuum all electromagnetic waves or radio
waves travel at the same speed, i.e., at the speed of light which is equal to 3 × 108
metre per seconds. In any medium this speed gets reduced and also becomes
frequency dependent. In case of copper the speed of light becomes approximately
Self-Instructional
Material 69
Telecommunication two thirds of the speed of light. The basic features of the radio waves are as
follows:
They are easy to generate
NOTES They have the same velocity in vacuum
They may traverse long distances
They are omni directional
They can penetrate building easily so they find extensive use in
communication both indoor and outdoor
they are frequency dependent. At low frequency they can pass through
obstacles. However, the power falls off sharply with distance from the source
because power is inversely proportional to cube of the distance from the
source. At HF they travel in straight lines and bounce off obstacles.
Very Low Frequency (VLF)
The VLF method takes advantage of electromagnetic radiation generated in the
low frequency band of 3-30 kHz by powerful radio transmitters used in long-
range communications and navigational systems. At large distances from the source,
the electromagnetic field is planar and horizontal and the electric component E lies
in a vertical plane perpendicular to the H component in the direction of propagation
and follow the ground. AM uses VLF band. This band of frequencies cannot be
used for data transfer because they offer relatively low bandwidth.
Microwave Transmission
Microwave transmission is a form of radio transmission which uses extremely high
frequencies. All the specified frequency ranges are in the GHz range and the
wavelength in the millimetre range. Since these types of high frequency signals are
prone to attenuation, hence, amplification is required after a specific distance. The
radio beams are highly focussed in order to increase the transmission distance of
the signals. The transmit antenna is centred in a concave metallic dish which focuses
the radio beam with maximum effect, as illustrated in Figure 4.12. Similarly the
receiver dish is also concave in nature which collects the maximum amount of
incoming signal.
It is a point-to-point transmission system, instead of a broadcast system.
Also each antenna must be within the line of sight of the next antenna. Due to the
curvature of the earth, the microwave signal hops are limited to a maximum of 80
km.
General Properties of Microwave Transmission
Configuration: Microwave radio consists of an antennae at the center of
a reflective dish which is attached to the structure such as a tower or a
building. Cables connect the antennae to the actual equipment.
Self-Instructional
70 Material
Bandwidth: Bandwidth in excess of 6 Gbps is common in microwave Telecommunication
transmission.
Error Performance: Assuming proper design, digital microwave performs
well in this regard. However, environmental interferences such as,
NOTES
precipitation, haze, smog and smoke create troubles for high frequency
transmission, yet microwave performs much better in this regard.
Distance: At higher frequencies, microwave is distance limited, which can
be overcome through complex arrays of antennae incorporating spatial
diversity in order to collect more signals.
Security: As is the case with all radio communication systems, microwave
is inherently insecure, which can be improved through encryption.
for the downlink, can better penetrate the earth’s atmosphere and
electromagnetic field, which can act to bend the incoming signal much as
light bends when entering a pool of water.
NOTES
Table 4.4 Microwave Frequency Bands
4.3 WI-FI
The Wi-Fi stands for Wireless Fidelity. It is used for wireless devices. The Wi-Fi
Alliance represents the wireless standard protocol and basically non-profit
organization. This technology supports interoperability features for communication
devices. It connects the networking system without cables. But for this, Wi-Fi and
regular Internet Service Provider (ISP) services are needed. The Bluetooth
technology has been designed to connect both mobile devices and peripherals
that currently require a wire. The services of Bluetooth are provided by wireless in
which no setup is needed. The transfer speed of data rate is 1.0 Mbps. It holds
radio frequency chips which are plugged into the devices. It maintains 2.45 GHz
frequency. It uses a technique called spread spectrum frequency hopping. The
Bluetooth and wireless networking are closely related to Wi-Fi connectivity through
radio waves. But, the basic difference between Bluetooth and Wi-Fi is that
Bluetooth replaces cables at the primary stage whereas Wi-Fi is completely
considered to be wireless technology. The manufacturers of Wi-Fi Alliance build
the various devices for 802.11 standards. Approximately, 205 companies joined
to the Wi-Fi Alliance and almost 900 products have been certified to the
interoperable system. These companies give assurance that the Wi-Fi devices are
connected by physical layer in reference models. Wi-Fi Protected Access (WPA)
solution was added recently to the Wi-Fi standard. The physical and access control
layer implement the extra enhanced features, such as Internet security. The Wi-Fi
can be grown by leaps and bounds because it is connected via spectrum. It uses
unlicensed 24 GHz and 5 GHz bands. It provides data throughput for most uses.
Self-Instructional
76 Material
The prime equipment required for Wi-Fi connection is Wi-Fi PC card. It is common Telecommunication
way to connect the computer to the Internet without wires. Wi-Fi PC card is
technically known as Personal Computer Memory Card International Association
(PCMCIA). The two prime solutions included by the Wi-Fi device during data
transmission are as follows: NOTES
You can work almost anywhere by mobile Wi-Fi device to connect to the
Internet without wires when away from your home or office.
You can free yourself from the need to drill holes and snake wires by creating
a network at the home or office using Wi-Fi devices.
A hotspot is, used in Wi-Fi connection, an area in which Wi-Fi users connect
to the Internet (Refer Figure 4.15). Wireless zone increases the mobility of the
users. These users are represented by numbers, such as 2, 3 and 4. Number 1
represents hotspot through which various users are connected with Wi-Fi zone.
Number 2 represents desktop users, Number 3 represents mobile users and
Number 4 represents laptop users. Following approaches are used to make the
searching information as follows:
You can use the search tool provided by organization. The branches are
hosted by Wi-Fi hotspots. Let us take an example of Starbucks Coffee
Company. Starbucks chain is channeled across the world with the help
of Wi-Fi zone.
If you have signed with Wi-Fi provider you can search via ISP.
You can search many cross provider directories that are available with
Web.
The Wi-Fi hotspots are created around the antennas to outlet the radio
waves of wireless networking. It is confined to almost 10,000 hotspots in crowded
Self-Instructional
Material 77
Telecommunication areas, such as airport lounges, cafes, etc. A series of antennas are set up into the
city wide zones. The Internet connection is facilitated by Wi-Fi chips. The long
calls are possible with Wi-Fi technology. They are by bypassed network using
Voice over Internet Protocol (VoIP) technologies. The Wi-Fi assembled mobiles
NOTES and laptops are connected to these hotspots can be accessed frequently by paying
a certain fee. This amount can be paid by credit card on the login page provided
by Web browser. Users can hold their accounts provided by service providers,
such as BT Openzone, Skypezone, Nintendo Wi-Fi, T-Mobile,
O2, etc.
Internet
DSL
Cable, etc...
Modem
Wi-Fi
Wired Network
Access Router
Client
Point
Wired Network
Wireless
Client
Wi-Fi Wi-Fi
Devices Devices
In Figure 4.16, the Wi-Fi access point is interconnected with Wi-Fi devices
that are configured with router. Modem is also used to make connection between
router and Internet Digital Subscriber Line (DSL) cable. The main role of router is
to connect the Wi-Fi access point and wired network clients. The VoIP software
enables data, fax calls and voice across IP networks and represents Internet
telephony allowing a communication between two PCs over the packet switching
Internet. It is worked by encoding the voice information. Then, it is changed to
digital format. It provides cost benefits by converging data and voice over IP
network into the mobile phones. Many of the latest mobiles are connected with
Wi-Fi via VoIP technology. Between the Internet connection and Wi-Fi access
point, hardware design is needed to connect with the Internet and share the
internetworking connectivity. Following guidelines are required for connecting the
Wi-Fi with system unit:
Self-Instructional
78 Material
The WPA2 encryption is required for the communications. Telecommunication
(Theoretic)
Bluetooth
Ethernet
Throughput
(in Mbps) .38 6 10 11 24 54
802, 11b Wi-Fi
(Theoretic)
Figure 4.17 shows the various wireless connections that are set with speed
respectively, for example 802.11b Wi-Fi is 11 Mbps and 802.11gs Wi-Fi is 54
Mbps. Wi-Fi has alleviated the need to connect the communication devices
physically in a mesh of hundreds of cables.
Self-Instructional
Material 79
Telecommunication
1. The guided media includes all wired media, also referred to as conducted
or bounded media while the unguided media includes all traditional wireless
media, also referred to as radiated, or unbounded.
2. In the transmission of data the range of carrier frequencies is based on the
nature of the medium and the requirements of the applications supported.
3. Frequency spectrum may be defined as the range of frequencies being
supported by a particular transmission medium. The actual range of
frequencies supporting a given communication is known as a pass band.
4. Uplink frequency is the frequency used to transmit signal from earth station
to satellite, whereas downlink frequency is the frequency used to transmit
the signal from satellite to earth station.
5. Wi-Fi stands for Wireless Fidelity. It is used for wireless devices. The Wi-
Fi Alliance represents the wireless standard protocol and basically non-
profit organization.
6. The services of Bluetooth are provided by wireless in which no setup is
needed. It holds radio frequency chips which are plugged into the devices.
7. Wi-Fi Protected Access (WPA) solution was added recently to the Wi-Fi
standard. The physical and access control layer implement the extra
enhanced features, such as Internet security.
8. The primary equipment required for Wi-Fi connection is Wi-Fi PC card. It
is common way to connect the computer to the Internet without wires. Wi-
Fi PC card is technically known as Personal Computer Memory Card
International Association (PCMCIA).
4.5 SUMMARY
The guided media includes all wired media, also referred to as conducted
or bounded media, while unguided media includes all traditional wireless
media, also referred to as radiated, or unbounded.
Self-Instructional
80 Material
In the transmission of signal the data is encoded to energy and then energy Telecommunication
Self-Instructional
Material 81
Telecommunication metallic or glass conductor which serves to conduct, electromagnetic energy.
The twisted pair and coaxial cable systems conduct electrical energy through
a copper medium. Fibre optic systems conduct light or optical energy,
generally using a glass conductor. The term bounded or guided media means
NOTES
that the signal is contained within an enclosed physical path.
UTP the copper media, is commonly used in telephone lines. This is also
being used increasingly at higher data rates. The UTP has become the de
facto standard for horizontal wiring. Horizontal wiring specifies the connection
between the outlet and the termination in the communication closet.
A UTP cable normally may enclose about up to 4200 twisted pairs. The
UTP offers advantages that include flexibility, cost effective transmission
medium and they are subtly used for both voice and data communications.
However, the limited bandwidth offered by UTP is its greatest weakness
and therefore it does not find deployment for long distance transmission
and low error rates.
Shielded Twisted Pair (STP) differs from UTP in that a metallic shield or
screen surrounds the pairs, which may or may not be twisted.
Microwave transmission is a form of radio transmission which uses extremely
high frequencies. All the specified frequency ranges are in the GHz range
and the wavelength in the millimetre range. Since these types of high frequency
signals are prone to attenuation, hence, amplification is required after a
specific distance.
Uplink frequency is the frequency used to transmit signal from earth station
to satellite, whereas downlink frequency is the frequency used to transmit
the signal from satellite to earth station. In other words, the downlink
transmission is focused on a particular footprint, or area of coverage.
The Wi-Fi stands for Wireless Fidelity. It is used for wireless devices. The
Wi-Fi Alliance represents the wireless standard protocol and basically non-
profit organization. This technology supports interoperability features for
communication devices. It connects the networking system without cables.
Wi-Fi and regular Internet Service Provider (ISP) services are needed.
The Bluetooth technology has been designed to connect both mobile devices
and peripherals that currently require a wire.
The services of Bluetooth are provided by wireless in which no setup is
needed. The transfer speed of data rate is 1.0 Mbps. It holds radio
frequency chips which are plugged into the devices. It maintains 2.45 GHz
frequency. It uses a technique called spread spectrum frequency hopping.
The Bluetooth and wireless networking are closely related to Wi-Fi
connectivity through radio waves. But, the basic difference between
Bluetooth and Wi-Fi is that Bluetooth replaces cables at the primary stage
whereas Wi-Fi is completely considered to be wireless technology.
Self-Instructional
82 Material
The manufacturers of Wi-Fi Alliance build the various devices for 802.11 Telecommunication
Williams, Brian and Stacey Sawyer. 2009. Using Information Technology, 6th
edition. New Jersey: McGraw-Hill.
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2012. Operating System
Concepts, 9th edition. New Delhi: Wiley.
Black, Uyless D. 1993. Computer Networks: Protocols, Standards, and
Interfaces, 2nd edition. New Jersey: PTR Prentice Hall.
Nagpal, D.P. 2006. Web Design Technology (Theory and Techniques on the
Cutting Edge), 1st edition. New Delhi: S.Chand & Company.
Self-Instructional
84 Material
Hardware and Software
BLOCK - III
COMPUTER HARDWARE AND SOFTWARE
NOTES
UNIT 5 HARDWARE AND
SOFTWARE
Structure
5.0 Introduction
5.1 Objectives
5.2 Hardware of a Computer System
5.3 Software of a Computer System
5.4 Programming Language
5.4.1 Machine Language
5.4.2 Assembly Language
5.4.3 High-Level Languages
5.4.4 4 GL and 5 GL
5.4.5 Merits and Demerits of Various Programming Languages
5.5 Answers to Check Your Progress Questions
5.6 Summary
5.7 Key Words
5.8 Self Assessment Questions and Exercises
5.9 Further Readings
5.0 INTRODUCTION
5.1 OBJECTIVES
Self-Instructional
Material 87
Hardware and Software
company. They are not purchased ‘off-the-shelf’ like any word processing
software.
Customized COTS: In this classification, a user can enter into a contract
NOTES
with the software vendor to develop a COTS product for a special
purpose, that is, software can be customized according to the needs of the
user. Another growing trend is the development of COTS software
components—the components that are purchased and used to develop new
applications. The COTS software component vendors are essentially parts
stores which are classified according to their application types. These types
are listed as follows:
o Stand-Alone Software: A software that resides on a single computer
and does not interact with any other software installed in a different
computer.
o Embedded Software: A software that pertains to the part of unique
application involving hardware like automobile controller.
o Real-Time Software: In this type of software the Operations are
executed within very short time limits, often microseconds, e.g., radar
software in air traffic control system.
Network Software: In this type of software, software and its components
interact across a network.
Figure 5.2 Illustrates the various types of customized COTS.
Self-Instructional
92 Material
Machine language is very cumbersome to use and is tedious and time Hardware and Software
The number of operands varies with each computer and is therefore computer
dependent.
It is evident from the above that to program in machine language, the
programmer needs information about the internal structure of the computer. He
will also need to remember a number of operation codes and will also need to
keep track of the addresses of all the data items (i.e., which storage location has
which data item). Programming in machine language can be very tedious, time
consuming and still highly prone to errors. Further, locating such errors and effecting
modifications is also a mammoth task. Quite understandably, programmers felt the
need for moving away from machine language.
5.4.2 Assembly Language
Assembly language was the first step in the evolution of programming languages. It
used mnemonics (symbolic codes) to represent operation codes and strings of
characters to represent addresses. Instructions in assembly language may look as
shown in the accompanying example.
Opration Opration address
READ M
ADD L
C.
COBOL was standardized by ANSI in 1968 and in 1974. COBOL became
the most widely used programming language for business and data processing
NOTES
applications.
BASIC: BASIC (Beginner's All-purpose Symbolic Instruction Code) was
developed as a teaching tool for undergraduate students in 1966 by John
Kemeny and Thomas Kurtz, two professors at Dartmouth College.
Eventually BASIC was used as the main language amongst the personal
computer users.
A minimum version of BASIC was standardized by ANSI and is so simple
that it has been incorporated in every subsequent version of BASIC. Some
versions of BASIC include MBASIC (Microsoft BASIC), and CBASIC
(Compiler based BASIC).
One of the newer versions of BASIC, commonly known as Visual Basic,
has also evolved from the original BASIC language. It contains various
statements and functions that can be used to create applications for a
Windows or GUI environment.
PASCAL: PASCAL was designed by Nicholas Wirth, a Swiss professor,
in 1971. It was developed as a more structured language used for teaching
which Wirth named after the French mathematician Blaise Pascal, who also
designed the first successful mechanical calculator. His primary aim was to
provide a language that supported beginners learning good problem solving
and programming techniques.
In addition to manipulation of numbers, PASCAL supports manipulation of
vectors, matrices, strings of characters, records, files and lists, thereby
supporting non-numeric programming. Hence, it has proved to be an
attractive language for professional computer scientists.
PASCAL has been standardized by ISO (International Standards
Organization) and ANSI.
PL/1 (Programming Language 1) was developed by IBM in the 1960s and
was the first language that was attempted to be used for a variety of
applications rather than one particular area like business or science or artificial
Intelligence.
LISP (LISt Processing) was developed in the early 1950s but was
implemented in the 1959 by John McCarthy at the Massachusetts Institute
of Technology. It became a standard language with the artificial intelligence
community and was a program that could easily handle recursive.
C language was developed by Dennis Ritchie of Bell Laboratories in order
to implement the operating system UNIX.
Self-Instructional
Material 95
Hardware and Software C ++ was developed by the Bjarne Stroustrup of Bell Laboratories by
enhancing C. C++ is also used to write procedural programs like C but the
reason for its increased popularity is perhaps because of its capability to
handle the rigours of object-oriented programming. C and C++ are the
NOTES most extensively used general-purpose languages amongst programming
experts.
JAVA: Java is again an object-oriented language like the C++ but is a
simplified version with extra features. It is less prone to programming errors.
It was developed for writing programs that could be safely and easily
executed through the Internet. It is free from any kind of common virus
threats. It is basically a network-oriented language that can develop Website
pages with enhanced multimedia features using small java programs known
as java applets, Java is a secure to use over the Internet and is a platform
independent language.
5.4.4 4 GL and 5 GL
Fourth-Generation Languages
Fourth-generation languages are non-procedural. This means that they signify what
needs to be accomplished but do not specify how to do it. Fourth-generation
languages are characterized by simple English-like instructions and a quick and
easy learning process. They are so user-friendly that with little training and practice
an individual can write his/her own programs and generate the desired reports. It
does not require the services of a professional programmer to do the same. The
first fourth-generation language, called FORTH, was developed by Charles Morre,
an American astronomer, in 1970. FORTH is mainly used for industrial and scientific
control applications. FOCUS is another commonly known fourth-generation
language.
Fifth-Generation Languages
Fifth-generation languages are an outgrowth of research in the area of artificial
intelligence. They are, however, still in their infancy.
PROLOG (PROgramming LOGic): It is a logic programming language. It is a
general purpose language often associated with artificial intelligence and
computational linguistics. It has a purely logical subset, called pure Prolog, as well
as a number of extralogical features.
Prolog was developed in the early 1970s by two French computer scientists,
Alain Colmerauer and Philippe Roussel.
Some of other popular languages include:
GPSS (General Purpose System Simulator): Used for modelling
physical and environmental events.
SNOBOL (String-Oriented Symbolic Language): Designed for
Self-Instructional pattern matching and list processing.
96 Material
LOGO (a Version of LISP): Developed in the 1960s to help children Hardware and Software
Fig. 5.3 Distance between Real World Problems and Programming Languages
Self-Instructional
Material 97
Hardware and Software Table 5.1 Advantages and Disadvantages of C
Advantages Disadvantages
C supports pointers that basically refer to It has no runtime checking and is a case-
records, the address or location of function sensitive language.
NOTES or object in a memory.
It is used especially in game programming,
There is no strict checking in C code, for
and it is faster than C++. example, you can pass an integer value for
the float data type value.
It is a structured language, and it If the code extends, it is very difficult to fix
extensively uses pointers for memory, the bugs.
array, structures and functions.
JavaScript
JavaScript is a scripting language used in client-side script programming on the
Web. It makes dynamic updates to a HTML document in a browser. It interacts
between browsers and users. Table 5.2 explains the merits and demerits of the
JavaScript language.
Table 5.2 Merits and Demerits of the JavaScript Language
Merits Demerits
It runs fast because it is a client-side All browsers do not recognize JavaScript.
language. Some JavaScript versions limit the old
browsers.
The JavaScript code runs fast in a browser It depends on the compatibility of a
and makes quick connection with a server. browser. Different JavaScript versions are
available for different browsers. For
example, Netscape browser supports
JavaScript 1.5, Microsoft supports Jscript
and Internet Explorer 6.0 supports Jscript
5.6.
To write the JavaScript code, no extra tools It is limited to access and manipulate with
are required. Any HTML editor or notepad HTML code.
support it.
Merits Demerits
COBOL is a robust, understandable, It has a rigid hierarchical structure where
readable and self-documenting language. items are restricted to the environment
division.
It is a simple language having no pointers, In COBOL coding, programmers cannot
no user defined functions, and functions are write code for mobile devices or screen
used in a limited scope. readers.
It is portable, scalable and maintainable, This language cannot be used for
which reduces maintenance cost. It can developing web applications.
Self-Instructional work with new peripheral devices.
98 Material
ActionScript Hardware and Software
C++
C++ is also an object-oriented language that uses virtual functions, multiple
inheritance, exception handling, polymorphism, etc. Its object-oriented structure
allows the code to be reused that cuts down the development time. C++ provides
comprehensive coverage of abstract classes as interfaces, regular error handling,
standard strings, I/O streams, etc. Table 5.5 explains the merits and demerits of
the C++ language.
Table 5.5 Merits and Demerits of the C++ Language
Merits Demerits
This language works on graphic user It is complex for very large high-level
interface programming on a computer. programs and difficult to debug for web
applications.
It is well-suited language to write codes A library set is used with this
for OS drivers that are able to develop programming language that restricts a
platform-dependent applications. single platform or OS.
It provides various new operators, such as Program execution is a little bit slower
new, scope resolution operator (:: ). than C language.
C#
C# is a portable programming language and is used in Microsoft.NET framework.
It is used to create applications and the output is displayed on a black window
referred to as black window or DOS window. Table 5.6 explains the merits and
demerits of the C# language.
Table 5.6 Merits and Demerits of the C# Language
Merits Demerits
This language is used for Web It is restricted only for Microsoft
application under the .NET platform. platform.
The cost of maintenance is much lower Windows Presentation Foundation (WPF)
than C++. All features of WPF, such as applications run a little bit slow.
base class libraries, ADO.NET, etc., are
available.
C# is safer to run because OS always It is always slow to run because after
checks or verifies malicious coding. launching the programs animation effects
come smooth. Self-Instructional
Material 99
Hardware and Software Visual Basic
Visual Basic (VB) creates educational, financial and accounting applications and
is supported by the latest Microsoft OS. Windows Vista supports VB5.0 version.
NOTES Table 5.7 explains the merits and demerits of the VB language.
Table 5.7 Merits and Demerits of the VB Language
Merits Demerits
Online help is available for coding. Applications developed in VB can work
only on Windows OS.
It provides rapid application environment More memory space is required to work
that easily facilitates drag and drop with and install VB, because it is based on
components. GUI tools that contain graphical
components.
The syntax is simpler than other high-level It is not a suitable language to develop
languages. codes for video games applications.
Java
Java technology has become a complete software ecosystem that represents
different values to different types of consumers and business users. Table 5.8
explains the merits and demerits of the Java language.
Table 5.8 Merits and Demerits of the Java Language
Merits Demerits
Java is a simple, object oriented, secure, Java uses swing toolkit that is very
robust, multi-threaded and platform- different from native applications.
independent language. Java programs are
interpreted and then compiled into Java
Virtual Machine (JVM) code called
bytecode.
It is a single-paradigm language and static It is slow and consumes more memory.
imports are available. It supports three Java
platform editions, such as Java technology
in mobile devices, in desktops and medium
to large business.
Java language is designed to make There are some hardware and software
distributed computing easy that provides requirements in Java language, for
networking capability for system unit via example, hardware requirements (512 MB
programs. of RAM, 1000 MHz of processor speed,
Pentium III) and software requirements
(Microsoft Windows OS, Java Runtime
Environment and Internet Explorer).
Self-Instructional
100 Material
Hardware and Software
5.5 ANSWERS TO CHECK YOUR PROGRESS
QUESTIONS
1. A computer case (also known as a computer cabinet, tower, system unit or NOTES
simply case) is the box that contains most of the components of a computer
(excluding the monitor, keyboard and mouse).
2. Power Supply Unit (PSU) converts AC electric power to low voltage DC
power for the internal components of the computer.
3. RAID array controller is a device to manage several internal or external
hard disks and optionally some peripherals in order to achieve performance
or reliability improvement in what is called a RAID array.
4. Optical disc drives are used for reading from and writing to various kinds of
optical media, including Compact Discs, such as CD- ROMs, DVDs, DVD-
RAMs and Blu-ray Discs. Optical discs are the most common way of
transferring digital video, and are popular for data storage as well.
5. A computer cannot operate without any instructions and is based on a logical
sequence of instructions in order to perform a function. These instructions
are known as a ‘computer program’, and constitute the computer software.
6. Programming software provides tools to help a programmer in writing
computer programs and software using various programming languages. It
includes compilers, debuggers, interpreters, linkers, text editors and an
Integrated Development Environment (IDE).
7. Customized or bespoke software is designed for a specific user, who is
bound by some kind of formal contract. Software developed for an aircraft,
for example, is usually done for a particular aircraft making company. They
are not purchased ‘off-the-shelf’ like any word processing software.
8. A computer language is a language that can be understood by the computer.
It is the computer’s native language.
9. The main difference between a natural language and computer language is
that natural languages have a large set of words (vocabulary) to choose
from while computer languages have a limited or restricted set of words.
Thus, fewer words but more rules characterize a computer language.
10. C++ is also an object-oriented language that uses virtual functions, multiple
inheritance, exception handling, polymorphism, etc. Its object-oriented
structure allows the code to be reused that cuts down the development
time.
Self-Instructional
Material 101
Hardware and Software
5.6 SUMMARY
Self-Instructional
102 Material
Tape drives are drives to read and write data on a magnetic tape and are Hardware and Software
Self-Instructional
Material 103
Hardware and Software Machine language is very cumbersome to use and is tedious and time
consuming for the programmer. It requires thousands of machine language
instructions to perform even simple jobs like keeping track of a few addresses
for mailing lists
NOTES
Assembly language was the first step in the evolution of programming
languages. It used mnemonics (symbolic codes) to represent operation codes
and strings of characters to represent addresses.
FORTRAN has a number of versions with FORTRAN IV being one of the
earlier popular versions. In 1977, the American National Standards Institute
(ANSI) published standards for FORTRAN with a view to standardizing
the form of the language used by manufacturers. This standardized version
is called FORTRAN 77.
COBOL (COmmon Business Oriented Language), the first language used
for commercial applications, was developed under the leadership of Grace
Hopper, a US Navy programmer, with a group of computer manufacturers
and users in 1959.
C++ is also an object-oriented language that uses virtual functions, multiple
inheritance, exception handling, polymorphism, etc. Its object-oriented
structure allows the code to be reused that cuts down the development
time. C++ provides comprehensive coverage of abstract classes as
interfaces, regular error handling, standard strings, I/O streams, etc.
Self-Instructional
104 Material
Hardware and Software
5.8 SELF ASSESSMENT QUESTIONS AND
EXERCISES
Williams, Brian and Stacey Sawyer. 2009. Using Information Technology, 6th
edition. New Jersey: McGraw-Hill.
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2012. Operating System
Concepts, 9th edition. New Delhi: Wiley.
Black, Uyless D. 1993. Computer Networks: Protocols, Standards, and
Interfaces, 2nd edition. New Jersey: PTR Prentice Hall.
Nagpal, D.P. 2006. Web Design Technology (Theory and Techniques on the
Cutting Edge), 1st edition. New Delhi: S.Chand & Company.
Self-Instructional
Material 105
Types of Software
6.0 INTRODUCTION
6.1 OBJECTIVES
Self-Instructional
106 Material
Types of S oftware
6.2 SYSTEM AND APPLICATION SOFTWARE
Users
Application Software
Hardware System
Hardware
best suited. Thus, Excel can be used when you not only need a tool for storing and
managing data, but also analysing and querying it. In addition to providing simple
database capabilities, Excel also allows you to create documents for the World
Wide Web (WWW). NOTES
The menus, toolbars and icons of MS Excel are very similar (though not the
same) to MS Word. This is in keeping with Microsoft’s much hyped philosophy
and strategy of offering users a totally integrated office suite pack. From the user’s
point of view, this means less time spent in learning the second package once you
know the first, and almost effortless and seamless exchange of data between various
components.
Presentation Graphics
PowerPoint is a presentation tool that helps create eye-catching and effective
presentations in a matter of minutes. A presentation comprises individual slides
arranged in a sequential manner. Normally, each slide covers a brief topic. The
term ‘Free’ software specifies the freedom of using the software by various
computer users (private individuals as well as organizations and companies) granting
them freedom and control in running and adapting the computing and data
processing as per their needs. The key objective of free software is to grant freedom
rights to users so that the users are free to run, copy, distribute, study, change and
improve the software. For example, you can use PowerPoint software for preparing
presentations and adding notes to the specific slides. Similarly, you have the option
of either printing the slides—in case you want to use an overhead projector, simply
attach your computer to an LCD display panel that enlarges the picture several
times and shows the output on a screen.
You have three options for creating a new presentation:
Begin by working with a wizard (called the AutoContent Wizard)
that helps you determine the theme, contents and organization of your
presentation by using a predefined outline
Start by picking out a PowerPoint Design Template which determines
the presentation’s color scheme, fonts and other design features
Begin with a completely blank presentation with the color scheme,
fonts and other design features set to default values
If you decide to choose the third option, PowerPoint designers have provided
a wide assortment of predefined slide formats and Clip Art graphics libraries.
Through these predefined slide formats, you can quickly create slides based on
standard layouts and attributes.
PowerPoint shares a common look and feel with other MS Office
components, and having once mastered Word and Excel, learning PowerPoint is
almost like playing a game. In addition, it is also easy to pick up data from Word
and Excel directly into a PowerPoint presentation and vice versa.
Self-Instructional
Material 113
Types of Software Database Management Software
Nowadays, all large businesses require database management. When managing a
large customer base, it is important to examine vital information, like the busying
NOTES pattern, cheap suppliers and the number of orders being received. In order to
efficiently manage all these functions, MS Access is required.
As a first step, plan and create your database structure, identify the required
fields based on the type of data (numbers, alphanumeric, data, and so on), and the
maximum width of each field. After determining the structure, you can create a
table either in the design mode (which is customized), or you can use the table
wizard and any of the predefined tables, with the required modifications.
Creating the tables through the table wizard is much faster and easier than
through the design mode. However, if you use wizards you are somewhat restricted
with the predefined settings already available.
Once you have created the table, you can then use the form’s wizard to
create user-friendly and aesthetically pleasing layouts for data entry. Creating forms
for data entry also ensures that the user inputs only the right kind of information
and both data entry errors as well as typing work is minimized.
Once the forms have been created and relevant data has been entered,
using these you can then use the report wizard to generate any kind of report.
Using reports, you can not only organize and present your data in a more meaningful
manner, but also use various standard functions, like subtotals, totals and sorting,
to summarize your data.
Now to really fine-tune this access application, you can create data access
pages to enable people spread over a large geographical area to share and compile
information using the Internet.
6.4 SUMMARY
Self-Instructional
116 Material
Utility Programs: These programs run on the operating system in order to Types of S oftware
carry out various user related commands to manage the software linking the
user and the operating system.
Language Processors: A language processor is a system program that
NOTES
converts the English-like instructions used by computer programmers into
the machine readable code used by the hardware. Programs written in
languages, such as C, C++, Pascal, BASIC, FORTRAN, or COBOL must
be converted into the appropriate machine language.
Self-Instructional
Material 117
Types of Software Long Answer Questions
1. Elaborate on software and its different types.
2. Discuss the types of computer software types.
NOTES 3. Write a detailed note on system software.
4. Explain the components of operating systems.
5. Describe in detail about application software.
Williams, Brian and Stacey Sawyer. 2009. Using Information Technology, 6th
edition. New Jersey: McGraw-Hill.
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2012. Operating System
Concepts, 9th edition. New Delhi: Wiley.
Black, Uyless D. 1993. Computer Networks: Protocols, Standards, and
Interfaces, 2nd edition. New Jersey: PTR Prentice Hall.
Nagpal, D.P. 2006. Web Design Technology (Theory and Techniques on the
Cutting Edge), 1st edition. New Delhi: S.Chand & Company.
Self-Instructional
118 Material
Software Packages
BLOCK - IV
LIBRARY AUTOMATION
NOTES
UNIT 7 SOFTWARE PACKAGES
Structure
7.0 Introduction
7.1 Objectives
7.2 Library and Information Software: Selection Criteria
7.2.1 Features of Good Library Software Packages
7.2.2 Evaluation of Software
7.2.3 Selection Criteria for Software
7.3 Library Automation System Selection Guidelines
7.3.1 Technology
7.3.2 Features and Functions
7.3.3 Services
7.3.4 System Support and Maintenance
7.4 Library Software Packages: Nature and Types
7.4.1 Hardware and Operating System Requirements
7.4.2 Programming Language of Software
7.4.3 Search Response Time and Data Storage Techniques
7.4.4 Types
7.5 Answers to Check Your Progress Questions
7.6 Summary
7.7 Key Words
7.8 Self Assessment Questions and Exercises
7.9 Further Readings
7.0 INTRODUCTION
The term software package has multiple uses in IT. It is most common use is to
refer to multiple software programs bundled together and sold as a set. There is
also the use of software package to describe a set of software that fulfils a particular
function, for example, installation on the desktop.
In a traditional sense, a software package is simply multiple applications or
code modules that work together to meet various goals and objectives. One of the
most prominent examples is something like the Microsoft Office package, which
includes individual applications such as Word, Excel, Access and PowerPoint.
In some ways, a software package today is similar to what it was 20 years
ago. In other key ways, the software package is decidedly different. The Microsoft
example is a good one. Although the Microsoft Office suite is still sold as a package,
and still includes many of the same branded components, the ways in which it is
sold are very different. In the past, users had a single option—to purchase a software
package off the shelf and install it. That same option is still available, along with Self-Instructional
Material 119
Software Packages other options including web-delivered software packages and subscriptions on an
annual or monthly basis.
In this unit, you will study about software packages its types, nature and
uses. Library and information software packages, features of India software
NOTES
packages in detail.
7.1 OBJECTIVES
The criteria for the selection of library software packages are as follows:
The hardware requirement to run the software has to be determined precisely,
Moreover, it also has to be decided whether the existing hardware of the
library would suffice or any modification. The software must run under the
operating system available in the hardware.
The software must be compatible with the computers on which it has to
run. Some packages use special peripheral devices, such as modem, hard
disk, and so on. A few others are designed to be used with DBMS (Database
Management System) or spreadsheets. While buying software, the
concerned library should verify whether any companion program or a special
device/hardware are required or not.
It should be user-friendly to the people with little or no knowledge of
computer use.
It should provide sophisticated online input, data management and retrieval
facilities appropriate for the efficient handling of a relatively large
bibliographies database.
The software package should provide full documentation on all aspects,
such as reference manual, instructions, online help, and so on, for assisting
the librarian while using it.
The vendor must support the installation aid and provide training to the
operating personnel.
It should be flexible in allowing the end-users to easily write their specification
for local variations.
Self-Instructional
120 Material
It should accept machine readable files in the RM (Reference Manual), Software Packages
Self-Instructional
122 Material
The number and the names of the titles by a given author or on a subject Software Packages
How many and which book(s) are overdue with a particular user/member?
Which is latest edition of a title?
Which issues have been received by the library of a particular journal? NOTES
User-friendly
A library automation software package should be user-friendly. In other words, it
should be developed in such a manner that it can be used after a short training and
practice. Help message shall also be provided in the case of confusion. Details
about menus and sub-menu should be provided. A detailed and an elaborative
user manual should also be provided.
Compatibility
Compatibility refers to the quality of adoptability or quality to transfer/merge the
database created by other standard software. In other words, it should facilitate
the exchange of data between two or more software adhered to CCF and
international standards.
Reputation of the Company/Agency
Before making the final decision to purchase library automation software, the
reputation of the company/agency that developed the software should be checked.
The reputation can be ascertained on points, such as location and support center,
quality of the software, updating and support service as communicated by the
customer base.
Scope of Local Variation
The software should have provision for local variation. Different libraries may like
to provide different records differently. For example, one library may assign
continuous system generated membership number, invariable class and branch,
while another library may assign different number at their own. In order to meet
the requirement of an individual library for its local variation, there should be a
provision for it.
7.2.2 Evaluation of Software
The software to be chosen will generally be application software—databases,
word processing, library housekeeping, and so on. Little opportunity will be generally
available for evaluating and choosing system software, since this will often be
determined either by available hardware or by the needs of application hardware.
If there is any choice, then choose that which gives the widest choice of suitable
application software.
A software evaluation is done for someone who wants to know about the
state of a particular package, and may even be paying you to look into it. So, at
Self-Instructional
Material 123
Software Packages the outset, you should agree with this ‘someone’ for the scope of the evaluation.
This includes what software and other project resources will be evaluated and
the user classes from whose perspective the evaluation will be done. The user
classes determine the tasks that will form the basis of any evaluation, especially a
NOTES tutorial-based evaluation. The following classes of the user can be assumed:
User: The user is a person, who, depending on the artifact, downloads,
installs, configures and uses the artifact but does not write any code to
use in conjunction with it. The software may be a Web portal, a GUI or
a command-line tool. Within this class, there could be different types of
users, for example, for the journal TOCs’ portal, the users could be
researchers wanting to use the service or journal publishers wanting to
find out how the service used their RSS (Rich Site Summary) feeds.
User-Developer: A user-developer refers to the user who writes code
that extends but does not change the software, for example, a client to
some service endpoints, or a pluggable component coded against some
extensibility point. As an analogy, it refers to a developer of Web services
using Apache Axis.
Developer: A developer is a user who writes code that changes the
software, for example, fixes bugs, makes the software more efficient or
extends its functionality. As an analogy, it refers to someone who changes
Apache Axis to make WSDL2 Java easier to use.
Member: A member is a developer who is a project member and has
access to the source code repository. Unlike a developer, a member
has to be aware of such issues as which policy is on upgrading for using
new versions of prerequisite packages and coding standards, who owns
copyright and licensing, how changes are managed, if they are expected
to support components they develop, how the project is run, and so on.
As an analogy, it refers to a member of the Apache Axis developer
team.
In terms of how much time to spend on an evaluation to get useful information,
the rule of thumb is that an ideal period is 1–2 weeks in duration (or 3–5 days of
effort) depending on the complexity of the software and the nature of the evaluation
tasks.
The detailed factors to be considered in any software evaluation will depend
on the particular circumstances and the type of software under evaluation.
However, there are several main categories which are generally applicable.
Functionality: Does the software do what is expected? Does it meet
the needs of the users? Is it easy to use? Is it for everyone or for
specialists?
Performance: Is it effective? Does it operate quickly enough, even at
peak load? Can large records and files be handled?
Self-Instructional
124 Material
Hardware: Will it work on existing hardware? Are special peripherals Software Packages
NOTES The library automation software must be developed and designed based on the
best practices that are internationally adopted in the library profession. These
include:
Adoption of MARC-based bibliographic record. Record can be imported,
created, updated and exported using the MARC 21 and ISO 2709
standards. (MARC stands for MAchine-Readable Cataloging and ISO
stands for International Organization for Standardization.)
Bibliographic and item information must be stored separately in two different
types of record so that more than one item record can be attached to one
bibliographic record.
Support of internationally adopted library standards, including ISBD
(International Standard Bibliographic Description), AACR2 (Anglo-
American Cataloguing Rules), subject heading scheme, classification scheme,
and so on.
Automation of library operations and activities, including circulation, public
catalog searching, cataloging, ordering, serials control and reporting.
The library automation software must be supported by a team that processes
library experience and qualification. This is essential to ensure that the team
understands the library requirements and at the same time is able to provide
professional advice to the libraries.
The software vendor (or developer) must have long-term commitment on
the further development of the software. The vendor should, in particular, take the
following into consideration:
The vendor should be quick to integrate emerging library standards and
new technology to the software. These include Web and the Internet-
based access to the library catalog, XML and Dublin Core technology,
Unicode, and so on.
The vendor must be financially stable.
The vendor must be specialized in library applications.
The vendor must have periodical upgrade release with new enhancements.
The library automation software must be able to support Hong Kong school
library environment. These include the following:
Support bilingual interface and bilingual data.
SAMS (Hong Kong Education Department’s School Administration
Management System) student data can be imported to the library
database.
Self-Instructional
128 Material
Support sharing of cataloging records among Hong Kong school libraries. Software Packages
charge. There are some other factors to be considered while selecting the software.
These are as follows:
Are the license costs justified given the functionality offering?
NOTES
Is the required database affordable?
Are annual maintenance charges reasonable?
What is the ratio of software cost to the implementation cost?
Supplier Longevity
Supplier longevity is also a very important factor to be considered before selecting
the software. This factor generally considers the numbers of years a company has
been actively engaged in the software industry, when was the product first released
and what is the current release version being quoted. The reliability, customization
and durability of the software depend on the stability of the software designer and
supplier. If the company has been consistently profitable over the years the recent
turnover has been on the management staff, there is no doubt on the company’s
longevity. Similarly, the costumer’s reference is also a supportive factor for taking
a decision regarding the selection of the software.
7.3.3 Services
The most important factor is the service part of any software package for the
library. The librarian can serve the people effectively, efficiently as well as rapidly
with the help of automation using good library software package, which is integrated
by all required services. In fact, the entire range of services available in selected
packages can be divided into three groups, which are as follows:
Core Services
Core services are the basic services necessary for library routines and are
recommended to be available with library automation packages. The existence of
any automation software depends on the available services, facilities, and coverage
of library and information activities in various modules. The different facilities in the
library automation package are acquisition, cataloging, classification, OPAC,
circulation, serial control, information services, management, technical services
and maintenance, and so on.
Academic libraries acquire not only the English language documents but
also acquire documents available in various foreign languages for the research
purpose. Therefore, the software should have the facility of multiple script
acceptances.
Enhanced Services
It includes the additional services of the modern library which make work of the
librarians easy, comfortable and smooth. Customized report generation, GUI-
based user interface and color, interlibrary loan, multilingual support, union catalog, Self-Instructional
Material 131
Software Packages and so on, are the examples of these type of services. Therefore, any software
package having more facilities are certainly treated more suitable and advanced in
comparison to those having limited facilities.
Self-Instructional
134 Material
7.4.1 Hardware and Operating System Requirements Software Packages
Self-Instructional
138 Material
o There are menus and sub-menus which provides options. Software Packages
Self-Instructional
Material 139
Software Packages and retrieval system, designed especially for computerized management of
structured non-numerical databases.
8. CDS/ISIS has been designed and developed by United Nations Educational,
Scientific and Cultural Organization’s (UNESCO) Division of Software
NOTES
Development and Applications Office of Information Program and Services.
The national distributor of this software in India is National Information
System for Science and Technology (NISSAT).
7.6 SUMMARY
Williams, Brian and Stacey Sawyer. 2009. Using Information Technology, 6th
edition. New Jersey: McGraw-Hill.
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2012. Operating System
Concepts, 9th edition. New Delhi: Wiley.
Black, Uyless D. 1993. Computer Networks: Protocols, Standards, and
Interfaces, 2nd edition. New Jersey: PTR Prentice Hall.
Nagpal, D.P. 2006. Web Design Technology (Theory and Techniques on the
Cutting Edge), 1st edition. New Delhi: S.Chand & Company.
Self-Instructional
144 Material
Open Source Software
8.0 INTRODUCTION
8.1 OBJECTIVES
Self-Instructional
Material 145
Open Source Software
8.2 GSDL: GREENSTONE DIGITAL LIBRARY
SOFTWARE
NOTES GSDL: Greenstone Digital Library Software is a suite of software for building and
distributing digital library collections. It provides a way of organizing information
and publishing it on the web or on removable media such as DVD and USB flash
drives.
Greenstone, or GSDL is produced by the New Zealand Digital Library
Project at the University of Waikato, and developed and distributed in cooperation
with UNESCO and the Human Info NGO. It is open-source, multilingual software,
issued under the terms of the GNU General Public License.
The aim of the GSDL software is to empower users, particularly in
universities, libraries, and other public service institutions, to build their own digital
libraries. Digital libraries are radically reforming how information is disseminated
and acquired in UNESCO’s partner communities and institutions in the fields of
education, science and culture around the world, and particularly in developing
countries.
8.3 KOHA
Koha is a web-based multilingual integrated library system (ILS) that caters to the
automation needs of medium and large libraries. It is an open-source ILS. DELNET
uses a customized version of Koha. All the functional requirements of a library
management system can be fully met by Koha as it provides all necessary features
of MARC-based ILS to cater to the needs of libraries.
Features of Koha
MARC Import/Exports
MARC 21compatible
Z39.50 search
Comprehensive advance search
Multilingual Web OPAC
Printing functions for barcode labels, and reports
Self-Instructional
146 Material
Flexibility to customize according to your library needs Open Source Software
8.4 DSPACE
Self-Instructional
148 Material
Foundation and the Fedora Commons organization led to the joining of the two Open Source Software
The code for DSpace is kept within a source code control system from Source
Forge. This system allows code to be added or modified over time, while maintaining
a track of all changes and a note of why the change was made and who made it. NOTES
This assists with the development of the software and ensures the quality and
traceability of the code. Any past version of DSpace can be downloaded from the
system in an identical state as originally distributed.
Control of the source code repository is delegated to a small group
of ’committers’. Only the committers have the ability to change the code and
release new versions. The committers work with the wider community of DSpace
users to fix bugs and improve the software with new features.
Anyone who wants to is welcome to submit big fixes, new features or feature
requests. The can all be done through the Source Forge administrative
system Source Forge administrative system.
Support is provided on an informal basis via email lists. There are three
DSpace email lists:
General for general questions and announcements
Technical for technical support
Development for developers and to discuss development issues
Self-Instructional
Material 151
Open Source Software 3. The aim of the GSDL software is to empower users, particularly in
universities, libraries, and other public service institutions, to build their own
digital libraries.
4. Koha is a web-based multilingual integrated library system (ILS) that caters
NOTES
to the automation needs of medium and large libraries. It is an open-source
ILS. DELNET uses a customized version of Koha. All the functional
requirements of a library.
5. Some of the features of Koha are:
MARC Import/Exports
MARC 21compatible
Z39.50 search
Comprehensive advance search
Multilingual Web OPAC
Printing functions for barcode labels, and reports
Flexibility to customize according to your library needs
Barcode and spine label printing
6. Modules of KOHA are as follows:
Cataloguing
Multilingual Web OPAC
Acquisition
Patron Management
Authorities Control
Circulation
Reports
FAQ
7. DSpace is an open source repository software package typically used for
creating open access repositories for scholarly and/or published digital
content. While DSpace shares some feature overlap with content
management systems and document management systems, the DSpace
repository software serves a specific need as a digital archives system,
focused on the long-term storage, access and preservation of digital content.
8. DSpace has three main roles:
Facilitates the capture and ingest of materials, including metadata about
the materials
Facilitates easy access to the materials, both by listing and searching
Facilitates the long-term preservation of the materials
Self-Instructional
152 Material
9. DSpace software runs on Linux, Solaris, Unix, Ubuntu and Windows. It Open Source Software
8.6 SUMMARY
Self-Instructional
Material 153
Open Source Software It uses a dual database design. Koha utilizes the strengths of the two major
industry-standard database types, text-based and RDBMS. Because of
this design feature, Koha is scalable enough to meet the transaction load of
small as well as big libraries.
NOTES
It is library standards compliant. Koha is built using library standards and
protocols that ensure inter-operability between Koha and other technologies,
while supporting the existing workflows and tools.
It uses web-based Interfaces. Koha’s OPAC uses state-of-the-art self-
checkout interfaces and circulation management which are based on
standards compliant with WWW technologies—such as XHTML, CSS
and Javascript. This make Koha a truly platform-independent solution. It is
free/open source. Koha is available for use and can be distributed under
the open-source general public license.
DSpace is an open source repository software package typically used for
creating open access repositories for scholarly and/or published digital
content. While DSpace shares some feature overlap with content
management systems and document management systems, the
DSpace repository software serves a specific need as a digital archives
system, focused on the long-term storage, access and preservation of digital
content.
There are over 1000 digital repositories worldwide using the DSpace
application for a variety of digital archiving needs.
DSpace is most often used as an institutional repository - a platform that
provides access to research output, scholarly publications, library collections,
and more.
The DSpace application has many customizable features and tools for
managing digital content, enabling digital preservation and providing
accessibility to your materials. As an open source application, there is a
very active community of developers, researchers and users worldwide that
contribute their expertise to enhance the DSpace application.
DSpace is constructing with Java web applications and many programs and
an associated metadata store. The web applications provide interfaces for
administration, deposit, ingest, search, and access. The asset store is
maintained on a file system or similar storage system.
The metadata, including access and configuration information, is stored in
a relational database and supports the use of PostgreSQL and Oracle
database.
DSpace holdings are made available primarily via a web interface, more
recent versions of DSpace also support faceted search and browse
functionality using Apache Solr.
Self-Instructional
154 Material
The code for DSpace is kept within a source code control system from Open Source Software
Self-Instructional
Material 155
Open Source Software
8.9 FURTHER READINGS
Williams, Brian and Stacey Sawyer. 2009. Using Information Technology, 6th
NOTES edition. New Jersey: McGraw-Hill.
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2012. Operating System
Concepts, 9th edition. New Delhi: Wiley.
Black, Uyless D. 1993. Computer Networks: Protocols, Standards, and
Interfaces, 2nd edition. New Jersey: PTR Prentice Hall.
Nagpal, D.P. 2006. Web Design Technology (Theory and Techniques on the
Cutting Edge), 1st edition. New Delhi: S.Chand & Company.
Self-Instructional
156 Material
House-keeping Operations
UNIT 9 HOUSE-KEEPING
OPERATIONS
NOTES
Structure
9.0 Introduction
9.1 Objectives
9.2 Use of Computers for Housekeeping Operations
9.2.1 Library Automation
9.2.2 Objectives and Need of Library Automation
9.2.3 Various Housekeeping Activities in a Library
9.3 Automated Serials control system
9.3.1 Types of Serials
9.3.2 Identification of Serials
9.3.3 Functions
9.3.4 Management and Workflow in Serials Control System
9.4 Answers to Check Your Progress Questions
9.5 Summary
9.6 Key Words
9.7 Self Assessment Questions and Exercises
9.8 Further Readings
9.0 INTRODUCTION
Computers are now being used in housekeeping department for room management,
inventory control, linen management and so on. Many software packages are
available in India that provide specific applications for housekeeping operations.
Computers can now be linked to the telephone system in each guestroom. This
technology greatly reduces the cost of individual wiring in each guestroom. Many
hotels have invested heavily in information technology (IT) infrastructure and
networking that use the latest technical advances in their operations.
Wireless connectivity is developing rapidly, enabling whole world to stay
networked and connected. Business travellers are always looking for ways to stay
connected while on move and expect wireless connectivity at their hotels. Hotels
are aware of the benefits of enabling broadband access throughout their facilities
as wireless connections improve a guest experience by providing complete mobility.
WLANs allow guests to share high speed internet connections, browse the web,
access their corporate networks remotely yet securely, access the business centre
from their room, organize video conference, play games online, etc.
In this unit, you will study about what housekeeping is and library automation
of library housekeeping operations.
Self-Instructional
Material 157
House-keeping Operations
9.1 OBJECTIVES
In this section, we will discuss the use of computers for housekeeping operations.
9.2.1 Library Automation
Since the society is becoming complex, there is an increasing need for timely
organization, communication and dissemination of information and, therefore, the
reliability on technology is obvious. The present era is an age of information
technology and there is a great explosion in information provision. This indicates
the time for modernization of library operations and is becoming essential for
effective and efficient working of libraries and information centers. Automation is
a technique to make a system self-active. This technology of library automation is
defined as the use of Information Communication Technology (ICT) to perform
traditional library housekeeping activities, such as acquisition, circulation, cataloging,
serial control and references. In simple terms, library automation is a term where
computers and its utility based products and services are used to improve the
performance of different library operations. Today, the term ‘library automation’
significantly marks the mechanization of library activities using the computer. The
traditional activities of library are no longer performed in a traditional way; rather
they are performed with the help of computers. The objective of this transformation
from traditional way to technological way is to change, without any lose of their
identity, to a better performance. Automation reduces the pressure of workload
in libraries to a great extend. Use of computers technology for library keeping
operations, such as acquisition, administrative work, cataloging, circulation, serial
control, OPAC (Online Public Assess Catalog), and so on, is called as
computerization of library and is a part of library automation.
Since this era is considered as ‘information age’, there is a vast amount of
information that is being generated every moment. There is an increment in the
research activities and specialization in different fields. The information so generated
is considered to be stored in libraries so as to retrieve by the users for the reference.
There are various methods of handling theses information and the traditional
methods of accessing the information are becoming inadequate generating the
need for automation. The objectives of library automation are speedy disposal of
library work, well structured storage and retrieval system, proper use of human
resources, preparing reports and correspondence, time and human power saving
Self-Instructional with quality services.
158 Material
There are many reasons for having automation for the library system. It House-keeping Operations
Self-Instructional
Material 161
House-keeping Operations There are two files that are maintained in a computer-based acquisition
system. One is the file containing the records of the current orders and is known
as main file, while the other file contains the names and addresses of the booksellers
used by the library. The two files are linked with a code number for each bookseller
NOTES in order to avoid repetition of record in an order file.
There is also a provision for sending a chaser to the bookseller if there is no
information from the bookseller regarding the order is received within a time limit.
The chaser can be sent on the basis of the date of order or on the basis of a
particular bookseller depending upon the features available in a particular system.
There are options available to take printout of approval letters to send to the
requester as per requester wise, date wise, department wise and so on. List can be
generated for the requested books date wise, department wise, publisher wise,
supplier wise, and so on. Reports can also be generated for invoice, payment, refunds,
and so on. In fact, all reports and statistics can be viewed as per requirement.
As stated above, an acquisition system involves the activities concerned
with identification of books, ordering, receiving and accessioning. An initial receipt
of suggestion of a book involves numerous tasks to be carried out. In addition, it
is sometimes required to get the information about the number of books to be
ordered, fund values, and so on. Fundamental capabilities of automated acquisition
system can be stated as:
To eliminate the efforts in maintaining the files manually, which is a time
consuming activity
To eliminate the duplication of records which results in errors in reporting,
control, and so on. by automatic check up of requested/recommended
items with the existing records
To automatically generate the order notes
To maintain records and performance figures of vendors
To handle the claims and cancellation more effectively and efficiently
To send purchase order
To maintain details of items on order
To provide accurate and timely financial data recording, accounting and
reporting
To keep track of orders, receipts and invoice
The objectives to automate the acquisition system in the libraries are as
follows:
To perform auto-check of requested or recommended items with the
already existing stocks available in the library to avoid any duplication
To generate order notes automatically
To maintain detailed order of an item
Self-Instructional
162 Material
To generate claims for those items which have been already ordered but House-keeping Operations
Self-Instructional
Material 163
House-keeping Operations To enable a user to find a book either by the author, the title, the subject
and the category
To show the content of the library by a given author, on a given subject
and in a given kind of literature
NOTES
To assist in a choice of material as to its edition (bibliographical) and as
to its character (literary or topical)
Initially, the functions of discovery and location of material was performed
through card catalog system, but now has been replaced by the OPAC system. It
allows keyword searching for the fields, such as authors, subject, and so on,
which has an advantage over the exact full phrase searching that is being required
in case of any other forms of the cataloging system. Moreover, a computerized
cataloging system is an effective and efficient way that provides its user a speedy
search to locate the needed resource material. The users can access the same
database if the catalog is made available in a networking environment with the
help of LAN. This will eliminate the job of library staff of printing cards, filing the
cards, keeping the catalog up-to-date, and so on. The space in the library can
also be conserved by automating the library system, which in contrast occupies a
lot of space in case of maintaining physical cataloging system. Automation of
cataloging process is an opportunity to facilitate the searching and identification of
materials more effective and flexible, to reduce cost and, hence, can be considered
as a foremost concern for the libraries.
Some of the benefits of using automated catalog systems are as follows:
Almost all items of information can be searched in the database in
accordance to the user’s need.
Retrieval of information in variety of ways.
Speedy search.
Remote access of national and international cataloging database.
Authority Control and Standard Formats in Cataloging
The need for cataloging is to have an access point where we can find bibliographic
description of the materials available in the library so that we may get the location
of the document or (nowadays) the document itself. The access point helps us to
lead towards the record; the description helps us to decide whether the sought
item is the one we desired and the location helps in taking us to the desired
document. This is the purpose of cataloging and is a simple and profound
formulation. Cataloging cannot exist without standardizing access points. This
necessary degree of standardization can be achieved with the mechanism called
as authority control. This is an important aspect of library cataloging and facilitates
access to a library’s holding by means of organizing, standardizing, accuracy and
consistency. This is important for seamless and effective searching of the catalog
of any library. The attributes that are concerned with cataloging are order, logic,
Self-Instructional
164 Material
objectivity, precise denotation and consistency. The denotation for same name, House-keeping Operations
online cataloging system was becoming popular, it was necessary to maintain the
catalog that could be read by machine. The information from a simple card catalog
could not be typed into a computer to create an automated catalog. A means of
interpreting the information on a cataloging record was required by the computer. NOTES
There are signposts available on MARC record before bibliographic information.
Also, a common standard was needed to be followed by all libraries in order to
share bibliographic resources. By adopting MARC format, the libraries are able
to use commercially available library automation system to manage various library
operations. There are many automation systems available that are designed to
work with MARC format. The MARC components consist of three digit field
code, two indicator codes, and at least one subfield indicator.
Functional Requirements for Bibliographic Records (FRBR)
Functional Requirement for Bibliographic Record (FRBR) is a recommendation
by the International Federation of Library Associations and Institutions (IFLA)
based on the study from 1992–1995. The objective was restructuring of catalog
databases in order to obtain the conceptual structure of information resources.
Technically, it is a concept based on entity-relationship model which depicts a
generalized view of the bibliographic universe that independent of any cataloging
code or implementation. It includes the description of the conceptual model, such
as the entities, the attributes (or metadata) and the relationship between entities,
bibliographic records for all types of items and users’ task associated with the
bibliographic resources. Instead of using flat record concept that is being used in
current cataloging standards, FRBR focuses on entity-relationship model of
metadata for information. It helps us to understand the structure and relationships
of bibliographic and authority records. It also provides a precise vocabulary for
the future cataloging rules.
FRBR concept is based on three groups of entities:
Group 1 entities include work, expression, manifestation and Item
(WEMI) and comprised the products of intellectual or artistic endeavor.
Group 2 entities consisting of person, family or any corporate entity
who owns the custody of the intellectual or artistic endeavor in group 1.
Group 3 entities consist of the subjects of both the groups 1 and 2
including objects, concepts, events, and places.
The foundation of FRBR model is Group 1 that mainly consists of work,
expression, manifestation and item. Let us understand these in details with the help
of examples.
When we talk about a physical object that has some description in terms of
papers with page number and even a binding, we may call it as ‘book’, and FRBR
calls this as ‘item’. That means, an item something with concrete entity. Now, this
‘book’, being a publication, has some ISBN and a particular copy of a book does
Self-Instructional
Material 169
House-keeping Operations not matter as long as that copy is in a good condition with no missing pages.
FRBR calls this as ‘manifestation’. When we talk about ‘book’, we can talk about
the particular text and the language used in the ‘book’. FRBR calls this as
‘expression’. Associated with a ‘book’ is the author who wrote the book with
NOTES which we mean the content, the idea, the story, which FRBR called ‘work’.
We may in particular relate these four entities of group 1 as:
Work: Distinct intellectual and artistic creation.
Expression: The realization of work intellectually or artistically.
Manifestation: The expression, physical embodiment of work.
Item: A single exemplar of a manifestation.
Resource Description and Access (RDA)
With the revolution in computers, the searching included keywords and the display
search became innovative and interactive with the broadened resource formats
including electronic and digital technologies with no physical presence but a link to
a computer file. Planning for the revision of AACR revision 3 was needed in
2004. But soon it was realized to the JSC that only revision was not required but
a transformation was needed. In 2005, planning for RDA started with an objective
to create new standards designed for the digital world. RDA can be considered as
a replacement of longstanding AACR2 and is a successor of AACR2. It was
released in 2009. It is a new descriptive cataloging standard with a goal to facilitate
rules for resource discovery in a consistent and powerful way through library
catalog. It is a principle based standard based on FRBR (Functional Requirements
for Bibliographic Records) which focuses on users need to find, identify, select
and obtain and FRAD (Functional Requirements for Authority Data) which focuses
on what the users need to find, contextualize and justify cataloging principles and
are considered as the back bone of RDA. The reason for using FRBR and FRAD
as the principle model was that the two models were the result of the efforts put by
international cataloging community where they addressed constantly changing
information environment. In this environment, the new forms of information
resources were emerging with a increased density of networked information system.
A Joint Steering Committee was formed for the development of RDA. They review
on the several drafts of the new rules including submission and incorporating
comments and edit when and wherever possible.
In AACR2, chapters were arranged by the type of information resources
and then by type of main or added access points. Part I of AACR2 was focused
on different formats stating only the description of the resources. Part II focused
on choice and formation of personal, corporate body and title access point. The
main and added access points were also discussed. But the code was weak on
access point. AACR2 was based on the unit record system (item) rather than
idea of a work.
Self-Instructional
170 Material
RDA provided a wider scope and is extensible. It puts more emphasize on House-keeping Operations
visual and online resources and on authority control. It has a vast structure from its
predecessor. It also provides the facility to incorporate new resource type as they
emerge. The type of record created that was initially based on the format is shifted
to description of the record as comprehensive, analytical or multi-level (an analytical NOTES
description of a record includes a description or analysis of sub-parts of the resource
being catalogd). This implies, RDA provides various resource formats in a library
catalog. The main focus is on user tasks with the more meaningful and clustered
display of the data produced. With RDA, it is possible to create records that can
represent more than one resource as compared to AACR2 where one record
represents only one resource. It also provides the option for cataloger to group
and display single-item records to show how the items are related. There is a line
of separation between presentation and recording of data.
RDA is designed for Web environment that is able to produce data that are
readily used by Web-based catalogs and resource discovery services. The RDA
data (including model, elements and controlled vocabulary) are freely available
online in a machine readable format and also are consistent with semantic Web
standards.
RDA basically focuses on content standard instead of display standard or
metadata schema. It represents a set of guidelines that defines the description of
resources and the main focus is the piece of information that the user is most likely
looking for. It also focuses on the description of the relationships between the
resources that are related to each other and between the resources and the persons
(or bodies) who contributed in the creation of the resources. The new conventions
used are as follows:
No use of Latin abbreviation
Less abbreviation used
Local catalog standards for the need of the community
Format descriptions are specified for non-book and electronic resources
Record information same as presented on the item
Records of all authors and contributors
Z39.50
Z39.50 formally refers to the Information Standard Protocol, ISO 23950:
Information Retrieval: Application Service Definition and Protocol
Specification, ANSI/NISO Z39.30, used by the networked computer systems
for information retrieval. This facilitates users to search information on different
systems connected through network or on the Internet using a single user interface.
The access to information are offered through diversity of unique systems with
different software and hardware interface and database search commands provided
by software and system vendors. Since the Internet is providing access to the
Self-Instructional
Material 171
House-keeping Operations database that is growing daily, the challenge is to find the right information by the
users without any efforts from the vast knowledge.
The objective of Z39.50 is to eliminate the complexities and difficulties to
search and retrieve information. It facilitates the access of the wealth of information
NOTES
resources on the Internet easy. With Z39.50 enabled system, a user can search
for any electronic document lying in another Z39.50 compliant system without
worrying and knowing about the working of the system.
The working of Z39.50 protocol is analog to client-server environment with
specific data structure and interchange rules which allows a client machine to search
information on server machine to retrieve the records as a result. The essential
requirement for communication and interoperation is that the client and server
machines are Z39.50 compliant systems and are able to understand Z39.50
language. The implementation of Z39.50 uses TCP/IP protocol and software which
is Z39.50 compliant to search and retrieve information. To perform the
interoperability, the message is standardized to be communicated between client
and server, regardless of the use of underlying software, systems or the platform.
Moreover, Z39.50 is a vendor independent that is the standard is non-proprietary.
The systems (servers) implementing this protocol are searchable by all other systems
(client) developed by different vendors and are allowed to communicate with
different systems (servers) implemented with this protocol. The Z39.50 manages
the translation of search request into standard format to send it to the servers.
After receiving, the server transforms the query into local database recognized
format using Z39.50 rules. The server then performs the search and returns the
result back to the client which in turn processes the result using user interface
software and Z39.50 rules and displays the result as closely as possible similar to
the user’s local system.
The purpose for designing the standard was to search large bibliographic
databases such as OCLC and the Library of Congress. But today, it has been
used in wide range of activities involved in library that involve searching of database,
cataloging, interlibrary loan and references. This has been accepted universally for
the retrieval of information including text, images, and digitized documents. It is
also been using to search online database. The protocol provides a seamless access
to the information from diverse and variety of database through a single interface.
It also allows the information systems to preserve their uniqueness during the
provision of unique interface to the users because of its standard operability.
Libraries are required to espouse to a single standardized interface to allow their
users to access the library’s catalogs, their procured CD-ROMs, subscribed online
database and Internet resources. It also facilitates the extraction of data from
variety of resources in a common format to be used offline or to import to a local
database.
Apart from resource sharing, it provides the library community with following
features:
Self-Instructional
172 Material
Broadcast searching of the library catalogs located anywhere in the world House-keeping Operations
through Internet
Standard approach for interlibrary loan for delivery of information
Placing online orders of items and document delivery NOTES
The original Z39.50 for resource page internet searching was established
by Mark Kelly and approved by National Information Standards Organization
(NISO) in 1988. It has made the search interface on different system transparent;
it is no longer important to know how to use each database. It has made the
access to electronic document so easy that the time spent by users in searching for
relevant information has reduced remarkably. Z39.50 has been recognized
worldwide as the international standard for networked information search and
retrieval.
Workflow in Catalogues
In order to integrate the enormous volumes of digital resources, libraries have
found ways to include them into their existing workflows.
The traditional services workflows focused on the acquisition and processing
of print article, but have changed over the years with the automation of libraries
and shifting bibliographic information from the card format to the use of union
catalogs.
Self-Instructional
Material 177
House-keeping Operations 9.3.3 Functions
The daily checking-in of received periodicals, serials and newspapers is a critical
task of serial works. The automation of this module obviously improve the
NOTES performance of any library. The functions that are required in an automated serial
control system is vary widely and are dependent on the type and size of the library
and its serial management and usage practice. While, a library that discards the
serial publication after 18 months of receipt routinely does not require automation
in the system where as a library with thousands of title subscription may require an
automated serial control system. Thus, requirements of each library are unique
and, therefore, the capabilities required in an automated serial control system can
be evaluated after careful definitions of the needs of the library.
This section deals with the checklist of the functions in serial control
automation. A serial control system allows the smooth and efficient management
of subscriptions, leading serials including journals, periodicals and magazines. It
provides in-time alerts for non-arrival serials. The main objective of the serial
control system automation is to maintain holding list and handle serials.
The basic functions that an automated serial control system must perform in
order to achieve its objectives are as follows:
Subscription to new serials by sending letters, keying-in the serial data
and maintaining a file for all subscription
Placing the order of new serials, renewal of existing serials and
cancellation of serials if any
Accessioning upon the receipt of the issue
Claiming issues, if any (This includes request of replacement of any
defective copy of any issue or follow up for any missing copy)
Sending reminders, if any, for a missing issue for example
Check-in, routing
Preparation of various lists, such as list of all periodicals for renewal, list
of received or cancelled periodicals over a period of time and union
listing
Lists of holdings with the information about their status, such as in shelf,
in circulation, in binding, and so on
Keeping track of all the expenditure on serial subscription, maintenance
(such as binding)
Provides with the estimation of budget
Binding control
In addition to the above, the system must also be able to provide the facilities:
Searching of serial records by: title or part of it, ISSN, call number,
vendor, publisher, keyword, and system assigned number, subscription
Self-Instructional
178 Material
number, and so on.
Showing gaps in holdings House-keeping Operations
Self-Instructional
180 Material
House-keeping Operations
9.4 ANSWERS TO CHECK YOUR PROGRESS
QUESTIONS
1. Library automation is a term where computers and its utility-based products NOTES
and services are used to improve the performance of different library
operations.
2. Use of computers technology for library keeping operations - such as
acquisition, administrative work, cataloguing, circulation, serial control,
OPAC (Online Public Assess Catalog), and so on, is called computerization
of library and is a part of library automation
3. The objectives of library automation are speedy disposal of library work,
well-structured storage and retrieval system, proper use of human resources,
preparing reports and correspondence, and most importantly, save time.
4. Library automation helps in maintaining bibliographic records of all materials
in a computerized form and providing details in a single enumerative access
point.
9.5 SUMMARY
Self-Instructional
Material 181
House-keeping Operations Computer Based Acquisition Control – Process of procurement of library
materials - such as books, reports, periodicals, publications, audio-visual
material, and so on. It involves the process of getting material for library
and is primarily responsible for effective and efficient development of
NOTES collection of any library.
The acquisition and ordering systems of a library is concerned with the
identification of books, ordering, receiving and categorizing of items into
labels like library collections, claims and cancellations, vendor assignments,
gifts and exchanges.
Acquisition activities can be categorized in five major groups: selection,
ordering, accessioning, management information and gifts and exchange.
Self-Instructional
182 Material
House-keeping Operations
9.7 SELF ASSESSMENT QUESTIONS AND
EXERCISES
1. List some of the common activities of the acquisition system for which
computers can be used.
2. What is library automation?
3. Write a brief note on computer-based acquisition control.
4. Briefly explain automated cataloguing system.
5. Give short note on FRBR.
6. What is automated serials control system?
Long Answer Questions
1. What are some of the key functions and fundamental capabilities of the
acquisition department?
2. What is the significance of cataloguing in a library system and how can it be
made more efficient?
3. Explain in detail about authority control and standard formats in cataloging.
4. Give a detailed note on Machine Readable Cataloguing (MARC).
Williams, Brian and Stacey Sawyer. 2009. Using Information Technology, 6th
edition. New Jersey: McGraw-Hill.
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2012. Operating System
Concepts, 9th edition. New Delhi: Wiley.
Black, Uyless D. 1993. Computer Networks: Protocols, Standards, and
Interfaces, 2nd edition. New Jersey: PTR Prentice Hall.
Nagpal, D.P. 2006. Web Design Technology (Theory and Techniques on the
Cutting Edge), 1st edition. New Delhi: S.Chand & Company. v
Self-Instructional
Material 183
Computerized Information
Services BLOCK - V
DIGITAL LIBRARY
NOTES
UNIT 10 COMPUTERIZED
INFORMATION SERVICES
Structure
10.0 Introduction
10.1 Objectives
10.2 Computerized Information Services: Definition
10.3 Alerting
10.3.1 Types of Alert Services
10.3.2 Importance of Alert Service
10.4 Bibliographic Service
10.5 Document Delivery Service
10.5.1 Categories of Document Delivery Services
10.5.2 Efficiency of Document Delivery Service
10.5.3 Historical Perspective
10.5.4 Increase in Demand
10.5.5 Recent Trends
10.5.6 Electronic Document Delivery Systems
10.6 Problems of DDS and Role of International Organization
10.7 Document Delivery Service of Niscair
10.7.1 Reference Services
10.7.2 Meaning and Definition
10.8 Need and Purpose of Reference Service
10.8.1 User’s Information Needs
10.9 Answers to Check Your Progress Questions
10.10 Summary
10.11 Key Words
10.12 Self Assessment Questions and Exercises
10.13 Further Readings
10.0 INTRODUCTION
10.3 ALERTING
The primary aim of any library is to provide timely and quality services to its users.
The advent of new technologies has made it imperative for libraries to absorb,
adopt and to provide IT-based services to the users. Libraries are now providing
customized Web-based services at the users’ desktops. Users, particularly scientists,
who are engaged in time-bound research and development projects, need to be
alerted about the nascent literature in their respective fields. Librarians are providing
current awareness services to meet these requirements. A few libraries and many
e-publishers are providing alert services to keep the users informed about the
latest additions to their collections and other information relating to the users’ areas
of interest.
Electronic alerting services can help users to keep themselves up-to-date
with current news and newly published literature on a particular topic. Many
library Websites and online databases and publications offer electronic alerting
tools. Once users have set up an electronic alert, the method of running it at
detailed interval and delivering the new results is handled automatically; users will
be notified, although new contents (e.g., an online journal article, electronic table
of content of a new journal issue, a new blog entry, and so on) becomes available.
The Concept of Alert Services
Generally, Web alert services refer to the features included with scholarly databases
or made available by journal publishers. These features are allowed to be notified
by email or text message when something of interest to the library or user has been
added to a database or published about newly published resources on a specific
topic or when new articles are published in a journal.
Earlier, librarians regularly flipped through different books and journals by
listing their areas of interest and typing up bibliographies of potential matches.
Nowadays, alerting services can provide such lists of databases automatically or a
third party that combines these sources. Alerting services are also called as a
current awareness services.
10.3.1 Types of Alert Services
The libraries subscribe to a number of databases that make electronic alert services
available to users. There are several kinds of alert services. They are as follows:
Self-Instructional
186 Material
Table of Contents Computerized Information
Services
Table of Contents service is commonly known as TOCs. The TOC service allows
users to keep themselves up-to-date with newly published scholarly materials by
receiving the table of contents of newly published journals they have selected, NOTES
often with links to the articles. These are regularly available well before the print
issue is published. EBSCO, ProQuest and ISI Web of Science are examples of
email TOC services provided by the publisher databases. TOC services can be
provided through frequent email alerts. Email alert frequencies vary depending on
the publisher’s database updates.
Search Alerts
Search alert service is one of the important library services. It is also called as
Saved Search Alerts or Keyword Alerts. Libraries periodically re-run the user-
created search to match with recent updates and send the alerts.
Citation Alert
Citation alert service is one of the Web-based library service. Users can track
when a specified article or author is cited in newly published articles with citation
alerts. Most of the publisher sites limit results to citations appearing within their
journals, while databases can provide citations from many sources.
New Publication Alerts
This alert service provides notification of new publications (other than journal
issues) from a publisher or professional organization. This alerting service could
include books, proceedings, newsletters, standards, and so on. Annual Reviews,
BioOne, EBSCO host, Engineering Village, Google Scholar, IEEE Xplore, and
PubMed, and so on, are the publisher databases which provide alert service to
the registered users. Libraries can make use of this service and create alerts for
their users depending on their research topic. Library off campus users need to
sign in to the publisher’s Website to access the content and check the print or
online availability of the publication.
RSS
Really Simple Syndication is popularly known as RSS. RSS is one of the Web 2.0
technologies, which is applicable to sharing and delivering information. Therefore,
it can be adopted in the library alert services. Many publishers and databases
provide RSS feed alerts to issues or contents. Nowadays, many library Web
pages or blogs also offer RSS alert services. It saves the users’ time by subscribing
to many feeds. Moreover, instead of visiting Websites, it also finds links to any or
all new content in one place.
New Book Alerts
Users may also want to be alerted even though new books on a topic are published
Self-Instructional
or added to the library’s collection. If users fined a newly published book, they Material 187
Computerized Information can suggest an item for purchase or request to borrow it through interlibrary loans.
Services
This alert service helps in attracting the users to the library.
Web Page Alerts
NOTES This alert service provides alerting for new publications on the Web. Google Alerts
and The Scout Report are examples of online Web page alerts. By subscribing to
these alerts, libraries can offer alerts for Web resources of interest to the researchers
and educators of the institution.
Conference Alerts
The conference alert service provides complete information about the conference-
available information held in library Web pages. Libraries offer this service to its
users depending on the research interest.
The conference alert must also meet the following needs:
o The Website should be complete containing relevant conference details
and be publically accessible.
o The Website should clearly state the conference name, types (State/
National/International), date, place and contact information.
10.3.2 Importance of Alert Service
In this digital age, technology is playing a major role for engineering and
dissemination of information in the network environment. Due to information
explosion, libraries are marching towards digital libraries by providing electronic
services to the users on their desktop. Most of the traditional libraries have given
much emphasis on information access within physical boundaries of the library.
However, today, Web-based library alert services have become much popular
among libraries because of the development of the Web-based libraries. Nowadays,
researchers and academicians are very much busy in their research and
development activities and do not have time to visit the library. Hence, Web-
based library alert services provide a timely service to them.
Bibliographic service is to identity the records of books, articles and other published
materials. It also refers to listings of bibliographic records, cataloging records,
references, articles, and so on. Such information service outputs are of value and
relevance for gathering and understanding knowledge in the subject and generating
new knowledge through research studies and investigations. Library bibliographic
services are a core element of the research endeavor. It provides tools in the form
of catalogs, indexes and abstracts, and Web pages that link the users to the materials
they want. What it fails to provide is seamlessness, simplicity and common language
searching. For the past ten years, online searching has become simpler and more
Self-Instructional effective everywhere, except in library catalogs.
188 Material
The Bibliographic Services Division is responsible for the creation and Computerized Information
Services
maintenance of catalog and other metadata records of the library’s information
resources in all formats including print, audio-video (AV) and electronic. The other
functions of this Division are as follows:
NOTES
Ensure that materials acquired by the library are accurately and
consistently described and classified for effective and efficient retrieval
and utilization.
Manage authority control for use in bibliographic records.
Develop and maintain policies and guidelines for all bibliographic,
cataloging, indexing and classification work.
Manage membership, subscription and keep these updated with
bibliographic utilities for the purpose of acquisition and creation of
bibliographic records.
Manage physical processing and binding of all library materials.
Provide metadata consulting, development and production services
across various subject fields and platforms.
Online Bibliographic Service
Online bibliographic services, such as DIALOG, OCLC (Online College Library
Center), BLAISE (British Library Automated Information Service), ESA-IRS
(Information Retrieval Service of the European Space Agency) and Silver-Platter
offer online access to commercial bibliographic databases, cataloging databases,
trade catalogues, and standards and patents on fee basis. Such services are of
immense importance to libraries that do not subscribe to electronic databases but
do need to access them on occasional basis.
NOTES
10.7 DOCUMENT DELIVERY SERVICE OF NISCAIR
Self-Instructional
Material 199
Computerized Information Nature and Scope
Services
By nature of reference service, we mean the wide spectrum of services offered to
different classes of users, in response to requests or in anticipation of them. These
NOTES services may include meeting simple requests for documents, finding answers to
straight forward fact-finding queries or to complex questions demanding prolonged
search through a wide range of reference sources.
By scope, we refer to the depth and coverage of the subject about which
the question is asked and the precision that is required in answering such a question.
The nature and scope of reference service offered in a library are generally
determined on the basis of the following factors:
Categories of Users: Children, students, teachers, researchers, and
so on.
Types of Libraries: Public, academic and special.
Quality and Level of Service Sought: Location of specific documents
in the library help in the use of the library catalog and such other tools,
or help in consulting reference books, provide assistance in selecting
documents for the study undertaken.
Types of Questions: Fact findings, literature searches, questions relating
to a specific area of research, industrial or business activity and similar
others.
Reference and bibliographical tools maintained for effective use.
Persons visiting the library personally, or enquiring via telephone or
seeking assistance through post or other means.
Reference service in most public libraries would be in the nature of assistance
to readers in seeking books for study or recreation, answering simple fact-finding
questions or enquiries relating to public utilities, and so on. Most users of public
libraries may not be engaged in any serious pursuit of study or research or
investigation, and their collections are also not geared up to this type of requirements.
Of course, there are exceptions, for example, large public libraries of the West.
In university and special libraries, the reference service usually would be of
an intensive type. In fact, most modern documentation and information services
have evolved and grown in the context of serving specialized users, such as
researchers, academicians, writers, industrial and business experts, planners,
executives and management specialists.
From what has been discussed so far about reference service, it should be
clear that reference service incorporates a number of different functions and a
precise definition does not seem to be so essential. It should, however, be noted
that all these services can be offered only by trained, experienced and competent
staff. A number of different techniques and tools have been developed to provide
these services. But before we discuss these aspects, let us examine the need and
Self-Instructional purpose of reference service in libraries.
200 Material
Computerized Information
10.8 NEED AND PURPOSE OF REFERENCE Services
SERVICE
As you know, historically, libraries have been a part of the social milieu. Most of NOTES
the human activities, including education and training, research and development,
socio-economic growth, industry and business, trade and commerce, politics and
international relational, arts and culture, government administration, need active
support of libraries. In fact, modern innovative information services which are
considered as an extension of reference service place emphasis on intensive user-
oriented, need-based reference services. In other words, we shall study the need
and purpose of reference service .We shall do so from the following angles:
Users’ information needs and demand for intensive services
Growth of libraries in all dimensions and their complexities
Modern tools and techniques developed for library and information services
Volume and variety of documents , both print and non-print
Impact of information technology
10.8.1 User’s Information Needs
The process of socio-economic and industrial development has been a major
thrust in almost every country in the latter half of the 20th century. It has been very
much pronounced after the Second World War when many countries of Asia and
Africa became independent. The result of this process has been the creation and
establishment of new institution in almost every field. Specialized groups of people
have been working in these institutions with different functions and responsibilities.
This, in turn, has given rise to the need for information and knowledge on various
aspects of the work in which each group has been involved. These developments
naturally have brought pressure on the libraries to innovate new types of intensive
reference services to meet the growing demand for information. Each group has a
distinct purpose for information support. Table 10.1 below gives a broad summary
of different groups of persons, their needs and purpose of information, and the
type of services offered by libraries in meeting them.
Table 10.1 Information Need
Table Group Information Need Reference and information Services Provided
Students Study, examination, extracurricular Reading lists, check lists, general. information
activities
Teachers Teaching, guiding students; writing Bibliographies, A&I service and interlibrary loans
Researcher Research Bibliographic support including CAS and SDI
Engineers Construction, production and other Standards, and patents, indexes, abstracts and
technical activities handbooks
Medical Practitioners Bio-medical activities Bio-medical journals’ abstracts and indexes
Lawyers and Judges Legal activities Codes, case laws digests and citations
Businessmen and Market potential, product demand, Techno-economic and market surveys;
industrialists product development, economy regulations, trade literature
Self-Instructional
Material 201
Computerized Information
Services
Check Your Progress
4. What has been a major thrust in the later half of the 20th century?
NOTES 5. What is reference service according to the American Library Association
Glossary?
10.10 SUMMARY
Self-Instructional
202 Material
This alert service provides notification of new publications (other than journal Computerized Information
Services
issues) from a publisher or professional organization.
Really Simple Syndication is popularly known as RSS. RSS is one of the
Web 2.0 technologies, which is applicable to sharing and delivering
NOTES
information.
Bibliographic service is to identity the records of books, articles and other
published materials.
The Bibliographic Services Division is responsible for the creation and
maintenance of catalog and other metadata records of the library’s
information resources in all formats.
Document Delivery Service (DDS) is a service in which documents are
supplied to the users on demand, either original or its copy, either in print or
non-print form, irrespective of the location and form of the original.
DDS is a very complex process which spans time and distance between a
user and a supplier.
DDS should be cost-effective. In devising a cost-effective service, all types
of costs, including direct as well as indirect costs, should be taken into
consideration.
Ideally, DDS should target at satisfying all the requests it receives for the
supply of the documents.
The advent of computers, scanners and telecommunication technologies in
1980s made it possible to store the documents in electronic form and transfer
the same electronically to long distances via telecommunication networks
almost instantly.
Exponential growth in the volume of published information, increase in the
number of users, and availability of large a number of online and CD-ROM
bibliographic databases, providing easy and timely access to published
information, resulted in great increase in demand of the original documents.
Interlibrary resource sharing systems had their own limitations, such as
problems of updating the union catalogs, extra inter-leading burden on large
libraries, withdrawal of some cooperating libraries, and so on.
The systems employing electronic technology for the receipt of requests
and supply of documents are known as Electronic Document Delivery
Systems (EDDS).
Pro-Quest International Power pages is another full-text journal database
on CD- ROM, offered commercially by the publisher UMI.
NUCSSI database contains serials holding information of about 850 science
libraries in India.
Procurement of a document copy from other Indian libraries from foreign
countries usually takes about 8–12 weeks’ time.
Self-Instructional
Material 203
Computerized Information
Services 10.11 KEY WORDS
Reference service: It is a service that helps the user define and identify
NOTES his query correctly, bearing in mind how he intends to use the information.
Document Delivery Service: It is a service in which documents are
supplied to the users on demand.
Williams, Brian and Stacey Sawyer. 2009. Using Information Technology, 6th
edition. New Jersey: McGraw-Hill.
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2012. Operating System
Concepts, 9th edition. New Delhi: Wiley.
Black, Uyless D. 1993. Computer Networks: Protocols, Standards, and
Interfaces, 2nd edition. New Jersey: PTR Prentice Hall.
Nagpal, D.P. 2006. Web Design Technology (Theory and Techniques on the
Self-Instructional
204 Material
Cutting Edge), 1st edition. New Delhi: S.Chand & Company.
Digitization
UNIT 11 DIGITIZATION
Structure NOTES
11.0 Introduction
11.1 Objectives
11.2 Definition, Need and Purpose of Digital Libraries
11.3 Process and Methods of Digitization
11.3.1 Framework for Building Digital Library
11.4 Answers to Check Your Progress Questions
11.5 Summary
11.6 Key Words
11.7 Self Assessment Questions and Exercises
11.8 Further Readings
11.0 INTRODUCTION
11.1 OBJECTIVES
its users. Digital library efforts in providing digital reference service, electronic
information service, navigating, searching and retrieval of digitized information
through web documents that span the university Digital Library or the Global Digital
Library. Time is a major factor for each modern user of the library and digitization NOTES
is the only solution to the problem. Digital libraries are needed to provide quality-
based service at the user doorstep. Complex nature of recent document, storage
problem etc., are some of the common factor which are influencing to change to
digital mode, some other factors are-
1. Space
2. No Physical Boundary
3. Instantaneity of Retrieval
4. Preservation and Conservation
5. Structured Approach
6. Networking
7. Searching Problem in Traditional Libraries.
8. Information Retrieval: By using digital library one will be able to retrieved
information specifically for e.g. a particular image, photo, a definition etc.
9. Low cost of Technology: When we consider the storage capacity of digital
document and it’s maintain then it can be easily realize that the cost of
technologies is much more less than that of traditional libraries.
10. Environmental Factor: The use of digital library is the cleanest technologies
to fulfill the slogan "Burn a CD-ROM save the Tree".
11. Easy to Understand: The visual or graphical information system of digital
library is more popular as compared to text based information system.
12. Multiple Function of Same Information: In case of digital library by
using hypertext it is possible to structure and organized the same digital
information in a variety of ways, which serve multiple functions.
13. New Generation Needs: The new generation user becomes only happy
when they will be able to read from the computer screen.
14. Information Explosion: Digital library is expected to be able to handle
and manage large amount of digital content by simply providing link, without
actually procuring the document.
15. Distance Learning: Learning from home, office or other places, which
are convenient to user.
16. To procure Online Publication: More and more information are going to
published over internet, digital library is needed to procure the online
publication and to provide link to important sources of information.
Self-Instructional
Material 207
Digitization Characteristics
The characteristics of digital libraries are the following:
• Assumptions about a Digital Library: There are certain assumptions in
NOTES discussions of a digital library. Levy and Marshall (1995) summarize these
as: digital libraries are collections containing fixed, permanent documents
which are based on digital technologies and are used by individuals working
alone.
• Fixity of Content: The concept of a fixed and permanent document is
based on the printed book: While a title may be reissued in a revised version,
once a specific volume is printed and bound, it remains unchanged. Fixity
creates a comfortable environment in which to perform certain library
functions. Cataloguing practices have evolved around the largely fixed and
permanent document. Fluid - or - transient documents, such as pamphlets
and news clippings have been largely uncatalogued and stored in unclassified
areas, such as the vertical file [cabinet]. The perception of lack-of-fixity in
fluid digital documents, especially internet-based documents, leads to the
assumption that digital items are ill-equipped for cataloguing and other library
functions.
• Technologies of Library Collections: The development of the concept
of a library based on digital technologies has revolved around the concept
of a library based on the book. As Levy and Marshall (1995) point out, the
book is not the only material contained in library collections. In addition to
holdings of books, photographs, unbound and handwritten manuscripts and
correspondents, and other ephemera which are adaptable to digital
representation, libraries also contain three-dimensional artifacts, such as
models, dioramas, toys and games, and regalia—for example, a chameleon
(for a borrow-a-pet service) or a wooden crate marked with 'Papers of
(author). Do not open until (date). (Name of custodian or executor).' Regalia
and certain other three-dimensional items in a library's collection do not
easily convert to digital format. Therefore, even if all currently convertible
library materials were digitized, not all materials in the library would be in
digital form.
• The act of Information Seeking: The perception seems to be that the
work in which the user engages in seeking information and the work in
which the practitioner engages in supporting his or her patrons is a solitary
act. Contrary to this impression, research finds that the library is a meeting
place where collaborative work takes place among patrons, among
practitioners, and between practitioners and patrons. For digital libraries to
pattern the work capabilities of the traditional library, and to pattern the
work habits of the library's patrons and practitioners, collaborative
functionality must be included in digital library design.An exceptional example
Self-Instructional
208 Material
of progress toward this goal, the work of Robertson, Jitan and Reese (1997) Digitization
Librarians, research scholars or any person assigned by the organization can initiate
building up a digital collection for library. Such projects should have specific goals
and are of finite duration. Project planning should include plans for the digital NOTES
collections keeping in view its present and future use, continued access to
collections, collection maintenance etc. Digital library project can be done as a
team work by involving individuals from various disciplines or institutions. The
project manager should have the ability to recognize when additional expertise is
needed & he should be informed of progress of the project to demonstrate
accountability, generate interest in the digital collections and ensure continuing
support for the project.
Digitization Process: The existing resources of the library can be converted into
digital media by scanning the materials. Flatbed scanner or digital camera may be
used for image capturing or scanning. Scanning of images may take place at 300
dbi bitonal. 600 dbi bitonal is used for higher resolution. Scanning is the most
popular method of converting the materials. Digital imaging technology has a number
of options that can be adopted depending on the objectives, its end users, availability
of fund etc.
After choosing one of the data conversion methods, as suited to particular
library, we should develop plan of action. Digitization process starts with project
planning with documentation followed by a linear progression of tasks: select/
prepare, convert/ scan, process, store, distribute and maintain over time. Digital
conversion process includes:
Documents
Data/ image capture
Data processing
Storage
Indexing and processing
Retrieval and display
Computer
Stored on
Selection Scanner or Hard disk
of digital or CD/DVD
documents camera
Self-Instructional
Material 213
Digitization Selection and identification of materials/ documents according to priority
decided earlier is first step. A List of candidate documents for entire project may
be prepared as a database. It should have identifying information, priority based
on content and its copyright status. After selection each page may be scanned as
NOTES a separate image file. The field in the spreadsheet includes the item identification
number, title, number of pages and notes of each document. All the resulting files
are collected into a single directory. The text in the convertible document may
require conversion of diacritics, or special characters, images may need
enhancement, amplification or compression. Records are verified and processed/
edited, if required. The information converted into digital form will need digital
storage medium, which may be hard disk, magnetic tape, optical CD-Rom, or
networks with workstation to access. Use of Dublin core standard is advisable to
create metadata of digital resources.
11.5 SUMMARY
The Digital Libraries are electronic libraries where the information is acquired,
stored and retrieved in digital form.
Digital Libraries are the group-interlinked workstations connected to the
high-speed networks.
The term Digital Library has a variety of potential meanings, ranging from a
digitized collection of material that one might find in a traditional library
through to the collection of all digital information along with the services that
make that information useful to all possible users.
Self-Instructional
214 Material
An informal definition of a digital library is a managed collection of Digitization
Self-Instructional
Material 215
Digitization
11.6 KEY WORDS
Williams, Brian and Stacey Sawyer. 2009. Using Information Technology, 6th
edition. New Jersey: McGraw-Hill.
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2012. Operating System
Concepts, 9th edition. New Delhi: Wiley.
Black, Uyless D. 1993. Computer Networks: Protocols, Standards, and
Interfaces, 2nd edition. New Jersey: PTR Prentice Hall.
Nagpal, D.P. 2006. Web Design Technology (Theory and Techniques on the
Cutting Edge), 1st edition. New Delhi: S.Chand & Company.
Self-Instructional
216 Material
Library and Information
INFORMATION
NOTES
NETWORKS
Structure
12.0 Introduction
12.1 Objectives
12.2 Library and Information Networks
12.2.1 Definitions and Objectives
12.2.2 Brief History of Library and Information Networks
12.2.3 Library Networks at the International Level
12.2.4 Existing Data Networks in India
12.2.5 Library and Information Networks: Indian Scenario
12.3 Answers to Check Your Progress Questions
12.4 Summary
12.5 Key Words
12.6 Self Assessment Questions and Exercises
12.7 Further Readings
12.0 INTRODUCTION
The explosion in the amount of literature that is available, increases among the
number of users and their different needs, and the application of electronic media
are forcing libraries to construct and participate in networks. Magnetic tapes,
floppy disks, and CD-ROMs provide enough data storage capacity. Retrieval
through telecommunications networks and access to international databases are
available for searching for information on various subjects. With the advent of
networks, remote transmission of texts and graphics, video clips and animated
clips are also possible. In this unit, you will learn about library and information
networks in detail.
12.1 OBJECTIVES
In this section, we will discuss the definition, objectives, history and other important
concepts of library and information networks. Self-Instructional
Material 217
Library and Information 12.2.1 Definitions and Objectives
Networks
There are many definitions for library networks. Well-known author Susan K.
Martin defines a network as a ‘group of individuals or organizations that are
NOTES interconnected to form a system to accomplish some specified goal. This linkage
must include a communications mechanism, and many networks exist for the express
purpose of facilitating certain types of communication among members’.
Renowned author Joseph Becker suggests that, ‘when two or more libraries
engage formally in a common pattern of information exchange, through
communications, for some functionally interdependent purpose, we have a library
network.’
UNISIST II, the main working document, defines Information Network as
‘a set of interrelated information systems associated with communication facilities,
which are cooperating through more or less formal agreements and institutional
agreements, in order to jointly implement information handling operation, with a
view to pooling their resources and to offer better services to the user. They generally
follow identical or compatible rules and procedures’.
Objectives of Library and Information Networks
The objectives of library and information networks are as follows:
Provide reliable access to document collection of libraries, that is, union
catalogs, and so on
Provide access to worldwide bibliographical information
Provide document delivery service
Optimize information resources through resource sharing mechanisms
Facilitate computerization of all the libraries
Facilitate communication among teachers, students, scientists and others
Provide effective access to library resources
Encourage resource sharing
Train manpower required by participating libraries
Evolve standards, uniform guidelines, methods and procedures, both for
data capturing as well as hardware and software
12.2.2 Brief History of Library and Information Networks
Data communication with their capabilities for online access plays an important
role in modern information storage and retrieval systems. Earlier, information
networks operated in an offline mode. Now, with the developments in computer
and communication technology, it is possible to carry out this process in an online
interactive mode wherein a user can access an online host via a microcomputer
from a remote location, and can define and redefine his query based on the search
Self-Instructional
218 Material
results obtained till he is fully satisfied with the final outcome. Availability of several Library and Information
Networks
large online databases, through vendors, such as DIALOG, STN, Datastar, and
so on, has made the use of communication technology for information retrieval
activities highly popular. Several organizations began offering online searches from
remote terminals on a variety of online databases from the mid-1970s. NOTES
International Scenario
Library and information networks had its roots in library cooperation. ILL and
shared cataloging actually took off with MARC (MAchine-Readable Cataloging)
in 1968 with Library of Congress playing a vital role. This movement ultimately led
to large networks, such as OCLC (Online Computer Library Center, Inc.), WLN
(Western Library Network), RLIN (Research Libraries Information Network),
BCLMP (Birmingham Libraries Co-operative Mechanization Project), UTLAS
(University of Toronto LibraryAutomated Systems), ABN (Australian Bibliographic
Network), JANET (Joint Academic Network), and many others.
Library Networking Scene in India
1958 – Scientific Policy Resolutions
1959 – Sinha Committee’s Report
1965 – Ranganathan Report to UGC
1972 – Peter Lazar Committee Report
1972 – V A Kamath Report
1983 – Technology Policy Statements
1984 – Planning Commissions Working Group headed by Dr N. Seshagiri
(Seventh Five Year Plan)
1985 – NISSAT efforts (city networks)
1988 – UGC effort (Academic Library) DESINET, BTIS, CSIRNET,
INFLIBNET, and so on
12.2.3 Library Networks at the International Level
At the international level, various library networks are available. Some of them are
discussed in the following sections.
1. OCLC: Online Computer Library Centre – A Global Library Cooperative
OCLC is a membership organization with 41,000 libraries across eighty-two
countries and territories as members. It is a non-profit organization with a mission
to be the leading global library cooperative and to:
Promote access to the world’s information.
Reduce library costs by offering services for libraries and their users.
Help libraries serve people by providing economical access to knowledge
through innovation and collaboration.
Self-Instructional
Material 219
Library and Information History: OCLC was founded in 1967 by university presidents with the purpose
Networks
of sharing library resources and reducing library costs. Noteworthy milestones
are as follows:
1971: Introduced an online shared cataloging system for libraries.
NOTES
1979: The Interlibrary Loan Service was introduced.
1991: The FirstSearch service was introduced as a reference tool.
Membership: Membership in OCLC is a cooperative venture to the world’s
largest library consortium, providing libraries global access to all services and
databases, including WorldCat.
Services and Databases: The full range of services meets the needs of libraries
of all sizes:
Cataloging tools
Reference databases and online searching services
Resource sharing tools
Preservation services
Dewey Decimal Classification
World Cat database access
Research: Conducts internally and externally research at universities or other
research centers, administers the Dublin Core Metadata Initiative and conducts
Distinguished Seminar Series.
Governance: The governance structure consists of General members, the
Members Council and the Board of Trustees.
2. RLIN: Research Libraries Group (RLG)
RLG is a non-profit membership corporation, founded in 1974 and incorporated
in 1975 by Columbia, Harvard, and Yale universities and The New York Public
Library. Its mission is ‘improving access to information that supports research and
learning’. It is a leader in developing collaborative solutions to acquisition, delivery
and preservation of information problems that research collections and their users
face.
Universities and colleges, national libraries, archives, historical societies,
museums and independent research collections, and public libraries are some of
RLG’s international members. RLG provides a highly skilled staff, sophisticated
technical resources, and a long, successful track record in managing and supporting
interactions among its members to develop, coordinate and operate their joint
initiatives.
Services for RLG Users Include:
Information discovery
Record supply
Self-Instructional
220 Material
Record sharing through RLG Library and Information
Networks
Interlibrary loan and information delivery
Cataloging services
Library schools NOTES
User support
Members have access to millions of records from research collections and
information databases around the world.
RLG Citation Resources: Members get to use a bank of databases
covering journals, newspapers, conference proceedings, dissertations and
other publications at the individual article level.
RLG Archival Resources: Access to online, single-point-of-access, is
possible.
RLG Cultural Materials: Access to rare and unique primary materials
that have long been difficult or impossible to obtain through its own Web
interface.
RLG Union Catalog and other Databases: Extract MARC records.
Cataloging Services: Automated cataloging service, called Marcadia, searches
for and tailors RLG Union Catalog records to meet an institution’s needs. It is
provided through MARC Link Corporation.
RLG Union Catalog: A database of bibliographic descriptions that grows daily
through contributions from a range of institutions and cooperative cataloging
projects.
3. JANET: Joint Academy Network
UKERNA (United Kingdom Education and Research Networking Association)
was set up under a Service Level Agreement from the Joint Information Systems
Committee (JISC) of the UK Higher and Further Education Funding Councils.
JANET, which stands for ‘Joint Academic Network’, is operated and developed
by UKERNA and is connected to the equivalent academic networks in other
countries and with many commercial networks in the UK and abroad forming part
of the global Internet. JANET provides access to several hundred different computer
systems at over one hundred different sites by interconnecting the local computer
networks in the United Kingdom Research Councils, universities and most
polytechnics including several different computers connected to these local
networks. The usage is free for members of institutions connected to JANET.
There are no formalities to be completed before you can use the network,
as JANET is a completely open network but most of the systems connected to
JANET have certain restrictions. There are four ways in which JANET can be
used. These are as follows:
1. To provide access to a computer at another site referred to as
‘Interactive’ use Self-Instructional
Material 221
Library and Information 2. To send a mail message from one computer system to another referred
Networks
to as ‘Mail’
3. To transfer a file from one computer system to another referred to as
‘File Transfer’
NOTES
4. To submit a job from one computer system to be run on another referred
to as ‘Remote Job Entry’
4. CURL: Consortium of University Research Libraries, 1987
Consortium of University Research Libraries (CURL) is another effort to promote,
maintain and improve library resources for research, learning and teaching in
research-led universities.
It was established with the objective to:
Develop cooperative and consortia solutions to resolve issues related
to acquisition, processing, storage, preservation, exploitation,
dissemination, and delivery of information and library materials.
Support libraries in the consortium to practice and accomplish their own
institutional objectives.
CURL has a database for bibliographic records that offers record retrieval
service of UKMARC records at competitive rates. Any non-profit organization
can avail these services, subject to signing license agreements. The only charge is
a flat rate for searching and a month’s free trial is also available.
5. CALIS: Chinese Academic Library and Information System
The China Academic Library and Information System (CALIS) is funded primarily
by the Chinese government. It is a national academic library consortium to serve
multiple resource-sharing functions among the participating libraries including online
searching, interlibrary loan, document delivery, and coordinated purchasing and
cataloging by digitizing resources and developing an information service network.
Funding: The Chinese government has majorly funded the development and
operation of CALIS. The funding sources currently are as follows:
Government grants: Purchase of software and hardware for the CALIS
centers and commercial databases, for development of service software
and databases, for training of staff members, and so on, have been done
with government funds.
Local matching funds: The construction of local centers is funded by the
province or city that desires to have a regional center to supplement the
government funds.
Member library funds: Purchase of electronic resources and expenses
incurred from the use of the CALIS service software platforms are taken
from the university budgets.
Self-Instructional
222 Material
In future, it is expected that CALIS will rely mainly on other sources of Library and Information
Networks
funds, may be by operating the system in a commercial mode.
Current Status: There are now seventy members covering around 700,000
students. CALIS follows a long-term strategy, and service functions are made
NOTES
available as and when they are developed. It started with the following information-
sharing functions in its member libraries:
Primary and secondary data searching
Interlibrary borrowing and lending
Document delivery
Coordinated purchasing
Online cataloging
The tasks that are completed are as follows:
Purchase of computer hardware
Construction of a CERNet-based (Internet-based) information-sharing
network, connecting academic libraries across the country
Group purchase of databases, such as UMI, EBSCO, EI Village, INSPEC,
Elsevier and Web of Science that are shared among member libraries either
directly online or indirectly through requested service/document delivery.
Some databases that have been developed are as follows:
Union Catalogs: Contain bibliographic records.
Dissertation Abstracts and Conference Proceedings: Contain abstracts
of doctoral dissertations and proceedings of national and international
conferences collected from more than thirty member libraries.
Current Chinese Periodicals: These databases contain titles bibliographic
records.
Key Disciplines Databases: Contain discipline-specific records.
Except for the last database, all the others follow the USMARC,
UNIMARC, or CCFC (Common Communication Format of China) format. Web-
based search is possible with all the databases and online access of CALIS
resources using browsers is allowed.
Software platforms include:
Cooperative online cataloging systems
Systems for database development
An Interlibrary loan system
An OPAC system
A CALIS information service network is formed with a network of databases
that are centrally located and that are distributed at various locations including
service platforms in member libraries. Self-Instructional
Material 223
Library and Information Future Considerations: Within a year of initiating CALIS, there has been
Networks
a lot of progress in forming a nationwide resource-sharing library consortium in
China. However, more is expected out of it when challenges including variation in
library sizes, available funds, staff quality and automation level are overcome.
NOTES
CALIS will improve service systems including hardware and software
platforms, and the distribution of shared databases, in the next phase of
development, along with development of more electronic resource databases and
invest in expanding the scale and extent of resource sharing with the research and
development of digital libraries.
6. AARNET: Australian Academic and Research Library Network
AARNet Pty Ltd. that operates the second generation of the Australian Academic
and Research Network, AARNet2 network, is another non-profit company. It
provides high capacity Internet services between eight state- and territory-based
regional network hubs that provide Internet service to Australian universities and
other research institutions including Commonwealth Scientific and Industrial
Research Organisation (CSIRO), Defence Science and Technology Organisation
(DSTO), Australian Nuclear Science and Technology Organisation (ANSTO)
and Australian Institute of Marine Science (AIMS).
Services provided by AARNet include delivering high-capacity, cost-
competitive Internet-based network services to clients in the tertiary education
and research sector. It provides resources including access to the global Research
and Education (R&E) networks, for development of advanced network
infrastructure and applications.
AARNet provides three Internet Protocol (IP) services. These are as follows:
On-Net provides IP connectivity between members.
Off-Net National provides IP connectivity to the Australian domestic
Internet. This is provided by Cable and Wireless Optus (CWO).
International IP provides access to the global international.
Each state and territory has a regional network that is networked to form
AARNet2. The regional network hubs, or Points of Presence (PoPs), provide IP
connectivity to AARNet members and associates in that region by a variety of
carrier and privately owned links.
12.2.4 Existing Data Networks in India
Telecommunication facilities are used for data transmission as required by computer
communication networks, thus, forming a consolidated source for accessing,
communicating and transforming information. In India, national and international
telecommunication facilities are provided and maintained by the Department of
Electronics (DoE), Department of Telecommunications (DOT), Videsh Sanchar
Nigam Limited (VSNL) and the Government of India. These networks are
discussed in the following section.
Self-Instructional
224 Material
INDONET Library and Information
Networks
In 1986, Computer Maintenance Corporation (CMC) commissioned the first
Indian commercial computer communication network. It is a nation-wide integrated
information management and distributed data processing facility, aiming to provide NOTES
facility for distributed data processing on an all-India basis to large organizations
in the network using CMC computers for their data processing operations. There
is no need for duplication of software and hardware facilities at each location due
to the distributed databases in various subjects and access to specialized
applications software locally, or in remote locations.
INDONET-CMC has a Value Added Services (VAS) network that is a
data network approved by the DOT, which supports both TCP/IP (Transmission
Control Protocol/Internet Protocol) and X.25 Network Protocols having high
speed leased links of 64 kbps connecting nine locations in India. It has alternate
data links at each location for better reliability and uptime with two RISC (Reduced
Instruction Set Computer) based servers at each location.
The services offered by INDONET include:
E-mail/E-mail-fax services
o File transfer, credit card authorization, database services
Hosting User Applications in the Net
o Providing network-based connectivity solutions, corporate intranet
o Network management, managed data network services, help desk
o EDI services, Web-based applications
o Students registration in the NET for admission
o Student’s assignment submission grading over the Net
o Electronic reference library access in the Net
o Data management and data processing services
o Recruitment services using newer technologies (OMR, OCR), and so
on
o ISP services
The future services planned are as follows:
Full-fledged e-commerce services, ERP (Enterprise Resource Planning)/
application integration services
Voice/Video conferencing facilities
Payment transaction to utilities (electricity, water, telephone, and so on)
Fax-Store and forward
Call center services
VSAT (Very Small Aperture Terminal) services
Self-Instructional
Material 225
Library and Information ERNET: Education and Research Network
Networks
There has been a quantum change in the concept of teaching with a lot of importance
being given to learning and dissemination of information, particularly with a focus
NOTES on Internet-based education and e-learning. With this in mind, the Education and
Research Network (ERNET) project was initiated in 1986 by the Department of
Education (DoE) and funded by the Government of India and the United Nations
Development Programme (UNDP), with the objective to create expertise, research
and development (R&D) and education in the country in the area of networking
and the Internet. There were an additional eight premier institutions as participating
agencies:
National Centre for Software Technology (NCST), Mumbai
Indian Institute of Science (IISc), Bangalore
The five Indian Institutes of Technology (IITs) at Delhi, Mumbai, Kanpur,
Kharagpur and Chennai
The DoE, New Delhi
Today, ERNET is India’s largest nationwide terrestrial and satellite network
with a presence in the premier educational and research institutions in major cities.
It works with an aim to provide network connectivity and meet the entire needs of
educational and research institutions by hosting and providing relevant information
to their users with Research and Development and Training as integral parts of
ERNET activities.
ERNET’s contribution to networking in India has been to build up national
capabilities in the area of networking, especially in protocol software engineering.
It started as a multiprotocol network having the TCP/IP and the OSI-IP
protocol stacks running over the leased-line portion of the backbone. Since 1995,
all traffic is carried over TCP/IP.
ERNET’s objectives include:
ERNET operations providing state-of-the-art communication
infrastructure and services to:
o Academic and research institutions
o Government organizations
o NGOs (Non-Governmental Organizations)
o Private sector R&D organizations
o Various other non-commercial organizations
Research and development
Training and consultancy
Content development
Self-Instructional
226 Material
ERNET’s achievements include: Library and Information
Networks
Developing national-level capability in computer networking through:
o Setting up numerous core groups as participating agencies with a
minimal set of lab facilities and creation of skilled manpower to carry NOTES
out R&D
o Generating manpower at different levels
o Making the world of standards (TCP/IP, OSI, and so on) well
understood
o Providing insights into emerging issues, such as ATM networks,
networked multimedia and information infrastructure
Setting up network infrastructure and services including:
o Installation, maintenance and operation of large campus Local Area
Networks (LANs)
o Design, commissioning and testing of Satellite Wide Area Network
(SATWAN) hub and the installation of VSATs
o Seamless interconnection of LAN-WAN segments and providing multi-
protocol capability
o Provision of the whole range of Internet services
o Deployment of TDM/TDMA (Time Division Multiplexing/ Time
Division Multiple Access) based VSAT network for Internet access
Research and Development
o Research and development in the area of computer networking
NICNET: National Informatics Centre Network
National Informatics Centre Network (NICNET) was set up to provide satellite
based informatics services to the Central and State Government Departments and
organizations. NICNET addresses the information management and decision
support requirements of the Government of India as well as the corporate sector.
National Informatics Centre (NIC) provides information technology services that
includes conducting feasibility studies for developing and implementing computer-
based information systems, undertaking large turnkey networks and imparting
training. It also has expertise in integrating the processes of user organizations with
IT-based systems. Value added network services, such as e-mail, database access,
Internet, and so on, are provided on an ongoing basis. Computer-aided design
and computer-aided management services are also offered over NICNET.
The network consists of:
Master Earth Station: Located at CGO Complex, New Delhi, it
comprises a 13-meter antenna, a network control center and a packet
switch.
Self-Instructional
Material 227
Library and Information Remote Micro Earth Stations: Consists of remotely located district
Networks
computers that are connected with the State computer. State computers
are connected to the regional headquarters.
Geosynchronous Satellite: Currently using the INTELSAT-V satellite
NOTES
as a relay station between the master earth station and the micro earth
station.
NICNET is now a dedicated network with more than 500 nodes
geographically distributed over the country. Information for monitoring the socio-
economic development of the district is consolidated by each district information
center, and this information flows from district level to its connected State level
center. The processed information is further sent to the regional and the national
centers. Each State level center is connected to other State centers; thus, any user
can link to any other remote micro earth station if they are connected to a remote
or master earth station. All information systems are housed at the national center
at New Delhi, which conducts research and development of relevant software
and hardware tools.
NICNET’s various facilities and services include:
Gateway to Internet by providing Internet connectivity
Electronic mail service
USENET bulletin board service
Telnet facility to login to remote host
File transfer protocol facility
Research and Education Network of NIC (RENNIC) service to
research, education and medical institutions
Electronic data interchange service
Bibliographic information service
Geographical information systems
General Information Services Terminal (GISTNIC) for common public
Training facilities
VIKRAM
The DOT is developing a packet switched public data network named VIKRAM,
which initially has eight switching nodes in Delhi, Mumbai, Kolkata, Chennai,
Bangalore, Hyderabad, Ahmedabad and Pune along with twelve remote access
nodes with its network management center located at Delhi. It will support packet
switching interface according to the specifications of CCITTs X.25, X.28, X.29
and X.75.
Bibliographic Applications: VIKRAM includes bibliographical
applications for which infrastructure support has been offered to NISSAT for pilot
Self-Instructional experimentation on library networking in the country.
228 Material
BITSNET Library and Information
Networks
During 1986–87, a distributed database and network organization, BITSNET,
was launched for pursuing a bio-informatics program involving advanced research
in modern biology and biotechnology. As a vehicle for transfer and exchange of NOTES
information, scientific knowledge, technology packages, and references in the
country involving 10,000–12,000 scientific personnel, it has turned out to be a
success. BITSNET is supported by ten distributed information centers, an apex
center at the Department of Biotechnology and forty-four sub-distributed
information centers, located in universities and research institutes of national
importance. Additionally, there are six national facilities for interactive graphics-
based molecular modeling and other bio-computational needs. Poona University,
Jawaharlal Nehru University, Calcutta University and Madurai Kamaraj University
have addressed the need for trained human capital in this inter-disciplinary area by
launching four long-term courses at the level of post M.Sc. Diploma in Bio-
informatics.
INET
DOT commissioned INET, India’s X.25-based packet switched public data
network for a highly reliable, cost effective and flexible way of national data transfer
and information access that enables error-free transmission with dynamic rerouting
of calls and provides interconnection between computers/terminals at different
speeds and protocols. The first phase was started with nodes at New Delhi,
Mumbai, Kolkata, Chennai, Bangalore, Hyderabad, Pune, Kanpur and
Ahmedabad that are connected through 9.6 kbps and 64 kbps links, and was
ultimately extended to eighty-eight other cities throughout India. Interfaces/protocols
supported are CCITT, X.25, X.28, X.29, X.3 and X.75 having access through
dedicated leased lines for asynchronous (X.28) or synchronous (X.25) and dial-
up mode (X.28).
INET facilities include:
Reverse charging
Closed user groups
Fast selects
Charge information indication
Call redirection
Call deflection
Abbreviated address calling
Hunt groups
Multiple packet sizes
Network user identification
Self-Instructional
Material 229
Library and Information Application support includes:
Networks
E-mail service
Corporate communication
NOTES Information retrieval
Database service
Remote job application
Credit card verification
Travel reservation
Electronic fund transfer
SIRNET: Scientific and Industrial Network
In 1989, INSDOC (Indian National Scientific Documentation Centre) launched
the Scientific and Industrial Network (SIRNET) project aiming at networking all
forty CSIR (Council of Scientific & Industrial Research) laboratories under
SIRNET. SIRNET has several servers and a number of user nodes providing
electronic mail facility as its first application service. Messages are transmitted by
sending them to any SIRNET mail service node situated at INSDOC, Delhi, and
at its regional center at Bangalore for transmission to any of the CSIR laboratories
at present linked to the mail node. The SIRNET is connected to the ERNET
which, in turn, is connected to the international network Unix User Network
(UUNET). The UUNET provides access to other international networks, including
Because It’s Time Network (BITNET), Computer Science Network (CSNET)
and JANET. SIRNET is directly connected to VIKRAM, the DoE mail server,
which is the clearing node in Delhi ERNET. However, dial-up telephone lines are
used for connections between various laboratories of CSIR.
12.2.5 Library and Information Networks: Indian Scenario
The responsibility of every library is to provide the best materials and services to
its users. The foremost aim is to provide access, to its users, to all information no
matter what the format and wherever it may be stored. The second aim is to
provide access from anywhere in the community. A network is the best vehicle
that can make this possible giving access to vast information services and can help
improve library services in many ways, such as databases, discussion groups, full
text access and document delivery through resource sharing. Networking
technologies keep evolving, thereby, reducing the cost of information provision.
To cater to the needs of academicians and research community, the Ministry
of Human Resources Development, through the University Grants Commission
(UGC), established the Information & Library Network Centre that connected
the higher education institutions at the national level. To set up a state-of-the-art
nationwide network for its universities, the UGC-NET was established in
collaboration with ERNET-India and will effect a virtual enhancement of academic
Self-Instructional
230 Material
infrastructure in the country to connect more than 172 universities with proper Library and Information
Networks
bandwidth to access their own resources as well as resources available elsewhere.
Other library networks including Developing Library Network (DELNET), Calcutta
Library Network (CALIBNET), Ahmedabad Library Network (ADINET), and
so on, have also progressed substantially. For example, DELNET was initially NOTES
established for libraries in Delhi, but with membership from other parts of the
country and also a few international memberships has now increased its scope.
INFLIBNET: Information and Library Network Centre
In 1991, the UGC initiated a major program, the Information and Library Network
(INFLIBNET) as an autonomous inter-university center, headquartered in
Ahmedabad. The program was initiated with the purpose of modernizing libraries
and information centers, and establishing a mechanism for information transfer and
access to support scholarship, learning and academic pursuits. Another aim was
to establish a national network of libraries and information centers in universities,
institutions of higher learning and R&D institutions in India. The program has evolved
over the years and, since 1996, has become an independent autonomous Inter-
University Centre under the UGC to coordinate and implement nationwide high-
speed data network for connecting all the university libraries in the country using
state-of-the-art technologies. INFLIBNET promises to play an important role in
encouraging scholarly communication among academicians and researchers in India.
INFLIBNET’s objectives are as follows:
To improve capability in information transfer and access, providing
support to scholarship, learning, research and academic pursuits
To establish ‘INFLIBNET’, which is a computer communication
network for linking libraries and information centers in universities,
deemed universities, colleges, UGC information centers, institutions of
national importance and R&D institutions, and so on
INFLIBNET’s Main Activities Include:
Provided financial support for automation and networking, to the tune of
6.5 lakh, each to 142 university libraries.
More than 75 per cent libraries are operational and are availing the recurring
grant.
Provided a grant of 1 lakh each to sixty-five libraries to establish core
facilities and get connected to the network for accessing the information.
Provided training to the library staff members to help the operational staff
to implement IT in their libraries. Similarly, workshops were also conducted
for the executives working for the libraries at INFLIBNET.
Onsite training provided at more than thirty-five places.
INFLIBNET also provides regional level training and necessary support to
help the librarians from college libraries. Self-Instructional
Material 231
Library and Information Software is developed and installed at more than fifty libraries to run the
Networks
library operation.
Union databases have been developed to provide access to holdings of
libraries of different materials, namely serials, theses, books, experts,
NOTES
projects, and so on, and are kept online for access at http://
www.inflibnet.ac.in. User-friendly search engines have been developed to
provide access to these databases.
Implemented the MARC-21 interface to SOUL software and vice versa.
Provided different information services, including CD-ROM based services,
access to OCLC first search, contents page service, and so on.
To provide a platform for librarians and IT professionals, INFLIBNET
conducts an annual convention in the form of CALIBER.
Publishes a series of publications to promote the cause of INFLIBNET.
Initiated two major projects, namely retrospective conversion of collection
of five major libraries and six document delivery service centers.
The most significant achievement of INFLIBNET has been to create an IT-
conscious environment in university libraries with active participation of librarians
in implementing the changes.
Future Plans: The initial phase was focused on building up the infrastructure
at the participating libraries and preparing them for the changes brought about by
information technology. INFLIBNET is the major library network in India, with a
future full of opportunities to connect with the information superhighway of this
millennium.
Major priorities listed are as follows:
Providing network connectivity to more than 170 university libraries
through UGC NET
Financial support to remaining universities with recurring grants to funded
universities
Delivering the SOUL software to participating libraries
Expanding the membership with increased participation in the network
Enhancing the information base through collaboration with existing
national information centers
Providing services in the networked environment by developing
manpower through continuous training activities
Developing union databases and keeping them updated
Shared cataloging
Networked information services
Access to full text of publications
Self-Instructional
232 Material
Organizing and providing access to Internet resources Library and Information
Networks
Promoting Indian academic information
Promoting discussion forums in different areas
Other Important Library Networks NOTES
Self-Instructional
234 Material
The objectives of PUNENET are as follows: Library and Information
Networks
Better utilization of funds
Sharing of resources
Creation of commonly usable databases NOTES
Communication between libraries
Automating the functions of the individual libraries
PUNENET services include:
Union catalog
Current awareness
SDI
Authority data
Acquisition and fund accounting
Serials control
Books and journals maintenance
Circulation
User services
Interlibrary loan services
Document transfer/copy
Access to national/international databases
6. MALIBNET: Madras Library Network
MALIBNET is located in the INSDOC Regional Centre, Chennai. It was initiated
by INSDOC in 1991 and registered as a society in 1993. Facilities include
computers, Sybase RDBMS and UNIX. Available databases include serials, books
and other INSDOC databases. It has a multi-type membership base of fifteen
libraries. Its services include e-mail, MALIBNET card, CC, DDS and training.
7. BONET: Bombay Library Network
BONET was initiated in 1994 with the support of NISSAT and is located in
NCST, Mumbai. Facilities include a large number of computers and software. Its
services include access to databases, e-mail, CD-ROM, and so on. It promotes
professional development activities, such as seminars and training programs.
Several other city level networks are in their initial stages of development.
Self-Instructional
Material 235
Library and Information
Networks 12.3 ANSWERS TO CHECK YOUR PROGRESS
QUESTIONS
12.4 SUMMARY
Self-Instructional
Material 237
Library and Information
Networks 12.7 FURTHER READINGS
Williams, Brian and Stacey Sawyer. 2009. Using Information Technology, 6th
NOTES edition. New Jersey: McGraw-Hill.
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2012. Operating System
Concepts, 9th edition. New Delhi: Wiley.
Black, Uyless D. 1993. Computer Networks: Protocols, Standards, and
Interfaces, 2nd edition. New Jersey: PTR Prentice Hall.
Nagpal, D.P. 2006. Web Design Technology (Theory and Techniques on the
Cutting Edge), 1st edition. New Delhi: S.Chand & Company.
Self-Instructional
238 Material
Resource Sharing Networks
13.0 INTRODUCTION
In the library world, resource sharing means that you are collaborating with one or
more libraries to maximize access to a larger array of resources by sharing the
collections of the cooperating libraries or pooling funding to purchase shared digital
resources. A distributed resource sharing system consists of hardware and software
components located in a network of computers that communicate and coordinate
their actions only by passing messages. In this unit you will learn about resource
sharing networks.
13.1 OBJECTIVES
In this section, we will discuss the technology of resource sharing in detail and its
importance in present day scenario.
13.2.1 Definitions and Objectives
One definition says, ‘Resource sharing is a sort of implied agreement amongst
participating libraries wherein each participant is willing to share its resources with
other members and, in turn, is privileged to share the resources of its partners.’ Self-Instructional
Material 239
Resource Sharing Networks Another definition says, ‘Resource sharing comprises transactions by which
a library makes its materials or copies of its materials available to the clientele of
another library upon request.’
Resource sharing can also be defined as ‘activities engaged in by the libraries
NOTES
for the purpose of improving access to and delivery of the holdings of other libraries
or information providers. Resource sharing may be established by informal or
formal agreements or by contract and may operate locally, regionally, nationally or
internationally’.
Library scientist Allen Kent’s definition is: ‘Resource sharing is a mode of
operation whereby functions are shared in common by a number of libraries.’
Document Delivery Service is defined as ‘the provision of documents
published, or unpublished in hard copy or microform, at an established cost upon
request, not including the on-campus delivery of documents to patron’s offices’.
Document supplier is ‘a person or organization, which provides copies of
articles, books or other information whether free or at a cost or for profit’.
Interlibrary loan is ‘the process by which a library requests materials from,
or supplies materials to, another library’.
Another definition of interlibrary loan is ‘a transaction in which, upon request,
one library lends an item from its collections, or furnishes a copy of the item, to
another library not under the same administration or on the same campus’.
Objectives
The main objectives of resource sharing are as follows:
1. Sharing of resources in an efficient, timely and cost effective way
2. Enhancing the reader’s ability to meet their information requirements through
effective utilization of resources
3. Promoting cooperative programs and services of libraries with adequate
resources
4. Providing communication among libraries
5. Increasing the access base for users
6. Avoiding the duplication of resources
7. Making overall improvements in library services
Networking of libraries and interactive computer systems and
telecommunication facilities can be implemented for the explicit purpose of resource
sharing to achieve these objectives.
Concept of Resource Sharing
It is not possible for any single library to attain self-sufficiency with the volume of
information and the specific requirements of the users. Sharing of resources among
libraries was the only answer giving rise to the concept of resource sharing, originally
Self-Instructional
240 Material
called ‘library cooperation’, which allows one to achieve the objectives better by Resource Sharing Networks
working together.
Resource sharing involves sharing of resources of participating libraries for
the purpose of sharing the resources of each other’s materials via an agreement of
NOTES
cooperation. Besides document resources, it also includes facilities, services,
equipment and even the manpower among the participating libraries.
The factors for successful resource sharing are as follows:
Agreement between participating library administrators
Availability of union catalogs
Formation of an alliance among the libraries
Formation of computer communication networks among the libraries
13.2.2 Need for Resource Sharing
The modern-day challenges that face libraries today have pushed them towards
sharing of resources through cooperation, especially for individual libraries in
developing countries. Some of the issues that hamper them from acquiring and
retaining everything their users might like to read are as follows:
Shrinking library budgets
Steady increase in document prices
Depreciating currencies
Today, resource sharing is one of the mainstays of modern librarianship.
Electronic tools has made access to online OPACs (Online Public Access Catalog),
publishers’ catalogs, contents pages and bibliographic databases easy, providing
better information to library users about literature produced in their areas of interest.
The availability of a variety of electronic tools for document identification,
such as access to online OPACs, publishers’ catalogs, contents pages and
bibliographic databases, has enhanced the awareness of library users about literature
produced in their areas of interest.
Some of the factors that bring libraries together to share resources are as
follows:
Uninterrupted rise of nearly 15–20 per cent every year in the cost of
reading materials of all types, particular in scholarly journals
Instability in the exchange rate of the Indian rupee against major foreign
currencies
Growth of scholarly publications in every field
Decline of library budgets every year
Growing demand of users
Availability of computer and communication facilities offering
technological solutions Self-Instructional
Material 241
Resource Sharing Networks Availability of various information sources in electronic form, particularly
networked versions
Formation of library networks, alliances, and so on
NOTES Access Vs. Ownership
Libraries need to maintain a fine balance between access and ownership. Owning
an item means faster access to users compared to waiting to borrow or purchase
on demand. Then again, the increased cost of maintaining a collection of primary
sources and the increased demand for information have encouraged the move
from ownership to access. Eventually, increased emphasis on cooperation and
resource sharing, aiming to replace acquisition by access through local, regional,
national and international networks, have been established.
In India, the focus has been on ownership rather than access. It is now time
to transition from an ownership-based, ‘just in case’, library model to an access-
based, ‘just in time’ model. Networked information resources, such as remote
library catalogs, bibliographic databases, bulletin boards, newsgroups, electronic
conferences and discussion groups, are being accessed using the Internet with the
library acting as a link or node in the whole information network. The user gets the
advantage of the enormous information resources of the network through this link,
which also provides other or distinctive elements that may not be available to an
individual otherwise.
Almost all libraries are grappling with the challenges by modifying library
policies to meet their users’ need for information within the constraints of shrinking
budgets.
Cost Effectiveness
Resource sharing is a cost-effective approach leading to better utilization of library
resources. Alternatives for networking and resource sharing among geographically
dispersed and remotely located library and information centers are available with
the advancement in information technology. Sources are purchased to meet the
requirements of a library’s own clientele, leading to considerable duplication in the
procurement of library materials. Common subscriptions can be avoided and the
budgets are used to provide access to more unique resources by resource sharing.
Rational and mutually beneficial guidelines should be developed for the procurement
of various kinds and types of learning resources, so that valuable financial resources
are saved by minimizing duplication and at the same time ensuring comprehensive
coverage.
Through alliances or consortia, libraries can cut costs in subscribing to
international periodicals. Electronic publishing is gaining popularity as the costs
are much lower than that of the print version. Various models of consortia purchase
by publishers have evolved because of electronic publishing of scholarly journals.
Considering the purchasing power of consortia, publishers offer access to their
Self-Instructional whole range of journals collection including all the journals published by them, in
242 Material
some cases, besides the currently subscribed journals. Consortia subscriptions Resource Sharing Networks
can provide benefits in the form of discounts of 75 per cent to 90 per cent.
13.2.3 Areas of Resource Sharing
Resource sharing can be considered for a number of areas. Some of the widely NOTES
practiced and prominent ones are as follows:
Union Catalog
Library scientist Knud Larsen has defined union catalog as ‘a catalog listing in one
sequence, the holding or part of the holdings of two or more libraries’. Professor
William Katz (School of Information Science and Policy, State University of New
York at Albany) has defined union catalog as ‘an inventory common to several
libraries and listing some or all of their publications maintained in one or more
orders of arrangement’. A union catalog is associated with the national catalog but
different from library catalog, and focuses on promoting interlibrary cooperation
on local, regional and international levels. When two or more libraries agree to
cooperate in resource sharing, the first activity is to prepare a union catalog of
their holdings. The principal objective of a union catalog is to inform the users
about what material a library has. It is a compilation of catalogs of periodicals,
case collections, reference materials, microforms, audio-visual materials,
dissertations, thesis and other such materials held by the participating libraries,
making resource sharing effective and easy.
Union catalogs are to be prepared based on the type of materials and these
have certain priorities. Participating libraries have access to the collection available
from other libraries and to resource sharing through these union catalogs depending
on the requirement. Creating a union catalog requires substantial support from the
participating libraries and is a tedious job.
A few examples of union catalogs are as follows:
The US-Library of Congress – the national union catalog
The British union catalog of periodicals
The National Union Catalog of Scientific Serials in India (NUCSSI-
INSDOC)
The Union Catalog of Social Science Serials in India (NASSDOC)
The Union Catalog of Books, Serials, Theses, Experts and Projects by
INFLIBNET
Collection Development
Budget constraints, explosion in the number and variety of publications, increase
in the cost of books and serials, and the variety and range of resources demanded
by scholars has put the onus on libraries to ensure that relevant and representative
collections in various fields are available. The immediate needs of their users must
be satisfied by defining a higher level of collection development essential for Self-Instructional
Material 243
Resource Sharing Networks developing the core collection. This scenario has necessitated collaboration amongst
libraries in developing their collections.
Collection intensification is the first step towards coordinated collection
development. It helps broaden and deepen the range of research materials
NOTES
collectively made available to users, thus, improving the quality of library service.
Achieving the aim of coordinated collection development appears doubtful
to many librarians as they have been attempting to reduce overlap for quite some
time. Cancellation of serials and, in many cases, implementing a policy to cancel a
few titles every year are some measures that have been adopted. Despite all this,
librarians are convinced of the benefits of making library profiles as they will be
valuable during negotiations with faculty and publishers, in contact with partners
of a consortium, to inform others, and so on. Additionally, collection profiles can
be used as a management tool to develop collections more efficiently and effectively.
Collection development has one primary objective, that is, to help libraries
identify and select publications that are meaningful for acquisition by using data
available at various levels, such as circulation, interlibrary loan statistics, SDI
(Selective Dissemination of Information) user profiles, and so on. It is expected
that a cooperative acquisition system will progressively evolve after considering
the strengths and weaknesses in document collections in libraries including
duplication.
Consortia
Consortia will help libraries achieve as a group what they cannot achieve individually.
Indian libraries have an average number of subscriptions to international journals
of less than 500 titles as compared to American libraries that have more than 10
times the number. It is essential to improve the access-base of literature if we want
to enhance the quality and standard of research at the national level and raise it to
the level of global recognition.
Consortium is a ‘group of libraries that come together with common interest
to form a consortium’, where a coordinator, one of the libraries or agencies, works
on behalf of all libraries to negotiate with publishers, take care of legal issues, and
so on.
The main objectives of consortia are as follows:
Increase the cost benefit per subscription
Promote the rational use of funds
Ensure continuous subscription to the periodicals subscribed
Guarantee local storage of the information acquired for continuous use
by present and future users
Develop technical capabilities of the staff in operating and using electronic
publication databases
Self-Instructional
244 Material
Create strategic alliance with institutions that have a common interest, Resource Sharing Networks
Self-Instructional
Material 245
Resource Sharing Networks Cooperative Storage Control
Cooperative storage control refers to the storage of seldom used materials at a
common place from where it can be easily recalled whenever required. Economical
NOTES storage methods should be adopted with the use of compact storage methods of
various kinds, such as rolling stocks, and so on.
Cooperation in Interlibrary Loans
Using the traditional methods of Interlibrary Loans (ILLs) was practiced from
way back in the past. Internet and networking has made this process easier, more
reliable and time saving. ILL transactions are mostly informal, based on an
understanding between individuals rather than institutions, making it essential for
an ILL policy and an ILL code to achieve optimum results. Some ILL factors are
as follows:
Flexibility and choice to meet varied user needs
Clearly defined and unambiguous service standards
A specified turnaround time for a core level of service
Greater predictability and consistency
Increased incentives for libraries to improve their ILL supplying operations
The current manual ILL system has several drawbacks, for instance, it is
laborious, time-consuming, error-prone and inefficient with a lot of time spent on
searching, documentation and updating of data including duplication of effort. This
issue combined with the rapid growth of the automation industry has raised the
demand for a new computerized ILL system to manage the complete ILL process.
The changing role of the library due to the widespread use of electronic
technology has its own set of problems, such as:
What is available
Who should request and who should supply
Who should pay
Individual researchers will be faced with an information overload and will
prefer to rely on the expertise of the skilled librarian. Use of modern technology
will be there even as traditional interlibrary activity continues.
Electronic ILL management systems are something new that is gaining
significance. Web-based ILL systems are replacing paper-based manual intensive
systems in many libraries. Document delivery is now considered the same as ILLs,
particularly of journal articles. As a result, all user-initiated document delivery is
categorized under the term user-initiated interlibrary loans.
Some disadvantages are as follows:
To carry out the ILL process, each participating library has to use the
same system or software.
Self-Instructional
246 Material
Developing a generic system that would be acceptable to all is difficult Resource Sharing Networks
ways
Preparation and implementation of a plan of action for the establishment
of a national information network that would interlink existing sectoral
NOTES
and subnational networks and information infrastructures, coordination
of the systems, networks and services, providing for feedback from the
nodes and users, identification and correction of deficiencies filling up of
gaps and inadequacies in information resources, trained human resources,
physical facilities, and productive interaction with regional and global
networks and information programmers
Securing and ensuring support for the components of the networks
through public and private financing and collaborative arrangements
Ensuring sustained growth of the information network by formulating
and prescribing guidelines for assigning areas of responsibilities, choice
of means and methods and standards, setting up priorities, financial
arrangements, coordination mechanism and provision for feedback
Ensuring that the network development accords with national information
policy and development, and coherent with economic, social, political,
government and administrative structure as they evolve with time
Coordination and compatibility among networks at different levels and
also with overall national policies relating to information systems and
services
Improve compatibility between various legislative measures and
ordinances relating to national systems and services
Better responsiveness of the concerned entities to the implications of
new developments in information and communication technologies
More effective participation in transitional and global information systems
and networks
Efficient management and governance of information networks
The key elements of the National Policy on Information Networks include
the following:
Identification of information resources in the country
Cataloging, common communication and database formats and norms
for profiling the resources
Software and computer programs for creating database and retrospective
conversion of records
Information communication technologies suitable for networking in the
country’s infrastructure environment
Information processing and networking manpower-availability, training
required and training facilities available Self-Instructional
Material 253
Resource Sharing Networks Existing networks that may be interlinked
Sharing of information resources, and services to be provided by the
network
NOTES Research and development to support network development
Promotion and marketing of the network and its services
Participation of the national network in regional and international
information networks and systems
National network coordination and governance agency
The library plays a vital role for any organization, be it school, college, university
or any business organization. With the advancement in computer and
telecommunication technologies in the past few years the availability of information
has grown tremendously. These technologies have a great impact on traditional
academic libraries with traditional information preservation, organization, provision,
access and retrieval. The activities performed in libraries are no longer confined to
the traditional ones. There is a profound impact of ICT on libraries and most of
the libraries today are networked electronically and Internet (computer and
telecommunication technologies) is playing an important role in providing information
services and has added a great value to the library and information services. Thus,
networking among libraries and information center has become inevitable. The
prime objective of Internet based library and information services is pooling of
information resources and their related infrastructure to make them sharable.
The transformation in library system has changed the view of the library
resources and library services where web based library services are attending the
users round the clock by providing links to various library sites, which are specialized
in the topic of interest and can be accessed directly in every corner of the world.
The use of ICT in library operations saves considerable amount of time, resources
and labour. It brings quality of service and speed up the processing of information
services. With the help of Internet, a student at any university or college in India
can browse the electronic documents any where across the globe through
computers, and hence, gets an instant access to billions of resources in the form of
books, reports, videos, journals, films and variety of other resources.
The academic libraries in India have set up themselves to provide an ICT
Self-Instructional based information services platform. The Internet has proved to be a boon for
254 Material
both the libraries as well as the users. It has provided an easy to use and inexpensive Resource Sharing Networks
teaching tool to the information seekers. The Internet has bridged the information
gap between the libraries and information professionals by defining new and different
service operations. Some of these are as follows:
NOTES
By creating a well organized, well published and easily accessible library
web sites that has extended the use of information technology in traditional
librarianship.
By initiating a bulletin board of library citing complete information about
the services provided and products available with them and the various
events organized by them.
By using e-mail services to deliver the information to the users and to
communicate with the fellow information professionals.
By providing access to the various database and OPAC of other libraries
located at remote areas.
Scope of Internet based Library and Information Services
With the involvement of Internet in library activities, resource sharing and cooperative
functioning has also become vital which has eliminated the barrier of distance and
size among the users. It has also made the acquisition related services such as
ordering and purchase of information resources/ documents (books, journals and
electronic publication) more speedy and simple. These activities can be carried
out through e-mail. Also, most of the booksellers and publishers place their
catalogues and leaflets of new publications on their websites which can be easily
accessed through Internet. All the publishers of primary journals are providing
their journals online. The Internet facilitates the library and information professionals
to browse the various sites for all the current publications available with the price
and allow them to place the order online. The communication regarding any query
or discrepancy can be done through e-mail which saves time, reduces paper work
and efforts.
Internet has also made it possible to prepare standard catalogues without
much effort. Centralized and online public access cataloguing services are provided
by Internet. Union cataloguing has also made it possible to avoid the duplications
in holding to a greater extend. The library professionals are allowed to access the
Internet resources for verification and downloading the bibliographic information
from other organization. OPAC has also become a popular source of bibliographic
information which can be accessed via Internet. It is useful to get information
about the organization of knowledge by other institutions.
The circulation of in house documents is also become easy through Internet.
The new books document can be placed in OPAC on the same day of acquisition
itself after certain technical processing and the readers can browse and reserve
the material from their homes or offices that too within seconds after the arrival of
the material. Also, subscribed journals by the libraries are accessible from anywhere
Self-Instructional
Material 255
Resource Sharing Networks across the world, the users can get access to the electronic form of journal from
their offices or departments without visiting the libraries.
Since the information is increasing day by day on Internet, the information is
used by librarians for reference services by the librarians to answer the questions
NOTES
they are asked. These are known as ready reference collection. The availability of
various primary and secondary sources of information online made it possible to
provide short-range and long-range reference services through Internet. The Internet
has proved as an alternative to the traditional face-to-face reference service where
there is a provision of chat based e-mail service for virtual reference and web
tools such as FAQ are provided on the libraries websites. Real-time reference
service is also provided using Instant Messaging (IM) which is a type of virtual
communication between two people. Some IMs such as Trillion, Library H3IP,
Meebo are providing access to all e-mail IDs while logged into any such platform
eliminating the need to login to different e-mail address.
The Internet has made possible the availability of major libraries online which
are accessible directly from any part of the world. It has provided access to the
catalogues of various libraries that are attached to universities and colleges and
allow them to place a request for their users. To avoid financial crunches, libraries
have agreed for resource sharing which is not at all possible without the Internet.
Publishers are also providing their journals electronically that has facilitated libraries
to subscribe a large collection of journals from different publishers that also support
cross journal searching and extensive browsing. Online collection of publications
enables the users to search and browse the articles directly from journals subscribed
by their libraries. Resource sharing using Internet has remarkably reduced the
cost of collections by the libraries.
Resource sharing is also done through Inter-Library Loan (IIL) and traditional
IIL operations are time consuming and labour intensive. The Internet has facilitated
libraries to share their resources through IIL effectively and efficiently. IIL through
Internet offers the following benefits:
Single solution to manage the activities of IIL.
The paper work and record-keeping in browsing and lending a material
can be effectively managed with reduced paper work.
Easy to track the status of the request at all stages in IIL process.
To integrate bibliographic information with online union catalogue using
Internet.
Request and messages through electronic transmission using Internet.
In a way, Internet has become a great help in almost all the activities of
library operations. Access to all types of material has become easy and speedy
with the help of electronic documents.
Self-Instructional
256 Material
Services Available on Internet Resource Sharing Networks
There is a huge impact of Internet on the library services and has now become an
integral part of LIS. Internet is able to reach the library services to the user’s desktop.
Some of the services that are available through Internet are as follows: NOTES
Online Information Retrieval: One of the important roles of library
is to provide access to the information to the society. To improve the
learning activity and teaching, it is important to have access to the
comprehensive and current information. Through Internet, libraries are
able to access online information resources at some nominal fees. This
has become the most utilized service of the libraries.
Free Browsing: The availability of large number of information on the
Web, some libraries may provide the facility to access the same by
providing free browsing to the users through Internet.
Broad Band Internet Center: Libraries are providing interconnection
through networking with other libraries and information center to provide
access to e-resources. Internet is also used for e-mailing, accessing e-
journals, database, web OPAC with this facility.
Library Homepage for Information Dissemination: Libraries are
able to provide regular display of information of the latest editions and
other information related to academic, research through their websites.
This service facilitates the researchers and other users to make effective
use of their academic and research interests.
Dynamic Library Websites: Libraries are developing their websites
with a link to OPAC to familiarize users about the library activities and
to allow users to access the library catalogue remotely through Internet.
Users are allowed to perform some library functions such as renewal of
books, access of the content page of materials and ask for a copy to be
delivered at their home/work place. Websites also provide the link to
other resources that are created by the library.
Bulletin Board Service: Through this service people are provided an
area for discussion called bulletin board by posting messages without
sending them to anyone’s e-mail. The post is seen by everyone who
enters into the area. In campuses, these bulletins are called forum. The
latest information about daily news, job opportunities, fellowship and
so forth can be posted on these boards. These bulletins are available via
Internet to specific category of user discipline.
OPAC: The online public Access Catalogue (OPAC) provides facilities
to browse and locate information and is known as the gateways to the
information in the libraries. The purpose of OPAC was to provide access
to the housekeeping activities of the libraries and to provide direct access
to the machine readable bibliographic records.
Self-Instructional
Material 257
Resource Sharing Networks E-Books
The introduction and growth of e-books has changed the relationships between
the libraries, publishers and distributors and also the relationship between the
NOTES libraries and their users. There are several libraries who are adopting e-book
collections on a very large scale. Armstrong and Lonsdale have defined the term
e-book as ‘any content that is recognizably book like, regardless of size, origin or
composition, but excluding serial publications, made available electronically for
reference or reading on any device that includes a screen’. Algenio and Thompson-
Young have considered that these e-books can be accessed by multiple persons
at a time. Moreover, a patron need not go to library in person to borrow a book
and the e-books can be downloaded from the website and can be read later
offline. Although, there can be a restriction of time limit for the usage of the e-
books and may get terminated after a certain span of time. These e-books can be
accessed apart from computers, from other handy devices such as laptops, smart
phones, i-pads, notebooks and so on.
Also, it seems to believe that the cost of e-books is far less as compared to
the cost of producing the copies of printed books. This is due to the reduced cost
of printing and distribution by the publishers. Although, the basic tasks involved in
producing e-books are same as that of print books such as acquisition, production,
sales and marketing, delivery and finance of books. However, some publishers
have stated in their blogs that expense, incurred to manufacturing and distribution
is 12 per cent and does not reduce the total publishing cost greatly. In fact, the
publishers have highlighted the three new costs associated with e-books. These
are digitization that is, producing the books in different formats, quality assurance
that is, digital distribution to different retailers or distributers with digital asset
management system and different upload protocols. But the production cost of an
additional copy of an e-book is lower as compared to the production cost of a
printed copy.
Types of E-Books
There are different types of e-books that can be recognized. These are as follows:
Issue or re-issue of a print book in e-format. These types are called e-
hybrid book.
A book created by e-revision or e-feedback and the formally-issued
version of which is in the print format.
E-books enhance text with audio, video or images.
A book with text, images, audio and video, and are regularly updated as
warranted. These are known as e-reference books. A series that
combines the latest information is also considered in this type.
An e-book is published in pdf format and is similar to the printed version.
The chapters can be downloaded in this type.
Self-Instructional
258 Material
A web page having an e-book that are readable online in HTML format Resource Sharing Networks
only.
E-books in the form of an app where the text and other content are
published in the form of an app with features such as sound, movement
NOTES
and other special features.
An e-book that is available under communication common license.
Technology Involved
The development of e-books required technical aspects such as hardware, software
and a screen for displaying content.
Hardware Aspect: There is a need of some portable e-book devices for
reading purpose. The hardware may include desktops, laptops, and
multipurpose devices or even dedicated reading devices. These devices
are provided with a screen such as a monitor, LCD or a touch screen.
Software Aspect: Some software are required for e-book reading that
support special functions such as search, colors/grayscale display, user
defined text size, hyperlinks within the books, and so on. Some of the
common examples of such e-book software reader are Adobe Acrobat,
Microsoft Reader, Palm Reader, Franklin Reader, and so forth. Most of
the software are available for free downloads and support several operating
system.
E-book Creator Software: Special software are needed for the creation
of e-books and there are certain software tools available for the purpose
such as Adobe Page Maker, Adobe Acrobat Capture, Adobe Frame Maker,
Adobe Design, and so on.
E-Book Standardization
It is necessary to standardize the formats of e-books as there are far many variables
such as operating system, executable software, memory space, and so on. that
are associated with e-books. Attempts have been made to standardize the e-
books. The Open eBook Forum (OEBF), which is an association of software
and hardware companies, publishers, authors, users and other related organizations
of e-books, has established some common specifications for e-book system,
products and applications that are beneficial for the content creators, makers of
reading systems and of course, the consumers that help them in adopting e-books
and to increase the awareness and acceptance of the emerging e-publishing industry.
They have attempted in providing common e-book format. The common formats
of e-books are Adobe PDF, DAISY Digital Talking Books and Microsoft Reader
and are equipped with Digital Rights Management (DRM) technology (an access
technology to protect copyright material and also limits the usage of digital media
and devices).
Self-Instructional
Material 259
Resource Sharing Networks E-Book Licensing
The e-books are leased rather than purchased. There are three types of e-book
leases as offered by the publishers and vendors:
NOTES Annual Access: An annual fee for one year’s access is paid by the libraries
and the lease gets renewed every year.
Permanent Access: A one-time fee is paid by the libraries.
Pay per use: Based on the number of uses (pages viewed, titles viewed
and so on), the library is billed or a prepaid account is debited. This may be
an annual fee platform also.
The e-book licensing can be modeled into three broad categories as: Print,
database and open access licensing arrangements. The first model allows the access
to an e-book with one user at a time. The restriction has been implemented on
printing, copying, saving and sharing of e-books on the reading devices by DRM.
This restriction of viewing and printing limits has affected the access of e-books.
The second model, database model, has been developed to overcome the DRM
restriction by enabling simultaneous access to e-book contents. The third model,
Open Access (OA) has been developed to allow the access of the content of e-
book freely with few restrictions.
Distribution of E-Books
The e-books are sold either directly to the consumer or through different suppliers
that includes retailers such as Amazon, Barnes and Noble and Apple and through
different suppliers such as Ingram. Earlier till 2010, the wholesale model was
used by the publishers to sell e-books where a retail price was fixed by publisher
and used to sell the book to the intermediary at a heavy discount, which was
usually 50 per cent. The retail prices of e-books were usually fixed to the lowest
price incurred for the print book. After the availability of paperback edition the
publishers would lower the price of e-book. The trend is still follow by some small
publishers.
In 2010, an agency model was introduced for the sale of e-books where
the publishers made deals with Apple, who was introducing its new Apple Tablet.
The agency which would usually be a retailer would get a commission from the
publishers in doing so. This method gained a greater degree of control over e-
book pricing as compared to the pricing over print book and the publishers were
gaining permanent edge over the e-book margins.
Advantages of E-Books
There are many advantages of using e-books. They are discussed as follows:
One of the most important advantages of e-books is that there is a provision
to store thousands of books into your electronic device without any worries
of managing them on the multiple bookshelves taking a huge space in your
Self-Instructional house. Portability is also associated with e-books.
260 Material
The accessibility and availability of the e-books are more convenient and Resource Sharing Networks
by more than one user simultaneously with timely access. Similar to other electronic
documents, e-journals save physical storage.
Characteristics of E-Journals NOTES
The few characteristics of e-journals are as follows:
Serial publication that is available in digital format.
Located on Web and accesses over World Wide Web (WWW).
Can either be available for free or by subscription.
Available formats for e-journals are: ASCII text, HTML pages or PDF
(Portable Document Format).
Accessibility from any place.
Available in downloadable format.
Types of E-Journals
Also called classic e-journals, these were originally distributed through e-
mail and are now available on Internet. These journals can be accessed free
of cost.
The journals are available in print as well as electronic form. There is
sometimes a difference in the content of the two versions in a way that
either electronic version contains some supplement issue or the electronic
version is released before printed. The electronic version may be a collection
of full text or it may consist of only table of content or some selected article
from the printed version.
Some e-journals are called database and software models where the articles
are stored in publisher maintained centralized database and the access
permission is given to the subscriber to locate the database and download
the article. There is a expiration date associated with the software.
Some commercial publishers have full text of the journals available on CD-
ROMs. Libraries are often needed to get subscribed for both the CD-
ROM and print form to such journals.
There are full text e-journals where the complete articles are available online
instead of summaries and abstract.
Some e-journals are available only online with no counterparts such as
CD-ROMs or printed version.
Access to E-Journals
The e-journals can be accessed mainly through Internet, although there is mechanism
to access e-journals through CD-ROMs as well. The following are the different
ways to access e-journals provided by the publishers:
Self-Instructional
Material 263
Resource Sharing Networks Free Access to the e-journal with the subscription of print journal.
Libraries can completely access all the e-journals by exclusive subscription
for electronic form without having to subscribe to the counterpart print
version.
NOTES
Selective Access to the few chosen e-journals by subscribing to them from
the publishers as per agreed terms and conditions.
Consortium Access by forming a consortium of institutions with common
requirements and interests. This provides the access to the expensive and
international e-journals which otherwise is not possible by many libraries to
afford in India.
There are also three types of access modes available for e-journals. They are as
follows:
Remote Access: This type of model allows publishers/vendors to host the
journals through their websites and provide the right of access to the patrons
including individuals or institutions who are subscribed with the publishers
for the e-journals. The rights to access can be provided through user-id-
password, IP enabled intranet or both.
On-Site Access: The e-journals are delivered by the publishers through
CD-ROMs or by their website, or through FTP option to the subscribed
libraries. The e-journal in turn is hosted by the library within the campus.
This way, library can host the journal through LAN with wider and better
bandwidth within the campus as compared to the access through Internet.
Access through Database: The publishers are creating the content in the
electronic format and maintain a bibliographic database over the years.
The users can access the articles of their interests through these databases.
Creation of E-Journals
The basic steps involved in creating e-journals are as follows:
Planning: The first step is planning. In this case, the hierarchical structure,
navigation and logical composition of e-journal is planned.
Content Creation: Content of any literature is an essential part and has to
be created carefully.
Realization: It involves the designing of the structure of HTML, deciding
links between pages, sending to the server and testing.
Advantages of E-Journals
E-journals are published in an electronic format and have various advantages over
printed journals. They facilitate a new relationship between information and
knowledge and offer new form of scholarly practice. They offer many advantages
to users as well as publishers. The following are some advantages of e-journals:
Self-Instructional
264 Material
The e-journals offer the most attractive features of navigation and searching Resource Sharing Networks
Self-Instructional
Material 265
Resource Sharing Networks Adversities of E-Journals
There are certain issues and apprehensions which are associated with e-journals
in spite of so many advantages of e-journals. They are as follows:
NOTES The peer review of the articles in e-journals for the authenticity and quality
of the information being reviewed.
The comprehensiveness of e-journal.
The easy downloading of e-journals.
The limit to the number of views and the flow of information with heavy
traffic.
Online help for users.
Examples of E-Journals on Web
There are thousands of e-journals available on web. They are presented in many
languages and are of different themes and interests.
1. The modern-day challenges that face libraries today have pushed them
towards sharing of resources through cooperation, especially for individual
libraries in developing countries.
2. Resource sharing is one of the mainstays of modern librarianship.
3. Centralized and online public access cataloguing services are provided by
Internet.
4. The academic libraries in India have set up themselves to provide an ICT
based information services platform.
13.5 SUMMARY
NOTES
13.7 SELF ASSESSMENT QUESTIONS AND
EXERCISES
Short Answer Questions
1. What is a broad band internet center?
2. Write a short note on e-book standardization.
3. What are the advantages of e-books?
4. List the types of e-journals.
5. How are e-journals created?
Long Answer Questions
1. Write a detailed note on resource sharing technology.
2. What is the need for resource sharing? Discuss.
3. Write a note on access versus ownership.
4. What are the areas of resource sharing?
5. Write about cooperative storage control and its use.
Williams, Brian and Stacey Sawyer. 2009. Using Information Technology, 6th
edition. New Jersey: McGraw-Hill.
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2012. Operating System
Concepts, 9th edition. New Delhi: Wiley.
Black, Uyless D. 1993. Computer Networks: Protocols, Standards, and
Interfaces, 2nd edition. New Jersey: PTR Prentice Hall.
Nagpal, D.P. 2006. Web Design Technology (Theory and Techniques on the
Cutting Edge), 1st edition. New Delhi: S.Chand & Company.
Self-Instructional
268 Material
Resource Sharing Networks
14.0 INTRODUCTION
14.1 OBJECTIVES
Dublin Core (DC) is an improved digital cataloging system for making search
engines much more accurate and efficient. The schema for Dublin Core has many Self-Instructional
Material 269
Resource Sharing Networks terms for describing resources such as web pages and media like video and images.
It also has data regarding physical objects such as CDs, books and even works of
art. The main objective of this system is to create a powerful and accommodating
catalog involving all web objects. It can be used for better search engine
NOTES optimization. The metadata generated from this can be used for quick description
of web resources and for combining metadata from different standards.
Dublin Core is an initiative to create a digital ‘library card catalog’ for the
Web. Dublin Core is made up of 15 metadata (data that describes data) elements
that offer expanded cataloging information and improved document indexing
for search engine programs.
Two forms of Dublin Core exist:
Simple Dublin Core
Qualified Dublin Core
Simple Dublin Core expresses elements as attribute-value pairs using just the 15
metadata elements from the Dublin Core Metadata Element Set.
Qualified Dublin Core increases the specificity of metadata by adding information
about encoding schemes, enumerated lists of values, or other processing clues.
While enabling searches to be more specific, qualifiers are also more complex and
can pose challenges to interoperability.
Each method of recording or transferring Dublin Core metadata has its
plusses and minuses. HTML, XML, RDF, and relational databases are among
the more common methods.
The Dublin Core Metadata Initiative began in 1995, taking its name from
the location of the original workshop, Dublin, Ohio. It has since become international
in scope and has representatives from more than 20 countries now contributing.
Dublin Core has always held that resource discovery should be independent from
the medium of the resource. So, while Dublin Core targets electronic resources, it
aims to be flexible enough to help in searches for more traditional formats of data
too. Web sites, though, are the most common users of Dublin Core.
Dublin Core contains 15 classical metadata elements for better cataloguing.
These classic elements are called the Dublin Core Metadata Element Set. These
classical metadata elements include:
Creator – The creator of the object
Subject – The topic of the object
Title – The name of the object
Publisher – Details about the person who published the object
Description – Short description of the object
Date – The date of publishing
Contributor – Those who have edited the object
Identifier – The identifying agent for the object
Self-Instructional
270 Material
Type – Type of the object Resource Sharing Networks
1. Dublin Core (DC) is an improved digital cataloging system for making search
engines much more accurate and efficient. The schema for Dublin Core has
many terms for describing resources such as web pages and media like
video and images. It also has data regarding physical objects such as CDs,
books and even works of art.
2. The main objective of this system is to create a powerful and accommodating
catalog involving all web objects. It can be used for better search engine
Self-Instructional
optimization. Material 273
Resource Sharing Networks 3. Two forms of Dublin Core exist: Simple Dublin Core and Qualified Dublin
Core. Simple Dublin Core expresses elements as attribute-value pairs using
just the 15 metadata elements from the Dublin Core Metadata Element Set.
4. Qualified Dublin Core increases the specificity of metadata by adding
NOTES
information about encoding schemes, enumerated lists of values, or other
processing clues. While enabling searches to be more specific, qualifiers
are also more complex and can pose challenges to interoperability.
5. Machine Readable Cataloging (MARC) means that data of a cataloging
record can be read and interpreted by a computer.
14.4 SUMMARY
Dublin Core (DC) is an improved digital cataloging system for making search
engines much more accurate and efficient. The schema for Dublin Core has
many terms for describing resources such as web pages and media like
video and images. It also has data regarding physical objects such as CDs,
books and even works of art.
The main objective of this system is to create a powerful and accommodating
catalog involving all web objects. It can be used for better search engine
optimization.
The metadata generated from this can be used for quick description of web
resources and for combining metadata from different standards.
Dublin Core is an initiative to create a digital ‘library card catalog’ for the
Web. Dublin Core is made up of 15 metadata (data that describes data)
elements that offer expanded cataloging information and improved document
indexing for search engine programs.
Two forms of Dublin Core exist: Simple Dublin Core and Qualified Dublin
Core. Simple Dublin Core expresses elements as attribute-value pairs using
just the 15 metadata elements from the Dublin Core Metadata Element
Set.
Qualified Dublin Core increases the specificity of metadata by adding
information about encoding schemes, enumerated lists of values, or other
processing clues. While enabling searches to be more specific, qualifiers
are also more complex and can pose challenges to interoperability.
Each method of recording or transferring Dublin Core metadata has its
plusses and minuses. HTML, XML, RDF, and relational databases are
among the more common methods.
The Dublin Core Metadata Initiative began in 1995, taking its name from
the location of the original workshop, Dublin, Ohio. It has since become
international in scope and has representatives from more than 20 countries
now contributing. Dublin Core has always held that resource discovery
Self-Instructional should be independent from the medium of the resource. So, while
274 Material
Dublin Core targets electronic resources, it aims to be flexible enough to Resource Sharing Networks
help in searches for more traditional formats of data too. Web sites, though,
are the most common users of Dublin Core.
There are two types of Dublin Cores: Simple Dublin Core and Qualified
NOTES
Dublin Core. The Simple Dublin Core is for simple pairs of attribute-values
and uses the 15 classic elements, while Qualified Dublin Core uses three
more elements for better definition of the data.
Standards play a vital role in networking. Some of important standards and
their functions are discussed in the following section.
Machine Readable Cataloging (MARC) means that data of a cataloging
record can be read and interpreted by a computer.
Exchange of bibliographic information among computerized library systems
uses MARC to provide a standard format for the global exchange of
bibliographic information available in machine readable format in libraries
worldwide.
The Unicode Standard is a universal character encoding standard by which
text for computer processing is represented. There is full compatibility and
synchronization of Unicode standards with corresponding versions of
International Standard ISO/IEC 10646.
Additional information about the characters and their use is provided by the
Unicode Standard, and if any implementation is conformant to Unicode, it
is also conformant to ISO/IEC 10646. It provides a consistent way of
encoding multilingual plain text that makes it easy to exchange text files
internationally.
Character coding is simple and efficient with a unique numeric value and
name assigned to each character.
With the use of the Internet and World Wide Web, it is possible to access
online bibliographic resources in many different ways. This has allowed
libraries to shift their focus from collecting information to providing access
to information using electronic resources.
The main obstacle is the variation in the use of software and hardware as
library professionals have to learn specific features of each system, such as
command languages, search procedures, and so on. Growth of electronic
resources will compound the problem of how to access the information
from diverse databases.
Williams, Brian and Stacey Sawyer. 2009. Using Information Technology, 6th
edition. New Jersey: McGraw-Hill.
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2012. Operating System
Concepts, 9th edition. New Delhi: Wiley.
Black, Uyless D. 1993. Computer Networks: Protocols, Standards, and
Interfaces, 2nd edition. New Jersey: PTR Prentice Hall.
Nagpal, D.P. 2006. Web Design Technology (Theory and Techniques on the
Cutting Edge), 1st edition. New Delhi: S.Chand & Company.
Self-Instructional
276 Material
.emaN e1.sruIncrease
oC eht fothe
ezifont
s tnosize
f ehof
t esthe
aerCourse
cnI .1 Name.
.egaP revoC e2.ht nuse
i rethe
daefollowing
h a sa gniwasolaloheader
f eht esin
u the
.2 Cover Page.
elcyC drihT eht ni )46.3:APGC( CA[Accredited
AN yb edarGwith
’+A’’A+’
htiwGrade
detidby
ercNAAC
cA[ (CGPA:3.64) in the Third Cycle
109 21
]CGU-DRHM yb ytisrevinU I–yrogeand
taC Graded
sa dedarasG Category–I
dna University by MHRD-UGC]
300 036 – IDUKIARA
KARAIKUDI
K – 630 003
NOITACUDE ECNATSIDDIRECTORATE
FO ETAROTCEOF
RIDDISTANCE EDUCATION
itnem sYou
a egaare
p reinstructed
voc eht etatodpupdate
u ot dethe
tcurcover
tsni erpage
a uoYas mentioned below:
.emaN e1.sruIncrease
oC eht fothe
ezifont
s tnosize
f ehof
t esthe
aerCourse
cnI .1 Name.
aP revoC e2.ht nuse
i rethe
daefollowing
h a sa gniwasolaloheader
f eht esin
u the
.2 Cover Page.
ISREVINUALAGAPPA
APPAGALAUNIVERSITY
Bachelor of Library & Information Science
INFORMATION COMMUNICATION
rihT eht ni )46.3:APGC( CA[Accredited
AN yb edarGwith
’+A’’A+’
htiwGrade
detidby
ercNAAC
cA[ (CGPA:3.64) in the Third Cycle
]CGU-DRHM yb ytisrevinU I–yrogeand
taC Graded
sa dedarasG Category–I
dna University by MHRD-UGC]
300 036 – IDUKIARA
KARAIKUDI
K – 630 003
TACUDE ECNATSIDDIRECTORATE
FO ETAROTCEOF
RIDDISTANCE EDUCATION TECHNOLOGIES IN LIBRARIES
II - Semester