+234 813 0686 500
+234 809 3423 853


  • Type:Project
  • Pages:54
  • Format:Microsoft Word
(Computer Science Project Topics & Materials)



       Network monitoring takes note of slow or failing systems and notifies the network administrator of such occurrences. Such notifications can take the form of email massage, page alerts, or plain old phone calls. No matter what form they take, network problem massage should take the highest priority. Network monitoring should be running while other systems are performing their functions that is vital. You need to set aside at least one computer or set of computers to monitor network activity (Edward, 1972).

1.1                 BACKGROUND OF THE STUDY

The method for monitoring communication performance in a communication network comprising computer systems communicatively coupled to each other with communication equipment in telecommunication, a digital switch which typically contains millions of lines of software is a monolithic unit supporting plain old telephone service. This digital switch have overtime been stuffed with increasing

amounts of functionality such as management of routine terminals and charging. In one embodiment, a computer system of communication network measures and time-stamps network performance satisfies and stores them in a memory unit within the computer system.


It is very typical in every industry that as its client base continuous to grow, the industry faces increased number of problems. In network monitoring aspect the problem may include:

·         Poor network strength

·         Network hacking

·         No signal when the network is down etc. 


The main objective of the research is to design and implement a computer network monitoring system using Federal Polytechnic Nekede Owerri network as a case study. This project also entails the reason and the maintenance of the effectiveness of the system when compared with 

 any other way of monitoring network. Another objective is to introduce computer in the area of monitoring network.


Monitoring a network is very important in computer network firm . It will help to know the status of network they provide in a particular area and arise for rescue when the need arises. The uses of network monitoring system also expose any act of intruding from external body and even internal. And also help to give report concerning the network if the industry is moving forward, backward or stagnant in the area of providing network for the client.


The aim of this research work is to design and implement a network communication monitoring system.

            It is purely limited to designing of computer network monitoring system.

The scope helps focus on the area picked and make the research effective.


There were certain constraints encountered while the research this project was being carried out. Listed below are some of the prominent ones. They are:

Financial Constraints:  Limited source of funds for  the  researcher to embark  upon grater level of research that has to do with visiting different  establishment that operate on network communication monitoring system, traveling from one school to  another, library, vendors etc. to another to obtain fact and collection of data.

Time: Time needed to travel outside the school environment to other places (distance places in particular) in search for the required data was limited; this also led to the choice of Federal Polytechnic Owerri as a case study.

            Nevertheless, as there were hindrances and limitations arising from different quarters, the researcher was able to gather all the necessary information required for the completion of this project.

1.7                   DEFINITION OF TERMS

NETWORK: -           This is the collection of computers and devices connected by communication channels that facilitate communications among users and allow user to share resources with other users.

MONITORING SYSTEM: - A set of device that observes and records selected activities within a data processing system for analysis or the set of function is required to initiate the transmission of a token on the ring and provide soft- error recovery in case of lost tokens, circulating frames or other difficulties.

MODULE: - A programming or specifications construct that defines a software component. Often a module is a unit of software that provides users with some data types and operation on those data types, and can be separately compiled. The module has an interface in the data types and operations the module provides its users. It is also a component of hardware system that can be sub-divided.

SOFTWARE: -         All or part of the program, procedure, rules, and associated documentation of processing system. Software is an intellectual creation that is independent of the medium on which it is recorded.

HACKING: - The act of a computer enthusiast who uses his or her knowledge and means to gain unauthorized access to protect    resources.

COMPUTER: -         A device or system that is capable of carrying out a sequence of operations in distinctly and explicitly defined manner. The operations are frequently numerical computations or data manipulations but also include input/output; the operations with the sequence may depend on particular data values. The definition of the sequence is called the program. Also it may consist of several interconnected units.


Share This


Type Project
Department Computer Science
Project ID CPU0646
Price ₦3,000 ($9)
No of Pages 54 Pages
Format Microsoft Word

Leave a comment...


    Type Project
    Department Computer Science
    Project ID CPU0646
    Price ₦3,000 ($9)
    No of Pages 54 Pages
    Format Microsoft Word

    Related Works

    DESIGN AND IMPLEMENTATION OF NETWORK ACTIVITY MONITORING SYSYTEM. (A CASE STUDY OF ANAMBRA STATE FEDRAL INLAND REVENUE SERVICES, F.I.R.S) CHAPTER ONE INTRODUCTION Attacks on computer by outside intruder are more publicized but the ones perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to... Continue Reading
    CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
    ABSTRACT           This project is organized in five chapters. Chapter one explains the introduction of the proposed project. It described the problem statement of the project, aim and objectives and expected contribution to knowledge.           Chapter two presents a vivid literature review of the concept of network analyzer... Continue Reading
    Introduction In a world like ours today there is every need to manage funds in every activity being carried out. It is the concern of every firm to control its finances to ensure that unnecessary expenses are avoided. Financial management in a company has proved to be a great task involving the monitor of almost all departments of the company. As... Continue Reading
    INTRODUCTION 1.1 BACKGROUND OF STUDY The federal ministry of finance was established in 1958 by the finance (control and management) ordinance, to replace the finance department.  The ordinance conferred on the ministry the responsibility for the control and management of the public finance of the federation.  In the 1080, attempts were made to... Continue Reading
    A CASE STUDY OF NATIONAL POPULATION COMMISSION ABSTRACT The purpose of the study was to design and implement a computer- based population monitoring system for Enugu State. The researcher critically analyzed the existing census system to sort out the bottlenecks... Continue Reading
    DESIGN AND IMPLEMENTATION OF A COMPUTER BASED STOCK MONITORING SYSTEM (A CASE STUDY OF NIGERIA STOCK EXCHANGE ABUJA) ABSTRACT The purpose of this research work was to curb the inflationary possibilities of our economy, finance on recurrent budget deficit and improve the balance of payment position of the country. The design was base on developing... Continue Reading
    (CASE STUDY OF FEDERAL MINISTRY OF FINANCE) ABSTRACT Federal Ministry of Finance has always monitoring how economic growth is moving in this Nation. After the granting of internal autonomy to regions in 1946, there have been subsequent fiscal commission, military decrees... Continue Reading
    DESIGN AND IMPLEMENTATION OF STUDENT ATTENDANCE MONITORING SYSTEM USING FINGERPRINT CHAPTER ONE INTRODUCTION 1.1   Background of the Study Attendance management of students in institution can be rigorous using the conventional method of paper sheets and old file system method. Every academic institution poses some standards concerning how... Continue Reading
    ABSTRACT The purpose of the study was to design and implement a computer- based population monitoring system for Enugu State.           The researcher critically analyzed the existing census system to sort out the bottlenecks hindering the effective census computation. He went further to design the new system which is capable of solving the... Continue Reading