CHAPTER
CHAPTER
CHAPTER
LIBRARY NETWORKS
Bottom
2.1.1 Meaning
2.4.5 CD-ROMs
Top
2.1.1 Meaning
The development of sophisticated technologies in computer and communication field
has upset libraries world wide in storing and transmitting information. The computer
and its communication circuits link to other computer or to terminals constituting an
integral information machine. This technology introduced the `Network System’.
When a group of libraries using computers decide to exchange information, a
network is developed. The National Commission on Libraries and Information
Science (NCLIS) in its National Programme Document (1975) defines a network as:
According to Martin:
A library network is a description of an activity which existed before the term itself
was devised. When any two libraries talk to each other, we have the fundamental
condition for networking, that is exchange. When one library provides a service to
another, we have the rudiments of network behavior. Inter-library loan or
bibliographic exchange in any form, is the chief justification of a network.
So on the basis of above explanations, we notice that library networks have the
following characteristics:
The above classification shows that library networks have the following features:
Networks enable librarians, faced with clients’ information needs beyond their local
resources, to identify and obtain materials and services for those clients. As we
move increasingly into electronic information era, we see technology and networks
working together to reduce the physical movement of materials.
2.1.2 Need for Networking
Top
As a universal phenomenon, libraries the world over are facing two major problems.
These are:
0. Information explosion
a. Price escalation of library documents
b. Increased cost of library services
Top
As we have seen earlier, the basic purpose for creating a network is to provide
information services to member libraries through sharing of resources of the
participating libraries of the network. This may lead to member libraries to depend
more on access to documents held in the other member libraries than on depending
only on their respective collection. The main aims and objectives of library
network are stated as the following:
(ii) To improve resource utilization and service level at the individual libraries by
providing automation facilities in the following areas:
(iv) To establish referral centres to monitor and facilitate catalogue search and
maintain a central on-line union catalogue of books, serials and non-book materials
of all the participating libraries.
(vi) To create a database of projects, specialists and institutions for providing online
information services.
(vii) To coordinate with other regional, national and international networks for
exchange of information and documents for the use of libraries and users.
Top
Library Networks have been established with the main purpose of sharing resources
so that unnecessary wastage of limited finance with them can be avoided. However,
not all networks conform to the essential functions of library networks. It is noted that
the essential functions should include the promotion of resource sharing, creation of
resource sharing tools like union catalogues, rationalization of acquisitions and
adoption of international standards for creation of records uniformly and delivery of
documents. Keeping these things in view, functions of a typical library network
might fall into the following three categories:
Information and technical services are goal-oriented, i.e. to fulfill the primary goal of
the network. Functions that serve the users directly, i.e. information services to users
are:
Information services
Inter-library loan service – it means that each member library may require to
have the facility to photocopy for delivering the documents.
Reference and Referral – each member library may require the facility of
having dedicated telephone and/or E-mail service.
Access to databases – to prepare retrospective bibliography for the purpose
of browsing to know whether or not a document is available.
Technical Services
Functions that serve the libraries i.e. the technical services are:
Management services
The management services, i.e. functions that support the network administration are:
Cost analysis
It involves
Top
The structure of a network will depend upon the purpose for which libraries use it. A
number of libraries should join the network that offers the facilities to make their
functioning simpler, better and more cost effective. For instance, university libraries
in a state may choose a model which is of totally decentralized type. However, the
affiliated colleges in a university system can be linked to the respective university
library, such a model may be known as distributed type. The public library system
may choose a model of hierarchical type. Special libraries in a city may choose a
model, which is of totally decentralized.
Star network
Hierarchical network
Distributed network
Star Network
Hierarchical Network
Each member shares resources locally; each participating library at the lower level
passes unsatisfied needs to the participating library which is at the higher level. The
requests remaining unsatisfied are referred to the `library of last resort’ which may be
obliged to check other centres to locate required materials. The configuration is:
Users of the network, members A1, A2, A3, A4 are mostly satisfied with the resources
available in their respective libraries. Unsatisfied requests are passed on to the
higher level resource centre B, finally the few remaining unsatisfied requests are
referred to the library of last resort C which may be obliged to check other centres B 2
and B3 to locate required materials.
Distributed Network
In a totally decentralized model, a type of distributed model, all network members
hold in theory different resources which they may share with one another.
Here all members A, B, C, D, E, have different resources which they share with one
another.
Top
The world over, library networks and consortia have developed technologies to
facilitate the process of accessing databases, retrieval of information, processing of
interlibrary loan requests and the delivery of documents. So we must have some
idea about the network technology in general – various terms used in the context of
networking, standards, protocols and the software that convert data from one format
to another and the technology relevant to Information and information Service field in
particular.
A network’s architecture is the way the data flows within the network. The basic
building blocks of a network are nodes, hubs and backbones
Node -a node is any piece of hardware on the system that can be addressed by a
message from another node, that is, a computer, printer, fax, modems or CD-ROM
drive.
Hub -It is a device that accepts multiple connections. Nodes are connected to it. It,
also known as concentrator, simplifies the wiring of the nodes to each other and
routes signals between the nodes. There are many different types of hubs. Some are
simple hardware devices that only accept connections called passive hubs; others
are complicated electrical components that monitor and control the flow of
information to various network locations called active hubs.
Ring Architecture
It arranges the nodes on the network in a circle. When one of the computers on the
network sends a signal, it passes it to the next node on the network. If it is not
addressed to that node, it is retransmitted to the next node and so on around the
circle until it reaches the node it is addressed to. The connections between
computers are not direct, instead, each computer attaches to a hub and the ring itself
resides inside the hub.
Star Architecture
It has the nodes connected to a central, host, computer when one of the computers
as the network sends a signal, the next routes it to the node it’s addressed to. There
are no direct connections between the nodes on the network except through the host
computer.
Bus Architecture
Bus, or linear, architecture connects all nodes to a single bus much as the
components are organized within the computer. A signal addressed to another node
is sent to the bus. All other nodes on the network examine the signal to see if it is
addressed to one of them. Typically, wires connect each node to the network’s
backbone, which is a fixed length of cable with terminator at both ends to stop
reflections when signals hit the end.
2.4.2 Hardware Components of a Network
Top
(i) Servers
A server on a network is any computer that can shared by other computers working
on the network. In many cases, the server has to be the most powerful computer on
the network, because it is shared among so many users or clients. These clients
(computers) depend on the server for programs and data, or connection to other
computers and devices.
File Server
It stores data files and some application programs. It has large amounts of
secondary storage in the form of hard disks, CD-ROM drives, tape drives and other
storage dievices.
Print Server
It stores print jobs on a hard disk until the printer is ready to handle them.
Communication Server
It can be a fax or modem over which data from any other node can be sent. It can
also be used as a gateway to the Internet.
(iii) Cables
When signals are sent through a hard-wired network, they are sent along a common
set of wires or cables, the network’s circulation system. Three types of cables are
used to connect the devices:-
They are the least expensive way to connect computers because the wire is cheap
and easy to install. However, they are relatively slow and have a tendency to pack
up noise that can cause high error rates.
(b) Coaxial
(c) Fiber-optic
It connects of the glass or plastic filament, protector by thick plastic padding and an
external plastic sheets. It uses a pulse of laser light instead of an electronic
frequency to transmit a signal. Fibre optic cables are fast and reliable, as well as
small and light. They have an extremely wide bandwidth, so a large number of
signals can be sent simultaneously.
Baseband Cable:
Broadband cable:
This can handle simultaneous transmission of different signals by sending them at
different frequencies. Broadband cables are more expensive and require additional
frequency modulating equipment.
When signals are sent through a network, they must be sent in the right direction,
and they must also sometimes be amplified so they travel farther or converted so
they can be transferred to a different network. These are the roles of a series of
hardware devices called repeaters, bridges, routers and gateways.
They connect segments of a network, and since signals get weaker and less distinct
with distance, these small devices refresh and enhance them before sending them
along. They are usually used to extend the network in effect joining two networks
together by passing a cable signal between them.
They connect networks, which use different physical links. For example, a network
running on twisted pair wires is connected to one using coaxial cable with a bridge.
(c) Routers
They control where messages are sent on networks. The router keeps the addresses
of other nodes in a table. If the address of a message sent through the router is on
the network, the message is forwarded. If the address is not on the network, the
router towards the message to another network by sending it to a gateway.
(d) Gateways
Gateways are used to connect different types of networks. Since two networks may
not share a common protocol, these devices translate each network’s protocol so the
other network can understand the data.
Top
The only disadvantage with this kind of network is that if file server goes down, the
whole network comes to a halt.
A network can be connected to other networks and networks can consist of different
types of machines from different vendors each with its own unique way of handling
electronic information, not directly understood by other machines on the network.
Special software and hardware can be attached to the network to handle this
complicated set up. These devices are called bridges, routes and gateways, perform
in different ways the task of "translating" the electronic information supplied byt one
machine into a format that can be understood by another.
A network is called Local Area Network if the computers comprising it are located
within the same building or within a distance range less than one kilometer from
each other.
A network is called Wide Area Network if the computers comprising it are distributed
over a large geographical region may be all over the country, all over the world or
any distance range more than 30 kilometer. Parts of the network may be connected
by the cables and other parts by microwave or satellite transmission. Typical wide
area networks are those operated by the telephone companies. The Internet is
probably the widest of all networks in that it links not only LANs but also other
WANS.
Top
If computers are to talk to each other, they need an agreed set of rules called
protocols by which they can communicate. The protocols are techniques to govern
the flow of data from one computer to another. For different types of computer to be
able to communicate effectively, standards need to have been set for the periodicals.
In the early 1960s when researchers tried to connect computers with each other,
they thought of various techniques to govern the flow of data from one computer to
another. Some of them are:
Developed by Novell Netware, it manages the flow of data between Netware Clients
and File Server for maximum efficiency. It is earliest of the protocol among different
Network protocol to govern the flow of data from one computer to another. It is a
combination of Bits with different portions representing functions to be performed.
TCP/IP works on the principle of packet switching which involves breaking the data
into small chunks and sending these chunks along the network. TCP devides the
data into small chunks with each chunk not exceeding 546 bytes and pass them to
IP, the next protocol in the transmission process. Each pocket is attached with
information about source and destination; this resulted into many packets flowing
through the same network line with each data pockets reaching its correct
destination.
It handles data verification and addressing responsibilities for flow of data between
different networks, e.g. between Netware Networks and other networks. It adds a
header to the information received from TCP Protocol containing the address of the
destination, then it passes the data to Network Interface Card for transmission.
It verifies the accuracy of the data by using Network Operating System (NOS). It also
verifies the accuracy of the remote station to which the data is to be sent by
performing some initial communications with the destination workstation. If it gets a
confirmation back from the remote or destination station only then, it sends out the
data, otherwise it reconfirms by sending the repeated communications. If it fails to
get a response from the destination, it issues a notification to the application
programme about the failure of the data transmission.
(C) Standards & Protocols : Library and Information Science Field
Resource sharing technology cannot work effectively unless appropriate tools are
developed. These tools include the creation of standard bibliographic databases
such as union catalogue of books and periodicals, union lists of serials, bibliographic
databases of articles and other types of materials, such as CDs, Video-recordings,
Sound recordings, theses and dissertations. It becomes necessary to use the
methods and tools that help in quick and identification and deliver of documents.
However, the adoption of different bibliographic standards creates incompatibility
problems and that acts as a major barrier in the use of bibliographic and related
information. The standards, protocols and the software that convert data from one
format to another should be of international standard.
Format compatibilities are necessary for computerized catalogue data and these are
being standardized by the International Standards Organization. ISO 2709 has been
adopted the world over and the efforts to harmonize MARC formats are on. The
Library of Congress and National Library of Canada achieved the result in
harmonizing their MARC formats in 1997. It is hoped that various MARC formats will
also get harmonized in due course.
Information Retrieval
The effective electronic resource sharing has been hampered by the inability to
interconnect, effectively and economically, many diverse electronic library and
information databases, which exist worldwide. These standards provide the
mechanisms to reduce the existing fragmentation of information and service delivery.
Top
z39.50
In library networking, z39.50 has assumed greater importance and is the most
important protocol available today. In sum, this protocol:
2. As soon as the session is established, the search request can be made by the
client.
5. Records are transmitted to the clients as soon as the client makes the PRESENT
request.
There are other facilities like account control, deletion, termination of the session and
enhanced features like sort, browse, ILL, etc.
For libraries, z39.50 could very well provide a single interface allowing libraries to
support a number of different services. Various library applications include
In India, Indian Agricultural Research Institute, Pusa Road, New Delhi has taken the
lead to install the first z39.50 server in India and make to databases available to the
z39.50 clients.
ILL Protocol
The ILL protocol is used to provide just ILL services. Several vendors use it in their
software. In the ILL protocol, the services represent the activities. These services are
such as ILL request, RECEIVED, RETURNED, RENEW, LOST (item requested is
lost) and CANCELLED (cancellation of the request). There are optional messages
such as SHIPPED, RETURNED, RECEIVED and CHECKED-IN. When the requests
are in operation, the messages such as PENDING and IN-PROCESS are used.
These are several other services used by the protocol and they are requested by
messages such as ILL-ANSWER, FORWARD-NOTIFICATION, etc.
The National Library of Canada has developed a protocol for ILL communications in
order to facilitate resource sharing in a networking environment. The protocol has
been designed to encourage software developers and members of the library and
the information community to adopt the protocol and incorporate it into ILL systems.
The protocol is expected to be POST (Open System Interconnection) based and is
able to communicate with all types of hardware, software communication facilities
used. OSI provides interconnectivity and interoperability in order to communicate
with all types of hardware and allow transfer and communication of data among
them. Improvement of interlibrary loan facility through electronic messaging is
possible if we use Open System Interconnection (OSI) Reference Model and
improve the telecommunication infrastructure.
2.4.5 CD-ROMs
Top
The CD-ROMs technology influenced its wider applications in libraries since 1980s
as a major resource of information, which can be used for
For example, a CD-ROM union catalogue can offer an offline access to the
resources of a library network which is both convenient and inexpensive. When an
online system fails in a participating library, the use of CD-ROM could be proved
very useful. Besides, information stored on CD-ROM attached to one of the
computers on the network, can be accessed by users on another computer on the
network. This is known as CD-ROM networking.
Top
(i) Member libraries must justify need for a network. The development of a viable
network demands planning not only among the network members but also between
the members and users themselves.
(ii) Member libraries must agree upon a network policy is to be implemented. The
policy must clearly state:
(a) Objectives of the Network- e.g the main objective may be to share the resources
among the member libraries. It may be achieved in several ways, for example,
Member libraries should adopt that structure of a network, which will fulfill the
purpose for which libraries use it. The lack of arrangement in developing a network
structure undermines both the approach of functions and planning.
(iii) Member libraries must identify the funding agencies and mobilize the resources
in advance. The financial resources must freely flow while implementing the system.
If necessary, network fee may be collected from each of the member libraries. The
examples of library networks in the western countries suggest that all networks
based on a fee structure can be maintained without grant and are viable in the long
run.
(iv) For resource sharing among member libraries, it is necessary to create
bibliographic tools like union catalogues and union lists based on the resources
available in the participating libraries.
(v) For the purpose of creating databases, it is essential to agree upon a standard.
All libraries should follow a standard MARC format, AACR-II, a standard thesaurus
like Library of Congress Subject Headings (LCSH) etc. uniformly.
(vi) Although efforts should be made to have one classification scheme in all
participating libraries but use of different numbers should not become a hurdle as
search requests are mostly by authors, titles, editors and subject descriptions.
(viii) For the success of network in a long run, each of the member libraries must
have a policy to automate every function of the library – acquisition, cataloguing,
classification, serials control, circulation, SDI, current awareness services etc. – in
the shortest possible time. This helps the library to have computer culture which is
required to design, develop, maintain and to operate several databases, to reduce
the cost of library operations as well as network operations.
(ix) The major problem in each of the member libraries when attempts are made to
prepare the machine-readable records for the existing catalogue. Prior to creating
such records, one has to identify frequently used and infrequently used documents.
Then prepare the machine-readable catalogue appropriately for the frequently used
documents or alternatively use the existing machine-readable databases by down-
loading from CD-ROMs or from other databases and reformatting them, one can
select the appropriate records for their respective database.
(x) The network should be able to recommend to participating libraries the type of
hardware and software they need for their in-house functions and for networking
purposes. Hardware should be selected considering the number of entries the
participating libraries can generate within the next 3-5 years. The hardware at the
Central Host speed with which participating libraries generate records and the
network pools them into the Central Hose.
The network software may or may not support the in-house operations of the
libraries in the beginning but eventually the network software should not only be able
to create union catalogues or full text databases, etc. but also get integrated with the
in-house operations.
(xiii) Inter-libraries loan services should grow and may be interlinked with the search
of the union catalogues. Delivery of documents should be fast, either electronically
through fax or through courier or Mail. Rationalization of acquisitions needs to be
undertaken.
(xiv) The member libraries should be willing partners, ready to buy hardware, etc.
and should be willing to send professional staff for training. They should be willing to
pool bibliographic records to the Central Host of the network besides adhering to
other network obligations.
(xv) A performance criterion should be developed and agreed upon to evaluate the
working of the network.
Top
Each of the member libraries must have at least some of the following hardware.
However, the main library (Central Host) may require most of the hardware
mentioned below, but with additional disk space. Hardware specifications are given
below:
I. Server :
II. Client :
- Telex
- CD-ROM drive
- DBMS packages
- IR packages CDS/ISIS
Top
Software evaluation is quite often a difficult task. We have to consider the following
procedure, criteria and features to evaluate software packages.
- Compare it with various other packages, keeping in view the following points
Is it easy to understand?
Is a separate training required?
Is it menu driven?
Can it handle records of variable sizes?
Is it easy to edit a record?
Is it difficult to update the files (inserting or deleting
records?)?
How much memory and hard disk space are
required?
- On-site evaluation
- Post installation service (if the software is corrupted for various reasons, will the
vendor replace it?
User friendly
Provision to on-line interaction, especially while editing
inputting, retrieving and in data management.
Provision to obtain outputs in various formats
Compatibility and portability.
Finally, one has to consider several factors while acquiring a computer. These are:
- memory size
- availability of terminal
- speed and capabilities of input and output devices such as the ability to process
lower case letters and special symbols.
-with main frame computers, which may be available in the parent organization