WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

Design , implementation and management of secured lan

( Télécharger le fichier original )
par Eliud Ir. Eliud Aganze
Jomokenyatta university of agriculture and technology - B.sc information technology 2014
  

précédent sommaire suivant

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

2.30. 5.3.3 Network security and management design

Network security involved the implementation of the following services;

ü Port shut down: this service allow to shut unused port of the switch, the purpose is block any sniffing by unauthorized users.

ü Implementation of switch and router authentication and identification which allows only authorized user to access, make changes and make configuration at remote location or locally.

ü Implementation of access list control to assign privilege to authorized uses to access and perform task according to privilege assigned.

Management design involve the following services;

ü Creation of web based application to deal with request of users and provide them solution.

ü Implementation of secured telnet of all switches in network to allow easy troubleshooting and maintenance.

2.31. 5.4.0 System design of Jkuat network management online

2.32. 5.4.0.1 Introduction

System Design is a process of designing how the intended system will look like once it becomes operational. It is meant to produce a design specification for the new system.

In system design, I specified in detail how the parts of the system would be implemented.

I used the Object Oriented Analysis and Design (OOAD) approach. This is because it provides a way of thinking about a problem using real world concepts instead of using adhoc function concepts.

The major benefits of using OOAD are:

i) It promotes better understanding of user requirements.

ii) It leads to cleaner designs.

iii) There is design flexibility.

iv) Decomposition of the system is consistent.

v) Software can be reused.

vi) It facilitates easy maintenance.

vii) There is implementation flexibility

The object oriented (OO) methodology has 3 elements namely; notation, process and Tools.

a) Notation

This is a collection of graphical symbols for expressing the model of the system.

The Unified Modeling Language (UML) provides a very robust set of notation which grows from analysis to design.

The UML is mainly a collection of graphical notations that methods use to express the designs.

The UML is also used for visualizing, specifying, constructing, and documenting the artifacts of a software system.

The advantages of UML are that:

i) It captures the business processes.

ii) It enhances communication and ensures the right communication.

iii) It has the capability to capture the logical architecture independent of the implementation language.

iv) It enables reuse of design.

The UML refers to things like classes, components, relationships, packages, etc.

b) Process / Method

A process is an extensive set of guidelines that addresses the technical and organizational aspects of software development focusing on requirements, analysis and design.

Process basically encapsulates the activities leading to the orderly construction of a system model.

c) Tools.

A tool is automated support for every stage of the SDLC.

It helps the designer in creating designs much more quickly.

Tools support validations like consistency checking, completeness checking and constraint checking.

Tools also help in code generation, reverse engineering, round trip engineering, conversion from SSAD to OOAD, quick documentation, etc.

The tools used included UMLDiagrammer, White star UML and Microsoft Visio 2013.

Models Object Oriented Development

There are 4 + 1 views of the OO model. These views are:

o The process view

o Deployment View

o Logical View

o Dynamic View +

o Use Case View

For each dimension, a number of diagrams are defined that denote a view of the system's model.

The use case is central since its contents drive the development of other views.

précédent sommaire suivant






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Aux âmes bien nées, la valeur n'attend point le nombre des années"   Corneille