You are on page 1of 4

REVIEW OF RELATED LITERATURE AND STUDIES

Related Literature

According to Shema (2019), a school management system is aimed at

improving the quality of a school’s performance. From the perspective of

educational administration, the concept of school management represents the

process of professional, comprehensive, and sustainable school governance that

aims to provide quality educational opportunities suitable to the needs, potential,

talent, and interests of the students, and that are relevant to local, national, and

international demands, adequate and inclusive, i.e. without discrimination,

holistically no fragmentary towards a total and perfect development. Every level

and type of education unit has its unique function relevant to the development of

the students. (https://rb.gy/5ufcjk)

According to Rochim et al (2019), device monitoring is an important thing

to manage networks. Information-related network states or conditions can be

gathered through device monitoring for administrators to take decisions regarding

occurring events. Logs can be useful information to monitor network devices. The

network administrator of Diponegoro University needs a centralize the logs, so

that can receive, manage, and analyze logs. This research identifies the

functional requirements of the log management system. DSR Method was used

to design the topology and software of the log management system. The next

step is the implementation of the topology, software, and application. The last

step is testing the system and log management application. (https://rb.gy/q1gysj)


According to Ahmad (2021), a computing environment requires a robust

and comprehensive process to track and document user activities to uphold

confidence in the system. Audit logs are used for this purpose to monitor the

actions of administrators and users. However, these logs are vulnerable to

multidimensional attacks, including modification of logs, erasability of logs, and

privacy of the user. Since administrators have unprecedented access to these

logs, they can modify, delete, and even destroy them. Securing these logs

against malicious activities is the prime requirement of audit log management.

Existing schemes have several limitations, including immutability, computational

expensiveness, missing semantics, and are not verifiable. Various schemes have

been proposed for this purpose, but a standard method is required to structure

heterogeneous logs and their security semantically. (https://rb.gy/wcw1wn)

According to Abreu and Almada (2020), logs are a crucial piece of any

system and give a helpful insight into what it is doing as well as what happened

in case of failure. Every process running on a system generates logs in some

format. Generally, these logs are written to local storage resources. As systems

evolved, the number of logs to analyze increased, and, as a consequence of this

progress, there was the need of having a standardized log format, minimizing

dependencies and making the analysis process easier. The application

engineer’s development process is comprised of several applications and

programs, each having its logging system. Log entries generated by different

applications are kept in separate storage systems. If a developer or administrator

wants to troubleshoot an issue that includes several applications, he/she would


have to go to different database systems or locations to collect the logs and

correlate them across several requests. This is a tiresome process and if the

environment is auto-scaled, then troubleshooting an issue is inconceivable. This

project aimed to solve these problems by creating a Centralized Log

Management System that was capable of handling logs from a variety of

sources, as well as providing services that will help developers and

administrators better understand the different affected environments.

(https://rb.gy/6efkmw)

Related Studies

The study by Roy Anupam (2018) entitled "School Management System"

(SCMS) stated that Education is the key to unlocking the golden door of freedom.

After parents, this is a teacher who guides children on the path to success. At

this current age of education in most places, Bangladesh is felled behind in many

expectations. Among many reasons, one is a lack of communication between

teachers and parents. SCMS will help to smoother and make it more effective by

sharing performance information about the student on daily basis.

(https://rb.gy/mb4gbo)

Chao-Tung Yang et. al (2019) conducted a study on the “Log

Management System” that is essential for the network administrator. With a log

management tool, we can collect, store, analyze, archive, and finally dispose of

the log information. In this paper, we propose the architecture model of a log

management system using ELK Stack with Ceph to provide a safe network, good
Wi-Fi signal strength, and adequate backup data mechanism. In this case, we

use our campus data of Wi-Fi log and NetFlow log. First, we collect and store

data of our Wi-Fi log using the Filebeats tool, and then, we use Elasticsearch,

Logstash, and Kibana Stack to visualize the Wi-Fi log data. Second, we collect

and store our NetFlow log using NFDUMP, and then, we also use ELK Stack to

visualize the NetFlow log data. Third, we integrate the Wi-Fi log and NetFlow log

data in one architecture using a distributed storage Ceph file system (CephFS).

Moreover, we also compare the performance of RADOS Gateway and CephFS

for a better storage mechanism. (https://rb.gy/uegfis)

You might also like