CHAPTER ONE
INTRODUCTION
Network monitoring takes note of slow or failing systems and notifies the network administrator of such occurrences. Such notifications can take the form of email massage, page alerts, or plain old phone calls. No matter what form they take, network problem massage should take the highest priority. Network monitoring should be running while other systems are performing their functions that is vital. You need to set aside at least one computer or set of computers to monitor network activity (Edward, 1972).
1.1Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â BACKGROUND OF THE STUDY
The method for monitoring communication performance in a communication network comprising computer systems communicatively coupled to each other with communication equipment in telecommunication, a digital switch which typically contains millions of lines of software is a monolithic unit supporting plain old telephone service. This digital switch have overtime been stuffed with increasing amounts of functionality such as management of routine terminals and charging. In one embodiment, a computer system of communication network measures and time-stamps network performance satisfies and stores them in a memory unit within the computer system.
1.2Â Â Â Â Â Â Â Â Â STATEMENT OF THE PROBLEM
It is very typical in every industry that as its client base continuous to grow, the industry faces increased number of problems. In network monitoring aspect the problem may include:
·        Poor network strength
·        Network hacking
·        No signal when the network is down etc.
1.3Â Â Â Â Â Â Â Â Â Â Â OBJECTIVE OF THE STUDY
The main objective of the research is to design and implement a computer network monitoring system using Federal Polytechnic Nekede Owerri network as a case study. This project also entails the reason and the maintenance of the effectiveness of the system when compared with
any other way of monitoring network. Another objective is to introduce computer in the area of monitoring network.
1.4Â Â Â Â Â Â Â Â Â Â Â SIGNIFICANCEÂ OF THE STUDY
Monitoring a network is very important in computer network firm . It will help to know the status of network they provide in a particular area and arise for rescue when the need arises. The uses of network monitoring system also expose any act of intruding from external body and even internal. And also help to give report concerning the network if the industry is moving forward, backward or stagnant in the area of providing network for the client.
1.5Â Â Â Â Â Â Â Â SCOPE OF THE STUDY
The aim of this research work is to design and implement a network communication monitoring system.
It is purely limited to designing of computer network monitoring system.
The scope helps focus on the area picked and make the research effective.
1.6Â Â Â Â Â Â LIMITATION OF THE STUDY
There were certain constraints encountered while the research this project was being carried out. Listed below are some of the prominent ones. They are:
Financial Constraints: Limited source of funds for the researcher to embark upon grater level of research that has to do with visiting different establishment that operate on network communication monitoring system, traveling from one school to another, library, vendors etc. to another to obtain fact and collection of data.
Time: Time needed to travel outside the school environment to other places (distance places in particular) in search for the required data was limited; this also led to the choice of Federal Polytechnic Owerri as a case study.
Nevertheless, as there were hindrances and limitations arising from different quarters, the researcher was able to gather all the necessary information required for the completion of this project.
1.7Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â DEFINITION OF TERMS
NETWORK:Â –Â Â Â Â Â Â Â Â Â Â This is the collection of computers and devices connected by communication channels that facilitate communications among users and allow user to share resources with other users.
MONITORING SYSTEM:Â – A set of device that observes and records selected activities within a data processing system for analysis or the set of function is required to initiate the transmission of a token on the ring and provide soft- error recovery in case of lost tokens, circulating frames or other difficulties.
MODULE:Â – A programming or specifications construct that defines a software component. Often a module is a unit of software that provides users with some data types and operation on those data types, and can be separately compiled. The module has an interface in the data types and operations the module provides its users. It is also a component of hardware system that can be sub-divided.
SOFTWARE: –Â Â Â Â Â Â Â Â All or part of the program, procedure, rules, and associated documentation of processing system. Software is an intellectual creation that is independent of the medium on which it is recorded.
HACKING: – The act of a computer enthusiast who uses his or her knowledge and means to gain unauthorized access to protect   resources.
COMPUTER: –Â Â Â Â Â Â Â Â A device or system that is capable of carrying out a sequence of operations in distinctly and explicitly defined manner. The operations are frequently numerical computations or data manipulations but also include input/output; the operations with the sequence may depend on particular data values. The definition of the sequence is called the program. Also it may consist of several interconnected units.
This material content is developed to serve as a GUIDE for students to conduct academic research
Project 4Topics Support Team Are Always (24/7) Online To Help You With Your Project
Chat Us on WhatsApp » 09132600555
DO YOU NEED CLARIFICATION? CALL OUR HELP DESK:
09132600555 (Country Code: +234)
YOU CAN REACH OUR SUPPORT TEAM VIA MAIL: [email protected]
09132600555 (Country Code: +234)