DESIGN AND IMPLEMENTATION OF NETWORK MONITORING SYSTEM

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0646
  • Access Fee: ₦5,000 ($14)
  • Pages: 54 Pages
  • Format: Microsoft Word
  • Views: 1.3K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

CHAPTER ONE

INTRODUCTION

       Network monitoring takes note of slow or failing systems and notifies the network administrator of such occurrences. Such notifications can take the form of email massage, page alerts, or plain old phone calls. No matter what form they take, network problem massage should take the highest priority. Network monitoring should be running while other systems are performing their functions that is vital. You need to set aside at least one computer or set of computers to monitor network activity (Edward, 1972).

1.1                 BACKGROUND OF THE STUDY

The method for monitoring communication performance in a communication network comprising computer systems communicatively coupled to each other with communication equipment in telecommunication, a digital switch which typically contains millions of lines of software is a monolithic unit supporting plain old telephone service. This digital switch have overtime been stuffed with increasing

amounts of functionality such as management of routine terminals and charging. In one embodiment, a computer system of communication network measures and time-stamps network performance satisfies and stores them in a memory unit within the computer system.

1.2         STATEMENT OF THE PROBLEM

It is very typical in every industry that as its client base continuous to grow, the industry faces increased number of problems. In network monitoring aspect the problem may include:

·         Poor network strength

·         Network hacking

·         No signal when the network is down etc. 

1.3           OBJECTIVE OF THE STUDY

The main objective of the research is to design and implement a computer network monitoring system using Federal Polytechnic Nekede Owerri network as a case study. This project also entails the reason and the maintenance of the effectiveness of the system when compared with 

 any other way of monitoring network. Another objective is to introduce computer in the area of monitoring network.

1.4           SIGNIFICANCE  OF THE STUDY

Monitoring a network is very important in computer network firm . It will help to know the status of network they provide in a particular area and arise for rescue when the need arises. The uses of network monitoring system also expose any act of intruding from external body and even internal. And also help to give report concerning the network if the industry is moving forward, backward or stagnant in the area of providing network for the client.

1.5        SCOPE OF THE STUDY

The aim of this research work is to design and implement a network communication monitoring system.

            It is purely limited to designing of computer network monitoring system.

The scope helps focus on the area picked and make the research effective.

1.6      LIMITATION OF THE STUDY

There were certain constraints encountered while the research this project was being carried out. Listed below are some of the prominent ones. They are:

Financial Constraints:  Limited source of funds for  the  researcher to embark  upon grater level of research that has to do with visiting different  establishment that operate on network communication monitoring system, traveling from one school to  another, library, vendors etc. to another to obtain fact and collection of data.

Time: Time needed to travel outside the school environment to other places (distance places in particular) in search for the required data was limited; this also led to the choice of Federal Polytechnic Owerri as a case study.

            Nevertheless, as there were hindrances and limitations arising from different quarters, the researcher was able to gather all the necessary information required for the completion of this project.

1.7                   DEFINITION OF TERMS

NETWORK: -           This is the collection of computers and devices connected by communication channels that facilitate communications among users and allow user to share resources with other users.

MONITORING SYSTEM: - A set of device that observes and records selected activities within a data processing system for analysis or the set of function is required to initiate the transmission of a token on the ring and provide soft- error recovery in case of lost tokens, circulating frames or other difficulties.

MODULE: - A programming or specifications construct that defines a software component. Often a module is a unit of software that provides users with some data types and operation on those data types, and can be separately compiled. The module has an interface in the data types and operations the module provides its users. It is also a component of hardware system that can be sub-divided.

SOFTWARE: -         All or part of the program, procedure, rules, and associated documentation of processing system. Software is an intellectual creation that is independent of the medium on which it is recorded.

HACKING: - The act of a computer enthusiast who uses his or her knowledge and means to gain unauthorized access to protect    resources.

COMPUTER: -         A device or system that is capable of carrying out a sequence of operations in distinctly and explicitly defined manner. The operations are frequently numerical computations or data manipulations but also include input/output; the operations with the sequence may depend on particular data values. The definition of the sequence is called the program. Also it may consist of several interconnected units.

DESIGN AND IMPLEMENTATION OF NETWORK MONITORING SYSTEM
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0646
  • Access Fee: ₦5,000 ($14)
  • Pages: 54 Pages
  • Format: Microsoft Word
  • Views: 1.3K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU0646
    Fee ₦5,000 ($14)
    No of Pages 54 Pages
    Format Microsoft Word

    Related Works

    DESIGN AND IMPLEMENTATION OF NETWORK ACTIVITY MONITORING SYSYTEM. (A CASE STUDY OF ANAMBRA STATE FEDRAL INLAND REVENUE SERVICES, F.I.R.S) CHAPTER ONE INTRODUCTION Attacks on computer by outside intruder are more publicized but the ones perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to... Continue Reading
    CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
    CHAPTER ONE INTRODUCTION Attacks on computer by outside intruder are more publicized but the ones perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to computer security because they understand their organization’s business and how their computer systems work. They have both the... Continue Reading
    ABSTRACT This project topic “Simulation of a Network Monitoring System” was carried out with a view to deploying effective monitoring for computers in a local Area Network. The project developed a system that lets administrators remotely monitor computers in a network. Our aim is to show how user interface can be applied to provide a complete... Continue Reading
    ABSTRACT This project topic “Simulation of a Network Monitoring System” was carried out with a view to deploying effective monitoring for computers in a local Area Network. The project developed a system that lets administrators remotely monitor computers in a network. Our aim is to show how user interface can be applied to provide a complete... Continue Reading
    Introduction In a world like ours today there is every need to manage funds in every activity being carried out. It is the concern of every firm to control its finances to ensure that unnecessary expenses are avoided. Financial management in a company has proved to be a great task involving the monitor of almost all departments of the company. As... Continue Reading
    The existence of fake product can directly harm a company's growth as well as consumers. Various organizations have been using many initiatives and modern technology to prevent counterfeit goods. But the company that manufactures a real product have introduced many modern technologies such as barcode and QR code. Fake item producers can go to the... Continue Reading
    (CASE STUDY OF FEDERAL MINISTRY OF FINANCE) ABSTRACT Federal Ministry of Finance has always monitoring how economic growth is moving in this Nation. After the granting of internal autonomy to regions in 1946, there have been subsequent fiscal commission, military decrees... Continue Reading
    DESIGN AND IMPLEMENTATION OF STUDENT ATTENDANCE MONITORING SYSTEM USING FINGERPRINT CHAPTER ONE INTRODUCTION 1.1   Background of the Study Attendance management of students in institution can be rigorous using the conventional method of paper sheets and old file system method. Every academic institution poses some standards concerning how... Continue Reading
    DESIGN AND IMPLEMENTATION OF A COMPUTER BASED STOCK MONITORING SYSTEM (A CASE STUDY OF NIGERIA STOCK EXCHANGE ABUJA) ABSTRACT The purpose of this research work was to curb the inflationary possibilities of our economy, finance on recurrent budget deficit and improve the balance of payment position of the country. The design was base on developing... Continue Reading
    Call Us
    whatsappWhatsApp Us