Você está na página 1de 9

WEST VISAYAS STATE UNIVERSITY SCHOOL OF INFORMATION AND COMMUNICATIONS TECHNOLOGY JANIUAY CAMPUS

Chapter 1 The Problem Chapter One has six document parts, specifically, (1) Background of the Study, (2) Overview of the Current System and Related Systems, (3) Objectives of the Study, (4) Significance of the Study, (5) Definition of Terms and (6) Delimitation of the Study. Part One, Background of the Study, presents the specific information that is pertinent to the system. It compromises the explanation of necessary concepts and information in order to give a better overview of the study. Part Two, Overview of the Current System and Related Systems, discusses the characteristics of the current system and describes the features, capabilities and algorithms of the software that are relate to the study. Part Three, Objectives of the Study, gives the readers insights on the benefits of the system whether general or specific.

WEST VISAYAS STATE UNIVERSITY SCHOOL OF INFORMATION AND COMMUNICATIONS TECHNOLOGY JANIUAY CAMPUS
2

Part Four, Significance of the Study, states the significance or benefits derived from the system, both qualitative and quantitative. Part Five, definition of Terms, defines the conceptual and operational meanings of the terms used within the software document. Part Six, Delimitation of the Study, presents the scope of the system in this study with specific areas including the areas where the proponents were not able to include.

Background of the Study Monitoring of student activities is crucial in determining students performance and how well they are motivated in their studies. Instructor has their class records and attendance sheet in recording students activities. Instructors must be aware all the times to all their students especially during exams and laboratory hours. It has been difficult for them to do this task. Now a day, because of computer anything is possible without being monitored by others. We can do surfing,

WEST VISAYAS STATE UNIVERSITY SCHOOL OF INFORMATION AND COMMUNICATIONS TECHNOLOGY JANIUAY CAMPUS
3

chatting, playing etc everywhere by using computer. Students in this generation are more knowledgeable to manipulate computers especially Information Technology students. They are used to do those things every day. A large network is difficult to maintain. You need to sit on every computer to check its status and its problem. You need more manpower in maintaining the whole network, especially if the problem is on the network cabling. Communication must be part of the network. They prefer to use standalone application for e-mail designed specifically for network communication. People use Microsoft Outlook but it is avoided because of vulnerability to viruses.

Overview of the Current System and Related Systems Current System The existing system has been maintained manually. The system, which has been maintained manually, had been complex and

complicated. There were many chances to loss the data and the work wouldnt be an effective and efficient one. Manual

WEST VISAYAS STATE UNIVERSITY SCHOOL OF INFORMATION AND COMMUNICATIONS TECHNOLOGY JANIUAY CAMPUS
4

operation is always been complicated to the organizations for maintaining the records. In the existing system In this system we cant monitor who all are accessing the files at the same time. Its difficult to find which are the files are updated and renamed.

Objectives of the Study In Order to be able to define our system architecture, we must first dearly state what our objective that will driver system behavior at the same one of our objective is to create an experience, which is not only unique to the (user) client, but also makes him feel that he has loyal attachment to the system and approaches us whenever he/she needs. General Objective The general objective is to achieve better results and success by implementing computer network computerized process instead of manual process of School of Information And Communications Technology Laboratory Rooms.

WEST VISAYAS STATE UNIVERSITY SCHOOL OF INFORMATION AND COMMUNICATIONS TECHNOLOGY JANIUAY CAMPUS
5

Specified Objectives Lessen the effort in maintaining computers Secure all files, student outputs and records Monitor student activity during their laboratory hours Lessen the instructors effort in monitoring student Create a reliable and efficient Network Monitoring System Communication

Significance of the Study Network Monitoring System enables the local administrator to perform real time monitoring, data acquisition, data analysis and transmission .Here the administrator's work is made easier and simple. Administrator is having options for new user registration, updating and deleting user accounts, enable or disable user accounts, time allotment of users, he can view the system details of any user, he can view the hardware and software defects in any system connected through the network, he can capture the system of any user using his system, detect failure in network and can access the full control of any user

WEST VISAYAS STATE UNIVERSITY SCHOOL OF INFORMATION AND COMMUNICATIONS TECHNOLOGY JANIUAY CAMPUS
6

at any time, he can shutdown and reboot any system, chatting, and some other facilities in this system. Whenever the administrator finds that a particular user performs an illegal activity, he can disable that user's account and the user is not permitted to log into the system. The Administrator has some other options to view some details regarding the accounts and the registered users in the network. He can view the complaints, requests and feedback made by the users. He can view the logged users details such as current logic time, last logos time etc., time allotment list of all the users, system details of a particular user in the network etc..Only the registered user can use the service provided by flee System. The services offered to the user are mailing, chatting, call services such as complain. request and feedback submission, and change password and view user's account details. Security features are also enhanced in the software by checking the user name, password and category. Time allotment for the user is done based on the user id. This system consists of mainly four modules namely failure detection, system details, user details and remote section.

WEST VISAYAS STATE UNIVERSITY SCHOOL OF INFORMATION AND COMMUNICATIONS TECHNOLOGY JANIUAY CAMPUS
7

Definition of Terms For better comprehension of the sturdy, the following terms were defined conceptually and operationally: Admin The Login module consists of username and password. This process is for authentication. The user name and password is correct it is link into next page. This process is done in login. Network Monitoring System: The most of the organization they connect more numbers of systems to form a network to make their work easier to share their files and folders. While connecting we want to monitor the network system activities for secure purpose.

Remote Desktop Monitoring Remote Desktop Services is one of Microsoft Windows components to access a remote computer through the network.

WEST VISAYAS STATE UNIVERSITY SCHOOL OF INFORMATION AND COMMUNICATIONS TECHNOLOGY JANIUAY CAMPUS
8

E-Mail Client An application that runs on a personal computer or workstation and enables you to send, receive and organize email. It's called a client because e-mail systems are based on client-server architecture. Mail is sent from many clients to a central server, which re-routes the mail to its intended destination. Internet Protocol The Internet protocol is used to know about the network type. The protocol is entered in the textbox and calculates. It will show the network type. If wrong protocol is entering in the textbox, it will show the error message. Network type The Network used to describes the class. Calculate The Calculate is used to calculate the internet protocol and network type. In this system Maximum number of subnet is display.

WEST VISAYAS STATE UNIVERSITY SCHOOL OF INFORMATION AND COMMUNICATIONS TECHNOLOGY JANIUAY CAMPUS
9

Delimitation The scope of this system is managed by Network Administrator. Here the administrator monitors all the machines in the network and he has the facility to view the system configuration. He also monitor all the users logged on to the network and has the facility to, view the details of the users such as username, last logo OFF time, last login time, login date and privilege. Administrator can perform real time monitoring by viewing the current connected machines in the network and logged in users and hence can find their processor, application and memory details. Administrator has the facility to know actual network structure, desktop capture, shutdown, restart and IogOFF a remote system from his sysem. Administrator can send online messages to all remote systems in the network or send online messages to a particular users logged into remote system. The propose system will not cover and not responsible for the backup of student grades. Instructor must get it from the database after the laboratory.

Você também pode gostar