-
Use Of Network Activity Monitoring System To Solve Problems Case Study Of Benue Internal Revenue Service
CHAPTER FOUR -- [Total Page(s) 7]
Page 6 of 7
-
-
-
4.4 Choice and Justification of Programing Language
The programming languages used in this project work are PHP and MySQL. Justifications for using the programming language PHP for this work are as follows
➢ It is a server site scripting language
➢ Its open source (i.e. free to use) and cost of hosting a PHP application is less compared with the ASP (Active Server Page) and JSP (Java Server Pages)
➢ It adds dynamism to a website or web application. Also MYSQL is used for the following reasons;
➢ It is preferred because it can execute queries against a database
➢ SQL can insert records in a database and can set permissions on tables, procedures and database.
➢ It is also preferred because if the back end of the web application. This is because everything that is being done is stored to the database
4.5 System Requirement
The following are the hardware and software requirement of the network activity monitoring system to ensure optimization.
Software Requirements
Operating system (Windows Xp, windows Vista, windows 7, windows 8, server® 2003 32 or 64 bits)
PHP program development kit Net bean IDE 6.9.1 or higher Database MySQL Server.
Hardware Requirements
➢ Intel Pentium IV processor/1.5GHZ processor (minimum) recommended.
➢ 1GB or higher RAM recommended.
➢ 80GB or higher of HDD recommended. Minimum of 20GB free space required for the windows Java SDK installation.
➢ Standard mouse for desktop PC’s.
➢ Super visual graphics adapters (SVGA) with 1024*800 resolutions.
➢ UPS.
➢ Local area network connection.
➢ Standard keyboard.
CHAPTER FOUR -- [Total Page(s) 7]
Page 6 of 7
-
-
ABSRACT - [ Total Page(s): 1 ]Abtsract coming soon ... Continue reading---
APPENDIX A - [ Total Page(s): 4 ]Regadmin.php ... Continue reading---
APPENDIX B - [ Total Page(s): 6 ] ... Continue reading---
CHAPTER ONE - [ Total Page(s): 2 ]The objective of this work is to develop a system that should be able to;➢   Detect active users.➢   Provide accurate evidence on corporate fraud when investigation is being carried out in an organization.➢   Monitor the daily activities of every user in a network in real time.➢   Has a good memory management for efficient carrying out of activities.1.4   Significance of StudyTherefore some of the significance and benefits of this work include:➢   ... Continue reading---
CHAPTER TWO - [ Total Page(s): 5 ]The Pathneck technique uses a
carefully constructed packet train to locate bottleneck links, making
it easier to diagnose available-bandwidth related problems. Pathneck only needs single-end control and is extremely light-weight. Those
properties make it attractive for both regular network users and ISP
network operators.The BRoute system uses a novel concept source and
sinks trees to capture end-user routing structures and network-edge
bandwidth information. Equipped with path- edge ... Continue reading---
CHAPTER THREE - [ Total Page(s): 3 ]CHAPTER THREESYSTEM ANALYSIS AND RESEARCH METHODOLOGY3.1Â Â Â IntroductionSystem analysis is the study of a system, with the view to determine the bottlenecks and desired end product and establish the most efficient method of obtaining this end (American Heritage Dictionary, 2003). It is the analysis of the requirements of a task, and expression of these tasks in a form that enables a computer to perform the task. System analysis also refers to the process through which an existing system is ex ... Continue reading---
CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVE SUMMARY AND CONCLUSION5.1Â Â Â SummaryThe topic of this work was reviewed in chapter one with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state. During the course of the research, the present system was analysed in other to detect the bottlenecks using Structured System Analysis and Design Methodology. Object oriented analysis and design methodology was found sufficient and efficient in the design of the proposed system.5.2Â ... Continue reading---
REFRENCES - [ Total Page(s): 1 ]ReferencesBalasubramania. N. A. Balasubramania and A. Venkataramani (2009) Energy consumption in mobile phone: A measurement study and implication for network application.Christopher Wiggins () Network Engineer at Micro Technology Consultants, Inc Fitzgerald, GeorgiaKuenning, G.H. et al (2001) Detecting Insider Threats by Monitoring System Call Activity, Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point.Ningning Hu 2006) Network Monitoring ... Continue reading---