Sunteți pe pagina 1din 10

For more project topics and materials visit: http://www.classgist.

com
Enquiries: http://www.classgist.com/contactus.aspx

DESIGN AND IMPLEMENTATION OF NETWORK


MONITORING SYSTEM

TABLE OF CONTENT

Title page i

Approval Page ii

Table of content iii

Dedication iv

Acknowledgment v

Abstract vi

CHAPTER ONE

1.1 INTRODUCTION

1.2 BACKGROUND OF THE STUDY

1.3 STATEMENT OF THE PROBLEM

1.4 OBJECTIVE OF THE STUDY

1.5 SIGNIFICANCE OF THE STUDY

1.6 SCOPE OF THE STUDY

1.7 LIMITATIONS OF THE STUDY

1.8 DEFINITION OF TERMS


CHAPTER TWO

LITERATURE REVIEW

CHAPTER THREE

3.0 SYSTEM ANALYSIS AND DESIGN

3.1 INTRODUCTION

3.2. SYSTEM ANALYSIS

3.3. DETAILED DEFINITION OF THE PROBLEM

3.4 FEASIBILITY STUDY

3.5. METHOD OF DATA COLLECTION

3.5.1 INTERVIEWING

3.5.2 OBSERVATION

3.6. REVIEW OF PROCEDURAL MANUAL/EXISTING SYSTEM

3.7 DATA PREPARATION

3.7.1 USER PREPARATION

3.7.2 OBJECTIVE OF THE NEW DESIGN

3.8 PROGRAM STRUCTURE

3.8.1 MODULAR DESIGN

3.8.2 TOP DOWN PROGRAM DESIGN

3.9 SYSTEM FLOWCHART

3.9.1 PROGRAM FLOWCHART


For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

3.10 MAIN MENU SPECIFICATION

3.10.1 OUTPUT SPECIFICATION

3.10.2 INPUT SPECIFICATION

3.10.3 FILE DATABASE SPECIFICATION

3.11 OVERVIEW OF THE PROPOSED SYSTEM DESIGN

CHAPTER FOUR

SYSTEM DESIGN AND IMPLEMENTAION

4.1. INTRODUCTION

4.2 JUSTIFICATION OF THE PROGRAMMING LANGUAGE USED

4.3 SYSTEM CONTROL

4.4 SYSTEM REQUIREMENT

4.4.1 SOFTWARE REQUIREMENTS

4.4.2 HARDWARE REQUIREMENTS

4.5 PEOPLE

4.6 IMPLEMENTATION DETAILS

4.6.1 CODING

4.6.2 SYSTEM TESTING

4.6.3 TRAINING AND RE-TRAINING OF STAFF

4.6.4 FILE CONVERSION


4.6.5 SYSTEM CHANGEOVER

4.6.6 COMMISIONING

4.6.7 USER MANUALS

4.6.8 MAINTENANCE DETAILS

CHAPTER FIVE

5.0 SUMMARY, CONCLUSION AND RECOMMENDATION

5.1 SUMMARY

5.2. CONCLUSION

5.3 RECOMMENDATION

References

Appendixes
For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

CHAPTER ONE

1.1 INTRODUCTION

Network monitoring takes note of slow or failing

systems and notifies the network administrator of such

occurrences. Such notifications can take the form of email

massage, page alerts, or plain old phone calls. No matter what

form they take, network problem massage should take the

highest priority. Network monitoring should be running while

other systems are performing their functions that are vital. You

need to set aside at least one computer or set of computers to

monitor network activity (Edward, 1972).

1.2 BACKGROUND OF THE STUDY


The method for monitoring communication performance in

a communication network comprising computer systems

communicatively coupled to each other with communication

equipment in telecommunication, a digital switch which

typically contains millions of lines of software is a monolithic

unit supporting plain old telephone service. This digital switch

have overtime been stuffed with increasing


amounts of functionality such as management of routine

terminals and charging. In one embodiment, a computer

system of communication network measures and time-stamps

network performance satisfies and stores them in a memory

unit within the computer system.

1.3 STATEMENT OF THE PROBLEM

It is very typical in every industry that as its client base

continuous to grow, the industry faces increased number of

problems. In network monitoring aspect the problem may

include:

 Poor network strength


 Network hacking
 No signal when the network is down etc.

1.4 OBJECTIVE OF THE STUDY

The main objective of the research is to design and

implement a computer network monitoring system using

Federal Polytechnic Nekede Owerri network as a case study.


For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

This project also entails the reason and the maintenance of the

effectiveness of the system when compared with

any other way of monitoring network. Another objective is to

introduce computer in the area of monitoring network.

1.5 SIGNIFICANCE OF THE STUDY

Monitoring a network is very important in computer

network firm. It will help to know the status of network they

provide in a particular area and arise for rescue when the need

arises. The uses of network monitoring system also expose any

act of intruding from external body and even internal. And also

help to give report concerning the network if the industry is

moving forward, backward or stagnant in the area of providing

network for the client.

1.6 SCOPE OF THE STUDY

The aim of this research work is to design and implement

a network communication monitoring system.


It is purely limited to designing of computer network

monitoring system.

The scope helps focus on the area picked and make the

research effective.

1.7 LIMITATION OF THE STUDY

There were certain constraints encountered while the

research this project was being carried out. Listed below are

some of the prominent ones. They are:

Financial Constraints: Limited source of funds for the

researcher to embark upon grater level of research that has to

do with visiting different establishment that operate on

network communication monitoring system, traveling from one

school to another, library, vendors etc. to another to obtain

fact and collection of data.

Time: Time needed to travel outside the school environment to

other places (distance places in particular) in search for the

required data was limited; this also led to the choice of Federal

Polytechnic Owerri as a case study.

Nevertheless, as there were hindrances and limitations

arising from different quarters, the researcher was able to


For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx

gather all the necessary information required for the

completion of this project.

1.8 DEFINITION OF TERMS

NETWORK: - This is the collection of computers and devices

connected by communication channels that facilitate

communications among users and allow user to share

resources with other users.

MONITORING SYSTEM: - A set of device that observes and

records selected activities within a data processing system for

analysis or the set of function is required to initiate the

transmission of a token on the ring and provide soft- error

recovery in case of lost tokens, circulating frames or other

difficulties.

MODULE: - A programming or specifications construct that

defines a software component. Often a module is a unit of

software that provides users with some data types and

operation on those data types, and can be separately compiled.

The module has an interface in the data types and operations

the module provides its users. It is also a component of

hardware system that can be sub-divided.


SOFTWARE: - All or part of the program, procedure, rules, and

associated documentation of processing system. Software is an

intellectual creation that is independent of the medium on

which it is recorded.

HACKING: - The act of a computer enthusiast who uses his

or her knowledge and means to gain unauthorized access to

protect resources.

COMPUTER: - A device or system that is capable of carrying

out a sequence of operations in distinctly and explicitly defined

manner. The operations are frequently numerical computations

or data manipulations but also include input/output; the

operations with the sequence may depend on particular data

values. The definition of the sequence is called the program.

Also it may consist of several interconnected units.

S-ar putea să vă placă și