• Use Of Network Activity Monitoring System To Solve Problems Case Study Of Benue Internal Revenue Service

  • CHAPTER THREE -- [Total Page(s) 3]

    Page 3 of 3

    Previous   1 2 3
    • 3.5.2    Feasibility Study
      At this phase, investigations were thoroughly made in order to develop the new system in sufficient depth. This is done to enable the proposed system to provide information that can satisfy its implementation. Thus, deciding if the new system is feasible within the present budget.
      The method used in data collection during the course of finding the feasibility of the new system includes
      Oral interview
      This was done when we visited the bursary department, which gave us an insight of how they carry out their operation with the system they already had, which led to the identification of problems listed above, and the zeal in finding lasting solutions to the identified problems.
      Review of document
      We tried as much as we could to lay our hands on documents and journals that relates to our work at large and seeing the ideas of other people.
      Website Research
      This provides us with a wide range of information relating to network monitoring system and network activity monitoring system.
      Library research
      It was quite helpful though little information was gotten from there.
      3.5.3    Investigation and Analysis
      The user’s requirement was analysed with the description on a document which stated the functions, procedures and capabilities of the present system and that of the proposed network activity monitoring system.
      To design this system, two specifications were made. The specifications involve an architectural design and a detailed design process.
      During the architectural design process, the proposed system was broken down into different modules. Then each of these modules in turns is designed which resulted in the detailed design. The two design documents describe the basic processes on how network activity monitoring system performs its operation. In addition to the architecture, it was built to be platform independent to enable it to run in any operating system.
      3.5.4    Object Oriented Analysis and Design Methodology
      An Object Oriented Analysis and Design Methodology can be used to analyse the problem requirements, design a solution to the problems and implement a solution in a programming language or database. Object Modelling Technique (OMT) and Unified Modelling language (UML) are the two most popular object oriented methodologies which provide a set of concepts and notations which can be used throughout the entire software development process.
      Object Oriented Analysis deals with the discovery, Analysis, and specification of requirements in terms of objects with identity that encapsulates properties and operations, message parsing, classes, inheritance, polymorphism and dynamic binding. The use of object oriented programming’s like JAVA would be great importance because the data and instructions for processing are combined in a self- sufficient objects which are modules consisting of pre-assembled programming code, which can be re-use in other programming or modules in the design phase.
      Object Oriented Design (OOD) will be the final step; it transforms the model produced in object oriented analysis. It will take into account the constraints imposed by the architecture and any non-functional technological or environmental constraints. This includes response time, transaction throughput, development environment, run-time platform, or the programming language.
  • CHAPTER THREE -- [Total Page(s) 3]

    Page 3 of 3

    Previous   1 2 3
    • ABSRACT - [ Total Page(s): 1 ]Abtsract coming soon ... Continue reading---

         

      APPENDIX A - [ Total Page(s): 4 ]Regadmin.php ... Continue reading---

         

      APPENDIX B - [ Total Page(s): 6 ] ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 2 ]The objective of this work is to develop a system that should be able to;➢    Detect active users.➢    Provide accurate evidence on corporate fraud when investigation is being carried out in an organization.➢    Monitor the daily activities of every user in a network in real time.➢    Has a good memory management for efficient carrying out of activities.1.4    Significance of StudyTherefore some of the significance and benefits of this work include:➢    ... Continue reading---

         

      CHAPTER TWO - [ Total Page(s): 5 ]The Pathneck technique uses a carefully constructed packet train to locate bottleneck links, making it easier to diagnose available-bandwidth related problems. Pathneck only needs single-end control and is extremely light-weight. Those properties make it attractive for both regular network users and ISP network operators.The BRoute system uses a novel concept source and sinks trees to capture end-user routing structures and network-edge bandwidth information. Equipped with path- edge ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 7 ] ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVE SUMMARY AND CONCLUSION5.1    SummaryThe topic of this work was reviewed in chapter one with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state. During the course of the research, the present system was analysed in other to detect the bottlenecks using Structured System Analysis and Design Methodology. Object oriented analysis and design methodology was found sufficient and efficient in the design of the proposed system.5.2 ... Continue reading---

         

      REFRENCES - [ Total Page(s): 1 ]ReferencesBalasubramania. N. A. Balasubramania and A. Venkataramani (2009) Energy consumption in mobile phone: A measurement study and implication for network application.Christopher Wiggins () Network Engineer at Micro Technology Consultants, Inc Fitzgerald, GeorgiaKuenning, G.H. et al (2001) Detecting Insider Threats by Monitoring System Call Activity, Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point.Ningning Hu 2006) Network Monitoring ... Continue reading---