Transmission Control Protocol / Internet Protocol Monitoring Agent Using Java
Transmission Control Protocol / Internet Protocol Monitoring Agent Using Java
Price: ₦6000 [maxbutton id=”2″ url=”https://nounitesportal.com/payment/” text=”BUY NOW!” ]
– No of Pages: 49
– No of Chapters: 05
– Contains appropriate diagrams
– Well Researched Topic
– Elaborate Explanation
Type: Project Topics
Format: Word – Printable
Delivery: Download
Abstract
Transmission control protocol/Internet protocol (TCP/IP) as the language of computer networking in LAN, WAN, MAN had continued to receive tremendous attention in the heart of software engineering. sharing resources among several computers require a well-tailored or monitored server applications especially in a network system where information must e secured and invulnerable to attackers and hackers.
The introduction of object-oriented programming will continue to evolve and create more evolving technology that will soon provide a community of global presence in the world where information will be received at the snap of the fingers. Organizations had installed in their backbone or server computer applications permit a two-way traffic among several devices connect or hooked up to the organization LAN through a hub or switch.
This project work was carefully analyzed and designed to provide a mechanism upon which several computers willing to use specialized server resources must follow a queue of FIFO, where client system will be attended to according to their time of logging on to the server.
Table of Contents
TITLE PAGE i
CERTIFICATION ii
APPROVAL iii
DEDICATION iv
ACKNOWLEDGEMENT v
TABLE OF CONTENTS vi
ABSTRACT viii
CHAPTER ONE
1.0 INTRODUCTION…………………………………………………………1
1.1 BACKGROUND OF STUDY………………………………………………1
1.2 SCOPE OF STUDY………………………………………………………..6
1.3 AIMS AND OBJECTIVE OF STUDY………………………………….…6
1.4 SIGNIFICANCE OF STUDY………………………………………….….7
1.5 LIMITATIONS OF STUDY………………………………………………7
CHAPTER TWO
LITERATURE REVIEW
2.1 HISTORY OF SOFTWARE AGENTS……………………………………8
2.2 WHAT IS A SOFTWARE AGENT? …….………………………………10
2.3 WHAT AGENTS ARE NOT…………………………………………….12
2.4 TYPES OF AGENT………………………………………………………14
2.5 MOBILE AGENTS……………………………………………………….19
SYSTEMS DESIGN AND ANALYSIS
3.0 INTRODUCTION.……………………………………………………….27
3.1 EXISTING SYSTEM………………………………………………………27
3.2 SYSTEM DESIGN OF THE PROPOSED SYSTEM…..………………….28
3.3 SOFTWARE MODELLING……………………………………………..29
3.4 THE UNIFIED MODELLING LANGUAGE……….……………………29
3.5 DESIGN OF THE AGENT SYSTEM……………………………………31
CHAPTER FOUR
4.1 IMPLEMENTATION……………………………….……………………33
4.2 HARDWARE REQUIREMENT…………………………………………33
4.3 SOFTWARE REQUIREMENT………………………………………….34
4.4 IMPLEMENTATION OF THE AGENT SYSTEM….……………………39
4.5 SOFTWARE TESTING…………………………………………………..41
4.6 COMPONENTS OF SOFTWARE TESTING………………………..….41
4.7 TESTING OF THE AGENT SYSTEM…………………………………..44
CHAPTER FIVE
5.0 SUMMARY……….………………………………………………………46
5.1 RECOMMENDATION…………………………………………………..47
REFRENCES………………………………………………………………..…48
APPENDIX A……………………………………………………………….…50
APPENDIX B…………………………………………………………….……52
Transmission Control Protocol / Internet Protocol Monitoring Agent Using Java