• Use Of Network Activity Monitoring System To Solve Problems Case Study Of Benue Internal Revenue Service

  • CHAPTER TWO -- [Total Page(s) 5]

    Page 3 of 5

    Previous   1 2 3 4 5    Next
    • 2.7.1    Network Monitoring System with Reference to Application Server or Application Server Monitors (ASM).
      (Agomuo & Nwachukwu, 2009) analysed the architecture of Network monitoring system with reference to application server or application server monitor, they describe the system as a desktop based application, developed to assist micro company in monitoring their application servers running on their network domain to decrease downtime cost, improve staff productivity, create flexible reporting of their application servers on their network and to focus on business core among others.
      The authors embarked on this work to create a system that has the ability to monitor and identify the state of application servers, and report within the shortest possible time. A system that can monitor many servers concurrently by alerting appropriate person(s) when critical events occurs, and a system whose flexibility in reporting error or problem on the application server can not only be display on the screen but also by audio signals.
      The control centre contains the operational environment with five main menu that is seen when you log in. these main menus are file, edit, monitor, log and help. The input to the system comes in two major ways: First, is the operator’s registration. Here the user is required to fill in his/her information in the registration input specification form. The data supplied will be used to configure the individual access to the system, that is, user ID and password. The second is the application server configuration settings which are divided into two forms: request for HTTP server and request for TCP server configuration. The output can be displayed on the screen, printed or recorded. The recording aspect is because the system will have an alert mechanism which will inform unique sound which can easily be identified by the operator. In the output menu you have the name, activity and state. At the main interface, the operator wishes to perform some operations on the server he/she wants to monitor. These could be, start all the monitors, stop all monitors, add monitors, remove all monitor, actions.
      This work, Network Monitoring System with Reference to application servers also called Application server monitor (ASM) is carried out to improve the monitoring system of organization that maybe using application servers. At the end of this work, they were able to develop a system that can integrate live data (application servers) on the network server which other systems can have access to, the application detects faults on either TCP server or HTTP server and alerts the operator by displaying the states of the server on the screen or by making three different sounds signifying various states of the server.
      2.7.2    Network Monitoring and Lawful Intercept (Network Telemetry)
      One of the application of Network telemetry is Network Monitoring and Lawful- Intercept, these are important to Service Providers and impose unique requirements on network equipment, which makes network telemetry to be the monitoring and reporting information on a network whether LAN or WAN. (www.brocade.com/downloads/whitepapers/Network.Telemetry). It helps to provide a system that monitors their networks for security intrusion detection, application performance management, packet inspection and analysis. A wide range of other applications pointed two approaches of network architectures which a service provider can use to design a monitoring network: In-band network architecture and Out-of-band network architecture.
      In-band network architecture: it is based on software that must be installed on the remote system being managed and only works after the operating system has been booted. This solution is cheaper, but it does not allow access to Bios settings or the reinstallation of the operating system and cannot be used to fix problems that prevent the system from booting.
      Out-of-bound network architecture: This involves the use of a dedicated management channel for device maintenance. It allows a system administrator to monitor and manage servers and other network equipment by remote control regardless of whether the machine is powered on, or if an operating system is installed or functional.
      2.7.3    Network Monitoring and Diagnosis Based on Available Bandwidth Measurement.
      (Ningning, 2006) analysed the architecture of Network Monitoring and Diagnosis based on available bandwidth measurement. The researcher pointed out in his work that Network monitoring and diagnosis systems are used by ISPs for daily network management operations and by popular network applications like peer-to-peer systems for performance optimization. However, the high overhead of some monitoring and diagnostic techniques can limit their applicability. Network monitoring and diagnosis system periodically records value of network performance metrics in order to measure network performance, identify performance anomalies, and determine root causes for the problems, preferably before customers’ performance is affected.
      The researcher went further to state that end-to-end available bandwidth and bandwidth bottlenecks can be efficiently and effectively estimated using packet-train probing techniques, source and sink tree structures that can capture network edge information, and with the support of a properly designed measurement infrastructure, bandwidth-related measurements can also be scalable and convenient enough to be used routinely by both ISPs and regular end users”. These claims are supported by four techniques presented in his work, the (IGI/PTR) end-to-end available bandwidth measurement technique, the Pathneck bottleneck locating technique, the BRoute large-scale available bandwidth inference system, and the TAMI monitoring and diagnostic infrastructure. The IGI/PTR technique implements two available bandwidth measurement algorithms, estimating background traffic load (IGI) and packet transmission rate (PTR), respectively. It demonstrates that end-to-end available bandwidth can be measured both accurately and efficiently, thus solving the path-level available bandwidth monitoring problem.
  • CHAPTER TWO -- [Total Page(s) 5]

    Page 3 of 5

    Previous   1 2 3 4 5    Next
    • ABSRACT - [ Total Page(s): 1 ]Abtsract coming soon ... Continue reading---

         

      APPENDIX A - [ Total Page(s): 4 ]Regadmin.php ... Continue reading---

         

      APPENDIX B - [ Total Page(s): 6 ] ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 2 ]The objective of this work is to develop a system that should be able to;➢    Detect active users.➢    Provide accurate evidence on corporate fraud when investigation is being carried out in an organization.➢    Monitor the daily activities of every user in a network in real time.➢    Has a good memory management for efficient carrying out of activities.1.4    Significance of StudyTherefore some of the significance and benefits of this work include:➢    ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 3 ]CHAPTER THREESYSTEM ANALYSIS AND RESEARCH METHODOLOGY3.1    IntroductionSystem analysis is the study of a system, with the view to determine the bottlenecks and desired end product and establish the most efficient method of obtaining this end (American Heritage Dictionary, 2003). It is the analysis of the requirements of a task, and expression of these tasks in a form that enables a computer to perform the task. System analysis also refers to the process through which an existing system is ex ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 7 ] ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVE SUMMARY AND CONCLUSION5.1    SummaryThe topic of this work was reviewed in chapter one with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state. During the course of the research, the present system was analysed in other to detect the bottlenecks using Structured System Analysis and Design Methodology. Object oriented analysis and design methodology was found sufficient and efficient in the design of the proposed system.5.2 ... Continue reading---

         

      REFRENCES - [ Total Page(s): 1 ]ReferencesBalasubramania. N. A. Balasubramania and A. Venkataramani (2009) Energy consumption in mobile phone: A measurement study and implication for network application.Christopher Wiggins () Network Engineer at Micro Technology Consultants, Inc Fitzgerald, GeorgiaKuenning, G.H. et al (2001) Detecting Insider Threats by Monitoring System Call Activity, Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point.Ningning Hu 2006) Network Monitoring ... Continue reading---