• Use Of Network Activity Monitoring System To Solve Problems Case Study Of Benue Internal Revenue Service

  • CHAPTER FOUR -- [Total Page(s) 7]

    Page 7 of 7

    Previous   3 4 5 6 7
    • 4.6    Implementation Plans
      This procedure involves methods transiting from the old system to the new system. The researcher recommends the parallel changeover procedure because, it allows both the old system to be compared with the new automated system; as it allows the researcher and system designer to prove the efficiency of the new system over existing method of operation.
      4.6.1    Documentation
      Program documentation is an ordered set of information for the computer system to follow and produce a result. These instructions are stored in computer memory to solve problem.
      For this to be achieved there must be a procedure involving how to stop and start the system, enter information and must be properly documented.
      4.6.2    User Guide On the client side:
      ➢    Client logs in by inserting the correct username and password on the corresponding text field and password field.
      Server side:
      ➢    Double click on AMS Admin on the desktop
      ➢    Admin must log in using the correct user name and password
      To register user
      ➢    Go to file
      ➢    Click register user
      ➢    Register user dialog comes up
      ➢    Insert the user details and click the register user button.
      To register administration
      ➢    Go to file
      ➢    Click register user
      ➢    Register admin dialog comes up
      ➢    Insert the admin details and click the register admin button
      To exit
      ➢    Go to file, then click on exit
      To view image log
      ➢    Go to edit, then click view log.
      ➢    The view user log dialog box comes up.
      ➢    On the dialog box, click or select a user and click view to view the user; list of dialog.
      ➢    Click on each item on the list to view a particular image log
      4.6.3    Installation of the Software
      The executable software is stored on a CD ROM or flash disk. Extract the executables;
      ➢    Install the AMS admin first on the drive c: and include it on the system start up Menu followed by the PHP Runtime Environment.
      ➢    Install the MYSQL server and configure the database.
      ➢    To execute the user part of the application, since the AMS is included on the start-up, it will start up menu once the user boots up the system.
      ➢    For the AMS admin, double click on the AMS Admin.php executable located on C:/AMS admin/ dist. to start.
      4.7    Maintenance Details
      Software needs to be reviewed and maintained at intervals, to ensure proper functioning. Hence there is need to maintain the software at regular interval to make sure that unforeseen problems are solved and ensure that the new system continue to achieve desired results. The following are the ways to maintain the software:
      ➢    Backup the image cache folder on bi-weekly bases
      ➢    Back up the database tables
      ➢    Make sure that all the clients goes off before the service
      ➢    The server must have a standby UPS (Uninterrupted Power Supply)
      ➢    There may be need to change the capturing time of the software, depending on security levels.
  • CHAPTER FOUR -- [Total Page(s) 7]

    Page 7 of 7

    Previous   3 4 5 6 7
    • ABSRACT - [ Total Page(s): 1 ]Abtsract coming soon ... Continue reading---

         

      APPENDIX A - [ Total Page(s): 4 ]Regadmin.php ... Continue reading---

         

      APPENDIX B - [ Total Page(s): 6 ] ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 2 ]The objective of this work is to develop a system that should be able to;➢    Detect active users.➢    Provide accurate evidence on corporate fraud when investigation is being carried out in an organization.➢    Monitor the daily activities of every user in a network in real time.➢    Has a good memory management for efficient carrying out of activities.1.4    Significance of StudyTherefore some of the significance and benefits of this work include:➢    ... Continue reading---

         

      CHAPTER TWO - [ Total Page(s): 5 ]The Pathneck technique uses a carefully constructed packet train to locate bottleneck links, making it easier to diagnose available-bandwidth related problems. Pathneck only needs single-end control and is extremely light-weight. Those properties make it attractive for both regular network users and ISP network operators.The BRoute system uses a novel concept source and sinks trees to capture end-user routing structures and network-edge bandwidth information. Equipped with path- edge ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 3 ]CHAPTER THREESYSTEM ANALYSIS AND RESEARCH METHODOLOGY3.1    IntroductionSystem analysis is the study of a system, with the view to determine the bottlenecks and desired end product and establish the most efficient method of obtaining this end (American Heritage Dictionary, 2003). It is the analysis of the requirements of a task, and expression of these tasks in a form that enables a computer to perform the task. System analysis also refers to the process through which an existing system is ex ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVE SUMMARY AND CONCLUSION5.1    SummaryThe topic of this work was reviewed in chapter one with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state. During the course of the research, the present system was analysed in other to detect the bottlenecks using Structured System Analysis and Design Methodology. Object oriented analysis and design methodology was found sufficient and efficient in the design of the proposed system.5.2 ... Continue reading---

         

      REFRENCES - [ Total Page(s): 1 ]ReferencesBalasubramania. N. A. Balasubramania and A. Venkataramani (2009) Energy consumption in mobile phone: A measurement study and implication for network application.Christopher Wiggins () Network Engineer at Micro Technology Consultants, Inc Fitzgerald, GeorgiaKuenning, G.H. et al (2001) Detecting Insider Threats by Monitoring System Call Activity, Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point.Ningning Hu 2006) Network Monitoring ... Continue reading---