SlideShare une entreprise Scribd logo
1  sur  16
Chapter 1: Introduction
1.1 Project Background
Nowadays most business rely on computer and network infrastructure, therefore the
computer network’s speed and reliability are very important for the business to be successful
with efficient use of the resources available. For the network administrator, it means that he must
make sure that the network speed and the usage of the other networks are always on the same
level. To do this, monitoring the network is certainly important.
Computer networks are crucial part of an organization in this era of technology
advancement. Knowledge of designing a software tool is needed nowadays to troubleshoot an
organization’s computer or an office computer. Lan Monitoring System (LMS) is the system
which is scoped to organizations for network administrators to monitor the activities of the other
network and CPU in the organization. When an organization expands its business, the number of
network increases as well. Therefore, the speed of the network will be affected and the respond
time needed to display the Web Pages or streaming videos and etc; will be delayed. These
network problems can cause business to lose money due to time consuming by calling network
engineers to solve those problems and such problems must be resolved to eliminate loses.
Besides that, the most important thing is when lots of users are using the pc on the same
network and the number of pc in the LAN gets bigger and larger, it is difficult to know who
actually misusing the network .Problems will arise for an organization if a hacker gets into the
network. Every user’s information and data will be stolen and the computers might get attacked
by viruses that are sent by suspicious or unknown IP addresses which will damage the computers
health and performance. Moreover, the current ways of transferring files from a department to
another department is by sending it through a dispatch to the staffs.
This could consume a lots time where dispatch needs to wall all the way the next floor to
deliver a file. Besides that the usage of emails to transfer files are not reliable due to
unguaranteed security. Apart from that, the other problems faced by organizations are
communication problem within admin and staffs. Sending email of latest information updates
and pasting it on announcement boards could further consume time and energy.

1
1.2 Problem Context
According to Edmund Wong (2010), the internet is getting hard to control and monitor as
the users are increasing. It does not have a standardized metric or monitoring tool to control it
nor even a researched being done or developed. Edmund Wong (2011) added that the only
solution to monitor the internet is by using the current public software’s and extending their
functionalities. However, there are few problems with this method. First of all, the public
software’s are not fully meant to monitor.
The only perform minimum monitoring activities because they eat up the network
capacity. Besides that, not many people are monitoring the internet since it is a difficult job.
Thus, it results in degrading of the internet performances as not many problems are being
reported and solved frequently. This phenomenon that is created due to the lack of monitoring is
called “gridlock”. Apart from that, Darragh Delaney (2011) stated that alerting about critical
infrastructure should be made to IT staffs during their working hours. Alerting is also useful to
alert specific server and application teams.
The researcher proposed this Lan Monitoring System after many researches done by
reading the journals and articles related to various network management systems. Those systems
have tested their performance on bandwidth monitoring and how to manage information of
network elements and monitor error on real-time. Therefore, the researcher will develop the
proposed system by taking related features of the proposed system, by combining several
functionality systems.

2
1.3Objective of the Project
The Objective of this system is that it provides details of information and analysis of a
network that help office users to handle to maintain the networks performance stable and
efficient. By this way, the department or the company can save a lot of money and time for not
calling the technician to fix up the network problem.
Moreover, in the proposed system it consists of monitoring network bandwidth .When
this system starts running, it will monitor each and every packet that goes in and out from the
network. By monitoring the network traffic this system enables to check status for the every part
of the office network so that the administrator can know the whole situation and condition on
their company’s network.

3
1.4Scope of the Project
LMS allows network administrators to monitor the current activities of the network and
the PC. It helps the administrators to troubleshoot problems relating to slow processors in
computer and networks. This system also includes File transfer Protocol where staffs would not
need to travel from one floor to another just for the sake of sending documents and files.
Furthermore, this system has the features of chatting which can send out information, office
news, and updates to the whole organization which is connected to this LMS system.
.

4
Chapter 2: Literature Review
2.1 Review of Current Situation
Network Monitoring in an organization is a very important IT function which is able to save
money in network performances and employee productivity. Internal network problems are
normally monitored by Network Monitoring Systems. It able to search and solve slow web page
downloads, lost emails and crashed servers. Therearemany software or mixture of hardware can
be used to monitor all kind of networks virtually including wireless and wired. Moreover,
devices such as cell phones, routers, and switches with different operating system can also be
monitored.
2.2 Review of Related Literature
Normally the areas that network monitoring system covers are the usage of bandwidth,
application performance and pc performance. Monitoring the traffic is an important duty. It
usually targets on resources which support the internal end users. Therefore, the network
monitoring system has developed to manage wide range of devices such as cell phones, servers,
routers and switches. Several network monitoring systems come with an automatic detection that
able those to record devices continuously when they are added, deleted or undergo configuration
changes.

5
2.3 Comparisons of Previous System 1, 2, 3
System 1

Figure 1.0 Internet Monitoring System

The Figure 1.0above shows an Internet Monitoring System for a small organization.This
system includes few main functions such as Pinging Address Range, Trace Route, Network
Status and other minor functions such as IP Configuration, Routing table and Network
Calculator. The advantage of this system is that it consists of Alarms function that notifies the
network administrator if there is a suspicious packet or IP Address is detected.
This will save the administrator time for having to look at the system activities frequently for
the traces of any threats. Besides that, this system also has a help function which enables users to
understand about the function if they are confuse with the procedures and functions regarding the
system. However, this system does not have an attractive Graphical User Interface which will
make users bored using the system. In addition, this system lacks in security. It allows anyone to
access without any secure authorization into the system. This will lead to big problems such as
data lost or even data corruption due to cyber theft.

6
System 2

Figure 2.0Monitoring System
The Figure2.0 above shows a Monitoring System for a large organization. This system includes
functions such as Pinging Address Range, SNMP, Network Status and other minor functions
such as IP Configuration, Routing table and history logs. The advantage of this system is that it
consists of history logs which enable admin users to record or see the previous data. They can
also store old configuration and recover them if they accidently deleted. The disadvantages of
this system are network administrator will not be able to identify the function because it only
consists of icons without labels. This will be difficult for the administrator if they are in a hurry.
Besides that, the Graphical User Interface is too congested and complicated to look at.

7
System 3

Figure 3.0 Network Monitoring Analyzer
Figure 3.0 above shows a Network Monitoring Analyzer. This system monitors the upload and
downloads speed of the organization. It shows in detail about the speed of each activities being
run in the system. Moreover, there is an icon which can save the current statistics of bandwidth.
The disadvantage of this system is that it does not have many functions. Besides that, this system
is very light and doesn’t have enough functions on it.

8
2.4 Previous SystemsvsLan Monitoring System
The researcher’s system consist of few core functions such as file transfer, upload and download
speed tracking, monitoring RAM and CPU usage and pinging each of the computers in a same
Lan network. Unlike other systems, the researcher’s system is not only able to monitor but it also
kills unwanted processes of otherpc. Besides that, the system is also secured with login a
password that allows only the network administrator to access it. This is one of the advantages of
the researcher’s system. Moreover, researches system is able to switch on and off a particular
user’s computer if the user is not using it or the user is misusing it. This way the organization’s
productivity and also the security of the system are being maintained. In addition, the
researcher’s system has a function similar to system 2 which is the log history where the
administrator user can record and recover monitored data.

9
Chapter 3: Methodology
3.1 System Development Methodology (SDM)
System development is also known as suggested compilation of techniques, procedures,
documentation, rules and tools for developing information system. The definition of stages or
processes in developing a system is obtained from system development methodologies.
Adding on, structuring, planning and controlling the processors in developing the software with
different strength, weakness and approach can be produced by this system development
methodology. Furthermore system development methodologies are formed to correct any form of
concerns in the project, which also lessens the possibility of project breakdown, where for an
example it makes sure that all project team members are operating in the same direction to avoid
any misunderstanding. The frequently considered methodology approaches such as iterative, plan
driven or agile approach are needed when the software engineer develops a system.

3.2 Benefits of SDM
 Provide performances, key deliverables and to evade confusion or misplaced duty.
 Simplifying tasks and reducing training are involved in the consistency of project
development.
 Making sure all members are striving for the same target.
 The efficiency in analysis and reporting will be helpful under the methodology.
 Reducing cost, increasing efficiency and a more solid management of project schedule can
decrease the chances of project failure.

10
3.3 System Development Life Cycle (SDLC)

The common methodology in developing a system is called Information System Development
Life Cycle and as well identified as the system Development Life Cycle. The common approach
to develop software projects and also an influence to other methodology is the SDLC which is
the essential of various system development projects.Moreover, standard or typical system
analysis model are widely also known as the SDLC stages. Adding on, the majority of the
deviation will have the fundamental arrangement of creating a system, but recently the SDLC
has various alternatives increasingly. The SDLC has many variants over the years, but most of
the variants will have the basic structure of developing a system.

The table below shows the segments of the vital composition of the development processors in
the SDLC:
 Feasibility Study
 System Investigation
 System Analysis
 System Design
 Implementation
 Review and Maintained

The linear approach or structure in establishing a system is also categorized under the SDLC.
Basically, creating a system into series of phases and offering an approach as a principle in
software development is also a divided methodology process. In enhancing the aim of the project
that it should be well handled and the quality product is generated, the scheduling and usage of
documentation principles are underlined on the SDLC model.

11
3.4 Software and Hardware

3.7 Software Requirements Specifications
Table 3.2 Software to develop project
Software
Eclipse
Microsoft project
Visual paradigm
Photoshop
Windows 7 Professional

Description
Java and xml language program.
To create Gantt chart.
To create flow chart and UML diagrams.
To create the gray-scale noise image.
Operating system used to develop tool.

3.8 Hardware Requirements Specifications
Table 3.3 Hardware to develop project.
Hardware
HP CQ40

Specifications
- 320 GB hard disk
- 4 GB RAM (DDR3)
- Intel Pentium Processor
- Intel graphics card integrated.
- Network Interface Card (NIC)
802.11a/b/g

12
Chapter 4: Summary and Conclusion
Summary
The proposed system is finally been developed and during the development of the proposed
system and the developer had gain a lot of knowledge throughout the project. It has been great
experience to the developer of the proposed system, as the developer has gain lot knowledge in
developing a network solution. It is during the development project, to effectively capture the
user requirements, how perform research analysis and design. Finally the most important to
critical evaluate findings and solve the problems.
Overall much experience had been gain in developing a network solution, during the entire
project. To develop a network solution the developer had to gain knowledge in a lot of area, as a
system development will include a lot of discipline. In the project implementation not only the
developer had to learn the programming techniques but it also covers areas such as the technical
workings of internetworking and network protocols.
Although the project had finally been completed and has met the project requirements, the
proposed system still needs improvement. Further testing or other aspects of the system have not
been able to take into full considerations and area such as system performance can be improved.
Finally it has been a great experience in developing the system.

13
Conclusion
Based on the all the research above, researcher will like to conclude that this system is a
very good system because lots of research has be done by the researcher on this system.
Researcher has also chosen three existing Network Monitoring System in the market and has
compared it with this Lan Monitoring System. Many weaknesses have been found out from the
previous system and lots of modifications of the previous system have been implemented in
researcher’s Lan Monitoring System. Besides that there are some development techniques to
follow to implement a good and reliable system for the users. Researcher will be using System
Development Life Cycle as a methodology. This methodology chosen is a good technique to be
followed because the stages and process in this method is very useful and easy for the developer
to develop the system.

Researcher has even collected lots of info on programming language to see which
programming language is really suitable to program this Lan Monitoring System. Researcher has
also compared with few other programming languages and decided to come up with a good
conclusion. Researcher chose C# as Programming Language to be implemented in this Lan
Monitoring System.

Last but not least, researcher has chosen Extensible Markup Language has a database of
LMS. More over for the Analysis section, researcher will program out a system based on the
questionnaire that users answered and based on user requirements. Furthermore, researcher used
UML modeling language to describe the system in different kind of diagram forms such as Use
Case Diagram, Activity Diagram and Sequential Diagram. Researcher also has sketched few
diagrams of Graphical User Interface of the Lan Monitoring System and on how probably the
system will look like.

As a conclusion, based on the documentation and all the research that researcher has
done, Researcher will create a very good system called LAN Monitoring System (LMS).

14
References

1) Edmund Wong (2007). Network Monitoring Fundamentals and Standards. Available:
http://www.cse.wustl.edu/~jain/cis788-97/ftp/net_monitoring/index.htm#MonitoringInternet. [Last accessed 25 October 2012].

2) ScottHackman(2008). OpMnagers. Available:http://www.manageengine.com/networkmonitoring/index.html?gclid=CNqFiZaihq8CFYgc6wod6ReZ_g. .
[Last accessed 25 October 2012].

3) Darragh Delaney (August, 2011). 10 things you need to do to manage your network
effectively. Available:http://blogs.computerworld.com/18741/10_things_you_need_to_do
tomanageyournetwork. [ Last accessed 25 October 2012].

4) JinsongLiu (2011). Network Information Monitoring System in IPV6 Campus, Bao ding,
China, pp.200-202 [ Last accessed 25 October 2012].

5) Danm(2002). DevelopmentMethodologiesCompared. Available:http://www.ncycles.com/
ewhimethodologies.html[ Last accessed 25 October 2012].

6) Whatis UML (2008).UML[online], Available
http://atlas.kennesaw.edu/~dbraun/csis4650/A&D/UML_tutorial/index.htm[ Last
accessed 25 October 2012].
7) CSharp Compiler
(2010).[online],Available:http://www.monoproject.com/CSharp_Compiler [ Last
accessed 25 October 2012].

8) How to C# Socket programming (2012).[online], Available: http://csharp.netinformations.com/communications/csharp-socket-programming.htm[ Last accessed 25
October 2012].

15
16

Contenu connexe

Tendances

Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring BasicsRob Dunn
 
Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414Editor IJARCET
 
Processing tech malicioussoftware_ecommerce
Processing tech malicioussoftware_ecommerceProcessing tech malicioussoftware_ecommerce
Processing tech malicioussoftware_ecommerceChittagong University
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...IJNSA Journal
 
Network management aa
Network management  aaNetwork management  aa
Network management aaDhani Ahmad
 
Fault management presentation
Fault management presentationFault management presentation
Fault management presentationardhita banu adji
 
DevOps_SelfHealing
DevOps_SelfHealingDevOps_SelfHealing
DevOps_SelfHealingAtul Dhingra
 
The Importance of an Integrated Network Management System
The Importance of an Integrated Network Management SystemThe Importance of an Integrated Network Management System
The Importance of an Integrated Network Management SystemIRIS Network Systems
 
Performance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet TracerPerformance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet TracerIOSRjournaljce
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementDiontealley
 
Network management objective
Network management objectiveNetwork management objective
Network management objectiveDhani Ahmad
 
IRJET- Real Time Monitoring of Servers with Prometheus and Grafana for High A...
IRJET- Real Time Monitoring of Servers with Prometheus and Grafana for High A...IRJET- Real Time Monitoring of Servers with Prometheus and Grafana for High A...
IRJET- Real Time Monitoring of Servers with Prometheus and Grafana for High A...IRJET Journal
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...IJERA Editor
 
The 3 aspects of network performance management
The 3 aspects of network performance managementThe 3 aspects of network performance management
The 3 aspects of network performance managementManageEngine
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for amiIJCI JOURNAL
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) ghayour abbas
 
A LOG-BASED TRACE AND REPLAY TOOL INTEGRATING SOFTWARE AND INFRASTRUCTURE
A LOG-BASED TRACE AND REPLAY TOOL INTEGRATING SOFTWARE AND INFRASTRUCTUREA LOG-BASED TRACE AND REPLAY TOOL INTEGRATING SOFTWARE AND INFRASTRUCTURE
A LOG-BASED TRACE AND REPLAY TOOL INTEGRATING SOFTWARE AND INFRASTRUCTUREijseajournal
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementDjadja Sardjana
 

Tendances (20)

Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
 
Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414
 
Processing tech malicioussoftware_ecommerce
Processing tech malicioussoftware_ecommerceProcessing tech malicioussoftware_ecommerce
Processing tech malicioussoftware_ecommerce
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
 
Fault management presentation
Fault management presentationFault management presentation
Fault management presentation
 
DevOps_SelfHealing
DevOps_SelfHealingDevOps_SelfHealing
DevOps_SelfHealing
 
The Importance of an Integrated Network Management System
The Importance of an Integrated Network Management SystemThe Importance of an Integrated Network Management System
The Importance of an Integrated Network Management System
 
Performance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet TracerPerformance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet Tracer
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
ICEIC_2017_20161013
ICEIC_2017_20161013ICEIC_2017_20161013
ICEIC_2017_20161013
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. Statement
 
Network management objective
Network management objectiveNetwork management objective
Network management objective
 
IRJET- Real Time Monitoring of Servers with Prometheus and Grafana for High A...
IRJET- Real Time Monitoring of Servers with Prometheus and Grafana for High A...IRJET- Real Time Monitoring of Servers with Prometheus and Grafana for High A...
IRJET- Real Time Monitoring of Servers with Prometheus and Grafana for High A...
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
The 3 aspects of network performance management
The 3 aspects of network performance managementThe 3 aspects of network performance management
The 3 aspects of network performance management
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for ami
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
A LOG-BASED TRACE AND REPLAY TOOL INTEGRATING SOFTWARE AND INFRASTRUCTURE
A LOG-BASED TRACE AND REPLAY TOOL INTEGRATING SOFTWARE AND INFRASTRUCTUREA LOG-BASED TRACE AND REPLAY TOOL INTEGRATING SOFTWARE AND INFRASTRUCTURE
A LOG-BASED TRACE AND REPLAY TOOL INTEGRATING SOFTWARE AND INFRASTRUCTURE
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-management
 

En vedette

Rebuilding America's Infrastructure_Sep 2009
Rebuilding America's Infrastructure_Sep 2009Rebuilding America's Infrastructure_Sep 2009
Rebuilding America's Infrastructure_Sep 2009Alice Brown
 
CET Level 6 Certificate
CET Level 6 CertificateCET Level 6 Certificate
CET Level 6 CertificateWong Eminda
 
Jumelage de l'ochv et la roue libre
Jumelage de l'ochv et la roue libreJumelage de l'ochv et la roue libre
Jumelage de l'ochv et la roue libreAntoine Meausoone
 
Wordchoiceconfusion
WordchoiceconfusionWordchoiceconfusion
Wordchoiceconfusionsjcmejl
 
What would the ideal workplace look
What would the ideal workplace lookWhat would the ideal workplace look
What would the ideal workplace lookCristian Grigore
 
Webinarinfojobscomotenerunafotoprofesional 160201105626
Webinarinfojobscomotenerunafotoprofesional 160201105626Webinarinfojobscomotenerunafotoprofesional 160201105626
Webinarinfojobscomotenerunafotoprofesional 160201105626Cristinadelafuenterepiso
 
Publicada decisão que condenou vereador de Porto Velho por falsidade ideológica
Publicada decisão que condenou vereador de Porto Velho por falsidade ideológica Publicada decisão que condenou vereador de Porto Velho por falsidade ideológica
Publicada decisão que condenou vereador de Porto Velho por falsidade ideológica Rondoniadinamica Jornal Eletrônico
 
Veranderen en doen tegelijk door zelf marketingconcepten te maken.
Veranderen en doen tegelijk door zelf marketingconcepten te maken.Veranderen en doen tegelijk door zelf marketingconcepten te maken.
Veranderen en doen tegelijk door zelf marketingconcepten te maken.The Zooooo
 
Codes and Conventions of Front Covers
Codes and Conventions of Front CoversCodes and Conventions of Front Covers
Codes and Conventions of Front CoversEvijaKapeljuha
 
Квартплата ЄРЦ за грудень 2015 року
Квартплата ЄРЦ за грудень 2015 рокуКвартплата ЄРЦ за грудень 2015 року
Квартплата ЄРЦ за грудень 2015 рокуВадим Войтик
 
5 signs that your brain is foggy
5 signs that your brain is foggy5 signs that your brain is foggy
5 signs that your brain is foggylgriffith34
 

En vedette (18)

Rebuilding America's Infrastructure_Sep 2009
Rebuilding America's Infrastructure_Sep 2009Rebuilding America's Infrastructure_Sep 2009
Rebuilding America's Infrastructure_Sep 2009
 
CET Level 6 Certificate
CET Level 6 CertificateCET Level 6 Certificate
CET Level 6 Certificate
 
Jumelage de l'ochv et la roue libre
Jumelage de l'ochv et la roue libreJumelage de l'ochv et la roue libre
Jumelage de l'ochv et la roue libre
 
Wordchoiceconfusion
WordchoiceconfusionWordchoiceconfusion
Wordchoiceconfusion
 
Μοντελισμός
ΜοντελισμόςΜοντελισμός
Μοντελισμός
 
What would the ideal workplace look
What would the ideal workplace lookWhat would the ideal workplace look
What would the ideal workplace look
 
Project
ProjectProject
Project
 
Webinarinfojobscomotenerunafotoprofesional 160201105626
Webinarinfojobscomotenerunafotoprofesional 160201105626Webinarinfojobscomotenerunafotoprofesional 160201105626
Webinarinfojobscomotenerunafotoprofesional 160201105626
 
4.jchaymoz portfolio
4.jchaymoz portfolio4.jchaymoz portfolio
4.jchaymoz portfolio
 
Publicada decisão que condenou vereador de Porto Velho por falsidade ideológica
Publicada decisão que condenou vereador de Porto Velho por falsidade ideológica Publicada decisão que condenou vereador de Porto Velho por falsidade ideológica
Publicada decisão que condenou vereador de Porto Velho por falsidade ideológica
 
Database project
Database projectDatabase project
Database project
 
Veranderen en doen tegelijk door zelf marketingconcepten te maken.
Veranderen en doen tegelijk door zelf marketingconcepten te maken.Veranderen en doen tegelijk door zelf marketingconcepten te maken.
Veranderen en doen tegelijk door zelf marketingconcepten te maken.
 
програма математика 6 кл. 2013
програма математика 6 кл. 2013програма математика 6 кл. 2013
програма математика 6 кл. 2013
 
Byerly Story
Byerly StoryByerly Story
Byerly Story
 
Codes and Conventions of Front Covers
Codes and Conventions of Front CoversCodes and Conventions of Front Covers
Codes and Conventions of Front Covers
 
Квартплата ЄРЦ за грудень 2015 року
Квартплата ЄРЦ за грудень 2015 рокуКвартплата ЄРЦ за грудень 2015 року
Квартплата ЄРЦ за грудень 2015 року
 
5 signs that your brain is foggy
5 signs that your brain is foggy5 signs that your brain is foggy
5 signs that your brain is foggy
 
Interview with Rafael Fernández
Interview with Rafael FernándezInterview with Rafael Fernández
Interview with Rafael Fernández
 

Similaire à Hari proposal

Cisco network management
Cisco network managementCisco network management
Cisco network managementIT Tech
 
How to choose the right network monitor for your application
How to choose the right network monitor for your applicationHow to choose the right network monitor for your application
How to choose the right network monitor for your applicationlloyd barnette
 
Luis Perez ITS written report
Luis Perez ITS written reportLuis Perez ITS written report
Luis Perez ITS written reportLuis Perez
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptxTadeseBeyene
 
How to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network MonitorHow to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network Monitor10-Strike Software
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069William Lee
 
Product and sevices management system
Product and sevices management systemProduct and sevices management system
Product and sevices management systemVinod Gurram
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_SynopsisManmeet Sinha
 
Application-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManagerApplication-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManagerManageEngine, Zoho Corporation
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing systemAkshita Pillai
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating SystemsShweta Shah
 
Operating System Introduction
Operating System IntroductionOperating System Introduction
Operating System Introductiondipaknandankar
 
Operating system
Operating systemOperating system
Operating systemNeha Saxena
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Kenneth Regalado
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 

Similaire à Hari proposal (20)

Cisco network management
Cisco network managementCisco network management
Cisco network management
 
How to choose the right network monitor for your application
How to choose the right network monitor for your applicationHow to choose the right network monitor for your application
How to choose the right network monitor for your application
 
Luis Perez ITS written report
Luis Perez ITS written reportLuis Perez ITS written report
Luis Perez ITS written report
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
How to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network MonitorHow to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network Monitor
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
 
Product and sevices management system
Product and sevices management systemProduct and sevices management system
Product and sevices management system
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_Synopsis
 
Understanding Basics of OS
Understanding Basics of OSUnderstanding Basics of OS
Understanding Basics of OS
 
Application-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManagerApplication-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManager
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Operating System Introduction
Operating System IntroductionOperating System Introduction
Operating System Introduction
 
Operating system
Operating systemOperating system
Operating system
 
PacketsNeverLie
PacketsNeverLiePacketsNeverLie
PacketsNeverLie
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 

Dernier

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 

Dernier (20)

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 

Hari proposal

  • 1. Chapter 1: Introduction 1.1 Project Background Nowadays most business rely on computer and network infrastructure, therefore the computer network’s speed and reliability are very important for the business to be successful with efficient use of the resources available. For the network administrator, it means that he must make sure that the network speed and the usage of the other networks are always on the same level. To do this, monitoring the network is certainly important. Computer networks are crucial part of an organization in this era of technology advancement. Knowledge of designing a software tool is needed nowadays to troubleshoot an organization’s computer or an office computer. Lan Monitoring System (LMS) is the system which is scoped to organizations for network administrators to monitor the activities of the other network and CPU in the organization. When an organization expands its business, the number of network increases as well. Therefore, the speed of the network will be affected and the respond time needed to display the Web Pages or streaming videos and etc; will be delayed. These network problems can cause business to lose money due to time consuming by calling network engineers to solve those problems and such problems must be resolved to eliminate loses. Besides that, the most important thing is when lots of users are using the pc on the same network and the number of pc in the LAN gets bigger and larger, it is difficult to know who actually misusing the network .Problems will arise for an organization if a hacker gets into the network. Every user’s information and data will be stolen and the computers might get attacked by viruses that are sent by suspicious or unknown IP addresses which will damage the computers health and performance. Moreover, the current ways of transferring files from a department to another department is by sending it through a dispatch to the staffs. This could consume a lots time where dispatch needs to wall all the way the next floor to deliver a file. Besides that the usage of emails to transfer files are not reliable due to unguaranteed security. Apart from that, the other problems faced by organizations are communication problem within admin and staffs. Sending email of latest information updates and pasting it on announcement boards could further consume time and energy. 1
  • 2. 1.2 Problem Context According to Edmund Wong (2010), the internet is getting hard to control and monitor as the users are increasing. It does not have a standardized metric or monitoring tool to control it nor even a researched being done or developed. Edmund Wong (2011) added that the only solution to monitor the internet is by using the current public software’s and extending their functionalities. However, there are few problems with this method. First of all, the public software’s are not fully meant to monitor. The only perform minimum monitoring activities because they eat up the network capacity. Besides that, not many people are monitoring the internet since it is a difficult job. Thus, it results in degrading of the internet performances as not many problems are being reported and solved frequently. This phenomenon that is created due to the lack of monitoring is called “gridlock”. Apart from that, Darragh Delaney (2011) stated that alerting about critical infrastructure should be made to IT staffs during their working hours. Alerting is also useful to alert specific server and application teams. The researcher proposed this Lan Monitoring System after many researches done by reading the journals and articles related to various network management systems. Those systems have tested their performance on bandwidth monitoring and how to manage information of network elements and monitor error on real-time. Therefore, the researcher will develop the proposed system by taking related features of the proposed system, by combining several functionality systems. 2
  • 3. 1.3Objective of the Project The Objective of this system is that it provides details of information and analysis of a network that help office users to handle to maintain the networks performance stable and efficient. By this way, the department or the company can save a lot of money and time for not calling the technician to fix up the network problem. Moreover, in the proposed system it consists of monitoring network bandwidth .When this system starts running, it will monitor each and every packet that goes in and out from the network. By monitoring the network traffic this system enables to check status for the every part of the office network so that the administrator can know the whole situation and condition on their company’s network. 3
  • 4. 1.4Scope of the Project LMS allows network administrators to monitor the current activities of the network and the PC. It helps the administrators to troubleshoot problems relating to slow processors in computer and networks. This system also includes File transfer Protocol where staffs would not need to travel from one floor to another just for the sake of sending documents and files. Furthermore, this system has the features of chatting which can send out information, office news, and updates to the whole organization which is connected to this LMS system. . 4
  • 5. Chapter 2: Literature Review 2.1 Review of Current Situation Network Monitoring in an organization is a very important IT function which is able to save money in network performances and employee productivity. Internal network problems are normally monitored by Network Monitoring Systems. It able to search and solve slow web page downloads, lost emails and crashed servers. Therearemany software or mixture of hardware can be used to monitor all kind of networks virtually including wireless and wired. Moreover, devices such as cell phones, routers, and switches with different operating system can also be monitored. 2.2 Review of Related Literature Normally the areas that network monitoring system covers are the usage of bandwidth, application performance and pc performance. Monitoring the traffic is an important duty. It usually targets on resources which support the internal end users. Therefore, the network monitoring system has developed to manage wide range of devices such as cell phones, servers, routers and switches. Several network monitoring systems come with an automatic detection that able those to record devices continuously when they are added, deleted or undergo configuration changes. 5
  • 6. 2.3 Comparisons of Previous System 1, 2, 3 System 1 Figure 1.0 Internet Monitoring System The Figure 1.0above shows an Internet Monitoring System for a small organization.This system includes few main functions such as Pinging Address Range, Trace Route, Network Status and other minor functions such as IP Configuration, Routing table and Network Calculator. The advantage of this system is that it consists of Alarms function that notifies the network administrator if there is a suspicious packet or IP Address is detected. This will save the administrator time for having to look at the system activities frequently for the traces of any threats. Besides that, this system also has a help function which enables users to understand about the function if they are confuse with the procedures and functions regarding the system. However, this system does not have an attractive Graphical User Interface which will make users bored using the system. In addition, this system lacks in security. It allows anyone to access without any secure authorization into the system. This will lead to big problems such as data lost or even data corruption due to cyber theft. 6
  • 7. System 2 Figure 2.0Monitoring System The Figure2.0 above shows a Monitoring System for a large organization. This system includes functions such as Pinging Address Range, SNMP, Network Status and other minor functions such as IP Configuration, Routing table and history logs. The advantage of this system is that it consists of history logs which enable admin users to record or see the previous data. They can also store old configuration and recover them if they accidently deleted. The disadvantages of this system are network administrator will not be able to identify the function because it only consists of icons without labels. This will be difficult for the administrator if they are in a hurry. Besides that, the Graphical User Interface is too congested and complicated to look at. 7
  • 8. System 3 Figure 3.0 Network Monitoring Analyzer Figure 3.0 above shows a Network Monitoring Analyzer. This system monitors the upload and downloads speed of the organization. It shows in detail about the speed of each activities being run in the system. Moreover, there is an icon which can save the current statistics of bandwidth. The disadvantage of this system is that it does not have many functions. Besides that, this system is very light and doesn’t have enough functions on it. 8
  • 9. 2.4 Previous SystemsvsLan Monitoring System The researcher’s system consist of few core functions such as file transfer, upload and download speed tracking, monitoring RAM and CPU usage and pinging each of the computers in a same Lan network. Unlike other systems, the researcher’s system is not only able to monitor but it also kills unwanted processes of otherpc. Besides that, the system is also secured with login a password that allows only the network administrator to access it. This is one of the advantages of the researcher’s system. Moreover, researches system is able to switch on and off a particular user’s computer if the user is not using it or the user is misusing it. This way the organization’s productivity and also the security of the system are being maintained. In addition, the researcher’s system has a function similar to system 2 which is the log history where the administrator user can record and recover monitored data. 9
  • 10. Chapter 3: Methodology 3.1 System Development Methodology (SDM) System development is also known as suggested compilation of techniques, procedures, documentation, rules and tools for developing information system. The definition of stages or processes in developing a system is obtained from system development methodologies. Adding on, structuring, planning and controlling the processors in developing the software with different strength, weakness and approach can be produced by this system development methodology. Furthermore system development methodologies are formed to correct any form of concerns in the project, which also lessens the possibility of project breakdown, where for an example it makes sure that all project team members are operating in the same direction to avoid any misunderstanding. The frequently considered methodology approaches such as iterative, plan driven or agile approach are needed when the software engineer develops a system. 3.2 Benefits of SDM  Provide performances, key deliverables and to evade confusion or misplaced duty.  Simplifying tasks and reducing training are involved in the consistency of project development.  Making sure all members are striving for the same target.  The efficiency in analysis and reporting will be helpful under the methodology.  Reducing cost, increasing efficiency and a more solid management of project schedule can decrease the chances of project failure. 10
  • 11. 3.3 System Development Life Cycle (SDLC) The common methodology in developing a system is called Information System Development Life Cycle and as well identified as the system Development Life Cycle. The common approach to develop software projects and also an influence to other methodology is the SDLC which is the essential of various system development projects.Moreover, standard or typical system analysis model are widely also known as the SDLC stages. Adding on, the majority of the deviation will have the fundamental arrangement of creating a system, but recently the SDLC has various alternatives increasingly. The SDLC has many variants over the years, but most of the variants will have the basic structure of developing a system. The table below shows the segments of the vital composition of the development processors in the SDLC:  Feasibility Study  System Investigation  System Analysis  System Design  Implementation  Review and Maintained The linear approach or structure in establishing a system is also categorized under the SDLC. Basically, creating a system into series of phases and offering an approach as a principle in software development is also a divided methodology process. In enhancing the aim of the project that it should be well handled and the quality product is generated, the scheduling and usage of documentation principles are underlined on the SDLC model. 11
  • 12. 3.4 Software and Hardware 3.7 Software Requirements Specifications Table 3.2 Software to develop project Software Eclipse Microsoft project Visual paradigm Photoshop Windows 7 Professional Description Java and xml language program. To create Gantt chart. To create flow chart and UML diagrams. To create the gray-scale noise image. Operating system used to develop tool. 3.8 Hardware Requirements Specifications Table 3.3 Hardware to develop project. Hardware HP CQ40 Specifications - 320 GB hard disk - 4 GB RAM (DDR3) - Intel Pentium Processor - Intel graphics card integrated. - Network Interface Card (NIC) 802.11a/b/g 12
  • 13. Chapter 4: Summary and Conclusion Summary The proposed system is finally been developed and during the development of the proposed system and the developer had gain a lot of knowledge throughout the project. It has been great experience to the developer of the proposed system, as the developer has gain lot knowledge in developing a network solution. It is during the development project, to effectively capture the user requirements, how perform research analysis and design. Finally the most important to critical evaluate findings and solve the problems. Overall much experience had been gain in developing a network solution, during the entire project. To develop a network solution the developer had to gain knowledge in a lot of area, as a system development will include a lot of discipline. In the project implementation not only the developer had to learn the programming techniques but it also covers areas such as the technical workings of internetworking and network protocols. Although the project had finally been completed and has met the project requirements, the proposed system still needs improvement. Further testing or other aspects of the system have not been able to take into full considerations and area such as system performance can be improved. Finally it has been a great experience in developing the system. 13
  • 14. Conclusion Based on the all the research above, researcher will like to conclude that this system is a very good system because lots of research has be done by the researcher on this system. Researcher has also chosen three existing Network Monitoring System in the market and has compared it with this Lan Monitoring System. Many weaknesses have been found out from the previous system and lots of modifications of the previous system have been implemented in researcher’s Lan Monitoring System. Besides that there are some development techniques to follow to implement a good and reliable system for the users. Researcher will be using System Development Life Cycle as a methodology. This methodology chosen is a good technique to be followed because the stages and process in this method is very useful and easy for the developer to develop the system. Researcher has even collected lots of info on programming language to see which programming language is really suitable to program this Lan Monitoring System. Researcher has also compared with few other programming languages and decided to come up with a good conclusion. Researcher chose C# as Programming Language to be implemented in this Lan Monitoring System. Last but not least, researcher has chosen Extensible Markup Language has a database of LMS. More over for the Analysis section, researcher will program out a system based on the questionnaire that users answered and based on user requirements. Furthermore, researcher used UML modeling language to describe the system in different kind of diagram forms such as Use Case Diagram, Activity Diagram and Sequential Diagram. Researcher also has sketched few diagrams of Graphical User Interface of the Lan Monitoring System and on how probably the system will look like. As a conclusion, based on the documentation and all the research that researcher has done, Researcher will create a very good system called LAN Monitoring System (LMS). 14
  • 15. References 1) Edmund Wong (2007). Network Monitoring Fundamentals and Standards. Available: http://www.cse.wustl.edu/~jain/cis788-97/ftp/net_monitoring/index.htm#MonitoringInternet. [Last accessed 25 October 2012]. 2) ScottHackman(2008). OpMnagers. Available:http://www.manageengine.com/networkmonitoring/index.html?gclid=CNqFiZaihq8CFYgc6wod6ReZ_g. . [Last accessed 25 October 2012]. 3) Darragh Delaney (August, 2011). 10 things you need to do to manage your network effectively. Available:http://blogs.computerworld.com/18741/10_things_you_need_to_do tomanageyournetwork. [ Last accessed 25 October 2012]. 4) JinsongLiu (2011). Network Information Monitoring System in IPV6 Campus, Bao ding, China, pp.200-202 [ Last accessed 25 October 2012]. 5) Danm(2002). DevelopmentMethodologiesCompared. Available:http://www.ncycles.com/ ewhimethodologies.html[ Last accessed 25 October 2012]. 6) Whatis UML (2008).UML[online], Available http://atlas.kennesaw.edu/~dbraun/csis4650/A&D/UML_tutorial/index.htm[ Last accessed 25 October 2012]. 7) CSharp Compiler (2010).[online],Available:http://www.monoproject.com/CSharp_Compiler [ Last accessed 25 October 2012]. 8) How to C# Socket programming (2012).[online], Available: http://csharp.netinformations.com/communications/csharp-socket-programming.htm[ Last accessed 25 October 2012]. 15
  • 16. 16