PASS 2024 UTME WITHOUT STRESS:- DOWNLOAD and PRACTICE with 2024 UTME CBT APP 📱👈
😂 GUARANTEE|:| STUDY, WORK AND LIVE IN THE UK >>>.:- STUDY IN UK! Here is How to Apply to Study and Work In the United Kingdom in 2024

Transmission Control Protocol/Internet Protocol Monitoring Agent Using Java

Download complete project materials on Transmission Control Protocol/Internet Protocol Monitoring Agent Using Java from chapter one to five with references and abstract

TABLE OF CONTENTS

TITLE PAGE
CERTIFICATION ii
APPROVAL iii
DEDICATION iv
ACKNOWLEDGEMENT v
TABLE OF CONTENTS vi
ABSTRACT viii

CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF STUDY
1.2 SCOPE OF STUDY
1.3 AIMS AND OBJECTIVE OF STUDY
1.4 SIGNIFICANCE OF STUDY
1.5 LIMITATIONS OF STUDY

CHAPTER TWO
LITERATURE REVIEW
2.1 HISTORY OF SOFTWARE AGENTS
2.2 WHAT IS A SOFTWARE AGENT?
2.3 WHAT AGENTS ARE NOT
2.4 TYPES OF AGENT
2.5 MOBILE AGENTS
CHAPTER THREE
SYSTEMS DESIGN AND ANALYSIS
3.0 INTRODUCTION
3.1 EXISTING SYSTEM
3.2 SYSTEM DESIGN OF THE PROPOSED SYSTEM
3.3 SOFTWARE MODELLING
3.4 THE UNIFIED MODELLING LANGUAGE
3.5 DESIGN OF THE AGENT SYSTEM

CHAPTER FOUR
4.1 IMPLEMENTATION
4.2 HARDWARE REQUIREMENT
4.3 SOFTWARE REQUIREMENT
4.4 IMPLEMENTATION OF THE AGENT SYSTEM

4.5 SOFTWARE TESTING
4.6 COMPONENTS OF SOFTWARE TESTING
4.7 TESTING OF THE AGENT SYSTEM

CHAPTER FIVE
5.0 SUMMARY
5.1 RECOMMENDATION
REFRENCES
APPENDIX A
APPENDIX B

ABSTRACT
Transmission control protocol/Internet protocol (TCP/IP) as the language of computer networking in LAN, WAM, MAN had continued to receive tremendous attentions in the heart of software engineering. sharing resources among several computers requires a well tailored or monitored server applications especially in a network system where information must e secured and invulnerable to attackers and hackers.

The introduction of object oriented programming will continue to evolve and create more evolving technology that will soon provide a community of global presence in the world where information will be received at the snap of the fingers.

Organizations had installed in their backbone or server computer applications permit a two-way traffic among several devices connect or hooked up to the organization LAN through a hub or switch.
This project work was carefully analysed and designed to provide a mechanism upon which several computer willing to use specialized server resources must follow a queue of FIFO, where client system will be attended to according to their time of logging on to the server.

CHAPTER ONE
INTRODUCTION
1.1 Background
Agents are specialized kinds of components, offering greater flexibility than traditional components. As will be explained, agents use dynamically adaptable rich message-based interaction, and flexible knowledge-based techniques to make it much easier to build and evolve systems as requirement and technologies change.

The term “agent” describes a software abstraction, an idea, or a concept, similar to OOP terms such as methods, functions, and objects. The concept of an agent provides a convenient and powerful way to describe a complex software entity that is capable of acting with a certain degree of autonomy in order to accomplish tasks on behalf of its user.

But unlike objects, which are defined in terms of methods and attributes, an agent is defined in terms of its behavior. Software agents are an innovative technology designed to support the development of complex, distributed, and heterogeneous information systems. They rely on an infrastructure that provides services and mechanisms, allowing agents to have simpler interfaces and be more composable.

An agent system is composed of components with simple interfaces, but complex behavior results from the messages that the components process and communicate with each other. The agents are only able to communicate with each other because they all conform to some common, well-defined interaction standard.

The agency serves as a “home base” for locating and messaging mobile and detached agents and collecting knowledge about groups of agents Services include agent management, security, communication, persistence, naming, and agent transport in the case of mobile agents.

In addition to basic agent infrastructure and agent communication, a FIPA compliant agent system, such as Zeus (Nwana, 1996), provides additional services in the form of specialized agents residing in some (possibly remote) agency.

Various authors have proposed different definitions of agents, these commonly include concepts such as
• persistence (code is not executed on demand but runs continuously and decides for itself when it should perform some activity)

• autonomy (agents have capabilities of task selection, prioritization, goal-directed behaviour, decision-making without human intervention)

• social ability (agents are able to engage other components through some sort of communication and coordination, they may collaborate on a task)

• reactivity (agents perceive the context in which they operate and react to it appropriately).
The Agent concept is most useful as a tool to analyze systems, not as a prescription. The concepts mentioned above often relate well to the way we naturally think about complex tasks and thus agents can be useful to model such tasks. (“http://en.wikipedia.org/wiki/Software_agent”)

In general,
“An agent can be many things. The broadest accepted definition is that of an entity that acts on, or has the power and authority to act on, behalf of another. An agent can be thought of as a means by which something is accomplished or is caused. In any agent-based model, a human being(or even a non-human agent) may delegate some authority to the agent, which may be “intelligent,” mobile, or both.” (Goff, 2004)

A mobile agent is a composition of computer software and data which is able to migrate (move) from one computer to another autonomously and continue its execution on the destination computer. Mobile Agent, namely, is a type of software agent, with the feature of autonomy, social ability, learning, and most important, mobility.

Mobile agents are the basis of an emerging technology that promises to make it very much easier to design, implement, and maintain distributed systems [White, 1996].

Mobile agents help to reduce network traffic, provide an effective means of overcoming network latency, and perhaps most importantly, through their ability to operate asynchronously and autonomously of the process that created them, help us to construct more robust and fault-tolerant systems.

These software agents called mobile agents are able to migrate from one computer to another computer. Even if the host machine, which launched the agents, is eliminated from the network, the agents can still work. Thus, mobile agents are very powerful programs, which can act even in the absence of the machine that initiated them. After completion of their assigned tasks, the mobile agents return to the host machine to report the results or else they simply terminate.

Thus, a mobile agent is not bound to the system where it begins execution; therefore it has the unique ability to transport itself from one system in a network to another. The ability to travel allows a mobile agent to move to a system that contains an object with which the agent wants to interact, and then to take advantage of being in the same host or network as that object.

Java, the language that changed the Web overnight, offers some unique capabilities that are fueling the development of mobile agent systems. (Lange and Oshima, 1998)

Mobile agent developers implement these solutions in java for several reasons. First and foremost, Java’s in-built Object oriented language features are conducive to agent technology. Secondly, developers can be extremely productive using java. Essentially, Java provides tools that simplify and expedite complex software development tasks. (Byassee, 2002)

It would be an understatement to say that the Java programming language [Arnold and Gosling, 1998] has revolutionized the mobile agent field, we think of it as jet fuel for mobile agents.

1.2 SCOPE OF STUDY
Mobile agents allow code to be able to move from the host to other systems within a network ensuring that the initial state of the agent is saved before it leaves the host computer. They help make robust applications that are able to reduce network bandwidth by sending an agent to remote location where it can execute locally, act autonomously and adapt dynamically to heterogeneously environments.

This project work is intended to detect the systems in the network which are in use or which have been used. For this study I will be using a local area network also called a LAN as it is the best possible considering time constraints and financial constraints.

1.3 AIMS AND OBJECTIVE OF STUDY
1. To design and implement software to monitor systems that log on to a network.
2. To increase the level of security within a network.
3. To monitor the activities of the systems in the network.
4. To enhance the interactions between the systems in the network.

1.4 SIGNIFICANCE OF STUDY
This study helps to provide a mechanism whereby systems willing to connect to a network first submit their IP addresses and the time they got connection. As a result the activities of each system in the network will be monitored thereby making the network more secure as fraudulent acts or unauthorized activities will be easily checked. Also it becomes easier to detect faulty or disconnected systems within the network.

1.5 LIMITATIONS OF STUDY
During the course of this project, some challenges were encountered and they have been itemized below:

1. Financial constraints which made it impossible for me to implement the prototype software with the hardware.
2. The full implementation of the software may not be achieved, considering the time frame to work on the project.

CLICK HERE TO DOWNLOAD THE COMPLETE MATERIAL (CHAPTER 1 -5)

>GUARANTTEE|:| Score 280 Above in 2024 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE:.: GURRANTTEE Score 280 Above in 2022 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE 📱👈
WISH TO STUDY & LIVE in UK?:- STUDY, WORK AND LIVE IN the UK Application Form NOW OUT. Call 08030447894

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.