Powered by eProject Guide DESIGN AND IMPLEMENTATION OF NETWORK MONITORING SYSTEM | eProject Guide

DESIGN AND IMPLEMENTATION OF NETWORK MONITORING SYSTEM

Code: F2827262020  Price: 4,000   75 Pages     Chapter 1-5    6500 Views


CHAPTER ONE

INTRODUCTION

       Network monitoring takes note of slow or failing systems and notifies the network administrator of such occurrences. Such notifications can take the form of email massage, page alerts, or plain old phone calls. No matter what form they take, network problem massage should take the highest priority. Network monitoring should be running while other systems are performing their functions that is vital. You need to set aside at least one computer or set of computers to monitor network activity (Edward, 1972).

1.1                 BACKGROUND OF THE STUDY

The method for monitoring communication performance in a communication network comprising computer systems communicatively coupled to each other with communication equipment in telecommunication, a digital switch which typically contains millions of lines of software is a monolithic unit supporting plain old telephone service. This digital switch have overtime been stuffed with increasing

amounts of functionality such as management of routine terminals and charging. In one embodiment, a computer system of communication network measures and time-stamps network performance satisfies and stores them in a memory unit within the computer system.

1.2         STATEMENT OF THE PROBLEM

It is very typical in every industry that as its client base continuous to grow, the industry faces increased number of problems. In network monitoring aspect the problem may include:

·         Poor network strength

·         Network hacking

·         No signal when the network is down etc. 

1.3           OBJECTIVE OF THE STUDY

The main objective of the research is to design and implement a computer network monitoring system using Federal Polytechnic Nekede Owerri network as a case study. This project also entails the reason and the maintenance of the effectiveness of the system when compared with 

 any other way of monitoring network. Another objective is to introduce computer in the area of monitoring network.

1.4           SIGNIFICANCE  OF THE STUDY

Monitoring a network is very important in computer network firm . It will help to know the status of network they provide in a particular area and arise for rescue when the need arises. The uses of network monitoring system also expose any act of intruding from external body and even internal. And also help to give report concerning the network if the industry is moving forward, backward or stagnant in the area of providing network for the client.

1.5        SCOPE OF THE STUDY

The aim of this research work is to design and implement a network communication monitoring system.

            It is purely limited to designing of computer network monitoring system.

The scope helps focus on the area picked and make the research effective.

1.6      LIMITATION OF THE STUDY

There were certain constraints encountered while the research this project was being carried out. Listed below are some of the prominent ones. They are:

Financial Constraints:  Limited source of funds for  the  researcher to embark  upon grater level of research that has to do with visiting different  establishment that operate on network communication monitoring system, traveling from one school to  another, library, vendors etc. to another to obtain fact and collection of data.

Time: Time needed to travel outside the school environment to other places (distance places in particular) in search for the required data was limited; this also led to the choice of Federal Polytechnic Owerri as a case study.

            Nevertheless, as there were hindrances and limitations arising from different quarters, the researcher was able to gather all the necessary information required for the completion of this project.

1.7                   DEFINITION OF TERMS

NETWORK: -           This is the collection of computers and devices connected by communication channels that facilitate communications among users and allow user to share resources with other users.

MONITORING SYSTEM: - A set of device that observes and records selected activities within a data processing system for analysis or the set of function is required to initiate the transmission of a token on the ring and provide soft- error recovery in case of lost tokens, circulating frames or other difficulties.

MODULE: - A programming or specifications construct that defines a software component. Often a module is a unit of software that provides users with some data types and operation on those data types, and can be separately compiled. The module has an interface in the data types and operations the module provides its users. It is also a component of hardware system that can be sub-divided.

SOFTWARE: -         All or part of the program, procedure, rules, and associated documentation of processing system. Software is an intellectual creation that is independent of the medium on which it is recorded.

HACKING: - The act of a computer enthusiast who uses his or her knowledge and means to gain unauthorized access to protect    resources.

COMPUTER: -         A device or system that is capable of carrying out a sequence of operations in distinctly and explicitly defined manner. The operations are frequently numerical computations or data manipulations but also include input/output; the operations with the sequence may depend on particular data values. The definition of the sequence is called the program. Also it may consist of several interconnected units.


Terms of Use: This is an academic paper. Students should NOT copy our materials word to word, as we DO NOT encourage Plagiarism. Only use as a guide in developing your original research work. Thanks.

Disclaimer: All undertaking works, records, and reports posted on this website, eprojectguide.com are the property/copyright of their individual proprietors. They are for research reference/direction purposes and the works are publicly supported. Do not present another person’s work as your own to maintain a strategic distance from counterfeiting its results. Use it as a guide and not duplicate the work in exactly the same words (verbatim). eprojectguide.com is a vault of exploration works simply like academia.edu, researchgate.net, scribd.com, docsity.com, course hero, and numerous different stages where clients transfer works. The paid membership on eprojectguide.com is a method by which the site is kept up to help Open Education. In the event that you see your work posted here, and you need it to be eliminated/credited, it would be ideal if you call us on +2348064699975 or send us a mail along with the web address linked to the work, to eprojectguide@gmail.com. We will answer to and honor each solicitation. Kindly note notification it might take up to 24 – 48 hours to handle your solicitation.

Material Information
  • ₦4,000.00 1 Price:
  • 75 2 No. of Pages:
  • 5 3 No. of Chapters:
  • No 4 Has Implementation:
FOR ENQUIRIES WE ARE AVAILABLE 24/7

Contact us on

DEPARTMENT
LAW