Read More.

Call for Paper - December – 2022 Edition   

(SJIF Impact Factor: 5.966) (IJIFACTOR 3.8, RANKING: A+) (PIF: 3.460)

IJATCA solicits original research papers for the December – 2022 Edition.
Last date of manuscript submission is December 30, 2022.

                                                   

Modeling Agent-Based Network Monitoring Application using UML


Volume: 4 Issue: 4
Year of Publication: 2017
Authors: Ojieabu C. E., John-Otumu A. M., Oshoiribhor E. O.



Abstract

Network monitoring applications are becoming critical systemsand increasingly complex to manage. To help manage this complexity, the application needs to be modeled properly in order to understand its challenges and possible solutions to adopt. Unified Modeling Language (UML) is the standard language for modeling software intensive systems like network monitor applications. In this paper, we used the use-case, sequence, and state chart diagrams to model our design user interface interactions, internal mechanisms behavior and application state. UML is recommended for software architects, application developers and researchers in the field of software engineering for vital technical documentations.

References

  1. Imianvan, A. A. (2009). Development of Mobile Agent for Evaluating the Use of Bandwidth in a Computer Network, PhD Thesis, Department of Computer Science, Federal University of Technology, Akure. In (Akinyokun, O. C., Ekuewa, J. B., and Arekete, S. A., 2014) Development of agent-based system for monitoring software resources in a network environment, Artificial Intelligence Research, Published by Sciedu Press, Vol. 3, No. 3

  2. Arekete, S. A. (2013). Development of a Mobile Agent for Monitoring and Evaluation of Activities of Users in a Network Environment, PhD Thesis, Department of Computer Science, Federal University of Technology, Akure, In (Akinyokun, O. C., Ekuewa, J. B., and Arekete, S. A., 2014) Development of agent-based system for monitoring software resources in a network environment, Artificial Intelligence Research, Published by Sciedu Press, Vol. 3, No. 3

  3. Akinyokun, O. C., Ekuewa, J. B., and Arekete, S. A. (2014). Development of agent-based system for monitoring software resources in a network environment, Artificial Intelligence Research, Published by Sciedu Press, Vol. 3, No. 3

  4. Jailani, N., & Patel, A. (1998). FMS: A computer network fault management system based on the OSI standards. Malaysian Journal of Computer Science, 11(1), 22-31.

  5. Gherbi, A., and Khendek, F. (2006): UML Profiles forReal-Time Systems and their Applications, Journal of Object Technology, vol. 5, no. 4,May-June 2006, pages 149-169,http://www.jot.fm/ issues/issues 2006 05/article5

  6. Kaur, A. and Arora, R. (2012). Application of UML in Real-Time Embedded Systems. International Journal of Software Engineering & Applications (IJSEA), Vol.3, No.2, March 2012

  7. Riccobene, E., Scandurra, P.,Rosti, A., and Bocchio, S. (2005). "A SoC Design Methodology Involving aUML 2.0 Profile for SystemC", In Proceedings Design, Automation and Test in Europe.

  8. Schattkowsky, T. and Muller, W. (2004). "Model-Based Design of Embedded Systems", Proceedings of 7th IEEE International. Symposium on Object-Oriented Real-Time Distributed Computing.

  9. Zakaria, N. A., Kimura, M., Matsumoto, N., and Yoshida, N. (2009). "Stepwise Refinement in Executable-UMLfor Embedded System Design: A Preliminary Study", World Academy of Science, Engineering and Technology.

  10. Wang, G. (2009). "Modeling C-based Embedded System using UML Design" Proceedings of IEEE International Conference on Mechatronics and Automation.

  11. Conallen, J. (1999).Modeling Web Application Architectures with UML, Rational Software. Communications of theACM.volume 42, number 10.

  12. Scott, K. (2001). UML Explained. Boston, Massachusetts, Addison-Wesley.

  13. Fowler, M. (2000). UML Distilled. Reading, Massachusetts, Addison Wesley.

Keywords

Agent-based, Network monitor, UML, Modeling.




© 2022 International Journal of Advanced Trends in Computer Applications
Foundation of Computer Applications (FCA), All right reserved.
Vision & Mission | Privacy Policy | Terms and Conditions