Published by:
Checkpoint Systems Inc.
101 Wolf Drive
Thorofare, NJ 08086
1st Edition - January 5, 2006
Part number: 7305198
For use with Checkpoint’s Intelligent Library System Version 2.6.
Checkpoint, Circulation Circuit, Intelligent Library System are registered trademarks of
Checkpoint Systems, Inc.
All rights reserved. Information in this document is subject to change without notice. Compani e s,
names and data used in examples herein are fictitious unless otherwise noted. No part of the
contents of this book may be reproduced or transmitted in any form or by any means without the
written permission of the publisher.
Portions of this software is licensed under the GPL license (see license.txt in your installation
directory). In compliance of Section 3 of the GPL terms, contact your Checkpoint Representative
for a source distribution.
Caution:This is a Caution or Warning icon. When it appears, the corresponding text i nd icates a cautionary
statement by which you must abide.
Note:This is a Note icon. When it appears, the corresponding text indicates a helpful note or tip when
using the feature.
The following usage conventions are used throughout the Intelligent Library System User
Manual.
Button Name - This describes a button or selection on the screen. For example, the
<DONE> button is represented in this document as Done.
Key Name - This describes a keystroke on a keyboard. For example Ctrl represents the
Control key on a keyboard.
ii
Important Information to our Users in North America
FCC Regulatory Compliance Statement
Checkpoint Systems, Inc., offers Radio Frequency Identification Products that have been FCC certified or
verified to 47 CFR Part 15 Subparts B/C and/or 47 CFR Part 18. Appropriately, one of the following labels
will apply to the approval:
NOTE
: This equipment has been tested and found to comply with the limits for a class A digital device,
pursuant to Part 15 of th e FC C R u le s. T he se lim i ts are designed to provide reasonable protection against
harmful interference w hen the equipment is operate d in a comm ercial environment. This equipment
generates, uses, and can radiate interference to radio communications. Operation of this equipment in a
residential area is likely to cau s e harmful interference in which ca se th e us er w il l be req ui red to c o rrec t the
interference at his own expense.
- OR -
This device complies w ith P art 15 o f th e FC C R ules. Operation is subject to th e follo w i n g two
conditions: (1) including this device may not cause harmful interference, and (2) this device must
accept any interference received, including interference that may cause undesired operation, which
may include intermittent decreases in detection and/or intermittent increases in alarm activity.
- OR -
NOTE: This equipment has been tested and found to comply with the limits for a miscellaneous type
ISM device, pursuant to Part 18 of the FCC Rules. This equipment generates, uses, and can radiate
radio frequency energy and, if not installed and used in accordance with the instruction manual, may
cause harmful interference to radio communications. However, there is no guarantee that interference
will not occur in a particular installation. If this equipment does cause harmful interference to radio
communications reception, which can be determined by turning the equipment off and on, please
contact Checkpoint Systems, Inc., at 1 (800) 257-5540 for further assistance.
Equipment Safety Compliance Statement
Checkpoint Systems Radio Frequency Identification products have been designed to be safe during normal
use and, where applicable, certain components of the system or accessory sub-assemblies have been
certified, listed or recognized in accordance with
UL 1037, UL 1310, UL 60950-1, CSA C22.2 No. 205, CSA C22.2 No. 220, CSA C22.2 No. 223, CSA
C22.2 No. 60950-1. Additional approvals may be pending.
WARNING:
equipment not expressly approved by the party responsible for assuring compliance could void the user’s
authority to operate the equipment in a safe or otherwise regulatory compliant manner.
Changes or modifications to Checkpoint’s Radio Frequency Identification (RFID)
one or more
of the following Safety standards: UL 1012,
iii
Important Information to our Users in Europe
CE Compliance Statement
Where applicable, Checkpoint Systems, Inc., offers certain Radio Frequency Identification (RFID) products
that have CE Declarations of Conformity according to R&T TE D irec tive 99/5/EC.
System Electromagnetic Compatibility (EMC), has been tested and notified through Spectrum Management
Authorities if necessary, using accredited laboratories, whereby, conformity is declared by voluntarily
accepted European Telecommunications Standards Institute (ETSI) standards EN 301489-3 and EN
300330-2.
NOTE: Certain Radio Frequency Identification (RFID) equipment have been tested and found to conform
with the CE emission and immunity requirement in Europe. This equipment generates, uses, and can radiate
radio frequency energy and, if not installed and used in accorda n c e wi th th e inst ruc tio n m a nu a l, m ay ca u se
harmful interference to radio communications. Under unusual circumstances, interference from external
sources may degrade the system performance, which may include intermittent decreases in detection and/or
intermittent increases in ala rm activity. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment experiences frequent interference from external sources or does
cause harmful interference to radio communications reception, which can be determined by turning the
equipment off and on, please contact a Checkpoint Systems representative for further assistance.
Equipment Safety Compliance Statement
Checkpoint Systems Radio Frequency Identification products have been designed to be safe during normal
use and, where applicable, certain components of the system or accessory sub-assemblies have been
declared safe according
recognized in accordance with one or more
50364, EN 60742. Additional approvals may be pending.
WARNING:
expressly approved by the party responsible for assuring compliance could void the user’s authority to
operate the equipment in a safe or otherwise regulatory compliant manner.
to the European Low Voltage Directive (LVD) by being certified, listed, or
of the following European safety standards; EN 60950, EN
Changes or modifications to Checkpoint’s Radio Frequency Identification equipment not
Using DiscMate......................................................................................................................................10-1
The Intelligent Library System 2.6 (ILS) is an integrated security tracking and database
system that maintains a library’s collection using Radio Frequency Identification (RFID)
to wirelessly coordinate the subscription status of library materials. This protects
collections, streamlines operations, and improves patron service. When using ILS,
libraries reduce losses, enhance staff productivity, increase circulation flow, and improve
patron satisfaction. ILS operates in conjunction with the library’s Library Management
System (LMS) or Automated Circulation System (ACS).
•Circulation Circuit Programming Station (optional)
•DiscMate (optional)
Introduction: 1-1
The following configuration illustrates an example of the ILS components and
connections in a typical ILS setup.
Circulation Circuit
Programming Station
Staff Station Reader
Circulation Circuit
Self-Checkout Station
Intelligent Sensors
Intelligent Library Controller
Library Management
System
Note:Your specific ILS configuration may not include one or more of the components shown.
1-2 ILS 2.5 User Guide
Figure 1.1
Portable Reader
Sample Intelligent Library Sy stem Components
Library Network Topology
In addition to supporting the Single Branch topology, ILS Version 2.6 supports the
following library topologies:
•“Single Branch”
•“Single Server, Multi-Branch Architecture”
•“Peer-to-Peer Communication”
Figure 1.2 depicts the library network topologies supported by ILS Version 2.6.
Single Branch
Single Server,
Multi-Branch
Application Server
Peer-to-Peer
= branch
Figure 1.2
Single Branch
Local Security
Controller
Peer BranchPeer Branch
Library Network Topologies Supported by ILS Version 2.5
Main Branch
Main BranchPeer Branch
The Single Branch scenario represents the current implementation of ILS, where one
Application Server controls all of the components within a single branch library.
Introduction: Library Network Topology 1-3
Single Server , Multi-Branch Architecture
New with this release, ILS Version 2.6 enables a single server to manage the circulation of
not only its only branch but multiple remote branches as well, granting the administrator
greater power and ease to manage the entire system. In this scenario, Local Security
Controllers are used to assist the Application Server.
The Local Security Controller (LSC) is a combination hardware and software solution for
a multi-branch ILS deployment. The LSC assists the Intelligent Library Controller in
maintaining the response speed of Exit Interrogators, managing the connection between
the Exit Interrogators at the branch and the remote Application Server to provide
maximum caching performance. The LSC also enables the intelligent sensors to operate
(with limitations) if the main server is down. This scenario is normally used with libraries
containing up to 20 branches.
Peer-to-Peer Communication
New with this release is the ability to run a library’s security and inventory management
system from any ILS Server. This enables a granular redundant system that is crash
resistant because each node can run the entire system, as well as, holding a complete copy
of the checkout cache database at any time.
The main Application Server communicates to each node (peer server) the latest
circulation database in a configurable matter of time (from seconds to hours or even
daily); meaning circulation records are nearly always up to date. This means that exit gates
(intelligent sensors) are updated throughout the day at every branch. This allows a patron
to walk to another branch (for example on a college campus) and their library material will
respond with the correct check-in or checkout status. This scenario is normally used for
libraries containing more than 20 branches.
1-4 ILS 2.5 User Guide
Document Overview
This manual provides a general overview of the ILS technology and illustrates the use and
operation of each component.
This manual has been designed for the librarian and administrator and contains all the
information necessary to take full advantage of the system capabilities. The Intelligent
Library System enhances your library experience because of the system's inherent ease of
use and efficiency.
This manual is organized into chapters, with each chapter describing a system peripheral,
such as the Self-Checkout Station. Each peripheral is designed with a specific system role
in mind. For example, patrons typically use the Self-Checkout Station, while Library staff
use the Portable Reader. Read the sections that apply to your role for ILS system
operation.
This manual is divided into the following chapters that cover system peripherals and
important ILS tasks.
•Introduction (See page 1-1)
•Application Server (See page 2-1)
•Self-Checkout Station (See page 3-1)
•Portable Reader (See page 4-1)
•ILS Remote Monitor (See page 5-1)
•CheckVIEW (See page 7-1)
•Exception Ticket Printer (See page 6-1)
•CheckPASS (See page 11-1)
•Tagging procedures (See page 9-1)
•Troubleshooting Guide (See page 12-1)
•System Maintenance Guide (See page 13-1)
Intended Audience
This document is intended for library staff and administrators as well as Checkpoint
Systems field service staff. The library staff includes librarians, support staff, and
temporary staff. The Field Service staff is comprised of the Checkpoint installers and
technical support personnel. These audiences need to understand the basic functions,
operations, and procedures related to the ILS.
Related Documentation
The following documents provide additional ILS and related information.
•Release Notes
•Circulation Circuit Programming Station User Manual
Introduction: Document Overview 1-5
System Overview
The following sections describe how the Intelligent Library System interacts with a
library’s circulation system to maintain its collection.
How RF Query Circuits
The Intelligent Library components - Self-Checkout Station, Intelligent Sensor, Staff
Station Reader, and Portable Reader - all use a Radio Frequency (RF) antenna and
transceiver system (interrogator) which detects and reads the Intelligent Circulation
Circuits. Communications occur when an interrogator’s radio field is triggered by a circuit
passing through it. When energized, the circuit presents the programmed item-specific
information to the interrogator for further processing.
Circulation
Circuit
1
0
1
A
U
.
.
.
.
.
Radio Field
Sample Interrogator
(Staff Station Reader)
.
.
.
.
.
.
.
?
?
?
?
?
?
Figure 1.3
.
Circulation Circuit Interrogated
The data, routed by the Intelligent Library Controller, is compared to the Library
Management System (LMS) database, in order to identify the checkout status of an item.
How ILS Maintains the Library’s Collection Database
The Intelligent Library Controller is the communications gateway between the ILS
subsystems and the library’s Library Management System (LMS) so that the check-in,
self-checkout, inventory management, and security activities can all be accomplished.
All library materials including books, CD/DVD materials, videotapes, and cassettes are
tagged with a permanent RFID Circulation Circuit™ (inventory tag). This tag contains
information that uniquely identifies the item within the library circulation database. Patron
cards identify patrons when the card is scanned at the Self-Checkout Station. The card
stores coded information unique to the individual patron that identifies the user to the
Library Management System. The patron can then be validated as eligible or ineligible to
use the library checkout privilege.
1-6 ILS 2.5 User Guide
Patron Checkout and Check-In
Patrons use Self-Checkout Stations to checkout library materials. Self-Checkout Stations
include a patron card reader, an RFID Circulation Circuit interrogator, a touch screen
monitor, and a printer in one compact unit. This provides the patron with library
transaction capability without any librarian assistance. A patron scans the RFID Patron
Card and library materials, identifying the patron and linking the library materials to the
individual through a communications session with the Library Management System via
the Intelligent Library Controller.
When the patron checks out materials, the patron and checked out item information is
stored in both the LMS and ILS databases, allowing ILS to operate in both on- and off-line
modes. When materials are checked out from a Self-Checkout Station, the ILS asks the to
the patron to checkout items from the LMS. If privileges are granted then a checkout
request to the LMS is generated for each item.
If the patron is checking in library materials, the ILS makes a check-in request to the LMS,
which updates its database and reports the result back to the ILS.
Staff Checkout and Check-In
The library staff typically uses a Staff Station Reader in situations where a patron needs
help from a librarian or when a librarian is checking in or checking out library materials.
The Staff Station Reader interrogates tags and functions the same as current bar code
scanners used in Library Management Systems.
Book Return Check-In
The Staff Station Reader can also be integrated into a book return slot. When library
materials are placed in the book return, the tags on the items are read and sent to the LMS.
The LMS then updates its database and passes back the transaction status to the ILS.
Introduction: System Overview 1-7
Checkout Process
Diagrammed here is how library materials are checked out.
Self-Checkout Station
Staff Station Reader
Intelligent Library Controller
Figure 1.4
1
The Circulation Circuit, encoded with the necessary information, is wirelessly read by
Check Out Flow
Intelligent Sensors
either the Self-Checkout Station or the Staff Station Reader.
2 The Station or Reader communicates with the Intelligent Library Controller which,
after successful verification, communicates back to the Station or Reader that the book
is checked out.
3 When exiting the library, the book passes through the Intelligent Sensors which
verifies the status of the book and allows it to exit the library without triggering an
alarm.
1-8 ILS 2.5 User Guide
Inventory Collection
You can use the Portable Reader to inventory the library’s contents or to find individual
items. The unit is a battery powered hand-held device that interrogates RFID Circulation
Circuits as you walk by tagged items, when the unit detection head is within a ten-inch
(25 cm) radius.
The Portable Reader searches for specified items using its search function. Single or
multiple item IDs can be uploaded to the data terminal and when a scanned ID matches,
the user receives an audible alert and the ID is displayed on the data terminal.
Figure 1.5
Portable Reader Taking Inventory
The Item Identifiers on the tagged articles are read and stored in a Portable Data Terminal
which can be downloaded in real-time to the Intelligent Library Controller using the
wireless data-terminal option or downloaded after the inventory is completed as a batch
file using the standard data terminal. The inventory data is then communicated to the
Library Management System, which compares the information from the Portable Reader
to item information in the circulation database.
Introduction: System Overview 1-9
Exit Monitoring
The Intelligent Sensor protects exit/entry aisles against unchecked library materials
leaving the secured area by determining whether tagged items have checked (authorized/
no alarm) or unchecked (unauthorized/alarm) events.
Intelligent Sensors
Intelligent Library Controller
Figure 1.6
Exit Monitoring
Programming Circuits
The optional Circulation Circuit Programming Station allows libraries to read and create
their own RFID Circulation Circuit tags and print barcode labels. This can also be used to
convert library materials with barcodes to RFID tags programmed with the barcode value.
A tag format file (created by Checkpoint field service staff using the Tag Designer
software) is used to program the tags in a compatible format. Tags are programmed by
passing them over the Circulation Circuit Programming Station. See “Circulation Circuit
Interrogated” on page 1-6 for an illustration of this process.
Off-line Processing
The Off-line Processing feature enables the Intelligent Library Controller and
Self-Checkout Stations to continue operating when disconnected from the library’s
circulation system. While the circulation system is offline, the Intelligent Library
Controller records significant events on the system, which are then reported to the
circulation server when synchronization reoccurs. For example, at the time of
synchronization, the due date is sent to the circulation server.
When Off-line Processing is turned on, the word ON appears next to Off-line Processing.
The feature is turned on or off by Checkpoint field service personnel by setting a table
parameter on the Intelligent Library Controller. If using the Bridge Interface (“ILS
Without an LMS Connection”), Off-line Processing should never be turned on.
1-10 ILS 2.5 User Guide
ILS Without an LMS Connection
It is possible for ILS to operate without an active Library Management System (LMS)
interconnection using the ILS Bridge Interface feature. The Bridge Interface feature
allows libraries with non-supported circulation vendors or no circulation systems to use
the security and Staff Station Reader functionality of the ILS.
With the Bridge Interface, the user of the ILS Control program monitors and changes the
operation mode (check-in or checkout) of the Staff Station Readers. A library that is using
the Bridge Interface can use a Staff Station Reader for checkout, but cannot use a
Self-Checkout Station.
Components
The following sections describe in detail each of the ILS system components.
Intelligent Circulation Circuit
The Intelligent Circulation Circuit is an advanced RFID integrated circuit bonded to a
label which is then attached to library material.
Figure 1.7
The circuit stores 96 programmable bits of information about an item that can be read on a
single Radio Frequency, 13.56 MHz, up to a distance of 4 feet (1.2 m). The circuit allows
for the reading of multiple circuits using an anticollision algorithm, as well as error
detection and correction methods.
Intelligent Circulation Circuit
Introduction: Components 1-11
ILS Intelligent Sensor
The ILS Intelligent Sensor (exit gates) provides security at library exits and corrals by
generating a radio field that gathers circuit information from a distance up to 24 inches
(61 cm). Two intelligent sensors form a secure aisle up to 48 inches (122 cm) wide for
circuit detection range. Additionally, the sensor communicates back to the Library
Management System via the Intelligent Library Controller in real-time, determining
whether an item has been checked out. If items in the interrogation field are not properly
checked out, an alarm sounds and the book title appears on an exit alarm screen.
Figure 1.8
ILS Intelligent Sensors
Local Security Controller
The Local Security Controller (LSC) is a combination hardware and software solution for
a single server, multi-branch ILS deployment. The LSC assists the Intelligent Library
Controller in maintaining the response speed of Intelligent Sensors (exit gates), managing
the connection between the Exit Interrogators at the branch and the remote Application
Server to provide maximum caching performance. The LSC also enables the exit gates to
operate (with limitations) if the main server is down. This scenario is normally used with
libraries containing up to 20 branches.
Figure 1.9
Local Security Controller
1-12 ILS 2.5 User Guide
St aff S t ation Reader
The Staff Station Reader functions as an interface to ILS and circulation activities for
library personnel. The Staff Station Reader reads RFID Circulation Circuits (tags) when a
book is placed on the reader at up to 12 inches (30 cm) from the reader in a vertical
direction. The Staff Station Reader communicates thro ugh data links with both the Library
Management System and ILS, providing library staff the ability to perform typical
functions with both the library system and RFID tagged items. For example, library staff
can find the status of RFID tagged items that have been processed by ILS.
Figure 1.10
ILS Staff Station Reader
Patron Self-Checkout St ation II
The Self-Checkout Station enables a library patron to checkout library materials without
the assistance of the library staff. The system may report messages if there is a problem
conducting the checkout transaction; for example, overdue fines have locked the patron’s
account.
Figure 1.11
ILS Self-Checkout Station
Introduction: Components 1-13
The Self-Checkout Station supports multiple languages simultaneously. When
programmed, a language selection screen is presented to the patron to select a language for
the self-checkout transaction.
A typical scenario for a patron to check out a book is as follows.
1 A patron arrives at the Self-Checkout Station and selects a language (if using multiple
languages).
2 The patron is identified by the system with their patron ID card.
3 The system confirms the patron’s eligibility to conduct a transaction through validation
of the patron ID card.
4 The patron is led through the transaction process by communication with the system
through a touch screen monitor. The patron checks out items by passing them one at a
time over a short-range wireless interrogator that is located in the Self-Checkout
Station.
a The short-range interrogator generates a radio field, which activates and
interrogates the tagged item.
b The interrogated item ID is passed to the Intelligent Library Controller.
c The Intelligent Library Controller determines the item status and actions that can be
taken via communications with the Library Management System.
d The Intelligent Library Controller updat es the Self-Checkout Station, which notifies
the patron about their transaction status.
5 After the patron scans all the items to be checked out, the patron touches Done and
receives a receipt for the transaction, listing all materials checked out and the
respective due dates.
Portable Reader
The Portable Reader provides inventory management functions, such as inventory
reconciliation and item search. The device consists of a hand-held, rechargeable battery
operated wand that generates a radio field that scans RFID tagged items. The wand is
attached with cabling to a data terminal, which can be carried in one hand or strapped onto
the wrist, storing information read by the wand. The data stored in the terminal can be
downloaded to the Intelligent Library Controller in real-time either with the standard data
terminal or wirelessly.
1-14 ILS 2.5 User Guide
The wand can also be used for item searches and shelf order checking. Item information is
uploaded to the data terminal, allowing you to scan the ID. Once found, an audible alert
sounds and the ID displays.
Inventory Wand
Portable Data Terminal
Figure 1.12
ILS Portable Reader
Intelligent Library Controller
The Intelligent Library Controller software:
•Functions as the communications gateway between the Intelligent Library subsystems
and the Library Management System
•Identifies and configures all peripheral Intelligent Library sub-systems
•Tracks and directs all ILS transactions
The Intelligent Library Controller operates whether the Library Management System is
on-line or off-line. In off-line mode, the server tracks whether an item is being checked
out, checked in, and determines whether tagged items going through secured areas are
authorized. If unauthorized items are detected by the system, the server signals the
Intelligent Sensor (the gates) to alarm. Any transactions that occur independent of the
Library Management System are updated when the ILS system comes back on-line.
The Intelligent Library Controller interfaces to the Library Management System and other
subsystem components using the 3M
Card (NIC). The Ethernet NIC uses the TCP/IP protocol and session and the physical
cable is 10BaseT.
protocol (SIP2) over an Ethernet Network Interface
Exception Ticket Printer
New in ILS Version 2.6 is the option to automatically print a hold receipt for library
material at designated book drops. This means that when library material is returned via a
book drop, if the library material is designated with a hold, a print er automatically prints a
receipt. This frees library staff from having to manually check-in each item for its hold
status. Instead, a staff member just checks the print receipt and then secures the receipt
with the item on hold.
Introduction: Components 1-15
One exception ticket printer can service multiple interrogators. This means that a receipt
might print at the exception ticket printer near Drop Box A for a book that is returned at
Drop Box B.
CheckVIEW
New in Version 2.6 is the CheckVIEW utility, enabling library staff to remotely monitor
up to four different Self-Checkout Stations at one time from any computer within the
library. This enables library staff to manage issues such as:
•Patrons who are having difficulty using the touch screen
•Stations that may have hardware or system problems
•Viewing the patrons’ check out list to reconcile any discrepancies concerning
availability
Staff members can use their mouse and keyboard to assist patrons by assuming control of
a specific Self-Checkout Station window to step a patron through a checkout procedure.
ILS Remote Monitor
New in Version 2.6, ILS Remote Monitor is an optional utility that allows library staff
operating in a single server, multi-branch or peer-to-peer environment to view the status of
other branches on the network from any computer on that network. This enables a staff
member to monitor system status, identify a troublesome Self-Checkout Station, print a
pre-run report, or transfer files.
The ILS Remote Monitor works on any computer (with a web browser) that is connected
to the library network.
Circulation Circuit Programming St ation
The optional Circulation Circuit Programming Station programs Circulation Circuits,
either with the retrospective item identifier from the existing barcode or when new
materials are added to the collection. This reduces the time it takes to convert a library
collection from barcode to RFID Circulation Circuits as well as add additional materials.
The Circulation Circuit Programming Station enables the library to easily link new
materials into ILS instead of waiting several weeks for pre-programmed tags. In addition,
the Circulation Circuit Programming Station can be integrated into an optional portable
1-16 ILS 2.5 User Guide
workstation that allows the library staff to program Circulation Circ uits while moving
around the library.
Figure 1.13
Circulation Circuit Programmer
When adding a new item to the collection and programming the Circulation Circuit, the
library can also print a barcode label. In many cases, libraries will continue to support the
use of barcodes in addition to the RFID inventory Circulation Circuits, mainly for
compatibility with other branch libraries still using barcodes.
Using the Circulation Circuit Programming Station software application, libraries
program the Circulation Circuits by passing them over the tag programming surface. After
programming the Circulation Circuit, the application automatically reads, verifies, and
displays the data that was written to the Circulation Circuit. Refer to “Affixing Circulation
Circuits” on page 9-1 for instructions on how to attach circuits to library materials.
There is separate Circulation Circuit Programmer User Guide available that describes the
usage of this product.
CheckPASS
CheckPASS is an optional utility (new in Version 2.6) that allows library patrons to pay
library fees at a Self-Checkout Station, without staff assistance. Outside of the ILS
product, patrons use a self-service unit to add cash to their account balances. Within ILS,
patrons are reminded of outstanding library fees when they attempt to check out materials.
They can then pay with the touch of a button at the Self-Checkout Station. Patrons save
time and library staff is freed to perform other tasks.
See “CheckPASS” on page 11-1 for further information.
Introduction: Components 1-17
Notes
1-18 ILS 2.5 User Guide
C HAPTER
C
HAPTER
0
A
PPLICATION
The Application Server hardware hosts the Intelligent Library Controller software, which
is the core-processing component of the Intelligent Library System. The Intelligent
Library Controller performs many functions, including:
•Storing transactions performed at the Self-Checkout Stations
•Downloading inventory data from the ILS Portable Reader
•Generating reports
•Connecting to the Library Management System (LMS)
S
ERVER
In addition, the Intelligent Library Controller provides a single station for system
configuration and diagnostics. If the LMS becomes unavailable, the Intelligent Library
Controller can support automated checkout functions without the LMS, using a feature
known as Off-Line Processing. Off-Line Processing is a site-specific option, so it may not
be available to you.
This chapter describes the Application Server and its components and how they operate
within the ILS. It also provides information on:
•Checking system, host, interrogator, and exit alarm status (page 2-2)
•Scheduling Checkout Cache Synchronization and Host Reconnections (page 2-6)
•Synchronizing the Checkout Cache (page 2-8)
•Downloading inventory information from the Portable Reader (page 2-10)
•Generating, saving, and printing reports, including Checkout Discrepancy, Patron
Discrepancy, Exit Alarm, Check-In Exception, and Generic reports (page 2-11)
•Communicating and coordinating data exchange with Local Security Controllers at
remote branches (page 2-25)
•Working in Bridge Mode (page 2-25)
Application Server: 2-1
Loading...
+ 67 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.