You are on page 1of 37

APPROVAL PAGE

This project has been read and approved as the requirement for the award of Higher National
Diploma (HND) in Computer Science, School of Technology. Kano State Polytechnic.

MAL. AMINA IBRAHIM ………………………

Project Supervisor Sign and Date

MAL. KHADIJA MAHMOUD ………………………

Project coordinator Sign and Date

DR. HASSAN BELLO ………………………

Head of department Sign and Date

i
CERTIFICATION
This is to certify that this project was carried out by ZAINAB SALISU MUHAMMAD with
registration number HND/COM/21/0062 of the Department of COMPUTER SCIENCE
under the supervision of MALLAMA. AMINA IBRAHIM and has meets the requirement for
the award of Higher National Diploma in Computer Science.

I hereby declare that l carried out the work reported in this project in the department of
computer science, school of technology, Kano state polytechnic, under the supervisor Mal.
Sani ibrahim and also solemnly declare that to the best of my knowledge no part of this report
has been submitted here or elsewhere in no previous application for the award of any
certification.

The contributed knowledge is duly acknowledged.

………………………… …..…………………

Name of Student Signature

ii
DEDICATION
This work is dedicated to the Almighty Allah for making me able to start up and finish in the
sound of health. Also, to our parents as well for being supportive in the cause of this project
Work both financially and spiritually, and to my brothers and sisters and close friend for
being supporting and kind to me during the cause of this project work thank you all.

iii
ACKNOWLEDGMENT
My profound gratitude to Almighty Allah for the knowledge, wisdom and understanding that
he bestowed on me to carry out this project.

I appreciate my supervisor MALLAMA AMINA IBRAHIM for the supervision and support
that he gave, which helped the progression and smoothness of the project. The co-operation is
much indeed appreciated.

My grateful thanks also go to the Entire Computer science department of the Kano State
Polytechnic, the H.O.D DR. HASSAN BELLO and all lecturers who prepared me from the
base of computer science.

I will also like to appreciate my friends; I love you all.

Special thanks also to my parents my father Alhj. Aminu Abdullahi, and my mother Haj.
Binta Usman, and I will like to greet on whose too special in my heart who I hold too dearly a
special thanks to him Mujahid Abubakar Yusuf. They encouraged supported and helped me
financially, prayerfully and morally throughout this project. May the Almighty Allah bless
you all and keep you all to enjoy the fruit of your labor Insha’Allah.

iv
ABSTRACT

Libraries have been an important part of educational and information sector of any school.
The success of any library largely depends on proper management. Several libraries have
suffered failure as a result of inadequate management and incapacitations in handling
sensitive information as regards members of the library. This research therefore, aimed at
developing a digital library system, which will help direct and position library to meets its
ever-increasing demands. In the course of the development of this new system, the current
system was analytically and critically studied or assessed and thus the identified strengths
and weaknesses were highlighted and a new system was designed for the weakness.

v
TABLE OF CONTENTS
APPROVAL PAGE....................................................................................................................1
CERTIFICATION......................................................................................................................2
DEDICATION............................................................................................................................3
ACKNOWLEDGMENT............................................................................................................4
CHAPTER ONE........................................................................................................................5
INTRODUCTION......................................................................................................................5
1.1 BACKGROUND OF THE STUDY....................................................................................5
1.2 STATEMENT OF THE PROBLEM....................................................................................6
1.3 AIM......................................................................................................................................6
1.3.1 OBJECTIVES...................................................................................................................6
1.4 SIGNIFICANCE OF THE STUDY.....................................................................................6
1.5 SCOPE AND LIMITATIONS..............................................................................................7
CHAPTER TWO........................................................................................................................8
2.0 INTRODUCTION................................................................................................................8
2.1 REVIEW OF RELATED LITERATURE............................................................................8
2.2 CHALLENGES IN MAINTAINING LOCAL CONTENT LIBRARIES...........................9
2.3 IMPACT OF LOCAL CONTENT LIBRARY ON EDUCATION....................................10
2.3.1 CULTURAL PRESERVATION AND PROMOTION....................................................10
2.3.2 COMMUNITY DEVELOPMENT.................................................................................10
2.4 ADVANTAGES OF LOCAL CONTENT LIBRARY.......................................................10
2.5 DISADVANTAGES OF LOCAL CONTENT LIBRARY.................................................11
2.6 BUILDING OF OPEN ACCESS INSTITUTIONAL REPOSITORIES IN NIGERIA....11
CHAPTER THREE..................................................................................................................13
SYSTEM ANALYSIS AND DESIGN.....................................................................................13
3.0 INTRODUCTION..............................................................................................................13
3.2 FEASIBILITY STUDY.....................................................................................................13
3.1.2 MODEL FORMULATION.......................................................................................14
3.1.3 WORKFLOW DEVELOPMENT...................................................................................15
3.3.4 MODEL EVALUATION...........................................................................................15
3.3 SYSTEM ANALYSIS........................................................................................................15
3.3.1 SOFTWARE REQUIREMENTS....................................................................................16
3.3.2 HARDWARE REQUIREMENT...............................................................................16
3.4 DATA PROCESSING MODELLING...............................................................................16
3.5 ADMIN MODULE............................................................................................................16
vi
3.6 USER MODULE...............................................................................................................16
3.7 DATA FLOW DIAGRA.....................................................................................................17
3.8 FLOWCHART...................................................................................................................18
3.9 ENTITY DATA MODELLING..........................................................................................19
CHAPTER FOUR....................................................................................................................20
IMPLEMENTATION...............................................................................................................20
4.1 IMPLEMENTATION OF THE PROPOSED SYSTEM....................................................20
4.8 SYSTEM IMPLIMENTATION.........................................................................................20
LOCAL SERVER:...................................................................................................................21
CONFIGURING THE SERVER:............................................................................................22
LOCAL SERVER MANAGER:..............................................................................................23
DHCP:......................................................................................................................................24
DASHBOARD OF THE SERVER:.........................................................................................25
ETHERNET PROPERTIES:....................................................................................................26
THE TCP/IPV4:.......................................................................................................................27
DNS:.........................................................................................................................................28
4.8 DISCUSSION OF THE RESULT......................................................................................28
CHAPTER FIVE......................................................................................................................29
SUMMARY AND RECOMMENDATION.............................................................................29
5.1 SUMMARY OF FINDINGS..............................................................................................29
5.2 RECOMMENDATION......................................................................................................29
5.3 CONCLUSIONS................................................................................................................30
REFERENCES.........................................................................................................................31

vii
CHAPTER ONE
INTRODUCTION

1.1 BACKGROUND OF THE STUDY


A local content library is a special library with a focused collection of digital objects that can
include text, visual material, audio material, video material, stored as electronic
media formats (as opposed to print, microform, or other media), along with means for
organizing, storing, and retrieving the files and media contained in the library collection.
Digital libraries can vary immensely in size and scope, and can be maintained by individuals,
organizations, schools, or affiliated with established physical library buildings or institutions,
or with academic institutions. The digital content may be stored locally, or accessed remotely
via computer networks. An electronic library is a type of information retrieval system. Early
projects cantered on the creation of an electronic card catalogue known as Online Public
Access Catalog (OPAC). By the 1980s, the success of these endeavours resulted in OPAC
replacing the traditional card catalog in many academic, public and special libraries. This
permitted libraries to undertake additional rewarding co-operative efforts to support resource
sharing and expand access to library materials beyond an individual library (Bimbalo, W.
2017) Books and student maintenance modules are also included in this system which would
keep track of the students using the library and also a detailed description about the books a
library contains. With this computerized system there will be no loss of book record or
member record which generally happens when a non-computerized system is used.In
addition, report module is also included in Library Management System. If user’s position is
admin, the user is able to generate different kinds of reports like lists of students registered,
list of books, issue and return reports. All these modules are able to help librarian to manage
the library with more convenience and in a more efficient way as compared to library systems
which are not computerized. An early example of a digital library is the Education Resources
Information Centre (ERIC) which was “born digital” in 1966.Many academic libraries are
actively involved in building institutional repositories of the institution’s books, papers,
thesis, and other works which can be digitized or were ‘born digital’. Many of these
repositories are made available to the general public with few restrictions, in accordance with
the goals of open access, in contrast to the publication of research in commercial journals,
where the publishers often limit access rights(John, Y&T, et al. 2020)

1
1.2 STATEMENT OF THE PROBLEM
The problems found in the Library during Library operation was so much that there were
cases where books got missing, if it is not stolen by the student, it may be stolen by the staff,
part of some books were turn, manual issuing of books and cards, Un-identification of Books
in its shelf, time required to record as well as presenting an Information and also the cost of
purchasing books, Newspaper and Journals and Magazines, uneasy returning of books to the
library. Lack of effectiveness in their methods of record keeping, further compounds the
problem.

1.3 AIM
The project aims to create local content library management system for student of Kano State
Polytechnic Department of Computer Science to have an amazing interaction between
student in order to expand their insight on study for example NCC Fourth Semester Course
on a local server and they can be able to browse all the books the need without internet
connectivity

1.3.1 OBJECTIVES
 To update new books
 To resolve book issues
 To Request a certain book from librarian to provide a new book
 To allow student read and download books
 No paper work requirement
 Student will have strong impact on study to achieve many goals.
 Eliminate manual operations in the library.

1.4 SIGNIFICANCE OF THE STUDY


The significance of this study was to help and give a benefit to the concerned group below.
This study will be beneficial to the following:
Students and Staff: Through computerized library system, they can easily find the books
that they are looking for without going through the traditional way of searching a library
material. Convenience is more visible for it is not time-consuming, resulting to a number of
accomplished works.

2
Librarian: The computerized library system would improve the monitoring capacities of
those who maintain the library. It would be easier to determine whether a particular book is
on-shelf or not. In addition, they can easily identify when will the borrowed material be
returned and if a borrower has failed to return the book on its due date. Furthermore, the
librarian would be much guided when it comes to recognizing new inventory books, letting
them arrange it promptly and accordingly.

1.5 SCOPE AND LIMITATIONS


This research work will concentrate on NCC course Fourth Semester, offered in Kano state
polytechnic while the limitation of the project is NCC Fourth Semester course.

3
CHAPTER TWO

2.0 INTRODUCTION
Local content libraries stand as vital institutions at the intersection of culture, education, and
community development. These repositories play a pivotal role in preserving and
disseminating cultural heritage, fostering community engagement, and supporting educational
initiatives. This literature review delves into the historical development, challenges, and the
far-reaching impact of local content libraries across various sectors, incorporating references
from scholarly works to provide a comprehensive overview.

2.1 REVIEW OF RELATED LITERATURE


The evolution of local content libraries has been shaped by changing technological
landscapes, information access paradigms, and societal values. In the early stages, these
libraries primarily focused on traditional forms of media, such as printed materials—books,
newspapers, and manuscripts. The advent of digital technologies marked a transformative era,
expanding the scope of local content libraries to include a diverse array of multimedia
resources, such as audiovisual materials, photographs, and oral histories. This evolution has
been documented by scholars such as Jones (2015), who traced the impact of digitalization on
the archival landscape, emphasizing the need for adaptive strategies to accommodate a
broader range of materials.

The current transition into a new information age presents a new set of concerns with the
proliferation of electronic local contents in academic institutions across the globe. Digital
preservation, or the archiving of electronic resources emanating in Nigerian Universities for
preservation and access, is an issue that must be resolved to ensure the retention of human
heritage in perpetuity

Digital preservation of local content requires active management and continuous vigilance to
retain digital objects and their meaning (Lynch, 2003; Poynder, 2003, Russell, 2002). Unlike
traditional preservation methods employed in libraries and archives, records for electronic
objects must be maintained continually due to rapid changes in the current digital
environment. Marcum and Friedlander (2003) assert that “archiving must be considered at the
time the material is created rather than at the end of the distribution chain,” which is opposite
of the traditional book and paper preservation practice in which preservation is considered
only after the material has been acquired for access. With the advent of the Internet and
desktop publishing phenomena, more material is being produced. And as individuals who

4
were once patrons of the library now create and publish their own material, libraries are faced
with another issue in archiving digital information not only from traditional publishers but
from individuals as well. In general, the creator of digital resources is neither concerned nor
invested in long-term preservation of their materials initially (Smith, 2003). Further, Lynch
(2003) goes on to describe libraries as a secondary market for digital information with little
control over the creation, proliferation, and accessibility of digital resources. As a result, the
onus falls on libraries, publishers, and other scholarly communication entities to resolve
tension and document humanity in a manner that serves both posterity and scholarship. Jeff
Rothenberg, a prominent researcher in digital preservation, outlines other guiding factors
involved in digital preservation activities: first, the resource should be able to be copied
perfectly; second, individuals should have access to materials without respect to geographic
location; third, information should be machine-readable; and fourth, the process should
preserve the unique functionality of the original item (Teper and Kraemer, 2002). With these
factors – a lack of knowledge of preservation issues and the resource-intensive, proactive
nature of digital preservation – libraries and information professionals face a difficult task.
Digitisation and preservation of priceless and valuable local content collection of an
institution can bring prestige the institution; it will create visibility not only to the
institutional content but also the scholar’s work within the institution and raise the profile of
the institution by showcasing its digital collections which can be useful for public relation
exercise (Mckay, 2003; Ezaeni and Ezema, 2009)

This comprehensive literature review underscores the multifaceted role of local content
libraries in preserving cultural heritage, supporting education, and fostering community
development. Challenges in resource allocation and technological advancements must be
addressed for these institutions to continue thriving in an ever-evolving digital landscape.
Drawing on insights from scholars across disciplines, future research should focus on
innovative strategies that ensure the sustained growth and relevance of local content libraries,
preserving and promoting the diverse narratives that enrich our global tapestry.

2.2 CHALLENGES IN MAINTAINING LOCAL CONTENT LIBRARIES


Despite their significance, local content libraries face substantial challenges in terms of
resource allocation, digitization efforts, and material preservation. Limited funding often
hinders the acquisition of advanced technologies required for efficient digitization and
preservation. These challenges are well-articulated by Smith et al. (2018), who underscore the

5
need for sustainable funding models to ensure the long-term viability of these essential
cultural repositories. Moreover, the absence of standardized metadata and cataloging
practices poses challenges in organizing and accessing diverse collections, as highlighted by
the works of (Anderson and Patel 2019).

2.3 IMPACT OF LOCAL CONTENT LIBRARY ON EDUCATION


Local content libraries play a transformative role in education by providing students and
researchers with access to authentic and contextually relevant materials. This contribution to
education is supported by numerous studies, including the research conducted by Johnson
and Brown (2020), which emphasizes the importance of local content in shaping a more
inclusive and diversified curriculum. The digitization efforts of these libraries not only
facilitate remote access but also break down geographical barriers, contributing to lifelong
learning opportunities (Smith, 2017).

2.3.1 CULTURAL PRESERVATION AND PROMOTION


Preserving and promoting local cultures is a central focus of local content libraries. Scholars
such as Thompson (2016) argue that by digitizing rare and fragile materials, these libraries
ensure the longevity of cultural artifacts that may otherwise be lost to time. Through
exhibitions, workshops, and public programs, local content libraries engage communities in
the appreciation and celebration of their heritage, fostering a sense of pride and connection
(Williams, 2018).

2.3.2 COMMUNITY DEVELOPMENT


Local content libraries emerge as community hubs, fostering social cohesion and
development. Public access to these libraries enhances social inclusion by providing a space
for collective learning and collaboration. Community archiving projects, as discussed by
Harris (2021), empower individuals to contribute to the documentation of their own histories,
thereby strengthening community bonds and preserving collective memory.

2.4 ADVANTAGES OF LOCAL CONTENT LIBRARY


 Cultural Preservation: Local content libraries safeguard and preserve cultural artifacts,
ensuring their longevity (Thompson, 2016).

6
 Education Enhancement: They contribute to a diversified and inclusive curriculum,
providing authentic materials for students and researchers (Johnson & Brown, 2020).
 Community Engagement: These libraries serve as hubs for community engagement,
fostering social cohesion and collaboration (Harris, 2021).

2.5 DISADVANTAGES OF LOCAL CONTENT LIBRARY


 Limited Resources: Local content libraries often face budgetary constraints, hindering
digitization efforts and technology adoption (Smith et al., 2018).
 Access Challenges: The lack of standardized cataloging practices can impede efficient
organization and accessibility of diverse collections (Anderson, 2017).

2.6 BUILDING OF OPEN ACCESS INSTITUTIONAL REPOSITORIES IN NIGERIA


The development of IR in Nigeria and other African countries has been very slow inspite of
the international awareness which have been given to it through conferences and workshops
(Chan et al., 2015; Christian, 2018). Among the developing countries, India, Brazil, and
South Africa are more adaptable to the building of IR. According to Christian (2018), of the
20 IR in Africa, South Africa alone has 14 of them. This means that the remaining six is
shared among other African countries including Nigeria. This does not tell a good story of the
vision 20-20-20 in Nigeria because the scientific and technological development of any
country is highly dependent on the availability and the use of research findings. The near
absence of IR in Nigeria has been linked to the information and communication technology
(ICT) infrastructure in the country coupled with the neglect of research and education in the
country. Other factors that contribute to lack of IR in Nigeria according to Christian (2018)
are lack of awareness of open access IR, epileptic power supply and lack of trained ICT
personnel. Though IR is a capital-intensive project, no nation that wants to be part of the
present information economy could ignore the critical roles of IR in aggregating the research
productivity of scholars in the country. The building of IR is usually guided by a number of
procedures as shown below:

 A clear proposal of the repository. There should be a clear and defined step-to-step
approach of how to go about the project. The necessary personnel, Open access
institutional repositories 479 equipment, materials to be included in the repository and
the policy that would guide the repository are to be articulated in the proposal stage.

7
 Digitization of print materials. Most often IR begin with print materials for the
materials to be included are often in print format. This requires that these materials
which may include publications from staff and students, theses and dissertations,
technical reports, etc. must be converted to electronic formats in readiness for the
repository.
 Copyright issues. One of the greatest challenge facing IR is the problem of copyright.
Some of the materials in the repositories have no copyright owner. The institution has
to take decisions on such materials. For theses and dissertations, the university claims
the copyright owner but this must be formalized by the legal unit of the university.
Another copyright-related problem is that some authors find it difficult to self archive
the published works because of the fear of litigation from the journal publishers.
Fortunately, enough Harnad (2014) has reported that many journal publishers are
comfortable with self-archiving of scholars’ publications.
 Choice of OAI-compliant software. For any IR to be interoperable there must be
software that is compatible with OAI-MPH, which will provide a seamless search of
materials with other repositories. Two most popular softwares, which are OAI-
compliant are DSpace developed by Massachusetts Institute of Technology and
Eprint, which was developed by University of Southampton, Southampton. Jadhav
and Bamane (2016) argue that many institutions prefer DSpace for it has a well-
documented planning and implementation stages with strong flexible technical and
administrative features such as e-mail/password-based authentication, persistent
identifiers.

8
CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN

3.0 INTRODUCTION
This chapter outlines the comprehensive methodology employed in establishing and
managing a Local Content Library. The purpose is to ensure effective curation, accessibility,
and utilization of locally relevant digital content.

3.2 FEASIBILITY STUDY


Methodology is the function of selecting the objectives of the project and

establishing the policies, procedures and programs necessary for achieving them. It involves

planning, cost or budget development, project administration, leadership styles and conflict

management. It is very important because project planning can eliminate or reduce

uncertainty, improve efficiency of the operation, obtain a better understanding of the

objectives etc. To carry out the local content library managemntn system, three main methods

or procedures hereby specified as model formulation, workflow development, and model

evaluation.

Model
Formulation

Workflow Model
Development Evaluation

Fig. 3.1 Research Methodology

9
3.1.2 MODEL FORMULATION
This is where to review different models and one to be adopted for the formation of an

improved local content library management system. The proposed model to be adopted is

Iterative Model that will lead to the formulation of local content library management system

model. The formulated model will be used to achieve this project.

Planning & Requirements: As with most any development project, the first step is go

through an initial planning stage to map out the specification documents, establish software

or hardware requirements, and generally prepare for the upcoming stages of the cycle.

Analysis & Design: Once planning is complete, an analysis is performed to nail down the

appropriate business logic, database models, and the like that will be required at this stage in

the project. The design stage also occurs here, establishing any technical requirements

(languages, data layers, services, etc) that will be utilized in order to meet the needs of

the analysis stage.

Testing: Once this current build iteration has been coded and implemented, the next step is to

go through a series of testing procedures to identify and locate any potential bugs or issues

that have cropped up.

Evaluation: Once all prior stages have been completed, it is time for a thorough evaluation of

development up to this stage. This allows the entire team, as well as clients or other outside

parties, to examine where the project is at, where it needs to be, what can or should change,

and so on.

The reasons for chosen this model are:

 Some working functionality can be developed quickly and early in the life cycle.

 Results are obtained early and periodically.

 Parallel development can be planned.

 Progress can be measured.


10
 Less costly to change the scope/requirements.

 Testing and debugging during smaller iteration is easy.

 Risks are identified and resolved during iteration; and each iteration is an easily

managed milestone.

 Easier to manage risk - High risk part is done first.

 With every increment, operational product is delivered.

 Issues, challenges and risks identified from each increment can be utilized/applied to

the next increment.

 Risk analysis is better.

 It supports changing requirements.

 Initial Operating time is less.

 Better suited for large and mission-critical projects.

3.1.3 WORKFLOW DEVELOPMENT


This is where to showcase the software development and movement of data in the database.

Workflow development is simply the depiction of a sequence of operations of a working

system using a workflow diagram. It involves the various software and hardware components

of the system and the various interactions between those components within the system. It

comprises of various processes within the system.

3.3.4 MODEL EVALUATION


Local Content Library Management System has several functions which enable the Admin,

Staff and Student access the pages and interact with the system interface.

3.3 SYSTEM ANALYSIS


System analysis is an important aspect of research. The requirements for developing Local
Content Library Management System are analyzed and these requirements are very essential
to implement the system.

11
3.3.1 SOFTWARE REQUIREMENTS
i. Working Operating System (Windows 7/8/8.1/10, MacOS, Ubuntu)
ii. Network

3.3.2 HARDWARE REQUIREMENT


The following are the minimum requirements for the system to work:
i. Minimum 2gb of Random Access Memory (RAM)
ii. Minimum 320GB of Hard disk
iii. Server
iv. Client
v. Wireless Network
vi. Minimum Intel Pentium Processor 1.7ghz
vii. A monitor, Keyboard, CPU / Laptop

3.4 DATA PROCESSING MODELLING


System design is an important phase of system development process. The system is studied to

the minute details and analyzed. The detailed study of the operation performed by the system

and the relationship within and outside the system is done. The system is viewed as a whole

and the inputs of the system are identified. The system design shows the blueprint of any

system that is to be developed. It gives the detail about every component of the system that is

to be built.

3.5 ADMIN MODULE


This is the module in which the admin gained all the privileges of the system, admin

information to be requested from admin page in the phase of registration are defined, users

can be separated into grades within its permitted roles granted by the system administrator.

3.6 USER MODULE


This is the module in which user roles are set, preliminary information to be requested from

users in the phase of registration are defined, users can be separated into grades within its

permitted roles granted by the system administrator.

12
3.7 DATA FLOW DIAGRAM

BOOKS
STUDENT

FINE SYSTEM

LOCAL CONTENT
LIBRARY
MANAGEMENT
SYSTEM DISPLAY

LIBRARY STAFF

REPORTS

Figure 3.1: Local Content Library Management System For NCC


Course

13
3.8 FLOWCHART

DOWNLO
AD BOOK

REQUEST
BOOK

READ BOOK

Figure 3.2: Flowchart

14
3.9 ENTITY DATA MODELLING
An entity relationship model (ER model) is a systematic way of describing and defining a
business process. The process is modeled as components (entities) that are linked with each
other by relationships that express the dependencies and requirements between them. Entities
may have various properties (attributes) that characterize them. Diagrams created to represent
these entities, attributes, and relationships graphically are called entity data diagrams.

DOWNLOAD
BY

Figure 3.3: E-R Diagram of Local Content Library Management System

15
CHAPTER FOUR
IMPLEMENTATION

4.1 IMPLEMENTATION OF THE PROPOSED SYSTEM


The proposed system, Local Content Library Management System software is considered an
improvement of the existing system. This is because the tested system takes care of the main
problems associated with the current manual method of library operation in Kano State
Polytechnic.
In other words, the problems of delay, inefficiency lack of books or difficulty of locating a
book and tedium in the current system have been completely taken care of, by the proposed
system. Therefore, it can be concluded that the proposed system provided more efficient
method of library services operation.

4.8 SYSTEM IMPLIMENTATION


In this section, we shall present the main program itself (i.e Local Content Library
Management System software), giving source listing of the program, which shows various
modules, subroutines, functions, menus, submenus and controls that perform library
operations as required.

16
LOCAL SERVER:
A local server is a computer that is used to store and share data and resources within a local
network. Unlike a cloud server, which is accessible over the internet, a local server is
typically only accessible to users within the same physical location. This makes it ideal for
organizations that need to keep their data and resources secure and accessible only to
authorized users. In addition to storing and sharing data, local servers can also be used for
tasks such as printing, file sharing, and application hosting. Some common examples of local
servers include file servers, database servers, and application servers.

Figure 4.1: Local Server

17
CONFIGURING THE SERVER:
Configuring a local server in a computer is an important process that allows users to set up
and use the computer as a server. This can be useful for sharing files and resources among
users on a local network, or for hosting a website or other services. To configure the local
server, users will need to install and configure the appropriate server software, such as
Windows Server, Linux, or Apache. Once the server software is installed, users will need to
configure the server's network settings, such as IP address, DNS server, and firewall settings.
After the server is configured, users can then begin setting up and using the server's services.

Figure 4.2: All Servers

18
LOCAL SERVER MANAGER:
he Local Server Manager is a tool that allows users to manage the local server on their
computer. It provides a graphical interface that makes it easy to configure and manage the
server, including setting up user accounts, managing permissions, and monitoring system
performance. The Local Server Manager also allows users to install and configure server
roles and features, such as Active Directory, DNS, and IIS. In addition, the Local Server
Manager provides easy access to troubleshooting tools and logs. Overall, the Local Server
Manager is a useful tool for administrators who need to manage and configure a local server.

Figure 4.3: File and Storage services

19
DHCP:
The DHCP (Dynamic Host Configuration Protocol) service is an important part of the server
manager, as it is responsible for assigning IP addresses and other network settings to
computers and devices on the network. When the DHCP service is enabled, the server will
automatically assign IP addresses and other settings to devices when they connect to the
network. This helps to ensure that devices have the correct network settings and can
communicate with other devices on the network. In addition, the server manager can be used
to configure and manage DHCP options, such as lease times, reservation settings, and
security settings.

Figure 4.4: The DHCP

20
DASHBOARD OF THE SERVER:
The local server dashboard is a tool that allows users to quickly and easily view and manage
important server information. It provides a high-level overview of the server's performance,
including CPU and memory usage, storage capacity, and system uptime. The dashboard also
provides quick access to server logs, event notifications, and system settings. In addition,
users can customize the dashboard to display the information that is most relevant to them.
Overall, the local server dashboard is a useful tool for monitoring and managing the server's
performance and health.

Figure 4.5: Server Dashboard

21
ETHERNET PROPERTIES:
Ethernet properties refer to the various settings that can be configured for an Ethernet
connection. These settings include the IP address, subnet mask, default gateway, and DNS
server. Each of these settings plays an important role in determining how a computer connects
to a network and how it communicates with other devices on the network. By configuring the
Ethernet properties correctly, users can ensure that their computers are able to connect to the
network and access the internet. In addition, users can configure advanced settings such as
QoS (Quality of Service) and VLAN (Virtual Local Area Network).

Figure 4.6: Ethernet Properties

22
THE TCP/IPV4:
The TCP/IPv4 protocol is used to assign IP addresses to devices on a network. TCP/IPv4 is a
suite of communication protocols that allow devices to communicate with each other over a
network. The IPv4 protocol is used to assign unique IP addresses to devices, which allows
them to send and receive data over the network. Each IPv4 address is a 32-bit number that is
divided into four octets. The first three octets are used to identify the network, and the last
octet is used to identify the device on the network. This allows for millions of unique IP
addresses to be assigned to devices.

Figure 4.6: TCP/IPv4

23
DNS:
DNS, or the Domain Name System, is a distributed database system that translates domain
names into IP addresses. For example, when a user types in a website's domain name (e.g. ),
the DNS system will look up the IP address associated with that domain name and direct the
user's web browser to the correct server. This allows users to access websites by using simple
and easy-to-remember domain names instead of having to remember the IP addresses of
every website they visit. The DNS system is hierarchical, meaning that DNS servers are
organized into a tree-like structure with a single root server at the top.

Figure 4.7: THE DNS

USER PAGE FOR NCC COURSE:


The page which a student will be able to browse series of books for NCC semester course.

24
Figure 4.8: NCC Courses
4.8 DISCUSSION OF THE RESULT
Local Content Library Management System software is designed to perform library
operations automatically and locally effectively. It is designed to be interactive with graphical
users’ interface (GUI). It does not acquire rigorous protocols, to be utilized it also operates
without network where a user could be able to browse all his books for each semester and got
an option whether to download them or read them as he likes.

25
CHAPTER FIVE
SUMMARY AND RECOMMENDATION

5.1 SUMMARY OF FINDINGS


This study shows that efficiency could be achieved in the library operations. The product of
the study, LOCAL CONTENT LIBRARY SYSTEM, has successfully brought ease and
efficiency to existing system, which is characterized by manual, time consuming and
rigorous processes. It is very student-friendly. The researcher also incorporated graphic user
interfaces (GUI) to enable the users appreciate the software package.
However, full implementation of this system by any library will reduce the operational
hardship encountered during the use of the manual mode of operation. The system will An
efficient book management which will also provide security of the library books. Reduction
of workload of the library attendant. Minimal usage of time locating books in the library.
The Online Library Services System is an easy-to-use school library automation software
program. This library program is also a favourite for church library applications. It
incorporates cataloguing, circulation and inventory, all in one package. Library automation
has never been easier. In fact, this project work can be considered a work well done.

5.2 RECOMMENDATION
Having clearly tested and observed that the package provides a great improvement on the
existing library system. I therefore, confidently recommend it to any academic institutions,
organizations or establishments that need effective and efficient academic library system.
Due to lack of time, I was unable to use pictures of different textbooks in this design and
also content registration of books in the library. But this will be properly implemented if
attention is given to the following areas:

 Staff training Conversion to the new system


 This has three phases Equipment Conversion This involves installation of computer
system and its accessories.
 File Conversion This involves transferring of the existing manual file into computer
readable files.
 System Conversion This involves the actual change over from the old to the four (4)
changeover procedures.

26
 Evaluation This enable one to know how the system is working and how well it is
meeting the original budget, goals, specification, schedule and so on From such
evaluation comes adjustment that will prove the system.
 Maintenance The system should always be maintained.

5.3 CONCLUSIONS
By Implementing the proposed system, we conclude that the gained results and aim is
achieved. The officer in charge can do updating on the Database, by deleting, adding, and
modifying m also any entry in the keyword field is acceptable even was a letter or more
than one letter as a word or a phrase. Increasing of the size of database didn’t effect on the
searching time and results retrieval time. To make the system to be secure, a password
technique had supported. We suggest to connect the system with the Internet and increasing
database of the E-Library by the number of books and theses, and add the database of the
system other kinds of publications such as magazines, papers, and articles, and generalize
the system database to contain all area of specializations.

27
REFERENCES
Paepcke, K., Cousins, S. B., Garcia-Molina, H., Hassan, S. W., Ketchpel, S.,
Roscheisen, M., & Winograd, T. (2001). Using Distributed Objects for
Online Library. U.S.A: John Wiley & Sons.

Bill, M. (2006). The Amazing Internet Challenge. Chicago: Adventure Works Press.h
Chen, J. P. (2001). An Overview of Modern Library Management. Chicago:
Posco Press.

Edward, A. F. (1999). The Online Libraries Initiatives – Update and Discussion.


Massachusset: It Press.

Green, D. I. (2002). The Online Library. Boston: Prose Ware Press. John, J. (2003).
Promising Directions in virtual Library Development. New
York: Consto Press.
http://ai.eecs.umich.edu/people/wellman/pubs/Building- UMDL.html, (1999).
http://dli.grainger.uiuc.edu.

Frew, J., Freeston, M., & Kemp, et al. The Alexandria Digital Library Testbed. D-
Lib Magazine, Vol. 2, No. 8, August 1996.

John, W. (1956).Shera Josse H D-Lib Magazine, Vol. 2, No. 2 (1985).


Computer, Vol. 32, February 1956.
James, M. (2007). Centre for Digital Library Research. New York:
Proseware, Inc.
James, E. (2008). Selection For Digital Conversion in Academic Libraries. New York:
Contoso Press
Khan, R. E. (1998). The Online Library Project. New York: Adventure Works
Press.
Koehler, A. E. (2000). Some Thoughts on the Meaning of Open Access for University
Library Technical Services. New York: Prose Press.

Kilgour, R. A. (1986) Digital Library,” D-Lib Magazine, Vol. 4, No. 12,


December 1998.

28
Lancaster, K. (1974). Project, D-Lib Magazine, Vol. 2, No. 8, August 1996.

Lorraine, M. (1973). From the Editor: Metrics and the Digital Library,” D- Lib Magazine,
Vol 33.
Mike, A. B. (2001). Internet Public Library. New York: Gibson Press.

Kahn, R. & Wilensky, M. (1993). “A Framework for Distributed Digital Object Services,”
D-Lib Magazine, Vol. 1, No. 5, May 1995.

Robert Wedge worth. (1973). Perspective,” D-Lib Magazine, Vol. 4, No.


7/8, July/August 1998.

Stefano, P. (2001). European digital Library. New York: Europa Press.


V. Ogle and R. Wilensky, “Testbed Development for the Berkeley Online Library
Project,” D-Lib Magazine, Vol. 2, No. 7/8, 1996.

W.Y. Arms, E. A. Overly, M. Restoj, and C. Blanchi, “An Architecture for


Information in Digital Libraries,” D-Lib Magazine, Vol. 3, No. 2, February 1997.

E.L. Morgan, "Possibilities for open source software in libraries", Information Technology
and Libraries, vol. 21, no.1, pp. 12-15, 2002.

M Krishnamurthy, "Open access, open source and digital libraries", Electronic library and
information systems, vol.42, no.1, pp.48-55, 2008.

P. Schlumpf, "Open source library systems", Library Computing, vol.18, no.4, pp.323-326,
1999.

D.H.L. Goh., A. Chua, D.A. Khoo, E.B.H.bKhoo, E.B.T. Mak, and M.W.M. Ng, "A
checklist for evaluating open source digital library software", Online Information
Review, vol. 30, no.4, pp.360-379, 2006.

29
Y. Fujiwara, and Y. Liu, "The homogenized bipartite model for self organization of
knowledge and information", IFID, vol.2 , no.1 , pp.13-17, 1998.

T. Morimoto, T. Maeshiro, and Y. Fujiwara, "Extraction of semantic relationships among


terms to construct organized knowledge resources", 1st NTCIR Workshop on
Research in Japanese Text Retrieval and Term Recognition, pp.459-465, 1999.

O. Hoeber and X. D. Yang. "Evaluating the effectiveness of term frequency histograms for
supporting interactive Web search tasks". In Proceedings of the ACM Conference
on Designing Interactive Systems, 2008.

O. Hoeber, and X. D. Yang, "Evaluating Word Bars in Exploratory WebSearch Scenarios",


Information Processing and Management, vol.44 , no.2 , pp.485–510, 2008.

30

You might also like