• Format: ms-word (doc)
  • Pages: 39
  • Chapter 1 to 5
  • With abstract, reference and questionnaire
  • Preview Chapter 1 below

 5,000

THE EFFECT OF NETWORK JAVA ON COMMUNICATION SYSTEM IN NIGERIA ( A CASE STUDY OF NIGERIA COMMUNICATION COMMISSION, ABUJA)

TABLE OF CONTENTS
DECLARATION i
CERTIFICATION ii
DEDICATION iii
ACKNOWLEDGEMENT iv
TABLE OF CONTENTS v
CHAPTER ONE 1
INTRODUCTION 1
1.1 BACKGROUND OF THE STUDY 1
1.2 STATEMENT OF PROBLEM 1
1.3 MOTIVATION OF THE STUDY 2
1.4 AIM AND OBJECTIVES OF STUDY 2
1.4.1 AIMS OF THE STUDY 2
1.4.2 OBJECTIVES OF THE STUDY 2
1.5 RESEARCH QUESTIONS 2
1.6 SCOPE AND LIMITATION OF THE STUDY 3
1.7 SIGNIFICANCE OF THE STUDY 3
1.8 ORGANISATION OF THE CHAPTERS 3
CHAPTER TWO
LITERATURE REVIEW 4
2.1 HISTORY OF COMPUTER NETWORKING 4
2.2 MODERN ERA NETWORKING 7
2.3 JAVA NETWORKING 7
CHAPTER THREE
SYSTEM DESIGN 11
1.1 ANALYSIS OF THE EXISTING SYSTEM AND HOW IT WORKS 11
1.2 LIMITATIONS OF THE EXISTING SYSTEM 12
3.2.1 HARDWARE REQUIREMENTS 13
3.2.2 SOFTWARE REQUIREMENTS 14
1.3 SYSTEM DESIGN APPLICATION 14
1.4 ALGORITHM USED 14
1.5 SYSTEM DESIGN PHASES/PROCESS 15
1.6 DATA AND CONTENT MONITORING 15
3.7 NETWORK BEHAVIOUR MONITORING 16
3.8 REAL TIME MONITORING 16
CHAPTER FOUR
SYSTEM IMPLEMENTATION AND TESTING 18
4.1 IMPLEMENTATION 18
4.2 CHOICE OF PROGRAMMING LANGUAGE 18
4.2.1 ADVANTAGE FOR CHOOSING THE LANGUAGE 18
4.3 SOFTWARE TESTING 19
4.4 HOW THE SOFTWARE WORK 19
4.5 SECURITY FEATURES 19
4.5.1 CONFIDENTIALITY 19
4.5.2 KEY ESTABLISHMENT 20
4.5.3 ENCRYPTION AND DECRYPTION 20
4.5.4 INTEGRITY 20
4.5.6 MESSAGE AUTHENTICATION CODES 21
4.5.7 AUTHENTICATION 21
4.5.8 PASSWORD AUTHENTICATION 21
4.5.9 SIGNING AND VERIFICATION 22
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS 23
5.1 SUMMARY 23
5.2 CONCLUSION 23
5.3 RECOMMENDATION AND SUGGESTIONS FOR FURTHER WORKING 24
REFERENCES 25
QUESTIONNAIRE 29

CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE STUDY
The study is based on the general networking architecture of large public and private institutions. In the early days of networking as we know it, there was not a huge demand for the use of programming languages to control the network architecture. In this study we would be exploring the Java programming language and the adequate algorithm to achieve a more efficient communications system.
Specifically, the focus would be on the Nigerian system with the Nigerian Communications Commission and the subsequent effect of its implementation.
Java Networking is a notion of connecting two or more computing devices together to share the resources. Java program communicates over the network at the application layer of the OSI model. The java.net package in the java JDK library is useful for all the Java networking classes and interfaces.

1.2 STATEMENT OF PROBLEM
There is a need for an efficient and effective system with so much ease and cross platform in order to adequately improve the nature and the performance of the system. An emphasis will also be on the security aspect of the network system.
In this system we would be building a chat system using the concept of java network socket programming.

1.3 MOTIVATION OF THE STUDY
This study was motivated by the fact that the world in general is moving persistently towards technological which have to be secured because most of these applications collect information which has potential for vulnerability. It is also to put an end to or at least reduce to the barest minimum instances of cyber crime

1.4 AIM AND OBJECTIVES OF STUDY
1.4.1 AIMS OF THE STUDY
The aims of the study include;
1. Design of a Java networking based Communications system
2. Test the new system and gather feedback from that.

1.4.2 OBJECTIVES OF THE STUDY
The objectives of the study include;
1. Carrying out a study on the background of computer networks.
2. Exploring the previous work done on this field of research.
3. Finding and using the optimum algorithm to effectively and efficiently communicate over the server.

1.5 RESEARCH QUESTIONS
The study endeavors to answer the following research questions:
1. Is the system able to connect and stay linked to the existing network?
2. Is the system effective for the purpose of text messaging?
3. Is the system resources readily available and accessible?
4. Is the system easy to use by the users?

1.6 SCOPE AND LIMITATION OF THE STUDY
The scope of the study is limited to the Communications department of the Nigerian Communications Commission. The feedback for the success of the implementation will be gotten from the main users of the platform
The limitation is simply that there would not necessarily be a widespread scope of study in order to more accurately gauge user feedback.

1.7 SIGNIFICANCE OF THE STUDY
The study is significant in the sense that it would provide a platform for the prevention and possible proffering of solutions to the problems of cyber crime in a forensic manner.

1.8 ORGANISATION OF THE CHAPTERS
The project is organized such that; Chapter One gives a brief introduction in form of the Background of the Study of computer network systems. In Chapter Two, we’ve a broad check out the related implementations of computer network systems. Chapter Three examines the System Architecture, the system design and analysis. Chapter Four presents the implementation of the project using necessary programming languages and development models. It also presents the result of testing carried out. Chapter Five rounds off the project work with the summary, conclusions and recommendations for future works.

GET THE COMPLETE PROJECT»

Do you need help? Talk to us right now: (+234) 08060082010, 08107932631 (Call/WhatsApp). Email: [email protected].

IF YOU CAN'T FIND YOUR TOPIC, CLICK HERE TO HIRE A WRITER»

Disclaimer: This PDF Material Content is Developed by the copyright owner to Serve as a RESEARCH GUIDE for Students to Conduct Academic Research.

You are allowed to use the original PDF Research Material Guide you will receive in the following ways:

1. As a source for additional understanding of the project topic.

2. As a source for ideas for you own academic research work (if properly referenced).

3. For PROPER paraphrasing ( see your school definition of plagiarism and acceptable paraphrase).

4. Direct citing ( if referenced properly).

Thank you so much for your respect for the authors copyright.

Do you need help? Talk to us right now: (+234) 08060082010, 08107932631 (Call/WhatsApp). Email: [email protected].

//
Welcome! My name is Damaris I am online and ready to help you via WhatsApp chat. Let me know if you need my assistance.