Abstract
Real-time Remote Monitoring and Security System for a Local Area Network Environment
Highlights
Nowadays, computer networks have become a necessity for any business entity
An optimal algorithm was designed with the partition and rank (PAR) scheme when the local events are independent; whereas, when they are dependent, we show that the problem is NPcomplete and develop two efficient heuristics: the PAR for dependent events (PAR-D) and adaptive (Ada) algorithms, which adapt well to changing network conditions and outperform the current state of the art techniques in terms of communication cost
T-test results on the responses provided by the Management Information System’s group on the effectiveness of Real-time Remote Monitoring and Security System as compared with an existing system clearly show that there is no significant difference between the effectiveness of the two systems
Summary
Enterprises employ networks to ensure fast and efficient movement and processing of data and information and to strategically improve services and productivity. In this regard, networks are considered vital business resources and require strict protection from entities that benefit from them. An effective network protection strategy requires constant monitoring of workstations as well as full administrative control to ensure its smooth operation In this context, the term monitoring denotes functions such as determining installed software, identifying unauthorized processes, and detecting inactivity of a given workstation as well as identifying illegal activities that commonly contribute to the breakdown or hampering of a network’s operation. Controlling workstations on the other hand pertains to the administrator’s ability to police each workstation deleting unauthorized software, shutting down inactive nodes to maximize bandwidth, and ending unwanted processes that consume valuable resources
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Information and Communication Technology and Education
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.