DEPARTMENT OF COMPUTER SCIENCE, PROJECT TOPIC: RESULT MONITORING PROGRAMME AND NETWORK IMPLEMENTATION
(A CASE STUDY OF KWARA STATE
POLYTECHNIC ILORIN
KWARA STATE)
ABSTRACT
At
this modern age of information and communication technology and it application
in academics, result monitoring and evaluation software is a necessity that
every higher institution needs to passes. The need for this computer-based
invention is coupled with the call for eradication of several fraudulent
manipulations and false grading of students results in tertiary institution. This
project develops a network based application that enables students result to be
monitored and supervised on local area network (LAN). The program is designed
with Visual Basic through the easy implementation of Windows Socket (WinSock)
as an ActiveX control that enables PC-to-PC communication on client/server
architecture in network programs.
TABLE OF CONTENT
Title page
Certification
Dedication
Acknowledgement
Abstract
Table of contents
Chapter
One: General Introduction
11 Introduction
1.2 Aims and objectives of the study
1.3 Significant
of the study
1.4 Scope and Limitation
1.5 Organization of report 4
1.6 Definition of terms 4
Chapter
Two: Literature Review
2.1 Overview of Kwara
State Polytechnic, Ilorin
2.2 Overview of Local Area Network
2.3 LAN Topology
2.4 Result Monitoring Overview
2.5 Client/Server Model
Chapter
Three: Research Methodology
3.1 Methods of data collection
3.2 Analysis of data and existing system
3.3 Description of the proposed system
3.4 Design and Implementation methodology
Chapter
Four: Design, Implementation and Documentation
4.1 System Design
4.1.1 Input Design
4.1.2 Input Design
4.1.3 File Design
4.1.4 Procedure
Design
4.2 Implementation
4.2.1 Hardware
support
4.2.2 Software
Support
4.3 System Documentation
4.3.1 Operating
System
4.3.2 System
Maintaining
Chapter
Five: Summary Conclusion and Recommendations
5.1 Summary of work done
5.2 Re commendations
5.3 Conclusion
5.4 Reference
Appendix A
Flowchart
Appendix
Source program
Listing
Appendix C
Object Program/Output
CAHPTER ONE
1.1
INTRODUCTION
Result
is the final consequence of a sequence of actions, events expressed
quantitatively or qualitatively. Result in this study is term as a range of
possible outcome associated with an examination in the institution. And
monitoring is an act of observing a situation for any changes which may occur
over time using a monitor or a measuring device of some sort.
Result
monitoring in this project associated with an act of observing the situation of
students result for any change which may occur over time using a network (LAN)
implementation support.
This
project deals with result monitoring program design on network (LAN)
implementation in Kwara State Polytechnic, llorin.
The
project is designed to cater for the various institutes in Kwara State
Polytechnic, Ilorin and also monitoring the computation of students result in
each institute of the institution through a Local Area Network so that there
can be more quality and transparency in the process of computing students
result. The strength of result monitoring in the institution like ours is
measurable using either Network (LAN) program intensity referencing scale or
“spyware program” (A type of malware
that is installed on computers and collects little bits of information at a
time about users without their knowledge). A Local Area Network (LAN) is a computer
network covering a small physical area, like a home, office, or small groups of
building, such as school, or an airport. The defining characteristics of LANs
in contrast to Wide Area Network (WAN5) include their usually higher data transfer
rates, smaller geographical area and lack of a need for leased telecommunication
lines.
1.2
AIMS AND OBJECTIVES OF THE STUDY
The
ultimate aims of the proposed system are to overcome the problem in the
existing system whereby the process of monitoring students result is done not
only manually but no specific method of monitoring students result
electronically. This project work set-out to minimize or eradicate completely
all these problems associated with the students result especially
(malpractices) during and after the examination such as cheating in the
examination, swapping of exam’s booklet, reducing/adding to students score
already submitted by lecturers during the computations without prior notice of
the management by networking the whole systems (operational systems) in the
institution so that data/information and other valuable resources can be shared
by networking the institution to ensure an easier and less tedious work by
bringing into play the numerous advantages of computer and thus provide a
better alternative to the existing system of monitoring result. The aims and
objectives of carrying out this research also include:
·
Networking the whole institution so
that data/information, file can be share, monitor and retrieval.
·
Manages the relationship between the
institution and the students
·
Controlling/monitoring the students’
academic progress and measuring their achievement (result) both at the
institution and subsequently
·
Handling and monitoring record of
examination, assessments, marks and grades and academic progression.
·
Providing statistical report.
1.3
SIGNIFICANT OF THE STUDY
Result
monitoring program is an application for educational establishment t like a
Student Information System (SIS) to monitor and manage students’
Data/result. It
provide capabilities for entering students test and other assessment mores
through an electronic grade book, building students schedules, tracking any alternate
made to already entered students’ scores with time and date and manages/
monitors any other related students data More importantly, a student result
monitoring program have a significant impact on daily operation and ensure that
operation performs in system A is visible to System B and vice versa through a
Local Area Network (LAN5).
1.4
SCOPE AND LIMITATION
The
scope of this research work is limited to Kwara State Polytechnic, Ilorin. It is limited to
how students result is being monitored in the four institutes of the
institution through a Local Area Network (LAN) implementation support.
1.5
ORGANIZATION OF REPORT
This
research work titled Result Monitoring Program Design on Network Implementation
is organized into five chapters: the first chapter of this project work gives a
brief introduction into the research work, statement of problem, aims and
objectives, significant of the study, definition of terms, scope and limitation
of the study and various methods of gathering data.
Chapter
two deals with the literature review: overview of Kwara state Polytechnic, Ilorin, Overview of a
Local Area Network, Result Monitoring Overview, Client/Server Model and the
Advantages of Working in a Client/Server environment.
Chapter
three describes the research methodology: methods of data collection, analysis
of data and existing system, description of the proposed system, design and
implementation methodology
Chapter
four contains Design of the system, implementation of the system arid
documentation of the system
Chapter
five gives summary of work done, experience gained, conclusion and
recommendation.
1.6
DEFINITION OF TERMS
DATA:
This is a basic raw fact
FILE: An aggregation of records, usually within
a series, brought together because they related to the same subject, activities
or transaction
SYSTEM: Interrelation of two or more components working
together as Whole.
MANAGEMENT:
This is the act of controlling or
running an organization.
RESULT
This is the final
consequence of a sequence of actions or events expressed qualitatively or
quantitatively
MONITORING An act of
observing a situation for any changes which may occur over time, using a
monitor or measuring device of sort.
USER: A
person or thing that uses something
RESULT OBSERVER:
This is a person employ to monitor result.
SPYWARE:
This is software that is
installed to get secret information about another organization.
MALPRACTICE:
Illegal behavior while in
professional job
LAN:
An abbreviation for Local Area Network (a system communicating by computer
within a large organization)
CABLING: All the cables that is required
for particular equipment or a particular system
HUB:
The central and
most important part of a particular place or activity
CLIENT:
A client is a computer
or software application that helps a user forms a send a query and then
displays the result of the queried information for the user
SERVER:
A server is a piece of
hardware that receives processes and replies to query.
PACKETS:
To transfer data
effectively, a uniform chunk of data is created rather than sending characters
singly or in widely varying sized groups. These chunks of data are called
packets in most synchronous communications system.
CHAPTER TWO
2.0
LITERATURE REVIEW
AN
OVERVIEW OF KWARA STATE POLYTECHNIC, ILORIN
2.1
HISTORICAL BACKGROUND
The
Kwara State College of Technology (now Known as the Kwara State Polytechnic, Ilorin) was established in 1972 with aim of training
middle manpower for the smooth running of the economic development of Kwara State
in particular and Nigeria
as a whole.
The
institution was opened in January 1973 with only on hundred and twelve
students, eleven members of teaching staffs and three senior administrative
staffs. When the institution was first established in 1972, it was divided into
two schools namely: School of Basic and Applied Science and School
of Technology now known as Institute of Basic
and Applied Science and Institute
of Technology
respectively.
The
institution’ was established by edit No 4 1972 (now replaced with edit No. 21
of 1984) and the Polytechnic now trains about eighteen thousand students each
year together in all the institutes. The institution is currently divided into
five institutes with each institute headed by a director.
These
four institutes are:
i. Institute
of Basic and Applied
Sciences (IBAS)
ii. Institute of Environmental Sciences (IES)
iii. Institute of Technology (IOT)
iv. Institute
of Finance and Management
Studies (IFMS)
v. Institute
of General Studies (lGS)
2.1.1
STRUCTURE OF KWARA STATE POLYTECHNIC, ILORIN
The Kwara State
Polytechnic, Ilorin
is made up of various operational institutes, currently include:
1. Institute
of Basic and Applied
Sciences (IBAS)
2. Institute of Environmental Sciences (IES)
3. Institute
of Technology (lOT)
4. Institute
of Finance and Management
Studies (IFMS)
5. Institute
of General Studies (lOS)
These
institutes make up the educational organizational structure of the polytechnic.
Since this project work is limited to monitoring the students result, the work is
directly focusing these institutes. Being a big institution with five
institutes mentioned above, the duties of each institute is some how interwoven
with each other and some can even be dependent on other as the case may be.
During the examination period, on daily basis, result of each institute is
submitted to the office of the institute examiner officers, then to the
institute directors and later to the management for sitting and approval.
With
the network and computerization of the institution, students result, information
and other valuable data would be shared, monitored, secure and b-an spa rent.
The problem with the
existing method is the huge and risk task of computing the whole results of the
institution in a single place and taking the results to the concerned
institute. Being a big institution, the institute can be very apart (like lOT
for instance coming to the permanent site), this results or nation may be
tampered or subjected to alteration.
This can be very
tasking on the staff and can even reduce the efficiency of and the quality of
students result.
This led to a
proposal to network the polytechnic and reduce inconsistency during the
computation of students result and also reduce the stress on staff and adequately
monitor the computation of students result to avoid the computational
Malpractice and place
a limit on the strength of ambient examination/results malpractice, in as much
as the transparency of computation is guaranteed and data and information, and
other resources are sharing to adequately monitor the production of the students’
results.
KWARA STATE
POLYTECHNIC, ILORIN
(lBAS)
(IES) (IFMS)
(IOT) (IGS)
2.2
OVERVIEW OF LOCAL AREA NETWORK
`A
Local Area Network is a computer network covering a small local area and
interconnected together for the purpose of data and resources sharing.
The
Local Area Network can be classified depending on type of connection or
topology i.e.
i. Star Topology
ii. Ring Topology
iii. Bus Topology
In
the days before personal computers, a site might have just one terminal r
simple low-speed cabling.
The first Local Area
Networks were created in the late 1790s and used to create high-speed links
between several large central computers at one site. Of ra1y computing systems
created at this time, Ethernet and ARCNET were the most popular.
The
growth of Dos based personal computer meant that a single site began to have
dozens or even hundreds computers. Also, with the expansion of business and a
need to computerize the office activities, there arose the need to network
computers. The initial attraction of networking these was generally to share disk
space and printers, which where both very expensive at the time. There was much
enthusiasm for concept and for several years from about 1983 onwards computer
industry predicts would regularly declare the coming year to be “the year of
LAN”.
In
reality the concept was marred proliferation of incompatible physical layer and
network protocol implementation and confusion over how best to share resources
on the network.
Typically,
vendors would have their own type of network card, cabling, protocol and
network operating system.
A
solution appeared with the advent Novell Netware, which gave: Even handed
support for the 40 or so competing card/cable types, and a much sophisticated
operating system than most of its competitors. Netware dominated the personal
computer LAN business from early after its introduction in 1983 until the mid
1990s when Microsoft introduced window NT advance server and window for
workgroups.
2.2.1
LOCAL AREA NETWORK (LAN)
A
Local Area network (LAN) is a high-speed communications system designed to link
computers and other data processing devices together within a small
geographical area, such as workgroup, department or building. Several LANs can
also be interconnected within a campus of building to extend connectivity (also
called a Wide Area Network or WAN). This allows users to electronically share
vital computing resources, such as hardware (e.g. Printer and CD-ROM drivers)
application programs, and information.
Local
Area Network implements shared access technology. This means that all the
devices attached to the LAN share a single communication medium, usually
coaxial, twisted-pair or fiber-Optic cable.
A
physical connection to the network is made by putting a network interface card
(NIC) inside the computer and connecting it to the network cable. Once the
physical connection is in place, the network software manages communications
between stations on the network. Be “the year of the LAN”.
In
reality the concept was marred by proliferation of incompatible physical layer
and network protocol implementations and confusion over how best to share
resources on the network.
Typically,
vendors would have their own type of network card, cabling, protocol and
network operating system.
A
solution appeared with the advent of Novell Netware, which gave: Even handed
support for the 40 or so competing card/cable types, and a much sophisticated
operating system than most of its competitors. Netware dominated the personal
computer LAN business from early after its introduction in 1983 until the mid
1990s when Microsoft introduced Window NT advanced server and windows for
workgroups.
2.2.2
HOW A LOCAL AREA NETWORK WORKS
To
send messages to and from computers, the network software puts the message
information in a packet (if the message to be sent is too big to fit into one
packet, it will be sent in a series of packets).
In
addition to the message data, the packet contains header and trailer that carry
special information to the destination. One piece of information in the header
is the address of the destination.
The
NIC transmits the packets onto the LAN as a stream of data resented changes in
electrical signals. As it travels along, the shared cable each NIC checks it
destination address to determine if the packet is addressed to
When
the packet arrives at the proper address the NIC copies it and gives data to
the computer since each individual packet is small, it takes very little travel
to the ends of the cable. After a packet carrying one message passes along the
cable, another station can send its packet. In this way, many devices can share
the same LAN medium.
Each
LAN has its own unique topology, or geometric arrangement. The topology or
configuration of a LAN describes how the LAN is configured.
2.3
LAN TOPOLOGIES
Topology
comes from a Bus, Star and Ring. Those topologies define how nodes are
connected within the network. Node is an active device, such as computers,
printers and the Greek word ‘topo’ which means place. The topology describes
the arrangement of a network, such as its connections and nodes. The three
current topologies for LANs network equipment (repeaters, routines, bridges)
connected to the network.
BUS
TOPOLOGY
Bus
topology consists of PC5, terminals and peripheral devices, which are connected
to a cable (bus). Many nodes can be added to the bus and being communication
with other nodes on the bus. When signals are broadcasted to the LAN with this
method, all nodes will receive the broadcast, but only the destination node
will respond to the broadcast.
The
ends of the cable are connected to a terminator. A break anywhere in the cable
will usually cause the entire segment to become inoperable.
Bus
topology is effective if all devices are close to each other in one area.
RING
TOPOLOGY
Ring
topology does not use a computer as a centralized host for the nodes on the
LAN. It is a circle of computers around the ring, with one computer routing a
message to the next one. The message is passed around the ring until it reaches
its destination. The message always travels in one direction in order to
prevent collusion.
The
main concern with this method is that a message cannot pass through the ring
unless every node is operational. The token ring network is the most common
form of a Local Area Network that uses ring topology.
STAR
TOPOLOGY
Star
topology has a centralized computer, which direct traffic on the LAN and
prevents collusion. All computers (nodes) on the LAN are connected to the host
(Centralized Computer), which is bigger and more powerful than the other nodes
on the LAN.
In
this method, if a node fails, it does not affect operations on the other nodes.
This is a very popular method when there are centralized databases that are
needed by other nodes (terminals and PCs) on the LAN. For example, banks use
this topology to share and monitor their centralized account, information and
the institution can also use this topology to share and monitor their
centralized students information particularly results.
2.4
OVERVIEW OF RESULT MONITORING
Result
monitoring program is a system designed to be used in an establishment or
organization such as bank, institution e.t.c. to monitor the transaction and
activities of the system users in the organization.
A
credible result monitoring program requires four main components:
1.
Quality Result Observers (trained
inspectors/investigators)
2.
Objective Observational method (how to
describes and monitor)
3.
Standard Monitoring Practice (routine
survey? inspection routes)
4. Standard data collection and reporting forms
Any
result monitoring program must first start with available personnel becoming
result observers.
These
personnel must receive training related to result and result monitoring or
observation. The essential elements of the training curriculum provides the
observers with a basic understanding and working knowledge, result monitoring
techniques, standard field procedures and documentation formats. T) Training
prepares the result monitoring observers to be consistent in observations and
to be aware of and adjust to variable field conditions.
2.5
CLIENTISERVER MODEL
Most
networks operate in the client/server model. Simply stated that a client/server
network is a networking environment in which the client computer makes a
request. Typically, even in a peer-to-peer network, any computer is both a
client and a server. This discussion presents the database management
application as an example of how the client/server model operates.
In
the client/server model the client software uses the Structures Query Language
(SQL) to translate what the user sees into a request that the database can
understand. So is English-like database query language originally developed by
IBM to provide a relatively simple way to manipulate data. Manipulating data
means entering it, retrieving it, or editing it.
Other
database vendors realized that a common database language would make it easier
to develop database applications. Therefore, they supported SQL and it became a
standard. Most database management system use SQL.
2.5.1
THE CLIENT/SERVER PROCESS
The
database query is sent from the client but processed on the server. Only the
results are sent across the network back of the client. The whole process of
requesting and receiving information consist of six steps
The
client request data
ii.
The request is translated in SQL
iii.
The SQL request is sent over the network to the server
iv.
The SQL request is sent over the network to the server computer where the data exists.
v.
The requested records are returned to the client
vi.
The data is presented to the user
2.52
THE CLIENT
The
user generates a request at front end. The client runs an application that:
i.
Present an interface to the user
ii.
Formats request for data
iii.
Displays data it receives back from the
server.
In
a client/server environment, the server does not contain the user Interface
software. The client is responsible for presenting the data in a useful form,
such as with user interfaces and report writing.
The
client computer accepts instructions from the user, network back to the client.
The client then feeds the information to the interface, which presents the
information to the user.
In
a client/server environment, the person at the client end uses an onscreen
form, called a search key, to specified what information they are looking
The
client/server approach can benefit any organization where great numbers of
people need constant access to large amounts of data.
The
client/server network is the most efficient way to provide: Database and
management for application such as:
a.
Spreadsheet
b.
Accounting
c.
Communications
d.
Documentation
e.
Network management
f. Centralized file storage.
Database
management is the most common application used in a client/server environment;
therefore, this report focuses on how database management systems (DBMS)
function.
2.5.3 THE ADVANTAGES
OF WORKING IN A CLIENTISERVER ENVIRONMENT
Client/server
technology creates a powerful environment that offers many real benefits to
organizations. Well-planned client/server systems provide relatively
inexpensive platforms that provide mainframe computing capacity while being
easy to customize for specific applications. Because client/server processing only
sends the results of a query across the network, it cuts down on network
traffic.
It
puts the file search burden on a computer that is more powerful than the
client, and is better able to handle the request. On a busy network, this means
that the processing will be distributed more evenly than in a traditional
server based system.
The
client/server network also saves RAM in the client computer because all of the
data and the file I/O logic are on the application in the server. The server in
client/server systems is capable of storing large amount of data. This allows
more space on client computers for other application.
Because
the file services and the data are on the back-end server, the servers are
easier to secure and maintain in one location. Data is more secure in a
client/server or on a small number of servers. When the data is in one location
and managed by one authority, backups are simplified
CHAPTER
THREE
3.0
RESEARCH METHODOLOGY
3.1
METHODS OF DATA COLLECTION
The
methods used in collecting data are numerous among which are questionnaire
method, interview method and observation method e.t.c
The
methods used in gathering data in this research work are done through interview
with some of the exam coordinators and MIS staff of the Polytechnic. Also
observations were employed in inspecting ‘results, Information were also
gathered through the Internet.
3.2
ANALYSES OF DATA AND EXISTING SYSTEM
The
current system of monitoring result in Kwara State Polytechnic, Ilorin is a manual approach.
This manual method is employed in using staffs of the institution for the
monitoring exercise with/without a credible qualified training on result
monitoring.
Exam
Coordinators are responsible for monitoring the activities surrounding the
process of result in each institute of the polytechnic.
Firstly,
when the results are submitted to exam coordinators after when they must have
had the departmental sitting on the results, after this exam coordinators take
the result to the institute directors for institute consideration after when it
going to be taken to MIS for verification and inspection if there is no
complain, it will meet the approval and it will be take to interlink where the
results will be launch on the internet for students view.
3.2.1
PROBLEMS OF THE EXISTING SYSTEM
·
No specific training organized for the
result observers
·
Weak monitoring Exercise
·
Under utilization of system
·
Lack of computerized/networking of the
systems
3.3
DESCRIPTION OF THE PROPOSED SYSTEM
Result
monitoring program is a system which is designed on a Local Area Network to
monitor the computation of students result in such a way that the operational
systems in the Polytechnic are network together in order to share common
resources such as data/information, printer and other resources. The project
work is designed so as to link the operational systems (computers) together
that the operation performs in system A will be visible to system B and vice
versa.
3.3.1
ADVANTAGES OF THE PROPOSED SYSTEM
·
It prevent unauthorized user not to
have access to the computer system except the authorized persons e.g. (Data
Entry Operators)
·
Effective password system is ensure
·
monitoring and keeping track of record
of those who used the system at a particular period of time
·
It allows sharing of resources
·
3.4
DESIGN AND IMPLEMENTATION METHODOLOGY
Implementation
is a stage in system development that involves all the necessary things to be
put in place so that a new system would work effectively.
3.4.1
IMPLEMENTATION TECHNIQUES
Implementation:
here the code is written, It refers to putting into effect, the intention
displayed in a system design. It is aimed at putting theory into practice.
Thus, the design state what should be or what ought to be done while implementation
does it.
3.4.2
PROGRAMMING LANGUAGE
The
programming language used to design and implementing this project work is
Visual Basic Programming Language. Visual Basic was chosen amongst all other
High Level Language (HLL) due to the following reasons:
>
Visual Basic employs some Object Oriented Language qualities such that each of
the control that is being place in the form inherit some already built-in code
that determines some basic input function like mouse click, keyboard press and
so on.
Visual
Basic extensively allow the application to take advantages of many windows
features which is used in the design system, incorporate some pre-defined
object and control, which include Forms, Windows, Pictures, Program data items
and controls.(Object linking and Embedding)
Visual
Basic is an event driven programming language. Each of the programming parts
are on a particular event that language is different from the traditional
procedural language when the program process each instruction in turn with
occasional jumping.
CHAPTER
FOUR
4.0
DESIGN IMPLEMENTATION AND DOCUMENTATION OF THE SYSTEM
4.1
SYSTEM DESIGN
System
design involves using the information gathered during the requirements analysis
state to design new system or to modify existing one. This is concerned with
formulating functional specifications statement of what the system should do,
how it should do it and what sequence such things, as input of data, processing
and output of reports should occur.
The
design of a new system is classified into output design, input design, file
design and procedural design.
This
section takes a good look at the implementation of the new system by analyzing
the input and output specification of the system. The file design and the
procedure design are also part of what will be emphasizing on. The
documentation which also presents a very easy way of using and maintaining the
system is also described in this section of the project.
INPUT
DESIGN
Inputs
are unprocessed raw data that will be keyed in to the computer through input
device (e.g. keyboard) for necessary processing. There are various input stored
in files in some of the various menu in a prescribed format for easy
transformation. The following are the input to the new system.
|
Student
Registration Form
4.1.2
OUTPUT DESIGN
This
refers to the interface which relates the result of the processed data already
entered into the system back to the user for easy interpretation in order to
make a decision. Output refers to the end product of data entered into the
system. The output generated form the system is depicted below:
KWARA STATE
POLYTECHNIC, ILORIN
INSTITUTE OF BASIC AND APPLIED SCIENCE
ND
II SECOND SEMESTER RESULT
Matric Number COM121 COM122
COM123 COM124 COM127 BNS122 GNS121 GNS122 GPA
REMARK
0011 88 8 88 8 88 88 88 88 2.95 LOWERCREDIT
002 23 96 90 55 56 67 78 89 2.91 LOWER CREDIT
0021 66 66 66 6 66 66 66 66 2.68 LOWER CREDIT
KWARA STATE
POLYTECHNIC, ILORIN
INSTITUTE OF BASIC AND APPLIED SCIENCE
ND
II FINAL YEAR RESULT
NAME MATRICNUMBER ND1 GP NDII
GP CGPA REMARK
OLAKUNLE SAMMUEL OO1 3.52 3.33 3.43 UPPER
CREDIT
ODEDRA ALAO 002 3.52 3.33 3.43 UPPER
CREDIT
ABDULRAHAMAN S. 002 3.52 3.33 3.43 UPPER
CREDIT
_____________________________________ ____________________________
INSTITUTE DIRECTOR HEAD
OF DEPARTMENT
KWARA STATE
POLYTECHNIC, ILORIN
INSTITUTE OF BASIC AND APPLIED SCIENCE
DEPARTMENT
OF COMPUTER SCIENCE
INDIVIDUAL
RESULT RECORD
Student Matric-………………No
Student Name……………………
Course ………………………Course……………………………….
Course ……………………… Course…………………………………
Course …………………….. Course………………………………….
Course………………………. Course………………………………..
Course……………………… Course………………………………….
Date Entered……………………………………………………………
Date Last updated………………………………………………………..
Updated by…………………………………………………………………
Location Updated…………………………………………………….
4.1.3
FILE DESIGN
File
design is concerned with the type of file used in the design of the system. The
file organization, data structure and access mode. For the purpose of this
research a database was used. A Relational Database Management System (RDBMS)
was used to manage the database. Since in a relational database, record, are
stored in a table-like manner whereby each row of a table correspond to a
unique record, several tables are used to store most of the required data which
were input from the input device. Some of the tables are described below:
4.1.4
Procedure Design
The
procedure design refers to the various program segments makes up the system
Connect:
This module allows connection to be established between the client system and
the server for the purpose of data transmission.
Add
Dept: Allows for the addition of new department Add
Institute: Allows new institute record to be added
Add
Course: This module allows course to be added for a
particular level of a department.
View
Result: Allows students result to be viewed either for individual student or
all students collectively.
Registration:
Allows new students record to be added.
4.2
IMPLEMENTATION
This
section deals with the implementation of the programming aspect of the project
which includes some explanation. The program has been written to allow the use
of RESULT MONITORING PROGRAM DESIGN AND
NETWORK IMPLEMENTATION to controls and monitors students’ results and it
outfaced the manual method presently used.
The
system employs the interactive mode of processing which involve interaction
between the Client/Server system and the user. Implementation of the proposed
system will be very productive in a number of ways, it will facilitate easy
detection results malpractices in a very fast, improved and efficient way because
the new system will exploit the tremendous speed with which a CLIENT/SERVER
SYSTEM applications runs.
4.2.1
HARDWARE SUPPORT
This
refers to the physical underlying part of the system which form part of the
whole system and it is very important in the system. The minimum hardware
requirements for the system to work are listed below:
·
Pentium M system with around 3.0 GHZ
processor (for server
·
Minimum of 512MB OF RAM
·
V.G.A colour display monitor
·
Keyboard
·
Mouse
·
Uninterrupted power supply
·
An underlying LAN(Local Area Network)
·
Switches or hub to connect system
·
Network cables for Node-to-Node
connections
4.2.2
SOFTWARE SUPPORT
Software
part of a system refers to those instructions or set of programs given to the
computer system in order to carryout a well defined task. It is obvious that hardware
without software is an electronic idiot. Hence, the proposed system will
required the following software in order to function according to
specification.
·
OS- Operating system :Window XP/Vista
·
Web Browser: Microsoft internet
explorer, opera, Moxilla, Netscape.
·
Apache web server
·
Mysql for database connecting
information & managements
4.3
SYSTEM DOCUMENTATION
Documentation
is the process of writing down the activities the programmer/ analyst was
involved in from the beginning to the end during system development. It is
regarded as the end product of the program writing process with the aim of
aiding future review and maintenance of the system. It includes things like the
problem definition, flowchart, program listing, test data, simple output,
structure chart etc.
4.31
OPERATING THE SYSTEM
The
focus of this section will be on how the program can be operated by each user
even without human intervention. The following steps shall be taken to operate
the system:
1. Startup the server first
2.
From the clients machine open the web
browser either (Firefox, internet explorer or Netscape depending on anyone
used).
3.
Enter “Http://localhostlResult
Monitoring Program/index.vb in the address bar.
4. Press the enter or return key
5.
On the login display screen, input the
user’s ID and password in order to gain access to the system
6. If the user is authenticated that the main
page will be displayed which contains various hyperlinks to various categories
of the process of result monitoring and also a search facility whenever the
user deem it fit to leave the system, he can logout by selecting the logout
hyperlinks on the screen and thereafter click on the exit button on the
browser.
The
above steps only highlight how the system can be operated literarily.
4.3.2
SYSTEM MAINTENANCE
Adequate
and appropriate maintenance has to be carried out on the new system in order
for the system to operate according to specification. The following procedure
has to be adhering to in order to ensure proper maintenance of the system.
1.
Keeping the CPU in a cool environment
in order to prevent overheating of the processor.
2.
Shutting down properly always in order
to avoid corruption of the operating system
3.
Network cables should be packed neatly
and should not be handled roughly
4.
A dust cover should be used to cover
the system during closing hour when it will not be used.
5.
Backup should always be provided in
case of power failure.
All
other maintenance measures not enumerated here can be found in the
documentation which accompanies the system.
CHAPTER
FIVE
5.0
SUMMARY, RECOMMENDATION AND CONCLUSION
5.1
SUMMARY
This
research work; Result Monitoring Program- Design and Network
Implementation is a
Students Information System (SIS) that aims at monitoring students’ results
through networking the entire institution so that file, data and
other valuable
resources can be shared and adequately monitor the process of computation of
students’ results in the institution.
Any
result monitoring program must first start with available personnel becoming
result observers.
These
personnel must receive training related to result and result monitoring or
observation. The essential elements of the training curriculum provides the
observers with a basic understanding and working knowledge, result monitoring
techniques, standard field procedures and documentation formats. The training
prepares the result monitoring observers to be consistent in observations and
to be aware of and adjust to variable field conditions.
5.2
RECOMMENDATION
The
recommendation of any projects depends largely on the capability and
reliability of the project. The program is designed to be accommodated and used
by The Kwara State polytechnic, Ilorin
for the monitoring of students results.
This
research work has made me to understand how data is being transfer across the
network and how students’ results can be manage and monitor against malpractices.
5.3
CONCLUSION
Computerization
and Networking need proper feasibility and viability study in order to
accomplish the main aim and objective of this project work results monitoring
program design and network implementation
Finally,
the objective of this project work is to monitor the students’ result of the
institution and brings out the quality and appropriate output.
REFERENCES
Cain,
Mark. “Managing Technology: Being a Library of Record in a Digital Age”, Journal of Academic Librarianship
29:6(2003).
French,
D. M. (1997). A Comparison study of computer assisted instruction using
interactive software versus traditional instruction in a college pre-calculus
course. EED thesis, Temple
University.
Gershman,
J. & Sakamoto, E. (1981). Computer assisted remediation and evaluation: A
CAI project for Ontario
secondary school. Educational Technology.
Gertz,
Janet. “Selection for preservation in the Digital Age.” Library Resources &
Technical services.
Jenkins,
T. M. & Dankert, E. J. (1981). Result of a three month PLATO trail in terms
of ultilization and student attitudes. Educational Technology.
Kearsley,
G. (1977). The cost of CAI: A matter of assumption. AEDS Journal, 10(3):
100-110.
Kulik,
C. C. & Kulik, J. A. (1986). Effectiveness of computer based education in
colleges. AEDS Journal, 19: 81-108.
Levin,
H. (1986). Cost and cost effectiveness of computer assisted instruction. In:
Culbertson, J & Cunningham, L. (Eds.), 1986 Microcomputer and Education: 58th
Yerabook of the NSEE. Chicago, The University
of Chicago Press.
Moonen,
Jef C. M.. M..(1987). Computer aided learning A self destroying prophecy? In: Harrison, C. (Ed), Interactive learning and the new
technologies? Report of the educational research workshop held in Eindhoven (The
Netherlands).
Comments
Post a Comment