Professional Documents
Culture Documents
ALIM KARGBO…………………………………….…...905002415
YEAR 2023
MAY 2023
i|Page
DECLARATION
We hereby declare that except the work of other researchers which are duly
referenced, this submission is the result of my own work under the supervision
of Mr. Abass and that this has neither been presented in whole nor part
elsewhere for the award of any other degree or diploma of a university or other
institution of higher learning.
Names:
Osman H. Kamara , 905002414
Signature……………………. Date……………………
Abu Bakarr S Turay, 905002413
Signature………………………. Date……………………
Alim Kargbo, 905002415
Signature………………………… Date……………………
ii | P a g e
ABSTRACT
iii | P a g e
ACKNOWLEDGEMENT
We are very grateful to God Almighty for been there for we throughout our
studies. Without God, this work would have not been a success as he gave,
we the strength and courage required in every step during our study and
also for long life and good health. To him we give honor, praise and glory.
We sincerely express special thanks to our energetic supervisor for his
guidance, understanding, and patience and most importantly, he has
provided positive encouragement and warm spirit to finish this study. It has
been a great pleasure and honor to have him as my supervisor. We must
express our sincere gratitude to all the lecturers in the faculty of information
communication technology, Limkokwing University of Creative Technology
for their guidance and knowledge they inculcate in we. Special thanks to all
my friends for their moral support, especially Joshua Yarjah we would like to
thank everybody who was important to the successful realization of this
Project, as well as expressing my apology that we could not mention
personally one by one. God shower his blessing on you all. Finally, in term of
any error or lapses found in this work I whole heartedly take full
responsibility
iv | P a g e
TABLE OF CONTENT
DECLARATION.....................................................................................................................ii
ABSTRACT............................................................................................................................ iii
ACKNOWLEDGEMENT......................................................................................................iii
LIST OF FIGURES.................................................................................................................5
LIST OF TABLES...................................................................................................................6
LIST OF APPENDICES......................................................................................................7
1.1 Introduction................................................................................................................8
1.2 Background of the study..........................................................................................10
1.2.1 Background of organisation..............................................................................8
1.2.2 Organizational Structure...................................................................................9
1.2.3 Vision...................................................................................................................9
1.2.4 Mission Statement..............................................................................................9
1.3 Problem Statement Problem Definition...................................................................9
1.4 Project Aim.................................................................................................................9
1.5 Objectives..................................................................................................................10
1.6 Methods and Instruments........................................................................................10
1.7 Project Justification.................................................................................................10
1.8 Analysis of Feasibility..............................................................................................13
1.8.1 Technical Feasibility........................................................................................13
1.8.2 Economic Feasibility........................................................................................15
1.8.3 Social Feasibility...............................................................................................16
1.8.4 Operational Feasibility....................................................................................16
1.9 Risk Analysis.............................................................................................................17
1.10 Work Plan.................................................................................................................18
v|Page
2.5 Evaluation of Alternatives.......................................................................................25
2.5.1 Outsourcing......................................................................................................25
2.5.2 Improvement of current system......................................................................26
2.5.3 Development.....................................................................................................26
2.6 Requirements Analysis............................................................................................27
2.6.1 Functional Requirements................................................................................27
2.6.2 Functional Requirements................................................................................28
2.6.3 Non-Functional Requirements........................................................................29
2.7 Conclusion.................................................................................................................29
3. CHAPTER FOUR: SYSTEM DESIGN.......................................................................30
3.1 INTRODUCTION....................................................................................................30
3.2 SYSTEM DESIGN...................................................................................................30
3.3 ARCHITECTURAL DESIGN................................................................................32
3.4 User Interface design...............................................................................................34
3.4.1 Menu Design.....................................................................................................34
3.4.2 Input Design......................................................................................................35
3.4.3 Output Design...................................................................................................36
3.5 PROCESS DESIGN.................................................................................................36
3.6 PROGRAM DESIGN..............................................................................................37
3.6.1 Class Diagram...................................................................................................38
3.6.2 Sequence Diagram............................................................................................39
3.6.3 Collaboration....................................................................................................40
3.6.4 Pseudocode........................................................................................................40
3.7 DATABASE DESIGN..............................................................................................42
3.8 SECURITY DESIGN...............................................................................................45
3.9 BACKUP DESIGN...................................................................................................46
vi | P a g e
lOMoARcPSD|26463657
7|Page
lOMoARcPSD|26463657
Chapter 1:
Introduction
8|Page
lOMoARcPSD|26463657
rather than reactive, administrators need to monitor traffic movement and performance
throughout the network and verify that security breaches do not occur within the
network.
When a network failure occurs, monitoring agents have to detect, isolate, and correct
malfunctions in the network and possibly recover the failure. Commonly, the agents
should warn the administrators to fix the problems within a minute. With the stable
network, the administrators' jobs remain to monitor constantly if there is a threat from
either inside or outside network. Moreover, they have to regularly check the network
performance if the network devices are overloaded. Before a failure due to the
overload, information about network usage can be used to make a network plan for
shortterm and long-term future improvement.
Networks have improved from connection between a few appliances to connecting
number of appliances in various LANS, which lead to emergence of internet
technology. Internet technology has become very important as businesses heavily rely
on it. Proactive monitoring of interconnected devices has become so vital in the
internet service provision business, hence the need for network monitoring systems by
organizations. The term Network Management refers to monitoring and controlling the
connected devices in a particular network. There is a requirement to have a real time
performance and agentless monitoring system that alerts and reports outages,
latencies and packet losses for Internet Service Providers backbone devices. This
project seeks to address all those above-mentioned requirements.
Network monitoring takes note of slow or failing systems and notifies the network
administrator of such occurrences. Such notifications can take the form of email
massage, page alerts, or plain old phone calls. No matter what form they take, network
problem massage should take the highest priority. Network monitoring should be
running while other systems are performing their functions that is vital. As computer
networks grow in size, both physically and geographically day by day, more scalable
solutions for network administration are becoming necessary to monitor bandwidth
usage, report and resolve network failures and analyzing user activity. The proper
solution may support system administrators to make decisions for their future
9|Page
lOMoARcPSD|26463657
expansions, preventing system failures and maintaining efficient internet band width.
Background
This research to think of better ways of getting reports, alerts, and statistics of its
backbone network devices. At the present moment outages are going unnoticed for
hours, there is no system to check quality of connectivity. The researcher desires to
come up with a system that collects ICMP stats, analyses, alerts, as well as reporting
outages to the network and system administrators. Time consumed to do manual pings
and reports will be a thing of the past once this system is successfully implemented. All
in all, the author would want to transform this organization into a modern Internet
Service Provider (ISP) like the likes of Afcon, IPtell, Orang and Africell which has
automated Systems
that reduces workload at the same time improving efficiency and effectiveness.
Networking and IT Professionals today have a tremendous responsibility when it comes
to managing the network of a higher-education campus or organization. The massive
growth of stored data (and the need to share it) is constantly placing pressure on an
already over-stressed network. The unpredictable student user base is prone to network
misuse and security breaches. Educators are looking to further leverage networked-
based learning tools and streaming video. Campus administrators are adding new
applications while demanding more and more remote accessibility; and campus legal
departments are anxious to ensure that campus networks are meeting all government
and other security and privacy regulations and compliancy—while constantly making
requests for network usage reports and other network activity to assist in copyright
protection efforts. The growing dependence on networks for everyday tasks has created
the demand for high performance; reliable networks thereby making companies invest a
lot on research on improving the networks and new designs. Part of achieving the goal
of high performance is active monitoring of networks to help in the identification and
prevention of network errors. Many tools have emerged to aid in performance
monitoring of networks. The most common class of tools is based on the Simple
10 | P a g e
lOMoARcPSD|26463657
Network Management Protocol (SNMP), a protocol for sending and transmitting network
performance information on IP networks. Other types of network performance
monitoring tools include packet sniffers, flow monitors and application monitors.
11 | P a g e
lOMoARcPSD|26463657
Problem Statement
This research is aimed at confirming the assertions that there are no technically enforced
restrictions on what network traffic can go into or out of most networks. There are rules and
regulations which users agree to abide by, but if they choose to ignore these, they are able to
do so. This also makes the network more vulnerable to viruses and advanced hackers of the
21stcentaury. Inappropriate traffic can slow the network down, or even bring it to a complete
shutdown, causing frustration to legitimate users of the network. Illegal traffic, such as pirated
movies and music, can get both the Organizations and the individual users into serious
litigation. To an extent network abuse is inevitable. In most organizations and especially
academic institutions, it is very difficult to impose technical restrictions on network traffic. In
corporate networks ‘acceptable’ traffic can often be clearly defined. This is not the case in
colleges or learning institutions. Almost any port might be required for some reasonable
purpose so simply banning traffic by port would be difficult. Restriction by type would be hard
too – for example peer to peer software is used by research groups for ease of collaboration,
as well as by users sharing copyright material.
Systems and network administrators are burdened with fighting fires when something goes
wrong on the network. They have no information of what may have caused a network failure.
This is more so on computer networks that do not have any high-grade network monitoring
software installed. This scenario is common place in academic institutions because of the
aforementioned reasons. This was the inertia for this research and project development.
12 | P a g e
lOMoARcPSD|26463657
Network Monitoring Systems Monitoring helps network and systems administrators identify
possible issues before they affect business continuity and to find the root cause of problems
when something goes wrong in the network. Be it a small business with less than 50 nodes or
a large enterprise with more than 1000 nodes, continuous monitoring helps to develop and
maintain a high performing network with little downtime. For network monitoring to be a value
addition to a network, the monitoring design should adopt basic principles. For one, a
monitoring system should be comprehensive and cover every aspect of an enterprise, such
as the network and connectivity, systems as well as security. It would also be preferable if the
system provides a single-pane-of-glass view into everything about the network and includes
reporting, problem detection, resolution, and network maintenance. Further, every monitoring
system should provide reports that can cater to a different level of audiences—the network
and systems admin, as well as to management. Most importantly, a monitoring system should
not be too complex to understand and use, nor should it lack basic reporting and drill down
functionalities.
When networks grow and become considerably large such as for the UNZA, it becomes
infeasible for one person to maintain a mental model of the entire network. When this
happens, the network is an unknown entity where faults could occur at any time and not be
detected by network operators. A Network Monitoring System is a software package used to
solve this debacle and diagnose faults on the network. It achieves this by storing an internal
model of what the network is supposed to be and uses this model to evaluate the current
state to the network. This enables the network monitoring system to provide insight into the
otherwise unknown entity. The system also provides performance data on how well the
network is utilized and answers questions regarding economics, i.e. is the network cost
effective and meeting demand? A network monitoring system should be able to monitor all
these occurrences on the network without putting undue load on the devices being monitored.
Not many network monitoring system are able to achieve this feature. Different techniques
can be used by network monitoring system to monitor a network. The rest of this section
focuses on the features required in an ideal network monitoring system and those that should
be provided to produce a general purpose network monitoring system.
13 | P a g e
lOMoARcPSD|26463657
2.1 Introduction
Gill harm (2002) defines planning phase as a sketching out of the work to be
performed. Amid this phase, a group ought to prioritize the undertaking, Figure
a funding and plan, and also a Figure of resources that were needed to come
up with the project. The researcher defines in detail what to build, the personnel
involved in the building, how the solution should be built and when it should be
built. It is in this phase that the researcher works through the design process
and come up with design and architecture. Cost estimates, work plans,
functional specifications and various deliverables were also scheduled in this
phase. The researcher’s goal was to document the solution to a degree which
was produced and deployed in a cost-effective and timely manner. A number of
Methodologies, Cost benefit analysis techniques was used to evaluate if the
project undertaken was profitable in the long run considering the business value
of the system.
Tangible values
The monitoring tool will provide the right level of management reports
needed to keep track of the health of Yaba Tech SL IT environment.
Reduced cost and impact of downtime. Downtime can cause Yaba Tech SL
to lose money, because their network devices directly contribute to revenue
as their core business is to provide Internet services.
The business experiences a return on their investment typically in just a few
months as there will be faster time to resolution and time savings for IT
personal during diagnosing network issues.
Intangible Values:
Improved customer satisfaction, as the first line support is able to detect
down time and alert the network engineers.
14 | P a g e
lOMoARcPSD|26463657
15 | P a g e
lOMoARcPSD|26463657
Software specifications
To ensure the viability of developing the system the below technical aspects
must be evaluated.
16 | P a g e
lOMoARcPSD|26463657
17 | P a g e
lOMoARcPSD|26463657
Year 1 2 3
Benefits Values Values ($us) Values ($us)
($us)
Drop in first line support 2200 2200 2200
team size
Reduced service level 7000 7000 7000
agreements penalty
Expected increase in 6000 7000 8000
revenue
Yearly Total 15200 16200 17200
18 | P a g e
lOMoARcPSD|26463657
19 | P a g e
lOMoARcPSD|26463657
System administrators: They are also advocating for this option since it
will bring ease to the analysis of client data for decision making as well as
enabling them to be proactive.
First level support: It will be much quicker to detect outages and reduces
time wasted troubleshooting.
20 | P a g e
lOMoARcPSD|26463657
21 | P a g e
lOMoARcPSD|26463657
Technical Risks
There is a risk that the system may not meet the user requirements in that
users might find it difficult to maintain the system or restore it in the event of a
crash.
Activi 1 2 3 4 5 6 7 8 9
ty/
We
ek
Project
Analysis
Project
Design
Coding/Co
nstruction
Testing
Implement
ation
Maintenan
ce
Sign-Off
Document
a
tion
2.6 Conclusion
To reach an informed choice numerous feasibility studies were done these
included the technical feasibility, operational feasibility, economic feasibility as
well as the organizational feasibility. Within the economic feasibility the cost
benefit analysis was conducted using the Net Present Value (NPV), Payback
period and Return on Investment (ROI). In any of the instances the project was
noble. In a bid to have a balance of judgement risks were explored and
mitigating measures were subscribed to allay the impact of the stated risks.
22 | P a g e
lOMoARcPSD|26463657
23 | P a g e
lOMoARcPSD|26463657
Personal Interviews
Interview involves a direct conversation between two or more individuals
concerning a certain topic (Sauter, 2013). An interview consists of the interview
which is the one being asking questions to the other part and the interviewee
providing answers. To add, interviews enable direct interaction that is, face to
face meeting with the participants of existing system (Kvale 1996). The
researcher implements the following steps when conducting interviews at Yaba
Tech SL Makeni branch:
Selecting individuals to be interviewed
Designing questions to be answered.
Interview process
Selecting Individuals to be interviewed: individuals were chosen based on
their influence and relevance in the network monitoring system being used by
the organization.
Designing questions for the interview: The analyst drafts the questions that
need to be answered. The transcript of questions for the interview conducted is
found in the appendix section.
Interview process: Individuals to be interviewed were selected and the
questions were designed then, the interviews were conducted. Individuals who
were willing to provide reliable information and understand the operations of the
existing system were interviewed.
Advantages of interviews
The method was quick and precise since collection of information was noted
down as it was said.
It allowed the analyst to take note of social cues from interviewees such as body
language and facial expressions, thus gathered data from merely observing the
cues.
It also allowed for probing of answers quickly through direct questioning.
The interviewer was given room for motivating his interviewee so that they
respond freely and honestly.
Disadvantages of interviews
Interviews were time consuming to recruit and conduct
As a result of timing and travel, interviews were expensive
Information from the respondents was captured manually, hence more work
and time consumed.
24 | P a g e
lOMoARcPSD|26463657
2.8.2 Inputs
This is the data that is put into the current technical support, network and system
engineers.
Network device details such as IP address and description or name.
25 | P a g e
lOMoARcPSD|26463657
26 | P a g e
lOMoARcPSD|26463657
2.8.3 Processes
Manually performing pings and traceroutes at random periods to check
network device status.
Recording uptime statistics of network devices on excel sheets.
2.8.4 Output
Recorded network devices details.
Recorded uptime statistics of network devices
Network
Escalates to Engineers and Engineer
First line manually records incident
support
Checks uptime or 0:
downtime
Checks for historical
of network devices through
Manual Database system data in manual
pings and traces
database
Troubleshoo
t
and fix the
problem Closes the
incident
Network Engineer
In the diagram above the first line support team periodically checks the network
device status through manual pings and notifies the network engineers if the devices
are not reachable. An outage report with start time is recorded in a manual database
and immediately escalated to network engineers. The network engineer
troubleshoots, fixes the problem and records the end time of the outage, cause and
solution that was implemented to fix the fault. The network engineer is also
27 | P a g e
lOMoARcPSD|26463657
28 | P a g e
lOMoARcPSD|26463657
2.10.1 Outsourcing
Outsourcing is defined as the organizational practice of contracting for services from
an external entity while retaining control over assets and oversight of the services
being outsourced (National Academy Press, 2000).
Outsourcing companies or big agencies will typically ask business owners to sign
lengthy contractual agreements, and they will include plenty of fine print. If terms are
not carefully understood there are chances of getting hit with unexpected costs (C.H.
LOK, 2017).
Disadvantages of Outsourcing
It is expensive.
External solutions may not provide specified solutions to tackle organizational goals.
High possibility of no access to the source code.
Employees are trained to such an extent that there will be need to call them
again when problems occur.
29 | P a g e
lOMoARcPSD|26463657
30 | P a g e
lOMoARcPSD|26463657
2.10.3 Development
Developing a software package proves to offer more benefits to the organization as
compared to outsourcing. The project has already proved feasible with the benefits
out weighing the costs. The company will certainly be able to proactively monitor
devices availability as well as having access to historical trends that are related to
network devices availability.
Benefits of Development
It is less costly as it is being done by people who are already under the company
payroll. Costs incurred in development phase and maintenance stage are mostly
anticipated because of the feasibility study. Outsourcing on the other hand, will
see the company signing lengthy and costly contractual agreements.
There will be less training costs as the system users will be involved in
development. On the other hand, outsourced systems require massive training
and, in most cases, not all details are disclosed as the developer would want
an organization to be dependent on them to attract more charges.
It provides a platform for staff development and gaining experience resulting in
identifying traits held by staff members.
31 | P a g e
lOMoARcPSD|26463657
32 | P a g e
lOMoARcPSD|26463657
Security Requirements
The system will contain confidential information thus system users will have
access that is limited to their respective access level.
The administrator will have access to all the functions of the system.
Technical manager will have access to all reports.
Start
Monitoring
activity
Network Device
Monitoring reports
System
2.12 Conclusion
At this stage in system development, a detailed study and evaluation of the current
system was performed. Fact finding techniques such as interviews and observations
were adopted for obtaining information for the system. This study was aimed at
examining the system’s input, processes and output requirements of the current
system. Context diagram, Dataflow diagram and Activity diagram of the system
where further used to represent the flow of data. Use case diagrams were also used
to show the functionality requirements of the system. When done with the design
then it is needful to convert the design into machine-readable code and finally come
up with a deliverable product.
34 | P a g e
lOMoARcPSD|26463657
35 | P a g e
lOMoARcPSD|26463657
3.1 INTRODUCTION
Having successfully gone through the existing system, and fully understood how it
operates the next step was to design the proposed system. This entails outlining the
procedures that will be taken to develop and configure the incoming system.
Generally, design gives an outline of the System design, Physical Design, System
Architecture, Database Design, Interface Design, Program Design and Test Design.
Physical Design
This was concerned with how the physical or hardware and network components of
the proposed system were going to be laid out and how they were going to be
communicating.
After project completion the following functionalities were offered by the system.
Users were able to instantly detect datacentre devices outages and
immediately trigger sound alarms to alert engineers.
Users were able to perform polling of devices statistics every minute and
generate red flags when the nodes are down.
Users were able to provide periodic historical reports of devices uptime trends.
36 | P a g e
lOMoARcPSD|26463657
Context Diagram
DFD 1
Figure 6 DFD
37 | P a g e
lOMoARcPSD|26463657
DFD 2
Start
Authenticatio
n
IP Subnet Calculator
Figure 7 DFD
3.3 ARCHITECTURAL DESIGN
This is a distributed system model with a set of stand-alone clients (computers) that
access a central monitoring server for services. A network allows the client to access
the services so basically the system will be using a centralized database and
application programs on client computers.
Hardware Architecture
The hardware architecture shows network connectivity layout and various
applications servers that run on the hardware. The star topology is fibre based with a
central switch and two core routers.
38 | P a g e
lOMoARcPSD|26463657
39 | P a g e
lOMoARcPSD|26463657
Software architecture
The essence is to show a diagram on how the major software components relate. It
does not present the programming facets.
40 | P a g e
lOMoARcPSD|26463657
41 | P a g e
lOMoARcPSD|26463657
42 | P a g e
lOMoARcPSD|26463657
43 | P a g e
lOMoARcPSD|26463657
Session
Network services
-Toolname:
-Tool version: String
Monitor -Active: boolen
s
Periodic OnDemand
-Start: date
-PublicKey: String
-Period: time
-miniLatency: time
-Priority: Interger
44 | P a g e
lOMoARcPSD|26463657
Login and
Polling
Authentication
Node/network
Polling data
Data aggregation
State request
Forwarding Node/Network
Aggregated
data State response
Polling data
Protocol translation
Display node / Network state
Polling data
Pushing node
State
Network state
Collaboration
Users
1.Receives alert (Category, Activity)
Monitoring tool
Users
(Category,
Activity)
2. Outage stats
recorded Database
Record Report
45 | P a g e
lOMoARcPSD|26463657
3.6.3 Pseudocode
selected
input server
name input
server ip
input server type
input server
description add
server to database
if edit is selected and user is
admin change server details
if delete is selected and user is
admin delete selected user
if history is selected and user is
admin show graphs
//Add new users to
monitoring else if users
menu is selected
return all users
if add new is
selected input
user name input
name
input user level
input user
password add
user to database
if edit is selected and user is
admin change user details
if delete is selected and user is
admin delete selected user
// view status logs
else if logs menu is
selected return all
status logs
// view config page
else if config menu is selected
set email and page refreshing settings
47 | P a g e
lOMoARcPSD|26463657
The database design is also referred to as the data model. This is normally
represented in three levels namely the external view, conceptual model and the
physical model. This was significantly useful in representing the different database
mappings that could be Utilise in the implementation of the database which was
done in chapter five.
This is the visualisation of entities and its relationship to other entities. There as
entities such as person and suspect. The entities have attributes.
48 | P a g e
lOMoARcPSD|26463657
49 | P a g e
lOMoARcPSD|26463657
Time stamp
Outage ID
Polling
Logged
Outage
Alerts Involved in
Sound
User
Record
Status Name Password
Device Email
Table 5 Session
50 | P a g e
lOMoARcPSD|26463657
outage information
51 | P a g e
lOMoARcPSD|26463657
3.12 Conclusion
When done with the design then it is needful to convert the design into machine-
readable code and finally come up with a deliverable product. The design phase
demarcated the operation of the system in the actual physical environment and it
offers the stipulations of the constituents of the software that are to be developed in
52 | P a g e
lOMoARcPSD|26463657
detail. With the hardware and software requirements have been designated, which
will be used in conjunction with the system, and then the desired system can be
designed. The system has been designed in a manner that provides maintainability,
efficiency, reliability and relative cost reduction.
53 | P a g e
lOMoARcPSD|26463657
4.1 Introduction
The chapter illustrates the implementation of the proposed system based on the
analysis and design presented in the previous chapters. Implementation entails the
translation of the solution model into source code. This means applying the
characteristics, methods of each object and integrating all the system modules of the
system that were stated in the previous chapters. System testing is also done at this
stage; during this stage the loopholes in the system are also identified. After all has
been done then the system moves on to the stage were the system is installed which
is known as the installation phase.
5.2.1.1 Platforms
This encompasses Graphical User Interface (GIU) builders, compliers and class
libraries that were used to develop the system applications. The following are issues
covered under this caption:
It was developed to run on any Microsoft Windows platform but can be integrated
on other platforms.
It is coded using PHP with the implementation of already made objects
(interfaces) as well as inheritance from base classes such as Persons.
54 | P a g e
lOMoARcPSD|26463657
55 | P a g e
lOMoARcPSD|26463657
5.2.1.2 Packages
5.2.1.3 Libraries
Hardware specifications refer to the physical gadgets where the system is going to
reside and run. Types of servers and computers to be used should be known
in advance as some software are not compatible with 64-bit-operating systems
while others works well with 32- bit-operating system. Hardware specifications are
tabulated below: -
56 | P a g e
lOMoARcPSD|26463657
4.3 Testing
Testing plan is the actual testing methods of the purposefulness of the new system
basing on the user requirements documents. Test schedule is necessary in system
development in the sense that it details the process of testing the systems’
functionality as well as showing steps taken to achieve certain results. It also
highlights the anticipated resources, personnel involved, risks coupled with the test
and the to-do list of the testing activities.
Validation is defined as the revelation that the new system implements each of the
user requirements correctly and completely thus the right product was built. The
validation exercise was carried out by the validation team formed from members of
the technical department. The team was armed with a validation project plan
57 | P a g e
lOMoARcPSD|26463657
58 | P a g e
lOMoARcPSD|26463657
Verification
Verification is proof obtained after examining the system processes that specified
requirements have been fulfilled. Software verification is a corroboration that the
output of a particular module of system or subsystem meets all of the input
requirements for that system or subsystem thus the software product was built right.
In this regard the system was verified by using test data. The test data was a
combination of expected (correct) and incorrect data.
59 | P a g e
lOMoARcPSD|26463657
After the system was fully tested it was time for the transition phase. But before the
process was carried out an informed consideration of various choices was to be
made. This was done after a substantial analysis of different conversion styles. Each
is discussed bringing out why it was accepted or rejected.
There were some factors that aided in reaching the decision. The factors included:
Conversion style meant the movement from an old manual detention system to
the newly developed system that could be adopted either progressively or
instantaneously.
Conversion module referred to the scenario where the new system could be
introduced in bits and pieces, thus module by module.
Direct changeover
This is the plunging into the new system. With this method dates of migrating from
the new system would have been announced and the old system abruptly cut-off.
This was not considered due to high risk factors.
Advantages
It consumes little time and energy
economical in terms of cost
Less complex if no problems are experienced.
Disadvantages
Risks involved in adopting this method were relatively high as it could be very
difficult to recover and return to the old system if the
new system had failed.
Phased Changeover
In this method users would have been shifted to the new system province by
province. When one province is up and the system is running without hiccups, the
shift is to another province. This was to be repeated until all Provinces were
connected. This method was not approved.
Advantages
Less overwhelming work all at once.
Experience gained in connecting one province would have facilitated the
60 | P a g e
lOMoARcPSD|26463657
Advantages
Parallel run changeover facilitated the testing of the new system while retaining
the existing one, thus if the new system does not satisfy the organisation’s
strategic goals it is easy to revert back to the old system.
Output could be reconciled.
Disadvantages
The method is costly because of duplication involved of both additional
manpower and other material resources.
Pilot Changeover
With this method the new system would have been first introduced in Harare
Province. Same characteristics of the system were to be setup, run, tested for
functionality and then gradually introduced throughout the rest of the organisation
using any of the changeover methods. Pilot changeover would have enabled the
testing of a system on a smaller-scale in order to avoid possible resource wastage
should a system be found to be undesirable. This was again not considered.
Disadvantages
A very slow method of system changeover.
Cost factor
Cost is another important factor taken into consideration before selecting the
conversion method because some methods require additional staff or material.
Direct conversion is more costly as compared to parallel cutover method whereas
pilot changeover costs are significantly higher when compared to direct changeover
Time factor
Time factor entails the time taken to migrate from the outgoing system to the
incoming system. Direct changeover is the quickest but parallel was the most
efficient.
Training is critical as it bridges the performance gap between what is expected and
the actual output. The system is not difficult to learn as it is a product driven from
legacy a manual system that were being used by the first line technical support and
engineers. They are fully conversant of the operational procedures of the monitoring
system. Their training was really easy. It was discernible and provided the least
challenge. The training was conducted by the developing team.
Training schedules
62 | P a g e
lOMoARcPSD|26463657
System installation refers to migration from the old system to newly developed
system done by developers of the system. Before the transition from the legacy
system testing was done. At each stage the approval to the next stage was granted
by the management and users were involved but not all. After the coding few
functional and non-functional requirements could have been missed therefore it was
imperative to go back to the users.
4.5 Maintenance
Dennis, et al, (2012) defines system maintenance as the process of refining the
system to make sure it continues to meet business needs. In view of this system
there is a relentless need to ensure that the server and network is periodically
reviewed and where adjustments are they are done likewise. The initial
maintenance is carried out first using information gathered during post-
implementation. After the initial maintenance, periodic reviews and users requests if
done and received will call for system maintenance. When the system is aging, the
maintenance frequency will increase thus demanding for high budgets costs on
maintenance and the only way to address this problem is to undertake a new system
development.
63 | P a g e
lOMoARcPSD|26463657
preventative maintenance is carried out, in some point in time in the future whole
system will total breakdown.
Throughput
This is the rate at which successful message delivery or packets are measured.
The system has capability to measure latency of the connection.
Reveals statistics of link quality every minute.
Speed
The system is programmed to provide sound alerts if it does not get ping from
device responses within one minute
The system is programmed to show red flags for any device if it does not
get ping responses within one minute.
Services
The system detects data center devices outages and triggers sound alarms to
alert engineers.
The system performs polling of devices statistics generate red flags when the
nodes are down.
The system provides periodic historical reports of devices uptime trends.
The system automatically measure latency, or the delayed transfer of data.
Security
The system is role based.
Passwords are required to access the system.
4.7 Recommendations
System maintenance and training of the system users should continuously be carried
out.
Strong usernames and passwords should be implemented to enable project
64 | P a g e
lOMoARcPSD|26463657
system security.
The system should be provided with a continuous backup for system
recovery for the event of system failure.
An organization should enforce an information technology system policy to
protect system functionality as well as the company’s information.
4.8 Conclusion
65 | P a g e
lOMoARcPSD|26463657
Reference list
Dennis, et al, (2012), Systems Analysis and Design
Dennis, Mox and Roth (2012) Denis, A. and Wixom B.H, (1999) System
Analysis and Design, 1st Edition, Prentice Hall, London (Britain).
66 | P a g e
lOMoARcPSD|26463657
67 | P a g e
lOMoARcPSD|26463657
The user manual is created to simplify the navigation or use of the system by users,
so it was prepared to provide guidance to the user in the absence of the helpdesk on
how to operate the system. This manual has been designed to assist to assist the
users to get started with this new invention.
To access the site, open the browser and type 127.0.0.1/server and this will direct
you to the system Login page below:
How to login
Valid user login credentials will permit accessibility to the system resources
otherwise an error message will be displayed.
68 | P a g e
lOMoARcPSD|26463657
Upon successful log in, the extension officer is directed to the page below which
shows devices status
69 | P a g e
lOMoARcPSD|26463657
70 | P a g e
lOMoARcPSD|26463657
71 | P a g e
lOMoARcPSD|26463657
Reveals that the device was Reveals that the device was
up down
72 | P a g e
lOMoARcPSD|26463657
73 | P a g e
lOMoARcPSD|26463657
To add new devices on the monitoring tool, Step 1: click add new under
servers as shown below
74 | P a g e
lOMoARcPSD|26463657
Step 2: Insert device details s text boxes as shown below and press save to finish
75 | P a g e
lOMoARcPSD|26463657
76 | P a g e
lOMoARcPSD|26463657
77 | P a g e
lOMoARcPSD|26463657
78 | P a g e