PROPOSA
PROPOSA
PROPOSA
Supervised by;
1
DECLARATION
We declare that this proposal is our original work piece with the best of our
knowledge and it has never been submitted to any university for any award.
Date…………………………………
APPROVAL
This proposal has been submitted with my approval as supervisor and ready to
be awarded.
Signature……………………………. Date……………….
Signature……………………………. Date……………….
2
ABSTRACT
3
Table of Contents
1 INTRODUCTION AND BACKGROUND ................................................................................... i
1.0 Introduction ................................................................................................................................. i
1.1 Background of the study .......................................................................................................... i
1.2 Problem Statement ................................................................................................................ ii
1.3 Research objectives ................................................................................................................ ii
1.3.1 main objectives ............................................................................................................... ii
1.3.2 Specific Objectives .......................................................................................................... iii
1.4 Research questions ................................................................................................................ iii
1.4.1 Main research question .................................................................................................. iii
1.4.2 Specific research question .............................................................................................. iii
1.5 Significance of the study ........................................................................................................ iii
1.6 Scope ...................................................................................................................................... iv
1.6.1 Content scope ................................................................................................................ iv
1.6.2 Geograhical scope ......................................................................................................... vii
1.6.3 Time scope .................................................................................................................... vii
1.7 Chapter Summary.................................................................................................................. vii
2 LITERATURE REVIEW ................................................................................................................... viii
2.1 Introduction ......................................................................................................................... viii
2.2 Information Systems ........................................................................................................... viii
2.3 Types of the information to collected .................................................................................. ix
3 Introduction ................................................................................................................................. xiii
3.1 Research Design .................................................................................................................. xiii
3.1.1 Exploratory Research Design ...................................................................................... xiii
3.1.2 Input Design ................................................................................................................. xiii
3.1.3 Process Design ............................................................................................................. xiv
3.2 Data Collection Methods .................................................................................................... xiv
3.2.1 Questionnaire Method ................................................................................................ xiv
3.2.2 Interview Method ....................................................................................................... xiv
3.2.3 Observation Method ................................................................................................... xiv
3.2.4 Document Review Method ......................................................................................... xiv
3.3 Systems Development Methodology .................................................................................. xv
3.3.1 Systems Study and Feasibility Study............................................................................ xv
3.3.2 Systems Analysis and Design Methods........................................................................ xv
3.3.3 Requirement Collection Methods ................................................................................ xv
4
3.3.4 System Modelling and Design Methods ..................................................................... xvi
3.3.5 Systems implementation methods .............................................................................xvii
4 REFERENCES ................................................................................................................................ xviii
5
CHAPTER ONE
1 INTRODUCTION AND BACKGROUND
1.0 Introduction
The chapter describes the background and the problem that the researchers
intend to address (Problem Statement). It further discusses the purpose of the
study (general objective) as well as the specific objectives. Also discussed in this
chapter are the research questions and finally looks at the scope of the study and
the significance of the study
The proposed network monitoring system aims to address the existing gap at
Makerere University Business School, where the current network lacks automated
performance monitoring and tracking capabilities. Presently, bandwidth usage
levels, device connectivity and traffic flows are verified sporadically through basic
tools like ping, traceroute and SNMP without detailed log reporting or monitoring.
This makes it difficult to pinpoint and resolve any issues proactively.
The monitoring system will rely on protocols like SNMP, ICMP, NetFlow along with
monitoring technologies such as PRTG, Observium, MRTG or custom tools. The
system will be tailored as per the network architecture and needs of the business
school across wired and wireless networks. We aim to design it to require low
maintenance while providing richness of historical reports.
i
1.2 Problem Statement
Makerere University Business School currently lacks a robust network monitoring
and management system leading to suboptimal utilization and control of its
campuswide network infrastructure.
Currently, basic tools like ping, traceroute and SNMP provide only snapshot
manual checks making it impossible to identify historical trends, peaks and
valleys. Moreover, the lack of customizable alerts and reporting implies delays in
detecting and responding to network faults. This leads to increased downtimes
hampering productivity and user experience.
Therefore, the need of the hour is the ability to continuously collect granular
network performance statistics, analyse traffic patterns, and log data for historical
recall through an easy-to-use yet information rich monitoring system. This
proposal outlines developing a robust, scalable and flexible monitoring solution
customized to address the specific shortcomings for the Makerere University
Business School network scenario.
ii
In summary, the monitoring system aims to provide an efficient, sustainable and
scalable platform for proactively optimizing the campus network connectivity,
availability, visibility and security thereby benefiting staff productivity, student
experience and university administration.
The monitoring system allows Realtime tracking of network traffic and bandwidth
usage. This enables administrators to identify and address bottlenecks and
congestion promptly, ensuring optimal network performance for both academic
and administrative activities.
iii
To enhance Reliability and Availability.Continuous monitoring helps identify issues
that may lead to network downtime. Proactive measures can be taken to prevent
disruptions, ensuring that the network remains reliable and available for
students, faculty, and staff.
1.6 Scope
This scope provided the boundary for the research in terms of content,
geographical and time scope.
Additionally, the system's architecture will verify that it complies with all
applicable rules and guidelines for data security and privacy. The system will
include the following:
a) Login management
b) User management
c) Network Traffic Monitoring:
d) Bandwidth Usage Analysis:
e) Device Connectivity Tracking
f) Performance Metrics Monitoring:
iv
g) Alerts and Notifications
h) Security Event Logging
v
vi
1.6.2 Geograhical scope
The study will be carried out at the MUBs LABs, located in Nakawa, Kampala
district, Uganda.
vii
CHAPTER TWO
2 LITERATURE REVIEW
2.1 Introduction
viii
Moreover, the literature will delve into the adaptability of information systems in
problem-solving, emphasizing the importance of utilizing information effectively
within the context of network management. As we transition from the general
understanding of information systems to their application in the proposed
Network Monitoring System, the subsequent sections of this literature review will
examine existing studies on online hotel booking and management systems,
insights from other scholars, and a critical analysis of the current and proposed
network monitoring approaches.
monitoring tool will provide much needed visibility to optimize network
infrastructure, devices and traffic flows as per evolving needs at Makerere
University Business School. The system will help improve network planning and
management while enhancing connectivity and services for end-users.
ix
Resource Utilization Analysis:
Tracking the utilization of network resources such as routers, switches, and
servers
Capacity planning based on resource usage trends
x
Advantages of MUBS Monitoring system
xi
Educational Opportunities: Provides educational opportunities for students
studying network management or related fields, offering a practical and hands-
on learning experience in a real-world network environment
xii
CHAPTER THREE
METHODOLOGY
3 Introduction
The research design adopted for this project is exploratory, descriptive, and
quantitative in nature. Following the principles outlined by Creswell & Plano Clark
(2007), this design involves collecting, analysing, interpreting, and reporting data
to address the research questions. The system development lifecycle (SDLC) is
utilized in the design and implementation of the system on a Windows platform.
The input design focuses on streamlining data entry, error detection, and
ensuring a user-friendly interface for efficient interaction with the monitoring
system. The system captures data related to network assets, bandwidth usage,
and device connectivity. Verification/validation checks are implemented to
enhance data accuracy, and error detection mechanisms raise flags for prompt
correction.
xiii
3.1.3 Process Design
Process design is essential for understanding the workflow and interactions within
the system. Data Flow Diagrams (DFD) are employed to represent the logical flow
of information within the network monitoring system. Circles denote processes,
while squares represent sources and destinations of data. Arrows indicate data
flow, providing a visual representation of the system's functionality.
Existing documents, such as network records and logs, are reviewed to extract
historical data and gain a comprehensive understanding of past network
performance and issues.
xiv
3.3 Systems Development Methodology
The design phase builds upon the analysis, translating system requirements into
an architectural plan. The entity-relationship diagram is utilized to design the
database, establishing entities, attributes, and relationships.
xv
3.3.4 System Modelling and Design Methods
xvi
System, addressing the specific needs of Makerere University Business School and
its surrounding community's network infrastructure.
There is no need for additional resources in a network backup solution. The last
and most crucial stage is implementation. Giving users the assurance that the new
system will operate as intended is the step that is most important for success.
xvii
4 REFERENCES
Tanenbaum, A. S., & Wetherall, D. J. (2011). Computer networks (5th ed.). Pearson.
Stevens, W. R., Fenner, B., & Rudoff, A. M. (2004). UNIX network programming (3rd
ed.). Addison-Wesley.
Donahoo, M. J., & Calvert, K. L. (2009). TCP/IP sockets in C: Practical guide for
programmers (2nd ed.). Morgan Kaufmann.
Stevens, W. R., & Wright, G. R. (2020). TCP/IP illustrated, volume 1: The protocols
(2nd ed.). Addison-Wesley.
Peterson, L. L., & Davie, B. S. (2011). Computer networks: A systems approach (5th
ed.). Morgan Kaufmann.
Ligus, S. (2017). Effective monitoring and alerting: For web operations. O'Reilly
Media.
Turnbull, J., Mesnil, J., & Caune, P. (2021). The art of monitoring. Pragmatic
Bookshelf.
xviii
Oden, P. W. (2019). Pro SNMP and SNMPv3: How to install, configure, and manage
SNMP to solve real-world problems (2nd ed.). Apress.
Murphy, N. R., Beyer, B., Jones, C., Petoff, J., & Niemoller, C. (2020). Site reliability
engineering: How Google runs production systems. O'Reilly Media.
Kim, G., Behr, K., & Spafford, G. (2013). The phoenix project: A novel about IT,
DevOps, and helping your business win. IT Revolution Press.
Humble, J., & Farley, D. (2010). Continuous delivery: Reliable software releases
through build, test, and deployment automation. Addison-Wesley.
Wang, C., Wei, G., Chen, M., & Wan, J. (2020). Deep reinforcement learning for
network management and security. Springer.
Luo, S., Yu, F. R., Ji, H., & Leung, V. C. M. (2020). Cognitive mobile virtual network
operator games. Springer.
Sun, Y., Peng, M., Zhou, X., Huang, J., & Mao, S. (2020). Management and security
technologies for cloud computing, IoT and big data. Springer.
Tang, S., Zheng, J., Zhang, X., Sandrasegaran, K., Kong, X., Wu, C., ... & Lin, C. (2021).
Wireless AI: Algorithms for intelligent wireless networks. Springer.
Detti, A., Boutaba, R., Alfouzan, F., Shahriar, N., Yamada, S., & Moreira, W. (2022).
Network management in beyond 5G mobile networks. Springer.
Xu, A., & Daras, P. (Eds.). (2022). Intelligent systems and applications. Springer.
Dobre, C., & Xhafa, F. (Eds.). (2021). Intelligent data-centric systems. Academic
Press.
xix