Dlis408 Information Technology-Applications 2
Dlis408 Information Technology-Applications 2
in
INFORMATION TECHNOLOGY:
APPLICATIONS
Copyright © 2012 Dr. Mathesh
All rights reserved
DDE is a young and dynamic wing of the University, filled with energy, enthusiasm, compassion and concern. Its team
strives hard to meet the demands of the industry, to ensure quality in curriculum, teaching methodology, examination and
evaluation system, and to provide the best of student services to its students. DDE is proud of its values, by virtue of which,
it ensures to make an impact on the education system and its learners.
Through affordable education, online resources and a network of Study Centres, DDE intends to reach the unreached.
1
in terms of no. students in a single campus
SYLLABUS
Objectives:
S. No. Topics
Library automation: Planning and implementation, Automation of housekeeping operations – Acquisition,
1.
Cataloguing, Circulation, Serials control OPAC Library management.
2. Library software packages: RFID, LIBSYS, SOUL, WINISIS.
3. Databases: Types and generations, salient features of select bibliographic databases.
4. Communication technology: Fundamentals communication media and components.
5. Network media and types: LAN, MAN, WAN, Intranet.
6. Digital, Virtual and Hybrid libraries: Definition and scope. Recent development.
7. Library and Information Networks with special reference to India: DELNET, INFLIBNET, ERNET, NICNET.
Internet—based resources and services Browsers, search engines, portals, gateways, electronic journals, mailing
8.
list and scholarly discussion lists, bulletin board, computer conference and virtual seminars.
CONTENTS
Notes
Unit 1: Library Automation
CONTENTS
Objectives
Introduction
1.1 Library Automation
1.2 Automation of Housekeeping Operations
1.3 Planning of Library Automation
1.4 Implementation
1.5 Library Acquisitions
1.5.1 Purpose of Library Acquisition
1.5.2 Objectives of Library Acquisition
1.5.3 Functions of Library Acquisition
1.6 Library Catalogue
1.7 Catalogue Card
1.8 Types of Catalogue Card
1.8.1 Cataloguing Rules
1.8.2 Cataloguing Terms
1.9 Online Catalogues
1.10 Library Circulation
1.11 Serials Control
1.12 Online Public Access Catalogue
1.13 Summary
1.14 Keywords
1.15 Review Questions
1.16 Further Readings
Objectives
After studying this unit, you will be able to:
· Describe the meaning of library management system
· Define catalogue card and its types
· Discuss library circulation and its levels
· State planning of library automation
· Define library acquisitions in library automation
· Explain the concept of library catalogue.
Introduction
An integrated library system (ILS), also known as a library management system (LMS), is an
enterprise resource planning system for a library, used to track items owned, orders made, bills
paid, and patrons who have borrowed.
An ILS usually comprises a relational database, software to interact with that database, and two
graphical user interfaces (one for patrons, one for staff). Most ILSs separate software functions into
discrete programmes called modules, and each of them are integrated with a unified interface.
Examples of modules include:
· acquisitions (ordering, receiving, and invoicing materials)
· cataloguing (classifying and indexing materials)
Notes The library catalogue or index to the collection forms the base for most of the library
activities such as acquisition, reference, bibliographic service, inter-library loan etc.
The users of library card catalogue will appreciate how fast the retrieval is, search and printing in Notes
automated environment. If the same system is available in network environment, users can have
simultaneous access to the same database. From the library staff point of view the cumbersome job
of printing the cards and their subsequent filing gets eliminated. Also, it conserves space and saves
stationary.
The second level automation will be to use software which can handle all the housekeeping
operations of the library such as acquisition, circulation and serial control thus creating a network
within the library or becoming part of the existing network of the institution. Networking of
computers within an organization helps the users to browse the cataloguing system from any of
the workstation/terminal.
A very handy technology available for library is the CD-ROM products which can be considered
at the third level. The development of CD-ROM collection not only conserves space but also
provides multi-user access in network environment. There are many self-tutorial CD-ROMS
available with multi-media effect. Libraries facing high incidence of mutilation of materials will
benefit from such electronic products. Also people doing empirical research can download data
and directly take it to other software platform for analysis and making graphical presentation.
Other technology which libraries can make use of is the e-mail system. This not only reduces the
recurring expenditure but also be effective and fast. Sending reminders for non-receipt of journals
by e-mail has proved to be very cost-effective. In addition to this, sharing of resources among
libraries become easy. Few public domain e-mail software are available and there will be no
additional expenditure incurred.
Another technology which has revolutionized the information world is the development of internet.
Subscribers of internet, in addition to getting access to various public domain databases and
services, will also get free e-mail and fax facility. Some publishers have started giving content
pages of journals and libraries having subscription to such journals can also have full text of the
articles. Many academic and research institutes have given free access to their working papers.
Notes general, librarians are looking to maximize the benefits of automation by spreading computer use
to as many aspects of library activities as possible by taking advantage of developments in computer
hardware and software and telecommunications.
Notes Planning for library automation has been defined as planning for “integrated systems”
that computerize an array of traditional library functions using a common database.
While this is still generally true, rapid technological change is forcing a reexamination of what it
means to “automate the library.”
One of the most important planning tools involves collecting basic statistical information on the
library and its operations. You will find that the same basic data will be needed again and again -
whether for vendors from whom you are requesting cost estimates, or for other libraries with
whom you may be seeking to cooperate in implementing automation.
The following are examples of commonly needed data:
· Number of titles and volumes in the collection, current and projected;
· Number of borrowers, current and projected;
· Number of materials circulated, current and projected;
· Number of new materials acquired, current and projected;
· Interlibrary loans, lent to and borrowed from other libraries;
· Description of any cooperative arrangements involving the library; and,
· Library address and hours of operation.
Also it is important to take stock of any existing automation in the library by compiling the
following data:
· Percentage of collection that has catalog records in machine-readable form;
· Description of collection without machine-readable records, by category (e.g. monographs,
audiovisuals);
· Description of currently-automated library functions (if any);
· Estimates of the location and number of workstations (to show where you intend to have
equipment in any future system).
· Group these factors into critical issue areas that are likely to have an impact on the Notes
libraries’ future in developing and sustaining automation.
· Ask participants to identify ideas and perceptions in relation to the question: “How do you
see the library providing user-friendly, cost-effective automated services in five years?”
· Through a method of your own devising, ask participants to prioritize all of the ideas that
come out of the above two “brainstorming” exercises.
· Ask participants to shape these priorities into the draft of a strategic “vision” for automa-
tion development consisting of a statement of purpose, goals and objectives for the library.
Strategic vision now provide the framework or context for the next step in the automation process,
which is to determine which library functions should be automated and in what order of priority.
For example, processes that are repetitive, occupy large amounts of staff time, require retrieving
information from large, unwieldy files, or are high-profile functions of the library (such as the
public catalog) are prime candidates for automation.
Determining the functions that you wish to automate and their priorities relative to each other is
important for all sorts of reasons. If needs and priorities are clear, functions can be automated in
phases, allowing for more effective use of frequently scarce funding. Moreover, it is a way to
develop credibility with funding agencies and be able to take advantage of “sudden” funding
opportunities. Finally, evaluations of systems and options will be easier and more productive if
you are able to match your highest functional priorities against the corresponding modules available
in the marketplace.
Also planners need to be aware that there are certain cost elements involved in the installation and
operation of any automated system. These may be summarized as follows:
· PLANNING AND CONSULTING COSTS include direct, out-of-pocket costs (e.g., hiring a
consultant) and indirect costs (e.g., training staff) associated with getting started.
· PURCHASE OF THE SYSTEM includes the cost of acquiring the initial system hardware
and software, as well as the cost of preparing a site for the computer system.
· TELECOMMUNICATIONS costs are those fees paid to telephone companies for connecting
remote terminals or workstations to a central computer system.
· CONVERSION costs are those associated with the creation of machine-readable biblio-
graphic and, for circulation systems, patron, records.
· ON-GOING OPERATING costs include:
n maintenance fees
n utility costs
n miscellaneous supply costs
n telecommunications costs
n salaries and benefits (if extra staff are hired).
System Specifications
At some point, there is need to re-formulate functional priorities into “functional specifications,”
which may be defined as what you want an automated system to do for you, including things that
your current manual system cannot do. “Technical specifications” must also be established. These
include standards that must be adhered to, system performance, operation, and maintenance, as
well as infrastructure requirements, such as stable sources of electricity and telecommunications,
and sufficient bandwidth.
Developing clear and accurate functional and technical specifications that are specific to your
library is one of the most important, if not the most important, activity that you will engage in as
you plan for your automated system. These specifications will carry you through the entire
procurement process, and will ensure that the system which most closely matches them will be the
most useful and the most responsive to your needs.
Notes
Task Planning of library automation being a important tool in library. Why there is a need
for developing strategic plan?
1.4 Implementation
After the system selection process is complete, there are several important steps which must occur.
You and your vendor will have to negotiate and sign a contract. You will want to test the system
and make sure it suits your needs. You will want to make provisions for system maintenance.
Finally, you will want to train both your staff and your users as much as possible to prepare them
for when the system is up and running.
Notes In thinking of automation planning, there is often a tendency to focus on the hardware
and software aspects of planning, and to ignore the human aspects of automation
training and public relations.
To assure the success of your hard planning work, a training and public relations plan should be
part of any automation project. Fortunately, training can begin long before the system is installed.
By involving staff at all levels in the analysis of operations, the identification of needs, the setting
of priorities, the development of specifications, and the evaluation of systems, staff will gain
much of the knowledge they need as the planning progresses.
For new automated system user acceptance and enthusiasm is certainly an important ingredient in
a successful planning effort. If you are implementing a public access catalog, it is probably the
most important measure of success.
Public relations can allow you to accomplish three things:
· make users aware of your new system and services;
· motivate them to use the system; and,
· train them in using the new system and services effectively.
Task Why training and public relation should be a part of automation project?
Self Assessment
Fill in the blanks:
1. Library automation is divided into .................... levels.
2. .................... is an important contributing factor in the success of the goal.
3. .................... is an enterprise resource planning system for a library used to track items
owned, orders made, bills, paid, and patrons who have borrowed.
The card catalogue at Yale University’s Sterling Memorial Library is hardly used, but adds to the Notes
austere atmosphere.
A library catalogue (or library catalogue) is a register of all bibliographic items found in a library
or group of libraries, such as a network of libraries at several locations. A bibliographic item
consists of information entity (e.g., books, computer files, graphics, realia, cartographic materials,
etc.) which is considered as library material (e.g., a single novel in an anthology), or a group of
library materials (e.g., a trilogy), or linked from the catalogue (e.g., a webpage) as far as it is
relevant to the catalogue and to the users (patrons) of the library.
Notes The card catalogue was a familiar sight to library users for generations, but it has
been effectively replaced by the online public access catalogue (OPAC). Some still
refer to the online catalogue as a “card catalogue”.
Some libraries with OPAC access still have card catalogues on site, but these are now strictly a
secondary resource and are seldom updated. Many of the libraries that have retained their physical
card catalogue post a sign advising the last year that the card catalogue was updated. Some
libraries have eliminated their card catalogue in favour of the OPAC for the purpose of saving
space for other use, such as additional shelving.
Charles Ammi Cutter made the first explicit statement regarding the objectives of a bibliographic
system in his Rules for a Printed Dictionary Catalogue in 1876. According to Cutter, those objectives
are:
1. To enable a person to find a book of which either (Identifying objective)
· the author
· the title
· the subject
· the category
2. To show what the library has (Collocating objective)
· by a given author
· on a given subject
· in a given kind of literature
3. To assist in the choice of a book (Evaluating objective)
· as to its edition (bibliographically)
· as to its character (literary or topical)
Notes These objectives can still be recognized in more modern definitions formulated throughout the
20th century. 1960/61 Cutter’s objectives were revised by Lubetzky and the Conference on
Cataloguing Principles (CCP) in Paris. The latest attempt to describe a library catalogue’s goals
and functions was made in 1998 with Functional Requirements for Bibliographic Records (FRBR)
which defines four user tasks: find, identify, select, and obtain.
Library catalogues originated as manuscript lists, arranged by format (folio, quarto, etc.) or in a Notes
rough alphabetical arrangement by author. Printed catalogues, sometimes called dictionary
catalogues enabled scholars outside a library to gain an idea of its contents. These would sometimes
be interlaced with blank leaves on which additions could be recorded, or bound as guard books
in which slips of paper were bound in for new entries. Slips could also be kept loose in cardboard
or tin boxes, stored on shelves. The first card catalogues appeared in the nineteenth century,
enabling much more flexibility, and towards the end of the twentieth century the OPAC was
developed.
Notes c. 245 BC: Callimachus is considered as the first bibliographer and is the one that
organized the library by authors and subjects. The Pinakes was the first ever library
catalogue.
· c. 800: Library catalogues are introduced in the House of Wisdom and other medieval
Islamic libraries where books are organized into specific genres and categories.
· 1595: Nomenclator of Leiden University Library appears the first printed catalogue of an
institutional library.
· 1674: Thomas Hyde’s catalogue for the Bodleian Library.
More about the early history of library catalogues has been collected in 1956 by Strout.
Notes Sorting
In a title catalogue, one can distinguish two sort orders:
· In the grammatical sort order (used mainly in older catalogues), the most important word
of the title is the first sort-term. The importance of a word is measured by grammatical
rules; for example, the first noun may be defined to be the most important word.
· In the mechanical sort order, the first word of the title is the first sort-term. Most new
catalogues use this scheme, but still include a trace of the grammatical sort order: they
neglect an article (The, A, etc.) at the beginning of the title.
The grammatical sort order has the advantage that often, the most important word of the title is
also a good keyword and it is the word most users remember first when their memory is incomplete.
However, it has the disadvantage that many elaborate grammatical rules are needed, so that only
expert users may be able to search the catalogue without help from a librarian.
In some catalogues, persons’ names are standardized, i.e., the name of the person is always
(catalogued and) sorted in a standard form, even if it appears differently in the library material.
This standardization is achieved by a process called authority control. An advantage of the authority
control is that it is easier to answer questions (which works of some author does the library have).
On the other hand, it may be more difficult to answer questions (does the library have some
specific material?) if the material spells the author in a peculiar variant. For the cataloguer, it may
incur (too) much work to check whether Smith, J. is Smith, John or Smith, Jack.
For some works, even the title can be standardized. The technical term for this is uniform title. For
example, translations and re-editions are sometimes sorted under their original title. In many
catalogues, parts of the Bible are sorted under the standard name of the book(s) they contain. The
plays of William Shakespeare are another frequently cited example of the role played by a uniform
title in the library catalogue.
Many complications about alphabetic sorting of entries arise. Some examples:
· Some languages know sorting conventions that differ from the language of the catalogue.
For example, some Dutch catalogues sort IJ as Y. Should an English catalogue follows this
suit And should a Dutch catalogue sort non-Dutch words the same way
· Some titles contain numbers, for example 2001: A Space Odyssey. Should they be sorted as
numbers, or spelled out as Two thousand and one
· De Balzac, Honoré or Balzac, Honoré de Ortega y Gasset, José or Gasset, José Ortegay
In a subject catalogue, one has to decide on which classification system to use. The cataloguer will
select appropriate subject headings for the bibliographic item and a unique classification number
(sometimes known as a “call number”) which is used not only for identification but also for the
purposes of shelving, placing items with similar subjects near one another, which aids in browsing
by library users, who are thus often able to take advantage of serendipity in their search process.
Notes
1. The online catalogue does not need to be sorted statically; the user can choose author, title,
keyword, or systematic order dynamically.
2. Most online catalogues offer a search facility for any word of the title; the goal of the
grammatical word order (provide an entry on the word that most users would look for) is
reached even better.
3. Many online catalogues allow links between several variants of an author name. So, authors
can be found both under the original and the standardized name (if entered properly by the
cataloguer).
4. The elimination of paper cards has made the information more accessible to many people
with disabilities, such as the visually impaired, wheelchair users, and those who suffer
from mold allergies.
Self Assessment
Multiple choice questions:
4. A library acquisition is the department of library which is responsible for:
(a) Selection of materials for the library
(b) Purchase of materials for the library
(c) Selection and purchase of materials for the library
(d) All of these
5. OPAC stands for:
(a) Online public access catalogue
(b) Online public acquisition catalogue
(c) Online payment access catalogue
(d) Operation public access catalogue.
6. In 245 BC, ………. is considered as the first bibliographer.
(a) Lubetzky (b) Cutter (c) Callimachus (d) Thomas Hyde
7. Author card a formal catalogue shorted alphabetically according to the ………. .
(a) Editors (b) Readers (c) Doctors (d) Lawers
8. MARC stands for:
(a) Machine Reading Cataloguing
(b) Machine Readable Cataloguing
(c) Machine Read Catalogue
(d) Machinery Reading Cataloguing.
Notes Renewal of materials and payment of fines are also handled at the circulation desk.
Circulation staff may provide basic search and reference services, though more in-depth questions
are usually referred to reference librarians at the library reference desk. The circulation desk is in
most cases staffed by library aides instead of professional librarians.
Functions of the circulation desk staff may include:
· Lending materials to library users
· Checking in materials returned
· Monitoring materials for damage and routing them to the appropriate staff for repair or
replacement
· Set right the library circulation software, scanners, printers, etc.
· Collecting statistics on library use, i.e., patron transactions, material checkouts, etc.
Checking Out
Many items can be checked out by an automated system and do not require any paperwork. The
circulation desk also provides circulation services for items such as uncatalogued items,
periodicals, government documents, maps and microforms. Such items often have to be checked
out “by hand”. The number of library items that patrons can check out varies from library to
library.
Checking In
Returned library items are processed by the circulation desk. They usually scan the barcode to
identify the item and also demagnetize the item and dispatch the item on to the shelves.
Document Delivery
The circulation desk also liaises with library patrons in delivering electronic articles and documents.
Reserve
The circulation desk can also look after the reserve section such as past exam papers and unit
materials.
Infringement Processing
The payment of infringements for late, lost book charges and overdue items are processed by
the circulation desk. They can also lift restrictions for library patrons once the fines have been
paid.
Shelving Notes
The circulation desk also handles the shelving of items used from the Reserve section and also the
reference section.
Did u know? Throughout 1980s, the number and sophistication of online catalogues increased.
The first commercial systems appeared, and would by the end of the decade largely replace
systems built by libraries themselves. Library catalogues began providing improved search
mechanisms, including Boolean and keyword searching, as well as ancillary functions, such as the
ability to place holds on items that had been checked-out.
At the same time, libraries began to develop applications to automate the purchase, cataloguing,
and circulation of books and other library materials. These applications, collectively known as an
integrated library system (ILS) or library management system, included an online catalogue as the
public interface to the system’s inventory. Most library catalogues are closely tied to their
underlying ILS system.
Task How newest generation of library catalogue different from earlier OPAC?
Union Catalogues
Although, library catalogues typically reflect the holdings of a single library, they can also contain
the holdings of a group or consortium of libraries. These systems, known as union catalogues, are
usually designed to aid the borrowing of books and other materials among the member institutions
via interlibrary loan. The largest such union catalogue is World Cat, which includes the holdings
of over 70,000 libraries worldwide.
Related Systems
There are a number of systems that share much in common with library catalogues, but have
traditionally been distinguished from them. Libraries utilize these systems to search for items not
traditionally covered by a library catalogue.
They include bibliographic databases such as Medline, ERIC, Psyc INFO, and many others which
index journal articles and other research data. There are also a number of applications aimed at
managing documents, photographs, and other digitized or born-digital items. Particularly in
academic libraries, these systems (often known as digital library systems or institutional repository
systems) assist with efforts to preserve documents created by faculty and students.
1.13 Summary
· An integrated library system (ILS), also known as a library management system (LMS), is
an enterprise resource planning system for a library, used to track items owned, orders
made, bills paid, and patrons who have borrowed.
· Library automation which started in late 70s in few special libraries has now reached
most of the university libraries.
· The library catalogue or index to the collection forms the base for most of the library
activities such as acquisition, reference, bibliographic service, inter-library loan etc. The
users of library card catalogue will appreciate how fast the retrieval is, search and print-
ing in automated environment.
· A library catalogue (or library catalogue) is a register of all bibliographic items found in
a library or group of libraries, such as a network of libraries at several locations.
· Cataloguing (or catalogueuing) rules have been defined to allow for consistent catalogu-
ing of various library materials across several persons of a cataloguing team and across
time.
· Library circulation or library lending comprises the activities around the lending of
library books and other material to users of a lending library.
· An Online Public Access Catalogue (often abbreviated as OPAC or simply Library Cata-
logue) is an online database of materials held by a library or group of libraries.
1.14 Keywords
Database : A large store of data held in a computer.
Invoice : A list of goods sent or services provided with a statement of the sum due.
Automation : The use of automatic equipment in a manufacturing.
Elaborate : Very detailed and complicated.
Sophisticated : Showing a lot of experience of the world and social situations.
Books Harris, Michael H. History of Libraries in the Western World. 4th ed. Lanham,
Maryland: Scarecrow, 1995. 3 - “The distinction between a library and an archive is
relatively modern”.
Cossette, Andre Humanism and Libraries: An Essay on the Philosophy of
Librarianship. Duluth, MN: Library Juice Press, 2009. Print.
Martin Schrettinger (1803): Versuch eines volltsändigen Lehrbuches der
Bibliothek-Wissenschaft. Munich
Notes
Unit 2: Library Software Packages-I
CONTENTS
Objectives
Introduction
2.1 General Features of the Software
2.2 Services of Software
2.3 Security for Software
2.4 Radio-Frequency Identification (RFID)
2.5 Libsys
2.5.1 Acquisition System
2.5.2 Cataloguing System
2.5.3 Circulation System
2.5.4 Serial System
2.5.5 Article Indexing System
2.5.6 OPAC System
2.6 Summary
2.7 Keywords
2.8 Review Questions
2.9 Further Readings
Objectives
After studying this unit, you will be able to:
· Explain the general features of the software
· Describe the services of software
· Define RFID in library software
· Explain about LibSys.
Introduction
This unit entitled library software packages deals with the modern software used the organization
of library which will be helpful to both the librarians and the people who visit the library. The
librarian can cope with a large number of people who visit the library and people can pickup their
own books of choice easily. Radio-frequency identification, library systems, State of Art Library
Software, and winisis are different types of software used in the modern libraries.
Software evaluation is quite a difficult task; we have to consider the following procedure, features
and aids to evaluate software packages.
Preliminary Step
(a) Consult other: You do not want software that stops unexpectedly, slows down on large
network, report error message, so consult with other who have already used the software
in the same way you intend to use the system or consult other who have already experi-
enced on that software.
(b) Who refer to you: the reputation of person or the institution, his/her experienced on that
particular software should also be justified at this point.
(c) Reputation of the manufacture and vendor the reputation of the manufacturer and vendor
should also be considered.
Notes Documentation
(a) Existing literature: go for the software after carefully examining the existing literature and
documentation on the particular software.
(b) Training: does the company or authority of the particular software provide training?
Where and how the training is conducted, whether it is online, onsite should also be
consider.
(c) Manual: does the training is accompanied by easy to follow supporting print material or
manual?
(e) OPAC: Provision of reservation through OPAC, provision of searching OPAC from out- Notes
side the library, provision of searching the OPAC and web simultaneously (Meta search)
using a single word search.
(f) Library administration: The software should allow generating different reports, i.e., collec-
tion statistics, circulation statistics and also should be helpful to create your own special-
ized report to meet your specialized need.
(g) Enhanced MARC data: Many software allows to catalogue website, e-Books, AV resources
in addition to the library resources. These website are added by the library media special-
ist manually.
(h) Updating: Does the library automation system company from their own site help to install,
upgrade (web-based updates), and patches or simply to help you with a particular function.
(i) New technologies:
· Provision of handling uncatalogue item.
· Provision of internet connectivity, e-mail connectivity.
· Scope of integration of the software with other school department.
· Provision of accessed the software from computer outside of the school walls via a
web browser.
· Does the library software keeping pace with global technology, web enhancement,
online information, virtual services, etc.
· Many latest software is now a days hosted by a vendor by an Application Service
Provider (ASP) or by the school web server.
· Can other application besides library software run on the workstation?
· Can the software makes it easy to switch between the OPAC and writing station
because there are times when you like that your public OPAC station to function as
writing station and there are other times when you like the writing station to be-
comes function as OPAC.
Did u know? This is an advantage, here cataloguer can work from remote location and
OPAC can be accessed from both home and school, 24 hours a day.
Post installation
(a) Does the vendor gives performance/service warranty.
(b) Post installation support from the vendor.
Libraries
Radio-frequency identification (RFID) is a technology that uses communication through the use
of radio waves to transfer data between a reader and an electronic tag attached to an object for the
purpose of identification and tracking.
RFID makes it possible to give each product in a grocery store its own unique identifying number,
to provide assets, people, work in process, medical devices, etc., all with individual unique identifiers
- like the license plate on a car but for every item in the world. This is a vast improvement over
paper and pencil tracking or bar code tracking that has been used since, the 1970s.
Notes With bar codes, RFID is only possible to identify the brand and type of package in a
grocery store, for instance.
Furthermore, passive RFID tags (those without a battery) can be read if passed within close
enough proximity to an RFID reader. It is not necessary to “show” the tag to the reader device, as
with a bar code. In other words it does not require line of sight to “see” an RFID tag, the tag can be
read inside a case, carton, box or other container, and unlike bar codes RFID tags can be read
hundreds at a time. Bar codes can only read one at a time.
Some RFID tags can be read from several meters away and beyond the line of sight of the reader.
The application of bulk reading enables an almost-parallel reading of tags.
Radio-frequency identification involves the hardware known as interrogators (also known as
readers), and tags (also known as labels), as well as RFID software or RFID middleware.
Most RFID tags contain at least two parts: one is an integrated circuit for storing and processing
information, modulating and demodulating a radio-frequency (RF) signal, and other specialized
functions; the other is an antenna for receiving and transmitting the signal.
RFID can be passive (using no battery), active (with an on-board battery that always broadcasts or
beacons its signal) or battery assisted passive (BAP) which has a small battery on board that is
activated when in the presence of an RFID reader. Passive tags in 2011 start at $ .05 each and for
special tags meant to be mounted on metal, or withstand gamma sterilization go up to $5. Active
tags for tracking containers, medical assets, or monitoring environmental conditions in data
centers all start at $50 and can go up over $100 each. BAP tags are in the $3-10 range and also have
sensor capability like temperature and humidity.
The term RFID refers to the technology. The tags should properly be called “RFID tags” not
“RFIDs”.
Fixed RFID and Mobile RFID: Depending on mobility, RFID readers are classified into two
different types: fixed RFID and mobile RFID. If the reader reads tags in a stationary position, it is
called fixed RFID. These fixed readers are set-up specific interrogation zones and create a “bubble”
of RF energy that can be tightly controlled if the physics is well-engineered. This allows a very Notes
definitive reading area for when tags go in and out of the interrogation zone. On the other hand,
if the reader is mobile when the reader reads tags, it is called mobile RFID. Mobile readers include
hand helds, carts and vehicle mounted RFID readers from manufacturers such as Motorola, Intermec,
Impinj, Sirit, etc.
There are a variety of groups defining standards and regulating the use of RFID, including the
International Organization for Standardization (ISO), the International Electrotechnical Commission
(IEC), ASTM International, the DASH7 Alliance and EPCglobal. (Refer to Regulation and
standardization below.) There are also several specific industries that have set guidelines including
the Financial Services Technology Consortium (FSTC) has set a standard for tracking IT Assets
with RFID, the Computer Technology Industry Association CompTIA has set a standard for
certifying RFID engineers and the International Airlines Transport Association IATA set tagging
guidelines for luggage in airports.
RFID has many applications; for example, it is used in enterprise supply chain management to
improve the efficiency of inventory tracking and management. The Healthcare industry has used
RFID to create tremendous productivity increases by eliminating “parasitic” roles that do not add
value to an organization such as counting, looking for things, or auditing items. Many financial
institutions use RFID to track key assets and automate -SarbanesOxley Act (SOX) compliance. Also
with recent advances in social media RFID is being used to tie the physical world with the virtual
world. RFID in Social Media first came to light in 2010 with Facebook’s annual conference.
RFID tags used in libraries: square book tag, round CD/DVD tag and rectangular VHS tag.
Among the many uses of RFID technology is its deployment in libraries. This technology has
slowly begun to replace the traditional barcodes on library items (books, CDs, DVDs, etc.). The
RFID tag can contain identifying information, such as a book’s title or material type, without
having to be pointed to a separate database (but this is rare in North America). The information is
read by an RFID reader, which replaces the standard barcode reader commonly found at a library’s
circulation desk. The RFID tag found on library materials typically measures 50 ´ 50 mm in North
America and 50 ´ 75 mm in Europe. It may replace or be added to the bar code, offering a different
means of inventory management by the staff and self service by the borrowers. It can also act as a
security device, taking the place of the more traditional electromagnetic security strip.
Notes While there is some debate as to when and where RFID in libraries first began, it was first
proposed in the late 1990s as a technology that would enhance workflow in the library setting.
Singapore was certainly one of the first to introduce RFID in libraries and Rockefeller University
in New York may have been the first academic library in the United States to utilize this technology,
whereas Farmington Community Library in Michigan may have been the first public institution,
both of which began using RFID in 1999.
Did u know? In Europe, the first public library to use RFID was the one in Hoogezand-
Sappemeer, the Netherlands, in 2001, where borrowers were given an option.
To their surprise, 70% used the RFID option and quickly adapted, including elderly people.
Worldwide, in absolute numbers, RFID is used most in the United States (with its 300 million inhabitants),
followed by the United Kingdom and Japan. It is estimated that over 30 million library items worldwide
now contain RFID tags, including some in the Vatican Library in Rome. At the time of 2010, the largest
RFID implementation in academic library is the University of Hong Kong Libraries which has over
1.20 million library items contains RFID tags; whereas the largest implementation for public institution
has been installed in Seattle Public Library in the United States.
RFID has many library applications that can be highly beneficial, particularly for circulation staff.
Since, RFID tags can be read through an item, there is no need to open a book cover or DVD case
to scan an item. This could reduce repetitive-motion injuries. Where the books have a bar code on
the outside, there is still the advantage that borrowers can scan an entire pile of books in one go,
instead of one at a time. Since RFID tags can also be read while an item is in motion, using RFID
readers to check-in returned items while on a conveyor belt reduces staff time. But, as with
barcode, this can all be done by the borrowers themselves, meaning they might never again need
the assistance of staff. Next to these readers with a fixed location there are also portable ones (for
librarians, but in the future possibly also for borrowers, possibly even their own general-purpose
readers). With these, inventories could be done on a whole shelf of materials within seconds,
without a book ever having to be taken off the shelf. In Umeå, Sweden, RFID is being used to assist
visually impaired people in borrowing audio books. In Malaysia, Smart Shelves are used to
pinpoint the exact location of books in Multimedia University Library, Cyberjaya. In the
Netherlands, handheld readers are being introduced for this purpose.
The Dutch Union of Public Libraries (‘Vereniging van Openbare Bibliotheken’) is working on the
concept of an interactive ‘context library’, where borrowers get a reader/headphones-set, which
leads them to the desired section of the library (using triangulation methods, rather like GPS) and
which they can use to read information from books on the shelves with the desired level of detail
(e.g. a section read out loud), coming from the book’s tag itself or a database elsewhere, and get tips
on alternatives, based on the borrowers’ preferences, thus creating a more personalized version of
the library. This may also lead them to sections of the library they might not otherwise visit.
Borrowers could also use the system to exchange experiences (such as grading books). This is
already done by children in the virtual realm at mijnstempel.nl, but the same could be done in
physical form. Borrowers can grade the book at the return desk.
However, as of 2008 this technology remains too costly for many smaller libraries, and the
conversion period has been estimated at 11 months for an average-size library. A 2004 Dutch
estimate was that a library which lends 100,000 books per year should plan on a cost of 50,000
(borrow- and return-stations: 12,500 each, detection porches 10,000 each; tags 0.36 each). RFID
taking a large burden off the staff could also mean that fewer staff will be needed, resulting in
some of them getting fired, but that has so far not happened in North America where recent
surveys have not returned a single library that cut staff because of adding RFID. In fact, library
budgets are being reduced for personnel and increased for infrastructure, making it necessary for
libraries to add automation to compensate for the reduced staff size. Also, the tasks that RFID takes
over are largely not the primary tasks of librarians. A finding in the Netherlands is that borrowers Notes
are pleased with the fact that staffs are now more available for answering questions.
A concern surrounding RFID in libraries that has received considerable publicity is the issue of
privacy. Because RFID tags can depending on the RFID transmitter & reader-be scanned and read
from up to 100 meters (330 ft) (e.g., Smart Label RFID’s), and because RFID utilizes an assortment
of frequencies (both depending on the type of tag, though), there is some concern over whether
sensitive information could be collected from an unwilling source. However, library RFID tags do
not contain any patron information, and the tags used in the majority of libraries use a frequency
only readable from approximately 10 feet (3.0 m). Also, libraries have always had to keep records
of who has borrowed what, so in that sense there is nothing new. However, many libraries destroy
these records once an item has been returned. RFID would complicate or nullify this respect of
readers’ privacy. Further, another non-library agency could potentially record the RFID tags of
every person leaving the library without the library administrator’s knowledge or consent. One
simple option is to let the book transmit a code that has meaning only in conjunction with the
library’s database. Another step further is to give the book a new code every time it is returned. And
if in the future readers become ubiquitous (and possibly networked), then stolen books could be
traced even outside the library. Tag removal could be made difficult if the tags are so small that they
fit invisibly inside a (random) page, possibly put there by the publisher.
Self Assessment
Multiple choice questions:
4. Radio-frequency identification involves the hardware known as:
(a) Interrogators and tags (b) Readers
(c) Tags (d) All of these.
5. If the readers read tags in a stationary position, it is called:
(a) Fixed RFID (b) Mobile RFID
(c) Internet RFID (d) IT Assets RFID.
2.5 LibSys
LibSys is integrated multi user library management software that caters to the needs of an advanced
library and information professionals. It provides a tree structure system with each system
comprising of several sub-systems having unmatchable depth in functionality.
· It has a powerful and user-friendly WEB-OPAC along with Windows-based OPAC.
· It runs on various platforms such as WINDOWS (95/98/NT/2000/XP), UNIX (various
flavors), LINUXM, etc. Further, it adheres to standards such as MARC and Z39.50 that
makes it suitable for cooperative networking and resource sharing.
The LibSys systems at a glance:
· Acquisition System
· Cataloguing System
· Circulation System
· Serial System
· Article Indexing System
· OPAC System
WEB-OPAC System
It is an optional module and provides an advanced GUI interface to enable searching of the library
database through an industry standard Web browser having all the features of OPAC. etc.
Self Assessment
State whether the following statements are true or false:
6. LibSys has a powerful and user friendly WEB-OPAC along with windows based OPAC.
7. Circulation System provides control of subscription of periodicals and subsequent moni-
toring of the scheduled arrival of individual issues.
8. OPAC System provides an Online Public Access Catalogue
2.6 Summary
· Provision of reservation through OPAC, provision of searching OPAC from outside the
library, provision of searching the OPAC and web simultaneously (Meta search) using a
single word search.
· The software should allow generating different reports i.e., collection statistics, circula-
tion statistics and also should be helpful to create your own specialized report to meet
your specialized need.
· Radio-frequency identification (RFID) is a technology that uses communication through
the use of radio waves to transfer data between a reader and an electronic tag attached to
an object for the purpose of identification and tracking.
· Some RFID tags can be read from several meters away and beyond the line of sight of the
reader. The application of bulk reading enables an almost-parallel reading of tags.
· Most RFID tags contain an integrated circuit for storing and processing information.
· Mobile readers include hand helds, carts and vehicle mounted RFID readers from manu-
facturers such as Motorola, Intermec, Impinj, Sirit, etc.
· The Dutch Union of Public Libraries (‘Vereniging van Openbare Bibliotheken’) is work-
ing on the concept of an interactive ‘context library’, where borrowers get a reader/
headphones-set, which leads them to the desired section of the library
· LibSys is integrated multi user library management software that caters to the needs of
an advanced library and information professionals.
2.7 Keywords
Relevant : Closely appropriate to the matter in hand.
ASP : An Application Service Provider (ASP) is a business that provides computer-
based service to customers over a network.
RFID : Radio-Frequency Identification (RFID) is the use of a wireless non-contact radio
system to transfer data from a tag attached to an object, for the purposes of
automatic identification and tracking.
OPAC : An Online Public Access Catalog (OPAC) is an online database of materials held by
a library or group of libraries.
SDI : Selective Dissemination of Information (SDI) was originally a phrase related to
library and information science. SDI refers to tools and resources used to keep a user
informed of new resources on specified topics held by a library or group of libraries.
Notes
Unit 3: Library Software Packages-II
CONTENTS
Objectives
Introduction
3.1 Software for University Library (SOUL)
3.1.1 Hardware and Software Requirement
3.2 Features of SOUL
3.3 Modules of SOUL
3.3.1 Acquisition Module
3.3.2 Cataloguing Module
3.3.3 Circulation Module
3.3.4 Serials Module
3.3.5 Online Public Access Catalogue Module (OPAC)
3.3.6 Administration Module
3.4 Winisis
3.5 Summary
3.6 Keywords
3.7 Review Questions
3.8 Further Readings
Objectives
After studying this unit, you will be able to:
· State the meaning of software for university library
· Explain Hardware and software requirement
· Discuss modules of SOUL in library software packages
· Describe what winsis is.
Introduction
In this unit entitled user friendly software developed to work under client server environment. In
order to design this software, the international standards, biblio graphic formats networking
protocols and typical functions of all types and sizes of libraries particularly at university level are
takes in to account.
We have to consider the followings to evaluate the software packages.
Notes university level are to taken into account. The functions have been grouped into six categories,
looking into the functional divisions of Indian University libraries. At present SOUL uses RDBMS
on Windows N.T. operating system as back end to store and retrieve the data. However, keeping
in view the trends in IT towards Linux operating system, efforts are under way also to provide
SOUL to work on Linux platform. The inputs received from expert team consisting of practicing
librarians and the feedbacks received from users of our earlier software, ILMS, have given a strong
base for designing this software. SOUL is near total solution offered by INFLIBNET to Indian
libraries. It puts library staff at ease in exploring all the functions to their advantages with the help
of professionally prepared manual.
Notes SOUL does not need an extensive training. With very little familiarity, one can begin
using it.
· It is specially designed to work in the large academic libraries, capable of handling large
number of records.
· It is multiuser software and there is no limit on simultaneous accesses.
· Supports internationally known standards such as CCF and AACR II. etc.
· Provides export and import facility and adheres to ISO 2709 format.
· Incorporates all required features to work in a networked environment i.e., LAN and Notes
WAN.
· OPAC is versatile and very user-friendly with all options in-built.
· OPAC is accessible over the web using any GUI-based browsers.
· Provides comprehensive list of reports, master databases and authority files.
· Provides facility to create, view and print records in regional languages.
· Functionally it covers every conceivable operation of University library.
· Available at affordable cost.
· SOUL has been fully tested at a number of university libraries and critically evaluated by
team of experts and practising librarians.
Figure 3.1
These modules have further been divided into sub-modules looking at the nature of functions
handled by various functional divisions in University libraries. Brief descriptions of the same
along with first screens have been given in the following pages.
services such as recent addition services, CAS, creation and updation of authority files, etc., are Notes
other major functions supported by SOUL. A comprehensive worksheet covering almost every
field facilitates data entry of all types of books, conference proceedings, theses, etc. Facility to
create database in the regional languages, using respective scripts is also provided. This module
allows the library staff to conduct comprehensive searches for existing items before cataloguing
new items and has provision of import and export of records and retrospective conversion.
Functionally this module has been organized into following sub-modules as given in Figure 3.3.
· Cataloguing process
· Catalogue search
· User services
· Authority file maintenance
· Retrospective Conversion
· Reports
Figure 3.3
Catalogue Process function allows to pick-up the accessioned item, under process, for the cataloguing
purpose. Here one can add remaining information as per specified standards, such as additional
bibliographical information, subject headings, classification number, etc. Editing of existing records
for maintaining consistency can also be done here.
Notes Catalogue Search enables search of the existing items, its status, identifying
duplication etc., for the purpose of day-to-day cataloguing. This is similar to OPAC.
User Services sub module has three major functions viz., generating current awareness list (by
date, subject, etc), compiling of bibliographies with various combinations and alert services to
individual users.
Authority File Maintenance includes creating, updating and using of major authority files for
names such as publisher, languages, corporate bodies, meetings, authors, physical media, and
types of material and also for subject descriptors. This is a unique feature added to this software
taking into account the consistency that each library needs to maintain while creating records.
Retrospective Conversion has two major functions viz., data entry of old collection with minimum
information without going to first sub-module and import and export of data from and to external
sources. By using this function libraries can download the matched records from INFLIBNET
union catalogue or other sources and export the records for contributing to union catalogue, etc. A
versatile ISO2709 interface developed at INFLIBNET, which is built-in to this module, enables to
carry out the job.
Notes Reports module allows generation of catalogue cards as per AACR-II, generation of recent editions
reports subject and class number wise and other related reports. The catalogue module basically
supports all major functions relating to technical processing and has been designed as per the
international standards.
Self Assessment
Fill in the blanks:
1. The SOUL is divided into ………. broad modules.
2. Acquisition module comprises ………. broad sub-modules.
Figure 3.4
· Membership · Transactions
· Inter-Library-Loan · Overdue collection
· Reminder · Status Search
· Reports · Maintenance.
Membership sub-module provides the facility to create all types of member records, assigning
unique membership code, borrowing privileges, renewal, issue of no-due certificates, master
databases for codes, etc, searching the status of membership or an item, suspending the membership
and generating related reports.
Transactions: Transactions mean handling all major functions such as issue, return, renewal,
reservation, recall or reminder of an item, etc. This module also handles cancellation of reserved
books, lost/missing books, searching the member status and searching catalogue, module etc.
Transaction is based on Accession number and Member code. This module supports generating
and readings of bar code labels. A unique facility in this module allows one to see simultaneously
the details of members, items borrowed, dues, etc. while the transaction process is on. This enables
issue counter staff as well end-user to know the exact status of the members borrowing.
Inter Library Loan allows lending of items to specified member library and also borrowing items
from other libraries, issues, reminders, etc. This sub-module has been developed comprehensively
to take care of all the details of user libraries, individuals and items loaned.
Over due collection facilitates are the collection of overdue charges in full or in part, providing Notes
receipts, keeping up-to-date accounting and tallying totals, etc. Using this function one can generate
daily, weekly, monthly reports to find out as to how much overdue charges have been collected.
Reminder module handles individual and group reminder generation for all overdue materials.
Comprehensive listing of materials that are overdue can also be generated within a specific period
giving from and to dates.
Did u know? Search status enables the library circulation desk staff to check the status of a
member or items borrowed by a user and overdue items.
Maintenance is yet another comprehensive sub-module, which covers binding, lost and cost
recovery of books, damaged books, withdrawn books, etc.
Reports sub-module allows the generation of as many as 16 major reports and with many
combinations. Above all this module is capable of handling large transactions. If various functions
built in this module are effectively puts to use the library staff will save lot of time and help to
avoid repetitive jobs.
Notes Serials Module helps in keeping track of every title received in the library.
All functions starting from suggestions, master databases, subscriptions, checking, payment, reminder,
binding title history export/import, etc., have been covered. For the convenience of users, these
functions have been grouped under following logical sub-modules as given in Figure 3.5.
Figure 3.5
· Suggestions · Subscription
· Payment · Master Databases
· Check-in · Reminders
· Binding · Status search
· Title history · Export/Import
· Report generation
Notes Suggestion: sub-module enables one to record and keep a track of all the suggestions received for
subscribing to serials. Selection of these titles for approval, preparing budget estimates and
generation of related reports are covered under this sub-module.
Subscription module takes care of ordering/renewal of serials, follow-up relating to the same,
sending reminder, if invoices are not received, generating orders by supplier or publisher are
included under this option.
Payment function supports processing and recording of all details relating to each invoice, including
supplementary invoice such as invoice processing, credit notes processing, reports generation, etc.
Master databases option allows creation of large number of frequently used master databases viz.,
title entry, language, class number, publisher, binder, country, department, currency, frequency,
budget heads, binding type, delivery modes, reports, etc. Of these, title entry is an important one.
It is here that the creation of database for each title with bibliographic information begins in the
serial module.
Check-in is crucial function to record the receipt of each issue of serial and its accompanying
material. To enable one to record the issues, system has a facility to generate schedule in advance
for each title by providing necessary inputs viz., Vol. no(s), Issue no(s), frequency, date of publication
of first issue, mode of delivery, total number of issues, etc.
Sending reminders for non-receipt of issues or issues that are overdue, etc., for single or all titles
by supplier, publisher, etc., can be done using this sub-module.
Binding supports making sets, generating order, payments, accessioning bound volumes, etc.
Status search option facilitates one to find out the status of every thing starting from subscription
to check-in of issues.
Title history is provided to keep record of ceased, suspended, discontinued titles and also title
change, splits, mergers along with holdings information for each and every title in the database.
Export/Import of data in ISO2709 format is also provided to enable library to transfer the existing
records in to SOUL and also contribute data to INFLIBNET union database.
Reports are a comprehensive function, which has more than 15 built-in reports of all types with
different combinations. This adds to the strength of serial module. Serial module is designed to
handle large number of titles, with many options giving maximum flexibility to user libraries.
· Search key fields, such as, author, title, keywords, class number, accession number, etc Notes
· Accessible through the GUI-based web browsers like Netscape Communicator, Internet
Explorer, etc.
· User can see the status of currently borrowed items by entering his/her borrower number.
· Search results can be saved and printed.
· Selection of databases can be made according to the choice of users.
Figure 3.6
Self Assessment
Multiple choice questions:
3. Title history and Report generation are submodules of .................... .
(a) Administration Module (b) Serials Module
(c) Circulation Module (d) Cataloguing Module
4. .................... is crucial function to record the receipt of each issue of serials and its accompa-
nying materials.
(a) Payment (b) Binding (c) Reports (d) Check-in
3.4 Winisis
CDS/ISIS is a software package for generalized Information Storage and Retrieval systems
developed, maintained and disseminated by UNESCO.
Did u know? CDS/ISIS was first released in 1985 and since then over 20,000 licenses have
been issued by UNESCO and a worldwide network of distributors.
It is particularly suited to bibliographical applications and is used for the catalogues of many small
and medium-sized libraries. Versions have been produced in Arabic, Chinese, English, French,
German, Portuguese, Russian and Spanish amongst other languages. UNESCO makes the software
available free for non-commercial purposes, though distributors are allowed to charge for their
expenses.
Notes CDS/ISIS is an acronym which stands for Computerized Documentation Service/Integrated Set of
Information Systems. In 2003, it was stated that “This package is accepted by libraries in the
developing countries as standard software for information system development”.
The original CDS/ISIS ran on an IBM mainframe and was designed in the mid 1970s under Mr
Giampaolo Del Bigio for UNESCO’s Computerized Documentation System (CDS). It was based on
the internal ISIS (Integrated Set of Information Systems) at the International Labour Organization
in Geneva.
In 1985, a version was produced for mini and micro-computers programmed in Pascal. It ran on an
IBM PC under MS-DOS. Winisis, the Windows version, first demonstrated in 1995, may run on a
single computer or in a local area network. A JavaISIS client/server component was designed in
2000, allowing remote database management over the Internet from Windows, Linux and Macintosh
computers. Furthermore, GenISIS allows the user to produce HTML Web forms for CDS/ISIS
database searching. The ISIS_DLL provides an API for developing CDS/ISIS based applications.
The OpenIsis library, developed independently from 2002 to 2004, provided another API for
developing CDS/ISIS-like applications.
The most recent effort towards a completely renewed FOSS, UNICODE implementation of CDS/
ISIS is the J-Isis project, developed by UNESCO since 2005 and currently maintained by Mr. Jean
Claude Dauphin.
CDS/ISIS is menu-driven generalized information to rage and Retrieval system designed
specifically for the computerized management of structured non-numerical databases. One of the
major advantages offered by the generalized design of the system is that CDS\ISIS is able to
manipulate an unlimited number of databases each of which may consist of completely different
data elements. Although some features of CDS/ISIS require some knowledge of and experience
with computerized information systems, once an application has been designed the system may
be used by persons having had little or no prior computer experience. For advanced users having
access to computer professionals, CDS/ISIS offers an integrated programming facility allowing
the development of specialized applications and/or the functional extension of the software as
originally provided. It has the largest installed base of about 1390 installations and is a PC version
available on a number of platforms like Windows 95, Windows NT, DOS, Claris etc. It has a
number of fields, records, alternate scripts, multimedia capability, and Web interface. Many
specialized application products have been developed around CDS\ISIS (Sanjay and Trishna library
software packages, for example). Besides in libraries, the package can be equally used to create
databases. An ideal software package for small and medium-size libraries, it was distributed free
of charge initially; now it is priced at < 15001. The package performs a variety of operations related
to information storage and retrieval with powerful search capabilities and flexible database
management. It allows interlinking records from more than one database, use of more than one
data sheet, and conforms to 180-2709. The major functions provided by CDS\ISIS allow you to:
Define databases containing the required data elements Enter new records into a given database
Modify, correct or delete existing records Automatically build and maintain fast access files for
each database in order to maximize retrieval speed Retrieve records by their contents, through a
sophisticated search language Display the records or portions thereof according to your
requirements Sort the records in any sequence desired Print partial or full catalogues and/or
indexes Develop specialized applications using the CDS\ISIS integrated programming facility.
Database Menu: The bottom part of the menu normally contains the list of the most recently
opened databases. You may open any one of them by simply clicking on the corresponding entry.
It also allows you to import data from external files recorded according to the 180-2709 standard
format for information interchange and also to extract a database or a portion thereof normally for
transmitting it to other users. You may also use this command to perform some reformatting of
the records of a database and then use the import function to store the reformatted data into the
original or a different database. It also allows you to print the output of a given query and/or to
print a selected range of records.
Browse Menu: It allows the whole database to be browsed or edited independently from any
search performed; displays the list of searches performed so far, from which you may select the
one desired. It also facilitates in displaying the record (according to the currently selected format)
or displaying either the current format or the current record in ASCII.xt format.
Configure Menu: This allows you to change the language in which menus, windows, prompts and Notes
system messages will be displayed. When you select this, a list of available languages is displayed
from which you may select the one desired. Once selected, a language remains in effect until you
change it again. It allows display of the current parameter settings.
Utilities Menu: This allows you to add or delete a field with specified contents to a range of Master
file records. It also allows adding or deleting or replacing a field with specified contents to all the
records retrieved by a given search. Windows Menu: It arranges windows so that they overlap,
starting in the upper-left corner of the main CDS/ISIS window. Help Menu provides helps In
troubleshooting while working with the software.
Windows Version (WINISIS): The Windows version (compatible with Windows 3.1x, 95, 98, Me,
NT4 and Win 2000), version 1.4 was released in January 2001 has been totally re-written in C++
language (as against Pascal in DOS and Unix versions). This move provides a common standardized
language for all platforms - DOS, Windows, Unix etc. This reduces maintenance costs, increases
portability, and renders implementation of client-server architecture easy. No conversion is needed
when moving from CDS/ISIS DOS to CDS\ISIS for Windows. Same database and inverted files of
DOS can be used here. Some changes in formatting language and displays however occur
(Vyasamurthy, 2001). It includes all the features of the MS-DOS version except some database
utilities such as the database re- initialization. It is designed for current MS-DOS users who wish
to migrate to the Windows environment, as well as for new users
The ISIS for Windows (WINISIS) plays an important role for automation of library operations in
developing countries like India because of its easy-to-use features, convenient availability,
negligible cost of implementation, continuous development and support from UNESCO, and a
large user community. Recent developments in WINISIS, such as web-enabled interface, tools for
data conversions into bibliographic standards and handling of digital documents, have made it a
potential tool for development and management of digital libraries.
Due to fast expansion of higher education in India in the recent years, a large number of new and
established institutions are embarking upon implementation of ICT for provision of library and
information services. There is also increasing interest among information professionals to use
open source information processing tools, such as WINISIS, Greenstone, DSpace, EPrint, etc.
However, limited training opportunities in non-metropolis are an impediment to the spread of
these tools. About 30 informational professionals and 5 trainers were trained during the workshop
at Thapar University, which attempted to fulfill this need of library and information community.
The objective of the workshop was to equip existing and potential users of WINISIS with skills in
the advanced features of the software, such as hyper-linking, web interfacing, full text document
processing and exchange of data.
The format of the workshop was designed to offer a flexible learning environment that included
lecture demonstration, group activities, visits/access to library databases for live demonstration
and extensive practical training. WINISIS and other supporting products were distributed to the
participants.
Self Assessment
State whether the following statements are true or false:
5. Winisis, the window version first demonstrated in 1995, may run on a single computer or
in a local area network.
6. Browse menu is the bottom part of the menu normally contains the list of the most recently
opened databases.
3.5 Summary
· The SOUL is state-of-the-art library automation software designed and developed by the
INFLIBNET.
· Catalogue Process function allows to pick-up the accessioned item, under process, for the
cataloguing purpose.
Notes · Transactions mean handling all major functions such as issue, return, renewal, reservation,
recall or reminder of an item, etc.
· This module allows one to create an exclusive database for different serials.
· Check-in is crucial function to record the receipt of each issue of serial and its accompany-
ing material.
· Reports are a comprehensive function, which has more than 15 built-in reports of all types
with different combinations.
3.6 Keywords
SOUL : State of art library software designed and developed by INFLIBNET.
IIL : Interlibrary loan is a service whereby a user of one library can
borrow books or receive photocopies of documents that are owned
by another library.
OPAC : Online public Access catalogue is an online data base of materials
held by a library or group of libraries.
Retrospective conversion : Retrospective conversion is the process by which existing hard-copy
catalogues and lists, whether on paper or cards are converted into
machine readable form.
Books Harris, Michael H. History of Libraries in the Western World. 4th ed. Lanham,
Maryland: Scarecrow, 1995. 3 - The distinction between a library and an archive is
relatively modern.
Cossette, Andre Humanism and Libraries: An Essay on the Philosophy of
Librarianship. Duluth, MN: Library Juice Press, 2009. Print.
Martin Schrettinger (1803): Versuch eines volltsändigen Lehrbuches der
Bibliothek-Wissenschaft. Munich.
Notes
Unit 4: Database
CONTENTS
Objectives
Introduction
4.1 Concept of Database
4.2 Evolution of Database and DBMS Technology
4.3 General-Purpose of DBMS
4.4 Database Approach
4.5 Summary
4.6 Keywords
4.7 Review Questions
4.8 Further Readings
Objectives
After studying this unit, you will be able to:
· Discuss the concept of database
· Describe about the evolution of database and DBMS technology
· Explain the general-purpose DBMS.
Introduction
A database is an organized collection of data for one or more purposes, usually in digital form. The
data are typically organized to model relevant aspects of reality (for example, the availability of
rooms in hotels), in a way that supports processes requiring this information (for example, finding
a hotel with vacancies).
Notes The term “database” refers to logical and physical materialization of its data, content,
in files, computer memory, and computer data storage.
This definition is very general, and is independent of the technology used. However, not every
collection of data is a database; the term database implies that the data is managed to some level
of quality (measured in terms of accuracy, availability, usability, and resilience) and this in turn
often implies the use of a general-purpose Database management system (DBMS). A general-
purpose DBMS is typically a complex software system that meets many usage requirements, and
the databases that it maintains are often large and complex.
The term database is correctly applied to the data and data structures, and not to the DBMS which is
a software system used to manage the data. The structure of a database is generally too complex to
be handled without its DBMS, and any attempt to do otherwise is very likely to result in database
corruption. DBMSs are packaged as computer software products. Well-known products include
the Oracle DBMS, Access and SQL Server from Microsoft, DB2 from IBM and the Open source DBMS
MySQL. Each such DBMS product currently supports many thousands of databases all over the
world. The stored data in a database is not generally portable across different DBMS, but can inter-
operate to some degree (while each DBMS type controls a database of its own database type) using
standards like SQL and ODBC. A successful general-purpose of DBMS is designed in such a way that
it can satisfy as many different applications and application designers as possible. A DBMS also needs
Notes to provide effective run-time execution to properly support (e.g., in terms of performance, availability,
and security) as many end-users (the database’s application users) as needed. Sometimes, the
combination of a database and its respective DBMS is referred to as a Database system (DBS).
A database is typically organized according to general Data models that have been evolved since
the late 1960s. Notable data modules are the Relational model (all the DBMS types listed above
support databases-based on this model), the Entity-relationship model (ERM; primarily utilized
to design databases), and the Object model (which has more expressive power than the relational,
but is more complicated and less commonly used). Some recent database products use XML as
their data model. A single database may be viewed for convenience within different data models
that are mapped between each other (e.g., mapping between ERM and RM is very common in the
database design process, and supported by many database design tools, often within the DBMS
itself). Many DBMSs support one data model only, externalized to database developers, but some
allow different data models to be used and combined.
The design and maintenance of a complex database requires special skills: the staff performing this
function are referred to as database application programmers (different from the DBMS developers/
programmers) and database administrators, and their task is supported by tools provided either
as part of the DBMS or as free-standing (stand-alone) software products. These tools include
specialized Database languages including Data Description Languages, Data Manipulation
Languages, and Query Languages. These can be seen as special-purpose programming languages,
tailored specifically to manipulate databases; sometimes they are provided as extensions of existing
programming languages, with added special database commands. Database languages are generally
specific to one data model, and in many cases they are specific to one DBMS type. The most widely
supported standard database language is SQL, which has been developed for the relational model
and combines the roles of Data Description Language, Data manipulation language, and a Query
language.
A way to classify databases involves the type of their contents, for example: bibliographic, document-
text, statistical, multimedia objects, etc. Another way is by their application area, for example:
Accounting, Music compositions, Banking, Manufacturing, Insurance, etc.
The explanation is carried out by demonstrating examples of various database types, describing
the motivation for developing the database concept since the 1960s, outlining major requirements
that databases typically need to meet, and then major functional topics of databases. Database
management systems (DBMSs), is briefly described how needed database requirements are met by
contemporary technology.
No widely accepted exact definition exists for DBMS. However, a system needs to provide Notes
considerable functionality to qualify as a DBMS. Data collection needs to meet respective usability
requirements (broadly defined by the requirements below) to qualify as a database.
Did u know? The Oxford English dictionary cites a 1962 technical report as the first to use the
term “database.”
Self Assessment
Fill in the blanks:
1. An organized collection of data for one or more purposes, usually in digital form is called
.................... .
2. SQL stands for .................... .
Notes The rigidity of the relational model has a limitation in handling information that is
richer or more varied in structure than the traditional ‘ledger-book’ data of corporate
information systems.
Notes for example, document databases, engineering databases, multimedia databases, or databases
used in the molecular sciences. Various attempts have been made to address this problem, many
of them gathering under banners such as post-relational or NoSQL. Two developments of note are
the Object database and the XML database. The vendors of relational databases have fought off
competition from these newer models by extending the capabilities of their own products to
support a wider variety of data types.
People Involved
Three types of people are involved with a general-purpose DBMS:
1. DBMS developers - These are the people that design and build the DBMS product, and the
only ones that touch its code. They are typically the employees of a DBMS vendor
(e.g., Oracle, IBM, Microsoft, or volunteers or supported by interested companies or organi-
zations in the case of Open source DBMSs (e.g., MySQL). They are typically skilled system
programmers. DBMS development is a complicated task, and some of the popular DBMSs
have been under development and enhancement (also to follow progress in technology)
for decades.
2. Application developers and Database administrators - These are the people who design
and build an application which is used in the DBMS. Another group of members design the
needed database and maintain it. The first group members write the needed application
programmes which the application comprises. Both are well familiar with the DBMS prod-
uct and use its user interfaces (as well as usually other tools) for their work. Sometimes the
application itself is packaged and sold as a separate product, which may include the DBMS
inside (subject to proper DBMS licensing), or sold separately as an add-on to the DBMS.
3. Application’s end-users (e.g., accountants, insurance people, medical doctors, etc.) - These people
know the application and its end-user interfaces, but he need not know and to understand the
underlying DBMS. Thus the intended and main beneficiaries of a DBMS, are only indirectly
involved with it.
Database Definition
The major problem one faces in the study of database technology relates to the determination as to
what precisely constitutes a database. The casual use of the term database tends to refer to any
organised collection of data capable of being accessed by a computer. This could be applied to a
couple of reels of magnetic tape or a few boxes of punched cards (obsolete now) or a collection of
floppies containing data. As such, this interpretation does not constitute a precise definition for the
concept.
Notes The literature published on the subject of databases in the field of library and information science
tends to focus on the use of online search services and searching techniques. There is not much
clearly identifiable literature on the creation and management of textual databases covering the
procedural aspects of building and managing information packages consisting largely bibliographic
information. This section outlines the concept of database, issues related to its need and its
composition.
Database Features
One of the main purposes of a database is that the data in the database should be used for a variety
of different applications. To achieve this it is important for a database to possess the following
features:
· it must be substantially non-redundant (that is to say that the database should not have
duplication of data) because duplication of data leads to difficulty in ensuring data consis-
tency, and results in the wastage of storage space:
· it must be program-independent so that the data can be moved or restructured without the
need to make alterations to programs. This concept is known as ‘data independence’;
· it must be capable of being used by all programs;
· it must include all necessary data relationships, to support the variety of different uses to Notes
which data is put;
· it must have common approach to retrieval, additions and deletions and amendments to
data.
Notes A database can be analysed from two viewpoints: The physical storage of the data or
logical or conceptual view of data.
Files are used to physically store data in a database. Most databases use either direct files or
indexed files or a combination of the both to physically store data on disk. Users and applications
do not need to know anything about the physical data storage. Stored with actual data will be a
description of the database, which enables the DBMS to retrieve information from the database
and to store new data in appropriate places in the database establishing relationships with other
data if relevant.
The logical or conceptual database is concerned with how the data is logically organised and how
the data can be retrieved for information purposes. In case access is required to a series of linked
files, it is necessary to have guidelines regarding allocation of data to specific files within the
database system, and defining the optimum links between files. Based on the model followed for
the structuring of data there are three basic types of databases and the associated DBMS namely:
hierarchical, network and relational.
Hierarchical databases are structured in such a way that the relationships between data items follow
a branching tree-type arrangement. In other words, the database consists of elements, which act, in
a parent-child relationship. The relationships within the database are established when the database
is created, that is to say that the database designer defines which is a child element of the parent
element. An element within a database can have only one parent element. The data stored in the
lower levels of a hierarchy database can only be accessed through the parent element.
The network database approach is based on explicit links or pointers between related entities. In a
network model of database, there is more direct link between the data items at various levels. This
is achieved by the use of pointers linking data at different levels. This approach requires a large
number of links established between data elements, which occupy a large amount of storage space.
Relational databases use a type of data structure, which has been commonly adopted in database
systems. In relational database systems, information is held in a set of relations or in the form of
tables. Rows in such tables correspond to records while columns in these tables are equivalent to
fields. The data items in various relations are linked through a series of keys. Relational databases
are designed using a technique known as ‘normalisation’. ‘Normalisation’ is used to break data
into tables so that the fields in each table are dependent only on one key field and not linked to any
other key. This process ensures that insertions, deletions and amendments may be made on to the
data without any difficulty.
In addition to the above-discussed types of databases, other types of database structures such as
multimedia databases and object oriented databases are also in existence. Multimedia structures
are used to manage such databases, which deal with pictures, animation, sound and text as well as
tables. The storage needs of these materials are certainly different from the types discussed earlier.
The Multi Media DBMS (MM-DBMS) attempts to use a range of technologies like relational
technology for tables, image storage devices for graphics and animation, and provide facilities to
the users.
Types of Databases
There are many ways of categorising databases. One of the categorisations might be a numerical
and textual database. Another way of looking at them is by their coverage i.e., local, regional and
global. Databases are generally stored on magnetic or optical media such as disks and accessed
Notes either locally or remotely. They may include access to a particular organisation’s database covering
transactions and financial records, or to other databases that might be accessed remotely. Some of
these databases may hold publicly accessible information such as abstracting and indexing databases,
full texts of reports or directories, etc., on the other hand, their might be databases which are
shared within an organisation or group of organisations.
Did u know? Databases available to information users in the public domain and which
might be accessed remotely or online via some online search services, or
locally on CD-ROM, can be categorised as Reference or Source databases.
Reference databases direct the user to another source where the information sought by the user is
available. This might be a document, an organisation or an individual. Some of the examples
include: bibliographic databases, catalogue databases and referral databases. Let us try to know
what these categories of databases are.
Catalogue Databases
These types of databases indicate the collection of a given library or a group of libraries Constituting
a library network. These databases list the type of collection, namely, monographs, journal titles
and other items possessed by the library. They merely provide citations to the documents along
with their call numbers to enable easy location of the documents.
Referral Databases
This type of databases offers references to information or data such as names and addresses of
organisations, and other directory type of data.
It may be mentioned here that source databases contain the original source data, and are considered
as one type of electronic document. After successful consultation of a source database, the user
should have the information that is required by him and should not need to seek information in
another original source. Source databases may be categorised into:
· numeric databases, which contain numerical data of different types such as statistics and
survey data;
· full text databases of news paper items, technical specifications and computer software;
· hybrid databases which contain a mixture of textual and numeric data;
· multi-media databases, which include information stored in a mixture of different types of
media including sound, video, pictures, text and animation.
Bibliographic Databases
These types of databases contain citations or bibliographic references sometimes along with brief
abstracts of literature. They indicate to the user the content of the full text, the source where it can
be located (e.g., journal title, conference proceedings) and whether they contain mere citations or
provide abstracts or summaries of the original documents covered.
Bibliographic databases, contain a series of bibliographic records, with each record containing
some combination of the under mentioned components:
· document number
· author
· title
· source reference
· abstracts Notes
· full text
· indexing terms or keywords or phrases
· citations including the total number of references
· language of the document
· call number or location
Each of these items is known as a data element and is represented by a field. There are different
bibliographic record formats and there is considerable variation between them. It may be mentioned
here that the components listed above do not generally (except in case of those containing abstracts)
give information of the text of the document but only indicate where the information might be
found. Of course, a good informative abstract, if provided for each reference may furnish valuable
information to the user and enhance the utility of the database.
Database Architechture
The architecture of a database is commonly viewed in terms of three separate levels of description:
conceptual, external and internal.
The overall logical description of the entire database is the conceptual level. This overall description
is commonly known as a schema. It may also be called a community user view. Subsets of the
schema that contain only the data needed for particular applications may be defined. These are
called sub-schemas or user views. The sub-schemas provide a description at the external level. The
description of physical storage structures used to store database on a specific computer system is
the internal description.
Explained in simple language, it might be stated that a database can be analysed from two view-
points—the physical storage of the data and the logical or conceptual view of data. Files are used
to physically store data in a database. Most databases use either direct files or indexed files or a
combination of the two to physically store data on a disk.
The logical or conceptual view of a database is concerned with how data is logically organised and
how data can be retrieved for information purposes. There are three different methods (architectures)
of logically organising data in a database. They are hierarchy model, network model and relational
model.
Notes 4. Sharing of data: In database systems, the data is centrally controlled and can be shared by all
authorized users. The sharing of data means not only the existing applications programs
can also share the data in the database but new application programs can be developed to
operate on the existing data. Furthermore, the requirements of the new application pro-
grams may be satisfied ‘without creating any new file.
5. Enforcement of standards: In database systems, data being stored at one central place, stan-
dards can easily be enforced, by the DBA. This ensures standardised data formats to facili-
tate data transfers between systems. Applicable standards might include any or all of the
following—departmental, installation, organizational, industry, corporate, national or
international.
6. Improved data integrity: Data integrity means that the data contained in the database is both
accurate and consistent. The centralized control property allow adequate checks can be
incorporated to provide data integrity. One integrity check that should be incorporated in
the database is to ensure that if there is a reference to certain object, that object must exist.
7. Improved security: Database security means protecting the data contained in the database
from unauthorised users. The DBA ensures that proper access procedures are followed,
including proper authentical schemes for access to the DBMS and additional checks before
permitting access to sensitive data. The level of security could be different for various
types of data and operations.
8. Data access is efficient: The database system utilizes different sophisticated techniques to
access the stored data very efficiently.
9. Conflicting requirements can be balanced: The DBA resolves the conflicting requirements of vari-
ous users and applications by knowing the overall requirements of the organization. The DBA
can structure the .system to provide an overall service that is best for the organization.
10. Improved backup and recovery facility: Through its backup and recovery subsystem, the data-
base system provides the facilities for recovering from hardware or software failures. The
recovery subsystem of the database system ensures that the database is restored to the state
it was in before the program started executing, in case of system crash.
11. Minimal program maintenance: In a traditional file system, the application programs with the
description of data and the logic for accessing the data are built individually. Thus, changes
to the data formats or access methods results in the need to modify the application pro-
grams. Therefore, high maintenance effort are required. These are reduced to minimal in
database systems due to independence of data and application programs.
12. Data quality is high: The quality of data in database systems are very high as compared to
traditional file systems. This is possible due to the presence of tools and processes in the
database system.
13. Good data accessibility and responsiveness: The database systems provide query languages or
report writers that allow the users to ask ad hoc queries to obtain the needed information
immediately, without the requirement to write application programs (as in case of file
system), that access the information from the database. This is possible due to integration
in database systems.
14. Concurrency control: The database systems are designed to manage simultaneous (concur-
rent) access of the database by many users. They also prevents any loss of information or
loss of integrity due to these concurrent accesses.
15. Economical to scale: In database systems, the operational data of an organization is stored in
a central database. The application programs that work on this data can be built with very
less cost as compared to traditional file system. This reduces overall costs of operation and
management of the database that leads to an economical scaling.
16. Increased programmer productivity: The database system provides many standard functions
that the programmer would generally have to write in file system, The availability of these
functions allow the programmers to concentrate on the specific functionality required by the
users without worrying about the implementation details. This increases the overall produc-
tivity of the programmer and also reduces the development time and cost.
In contrast to many advantages of the database systems, there are some disadvantages as well. The
disadvantages of a database system are as follows:
1. Complexity increases: The data structure may become more complex because of the centralised
database supporting many applications in an organization. This may lead to difficulties in
its management and may require professionals for management.
2. Requirement of more disk space: The wide functionality and more complexity increase the size
of DBMS. Thus, it requires much more space to store and run than the traditional file system.
3. Additional cost of hardware: The cost of database system’s installation is much more. It de-
pends on environment and functionality, size of the hardware and maintenance costs of
hardware.
4. Cost of conversion: The cost of conversion from old file-system to new database system is
very high. In some cases the cost of conversion is so high that the cost of DBMS and extra
hardware becomes insignificant. It also includes the cost of training manpower and hiring
the specialized manpower to convert and run the system.
5. Need of additional and specialized manpower: Any organization having database systems, need
to be hire and train its manpower on regular basis to design and implement databases and
to provide database administration services.
6. Need for backup and recovery: For a database system to be accurate and available all times, a
procedure is required to be developed and used for providing backup copies to all its users
when damage occurs.
7. Organizational conflict: A centralised and shared database system-requires a consensus on
data definitions and ownership as well as responsibilities for accurate data maintenance.
8. More installational and management cost: The big and complete database systems are more
costly. They require trained manpower to operate the system and has additional annual
maintenance and support costs.
Databases
A user seeks information to satisfy his or her information need which may be available in varieties
of documents stored a library/information centre. Library catalogues (both card catalogue and
OPAC) and other bibliographic databases act as an interface between users and their documents of
interest. Users approach to the documents, that can satisfy his/her information need, can be
categorised into two groups [Bhattacharya, 1979]-Known document approach and Unknown
document approach. In the first, case, user can specify a document by using the name(s) of its
author(s), or collaborator(s), or series, or by its title. When the query for the document is formulated
by using the name-of-subject contained in it, the approach is termed as unknown document
approach. The treatment of a document as unknown document in catalogues or bibliographic
databases requires subject description and bibliographic description. Similarly, the treatment of a
document to satisfy known document approach calls for bibliographic description and headings
or access points derived from bibliographic description. Bibliographic description is the process
of recording details for describing and identifying bibliographic items. The process of bibliographic
description requires standardisation, for making bibliographic file to be consistent. The
development of national, international and regional systems for the exchange of machine readable
bibliographic information will not be possible unless a high level of standardisation is attained. A
standard related to bibliographic description is a set of general rules agreed to internationally or
nationally. The practice of standard bibliographic description in the development of library
catalogues and bibliographic databases requires a series of operations. The identification of these
unit operations leads to the formulation of principles of bibliographic description and general
rules of procedures. The principles and general rules of bibliographic description provide a scientific
basis to the field of cataloguing and to the creation of bibliographic records. The application of ICT
to the cataloguing process has brought with it demands for precision and logic in the recording of
Notes bibliographic data. For bibliographic control, the first principle is standardisation, compatibility
and integration. Within the same principle standards may vary. Easy interchange of bibliographic
records requires agreement on standards governing the medium of exchange.
Bibliographic data are generated by bibliographers, cataloguers, abstractors and indexers, publishers
and booksellers and appear in a range of products, including but not limited to library catalogues,
online databases, publishers and booksellers lists, abstracting and indexing services and
bibliographies. The nature of bibliographic and cataloguing data appears to be identical, but
bibliographic data have an independent existence and need separate consideration. Cataloguing,
in fact, is one of the many applications of bibliographic data management. Haggler and Simmons
[1982] define bibliographic data as “elements of information, which help to identify a piece of
recorded communication as a physical object”. They identified three types of functional data
groups:
· Data that uniquely identify a particular document and distinguish it from others;
· Data, which reveal an association of two or more documents (e.g., common authorship,
continuation or reprint); and
· Data, which describe some characteristics of the intellectual content of a document (e.g.,
statement of subject).
Self Assessment
State whether the following statements are true or false:
5. Cost of conversion is the advantage program of a database system.
6. Bibliographic record should be constructed according to the agreed rules and standards.
4.6 Keywords
SQL : Structured Query Language is an standard language for manipulations.
DBMS : A Database Management System (DBMS) is a software package with computer
programs that control the creation, maintenance, and use of a database.
ERM : Entity-Relationship Modeling (ERM) is a database modeling method, used to
produce a type of conceptual schema or semantic data model of a system, often
a relational database, and its requirements in a top-down fashion.
Normalization : Database Normalization is the process of organizing the fields and tables of a
relational database to minimize redundancy and dependency. It usually involves
dividing large tables into smaller (and less redundant) tables and defining
relationships between them.
Notes
Unit 5: Types of Database
CONTENTS
Objectives
Introduction
5.1 Types of Database
5.2 Database Architecture
5.3 Bibliographic Database
5.4 Summary
5.5 Keywords
5.6 Review Questions
5.7 Further Readings
Objectives
After studying this unit, you will be able to:
· Describe the various types of database
· Discuss about the database architecture
· Explain the bibliographic database.
Introduction
An organized collection of data for one or more purposes, usually in digital form is called database.
A database is typically organized according to general data models that have been evolved the late
1980s. A way to classify data base involves the type of their contents, for e.g., bibliographic,
document text, statistical, multimedia objects etc. The explanation is carried out by demonstrating
various types of database.
Some of the database types are described in detail.
Active Database
An active database is a database that includes an event-driven architecture which can respond to
conditions both inside and outside the database. Possible uses include security monitoring, alerting,
statistics gathering and authorization. Most modern relational databases include active database
features in the form of database trigger.
Analytical Database
Analysts may do their work directly against a data warehouse or create a separate analytic database
for Online Analytical Processing (OLAP). For example, a company might extract sales records for
analyzing the effectiveness of advertising and other sales promotions at an aggregate level.
Distributed Database
Usually Distributed database refers to spatial distribution of a database and possibly the DBMS
over computers and sometimes over different sites.
Examples are databases of local work-groups and departments at regional offices, branch offices,
manufacturing plants and other work sites.
Notes Distributed databases can include segments of both common operational and common
user databases, as well as data generated and used only at a user’s own site.
Document-oriented Database
Utilized to conveniently store, manage, edit and retrieve documents.
End-user Database
These databases consist of data developed by individual end-users. Examples of these are collections
of documents, spreadsheets, presentations, multimedia, and other files. Several products exist to
support such databases. Some of them are much simpler than full fledged DBMSs, with more
elementary DBMS functionality (e.g., not supporting multiple concurrent end-users on a same database),
with basic programming interfaces, and a relatively small “foot-print” (not much code to run as in
“regular” general-purpose databases). The general-purpose DBMSs can be used for such purpose
using basic user-interface subsets for basic database operations, while still enjoying the database
protections that these DBMSs can provide.
External Database
These databases contain data collected for use across multiple organizations, either freely or via
subscription. The Internet Movie Database is one example.
Graph Database
A graph database is a kind of NoSQL database that uses graph structures with nodes, edges, and
properties to represent and store information. General graph databases that can store any graph
are distinct from specialized graph databases such as triple stores and network databases.
Hypermedia Databases
The World Wide Web can be thought of as a database, albeit one spread across millions of
independent computing systems. Web browsers “process” this data one page at a time, while Web
crawlers and other software provide the equivalent of database indexes to support search and Notes
other activities.
In-memory Database
An in-memory database (IMDB; also main memory database or MMDB) is a database that primarily
resides in main memory, but typically backed-up by non-volatile computer data storage.
Accessing data in memory reduces the I/O reading activity and response time is critical, such as
telecommunications network equipment, main memory databases are often used.
Did u know? Main memory databases are faster than disk databases.
Operational Database
These databases store detailed data about the operations of an organization. They are typically
organized by subject matter, process relatively high volumes of updates using transactions.
Essentially every major organization on the earth uses such databases. Examples include customer
databases that record contact, credit, and demographic information about a business’ customers,
personnel databases that hold information such as salary, benefits, skills data about employees,
Enterprise resource planning that record details about product components, parts inventory, and
financial databases that keep track of the organization’s money, accounting and financial dealings.
Functional Requirements
Certain general functional requirements need to be met in conjunction with a database. They
describe what is needed to be defined in a database that supports any specific application.
Describing Processes that use the Data: Workflow and Business Process
Modeling
Manipulating database data often involves processes of several interdependent steps, at different
times (e.g., when different people’s interactions are involved; e.g., generating an insurance policy).
Data manipulation languages are typically intended to describe what is needed in a single such
step. Dealing with multiple steps typically requires writing quite complex programs. This area
has evolved in the frameworks of workflow and business processes with supporting languages
and software packages. Traditionally these frameworks have been out of the scope of common
DBMSs, but utilization of them has become common-place, and often they are provided as add-
on’s to DBMSs.
Operational Requirements
Operational requirements are needed to be met by a database in order to effectively support an
application. Though it may be expected that operational requirements are automatically met by a
DBMS, in fact it is not so for most of them: To be met substantial work of design and tuning is
needed by database administrators. It is typically done through special database user interfaces
and tools, and thus may be viewed as secondary functional requirements (but not less important
than the primary).
Availability
A DB should maintain needed levels of availability, i.e., the DB needs to be available in a way that
a user’s action does not need to wait beyond a certain time range before starting executing upon
the DB. Availability also relates to failure and recovery from it (see Recovery from failure and
disaster below): Upon failure and during recovery normal availability changes and special
measures are needed to satisfy availability requirements.
Performance
Users’ actions upon the DB should be executed within needed time ranges.
repair it without special measures. The DBMS should provide automatic recovery from failure Notes
procedures that repair the DB and return it to a well defined state.
A different type of failure is due to a disaster, either by Nature (e.g., Earthquake, Flood, and
Tornado) or by Man (e.g., intentional physical systems’ sabotage, destructive acts of war). Recovery
from disasters (Disaster recovery), which typically incapacitate whole computer systems beyond
repair (and different from software failure or hardware component failure) requires special
protecting means.
Self Assessment
Fill in the blanks:
1. .................... Archive data from operational databases and often from external sources such
as market research firms.
2. Databases store detailed data about the operations of an organization is called ............. .
3. The database needs .................... to protect its content from dangers of unauthorized users.
Notes operational matters. It deals with storage layout of the conceptual level, provides supporting
storage-structures like indexes, to enhance performance, and occasionally stores data of
individual views (materialized views), calculated from generic data, if performance
justification exists for such redundancy. It balances all the external views’ performance
requirements, possibly conflicting, in attempt to optimize the overall database usage by
all its end-uses according to the database goals and priorities.
All the three levels are maintained and updated according to changing needs by database
administrators who often also participate in the database design.
The above three-level database architecture also relates to and being motivated by the concept of
Data independence which has been described for long time as a desired database property and was
one of the major initial driving forces of the Relational model. In the context of the above architecture
it means that changes made at a certain level do not affect definitions and software developed with
higher level interfaces, and is being incorporated at the higher level automatically. For example,
changes in the internal level do not affect application programs written using conceptual level
interfaces, which saves substantial change work that would be needed otherwise.
On one hand it provides a common view of the database, independent of different external view
structures, and on the other hand it is uncomplicated by details of how the data is stored or
managed (internal level). In principle every level, and even every external view, can be presented
by a different data model. In practice usually a given DBMS uses the same data model for both the
external and the conceptual levels (e.g., relational model). The internal level requires a different
level of detail and uses its own data structure types, typically different in nature from the structures
of the external and conceptual levels which are exposed to end-users (e.g., the data models above):
While the external and conceptual levels are focused on end-user applications, the concern of the
internal level is effective implementation details.
Access Control
Database access control deals with controlling who (a person or a certain computer program) is
allowed to access what information in the database. The information may comprise specific database
objects (e.g., record types, specific records, data structures), certain computations over certain
objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g.,
using specific indexes or other data structures to access information).
Database access controls are set by special an authorized (by the database owner) personnel that
uses dedicated protected security DBMS interfaces.
Database Design
Database design is done before building it to meet needs of end-users within a given application/
information-system that the database is intended to support. The database design defines the
needed data and data structures that such a database comprises. A design is typically carried out
according to the common three architectural levels of a database (see Database architecture above).
First, the conceptual level is designed, which defines the over-all picture/view of the database,
and reflects all the real-world elements (entities) the database intends to model, as well as the
relationships among them. On top of it the external level, various views of the database, are
designed according to (possibly completely different) needs of specific end-user types. More
external views can be added later. External views requirements may modify the design of the
conceptual level (i.e., add/remove entities and relationships), but usually a well designed conceptual
level for an application well supports most of the needed external views. The conceptual view also Notes
determines the internal level (which primarily deals with data layout in storage) to a great extent.
External views requirement may add supporting storage structures, like indexes, for enhanced
performance. Typically the internal layer is optimized for top performance, in an average way
that takes into account performance requirements (possibly conflicting) of different external views
according to their relative importance. While the conceptual and external levels design can usually
be done independently of any DBMS (DBMS-independent design software packages exist, possibly
with interfaces to some specific popular DBMSs), the internal level design highly relies on the
capabilities and internal data structure of the specific DBMS utilized.
A common way to carry out conceptual level design is to use the Entity-relationship model (ERM)
(both the basic one, and with possible enhancement that it has gone over), since it provides a
straightforward, intuitive perception of an application’s elements. An alternative approach, which
preceded the ERM, is using the Relational model and dependencies (mathematical relationships)
among data to normalize the database, i.e., to define the (“optimal”) relations (data tupple types)
in the database. Though a large body of research exists for this method it is more complex, less
intuitive, and not more effective than the ERM method. Thus normalization is less utilized in
practice than the ERM method.
Another aspect of database design is its security. It involves both defining access control to database
objects (e.g., Entities, Views) as well as defining security levels and methods for the data itself (See
Database security above).
Database Normalization
In the design of a relational database, the process of organizing database relations to minimize
redundancy is called normalization. The goal is to produce well-structured relations so that additions,
deletions, and modifications of a field can be made in just one relation (table) without worrying
about appearance and update of the same field in other relations. The process is algorithmic and
based on dependencies (mathematical relations) that exist among relations’ field types. The process
results in bringing the database relations into a certain “normal form”. Several normal forms exist
with different properties.
Notes application’s data structures may be changed or added, new related application programs may be
written to add to the application’s functionality, etc.
Database Storage
Database storage is the container of the physical materialization of a database. It comprises the
Internal (physical) level in the Database architecture. It also contains all the information needed
(e.g., metadata, “data about the data”, and internal data structures) to reconstruct the Conceptual
level and External level from the Internal level when needed. Though typically accessed by a
DBMS through the underlying Operating system (and often utilizing the operating systems’ File
systems as intermediates for storage layout), storage properties and configuration setting are
extremely important for the efficient operation of the DBMS, and thus are closely maintained by
database administrators. A DBMS, while in operation, always has its database residing in several
types of storage (e.g., Computer memory and external Computer data storage, as dictated by
contemporary computer technology. The database data and the additional needed information are
coded into bits, possibly in very large amounts. Data typically reside in the storage in structures
that look completely different from the way the data look in the conceptual and external levels,
but in ways that attempt to optimize (the best possible) these levels’ reconstruction when needed
by users and programs, as well as for computing additional types of needed information from the
data (e.g., when querying the database).
In principle the database storage (as computer data storage in general) can be viewed as a linear
address space (a tree-like is a more accurate description), where every bit of data has its unique
address in this address space. Practically only a very small percentage of addresses is kept as initial
reference points (which also requires storage), and most of the database data is accessed by
indirection using displacement calculations (distance in bits from the reference points) and data
structures (see below) which define access paths (using pointers) to all needed data in effective
manner, optimized for the needed data access operations.
Database Security
Database security denotes the system, processes, and procedures that protect a database from
unauthorized activity.
DBMSs usually enforce security through access control, auditing, and encryption:
· Access control manages who can connect to the database via authentication and what they
can do via authorization.
· Auditing records information about database activity: who, what, when, and possibly
where.
· Encryption protects data at the lowest possible level by storing and possibly transmitting
data in an unreadable form. The DBMS encrypts data when it is added to the database and
decrypts it when returning query results. This process can occur on the client side of a
network connection to prevent unauthorized access at the point of use.
Notes There are many databases available in the market. The most popular are the Oracle
and SQL Server.
The Oracle database is from the Oracle Corporation and the SQL Server is from the Microsoft
Corporation. There are freely available database like MySQL. These are open source databases.
Database Management Systems are available for personal computers and for huge systems like Notes
mainframes.
Structured Query Language is used for querying the databases. Variations of this structured query
language in the form of T-SQL and PL-SQL are available. The data that is available in the database
is represented in various formats. Usually a report writer’s programme is bundled with the
database for generating reports. Crystal reports is one such application that is bundled with SQL
Server 2000 and later versions of it. These report generating programme makes it easy for generating
any kind of report-based on the data that is available in the database. Graphics components are
also available in the database management systems to generate reports in the form of charts and
graphs.
Products like Quest can be used in conjunction with your database to get more out of your database.
The database quality and performance can be improved by using the productivity tools provided
for the DBAs by Quest. This product enables to develop and test SQL code for optimum quality and
performance for an application before it ever reaches the production environment. Business
threatening performance issues before they reach the end user level are detected and diagnosed.
These issues are resolved as early as possible without interrupting the business. Monitoring,
diagnostics, tuning, space management and high availability are the solutions that are provided
by Quest like products. Automation and enforcement of business processes are done by using
these products. Impact analysis, patch management, version control, audit trial documentation
and migration support are available in most of the database management products.
Self Assessment
Multiple choice questions:
4. ERM stands for:
(a) Entity Relationship Model (b) Entry Record model
(c) Entry Relationship Mechanism (d) Entry Relationship Manual.
5. SQL data base is from .................... corporation.
(a) Microsoft (b) IBM (c) Oracle (d) All of these.
6. .................... is the container of the physical materialization of a database.
(a) Database storage (b) Database management
(c) Database security (d) Data store.
Notes Many bibliographic databases evolve into digital libraries, providing the full-text of the indexed
contents. Others converge with non-bibliographic scholarly databases to create more complete
disciplinary search engine systems, such as Chemical Abstracts or Entrez.
Self Assessment
State whether the following statements are true or false:
7. A bibliographic database is a database of bibliographic records, an organized digital col-
lection of references to published literature, including journal and newspaper articles,
conference proceedings etc.
8. A bibliographic database may be general in scope or cover a specific academic discipline.
5.4 Summary
· An active database is a database that includes an event-driven architecture which can
respond to conditions both inside and outside the database.
· Analysts may do their work directly against a data warehouse or create a separate analytic
database for Online Analytical Processing (OLAP).
· Usually Distributed database refers to spatial distribution of a database and possibly the
DBMS over computers and sometimes over different sites.
· These databases contain data collected for use across multiple organizations, either freely
or via subscription. The Internet Movie Database is one example.
· A graph database is a kind of NoSQL database that uses graph structures with nodes, edges,
and properties to represent and store information.
· Operational requirements are needed to be met by a database in order to effectively
support an application.
· Database architecture may be viewed, to some extent, as an extension of Data modeling. It
is used to conveniently answer different end-user requirements from a same database.
· Database access control deals with controlling who (a person or a certain computer pro-
gram) is allowed to access what information in the database.
· Database storage is the container of the physical materialization of a database. It comprises
the Internal (physical) level in the Database architecture. It also contains all the informa-
tion needed (e.g., metadata, “data about the data”, and internal data structures) to recon-
struct the Conceptual level and External level from the Internal level when needed.
· A bibliographic database may be general in scope or cover a specific academic discipline.
A significant number of bibliographic databases are still proprietary, available by licens-
ing agreement from vendors, or directly from the abstracting and indexing services that
create them.
5.5 Keywords
MMDB : Main memory database (MMDB) is a database that primarily resides in main memory.
OLAP : In computing, online analytical processing, (OLAP) is an approach to swiftly
answer multi-dimensional analytical (MDA) queries.
Data Architecture : Database architecture may be viewed, to some extent, as an extension of Data
modeling. It is used to conveniently answer different end-user requirements
from a same database.
Data Modeling : Data modeling in software engineering is the process of creating a data model
for an information system by applying formal data modeling techniques.
Notes
Unit 6: Information and Communications Technology
CONTENTS
Objectives
Introduction
6.1 ICT in Society
6.2 Fundamentals of Communication
6.3 Meaning of Communication
6.4 Importance of Communication
6.5 Fundamentals of Communication Media
6.5.1 Two Wire Open Lines
6.5.2 Twisted-pair Cable
6.5.3 Coaxial Cable
6.5.4 Fiber Optic Cable
6.6 Wireless Communication
6.6.1 Radio Waves
6.6.2 Microwave Towers
6.6.3 Infrared Waves
6.7 Summary
6.8 Keywords
6.9 Review Questions
6.10 Further Readings
Objectives
After studying this unit, you will be able to:
· Discuss ICT in Society
· Describe the fundamentals of Communication
· Define meaning of Communication.
· Explain the importance of communication.
· State about the fundamentals of communication media.
Introduction
Information and communications technology is usually called ICT. It is often used as an extended
synonym for information technology (IT), but is usually a more general term that stresses the role
of unified communications and the integration of telecommunications (telephone lines and wireless
signals), intelligent building management systems and audio-visual systems in modern information
technology. ICT consists of all technical means used to handle information and aid communication,
including computer and network hardware, communication middleware as well as necessary
software. In other words, ICT consists of IT as well as telephone, broadcast media, all types of
audio and video processing and transmission and network-based control and monitoring functions.
The expression was first used in 1997 in a report by Dennis Stevenson to the UK government and
promoted by the new National Curriculum documents for the UK in 2000.
ICT is often used in the context of “ICT roadmap” to indicate the path that an organization will
take with their ICT needs.
The term ICT is now also used to refer to the merging (convergence) of audio-visual and telephone Notes
networks with computer networks through a single cabling or link system. There are large economic
incentives (huge cost savings due to elimination of the telephone network) to merge the audio-
visual, building management and telephone network with the computer network system using a
single unified system of cabling, signal distribution and management. This in turn has spurred the
growth of organizations with the term ICT in their names to indicate their specialization in the
process of merging the different network systems.
“ICT” is used as a general term for all kinds of technologies which enable the users to create access
and manipulate information. ICT is a combination of information technology and communications
technology.
In an increasingly interconnected world, the interactions among devices, systems, and people are
growing rapidly. Businesses need to meet the demands of their employees and customers to allow
for greater access to systems and information. All of these communications needs must be delivered
in a unified way. By offering a scalable infrastructure, cloud computing models enable companies to
work smarter through more agile and cost-effective access to technology and information. This
unified platform reduces costs and boosts productivity across a business and beyond. Part of an
information and communications technology roadmap should involve consolidating
infrastructures, while providing added benefits to users in collaboration, messaging, calendaring,
instant messaging, audio, video, and Web conferencing. Cloud computing is driving more efficient
IT consumption and delivery and taking ICT to the next level.
Notes ICT has made us a global society, where people can interact and communicate swiftly
and efficiently.
ICT has contributed towards the elimination of language barriers. Examples of (ICT) tools are
emails, instant messaging (IM), Chat rooms and social networking websites, such as Facebook and
Twitter, Skype, iPhones, cellular phones and similar applications. A disadvantage is that older
generations find it difficult to keep up with the ever changing technologies available today. The
resistance to change and inability to keep up with rapid technology evolution are areas to note.
Many people in society are not in a position to take advantage of available technology. This may
be due to poverty, geographical location or lack of access to technology.
ICT in Education
In current education systems worldwide, ICTs have not been as extensively implemented as might
be found in other fields, such as business. Reasons for the absence of these technologies in education
vary. Some experts suggest it is the high costs associated with implementing these technologies
that prevents schools from using them in the classroom. Other experts argue that the social nature
of current education systems, which require a substantial amount of personal contact between
teachers and their students, prevents these technologies from being better integrated in the
classroom setting.
Notes Uses
The use of ICTs in education extends beyond classrooms with computers and an Internet connection.
There is a wide variety of ICTs currently available to schools and universities that can be
implemented to enhance students’ overall learning experiences in numerous ways. Those schools
and universities that have implemented ICTs primarily use these technologies to fulfill three
objectives:
· Increase Networking Opportunities: ICTs helps connect schools to other schools, as well as
individuals within those schools to one another. This ability to network is especially
important for students in rural areas and students in developing countries.
· Provide Distance Learning: With the advent of ICTs, learning has become Web-based. As
a result, ICTs have started to replace correspondence schools.
· Supplement Traditional Learning: One of the most common uses of ICTs in education
involves students using software programmes such as Microsoft Word to produce other-
wise traditional written assignments.
Advantages
As with other technologies that have been implemented in education throughout the years, ICTs
offer a number of advantages to both students and educators when successfully integrated into a
learning environment. Some of these advantages include:
· Increased Access to Resources: Unlike the traditional classroom that is locked at the end of the
school day, ICTs allow students to access educational resources from anywhere at any time.
· Interactive Learning Experiences: Many educators deliver information to their students in
the form of lectures. ICTs allow students to access information through videos, podcasts,
and a variety of other interactive media, which creates a more engaging learning experi-
ence for students.
· Student-Centered Learning: In a traditional classroom, students cannot control how
lessons are planned. Through the use of ICTs, students can take control of their learning
experiences. Students can decide when class is in session, as well as how the lesson material
will be presented.
Did u know? Increased access to resources is especially valuable for students with special
needs and those students who live in rural areas or developing countries.
Disadvantages
Although ICTs can enhance student learning in many ways, there are some disadvantages associated
with implementing these sophisticated technologies in schools and universities around the world.
Some of these disadvantages include:
· High Costs: Implementing ICTs in the education setting can be quite costly regarding
updating existing infrastructures, training teachers and developing quality course materials.
To make matters worse, funding for such projects is often scarce.
· Teacher Training: Many teachers are unfamiliar with using ICTs in the classroom and are
resistant to incorporating such technologies into their established pedagogies. To succeed,
the use of ICTs in education needs to be supported by well-trained teachers.
· Uncertain Success Rates: Currently, no large-scale studies have been conducted that show
whether or not the use of ICTs in an educational setting will result in a measurable increase
in individual student achievement, making school administrators hesitant to invest in
these technologies.
Notes
Notes The purpose of most communication is to influence the attitudes and behaviors of
those whom we address.
Since, the human race is composed of billions of individuals, each with a different way of responding,
no one approach is universally effective. So, it is important that learning to express oneself accurately
and in a way that will accomplish one’s purpose towards the individual.
Necessity of Response
The goal of all communication is to obtain the desired response. Communication is not just an act.
It is a process. The process of communication includes transmission of information, ideas, emotions,
skills, and knowledge by using symbols, words, pictures, figures, graphs, or illustrations. The act
Self Assessment
Fill in the blanks:
1. A combination of information technology and communications technology is known as
..................... .
2. E-mails, instant messaging, chat rooms and social networking are the examples of ..................... .
3. A message must be conveyed is a requirement for ..................... .
4. The second basic requirement of the one the one communication is ..................... .
A common language, for instance, does not necessarily bring people together. There are other
factors too at play such as a shared culture and a common interest, which bring about a sense of
commonality and more significantly, a sense of community. Denis McQuail sees ‘human
communication’ in linear terms as the sending of meaningful messages from one person to another.
These messages could be oral or written, visual or olfactory. He also takes such things as laws,
customs, practices, and ways of dressing, gestures, buildings, gardens, military parades, and flags to
be communication.
Thus, ‘communication’ can be defined as ‘the interchange of thoughts or ideas’. Again
‘communication’ is viewed as a transmission of information, consisting of discriminative stimuli,
from a source to recipient’. In everyday life, the communication is a system through which the
messages are sent, and feedback received. It is therefore, the process of transferring particular
information or message from an information source to desired, definite or a particular destination.
One of the main elements of communication messages is perception. The effectiveness of
communication is limited by the receiver’s range of perception. Also, people perceive only what
they expect and understand. Lastly, communication makes a demand on the recipient, in terms of Notes
his emotional preference or rejection. Thus, communication is not to be confused with information.
While information is logical, formal and impersonal, communication is perception.
Communication is more than mere transferring or transmission of ideas or thoughts. It is not a
static act as some of the earlier definitions suggest but it is a dynamic process of action and interaction
towards a desired goal, as suggested by later definitions. Communication is, therefore, a process
of sharing or exchange of ideas, information, knowledge, attitude or feeling among two or more
persons through certain signs and symbols.
The information is shared or exchanged through certain signs or symbols; it could be language, oral or
written. While sharing and exchanging ideas or information with others, we are actually interaction
with people and establishing a kind of relationship that helps us to achieve the task set before us.
Some other functional definitions of communication are:
· ‘The transfer or conveying of meaning’ (Oxford Dictionary)
· ‘One mind affecting another’ (Claude Shannon)
· ‘Transmission of stimuli’ (Colin Cherry)
· ‘One system influences another’ (Charles E. Osgood)
· ‘The mechanism through which human relations exist and develop’ (Wilbur Schramm)
· Communication is the process of transmitting feelings, attitudes, facts, beliefs and ideas
between living beings. (Birvenu)
· Communication is the exchange of meanings between individuals through a common
system of symbols. (I.A.Richards)
· Communication is the sum of all the things one person does when he wants to create
understanding in the mind of another. It is a bridge of meaning. It involves a systematic
and continuous process of telling, listening and understanding. (Louis Allen)
Task State your views how commuication is the process of interchanging thoughts or ideas
between individuals.
Notes
Self Assessment
Multiple choice questions:
5. The act of communication is referred to as:
(a) Transmission (b) Skills
(c) Communications (d) Emotions.
6. Communication is derived from the latin noun......
(a) Community (b) Communis
(c) Communicare (d) Transmission
7. Communication is more than mere transferring or transmission of:
(a) Ideas (b) Thoughts (c) Ideas or Thoughts (d) None of them.
8. Quality of our life will be poor without:
(a) Information (b) Communication
(c) Discussion (d) Entertainment
· The cost of the transmission medium is also one of the important criteria while selecting Notes
the media.
· The speed of transmission varies from one medium to another.
Now, let us discuss the characteristics of each transmission medium along with their uses.
Uses of Two Wire Open Lines. Two wire open lines medium is used for transmitting data to a
short distance. This type of media can transmit data up to 50 meters with speed less than 19200 bps
(bits per second).
Table6.1:
Table Difference between
6.1 Difference betweenUTP
UTPand
andSTP
STPcable.
cable.
Uses of Twisted-paid Cable. Twisted-pair cable is widely used in the telephone networks. Most
PCs were connected to Internet over telephone wires and modems (equipment that convert digital
signals to analog and vice-versa). Modem connections that use standard telephone wire provide
band widths (transmission capacities of communication channels) ranging from 9600 bps to about
56 Kbps, sufficient for ordinary data communications.
There are two types of coaxial cables—Baseband and Broadband. The differences between these
cables are described in table 6.2.
Table6.2:
Table Differences between
6.2Differences between baseband
basebandand
andbroadband
broadbandcables
cables
Baseband Coaxial Cable Broadband Coaxial Cable
1. Baseband coaxial cable is a 50-ohm 1. Broadband coaxial cable is a 75-ohm
cable. cable.
2. It carries only digital signals. 2. It carries only analog signals.
3. It transmits a singles stream of 3. It can transmit many signals
digital data at a time with a very simul-taneously using different
high speed. frequencies.
4. It transmits digital signals at 10 to 80 4. It covers a large area and needs
Mbps depending upon the cable analogamplifiers to straighten the
length. For longer distances, signals signals perio-dically.
need to be amplified periodically.
5. Baseband coaxial cables are often 5. Broadband coaxial cables are tipically
used in local area networks. used for cable television transmissions.
Jacket
Cladding
Core
Sheath
Transmission of Data through Fiber Optic Cables. Twisted-pair and coaxial cables contain copper
conductors and hence data is transmitted through them in the form of electrical signals (streams of
electrons). However, through fiber optical cables, data is transmitted in the form of photons by
following procedure:
(i) Digital electronic pulses at one end of the cable are translated into light pulses either by a
laser or a light-emitting diode.
(ii) The light pulses travel along the core of the fiber and are kept there by the cladding which
reflect the light back to the core.
(iii) When light pulses are reached at the other end of cable, a photo detector transforms the
light pulses back into electrical pulses.
Data can be transmitted between commuters and other electronic devices as electromagnetic
signals through the air or empty space. Such transmission using electromagnetic signals such as
radio waves microwaves or infrared waves is called Wireless communication. Various types of
waves in an electromagnetic spectrum operate at different frequencies of transmission as shown in
figure 6.8.
0 4 8 11 14 16 22 24
10 10 10 10 10 10 10 10
Visible
Radio Microwave Infrared UV X-ray Gamma Ray
Did u know? The properties of radio waves depend on the frequency. At low frequencies,
radio waves pass through obstacles. Therefore, radio frequency transmission
requires different broadcasting techniques for frequencies below 30 MHz and
frequencies above 30 MHz.
In the VLF (Very Low frequency), LF (Low Frequency) and MF (Medium” Frequency) bands, radio
waves follow the ground as shown in figure 6.9 while in the HF (High Frequency) and VHF (Very
High Frequency) bands they bounced off the ions sphere as shown in figure 6.10. The ionosphere
comprises the ionized gases in upper atmosphere caused by ultraviolet and X-ray radiation's is of
sun, which are around 50 to 90 km above from earth surface.
Ground wave
Earth’s Surface
Ionosphere
Earth’s Surface
Uses of Radio Waves. Radio waves are mainly used to transmit radio programs. They are sometimes
also used for data transmissions in a local area network within those buildings where wiring is
difficult to make.
Microwave towers
Satellite links use/microwave frequencies (4-12 GHz) with a satellite as a repeater as shown in
figure 6.12. They have similar bandwidths as ground based microwave links. Why do satellite
channels need microwaves in 4-12 GHz range? The main reason for this is that the microwaves in
this range exhibit characteristics similar to light waves. For instance, the waves can travel in
straight lines, can be reflected and can be focussed towards a particular receiving antenna.
Satellite
Earth Station
Self Assessment
State whether the following statements are true or false:
9. The core is surrounded by a glass having lower refractive index known as core.
10. The frequencies of microwave portion of the electro-magnetic spectrum range from 108 Hz
to 1011 Hz.
11. A geostationary satellite appears to be stationary to the air ground station.
12. Radio waves are mainly used to transmit radio programs.
6.7 Summary
· Information and communications technology is usually called ICT.
· With the advent of ICTs, learning has become Web-based.
· The English word ‘communication’ is derived from the Latin noun‘communis’ and the
Latin verb ‘communicare’ that means ‘to make common’.
· Communication is important both for an individual and also for the society. A person’s
need for communication is as strong and as basic as the need to eat, sleep and love.
· Communication provides knowledge, expertise and skills for smooth functioning by people
in the society.
Notes
Unit 7: Features and Scope of Communication
CONTENTS
Objectives
Introduction
7.1 Features and Scope of Communication
7.2 Techniques of Communication
7.3 Grapevine
7.4 Summary
7.5 Keywords
7.6 Review Questions
7.7 Further Readings
Objectives
After studying this unit, you will be able to:
· Describe the features of communication
· Discuss the scope of communication
· Explain the techniques of communication
· State briefly about Graperine.
Introduction
Communication generally involves two or more persons. It is a process between the two persons.
Communication is very useful in communicating things. An effective communication is possible
when the receiver gives the feedback. Effective communication has various features and Scope.
Some of the features and scopes are discussed as follows.
Notes In oral communication, the transmitter is the ‘voice box’ of the speaker.
The receiver of the message may be the human ear, which converts sound waves into a
comprehensible form, which can be recognized by the human brain; a television receiver decodes
the electromagnetic waves into recognizable visual representation. In the same manner, the reader,
who can recognize and understand that particular language, can understand the printed message.
The process of communication involves a procedure consisting of only a few steps. The information
source decides to communicate and encodes a message, transmits it through a channel to the
receiver, which is then decoded and acted upon. There are noises or distortions in between the
whole process. The main functions of communication are information, education, entertainment,
enlightenment, and persuasion.
Therefore, the communication process should be designed as such so as to gain the attention of the
receiver, use the signals, symbols, or codes that are easily understood by the receiver and it must
Notes arouse needs in the receiver and suggest some ways out to satisfy these needs. Only then it can
create the desired response.
However, communication should not be confused with mass communication, while communication
is the activity of sharing, giving, imparting, receiving information, mass communication ‘is a
process in which professional communicators use communication media to disseminate messages
widely, rapidly, simultaneously and continuously to arouse intended meanings in large and
diverse audiences in an attempt to influence them in a variety of ways’.
Communication is a required skill at every level of organizational functioning. The effectiveness,
with which a person will be able to perform in almost any organization, whether social,
governmental or commercial, will depend in large measure upon the ability to communicate
effectively.
Notes When we listen to the radio or watch the TV and films, when we buy or sell the
products or services, when we manage our business and when we are involved in
any other activity, we are invariably involved in communication situation.
When we talk and work with our colleagues, friends, subordinates, superiors, experts, teachers,
students, family members and with the people in all walks of life, when we read and /or write the
books, pamphlets, periodicals, special journals, reports, letters, memos, newspaper, etc. when we
listen to or deliver speeches.
different subjects of interest by this technology and it helps them to conceive new creative thoughts Notes
and ideas. The technology, skills of using media and some concepts of communication are useful
to psychologists in order to investigate certain problems of human behaviour and therapy.
The political as well as social traditions, myths, customs, styles of living, morals, etc. are passed
from one generation to another or they are changed or destroyed with the help of communication
media. The success of any commercial man depends upon his reception and transmission of information
regarding the market, production, government laws, banking, innovations in modern technology,
etc., computers play a vital role in receiving, storing, translating, analyzing and imparting the
information for the mathematicians, chemists, physicists, engineers, etc.
Self Assessment
Fill in the blanks:
1. The process in which professional communicators use communication media to dissemi-
nate messages widely, rapidly, simultaneously and continuously to arouse intended mean-
ing in large and diverse audience in an attempt to influence them in a variety of ways is
called .................... .
2. In oral communication, the transmitter is the .................... of the speaker.
Notes Informal communication takes place in case of informal and personal situations. Less
attention is paid to structure of language and grammar.
Also less attention is pair to nonverbal behaviour like clothing, gait, posture, etc.
To communicate effectively in one has to identify and use both formal and informal communication
channels. The channels of communication are the formal and informal ways of communicating
with other people.
Formal communication channels relate to the structure of the organization. They include:
· Reporting relationships and policies
· Committee meetings
· Bulletin boards
· Participation in group events
· Internal newsletters.
Task State the role of formal and informal communication in public speaking.
Self Assessment
Multiple choice questions:
3. The statement that outlines, how the organization will act on a particular issue is called:
(a) Memos (b) Procedures
(c) Policy (d) Both (a) and (b).
4. Informal communication channel include:
(a) Internal news letters (b) Notice boards
(c) Grapevine (d) Policy.
Importance of Grapevine
Though, the structure of the grapevine is not so well-defined, as that of the formal channels, it
should not be taken for its weakness.
Notes The messages flowing through grapevine have greater speed than that of the messages
flowing through the formal channels.
The grapevine may carry equally vital message through it for the achievement and success of the
organization. It is not correct to underestimate the grapevine by saying that the vital messages
pass only through the authorized, formal channels. On the other hand, though the formal channels
are systematic, pre-planned and documented, it is authority-laden. It can never be as speedy and
spontaneous as the grapevine. The employees communicate through grapevine, not because they
are compelled to communicate but because they earnestly want to communicate with their
associates.
The method of formal written communication is slow and expensive method of information
transmission. The grapevine, on the other hand, is non-expensive method and most rapid oral method
of transmitting the information to the maximum number of the communication receivers. The
grapevine can flow wherever the participants wish it to flow; therefore, the manager can use the
properly cultivated grapevine in dealing with the problems that require crossing the boundaries
between the departments.
Task How Grapevine is non-expensive and most rapid oral method of information transmission?
Self Assessment
State whether the following statements are true or false:
5. Grapevine is an informal communication network which ignores formal channels of com-
munication and spreads rumors and gossips at all levels of the organization.
6. The messages flowing through grapevine have greater speed than that of the messages
flowing through formal channels.
7. Grapevine is the expensive and slow oral method of transmitting the information to the
maximum number of the new communication receivers.
7.4 Summary
· Communication is a required skill at every level of organizational functioning.
· Communication is the means by which people can contact with one another.
Notes · In situations like public speaking, mass communication, official communication, etc.
formal communication is used.
· The telephone conversation and face-to-face conversation are the primary means of hori-
zontal communication, which facilitate the coordinating activities of the organization.
· Grapevine is an informal communication network, which ignores formal channels of
communication and spreads rumors and gossips at all levels of the organization.
· The method of formal written communication is slow and expensive method of informa-
tion transmission.
7.5 Keywords
Communication : It is the activity of conveying information. It requires a sender, a message, and an
intended recipient, although the receiver need not be present or aware of the
sender's intent to communicate at the time of communication; thus communication
can occur across vast distances in time and space. The communication process is
complete once the receiver has understood the message of the sender.
Tremendous : Very great in size, amount, or intensity
Consensus : It refers to the primary way decisions are made on Wikipedia, and it is accepted
as the best method to achieve our goals. General agreement about matter of
opinion.
Grapevine : The term grapevine communication is often used interchangeably with the
term informal communication.
Notes
Unit 8: Network Media
CONTENTS
Objectives
Introduction
8.1 Local Area Network
8.1.1 Advantages and Disadvantages of Local Area Network
8.2 Metropolitan Area Network
8.2.1 The Benefits of Metropolitan Area Network
8.3 Wide Area Network
8.3.1 Advantages and Disadvantages of Wide Area Network
8.4 Summary
8.5 Keywords
8.6 Review Questions
8.7 Further Readings
Objectives
After studying this unit, you will be able to:
· Discuss about the local area network
· Describe the metropolitan area network and its benefits
· Explain the wide area network
· State about the advantages and disadvantages of Wide Area Network.
Introduction
Network media (sometimes referred to as networked media) refers to media mainly used in
computer networks such as the Internet.
Network media is essentially driven by technological development, emerging from the internet
as a non-centralized medium in the late nineties; the term has more recently begun to be applied
to both the arts and industry. The following features distinguish Network Media from classical
media, such as broadcast media and the printed press:
· Network Media is typically democratic and decentralized. The audience can also be the
contributors.
· Network Media often requires the involvement of computers as an input/output device.
· Network media requires a community to participate and consume.
With the rapidly increasing digital era, new aspects of digital networking are becoming more
important. Essentially, network media is about co-operative/collaborative practice in which many
can contribute to the production of “media”.
The benefits of the development of inter-networking ultimately has allowed for greater political,
social comment and discussion but is also widely thought of in a much broader context of
globalization and the fragmentation of the world.
Notes characteristics of LANs, in contrast to wide area networks (WANs), include their usually higher data-
transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines.
Computer
Printer
Switch
Router
ARCNET, Token Ring and other technology standards have been used in the past, but Ethernet
over twisted pair cabling and Wi-Fi are the two most common technologies currently in use.
As larger universities and research labs obtained more computers during the late 1960s, there was
an increasing pressure to provide high-speed interconnections. A report in 1970 from the Lawrence
Radiation Laboratory detailing the growth of their “Octopus” network gives a good indication of
the situation.
Did u know? Cambridge Ring was developed at Cambridge University in 1974 but was
never developed into a successful commercial product.
Ethernet was developed at Xerox PARC in 1973-1975, and filed as U.S. Patent 4,063,220. In 1976,
after the system was deployed at PARC, Metcalfe and Boggs published a seminal paper, “Ethernet:
Distributed Packet-Switching for Local Computer Networks.”
ARCNET was developed by Data point Corporation in 1976 and announced in 1977. It had the first
commercial installation in December 1977 at Chase Manhattan Bank in New York.
Standards Evolution
The development and proliferation of CP/M-based personal computers from the late 1970s and
then DOS-based personal computers from 1981 meant that a single site began to have dozens or
even hundreds of computers. The initial attraction of networking these was generally to share disk
space and laser printers, which were both very expensive at the time. There was much enthusiasm
for the concept and for several years, from about 1983 onward, computer industry pundits would
regularly declare the coming year to be “the year of the LAN”.
In practice, the concept was marred by proliferation of incompatible physical Layer and network
protocol implementations, and a plethora of methods of sharing resources. Typically, each vendor
would have its own type of network card, cabling, protocol, and network operating system. A
solution appeared with the advent of Novell NetWare which provided even-handed support for
dozens of competing card/cable types, and a much more sophisticated operating system than
most of its competitors. Netware dominant in the personal computer LAN business from early
after its introduction in 1983 until the mid 1990s when Microsoft introduced Windows NT Advanced
Server and Windows for Workgroups.
Banyan Vines had comparable technical strengths, but Banyan never gained a secure base. Microsoft
and 3Com worked together to create a simple network operating system which formed the base of
3Com’s 3+Share, Microsoft’s LAN Manager and IBM’s LAN Server- but none of these were Notes
particularly successful.
During the same period, Unix computer workstations from vendors such as Sun Microsystems,
Hewlett-Packard, Silicon Graphics, Intergraph, NeXT and Apollo were using TCP/IP based network.
Although, this market segment is now much reduced, the technologies developed in this area
continue to be influential on the Internet and in both Linux and Apple Mac OS X networking-and
the TCP/IP protocol have now almost completely replaced IPX, AppleTalk, NBF, and other protocols
used by the early PC LANs.
Cabling
Early LAN cabling had always been based on various grades of coaxial cable. However, shielded
twisted pair was used in IBM’s Token Ring implementation, and in 1984 Star LAN showed the
potential of simple unshielded twisted pair by using Cat3-the same simple cable used for telephone
systems. This led to the development of 10Base-T (and its successors) and structured cabling which
is still the basis of most commercial LANs today. In addition, fiber-optic cabling is increasingly
used in commercial applications.
As cabling is not always possible, wireless Wi-Fi is now the most common technology in residential
premises, as the cabling required is minimal and it is well suited to mobile laptops and smart
phones.
Technical Aspects
Network topology describes the layout pattern of interconnections between devices and network
segments. Switched Ethernet has been for some time the most common Data Link Layer and
Physical Layer implementation for local area networks. At the higher layers, the Internet Protocol
(TCP/IP) has become the standard. Smaller LANs generally consist of one or more switches linked
to each other, often at least one is connected to a router, cable modem, or ADSL modem for Internet
access.
Larger LANs are characterized by their use of redundant links with switches using the spanning
tree protocol to prevent loops, their ability to manage differing traffic types via quality of service
(QoS), and to segregate traffic with VLANs. Larger LANs also contain a wide variety of network
devices such as switches, firewalls, routers, load balancers, and sensors.
Disadvantages
1. You often only have 1(one) access point.
2. It limits the Area.
Computer
Printer
Switch
Router
Telecommunications
Company
Computer
Server
A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks of
buildings to entire cities. MANs can also depend on communications channels of moderate-to-
high data rates. A MAN might be owned and operated by a single organization, but it usually will
be used by many individuals and organizations. MANs might also be owned and operated as
public utilities. They will often provide means for internetworking of local networks.
Notes
Notes MANs geographic scope falls between a WAN and LAN. MANs provide Internet
connectivity for LANs in a metropolitan region, and connect them to wider area
networks like the Internet. It can also be used in cable television.
Implementation
Some technologies used for this purpose are Asynchronous Transfer Mode (ATM), FDDI, and
SMDS. These technologies are in the process of being displaced by Ethernet-based connections
(e.g., Metro Ethernet) in most areas. MAN links between local area networks have been built
without cables using microwave, radio, or infrared laser links.
Did u know? Most companies rent or lease circuits from common carriers due to the fact that
laying long stretches of cable can be expensive.
DQDB, Distributed-queue dual-bus, is the metropolitan area network standard for data
communication. It is specified in the IEEE 802.6 standard. Using DQDB, networks can be up to 20
miles (30 km) long and operate at speeds of 34 to 155 Mbit/s.
Notes Many companies, campuses and local governments are slowly switching to MAN - Metropolitan
Area Network. This is because of the advantages that MAN offers and the convenience it brings to
clients. Having small networks compounded into a large network such as in MAN provides
security for the communication shared in between the networks.
Self Assessment
Multiple choice questions:
4. A computer network that usually spans a city or a large campus is known as:
(a) LAN (b) MAN (c) WAN (d) TAN.
5. The geographical scope of metropolitan area network falls between:
(a) WAN and LAN (b) MAN and LAN
(c) WAN and MAN (d) All of these.
Computer
Printer
Switch
Router
Telecommunications
Commpany
Computer
B
Server
Design Options
WANs are used to connect LANs and other types of networks together, so that users and computers
in one location can communicate with users and computers in other locations. Many WANs are
built for one particular organization and are private. Others, built by Internet service providers,
provide connections from an organization’s LAN to the Internet. WANs are often built using
leased lines. At each end of the leased line, a router connects to the LAN on one side and a hub Notes
within the WAN on the other. Leased lines can be very expensive. Instead of using leased lines,
WANs can also be built using less costly circuit switching or packet switching methods. Network
protocols including TCP/IP deliver transport and addressing functions. Protocols including Packet
over SONET/SDH, MPLS, ATM and Frame relay are often used by service providers to deliver the
links that are used in WANs. X.25 was an important early WAN protocol, and is often considered
to be the “grandfather” of Frame Relay as many of the underlying protocols and functions of X.25
are still in use today (with upgrades) by Frame Relay.
Academic research into wide area networks can be broken down into three areas: mathematical
models, network emulation and network simulation.
Performance improvements are sometimes delivered via wide area file services or WAN
optimization.
Transmission rates usually range from 1200 bit/s to 24 Mbit/s, although some connections such as
ATM and Leased lines can reach speeds greater than 156 Mbit/s. typical communication links used
in WANs are telephone lines, microwave links & satellite channels.
Recently with the proliferation of low cost of Internet connectivity many companies and organi-
zations have turned to VPN to interconnect their networks, creating a WAN in that way. Companies
such as Cisco, New Edge Networks and Check Point offer solutions to create VPN networks.
Advantages
1. Broader reception area.
2. More recievable connections available
3. Portablility (if you use a laptop)
LOVELY PROFESSIONAL UNIVERSITY 93
Information Technology and Application
Notes Disadvantages
1. Not as much security as a LAN
2. If the Hub goes down your network goes down
3. Less reception with a WAN than a LAN
Self Assessment
State whether the following statements are true or false:
6. A local area network is a computer network that covers a broad area i.e., any network whose
communication links cross metropolitan, regional, or national boundaries.
7. CANs stands for campus area networks.
8. WANs are used to connect LANs and other types of networks together so that users and
computers in one location can communicate with users and computers in other locations.
8.4 Summary
· A local area network (LAN) is a computer network that connects computers and devices in
a limited geographical area such as home, school, computer laboratory or office building.
· ARCNET was developed by Data point Corporation in 1976 and announced in 1977.
· A metropolitan area network (MAN) is a computer network that usually spans a city or a
large campus.
· A wide area network (WAN) is a computer network that covers a broad area (i.e., any network
whose communications links cross metropolitan, regional, or national boundaries).
· WANs are used to connect LANs and other types of networks together, so that users and
computers in one location can communicate with users and computers in other locations
8.5 Keywords
Implementation : It is the realization of an application, or execution of a plan, idea, model, design,
specification, standard, algorithm, or policy. In computer science, an implementation
is a realization of a technical specification or algorithm as a program, software
component, or other computer system through programming and deployment.
Enthusiasm : A strong feeling of excitement or interest.
WAN : A wide area network (WAN) is a telecommunication network that covers a
broad area (i.e., any network that links across metropolitan, regional, or national
boundaries).
LAN : A local area network (LAN) is a computer network that interconnects computers
in a limited area such as a home, school, computer laboratory, or office building.
MAN : A metropolitan area network (MAN) is a computer network that usually spans
a city or a large campus.
Notes
Unit 9: Intranet
CONTENTS
Objectives
Introduction
9.1 Intranet
9.2 Uses of Intranet
9.3 Benefits of Intranet
9.4 Planning and Creation of Intranet
9.5 Summary
9.6 Keywords
9.7 Review Questions
9.8 Further Readings
Objectives
After studying this unit, you will be able to:
· Discuss an intranet in a computer network
· State the uses of intranet
· Explain benefits of Intranet
· Describe the planning and creation of Intranet.
Introduction
In this unit, we will discuss about intranet and their uses benefits of Intranet, planning and creation
of Internet. Some of them are discussed as follows.
9.1 Intranet
An intranet is a computer network that uses Internet Protocol technology to securely share any
part of an organization’s information or network operating system within that organization. The
term is used in contrast to internet, a network between organizations, and instead refers to a
network within an organization. Sometimes, the term refers only to the organization’s internal
website, but may be a more extensive part of the organization’s information technology infrastruc-
ture. It may host multiple private websites and constitute an important component and focal point
of internal communication and collaboration. Any of the well known Internet protocols may be
found in an intranet, such as HTTP (web services), SMTP (e-mail), and FTP (file transfer protocol).
Internet technologies are often deployed to provide modern interfaces to legacy information
systems hosting corporate data.
An intranet can be understood as a private analog of the Internet, or as a private extension of the
Internet confined to an organization.
Did u know? The first intranet websites and home pages began to appear in organizations in
1996-1997.
Although, not officially noted, the term intranet first became common-place among early adopters,
such as universities and technology corporations, in 1992.
Intranets have also contrasted with extranets. While intranets are generally restricted to employees of Notes
the organization, extranets may also be accessed by customers, suppliers, or other approved parties.
Extranets extend a private network onto the Internet with special provisions for authentication,
authorization and accounting (AAA protocol).
In many organizations, intranets are protected from unauthorized external access by means of a
network gateway and firewall. For smaller companies, intranets may be created simply by using
private IP ranges, such as 192.168.*.*. In these cases, the intranet can only be directly accessed from
a computer in the local network; however, companies may provide access to off-site employees by
using a virtual private network. Other security measures may be used, such as user authentication
and encryption.
Alternatively, the intranet domain may be publicly accessible, but users would need to log in
before they could view most of the content.
Self Assessment
Fill in the blanks:
1. An .................... is a computer network that uses internet protocol technology to securely
share any part of an organizations information or network operating system within that
organization.
2. The first intranet websites and home pages began to appar in organisations in the
year .................... .
3. FTP stands for .................... .
When part of an intranet is made accessible to customers and others outside the business, that part
becomes part of an extranet. Businesses can send private messages through the public network, using
special encryption/decryption and other security safeguards to connect one part of their intranet to
another.
Intranet user-experience, editorial, and technology go together to produce in-house sites, or some
combination of these.
Notes Because of the scope and variety of content and the number of system interfaces, intranets of many
organizations are much more complex than their respective public websites. Intranets and their
use are growing rapidly. According to the Intranet design annual 2007 from Nielsen Norman
Group, the number of pages on participants’ intranets averaged 200,000 over the years 2001 to 2003
and has grown to an average of 6 million pages over 2005-2007.
Self Assessment
Multiple choice questions:
4. Choose which one is correct:
(a) Intranets are used to deliver tools and application in sales and customer relationship
management tools to advance productivity.
(b) Internets are used in factory for advance productivity.
(c) Internets are used company worksers to get more productivity.
(d) None of these.
5. Most commonly intranets are managed by the communications .................... departments
of large organizations.
(a) HR or CIO (b) Manager or receptionist
(c) HR or Accounts (d) Accounts or CRM.
· Business operations and management: Intranets are also being used as a platform for Notes
developing and deploying applications to support business operations and decisions across
the internet worked enterprise.
· Cost-effective: Users can view information and data via web-browser rather than main-
taining physical documents such as procedure manuals, internal phone list and requisition
forms. This can potentially save the business money on printing, duplicating documents, and
the environment as well as document maintenance overhead. For example, People soft
“derived significant cost savings by shifting HR processes to the intranet”. McGovern goes
on to say the manual cost of enrolling in benefits was found to be USD109.48 per enrollment.
“Shifting this process to the intranet reduced the cost per enrollment to $21.79; a saving of
80 percent”. Another company that saved money on expense reports was Cisco.
Did u know? In 1996, Cisco processed 54,000 reports and the amount of dollars processed
was USD19 million.
Notes These are in addition to the hardware and software decisions (like content management systems),
participation issues (like good taste, harassment, confidentiality), and features to be supported.
Intranets are often static sites. Essentially they are a shared drive, serving up centrally stored
documents alongside internal articles or communications (often one-way communication).
However, organizations are now starting to think of how their intranets can become a
‘communication hub’ for their team by using companies specializing in ‘socialising’ intranets. The
actual implementation would include steps such as:
· Securing senior management support and funding.
· Business requirements analysis.
· Identify users’ information needs.
· Installation of web server and user access network.
· Installing required user applications on computers.
· Creation of document framework for the content to be hosted.
· Users’ involvement in testing and promoting the use of intranet.
· Ongoing measurement and evaluation, through benchmarking against other intranets.
Another useful component in an intranet structure is to maintain the Intranet. For feedback on the
intranet, social networking can be done through a forum for users to indicate what they want and
what they do not like.
Self Assessment
State whether the following statements are true or false:
6. Intranets can serve as powerful tools for communication within an organization vertically
and horizontally.
7. Intranets does not promote common corporate culture.
8. Most organizations devote considerable resources into the planning and implementation
of their intranet as it is of strategic importance to the organizations success.
9.5 Summary
· An intranet is a computer network that uses Internet Protocol technology to securely share
any part of an organization’s information or network operating system within that orga-
nization.
· Intranets are being used to deliver tools and applications, e.g., collaboration (to facilitate
working in groups and teleconferencing) or sophisticated corporate directories, sales and
customer relationship management tools, project management etc., to advance productivity.
· Intranets can serve as powerful tools for communication within an organization, vertically
and horizontally.
· Users can view information and data via web-browser rather than maintaining physical
documents such as procedure manuals, internal phone list and requisition forms.
· The intranet can also be linked to a company’s management information system, for
example a time keeping system.
9.6 Keywords
Intranet : An intranet is a computer network that uses Internet Protocol technology to
securely share any part of an organization's information or network operating
system within that organization. It is the connection of computer networks in a
local area.
Fragmentation : In computer storage, fragmentation is a phenomenon in which storage space is
used inefficiently, reducing storage capacity and in most cases reducing the
performance.
HTTP : The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, Notes
collaborative, hypermedia information systems. HTTP is the foundation of
data communication for the World Wide Web.
Productivity : The state or quality of producing something.
Notes
Unit 10: Classification of Libraries
CONTENTS
Objectives
Introduction
10.1 Digital Library
10.1.1 Digital Library: Concept and Definition
10.1.2 Characteristics of Digital Libraries
10.1.3 Scope of Digital Libraries
10.1.4 Recent Development
10.2 Construction and Organization of Digital Library
10.3 Challenges of Digital Library
10.4 World Wide Web Virtual Library
10.5 Hybrid Library
10.6 Recent Library Developments
10.7 Summary
10.8 Keywords
10.9 Review Questions
10.10 Further Readings
Objectives
After studying this unit, you will be able to:
· Discuss digital library
· Explain construction and organization of digital library
· Describe challenges of digital library
· Explain World Wide Web Virtual Library
· Define hybrid Library
· Discuss recent library developments.
Introduction
Library science (or Library and Information science) is an interdisciplinary field that applies the
practices, perspectives, and tools of management, information technology, education, and other
areas to libraries; the collection, organization, preservation, and dissemination of information
resources; and the political economy of information.
Did u know? The first school for library science was founded by Melvil Dewey at Columbia
University in 1887.
Historically, library science has also included archival science. This includes how information
resources are organized to serve the needs of selected user groups, how people interact with
classification systems and technology, how information is acquired, evaluated and applied by
people in and outside of libraries as well as cross-culturally, how people are trained and educated
for careers in libraries, the ethics that guide library service and organization, the legal status of
libraries and information resources, and the applied science of computer technology used in
documentation and records management.
There is no generally agreed-upon distinction between the terms library science, librarianship, Notes
and library and information science, and to a certain extent they are interchangeable, perhaps
differing most significantly in connotation. The term library and information science (LIS) is most
often used; most librarians consider it as only a terminological variation, intended to emphasize
the scientific and technical foundations of the subject and its relationship with information science.
LIS should not be confused with information theory, the mathematical study of the concept of
information. LIS can also be seen as an integration of the two fields’ library science and information
science, which were separate at one point.
Notes Library philosophy has been contrasted with library science as the study of the aims
and justifications of librarianship as opposed to the development and refinement of
techniques.
Notes library as a global virtual library—the libraries of thousands of “networked electronic libraries”.
The digital library need not be networked. A digital library is a library which has all the
information in electronic form and having electronic devices to have access to the digitized
information. Thus digital library is a library which has number of machine-readable publications
and facilities for remote access to several databases.
The American Digital Library Federation has defined the digital library as “Digital libraries are
organizations that provide the resources, including the specialized staff, to select, structure, offer
intellectual access to, interpret, distribute, preserve the integrity of, and ensure the persistence
overtime of collection of digital works so that they are readily and economically available for
use by a defined community or set of communities.” The definition of a digital library can be
given as a set of characteristics as follows:
Actually, this document contains a Digital Library Manifesto which introduces the three types of Notes
relevant ‘systems’, i.e., Digital Library, Digital Library System, and Digital Library Management
System. It describes the main concepts characterizing these systems, i.e., organization, content,
user, functionality, quality, policy and architecture. It introduces the main roles that actors may
play within digital libraries, i.e., end-user, manager and software developer. Finally, it describes
the reference frameworks needed to clarify the DL universe at different levels of abstraction, i.e.,
the Digital Library Reference Model and the Digital Library Reference Architecture.
The first use of the term digital library in print may have been in a 1988 report to the Corporation for
National Research Initiatives.
Notes The term digital libraries was first popularized by the NSF/DARPA/NASA Digital
Libraries Initiative in 1994.
These draw heavily on As We May Think by Vannevar Bush in 1945, which set out a vision not in
terms of technology, but user experience. The term virtual library was initially used interchangeably
with digital library, but is now primarily used for libraries that are virtual in other senses (such as
libraries which aggregate distributed content).
A distinction is often made between content that was created in a digital format, known as born-
digital, and information that has been converted from a physical medium, e.g., paper, by digitizing.
The term hybrid library is sometimes used for libraries that have both physical collections and
digital collections. For example, American Memory is a digital library within the Library of
Congress. Some important digital libraries also serve as long term archives, for example, the
Eprint arXiv, and the Internet Archive.
Some of the Examples of digital libraries (DLs) are given below:
Academic Repositories
Many academic libraries are actively involved in building institutional repositories of the
institution’s books, papers, thesis, and other works which can be digitized or were ‘born digital’.
Many of these repositories are made available to the general public with few restrictions, in
accordance with the goals of open access, in contrast to the publication of research in commercial
journals, where the publishers often limit access rights. Institutional, truly free, and corporate
repositories are sometimes referred to as digital libraries.
Physical archives differ from physical libraries in several ways. Traditionally, archives were defined
as:
1. Containing primary sources of information (typically letters and papers directly produced
by an individual or organization) rather than the secondary sources found in a library
(books, periodicals, etc.).
2. Having their contents organized in groups rather than individual items.
3. Having unique contents.
The technology used to create digital libraries has been even more revolutionary for archives
since it breaks down the second and third of these general rules. In other words, “digital archives”
or “online archives” will still generally contain primary sources, but they are likely to be described
individually rather than (or in addition to) in groups or collections, and because they are digital
their contents are easily reproducible and may indeed have been reproduced from elsewhere.
Did u know? The Oxford Text Archive is generally considered to be the oldest digital archive
of academic physical primary source materials.
Searching
Most digital libraries provide a search interface which allows resources to be found. These resources
are typically deep web (or invisible web) resources since they frequently cannot be located by
search engine crawlers. Some digital libraries create special pages or sitemaps to allow search
engines to find all their resources. Digital libraries frequently use the Open Archives Initiative
Protocol for Metadata Harvesting (OAI-PMH) to expose their metadata to other digital libraries,
and search engines like Google Scholar, Yahoo! and Scirus can also use OAI-PMH to find these
deep web resources.
There are two general strategies for searching a federation of digital libraries.
They are:
1. Distributed searching, and
2. Searching previously harvested metadata.
Distributed searching typically involves a client sending multiple search requests in parallel to a
number of servers in the federation. The results are gathered, duplicates are eliminated or clustered,
and the remaining items are sorted and presented back to the client. Protocols like Z39.50 are
frequently used in distributed searching. A benefit to this approach is that the resource-intensive
tasks of indexing and storage are left to the respective servers in the federation. A drawback to this
approach is that the search mechanism is limited by the different indexing and ranking capabilities
of each database, making it difficult to assemble a combined result consisting of the most relevant
found items.
Searching over previously harvested metadata involves searching a locally stored index of
information that has previously been collected from the libraries in the federation. When a search
is performed, the search mechanism does not need to make connections with the digital libraries
it is searching - it already has a local representation of the information. This approach requires the
creation of an indexing and harvesting mechanism which operates regularly, connecting to all the
digital libraries and querying the whole collection in order to discover new and updated resources.
OAI-PMH is frequently used by digital libraries for allowing metadata to be harvested. A benefit
to this approach is that the search mechanism has full control over indexing and ranking algorithms,
possibly allowing more consistent results. A drawback is that harvesting and indexing systems
are more resource-intensive and therefore expensive.
Notes Frameworks
The formal reference models include the DELOS Digital Library Reference Model (Agosti, et al.,
2006) and the Streams, Structures, Spaces, Scenarios, Societies (5S) formal framework. The Reference
Model for an Open Archival Information System (OAIS) provides a framework to address digital
preservation.
With several digital library initiatives reported, it will be useful to have a survey of the digital Notes
libraries in India to understand the present status of the digital library initiatives. This assumes
importance because the few studies on Indian digital library initiatives are primarily based on
information available on websites or from other published sources. A survey would help not
only in understanding the present situation but will help in drawing up an action plan for
focused digital library development in India. Further, use and user studies of digital libraries in
India are lacking. This area is also of paramount importance for assessing the existing digital
libraries and creating highly user-centric digital libraries in India.
Software
There are a number of software packages for use in general digital libraries. Institutional repository
software, which focuses primarily on ingest, preservation and access of locally produced documents,
particularly locally produced academic outputs, can be found in Institutional repository software.
Digitization
In the past few years, procedures for digitizing books at high speed and comparatively low cost
have improved considerably with the result that it is now possible to plan the digitization of
millions of books per year for creating digital libraries.
Advantages
The advantages of digital libraries are by means of easily and rapidly accessing books, archives
and images of various types are now widely recognized by commercial interests and public
bodies alike.
Notes Traditional libraries are limited by storage space; digital libraries have the potential
to store much more information, simply because digital information requires very
little physical space to contain it. As such, the cost of maintaining a digital library is
much lower than that of a traditional library.
A traditional library must spend large sums of money paying for staff, book maintenance, rent,
and additional books. Digital libraries may reduce or, in some instances, do away with these fees.
Both types of library require cataloguing input to allow users to locate and retrieve material.
Digital libraries may be more willing to adopt innovations in technology providing users with
improvements in electronic and audio book technology as well as presenting new forms of
communication such as wikis and blogs; conventional libraries may consider that providing
online access to their OPAC catalogue is sufficient. An important advantage to digital conversion
is increased accessibility to users. They also increase availability to individuals who may not be
traditional patrons of a library, due to geographic location or organizational affiliation.
· No physical boundary. The user of a digital library need not go to the library physically;
people from all over the world can gain access to the same information, as long as an
Internet connection is available.
· Round the clock availability. A major advantage of digital libraries is that people can gain
access 24/7 to the information.
Notes · Multiple accesses. The same resources can be used simultaneously by a number of institu-
tions and patrons. This may not be the case for copyrighted material: a library may have a
license for “lending out” only one copy at a time; this is achieved with a system of digital
rights management where a resource can become inaccessible after expiration of the lending
period or after the lender chooses to make it inaccessible (equivalent to returning the re-
source).
· Information retrieval. The user is able to use any search term (word, phrase, title, name,
and subject) to search the entire collection. Digital libraries can provide very user-friendly
interfaces, giving clickable access to its resources.
· Preservation and conservation. Digitization is not a long-term preservation solution for
physical collections, but does succeed in providing access copies for materials that would
otherwise fall to degradation from repeated use. Digitized collections and born-digital ob-
jects pose many preservation and conservation concerns that analog materials do not. Please
see the following “Problems” section of this page for examples.
· Space. Traditional libraries are limited by storage space, digital libraries have the potential to
store much more information; simply because digital information requires very little physi-
cal space to contain them and media storage technologies are more affordable than ever
before.
· Added value. Certain characteristics of objects, primarily the quality of images, may be
improved. Digitization can enhance legibility and remove visible flaws such as stains and
discoloration.
Task Digital libraries have the potential to store much information. Justify.
Self Assessment
Fill in the blanks:
1. A .................... is a library in which collections are stored in digital formats and accessible
by computers.
2. The term digital libraries was first popularized by the NSF/DARPA/NASA Digital
libraries initiative in .................... .
3. OAI-PMH stands for .................... .
4. ICDL stands for .................... .
Digital Preservation
Digital preservation aims to ensure that digital media and information systems are still interpretable
into the indefinite future. Each necessary component of the must be migrated, preserved or emulated.
Typically lower levels of systems (floppy disks for example) are emulated, bit-streams (the actual
files stored in the disks) are preserved and operating systems are emulated as a virtual machine.
Only where the meaning and content of digital media and information systems are well understood
is migration possible, as is the case for office documents.
and there is a conflict of interest between them and publishers who may wish to create online Notes
versions of their acquired content for commercial purposes.
There is a dilution of responsibility that occurs as a result of the spread-out nature of digital resources.
Complex intellectual property matters may become involved since digital material is not always
owned by a library. The content is, in many cases, public domain or self-generated content only.
The Fair Use Provisions (17 USC § 107) under copyright law provide specific guidelines under which
circumstances libraries are allowed to copy digital resources. Four factors that constitute fair use are
purpose of use, nature of the work, market impact, and amount or substantiality used.
Some digital libraries acquire a license to “lend out” their resources. This may involve the restriction
of lending out only one copy at a time for each license, and applying a system of digital rights
management for this purpose.
Metadata Creation
In traditional libraries, the ability to find works of interest was directly related to how well they
were catalogued. While cataloguing electronic works digitized from a library’s existing holding
may be as simple as copying moving a record for the print to the electronic item, with complex and
born-digital works requiring substantially more effort. To handle the growing volume of electronic
publications, new tools and technologies have to be designed to allow effective automated semantic
classification and searching. While full text search can be used for some searches, there are many
common catalog searches which cannot be performed using full text, including:
· finding texts which are translations of other texts.
· linking texts published under pseudonyms to the real authors (Samuel Clemens and Mark
Twain, for example).
· differentiating non-fiction from parody (The Onion from The New York Times, for
example).
Notes World Wide Web virtual library was started by Tim Berners-Lee.
The individual indices or virtual libraries live on hundreds of different servers around the world.
A set of index pages linking these individual libraries is maintained at, in Geneva only a few
kilometers from where the VL began life. A VL specific search engine has operated for some years
and is now (VL search) located on its own server at vlsearch.org.
The central affairs of the Virtual Library are co-ordinated by an elected Council. A central index
(the ‘Catalog’) is maintained and joint services provided by the Council on behalf of the
association.
Notes The Virtual Library was first conceived and run by Tim Berners-Lee, and later expanded,
organized and managed for several years by Arthur Secret, before it became a formally
established association with Gerard Manning as its Council’s first chairman.
Notes The Virtual Library was incorporated as an association sans but lucratif (not for profit association) in
the Republic and Canton of Geneva, Switzerland. Major decisions, including a set of bylaws are
decided by the membership at large.
The main Virtual Library website was redesigned in 2005 and many old or dead individual Virtual
Libraries were removed from the index.
Some illustrative examples of virtual libraries with brief descriptions are given below:
Virtual Libraries Ask ERIC: Ask ERIC is an example of a virtual library devoted to pro-
for Professional fessional learning for educators. It supports professional learning as well as
Learning formal and informal learning.
Virtual Libraries-- Awesome Library: Awesome Library organizes the Web with 18,000 carefully
General Interest reviewed resources, including the top five percent in the field of education.
(Collections of Libraryspot: Libraryspot, published by StartSpot Mediaworks, Inc. in North-
Web Sites) western University/Evanston Research Park, Evanston, Ill. , has received
many awards. It was intended to bring the best of the Web in one site and cut
through the information overload involved in Web searching. The Web sites
are reviewed by an editorial team for quality, content, and usefulness.
Virtual LRC: Some virtual libraries are the work of a dedicated individual
with a passion for enabling learners. The virtual LRC is the creation of
Dr. Michael Bell, former state chair of the Texas Association of School Libr-
arians. It is a useful library with access to e-texts, news, sounds, magazines
searches, information portals and more.
Virtual Libraries -- Research It : This list of reference sites makes a good reference center for just-
Reference in-time learning.
(Collections of
Web Sites)
University Virtual NovaNet: Novanet is a consortium of academic libraries in Nova Scotia who
Libraries cooperate to provide access to information and knowledge for the benefit of
their user communities.
Notes Hybrid libraries are the new norm in most public and academic libraries.
Did u know? It seems that the term “hybrid library” was first coined in 1998 by Chris
Rusbridge in an article for D-Lib Magazine.
Hybrid libraries evolved in the 1990s when electronic resources became more easily available for
libraries to acquire for public use. Initially these electronic resources were typically access to
material distributed on media such as CD-ROM or searches of specialized databases. OCLC helped
to push libraries towards acquiring digital resources by providing a centralized technology
resource. Now, with the widespread availability of digital content, it includes Internet resources
and documents which are online, such as eprints.
Hybrid libraries are the new norm for many archivists as well. Digitization has changed the way
archivists have gone about preserving historical items. Archivists are now using digital technology
to preserve items that were once only preserved by things like microfiche. Archivists now use
things like digital imaging which make it possible for researchers to see historical items online.
The emergence of the hybrid library has put a new emphasis on copyright issues for many libraries. Notes
The complicated and changing copyright laws in both the United States and the European Union
have made it a challenge for many libraries to make sure their patrons are using the digital items
lawfully.
Hybrid libraries need staffs that are trained in helping patrons navigate the vast amount of information
available in the digital age. Librarians working in hybrid libraries have training in electronic media
as well as the traditional print forms.
Notes There are five hybrid library projects. The main features of each project are summarized as follows:
HyLiFe: (Hybrid Library of the Future) is concentrating on the design and evaluation of six different
hybrid library user interfaces. The six interfaces are being designed in different institutions for
different user groups. The project is being co-ordinated and evaluated by staff at Centre for Research
in Library and Information Management (CERLIM) at Manchester Metropolitan University, and the
Department of Information and Library Management at the University of Northumbria at Newcastle.
MALIBU: (Managing the hybrid Library for the Benefit of Users) has a subject area focus. It is
developing a number of hybrid library prototypes particularly in the area of the Humanities. It is
also investigating the organisational and managerial implications of the hybrid library. Once
again this is a multi-site project, the key sites being Kings College London, and the Universities of
Oxford and Southampton.
HeadLine: (Hybrid Electronic Access and Delivery in the Library Networked Environment) is
focused on Economics and Business Studies. It is based at the London School of Economics, London
Business School and the University of Hertfordshire. The project is building models of the hybrid
library including a wide variety of different formats of material.
BUILDER (Birmingham University Integrated Library Development and Electronic Resource) has
an institutional focus. It is based at a single site, the University of Birmingham, although partner
sites are involved in evaluation activities. The project is developing a model of an institutional
hybrid library incorporating various technologies.
AGORA is system led. It is an implementation of the MODELS Information Architecture which is
constructing a hybrid library management system. The system will include facilities for search,
locate, request and delivery services. The project is being led by the University of East Anglia in
partnership with the UK Office for Library Networking (UKOLN), CERLIM and Fretwell-Downing
Informatics.
Collection development
Collection development is another challenge facing the hybrid libraries. The process of collection
management in a hybrid library is similar to that of a traditional library. Hybrid libraries follow
the same policies and procedures followed in traditional library collection development.
contracts from the database vendors. If the libraries plan on archiving the electronic resources, then Notes
there are legal issues related to it. The most prominent legal issues are intellectual property and
authenticity of digital information.
Self Assessment
Multiple choice questions:
5. .................... is the creator of HTML.
(a) Bertrand Ibrahim (b) Tim Berners-Lee
(c) Gerard Manning (d) Vannevar Bush
6. The term used by librarians to describe libraries containing a mix of tradition a print library
resources is:
(a) Hybrid library (b) Virtual library
(c) Digital library (d) None of these.
7. The term is used to describe the gap between those with information technology knowledge
and those who do not is:
(a) Digital divide (b) Collection development
(c) Ownership of electronic resources (d) Preservation of digital media.
Notes FINFO is developed with financial support from the Development Pool for Public and School
libraries and the web site can be located at: www.finfo.dk.
Experimental Library
An established forum is needed within CuLTUREN, (Culturen is an exciting and, in many respects,
a pioneering building for cultural activities and has in a short time made notable inroads into the
cultural life of Vasteras) whose terms should be dictated by the visitor and developing an individual
profile. The intention is to create an experimental library, known as The Generator. The experiment
will be administered as a library branch of Vasteras Public Town Library. Its content will be
contemporary, appealing to a younger audience and the library should be easily accessible from
CuLTUREN’s main entrance.
The aim is not to build a library in the traditional sense adhering to the accepted use of media,
equipment and staff, but rather to encourage a fresh approach and complement to other library
activities. It will not be a lending library where books are borrowed and returned. Instead, it
should be seen as a multimedia library allowing the visitor to try his hand at new approaches
involving work processes as well as other forms of media. The contemplated content of The
Generator might be to offer the visitors access to computers, periodicals, newspapers, poetry,
comics and certain books. The library should also be an open forum for all kinds of debates,
instigating discussion evenings, activities and workshops in cooperation with Kopparlund senior
high school and youth organisations active within CuLTUREN.
10.7 Summary
· Library science (or Library and Information science) is an interdisciplinary field that applies
the practices, perspectives, and tools of management, information technology, education,
and other areas to libraries; the collection, organization, preservation, and dissemination
of information resources; and the political economy of information.
· A digital library is a library in which collections are stored in digital formats (as opposed to
print, microform, or other media) and accessible by computers.
· The advantages of digital libraries are by means of easily and rapidly accessing books,
archives and images of various types are now widely recognized by commercial interests
and public bodies alike.
· Digital preservation aims to ensure that digital media and information systems are still
interpretable into the indefinite future.
· The World Wide Web Virtual Library was the first index of content on the World Wide
Web and still operates as a directory of e-texts and information sources on the web.
· Hybrid library is a term used by librarians to describe libraries containing a mix of
traditional print library resources and the growing number of electronic resources.
10.8 Keywords
LIS : Library and information science (LIS) is a merging of the two fields library
science and information science. It is associated with schools of library and
information science (abbreviated to "SLIS"), which generally developed from
professional schools to research based university institutions during the second
half of the twentieth century.
Digital library : A digital library is a library in which collections are stored in digital formats
(as opposed to print, microform, or other media) and accessible by computers.
The digital content may be stored locally, or accessed remotely via computer
networks. A digital library is a type of information retrieval system.
HTML : HyperText Markup Language (HTML) is the main markup language for web
pages. HTML elements are the basic building-blocks of webpages.
Hybrid library : It is a term used by librarians to describe libraries containing a mix of traditional
print library resources and the growing number of electronic resources Hybrid
libraries are mixes of traditional print material such as books and magazines,
as well as electronic based material such as downloadable audio books, electronic
journals, e-books, etc.
Books Lynch, Sarah N., and Eugene Mulero. “Dewey? At This Library With a Very
Different Outlook, They Don’t” The New York Times, July 14, 2007.
BISAC to replace Dewey in the future
Chan, Lois Mai. Cataloging and Classification: An Introduction, second ed. New
York.
Notes
Unit 11: Library and Information Networks in India
CONTENTS
Objectives
Introduction
11.1 Network Development in India
11.2 Limitations of Network Development
11.3 Types of Networks
11.4 General Networks in India
11.5 Summary
11.6 Keywords
11.7 Review Questions
11.8 Further Readings
Objectives
After studying this unit, you will be able to:
· Discuss the network Development in India
· State the limitations in Network Development
· Explain types of Networks
· State about the general Networks in India.
Introduction
The explosion in the amount of literature that is available, increases among the number of users
and their different needs, and the application of electronic media are forcing libraries to construct
and participate in networks. Magnetic tapes, floppy disks, and CD-ROMs provide enough data
storage capacity. Retrieval through telecommunications networks and access to international
databases are available for searching for information on various subjects. With the advent of
networks, remote transmission of texts and graphics, video clips and animated clips are also
possible.
Definitions
· A library network is broadly described as a group of libraries coming together with some
agreement of understanding to help each other with a view to satisfying the information
needs of their clientele.
· UNISIST II working document defines Information Network as a set of inter-related infor-
mation systems associated with communication facilities, which are cooperating through
more or less formal agreements in order to implement information handling operations
to offer better services to the users.
· The National Commission on Libraries and Information Science in its National.
Notes Programme Document (1975) defines a network as two or more libraries engaged in
a common pattern of information exchange, through communications for some
functional purpose.
Notes Objectives
· To promote and support adoption of standards in library operations.
· To create databases for projects, specialists and institutions to provide online Information
services.
· To improve the efficiency of housekeeping operations
· To coordinate with other regional, national and international network for exchange of
information and documents.
· To generate new services and to improve the efficiency of existing ones.
Notes The report on national policy on university libraries prepared by the Association of
Indian Universities (1987).
· The UGC report on information systems for science and technology under the Department
of Science and Industrial Research (DSIR) Government of India has been vigorously pro-
moting an integrated approach to library automation and networking.
Self Assessment
Fill in the blanks:
1. .................... defines a network as two or more libraries engaged in a common pattern of
information exchange, through communications for some functional a purpose.
2. The report on national policy on university libraries prepared by .................... .
3. A .................... is broadly described as a group of libraries coming together with some
agreement of understanding to help each other with a view to satisfying the information
needs of their clientele.
A typical use of LAN is to tie together personal computers in an office so that they can all use a single Notes
printer and a file server. The LAN can be within a building or a campus wide network.
Metropolitan Area Network (MAN): Attempts are being made to develop this type of network in
metropolitan areas such as Delhi, Calcutta, Bangalore, Madras, etc.
Wide Area Network (WAN): A large-scale network, involving offices in different cities and countries
is referred to as WAN, which is specially designed to interconnect data transmission devices over
wide geographical areas.
Categories of Network
Library networks have been divided into two categories: general network and specialized network.
The latter can further be divided into metropolitan network and countrywide network.
Self Assessment
Multiple choice questions:
4. There are .................... types of computer networks.
(a) 3 (b) 4 (c) 2 (d) 5.
5. LAN stands for:
(a) Local area network (b) Logic area network
(c) Large area network (d) Light area network.
NICNET (www.mylibnet.org)
Title: National Information Center Network
Sponsor: Planning Commission, Govt. of India
Membership: Four national and regional nodes, 32 state and union territory nodes;
Seventy cities and towns
Services: Bulk files transfer; teleconferencing; full text and bibliographic retrieval services
Application: ICMRNIC Center; MEDLARS in India; Chemical Abstracts database.
INDONET
Title: INDONET data Network
Sponsor: CMC Ltd (1986) = Informatics India Ltd (1989)
Membership: Commercial computer network
Services: Database services such as DIALOG, COMPUSERVE; IP; SHARP Applications: ACME; file
transfer; international gateway.
I - NET (VIKRAM)
Title: I - NET
Sponsor: Dept. of Telecommunications, Govt. of India
Connectivity: Packet switched public data network covering nine cities Services: Information
exchange through e-mail / FTP; Bibliographic databases Specialized Networks.
BONET
Title: Bombay Library Network
Sponsor: NISSAT & NCST (1994)
Objective: To promote cooperation among libraries in Bombay
Services: online catalog; online document delivery; IRS; interlibrary loan; dissemination of
information.
DELNET (delnet.nic.in/)
Title: Developing Library Network
Sponsor: NISSAT & NIC (1988)
Objective: To promote resource sharing; develop a network of libraries; collect, store, disseminate
information.
Members: 165 Institutions, 600 Libraries, 15 States in India, 5 from outside India
Services: resource sharing; free Software; ICE online facility; books database; thesis database;
Indian specialists; database.
ADINET (http://www.alibnet.org/)
Title: Ahmedabad Library Network
Sponsor: NISSAT, DSIR (1994) & INFLIBNET
Objective: To bring cooperation among its regional libraries; to develop databases; to integrate
scientific and technical information systems.
Members: nine libraries
Services: library automation; library holdings; database in progress
MYLIBNET: Title: Mysore Library Network Sponsor: NISSAT (1994)
Objective: Developing software tools; conducting seminar; workshops/training programs;
Conduct surveys
Host Site: CFTRI, Mysore
Members: 116 Institutions
Services: MYLIB Database; E-journals; food patents; CFTRI Library Bulletin; public services.
ERNET
Title: Educational and Research Network
Sponsor: Dept. of Electronics, Govt. of India; UNESCO (Financial assistance from UNDP)
Members: eight institutions (5 IITs, IISc., National Centre for Software Technology - Bombay, CCI Notes
wing of Dept. of Electronics)
Services: Communication services such as e-mail, file transfer, remote log on, database access,
bulletin board etc.,
SIRNET
Title: Scientific and Industrial Research Network
Sponsor: CSIR (Commissioned Agency- NCST, Bombay) Members: 40 labs and R&D Institutions
Applications: scientific communication; leather technology; natural products; food technology;
medicinal Plants.
VIDYANET
Title: VIDYANET (Dedicated Communication Computer Net) Sponsor: TATA Institute of
Fundamental Research, Bombay
Objectives: To provide rapid means of communications by linking computers at various institutions
in India to similar networks outside the country; to stimulate corporate research, the day-to-day
exchange of research information and the execution of joint projects and publications.
Services: File transfer facility; sharing of computer resources and access to remote applications,
databases, libraries, etc.
BTISNET (www.btisnet.nic.in/)
Title: BTISNET (Specialized Information Network) Sponsor: Dept. of Biotechnology, Govt. of
India.
Connectivity: 10 Specialized Information Centres in genetic engineering, plant tissue culture;
photosynthesis and plant molecular biology; cell transformation; bio-process engineering.
Services: Data processing using applications software; online communication access; facsimile
facility.
INFLIBNET (www.inflibnet.ac.in/index.jsp)
Title: Information Library Network
Sponsor: UGC (1991)
Connectivity: computer communication network of universities and R&D; libraries and
bibliographic information centers throughout the country.
Members: 200 Universities; 400 College libraries; 200 R&D libraries
Services: catalog service; database Services; document supply services; e-mail; BBS:
audio and video conferencing, etc. BALNET:
Title: Bangalore Library Network
Sponsor: JRD;. Tata Memorial Library (1995) Members: 100 Libraries
MALIBNET:
Title: Madras Library Network Sponsor: INSDOC & NISSAT (1993) Members: 15 Libraries
Activity: Two important databases, a directory database of current serials in Madras and a contents
database covering articles published in 300 journals available in Madras libraries.
During the recent period quite a large number of libraries and information centers are forming
networks. The advent of computer networking as an accepted part of the library and information
infrastructure has had a very significant impact on the way in which library and information
systems are perceived. India is thus on the threshold to a new era of computer communication
networks both for general purposes and for library and information purposes.
11.5 Summary
· A library network is broadly described as a group of libraries coming together with
some agreement of understanding to help each other with a view to satisfying the infor-
mation needs of their clientele.
· Library network to improve the efficiency of housekeeping operations.
· A network may fail in the early stages if there is not proper planning or if adequate funds
are not available.
11.6 Keywords
DSIR : The Department of Scientific and Industrial Research (DSIR) is a part of the Ministry
of Science and Technology. It has a mandate to carry out the activities relating to
indigenous technology promotion, development, utilization and transfer.
WAN : Wide Area Network is a large scale network involving offices in different cities.
ERNET : It is largest nationwide terrestrial and satellite network with point of presence
located at the premiere educational and research institutions in major cities of
the country.
NICNET : It has now become an integral part of a large number of Government and
Corporate sector organizations, providing information exchange services.
Notes
Unit 12: Libraries and Information Centers in India
CONTENTS
Objectives
Introduction
12.1 Libraries and Information Centers in India
12.2 DELNET
12.2.1 Objectives of DELNET
12.2.2 Membership
12.2.3 DELNET Activities/Services
12.2.4 The Future of DELNET
12.3 INFLIBNET
12.3.1 Objectives of INFLIBNET
12.3.2 Functions of INFLIBNET
12.4 ERNET
12.4.1 History of ERNET
12.4.2 ERNET Backbone
12.4.3 The Objectives of ERNET
12.5 NICNET
12.5.1 Achievements
12.5.2 NICNET Facilities
12.6 Summary
12.7 Keywords
12.8 Review Questions
12.9 Further Readings
Objectives
After studying this unit, you will be able to:
· Discuss the libraries and Information centres in India
· Describe about INFLIBNET
· State about ERNET.
Introduction
During the recent period quite a large number of libraries and information centres are forming
networks. As computer networking is an integral part of the library and information infrastructure
has a very important role in the way in which library and Information systems perceived. Thus India
has to play a very important role for library and information purposes. So India has many libraries
and information centres for the purpose of libraries and information. Some of them are discussed as
follows.
12.2 DELNET
Delhi is growing as a major centre of information resources in India. These resources cater both to
the specialized and the general users. They are located in activities, information and documentation
centres, institutional libraries, research libraries, government libraries, public libraries, department
libraries besides the libraries of the universities, colleges and schools. During the recent years,
increase in information has led to increase in the demands of the users. It has been noticed that in
this area of information explosion, libraries in India are generally ill-equipped to handle and
retrieve information effectively, the financial resources and the space requirement for housing
library collection are limited in almost all of the libraries. Not a single library can afford to house
every necessary document even in the area of its interest. Resource sharing, thus assumes great
importance at this juncture the option left with the forward looking librarians has been to promote
the sharing of resources by automation and networking.
Notes With this objective, in January 1988, the India International Centre initiated efforts for
the establishment of Delhi Library Network (Now Developing Library Network).
DELNET is the first operational library network in India. It was started as a project of the India Notes
International Centre in January 1988 with the initial, financial and technical assistance by National
Information System for Science and Technology (NISSAT), Department of Scientific and Industrial
Research, Govt. of India. It was registered as a society in June 1992 under the Societies Registration
Act of 1860 and is currently being promoted by the National Informatics Centre (NIC), Planning
Commission, Govt. of India and India International Centre, New Delhi.
12.2.2 Membership
At present, DELNET has Two Hundred and Forty Three libraries as its members, including both
institutional and associate-institutional members: in India 235 and outside India 8.
The membership is progressively increasing and includes universities, diplomatic missions,
college, government department, institutions and public libraries. Some institutions from far off
places like Shimla, Bhopal, Punjab, Andhra Pradesh, Lucknow and Pondicherry in India have also
joined DELNET as members.
Did u know? DELNET saved foreign exchange worth < 10 million by rationalizing
subscriptions to foreign periodicals during 1991, 1992 and 1993 through
resource sharing.
III. Standardization
A standardization committee of DELNET has been meeting from time to time. The standardization
committee takes into account the following areas:
· Communication format for interchanging bibliographic data
· Input output format
· Bibliographic description: Mandatory and optional data elements
· Classification scheme and subject headings
· Thesaurus
· Authority files
· Language scripts into roman script
· Forms of heading
· Identification numbers, codes and abbreviations
· Data input for abstracting and indexing
· Search/command language
It was noticed that colon classification, universal Decimal classification and Dewey Decimal classification
were mostly used in Indian libraries and therefore, it would be almost impossible to impose a
standard classification scheme on all libraries. It was decided to use Dewey Class Number. As
searching by class numbers was done by very few librarians, it was decided that the participating
libraries could search by the classification numbers or they could pass on such requests to DELNET
central office for necessary action. With regard to the standardization of subject headings and to
usage DELNET recommends the use of LCSM. Specialized libraries may use additional thesauri
that are available in each major discipline such as social sciences, humanities and science and
technology.
ILL Online
DELNET members can place their inter-library loan requests through our ILL online facility,
which is available on the union catalogue of books database. The member requests appear on the
main server, which are monitored by DELNET staff at regular intervals and the books are acquired
and supplied to the requesting library through the courier. Photocopying charges for journal
articles etc. and courier charges for sending books to member libraries outside Delhi are extra.
DEL-LISTSERV DELNET has created a Listserv service called DEL-LISTSERV to provide the current
awareness service to users and allow the member libraries to receive the latest daily information
from the INTERNET automatically in the form of electronic mail. The following listservs have been
created and are available online through DELNET:
· Net-happenings – This Listserv appraises the users about the latest new sites along with their
web addresses on the INTERNET and has proved to be a major source of information for the
users on the INTERNET.
· Med-clips – This medical clippings listing discusses the various topics of medical interest like
AIDI, cancer, etc. and is informative in nature.
· IFLA – This Listserv allows the users to get the latest information from the International
Federation of Library Associations and Institutions, which includes the issues of concern to
library and information professionals.
· LIBJOBS – Through this Listserv, the library professionals are able to find out daily, the jobs/
vacancies available throughout the world.
Notes outside India specializing in South Asian studies to take DELNET membership. DELNET databases
are going to be accessible through INTERNET which will made accessibility very fast. INTERNET
users in India are increasing and it will increase DELNET presence in different parts of India. DELNET
has already created software, viz. DELDOS and DEL-WINDOWS for creating MARC records .These
software will so on be developed to perform library operations as well. There developments are
likely to give more revenue to DELNET and provide justification for more and more libraries to join
DELNET. As resource, it is hoped the DELNET will grow faster as a service based resource sharing
model in India.
Self Assessment
Fill in the blanks:
1. DELNET stands for .................... .
2. .................... is the first operational library network in India.
3. DELNET has .................... . members including both institutional and associate-institutional
members.
12.3 INFLIBNET
Information and Library Network (INFLIBNET) Centre is an Autonomous Inter-University Centre
(IUC) of University Grants Commission, Government of India, involved in creating infrastructure
for sharing of library and information resources and services among Academic and Research
Institutions.
Notes INFLIBNET works collaboratively with Indian university libraries to shape the future
of the academic libraries in the evolving information environment.
Notes
Did u know? Education and Research Network (ERNET), India is an autonomous scientific
society of Ministry of Communication & information technology (Govt. of
India).
ERNET has made a significant contribution to the emergence of networking in the country. It
practically brought the Internet to India and has built up national capabilities in the area of net-
working, especially in protocol software engineering. It has not only succeeded in building a large
network that provides various facilities to the intellectual segment of Indian society-the research
and education community, it has over the years become a trendsetter in the field of networking.
12.4 ERNET
ERNET (Education and Research Network) has made a significant contribution to the emergence of
networking in the country. It practically brought the Internet to India and has built up national
capabilities in the area of net-working, especially in protocol software engineering. It has not only
succeeded in building a large network that provides various facilities to the intellectual segment
of Indian society—the research and education community, it has over the years become a trendsetter
in the field of networking. UNDP has lauded ERNET as one of the most successful programmers it
has funded. The Govt, of India has committed itself to further strengthen the project by including
it in the 9th Plan with the allocation of funds and by creation of a new organizational set-up in the
form of a Society. The Science community of the country has also recognized ERNET’s contribution—
both for infrastructure services as well as for R&D. The Scientific Advisory Committee to the
Cabinet has adopted ERNET as the platform for launching an S&T network in the country.
ERNET is largest nationwide terrestrial and satellite network with point of presence located at the
premiere educational and research institutions in major cities of the country.
Notes Focus of ERNET is not limited to just providing connectivity, but to meet the entire
needs of the educational and research institutions by hosting and providing relevant
information to their users.
Research and Development and Training are integral parts of ERNET activities. The activities at
ERNET India are organized around five technology focus areas:
· National Academic and Research Network
· Research and Development in the area of Data Communication and its Application
· Human Resource Development in the area of High-end Networking
· Educational Content
· Campus-wide High Speed Local Area Network.
Beginning
ERNET was initiated in 1986 by the Department of Electronics (DoE), with funding support from the
Government of India and United Nations Development Program (UNDP), involving eight premier
institutions as participating agencies-NCST (National Centre for Software Technology) Bombay,
IISc (Indian Institute of Science) Bangalore, five IITs (Indian Institutes of Technology) at Delhi,
Bombay, Kanpur, Kharagpur and Madras, and the DoE, New Delhi. ERNET began as a multi
protocol network with both the TCP/IP and the OSI-IP protocol stacks running over the leased-line
portion of the backbone. Since 1995, however, almost all traffic is carried over TCP/IP.
Notes
Did u know? All IITs, IISc Bangalore, DOE Delhi and NCST Mumbai were connected by 9.6
kbit/s leased line by 1992.
Achievements
· Foundation of a national capability building in the area of computer networking laid through:
· Setting up of a chain of core groups as the participating agencies with a minimal set of lab
facilities and creation of skilled manpower to carry out R&D
· Generating manpower at different levels
· Making the world of standards (TCP/IP, OSI etc.) well understood
· Providing an insight into emerging issues such as ATM networks, networked multimedia,
and information infrastructure
· Net-work infrastructure and services set up, including
· Installation, maintenance and operation of large campus LANs
· Design, commissioning and testing of SATWAN hub and the installation of VSATs
· Seamless interconnection of LAN-WAN segments and multi-protocol capability provided
· Provision of the whole range of Internet services
· Deployment of TDM/TDMA based VSAT network for Internet access
· Research and Development
· Research and development in the area of computer networking has been the forte of ERNET.
Task How research and development and training are integral parts of ERNET activities?
Justify.
Self Assessment
Multiple choice questions:
4. Information and library network is a major national programme initiated by UGC
in .................... .
(a) 1988 (b) 2002
(c) 1991 (d) 1992
5. The head quarters of Information and library network is situated at .................... .
(a) Delhi (b) Mumbai
(c) Mysore (d) Ahamedabad
6. ERNET practically brought the internet to India and has built of national capabilities in the
area of:
(a) Computer (b) Networking
(c) Internet (d) Technology
12.5 NICNET
In 1975, the Government of India strategically decided to take effective steps for the development
of information systems and utilization of information resources and also for introducing computer
based decision support system (informatics-led development) in government ministries and
departments to facilitate planning and programme implementation to further the growth of
economic and social development. Following this, the Central Government nucleated a high
priority plan project “National Informatics Centre (NIC)” in 1976, and later on with the financial
assistance of the United Nations Development Programme (UNDP) to the tune of US$4.4 million.
NIC was set up initially under the purview of Information, Planning and Analysis Group (IPAG)
of the then Electronics Commission/the Department of Electronics (DOE). In 1987, it was shifted to
the Union Planning Commission and in October 1999, to the newly formed Central Ministry of
Information Technology, which later became Department of Information Technology of the
Ministry of Communications and Information Technology.
The Government of India’s resolution on the NIC’s mandate has been published in the Gazette of
India dated 2 September 1995. Major thrust areas of projects are given below:
· NIC is permitted to utilize its services, expertise and infrastructure including NICNET for
supporting, on a charging basis, promotional activities/projects/programmes of national
importance.
· Informatics and Network support of NIC/NICNET can be made available to public and
private organizations engaged in specified promotional activities/projects/programmes.
· The specified categories of access are permitted for giving access to the services, technolo-
gies, expertise and infrastructure of NIC/NICNET to specified organizations and promo-
tional applications.
· NIC/NICNET is given the enabling facilities for supporting promotional activities/
projects/programmes in the identified work-areas.
The District is the basic administrative unit at the sub-state level in India. NICNET, with nodes in
all the district of the Country, is in consonance with the decentralized planning concepts of the
Government of India. It is a facilitator of information flow from the implementation level, to the
planners at macro (national), macro-meso (region covering more than one state), meso(state), and
micro (district, block and village)levels.
Did u know? NIC has innovated the concept of distributed databases, relevant to the specific
requirements in India, and implemented the same over NICNET.
Notes recent times to the latter with the result that information Management has become very import.
DISNIC programme attempts to server the needs of the administrators in a co-ordinated and
uniform manner. Its specific objectives are to
· develop necessary databases in various sectors of the economy for planning and decision
making at the district level.
· promote informatics culture at the district level through appropriate training programmes.
· improve the analysis capacity and presentation of statistics utilized for National, Regional
and District Planning.
· develop modelling and forecasting techniques that are required for decision making for
socio-economic development.
· promote Geographic Information System (GIS) techniques for planning and also remote
data applications for Natural Resources Management at grass-root level.
12.5.1 Achievements
NIC has emerged as a “prime builder” of e-government / e-Governance applications in government
sector (national, state and local districts) as well as promoter of digital opportunities for sustainable
development, during more than a quarter century period. NIC has institutional linkages through
its ICT Network “NICNET”, with all the Departments/Ministries of the Central Government, 28
State Governments, 1 National Capital Territory of Delhi, 6 Union Territories, and about 600
District administrations of India. NIC has been instrumental in steering e-Government/
e-Governance applications in Government Ministries/Departments at Centre, States, District and
Blocks, facilitating improvement in government services, wider transparency, promoting
decentralized planning and management, resulting in better efficiency and accountability to people.
NIC has been an active catalyst and facilitator in “informatics-led-development” programme of
the government (could also be termed as an e-Government programme, an e-Governance
Programme), enabling it to derive competitive advantage as well as to ‘reach out into India’ by
implementing ICT applications in Social & public Administrations which are discernable from the
following:
· Central Government Informatics Development Programme in the Fifth Plan Period (i.e.
1972-77)
· “NICNET” a gateway for Internet/Intranet Access and Resources Sharing in Central
Government Ministries and Departments during 1980s and 1990s;
· State Government Informatics Development Programme in the Seventh Plan Period (i.e.1985-
1990);
· DISNIC A NICNET based District Government Informatics programme for District
Administration;
· Reaching out into India during 1985-90, even before the arrival of “Internet” Technology, to
all the districts of the Country with different types of terrain, Agro- climatic conditions
varied Regional and Socio-economic developments.
· iNOC Integrated Network Operations Centre, equipped with the state-of-the-art
technology for managing the NICNET operations.
· Integrated Data Centre A world class Data Centre with state-of-the art infrastructure having
the capacity to house more than 1000 high-end servers, supporting a wide range of
technologies.
· Establishment of Digital Certification Authority and Public Key Infrastructure (PKI).
· Establishment of Disaster Recovery Centre (DRC) at Hyderabad.
During the last 27 years, NIC has implemented many “network centric” applications software for
Programme implementation in various ministries and departments, using state-of-the-art software
tools. “Reaching-Out-Into” and “Reaching- the-Unreached” Concepts were experimented and made
operational by NIC through its various ICT Diffusion Projects through its 600 NICNET nodes
located in district headquarters, even before the INTERNET Technology was introduced in this
Country. During 1980s and early part of 1990s, the policy thrust was on creating a “decision Notes
support system” for development planning and responsive administration in governments (i.e.
an earlier version of the present day “e-Governance” / “e-Government”). NIC has vast core
expertise and experience in the design, development and operationalisation of various
e-Government projects in the areas of Public Administration and Governance viz., Agriculture &
Food, Animal Husbandry, Fisheries, Forestry & Environment, Industry, Health, Education, Budget
and Treasury, Fiscal Resources, Transport, Water Resources, Court Management, Rural
Development, Land Records and Property registration, Culture & Tourism, Import & Exports
facilitation, Social Welfare Services, Micro-level Planning etc.
GENESIS
The Electronics Commission and the DOE put forward a proposal to UNDP for assistance to set up
a National Computer Centre in Delhi for building up national data bases, developing the
methodologies for utilising these, and for defining the various options and paths in decision-
making at the national level. A UNDP team visited Delhi in March 1975 to study the proposal. The
UNDP agreed to fund the National Informatics Centre to the extent of US $4.4 million for the
purchase of a large computer system (costing approximately US $3.3 million), other hardware,
training, the services of experts, etc.
NIC is working towards informatics programme development at the block level to strengthen Notes
micro-level Planning, Rural Development, Land Records Management, Panchayati Raj Institutions
etc., and to facilitate block development and tehsil revenue administrations at the sub-district level.
Notes NICNET provides gateway to International Networks for Electronic Mail, Database
Access and EDI services.
Self Assessment
State whether the following statements are true or false:
10. NIC launched its district information system programme in 1987.
11. NIC has implemented land records computerisation in 16 pilot districts.
12. The DISNIC programme is operational in 500 districts throughout the Country.
13. NICNET was designed and implemented by NIC using state-of the satellite-based com-
puter communication technology.
12.6 Summary
· Information and Library Network (INFLIBNET) Centre is an Autonomous Inter-Univer-
sity Centre (IUC) of University Grants Commission, Government of India, involved in
creating infrastructure for sharing of library and information resources and services
among Academic and Research Institutions.
· Centre is an autonomous Inter-University Centre of the University Grants Commission
(UGC) of India.
· To promote and establish communication facilities to improve capability in information
transfer and access, that provide support to scholarship, learning, research and academic
pursuit through cooperation and involvement of agencies concerned.
· ERNET is largest nationwide terrestrial and satellite network with point of presence lo-
cated at the premiere educational and research institutions in major cities of the country.
· ERNET was initiated in 1986 by the Department of Electronics (DoE), with funding sup-
port from the Government of India and United Nations Development Program (UNDP),
involving eight premier institutions as participating agencies-NCST (National Centre
for Software Technology) Bombay, IISc (Indian Institute of Science) Bangalore, five IITs
(Indian Institutes of Technology) at Delhi, Bombay, Kanpur, Kharagpur and Madras, and
the DoE, New Delhi.
· The DISNIC programme is operational in 440 districts throughout the Country.
Books Malwad (N.M), et al, eds. Digital Libraries: Dynamic Storehouse of Digitized Infor-
mation: Papers Presented at the SIS ’96 15th Annual Convention and Conference
18-20 January, 1996. Bangalore, New Age International Publishers, 1996.
Aswal, R.S., ed. (2003). Information Networks in India, New Delhi: Ess Ess Publica-
tion. Baruah, A. (2002). Computer Networking in Libraries, Delhi; Kalpaz, 2002.
Jain, N.K, ed. (1998). 50 Years: Library and Information services in India.
Notes
Unit 13: Internet Based Resources
and Service Browsers
CONTENTS
Objectives
Introduction
13.1 Internet Based Resources
13.1.1 World Wide Web
13.1.2 Web Browser
13.2 Web Application
13.3 Web Search Engine
13.3.1 List of Search Engines
13.4 Summary
13.5 Keywords
13.6 Review Questions
13.7 Further Readings
Objectives
After studying this unit, you will be able to:
· State the internet based resources
· Discuss about Web application
· Describe the Web search engine
· Explain about the list of search engines.
Introduction
The Internet has spread technological literacy and given people all over the world fast access to
vast resources. Internet use is directly affecting people, ideas, and behavior. Internet has an impact
in many areas, including higher education, where it heralds the development and implementation
of new and innovative strategies. Scholars can communicate with each other, as well as they can
have access with library catalogues, bibliographic databases, and other academic resources.
Notes networking. Online shopping has boomed both for major retail outlets and small artisans and
traders. Business-to-business and financial services on the Internet affect supply chains across entire
industries.
The origins of the Internet reach back to research of the 1960s, commissioned by the United States
government in collaboration with private commercial interests to build robust, fault-tolerant,
and distributed computer networks. The funding of a new U.S. backbone by the National Science
Foundation in the 1980s, as well as private funding for other commercial backbones, led to
worldwide participation in the development of new networking technologies, and the merger of
many networks. The commercialization of what was by the 1990s an international network resulted
in its popularization and incorporation into virtually every aspect of modern human life. As of
2011, more than 2.1 billion people – nearly a third of Earth’s population – use the services of the
Internet.
The Internet has no centralized governance in either technological implementation or policies for
access and usage; each constituent network sets its own standards. Only the overreaching definitions
of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain
Name System, are directed by a maintainer organization, the Internet Corporation for Assigned
Names and Numbers (ICANN). The technical underpinning and standardization of the core
protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit
organization of loosely affiliated international participants that anyone may associate with by
contributing technical expertis.
Notes
Figure 13.1
Figure 13.2
A web application is an application that is accessed over a network such as the Internet or an
intranet. The term may also mean a computer software application that is hosted in a browser-
controlled environment (e.g. a Java applet) or coded in a browser-supported language (such as
JavaScript, combined with a browser-rendered markup language like HTML) and reliant on a
common web browser to render the application executable.
Web applications are popular due to the ubiquity of web browsers, and the convenience of using
a web browser as a client, sometimes called a thin client. The ability to update and maintain web
applications without distributing and installing software on potentially thousands of client
computers is a key reason for their popularity, as is the inherent support for cross-platform
compatibility.
Notes Common web applications include web mail, online retail sales, online auctions,
wikis and many other functions.
In earlier computing models, e.g., in client-server, the load for the application was shared between
code on the server and code installed on each client locally. In other words, an application had its
own client programme which served as its user interface and had to be separately installed on each
user’s personal computer. An upgraded server-side code of the application would typically require
an upgrade client-side code installed on each user workstation, adding to the support cost and
decreasing productivity.
Notes In contrast, web applications use web documents written in a standard format such as HTML (and
more recently XHTML), which are supported by a variety of web browsers.
Generally, each individual web page is delivered to the client as a static document, but the sequence
of pages can provide an interactive experience, as user input is returned through web form elements
embedded in the page markup. During the session, the web browser interprets and displays the
pages, and acts as the universal client for any web application.
Did u know? In 1999, the “web application” concept was introduced in the Java language in
the Servlet Specification version 2.2. [2.1?].
At that time both JavaScript and XML had already been developed, but Ajax had still not yet been
coined and the XML Http Request object had only been recently introduced on Internet Explorer 5
as an ActiveX object.
In 2005, the term Ajax was coined, and applications like Gmail started to make their client sides
more and more interactive.
Interface
Figure 13.3
Structure
Applications are usually broken into logical chunks called “tiers”, where every tier is assigned a
role. Traditional applications consist only of 1 tier, which resides on the client machine, but web
applications lend themselves to a n-tiered approach by nature. Though many variations are possible,
the most common structure is the three-tiered application. In its most common form, the three Notes
tiers are called presentation, application and storage, in this order. A web browser is the first tier
(presentation), an engine using some dynamic Web content technology (such as ASP, ASP.NET,
CGI, ColdFusion, JSP/Java, PHP, Perl, Python, Ruby on Rails or Struts2) is the middle tier (application
logic), and a database is the third tier (storage). The web browser sends requests to the middle tier,
which services them by making queries and updates against the database and generates a user
interface.
For more complex applications, a 3-tier solution may fall short, and it may be beneficial to use an
n-tiered approach, where the greatest benefit is breaking the business logic, which resides on the
application tier, into a more fine-grained model. Another benefit may be adding an integration
tier that separates the data tier from the rest of tiers by providing an easy-to-use interface to access
the data. For example, the client data would be accessed by calling a “list clients ()” function
instead of making a SQL query directly against the client table on the database. This allows the
underlying database to be replaced without making any change to the other tiers.
There are some who view a web application as two-tier architecture. This can be a “smart”
client that performs all the work and queries a “dumb” server, or a “dumb” client that relies on
a “smart” server. The client would handle the presentation tier, the server would have the
database (storage tier), and the business logic (application tier) would be on one of them or on
both. While this increases the scalability of the applications and separates the display and the
database, it still doesn’t allow for true specialization of layers, so most applications will
outgrow this model.
Business Use
An emerging strategy for application software companies is to provide web access to software
previously distributed as local applications. Depending on the type of application, it may require
the development of an entirely different browser-based interface, or merely adapting an existing
application to use different presentation technology. These programs allow the user to pay a
monthly or yearly fee for use of a software application without having to install it on a local hard
drive. A company which follows this strategy is known as an application service provider (ASP),
and ASPs are currently receiving much attention in the software industry.
Task Explain your own idea how web application is useful in business.
Applications
Examples of browser applications are simple office software (word processors, online spreadsheets,
and presentation tools), but can also include more advanced applications such as project
management, computer-aided design, video editing and point-of-sale.
Notes Benefits
· Web applications do not require any complex “roll out” procedure to deploy in large
organizations. A compatible web browser is all that is needed;
· Browser applications typically require little or no disk space on the client;
· Companies require no upgrade procedure since all new features are implemented on the
server and automatically delivered to the users;
· Web applications integrate easily into other server-side web procedures, such as email and
searching.
· Companies also provide cross-platform compatibility in most cases (i.e., Windows, Mac,
Linux, etc.) because they operate within a web browser window.
Drawbacks
· In practice, web interfaces, compared to thick clients, typically force significant sacrifice to
user experience and basic usability.
· Web applications absolutely require compatible web browsers. If a browser vendor
decides not to implement a certain feature, or abandons a particular platform or operating
system version, this may affect a huge number of users;
· Standards compliance is an issue with any non-typical office document creator, which
causes problems when file sharing and collaboration becomes critical;
· Browser applications rely on application files accessed on remote servers through the
Internet. Therefore, when connection is interrupted, the application is no longer usable.
However, if it uses HTML5 API’s such as Offline Web application caching, it can be down-
loaded and installed locally, for offline use. Google Gears, although no longer in active
development, is a good example of a third party plug in for web browsers that provides
additional functionality for creating web applications;
· Since many web applications are not open source, there is also a loss of flexibility, making
users dependent on third-party servers, not allowing customizations on the software and
preventing users from running applications offline (in most cases). However, if licensed,
proprietary software can be customized and run on the preferred server of the rights owner;
· They depend entirely on the availability of the server delivering the application. If a
company goes bankrupt and the server is shut down, the users have little recourse. Tradi-
tional installed software keeps functioning even after the demise of the company that
produced it (though there will be no updates or customer service);
· Likewise, the company has much greater control over the software and functionality. They
can roll out new features whenever they wish, even if the users would like to wait until the
bugs have been worked out before upgrading. The option of simply skipping a weak
software version is often not available. The company can foist unwanted features on the
users or cut costs by reducing bandwidth. Of course, companies will try to keep the good
will of their customers, but the users of web applications have fewer options in such cases
unless a competitor steps in and offers a better product and easy migration;
· The company can theoretically track anything the users do. This can cause privacy problems.
Self Assessment
Fill in the blanks:
1. A .................... is an application that is accessed over a network such as the internet or an
intranet.
2. In .................... the web application, concept was introduced in the Java language in the
servlet specification version 2.2.
3. In ...................., the term Ajex was coined, and applications like Gmail started to make their
client sides more and more interactive.
4. .................... is the director of the world wide web consortium.
Google: 67.9%
US Share Of Searches: April 2008
Source: Hitwise
for SearchEngineLand.com
Others: 1.4%
Ask: 4.2%
Microsoft: 6.3%
Yahoo: 20.3%
A web search engine is designed to search for information on the World Wide Web and FTP
servers. The search results are generally presented in a list of results and are often called hits. The
information may consist of web pages, images, information and other types of files. Some search
engines also mine data available in databases or open directories. Unlike web directories, which
are maintained by human editors, search engines operate algorithmically or are a mixture of
algorithmic and human input.
World Wide
Web
Web pages
URLs Multi-threaded
Scheduler
downloader
Text and
metadata
Queue
URLs
Storage
Notes Web search engines work by storing information about many web pages, which
they retrieve from the html itself.
Notes These pages are retrieved by a Web crawler (sometimes also known as a spider) — an automated
Web browser who follows every link on the site. Exclusions can be made by the use of robots.txt.
The contents of each page are then analyzed to determine how it should be indexed (for example,
words are extracted from the titles, headings, or special fields called meta tags). Data about web
pages are stored in an index database for use in later queries. A query can be a single word. The
purpose of an index is to allow information to be found as quickly as possible. Some search
engines, such as Google, store all or part of the source page (referred to as a cache) as well as
information about the web pages, whereas others, such as AltaVista, store every word of every
page they find. This cached page always holds the actual search text since it is the one that was
actually indexed, so it can be very useful when the content of the current page has been updated
and the search terms are no longer in it. This problem might be considered to be a mild form of
linkrot, and Google’s handling of it increases usability by satisfying user expectations that the
search terms will be on the returned webpage. This satisfies the principle of least astonishment
since the user normally expects the search terms to be on the returned pages. Increased search
relevance makes these cached pages very useful, even beyond the fact that they may contain data
that may no longer be available elsewhere.
When a user enters a query into a search engine (typically by using key words), the engine
examines its index and provides a listing of best-matching web pages according to its criteria,
usually with a short summary containing the document’s title and sometimes parts of the text. The
index is built from the information stored with the data and the method by which the information
is indexed. Unfortunately, there are currently no known public search engines that allow documents
to be searched by date. Most search engines support the use of the boolean operators AND, OR and
NOT to further specify the search query. Boolean operators are for literal searches that allow the
user to refine and extend the terms of the search. The engine looks for the words or phrases exactly
as entered. Some search engines provide an advanced feature called proximity search which
allows users to define the distance between keywords. There is also concept-based searching
where the research involves using statistical analysis on pages containing the words or phrases
you search for. As well, natural language queries allow the user to type a question in the same
form one would ask it to a human. A site like this would be ask.com.
The usefulness of a search engine depends on the relevance of the result set it gives back. While
there may be millions of web pages that include a particular word or phrase, some pages may be
more relevant, popular, or authoritative than others. Most search engines employ methods to
rank the results to provide the “best” results first. How a search engine decides which pages are the
best matches, and what order the results should be shown in, varies widely from one engine to
another. The methods also change over time as Internet usage changes and new techniques evolve.
There are two main types of search engine that have evolved: one is a system of predefined and
hierarchically ordered keywords that humans have programmed extensively. The other is a system
that generates an “inverted index” by analyzing texts it locates. This second form relies much
more heavily on the computer itself to do the bulk of the work.
Most Web search engines are commercial ventures supported by advertising revenue and, as a
result, some employ the practice of allowing advertisers to pay money to have their listings
ranked higher in search results. Those search engines which do not accept money for their search
engine results make money by running search related ads alongside the regular search engine
results. The search engines make money everytime if someone clicks on one of these ads.
Search engine Market share in May 2011 Market share in December 2010
Google 82.80% 84.65%
Yahoo! 6.42% 6.69%
Baidu 4.89% 3.39%
Bing 3.91% 3.29%
Ask 0.52% 0.56%
AOL 0.36% 0.42%
Self Assessment
Multiple choice questions:
5. A .................... is designed to search for information on the World Wide Web and FTP servers.
(a) Web search engine (b) Web application
(c) Web portal (d) Web master.
6. When a user enters a query into a search engine, the engine examines its .................... and
provides a listing of best-matching web pages according to its criteria.
(a) User ID (b) Password (c) Index (d) None of these.
Did u know? Google Bombing is one example of an attempt to manipulate search results
for political, social or commercial reasons.
By content/topic
General
· Baidu (Chinese, Japanese)
· Bing
· Blekko
· Duck Duck Go
· Google
· Sogou (Chinese)
· Soso.com (Chinese)
· Yahoo!
· Yandex (Russian)
· Yebol
· Yodao (Chinese)
Usenet
· Google Groups (formerly Deja News)
Based on
Google
· AOL Search
· CompuServe Search
· Groovle Notes
· MySpace Search
· Netscape
· Ripple
Yahoo
· AltaVista
· Ecocho
· Everyclick (formerly based on Ask.com)
· Forestle (an ecologically motivated site supporting sustainable rain forests - formerly
based on Google)
· GoodSearch
· Rectifi
Bing
· A9.com
· Alexa Internet
· Ciao!
· Facebook
· Tafiti
· Ms. Dewey
· Yahoo! Search
Ask.com
· Hakia (semantic search)
· iWon
· Lycos
Self Assessment
State whether the following statements are true or false:
7. Search engines are list of wikipedia.
8. Google searching is not one example of an attempt to manipulate search results for political,
social or commercial reasons.
13.4 Summary
· A web application is an application that is accessed over a network such as the Internet or
an intranet.
· In 1999, the “web application” concept was introduced in the Java language in the Servlet
Specification version 2.2.
· In 2005, the term Ajax was coined, and applications like Gmail started to make their client
sides more and more interactive.
· In practice, web interfaces, compared to thick clients, typically force significant sacrifice to
user experience and basic usability.
· A web search engine is designed to search for information on the World Wide Web and
FTP servers. The search results are generally presented in a list of results and are often
called hits.
Books Malwad (N.M), et al, eds.. Digital Libraries: Dynamic Storehouse of Digitized Informa-
tion : Papers Presented at the SIS ’96 15th Annual Convention and Conference
18-20 January, 1996. Bangalore: New Age International Publishers, 1996.
Aswal, R.S., ed. (2003). Information Networks in India. NewDelhi, Ess Ess Publica-
tion. Baruah, A. (2002). Computer Networking in Libraries. Delhi; Kalpaz, 2002.
Jain, N.K, ed. (1998). 50 Years: Library and Information services in India.
Nair, R. Raman. Internet for Library and Information Services.
Notes
Unit 14: Web Portal
CONTENTS
Objectives
Introduction
14.1 Web Portal
14.1.1 Types of Portals
14.2 Gateway (Telecommunications)
14.3 Electronic Journal
14.4 Mailing List
14.4.1 Types of Mailing Lists
14.4.2 List Washing
14.5 Bulletin Board
14.6 Computer Conference and Virtual Seminar
14.6.1 Early Conferencing Systems
14.6.2 Current Technologies
14.6.3 Group Lists and Listservers
14.6.4 Chat Tools
14.6.5 Whiteboards
14.6.6 Audio and Video Conferencing
14.6.7 Collaboration Suites and Groupware
14.6.8 Privacy, Access, and Security
14.6.9 Future Trends
14.7 Summary
14.8 Keywords
14.9 Review Questions
14.10 Further Readings
Objectives
After studying this unit, you will be able to:
· Describe about web portal and its types
· Discuss the meaning of Gateway
· Explain the term electronic journal
· State about the bulletin board
· Explain thoroughly about computer conference.
Introduction
With so many portals out there and so many vendors hawking protalware, one might think that
there is at least a firm agreement on what portals are. In fact, there are many confusing and often
contradictory definitions. Some people even believe that just putting the work portal prominently
on their home page makes it a portal. After all, with enough links, and especially a link to a search
engine, any home page can give you access to much of the Web.
Task State your own views how vertical information portal differ from horizontal portal.
Personal portals
A personal portal is a site on the World Wide Web that typically provides personalized capabilities
to its visitors, providing a pathway to other content. It is designed to use distributed applications,
different numbers and types of middleware and hardware to provide services from a number of
different sources. In addition, business portals are designed for sharing and collaboration in
workplaces. A further business-driven requirement of portals is that the content be able to work on
multiple platforms such as personal computers, personal digital assistants (PDAs), and cell phones /
mobile phones. Information, news, and updates are examples of content that would be delivered
through such a portal. Personal portals can be related to any specific topic such as providing friend
information on a social network or providing links to outside content that may help others beyond
your reach of services. Portals are not limited to simply providing links. Information or content that
you are putting on the internet may create a portal in the sense of a path to new knowledge and/or
capabilities.
News Portals
The traditional media rooms all around the world are fast adapting to the new age technologies. This
marks the beginning of news portals by media houses across the globe. This new media channels
give them the opportunity to reach the viewers in a shorter span of time than their print media
counter parts.
Did u know? Corporate Web portals allow internal and external access to specific corporate
information using secure authentication or single sign-on.
JSR168 Standards emerged around 2001. Java Specification Request (JSR) 168 standards allow the
interoperability of portlets across different portal platforms. These standards allow portal
developers, administrators and consumers to integrate standards-based portals and portlets across
a variety of vendor solutions.
The concept of content aggregation seems to still gain momentum and portal solution will likely
continue to evolve significantly over the next few years. The Gartner Group predicts generation 8
portals to expand on the Business Mashups concept of delivering a variety of information, tools,
applications and access points through a single mechanism.
With the increase in user generated content, disparate data silos, and file formats, information
architects and taxonomist will be required to allow users the ability to tag (classify) the data. This
will ultimately cause a ripple effect where users will also be generating ad hoc navigation and
information flows.
Corporate Portals also offer customers and employees self-service opportunities.
Stock Portals
Stock Market portals or stock exchange portals are Web-based applications that facilitates the
process of informing the share-holders with substantial online data such as the latest price, ask/
bids, the latest News, reports and announcements. Some stock portals use online gateways through
a central depository system (CDS) for the visitors to buy or sell their shares or manage their
portfolio.
Tender’s Portals
Tender’s portals stands for a gateway to search/modify/submit/archive data on tenders and
professional processing of continuous online tenders. With a tender portal the complete tendering
process-submitting of proposals, assessment, administration-are done on the web.
Electronic or online tendering is just carrying out the same traditional tendering process in an
electronic form, using the Internet.
Using online tendering, bidders can do any of the following:
· Receive notification of the tenders.
· Receive tender documents online.
· Fill out the forms online.
· Submit proposals and documents.
· Submit bids online.
Domain-specific Portals
A number of portals have come that are specific to the particular domain, offering access to related
companies and services, a prime example of this trend would be the growth in property portals that
give access to services such as estate agents, removal firm, and solicitors who offer guidance. Along
the same lines, industry-specific news and information portals have appeared, such as the clinical
trials specific portal: IFPMA Clinical Trials Portal.
Self Assessment
Fill in the blanks:
1. A .................... is a web site that functions as a point of access to information on the world
wide web.
2. .................... types of portal are present.
3. A .................... portal is a site on the world wide web that typically provides personalized
capabilities to its visitors, providing a pathway to other content.
Internet-to-Orbit Gateway
An Internet to orbit gateway (I2O) is a machine that acts as a connector between computers or
devices connected to the Internet and computer systems orbiting the earth, like satellites or even
manned spacecrafts. Such connection is made when the I2O establishes a stable link between the
spacecraft and a computer or a network of computers on the Internet, such link can be control
signals, audio frequency, or even visible spectrum signals.
Cloud Gateway
A Cloud storage gateway is a network appliance or server which resides at the customer premises
and translates cloud storage APIs such as SOAP or REST to block-based storage protocols such as
iSCSI or Fibre Channel or file-based interfaces such as NFS or CIFS.
Notes Cloud storage gateways enable companies to integrate cloud storage into applications
without moving the applications into the cloud. In addition they simplify data protection.
Notes Some electronic journals are online-only journals; some are online versions of printed journals,
and some consist of the online equivalent of a printed journal, but with additional online-only
(sometimes video and interactive media) material.
Most commercial journals are subscription-based, or allow pay-per-view access many universities
subscribe in bulk to packages of electronic journals, so as to provide access to them to their students
and faculty. It is generally also possible for individuals to purchase an annual subscription to a
journal, via the original publisher.
An increasing number of journals are now available as online open access journals, requiring no
subscription and offering free full-text articles and reviews to all. Individual articles from electronic
journals will also be found online for free in an ad hoc manner: in working paper archives; on
personal homepages; and in the collections held in institutional repositories and subject repositories.
Some commercial journals do find ways to offer free materials. They may offer their initial issue or
issues free, and then charge thereafter. Some give away their book reviews section for free. Others
offer the first few pages of each article for free.
Announcement List
Announcement lists are an easy and cost-effective means of communicating with a large number
of people. Also known as one-way lists, announcement lists facilitate communication from
authorized senders (usually one or a few editors) to the entire list. List members receive messages
but do not interact directly with one another. Announcement lists provide a valuable solution for
distributing newsletters, product announcements, new alerts, press releases and promotional
offers to a large number of recipients.
OPT-IN
SUBSCRIBERS
1. Announcement Lists Build Loyalty, Recognition and Trust: A professional electronic news-
letter is one of the strongest ways for companies and organizations to build customer
loyalty boost brand recognition and keep customers and stakeholders engaged. By provid-
ing quality content and a consistent graphical profile in a regularly distributed newsletter, an
organization can greatly enhance its image among subscribers, which, in turn, can contrib-
ute to higher customer satisfaction and increased sales.
2. Announcement Lists Are Easy to Use: Recipients can subscribe or unsubscribe quickly and
easily to opt-in announcement lists. Email list management software automates most
administrative tasks, such as subscriptions, sign-offs and bounce handling, making mass
email communication easy and cost-effective.
3. Announcement Lists Allow for Customization: Email newsletters and other types of
announcements can be easily customized according to each recipient’s individual prefer-
ences, drawing on information from an organization’s customer or member database.
4. Announcement List Activity Can Be Measured: Responses to newsletters and announce-
ments can be measured through open-up and click-through tracking to determine the most
compelling content. These analytics can be expanded to measure resulting sales or member-
ship conversions. Based on real data, future announcements can be modified to more closely
match the needs and preferences of individual subscribers.
5. Announcement Lists Foster Interactivity: Although announcement lists primarily involve
one-way communication, interactive polls and surveys can be easily added to email newslet-
ters and announcements, leading to valuable feedback, which can help build a two-way
relationship between senders and subscribers.
Discussion Lists
Discussion lists are an effective and widely used platform for interaction among groups of people,
providing opportunities for collaboration, information sharing and forming virtual communities.
Discussion lists can operate with or without monitoring by a list owner or editor, known as
moderation. Examples of discussion lists include technical support forums, interest groups, fan clubs
and professional networks. Members of a discussion list communicate around a given focus topic.
Each member can send messages to the list for distribution to all subscribers.
OPT-IN
SUBSCRIBERS
DISCUSSION LIST
Many companies and organizations are using discussion lists to enhance customer communication
and to build internal workgroups. Discussion lists are ideal for exchanging expertise, obtaining
feedback and fostering collaboration among geographically dispersed work team members. When
administering discussion lists, it is important to use full-featured email list management software.
The software should provide double opt-in functionality and an easy-to-use interface for group
members to automatically subscribe, unsubscribe and change their email addresses or subscription
settings. Naturally, the software should also automatically handle bounces or delivery errors, maintain
message archives and provide security features that keep the groups free from viruses and spam.
14.4.2 Listwashing
Listwashing is the process through which individual entries in mailing lists are removed. These
mailing lists typically contain email addresses or phone numbers of those that have not voluntarily
subscribed. An entry is removed from the list after a complaint is received.
Only complainers are removed via this process. It is widely believed that only a small fraction of
those inconvenienced with unsolicited email end up sending a proper complaint. Because most of
those that have not voluntarily subscribed stay on the list, and only the complainers stop complaining
because they are removed, this helps spammers to maintain a “complaint-free” list of spammable
email addresses.
Notes Internet service providers who forward complaints to the spamming party are often
seen as assisting the spammer in list washing, or, in short, helping spammers.
Notes Originally BBSes were accessed only over a phone line using a modem, but by the
early 1990s some BBSes allowed access via a Telnet, packet switched network, or
packet radio connection.
Ward Christensen coined the term “Bulletin Board System” as a reference to the traditional cork-
and-pin bulletin board.
Presentation
BBSes were generally text-based, rather than GUI-based, and early BBSes conversed using the
simple ASCII character set. However, some home computer manufacturers extended the ASCII
character set to take advantage of the advanced color and graphics capabilities of their systems. BBS
software authors included these extended character sets in their software, and terminal programme
authors included the ability to display them when a compatible system was called. Atari’s native
character set was known as ATASCII, while most Commodore BBSes supported PETSCII. PETSCII
was also supported by the nationwide online service Quantum Link.
Did u know? Ward Christensen coined the term “Bulletin Board System”.
Notes The use of these custom character sets was generally incompatible between manufacturers. Unless
a caller was using terminal emulation software written for, and running on, the same type of
system as the BBS, the session would simply fall back to simple ASCII output. For example, a
Commodore 64 user calling an Atari BBS would use ASCII rather than the machine’s native
character set. As time progressed, most terminal programs began using the ANSI standard, but
could use their native character set if it was available.
COCONET, a BBS system made by Coconut Computing, Inc., was released in 1988 and only
supported a GUI interface (no text interface was available), and worked in EGA/VGA graphics
mode, which made it stand out from the text-based BBS systems. COCONET’s bitmap and vector
graphics and support for multiple type fonts were inspired by the PLATO system, and the graphics
capabilities were based on what was available in the Borland BGI graphics library. A number of
companies wanted to license the COCONET GUI but Coconut Computing chose not to, and as a
result, a competing approach called Remote Imaging Protocol (RIP) emerged and was promoted
by Telegrafix in the early to mid 1990s but it never became widespread. A similar technology
called NAPLPS was also considered, and although it became the underlying graphics technology
behind the Prodigy service, it never gained popularity in the BBS market. There were several GUI-
based BBS’s on the Apple Macintosh platform, including TeleFinder and FirstClass, but these
remained widely used only in the Mac market.
In the UK, the BBC Micro based OBBS software, available from Pace for use with their modems,
optionally allowed for colour and graphics using the Teletext based graphics mode available on that
platform. Other systems used the Viewdata protocols made popular in the UK by British Telecom’s
Prestel service, and the on-line magazine Micronet 800 whom were busy giving away modems with
their subscriptions.
The most popular form of online graphics was ANSI art, which combined the IBM Extended ASCII
character set’s blocks and symbols with ANSI escape sequences to allow changing colors on demand,
provide cursor control and screen formatting, and even basic musical tones. During the late 1980s
and early 1990s, most BBSes used ANSI to make elaborate welcome screens, and colorized menus,
and thus, ANSI support was a sought-after feature in terminal client programs. The development of
ANSI art became so popular that it spawned an entire BBS “artscene” subculture devoted to it.
Amiga program Skyline BBS was the first in 1987 featuring a script markup language communication
protocol called Skypix which was capable to give the user a complete graphical interface, featuring
rich graphic content, changeable fonts, mouse-controlled actions, animations and sound.
Today, most BBS software that is still actively supported, such as WorldGroup, Wildcat! BBS and
Citadel/UX, is Web-enabled, and the traditional text interface has been replaced (or operates
concurrently) with a Web-based user interface. For those more nostalgic for the true BBS experience,
one can use Net Serial (Windows) or DOSBox (Windows/*nix) to redirect DOS COM port software
to telnet, allowing them to connect to Telnet BBSes using 1980s and 1990s era modem terminal
emulation software, like Telix, Terminate, Qmodem and Procomm Plus. Modern 32-bit terminal
emulators such as mTelnet and SyncTerm include native telnet support.
religion, music, dating, and alternative lifestyles. Many SysOps also adopted a theme in which Notes
they customized their entire BBS (welcome screens, prompts, menus, and so on.) to reflect that
theme. Common themes were based on fantasy, or were intended to give the user the illusion of
being somewhere else, such as in a sanatorium, wizard’s castle, or on a pirate ship.
In the early days, the file download library consisted of files that the SysOps obtained themselves
from other BBS and friends. Many BBSes inspected every file uploaded to their public file download
library to ensure that the material did not violate copyright law. As time went on, Shareware CD
ROMs were sold with up to thousands of files on each CD ROM. Small BBS copied each file individually
to their hard drive. Some systems used a CD ROM drive to make the files available. Advanced BBS
used Multiple CD ROM disk changer units that switched 6 CD ROM disks on demand for the
caller(s). Large systems used all 26 DOS Drive letters with multi-disk changers housing tens of
thousands of copyright free shareware or freeware files available to all callers. These BBSes were
generally more family friendly, avoiding the seedier side of BBSes. Access to these systems varied
from single to multiple modem lines with some requiring little or no confirmed registration.
Some BBSes, called elite, warez or pirate boards, were exclusively used for distributing pirated software,
phreaking, and other questionable or unlawful content. These BBSes often had multiple modems and
phone lines, allowing several users to upload and download files at once. Most elite BBSes used some
form of new user verification, where new users would have to apply for membership and attempt to
prove that they were not a law enforcement officer or a lamer. The largest elite boards accepted users
by invitation only. Elite boards also spawned their own subculture and gave rise to the slang known
today as leetspeak.
Another common type of board was the “support BBS” run by a manufacturer of computer products
or software. These boards were dedicated to supporting users of the company’s products with
question and answer forums, news and updates, and downloads. Most of them were not a free call.
Today, these services have moved to the web.
Some general purpose Bulletin Board Systems had special levels of access that were given to those
who paid extra money, uploaded useful files or knew the sysop personally. These specialty and pay
BBSes usually had something special to offer their users such as large file libraries, warez, pornography,
chat rooms or Internet access.
Pay BBSes such as The WELL and Echo NYC (now Internet forums rather than dial-up), ExecPC, and
MindVox (which folded in 1996) were admired for their tightly-knit communities and quality discussion
forums. However, many “free” BBSes also maintained close knit communities, and some even had
annual or bi-annual events where users would travel great distances to meet face-to-face with their
on-line friends. These events were especially popular with BBSes that offered chat rooms.
Some of the BBSes that provided access to illegal content did wind up in trouble. On July 12, 1985,
in conjunction with a credit card fraud investigation, the Middlesex County, NJ Sheriff’s department
raided and seized The Private Sector BBS, which was the official BBS for grey hat hacker quarterly
Notes 2600 Magazine at the time. The notorious Rusty n Edie’s BBS, in Boardman, Ohio, was raided by the
FBI in January 1993 for software piracy, and in November 1997 sued by Playboy for copyright
infringement. In Flint, Michigan, a 21 year old man was charged with distributing child pornography
through his BBS in March 1996.
Networks
Most early BBSes operated as stand-alone islands. Information contained on that BBS never left the
system, and users would only interact with the information and user community on that BBS alone.
However, as BBSes became more widespread, there evolved a desire to connect systems together to
share messages and files with distant systems and users. The largest such network was FidoNet.
As is it was prohibitively expensive for the hobbyist SysOp to have a dedicated connection to
another system, FidoNet was developed as a store and forward network. Private electronic mail
(Netmail), public message boards (Echomail) and eventually even file attachments on a FidoNet-
capable BBS would be bundled into one or more archive files over a set time interval. These archive
files were then compressed with ARC or ZIP and forwarded to (or polled by) another nearby node
or hub via a dialup Xmodem session. Messages would be relayed around various FidoNet hubs until
they were eventually delivered to their destination. The hierarchy of FidoNet BBS nodes, hubs, and
zones was maintained in a routing table called a Nodelist. Some larger BBSes or regional FidoNet
hubs would make several transfers per day, some even to multiple nodes or hubs, and as such,
transfers usually occurred at night or early morning when toll rates were lowest. In Fido’s heyday,
sending a Netmail message to a user on a distant FidoNet node, or participating in an Echomail
discussion could take days, especially if any FidoNet nodes or hubs in the message’s route only
made one transfer call per day.
FidoNet was platform-independent and would work with any BBS that was written to use it. BBSes
that did not have integrated FidoNet capability could usually add it using an external FidoNet front-
end mailer such as FrontDoor, BinkleyTerm, InterMail or D’Bridge, and a mail processor such as
FastEcho or Squish. The front-end mailer would conduct the periodic FidoNet transfers, while the
mail processor would usually run just before and just after the mailer ran. This program would scan
for and pack up new outgoing messages, and then unpack, sort and “toss” the incoming messages
into a BBS user’s local electronic mailbox or into the BBS’s local message bases reserved for Echomail.
As such, these mail processors were commonly called “scanner/tosser/packers.”
Many other BBS networks followed the example of FidoNet, using the same standards and the same
software. These were called FidoNet Technology Networks (FTNs). They were usually smaller and
targeted at selected audiences. Some networks used QWK doors, and others such as RelayNet
(RIME) and WWIVnet used non-Fido software and standards.
Before commercial Internet access became common, these networks of BBSes provided regional and
international e-mail and message bases. Some even provided gateways, such as UFGATE, by which
members could send/receive e-mail to/from the Internet via UUCP, and many FidoNet discussion
groups were shared via Usenet. Elaborate schemes allowed users to download binary files, search
gopherspace, and interact with distant programs, all using plain text e-mail.
As the volume of FidoNet Mail increased and newsgroups from the early days of the Internet became
available, satellite data downstream services became viable for larger systems. The satellite service
provided access to FidoNet and Usenet newsgroups in large volumes at a reasonable fee. By connecting
a small dish and receiver, a constant downstream of thousands of FidoNet and Usenet newsgroups
could be received. The local BBS only needed to upload new outgoing messages via the modem
network back to the satellite service. This method drastically reduced phone data transfers while
dramatically increasing the number of message forums.
FidoNet is still in use today, though in a much smaller form, and many Echomail groups are still Notes
shared with Usenet via FidoNet to Usenet gateways. Widespread abuse of Usenet with spam and
pornography has led to many of these FidoNet gateways to cease operation completely.
Features
A classic BBS had:
· a computer
· one or more modems
· one or more phone lines
· a BBS software package
· a sysop-system operator
· a user community
The BBS software usually provides:
· menu Systems
· one or more message bases
· file areas
· sysOp side, live viewing of all caller activity
· voting-opinion booths
· statistics on message posters, top uploaders / downloaders
· online games (usually single player or only a single active player at a given time)
· a doorway to third-party online games
· usage auditing capabilities
· multi-user chat (only possible on multi-line BBSes)
· internet email (more common in later Internet-connected BBSes)
· networked message boards
· most modern BBSes allow telnet access over the Internet using a telnet server and a virtual
FOSSIL driver.
· a “yell for SysOp” (The original chat, before multi-line systems) caller side menu item that
sounded an audible alarm to the SysOp. If chosen, the SysOp could then initiate a text-to-text
chat with the caller; similar to what commercial websites have used to sell and support
products.
Notes Tens of millions of corporate users already have access to at least some form of
groupware through popular installations like Lotus Development Corp.’s Domino/
Notes programs, Microsoft Corp.’s Exchange and NetMeeting, and Novell Inc.’s
GroupWise.
In addition to these applications’ off-the-shelf functions, businesses are usually able to customize
the interfaces and tools to meet their needs; however, most use of these programs to date has been
for e-mail and for static document sharing in bulletin-board fashion. The key for software vendors
and for their business clients will be to migrate this large user base toward real-time interactions
via computer conferencing tools.
14.6.5 Whiteboards
Like their real-life namesakes, whiteboard programs allow multiple participants to share diagrams
and text via computer. This function is usually a component of a larger application suite rather than
a stand-alone program. Information drawn on the whiteboard screen can be saved to an image file
or printed. Whiteboards are best for information exchanges that involve spontaneous illustration or
brainstorming.
Did u know? Computer conferencing is emerging not only as a boon to productivity and
cost containment over traditional alternatives, but for some companies it is a
method of adding value to the enterprise’s intellectual capital.
It can do so by keeping employees better informed and by documenting operational and managerial
history and knowledge that can be accessed indefinitely into the future.
A seminar delivered online with a live instructor. The instructor and attendees communicate with
each other as if they were in the same room. Also called a “Webinar,” virtual seminars tend to be
replicas of classroom workshops, whereas the Webinar is often a short presentation with limited
participation. A workshop or lecture delivered over the Web. Webinars may be a one-way Webcast,
or there may be interaction between the audience and the presenters
Task State your views how audio video conferencing acts as a tool in communication.
Self Assessment
State whether the following statements are true or false:
8. A bulletin Board System or BBs, is a computer system running software that allows users to
connect and log in to the system that allows users to connect and log in to the system using
a total programmer.
9. Ward Christensen coined the term a Bulletin Board system as a reference to the traditional
core-and-pin bulletin board.
10. Amiga program skyline BBs web the first in 1987 featuring a script mark up language
communications protocol called sky pix.
11. In 1979 a computer based bulletin board software released into the public domain by
word Christensen.
12. Whiteboard programs allow multiple participants to share diagrams and text via com-
puters.
14.7 Summary
· A web portal or links page is a web site that functions as a point of access to information on
the World Wide Web.
· A vertical information portal (VIP) is a specialized entry point to a specific marketplace
and or industry niche.
· A personal portal is a site on the World Wide Web that typically provides personalized
capabilities to its visitors, providing a pathway to other content.
· The traditional media rooms all around the world are fast adapting to the new age tech-
nologies.
· Stock Market portals or stock exchange portals are Web-based applications that facilitates
the process of informing the share-holders with substantial online data such as the latest
price, ask/bids, the latest News, reports and announcements.
· Electronic journals, also known as e-journals, e-journals, and electronic serials, are schol-
arly journals or intellectual magazines that can be accessed via electronic transmission.
· Listwashing is the process through which individual entries in mailing lists are removed.
14.8 Keywords
Collaboration : Collaboration is working together to achieve a goal. It is a recursive process
where two or more people or organizations work together to realize shared
goals.
Web Portal : A web portal or links page is a web site that functions as a point of access to
information in the World Wide Web. A portal presents information from
diverse sources in a unified way.
Notes VIP : A vertical information portal (VIP) is a specialized entry point to a specific
marketplace and or industry niche. VIP's provide news, editorial content,
digital publications, and e-commerce capabilities.
Electronic Journals : Electronic journals, also known as ejournals, e-journals, and electronic serials,
are scholarly journals or intellectual magazines that can be accessed via
electronic transmission. In practice, this means that they are usually published
on the Web.
Listwashing : It is the process through which individual entries in mailing lists are removed.
These mailing lists typically contain email addresses or phone numbers of
those that have not voluntarily subscribed. An entry is removed from the list
after a complaint is received.
DHCP : The Dynamic Host Configuration Protocol (DHCP) is a network configuration
protocol for hosts on Internet Protocol (IP) networks.