Saturday 16 April 2022

Indian Institute of Corporate Affairs Need Consultant-Library

Educational Qualification:

- A Master’s Degree in Library Science, Information Science/ Documentation Science  

or an equivalent professional degree, and a consistently good academic record with knowledge of computerization of library.

- Sound knowledge of computers , Open Source Software, Library Management Software, Work experience in ICT and database management in the libraries will be given preference .

Experience:

- Should have 3-5 years’ experience in organizing and managing Library activities in any academic / Corporates /Research Institution.

- Knowledge and experience in all the day to day technical activities of the Library.

Desirable:

- Good Communication Skills. (Linguistic aptitude and command over English and  Hindi languages ) 

Click Here For More Details

The last date to accept applications will be 2nd May, 2022 till 6 PM.

New Delhi Municipal Council (NDMC) Need Librarian

No. of posts- 08 posts 

Eligibility:

The candidate should have retired as Librarian from the Pay Level-6 or above as per the Pay matrix of 7th C.P.C. from Central Govt./State Govt./Local Bodies or equivalent service.

Method of Selection:

The candidates will apply online on the website of the New Delhi Municipal Council (NDMC) under Education Department link on NDMC website www.ndmc.gov.in and sub-link "Engagement of Consultants in Education Department". The applications may also be sent through e-mail id director.education@ndmc.gov.in or by hand or by post at- Director (Education), 5O16, Palika Kendra, NDMC Headquarter, New Delhi-01. The application link will remain open till 01/05/2022.

Shortlisted candidates meeting eligibility criteria will be informed for schedule of interview on their given mobile number/e-mail at least a couple of days in advance.

(iii) All the eligible shortlisted applicants will be interviewed by an Interview Board/Committee tentatively in June, 2022. On the date and time fixed for the interview, the applicant will present himself/herself along with self attested copies and originals for verification namely.

Click Here For More Details 


Wednesday 13 April 2022

National and International Library Associations and Networks in India and Abroad

Establishment of State Level Library Associations in India
(Chronological List of Associations, Established before the year 2000)

Sr. No. Name of the Association Established Year
1. Andhra Pradesh Library Association 1914
2. Maharashtra Library Association 1921
3. Bengal Library Association 1925
4 Madras Library Association 1928
5. Karnataka Library Association 1929
6. Punjab Library Association 1929
7. Samastha Kerala Pustakalaya Samiti 1931
8. Bihar Library Association 1936
9. Assam Library Association 1938
10. Utkal Library Association 1944
11. Kerala Library Association 1945
12. Hyderabad Library Association 1951
13. U.P.Library Association 1951
14. Delhi Library Association 1953
15. Gujarat library Association 1953
16. Madhya Bharat Library Association 1957
17. Gomantak Library Association 1961
18. Rajasthan Library Association 1962
19. Jammu & Kashmir Library Association 1966
20. Tripura Library Association 1967
21. Manipur Library Association 1987
22. Mizoram Library Association 1987
23. Meghalaya Library Association 1994
24. Nagaland Library Association 1996

 

Indian Library Associations
(Click on the Links to know more about the Association/Network)

Sr. No. Alphabetical List of Associations with their Links
1. All Bengal School Librarians' Association (ABSLA)
2. All Librarians Development Welfare Association (ALAMP)
3. Assam Library Association
4. Bengal Library Association
5. Bombay Science Librarian's Association (BOSLA)
6. Central Government Library Association (CGLA)
7. Delhi Library Association
8. Gujarat Library Association
9. Haryana Library Association
10. Indian Academic Library Association (IALA)
11. Indian Association of Special Libraries and Information Centers (IASLIC)
12. Indian Association of Teachers of Library and Information Science (IATLIS)
13. Indian Library Association (ILA)
14. Indian Theological Library Association
15. Jharkhand Information and Library Association
16. Karnataka State Library Association
17. Kerala Library Association
18. Madhya Pradesh Library Association
19. Madras Library Association
20. Medical Library Association of India
21. Odisha Library Academy
22. Punjab Library Association 
23. Society for Advancement of Library & Information Science (SALIS)
24. Society for Information Science [SIS]
25. Uttar Pradesh Library Association
Indian Library Networks
Information and Library Network (INFLIBNET)
Ahmedabad Library Network (ADINET)
Developing Library Network (DELNET)
Management Libraries Network (MANLIBNET)
Calcutta Library Network (CALIBNET)
Indian Library Welfare Society/Associations
Documentation Research and Training Centre (DRTC), Bangalore
National Center for Science Information (NCSI), Bangalore
National Mission for Libraries (NML)
Raja Rammohun Roy Library Foundation (RRRLF)
SAARC Documentation Centre
Kesavan Institute of Information and Knowledge Management
Satinder Kaur Ramdev Memorial Trust for Advancement of Librarianship (SATKAL)
International Library Associations and Networks
American Library Association (ALA)
American Society for Information Science (ASIS)
Association of Learned and Professional Society Publishers (ALPSP)
Association for Library and Information Science Education
Association for Information Management (ASLIB)
Australian Library and Information Association
Chartered Institute of Library and Information Professionals, UK [CILIP]
Coalition for Networked Information
Council on Library and Information Resources
International Association of Technological University Libraries [IATUL]
International Library Information and Analytical Center [ILIAC]
International Federation of Library Associations and Institutions (IFLA)
JISC
National Forum on Information Literacy
Online Computer Library Center (OCLC)
Patent and Trademark Depository Library Association
Scottish Confederation of University and Research Libraries
Society of College, National and University Libraries [SCONUL], UK
Special Library Association (SLA) 

 

Note:-Kindly suggest  a Library Association Name to adding here which has not been listed above. Write the Name of the Association and it's web link (website) in the comment box

NIOS Materials

 Library and Information Science (339)

Curriculum

Module 1

Lesson 1. Library and Information Centres: Concept and Rolein Society (1968 KB)

Lesson 2. Types of Libraries and information Centres:Public, Academic, Special and National 

Lesson 3. Modern Library: Automated, Digital, andVirtual(3099 KB)

Lesson 4. Five Lawsof Library Science (2442 KB) 

 Module 2

Lesson 5. Overview of Information Sources (3780 KB)

Lesson 6. Types ofInformation Sources(6356 KB)

Lesson 7. Reference Sources (5232 KB)

Lesson 8. E-Resources(8288 KB)

Module 3

Lesson 9. Organization of Library Material: Concept, Needand Purpose (2256 KB)

Lesson 10. Processingof Library Material: Classification and Cataloguing (2665 KB)

Lesson 11.Arrangement and Maintenance of Library Material (2676 KB) 

Module 4

Lesson 12. Library and Information Services for the Users(2465 KB)

Lesson 13.Traditional Library Services: Responsive and Anticipatory (2513 KB)

Lesson 14. Modern Library Services (4149 KB)

Module 5 (A)

Lesson 15. Library System and Management (3474 KB)

Lesson 16. LibraryStaff (2296 KB)

Lesson 17. LibraryUsers (2001 KB)

Lesson 18. Librarianship as a Career (3429 KB)

Module 5 (B)

Lesson 15. Information Retrieval Concept of Scope (2546 KB)

Lesson 16.Information Retrieval Tools: Catalogue, Index, Subject Heading Lists (10421 KB)

Lesson 17. Search Techniques: Basic and Advanced (1978 KB)

Lesson 18. Web BasedSearch (18529 KB)

Practical Manual (101 KB)

Sample Question Paper (639 KB)


Tuesday 12 April 2022

Indraprastha Institute of Information Technology Delhi (IIIT-Delhi) Need Library Trainee

Essential Qualification:

Master of Library and Information Science (MLISc) from a recognized Institution/University with First Class.

Stipend: Rs.17,000/- per month (consolidated)

Age Limit: 25 years (as on the last date of application)

Fore More Click Here


Friday 8 April 2022

Steps in Compilation of a Subject Bibliography

1. Introduction: The various steps that are necessary in the work of compilation of subject bibliography are:

2. Planning:  Planning is the first stage in the compilation. Planning involves the preparation of provisional plant. It would be subject to modification in the light of experienced gained as the work goes on. The following are the steps involves in planning, a. definition of the subject. B. Scope of the subject etc.

3. Definition of the Subject: This can be collected from a general dictionary, an encyclopedia, a standard subject dictionary and form a standard text book or from the subject experts.

4. Scope of the Subject: It depends upon some factors as:

a) Comprehensiveness or selectivity: The subject bibliography taken to be compilation may be comprehensive or selective and it should be precisely.

b) Period: It should state the time covered and also indicate if it is current or retrospective.

c) Form: The compiler should also state if he should consider the inner form of the document or physical form like books, periodicals, encyclopedias, dictionaries, microfiche, pamphlet, manuscripts, gramophone records etc.

d) Level:  the bibliography going to compile is for whom, whether it is for ordinary reader or scholars and researchers.

e) Language: The decision as to which language should be covered whether it should be universal or bilingual or multilingual.

f) Area: The area can be interpreted a either the area of coverage of the subject or geographical place from where the document published, i. e. place of publication

5. Search for Material: The starting point of any search for document is library catalogue then books, periodicals, micro documents etc.

6. Item of Information: If it is a bibliography for ordinary readers brief bibliographical information is sufficient. But is should be descriptive in the case of bibliographies for scholars and researchers. Never less we can follow some standards observed by some standard institution. Information is generally collected in slips, or data entry sheet or cards because that helps in the arrangement.

7. Selection: Selection of required document which suit the purpose of compilation of bibliography should be done in the next step.

8. Kinds of Entries: It is essential to satisfy the approaches through author, collaborator, title (occasionally) and subject. Sufficient member of references should also be provided to take care of alternative approaches.

9. The Arrangement: Some of the possible arrangements are alphabetical, classified, combination of alphabetical and classified, chronological etc. However arrangement of bibliography for a researcher would be different from that of a general reader.

10. Other Adjuncts: The following other adjuncts can be provided to a bibliography

a) Preface

b) List of Contents

c) Method of arrangement

d) Outline of classification used.

e) List of periodicals and other document consulted.

f) List of abbreviation

g) How to use the bibliography with examples.

h) Directory of Publisher etc.

11. Form of Final Presentation: The final form of the presentation of the bibliography may be ob slip cards or magnetic tapes. It may be typed, micro graphed or printed. The decision depends upon the number of users to be served and the amount of resources (manpower and finance) available for their purpose.






source: netugc.com

Tuesday 5 April 2022

Librametric, Bibliometric, Scientometrics, Informetrics

Librametric, Bibliometric, Scientometrics, Informetrics: The Librametric, bibliometric, scientometrics, informetrics are overlapping areas, though their scopes are not the same.

1. Librametry: Dr. S. R. Ranganathan coined the term librametry and presented his concept in 1948 at the ASLIB conference held at Lemington Spa. He said that “there is a need to develop this subject on the lines of Biometry, Econometry, Psychometry, etc. He used the term to include statistical approaches to the study of library and its services. However, the practice of using quantitative method to measure information sources were made even before Dr. S. R. Ranganathan either under different name or without any name at all. For instance E. J. Cole and Nellie Eales in 1917, graphically mapped the literature and called this as “Statistical analysis”, E. Wyndham Hulme in 1922 studied the literature and called it “statistical bibliography”, but the terms were found to be clumsy as it could easily be mistaken.

2. Bibliometrics: The formal term “bibliometric” was first used by Alan Pritchard in his article “Statistical bibliography or bibliometric” in 1969 published in the “Journal of Documentation”. “Biblio” means book and “metric” means a scale or measure. Bibliometric means application of statistical studies in library and information science.

            Pritchard defines bibliometric as “the application of mathematical and statistical methods to books and other media of communication”.

            Potter defines bibliometric as “the study and measurement of the publication pattern of all forms of written communication and their author”.

Thus bibliometric is a sort of measuring techniques by which interconnected aspect of written communication can be quantified. It is the study, or measurement, of texts and information. Bibliometrics utilizes quantitative analysis and statistics to describe patterns of publication within a given field or body of literature. Researchers may use bibliometric methods of evaluation to determine the influence of a single writer, for example, or to describe the relationship between two or more writers or works. One common way of conducting bibliometric research is to use the Social Science Citation Index, the Science Citation Index or the Arts and Humanities Citation Index to trace citations.

a) Bibliometric Techniques: There are different kinds of bibliometric techniques. For example-

i) Productivity Count: It deals with books articles, words in a text, place of publication, subject matter, time and date of publication, publishing institution, authors, author’s institution, etc. Nicholas and Ritchie in the book “Literature and Bibliometrics” called it as productivity count or descriptive.

ii) Literature Usage Count: It deals with citation in published works, circulation, frequency of borrowing or browsing different library material, failure and success in search strategies, search option , etc. Nicholas and Ritchie called it as “Evaluative”.

b) Laws of Bibliometrics: One of the main areas in bibliometric research concerns the application of bibliometric laws. The three most commonly used laws in bibliometrics are - Lotka's Law of Scientific Productivity, Bradford's Law of Scatter, and Zipf's Law of Word Occurrence;

i) Lotka's Law of Scientific Productivity: In 1926, Alfred J. Lotka proposed an inverse square law relating to scientific papers to the number of contributions made by each author. Lotka's Law describes the frequency of publication by authors in a given field. It states that ". . . the number (of authors) making n contributions is about 1/n² of those making one; and the proportion of all contributors, that make a single contribution, is about 60 percent". This means that out of all the authors in a given field, 60 percent will have just one publication, and 15 percent will have two publications (1/2² times . 60), 7 percent of authors will have three publications (1/3² times . 60), and so on. According to Lotka's Law of scientific productivity, only six percent of the authors in a field will produce more than 10 articles.

Lotka’s equation is xn.y= Constant.

Where

Y= Frequency of authors making n contribution, the value of the constant was found to be 0.6079

ii) Bradford's Law of Scatter: Samuel Clement Bradford in 1934 points out that if scientific journals are arranged in order of decreasing productivity of articles on a given subject, they may be divided into a nucleus of periodicals more particularly devoted to the subject and several groups and zones containing the same number of articles as the nucleus when the number of periodicals in the nucleus and succeeding zones will be 1: n: n2.

Bradford's Law states that journals in a single field can be divided into three parts, each containing the same number of articles:

* A core of journals on the subject, relatively few in number, that produces approximately one-third of all the articles;

* A second zone, containing the same number of articles as the first, but a greater number of journals, and

* A third zone, containing the same number of articles as the second, but a still greater number of journals.

The mathematical relationship of the number of journals in the core to the first zone is a constant n and to the second zone the relationship is n². Bradford expressed this relationship as 1 : n : n². Bradford formulated his law after studying a bibliography of geophysics, covering 326 journals in the field. He discovered that 9 journals contained 429 articles, 59 contained 499 articles, and 258 contained 404 articles. So it took 9 journals to contribute one-third of the articles, 5 times of 9, or 45, to produce the next third, and 5 times 5 times 9, or 225, to produce the last third.

Bradford's Law serves as a general guideline to librarians in determining the number of core journals in any given field. Bradford's Law is not statistically accurate, but it is still commonly used as a general rule of thumb.

iii) Zipf's Law of Word Occurrence: George K. Zipf, 1947 states that if the words occurring in a natural language text of sizable length were listed in the order of decreasing frequency then the rank of any given word in the list would be inversely proportional to the frequency of occurrence of the word. Zipf’s equation is

r . f = k

Where

r = Rank;

f = Frequency of Word;

k = Constant


The Law states that in a relatively lengthy text, if you "list the words occurring within that text in order of decreasing frequency, the rank of a word on that list multiplied by its frequency will equal a constant. The equation for this relationship is: r x f = k where r is the rank of the word, f is the frequency, and k is the constant. Zipf illustrated his law with an analysis of James Joyce's Ulysses. "He showed that the tenth most frequent word occurred 2,653 times, the hundredth most frequent word occurred 265 times, the two hundredth word occurred 133 times, and so on. Zipf found, then that the rank of the word multiplied by the frequency of the word equals a constant that is approximately 26,500".

c) Uses of Bibliometric Studies: Historically bibliometric methods have been used to trace relationships amongst academic journal citations. The bibliometric research uses various methods of citation analysis in order to establish relationships between authors or their work. The Bibliometric studies are used in

i) Measuring the scattering of articles on a subject in various periodicals (Bradford).

ii) Measuring the productivity of an author based on the number of published articles. (Lotka).

iii) Ranking of words in a text based on frequency of occurrence of words.

iv) Productivity count of literature.

v) To identify the peers, social change and the core journal, etc.

vi) Indexing and Thesaurus;

vii) Research;

viii) Formulating search strategies in case of automated system;

ix) Comparative assessment of the secondary services;

x) Bibliographic control;

xi) Preparation of retrospective bibliographic and

xii) Library Management.

3. Scientometrics: This term was introduced and came into prominence with the founding of the journal named “Scientometrics” by T. Braunin in 1977, originally published in Hungary and currently from Amsterdam.

            The term “Scientometrics” was used to mean the application of quantitative methods to the history of science but it is now generally used as a generic term for a variety of research approaches within the study of science that a quantifiable aspect of science can be utilized to assess the characteristic of science.

            Marton and Garfield have defined it as the field of enquiry given over to the quantitative analysis of science and scientific field.

4. Informetrics: According to Brooker the term “informetrics” was first proposed by Otto Nacke of West Germany in 1979. It focused on information productivity. It interprets information technology and considers interaction of information theory, cybermetrics, decision theory, etc.


5. Webmetrics: Webmetrics can be defined as using of bibliometric techniques in order to study the relationship of different sites on the World Wide Web. Such techniques may also be used to map out (called "scientific mapping" in traditional bibliometric research) areas of the Web that appear to be most useful or influential, based on the number of times they are hyperlinked to other Web sites.

6. Let Us Sum Up: According to Sen, bibliometric deals with document and its component while informetrics studies pertaining to information. Morales use the term informetrics to cover almost all the aspect of bibliometric and librametrics.




source: www.netugc.com

Open Systems Interconnection (OSI) Model

1. History: In 1977, the International Organization for Standardization (ISO), began to develop its OSI networking suite. OSI has two major components: an abstract model of networking (the Basic Reference Model, or seven-layer model), and a set of concrete protocols. The standard documents that describe OSI are for sale and not currently available online.

            Parts of OSI have influenced Internet protocol development, but none more than the abstract model itself, documented in ISO 7498 and its various addenda. In this model, a networking system is divided into layers. Within each layer, one or more entities implement its functionality. Each entity interacts directly only with the layer immediately beneath it, and provides facilities for use by the layer above it.

In particular, Internet protocols are deliberately not as rigorously architected as the OSI model, but a common version of the TCP/IP model splits it into four layers. The Internet Application Layer includes the OSI Application Layer, Presentation Layer, and most of the Session Layer. Its End-to-End Layer includes the graceful close function of the OSI Session Layer as well as the Transport Layer. Its Internet work Layer is equivalent to the OSI Network Layer, while its Interface layer includes the OSI Data Link and Physical Layers. These comparisons are based on the original seven-layer protocol model as defined in ISO 7498, rather than refinements in such things as the Internal Organization of the Network Layer document.

Protocols enable an entity in one host to interact with a corresponding entity at the same layer in a remote host. Service definitions abstractly describe the functionality provided to a (N)-layer by an (N-1) layer, where N is one of the seven layers inside the local host.

The Open Systems Interconnection Basic Reference Model (OSI Reference Model or OSI Model for short) is a layered, abstract description for communications and computer network protocol design, developed as part of the Open Systems Interconnection (OSI) initiative. It is also called the OSI seven layer model. The layers, described below, are, from top to bottom, Application, Presentation, Session, Transport, Network, Data Link and Physical. A layer is a collection of related functions that provides services to the layer above it and receives service from the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of the path.

Even though newer IETF and IEEE protocols, and indeed OSI protocol work subsequent to the publication of the original architectural standards that have largely superseded it, the OSI model is an excellent place to begin the study of network architecture. Not understanding that the pure seven-layer model is more historic than current, many beginners make the mistake of trying to fit every protocol they study into one of the seven basic layers. This is not always easy to do as many of the protocols in use on the Internet today were designed as part of the TCP/IP model, and may not fit cleanly into the OSI model.

 

Data Unit

Layer

Function

Host layers

Data

7. Application

Network process to application

Segments

6. Presentation

Data representation and encryption

 

 

5. Session

Interhost communication

Media layers

Packets

4. Transport

End-to-end connections and reliability (TCP)

 

Frames

3. Network

Path determination and logical addressing (IP)

 

Bits

2. Data link

Physical addressing (MAC & LLC)

 

 

1. Physical

Media, signal and binary transmission

2. Layer 7: Application Layer: The application layer interfaces directly to and performs common application services for the application processes; it also issues requests to the presentation layer. Note carefully that this layer provides services to user-defined application processes, and not to the end user. For example, it defines a file transfer protocol, but the end user must go through an application process to invoke file transfer. The OSI model does not include human interfaces.

The common application services sub layer provides functional elements including the Remote Operations Service Element (comparable to Internet Remote Procedure Call), Association Control, and Transaction Processing (according to the ACID requirements).

Above the common application service sub layer are functions meaningful to user application programs, such as messaging (X.400), directory (X.500), file transfer (FTAM), virtual terminal (VTAM), and batch job manipulation (JTAM). These contrast with user applications that use the services of the application layer, but are not part of the application layer itself.

File Transfer applications using FTAM (OSI protocol) or FTP (TCP/IP Protocol)

Mail Transfer clients using X.400 (OSI protocol) or SMTP/POP3/IMAP (TCP/IP protocols)

Web browsers using HTTP (TCP/IP protocol); no true OSI protocol for web applications

3. Layer 6: Presentation Layer: The Presentation layer transforms the data to provide a standard interface for the application layer. MIME encoding, data encryption and similar manipulation of the presentation are done at this layer to present the data as a service or protocol that the developer sees fit. Examples of this layer are converting an EBCDIC-coded text file to an ASCII-coded file, or serializing objects and other data structures into and out of XML.

4. Layer 5: Session Layer: The Session layer controls the dialogues/connections (sessions) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex, half-duplex, or simplex operation, and establishes check pointing, adjournment, termination, and restart procedures. The OSI model made this layer responsible for "graceful close" of sessions, which is a property of TCP, and also for session check pointing and recovery, which is not usually used in the Internet protocols suite. Session layers are commonly used in application environments that make use of remote procedure calls (RPCs).

iSCSI, which implements the Small Computer Systems Interface (SCSI) encapsulated into TCP/IP packets, is a session layer protocol increasingly used in Storage Area Networks and internally between processors and high-performance storage devices. iSCSI leverages TCP for guaranteed delivery, and carries SCSI command descriptor blocks (CDB) as payload to create a virtual SCSI bus between iSCSI initiators and iSCSI targets.

5. Layer 4: Transport Layer: The Transport layer provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The transport layer controls the reliability of a given link through flow control, segmentation/de-segmentation, and error control. Some protocols are state and connection oriented. This means that the transport layer can keep track of the segments and retransmit those that fail.

Although it was not developed under the OSI Reference Model and does not strictly conform to the OSI definition of the Transport Service, the best known example of a layer 4 protocol is the Transmission Control Protocol (TCP). The transport layer is the layer that converts messages into TCP segments or User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), etc. packets.

Of the actual OSI protocols, not merely protocols developed under the model, there are five classes of transport protocols, ranging from class 0 (which is also known as TP0 and provides the least error recovery) to class 4 (which is also known as TP4 and is designed for less reliable networks, similar to the Internet). Class 4 is closest to TCP, although TCP contains functions, such as the graceful close, which OSI assigns to the Session Layer.

Perhaps an easy way to visualize the Transport Layer is to compare it with a Post Office, which deals with the dispatch and classification of mail and parcels sent. Do remember, however, that a post office manages the outer envelope of mail. Higher layers may have the equivalent of double envelopes, such as cryptographic Presentation services that can be read by the addressee only. Roughly speaking, tunneling protocols operate at the transport layer, such as carrying non-IP protocols such as IBM's SNA or Novell's IPX over an IP network, or end-to-end encryption with IPsec. While Generic Routing Encapsulation (GRE) might seem to be a network layer protocol, if the encapsulation of the payload takes place only at endpoint, GRE becomes closer to a transport protocol that uses IP headers but contains complete frames or packets to deliver to an endpoint. L2TP carries PPP frames inside transport packets.

6. Layer 3: Network Layer: The Network layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks while maintaining the quality of service requested by the Transport layer. The Network layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery errors. Routers operate at this layer—sending data throughout the extended network and making the Internet possible. This is a logical addressing scheme – values are chosen by the network engineer. The addressing scheme is hierarchical. The best known example of a layer 3 protocol is the Internet Protocol (IP). Perhaps it's easier to visualize this layer as managing the sequence of human carriers taking a letter from the sender to the local post office, trucks that carry sacks of mail to other post offices or airports, airplanes that carry airmail between major cities, trucks that distribute mail sacks in a city, and carriers that take a letter to its destinations. Think of fragmentation as splitting a large document into smaller envelopes for shipping, or, in the case of the network layer, splitting an application or transport record into packets.

7. Layer 2: Data Link Layer: The Data Link layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the Physical layer. Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of wide area media in the telephone system. Local area network architecture, which included broadcast-capable multi access media, was developed independently of the ISO work, in IEEE Project 802. IEEE work assumed sub layering and management functions not required for WAN use. In modern practice, only error detection, not flow control using sliding window, is present in modern data link protocols such as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE 802.2 LLC layer is not used for most protocols on Ethernet, and, on other local area networks, its flow control and acknowledgment mechanisms are rarely used. Sliding window flow control and acknowledgment is used at the transport layers by protocols such as TCP, but is still used in niches where X.25 offers performance advantages.

Both WAN and LAN services arrange bits, from the physical layer, into logical sequences called frames. Not all physical layer bits necessarily go into frames, as some of these bits are purely intended for physical layer functions. For example, every fifth bit of the FDDI bit stream is not used by the data link layer.

a) WAN Protocol Architecture: Connection-oriented WAN data link protocols, in addition to framing, detect and may correct errors. They also are capable of controlling the rate of transmission. A WAN data link layer might implement a sliding window flow control and acknowledgment mechanism to provide reliable delivery of frames; that is the case for SDLC and HDLC, and derivatives of HDLC such as LAPB and LAPD.

b) IEEE 802 LAN Architecture: Practical, connectionless LANs began with the pre-IEEE Ethernet specification, which is the ancestor of the IEEE 802.3 This layer manages the interaction of devices with a shared medium, which is the function of a Media Access Control (MAC) sub layer. Above this MAC sub layer is the media-independent IEEE 802.2 Logical Link Control (LLC) sub layer, which deals with addressing and multiplexing on multi access media.

While IEEE 802.3 is the dominant wired LAN protocol and IEEE 802.11 the wireless LAN protocol, obsolescent MAC layers include Token Ring and FDDI. The MAC sub layer detects but does not correct errors.

8. Layer 1: Physical Layer: The Physical layer defines all the electrical and physical specifications for devices. In particular, it defines the relationship between a device and a physical medium. This includes the layout of pins, voltages, and cable specifications. Hubs, repeaters, network adapters and Host Bus Adapters (HBAs used in Storage Area Networks) are physical-layer devices.

To understand the function of the physical layer in contrast to the functions of the data link layer, think of the physical layer as concerned primarily with the interaction of a single device with a medium, where the data link layer is concerned more with the interactions of multiple devices (i.e., at least two) with a shared medium. The physical layer will tell one device how to transmit to the medium, and another device how to receive from it, but not, with modern protocols, how to gain access to the medium. Obsolescent physical layer standards such as RS-232 do use physical wires to control access to the medium.

The major functions and services performed by the physical layer are:

-Establishment and termination of a connection to a communications medium.

-Participation in the process whereby the communication resources are effectively shared among multiple users. For example, contention resolution and flow control.

-Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling (such as copper and optical fiber) or over a radio link.

Parallel SCSI buses operate in this layer, although it must be remembered that the logical SCSI protocol is a transport-layer protocol that runs over this bus. Various physical-layer Ethernet standards are also in this layer; Ethernet incorporates both this layer and the data-link layer. The same applies to other local-area networks, such as Token ring, FDDI, and IEEE 802.11, as well as personal area networks such as Bluetooth and IEEE 802.15.4.

Interfaces: In addition to standards for individual protocols in transmission, there are also interface standards for different layers to talk to the ones above or below (usually operating-system–specific). For example, Microsoft Windows' Winsock, and Unix's Berkeley sockets and System V Transport Layer Interface, are interfaces between applications (layers 5 and above) and the transport (layer 4). NDIS and ODI are interfaces between the media (layer 2) and the network protocol (layer 3).

OSI Service Specifications are abstractions of functionality commonly present in programming interfaces.


source: www.netugc.com