3.1 Introduction
This section discusses the methodology of the research. The main purpose of the research is to investigate the need of an operating system that focuses on learning for networking student in University Kuala Lumpur Malaysian Institute Information Technology (UniKL MIIT). To access and evaluate the need of Linux operating system among of networking students, a section of Computer and Networking System of UniKL MIIT situated in Jalan Sultan Ismail area with 500 student’s population was chosen. Data for the research were collected through an online questionnaire and testing method.
3.2 Research Instrument
This research utilized quantitative and qualitative research methodology. The instruments used to collect the data were Survey Monkey questionnaire online and User Acceptance Test.
Questionnaires may be in paper form and mailed to participants, delivered in an electronic format via email or an Internet-based program such as SurveyMonkey or a combination of both, giving the participant the option to choose which method is preferred (Ponto et al, 2010). Different question types, such as yes-no, listing or choice, category and open-ended were used in the questionnaire. The different sections of the questionnaire were: 1) demographic information, 2) category of student or lecturers, 3) category of networking section or not, 4) experience about computer 5) prefer the project can be implemented for learning purpose 6) use of the project and opinions.
The qualitative data for the research came from the User Acceptance Test. The testing method was utilized to confirm the findings from the questionnaire as well as to triangulate the data collection methods. Twenty respondents were involved in the User Acceptance Test. Ten questions were prepared after using and testing the operating system. This testing method further explored the acceptance and need of an operating system for educational purpose among of Networking Students in UniKL MIIT. Figure 3.1,3.2,3.3 and 3.4 shows the screenshot of an online questionnaire by Monkey Survey.

Figure 3.1 Opening Screen with Introduction About Projects

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Figure 3.2 Question 1, 2 ; 3

Figure 3.3 Question 4 ; 5

Figure 3.4 Question 6 ; 7
3.3 Respondents of The Study
The respondents of the study were undergraduates’ students from Networking System Section at UniKL MIIT. In August 2018, a web link of Survey Monkey online questionnaire is distributed through chat and social medium. A total of 20 students from Networking System Section at UniKL MIIT answered the online questionnaire. Of these numbers, 6 were male students while the rest (11) were female.

In March 2019, the ISO NetSys Operating System is distributed through pen drive. A total of 15 students from Networking System Section at UniKL MIIT tested the operating system. Of these numbers, 9 were male students while the rest 6 were female.

3.4 Research Procedure
During the actual study, the online questionnaire was distributed through WhatsApp and Facebook of Networking System of UniKL MIIT. Besides, fifteen students were selected to attend the testing session of NetSys Operating System ISO.
3.5 Data Analysis
To analyse the data in Monkey Survey online questionnaire, three variables were taken into consideration which is learning the purpose, the experience of using computers and use of the project. The data will be recorded in Monkey Survey Application. The Results will be presented through frequency and other statistics.
While in the User Acceptance Test, there are five variables will be used to analyze the data which are integration, technical support, the performance of an operating system, usability and security. The analysis of testing data will be recorded into the computer using SPSS software. The results will be presented through percentage or other descriptive statistics.

3.6 Methodology
The methodology chosen in this project is Software Development Life Cycle model as shown in Figure 3.5 This model is suitable for this project because it is related to develop a software or application and do the requirement that needed from networking students. This model has 8 phases:
Initiation phase
Planning Phase
Analysis Phase
Design Phase
Development and Implementation Phase
Integration and Testing Phase
Evaluation Phase
Documentation Phase
-7587572217907Output Phase 7
Demonstration ISO NetSys OS
Analyse whether the project achieve its goal
00Output Phase 7
Demonstration ISO NetSys OS
Analyse whether the project achieve its goal
27519273364392Output Phase 3
Online Questionnaire distributed to the Networking Students
12 research journals had been discovered & 4 related work analyzed00Output Phase 3
Online Questionnaire distributed to the Networking Students
12 research journals had been discovered & 4 related work analyzed23346381945532Output Phase 2
Ubuntu platform has been chosen as the main platform in NetSys OS
00Output Phase 2
Ubuntu platform has been chosen as the main platform in NetSys OS
6177336336706Output phase 5
Installation of Ubuntu and other software
Develop website NetSys OS
00Output phase 5
Installation of Ubuntu and other software
Develop website NetSys OS
-6035074095156Output phase 6
User Acceptance Test of NetSys OS ISO to the Networking Students
00Output phase 6
User Acceptance Test of NetSys OS ISO to the Networking Students
44255185505450Output phase 4
Design NetSys OS’s website, network diagram, the flowchart of NetSys OS and system interface GUI NetSys OS
00Output phase 4
Design NetSys OS’s website, network diagram, the flowchart of NetSys OS and system interface GUI NetSys OS
347199119253Output Phase 1
Selection of project title:
Ubuntu Network Platform for Networking Students
00Output Phase 1
Selection of project title:
Ubuntu Network Platform for Networking Students
-619125294640Output Phase 8
Report has been made
00Output Phase 8
Report has been made

Figure3.5 Software Development Life Cycle (SDLC) with output for each phase

3.6.1 Initiation Phase
At the first phase, there will be a broadly define and submit of review proposal. During the initiation phase, the problem will be identified, a solution is defining, a project is formed and deliver the solution to the users. The title of the project is selected which is about creating Linux Operating System for educational purpose for Networking Students in UniKL MIIT. The title is Ubuntu Platform Network for Networking Students (NetSys OS). The key output will be assisting with the Planning Phase.

3.6.2 Planning Phase
The planning phase begins when the project title is been approved. The stage of the planning phase is the phase involving create a set of plans to guide the project creation will follow the timeline and budget. The project task will be broken down into the specific task and allocate the resources if needed. The requirement of hardware, software and operating system details is required to support in the development phase. Ubuntu platform has been choosing as the main platform in NetSys OS.
3.6.3 Analysis Phase
The requirement analysis phase is the process of determining user expectations for a new or modified product. The requirement must be quantifiable, relevant and detailed. To manage NetSys OS, the research instrument needs to be prepared such as online questionnaire and research of related project to NetSys OS.
3.6.4 Design Phase
In this phase, a formal review of architectural design is conducted prior to detailed design of the application to achieve confidence that the design satisfies the system requirement. The system and software design need to be prepared from the requirement specifications which were already studied in the previous phase. Besides, designation of the system architecture that consists of logical and physical diagram, system interfaces of NetSys OS and website designation. The system design specifications serve as input for the next phase.
3.6.5 Development and Implementation Phase
During the development timeline, all the hardware and software need to be implemented in the project be arranged. In installation and setup task, preparation of all task software and syllabus need to do for the installation process. All tasks must be clear to be carried out the implementation. After all tasks in the development phase are done, the implementation phase will take place. The implementation phase will involve the construction of an actual project. Preparation of coding and programs needed in this phase. In addition, develop website task is important to carry out the task as a backup for ISO NetSys OS. The implementation phase is doing phase and it is important to maintain the momentum.

3.6.6 Integration and Testing Phase
In the integration and testing phase needed to make sure that there are no errors and the software runs how it’s supposed to. In addition, it is to make sure the tests such as testing, and integration are done before releasing the product. The integration phases will involve the integration of software and hardware in NetSys OS. If there are no problems with the project in Integration phase, the project can be proceeding to the Testing phase. The primary purpose of the testing phase is to determine whether the application developed is ready for release to the users. The testing phase in NetSys OS requires a method to test the NetSys OS which is User Acceptance Test. This ISO NetSys OS will be distributed to a group of students to test the effectiveness of NetSys OS.
3.6.7 Evaluation Phase
Evaluation phase is a process that critically examines a program. It involves collecting and analyzing information about a program’s activities, characteristics, and outcomes. The purpose is to make judgments about a program, to improve its effectiveness and to inform programming decisions (Patton, 1987). In NetSys OS, we need to make sure NetSys OS achieve its goal along with the timelines and quality of work.

3.6.8 Documentation Phase
This is the last phase in constructing the project. The conclusions and suggestion can be made after the data analyzed. The final draft will be sent and check by the supervisor.
3.7 Gantt Chart
Figure 3.6 shows the summary project timeline Gantt Chart for this project. The full project scheduling is defined as shown in Appendix. It shows every phase of the project development and schedule of the project to make sure the project meets its goal and completed in time.

Figure 3.6 Summary Gantt Chart

3.8 Work Break Down Structure
Figure 3.7 shows the Work Breakdown Structure (WBS) which contains a level of the work breakdown structure that provides further definition and detail
Figure 3.7 Work Break Down Structurecenter137538Ubuntu Network Platform for Networking Students
00Ubuntu Network Platform for Networking Students


4349777269416Review of architectural design
00Review of architectural design
2722880210590Define methodology
00Define methodology
1264029210820Task Distribution
00Task Distribution
-359856191135Define project title
00Define project title

406616219374-5642043403872723542154940Distribute questionnaire
00Distribute questionnaire
1293211164667Plan for requirements project
00Plan for requirements project
-339968135890Define problem statements
00Define problem statements

40661623223102587557402081089322273035right40208Network Design Layout
00Network Design Layout

-593387391187-321013119407Define objectives
00Define objectives
2762737109652Identify related work
00Identify related work

260670271958126454271728Ubuntu platform as main platform
00Ubuntu platform as main platform
right91602System interface design
00System interface design
-320270412115Define project scope
00Define project scope

405643414970-564204355627277238344342Define project features
00Define project features

436771933044854364166268191644844512098256027822733469856281129429055442901613210798400120623027402821322785210798400-4572004286615-4669283538247-4863832759143-367286203016300-3210134588537Develop a website
00Develop a website
-3404684004877Install Ubuntu & System Back
00Install Ubuntu & System Back
-3404683148843Prepare the syllabus and software for network
00Prepare the syllabus and software for network
41050722597293560323154378038906441261677183852815435501070041290860-3210142497090Setup & installation task
00Setup & installation task
center1105508Ubuntu Network Platform for Networking Students
00Ubuntu Network Platform for Networking Students
right639107Flowchart Design
00Flowchart Design
45424923860963Submission Chapter 4,5, & 6 in FYP2
00Submission Chapter 4,5, & 6 in FYP2
right3051567Submission Chapter 1, 2 & 3 in FYP1
00Submission Chapter 1, 2 & 3 in FYP1
right2536001Final Report
00Final Report
29766643878418Analysis of result testing and performance
00Analysis of result testing and performance
29572093216937Discuss the goal of the project
00Discuss the goal of the project
29474812536000Evaluate the project
00Evaluate the project
13813273148843Prepare User Acceptance Test
00Prepare User Acceptance Test
13521452506818Integration of software project
00Integration of software project
-3792711848998Development & Implementation
00Development & Implementation
441635755448Website Design
00Website Design
-310785366166Develop a proposal
00Develop a proposal

3.9 Flowchart
Figure 3.8 shows the flow chart which shows the procedure of using the NetSys Operating System.
Figure 3.8 Flow Chart

The procedure of using this NetSys Operating System as shown in the flowchart in figure 3.8. In start operation, the student needs to boot the ISO NetSys Operating System which is the operating system that designed to laptop by using the thumb drive. The next step is the student must log in into the NetSys Operating System by entering their username and password correctly.

If the user succeeds with the authentication process, the student can proceed to the next step which is the students can select and use the tool or syllabus as their option that available in the operating system. But if the students failed with the authentication process, they will keep asking to enter their username and password again.

Finally, if the students want to continue using the NetSys Operating System, the students can keep choosing the syllabus or tool to finish their task. Otherwise, the student can proceed to shut down their personal computer to end the procedure.

Network Layout Diagram
Figure 3.9 Network Layout Diagram

The Figure shows the network layout diagram. Student 1 and student 2 has been installed NetSys OS in their computer and has been protected by built-in intrusion detection. Both students can access the Internet connection.

3.10 Resources
The project requires the following hardware and software. Table 3.1 shows the hardware specification and Table 3.2 shows the software specifications. These are the minimum requirement needed to ensure the success of NetSys Operating System.

3.10.1 Hardware Specifications
For the hardware specification, the project requires a set of personal of computer or a laptop to use in this project. Table 3.1 shows the specification of hardware
Table 3.1 Hardware Specifications
No Hardware Specifications
1 Laptop / A set of Personal Computer
Model: Lenovo Notepad G480
Processor: Intel Core i5 (3rd Generation, 3210M/ 2.5GHz)
Graphics: Intel HD Graphics 4000
Memory: DDR3 SDRAM 8GB
Operating System: Windows 10 Home
Storage: 500GB
Monitor: 14″
Dimensions: 13.3″ x 9.1″ x 1.3″
3.10.2 Software Specifications
By referring to the previous subsection, all hardware specifications must have their specifications. Table 3.2 shows the required software and specifications. Table
Table 3.2 Software Specifications
No Software Specifications
1 Ubuntu Open Source software
Providing a stable, reliable and free operating system
The primary version of Ubuntu employs GNOME, a graphical user interface (GUI) and set of desktop applications for Linux
2 Angry IP Scanner Open source software
Cross-platform network scanner
Scan IP Address and ports
Widely used by the network administrator
3 Nmap Free and open source software
Useful for tasks such as network inventory, managing service upgrade schedules and monitoring host or service uptime.

Run on all major computer operating systems
4 Armitage Scriptable red team collaboration tool for Metasploit that visualizes targets, recommend exploits and exposes the advanced post-exploitation features in the framework
For multiplier for red team operations
5 DFF (Digital Forensic Framework) Free and open source computer forensic software
Used both by professional and non-expert people
Quick and easily collect, preserve and reveal digital
6 XHydra A paralyzed login cracker which supports numerous protocols to attack
New modules are easy to add, flexible and very fast
Provide researchers and security consultants how easy it would be to gain unauthorized access from remote to a system
7 SqlMap Open source penetration testing tool
Automates the process of detecting and exploiting SQL injection flaws and taking over of database servers
8 EtterCap Comprehensive suit for the man in middle attacks
It features sniffing of live connections, content filtering on the fly and other interesting tricks
9 Wireshark Deep inspection of hundreds of protocols with more being added all the time
Live capture and offline analysis
Can run multiplatform
Rich VoIP analysis
10 Social Engineering Toolkit (SET) Open source python-driven tool
Focus on penetration testing
To automate and improve on many of the social engineering attacks out there
Automatically generate exploit-hiding web pages or email messages
11 C-Free Integrated development environment (IDE) for C and C++ programming language
Can edit, build, run and debug the program freely
Customizable utilities
12 Xampp Control Panel Easy to install Apache distribution containing Maria DB, PHP, and Perl
Free package of web services developed Apache friends
13 VLC Media Player Free and open source software
Cross-platform multimedia player
A Framework that plays most multimedia files
14 Libre Office Open source office software suite for word processing, spreadsheets, presentations and more
Available in any languages
Completely free software
15 Wine HQ Open source and user-driven
Compatibility layer capable of running Windows applications on several POSIX-compliant operating systems.

Support new features, become more stable and provide a better user experience
16 SystemBack Easy to create a backup of system and user’s configuration files
Easily restore the previous state of the system
Extra features like system copying, system installation, and live system creation
17 Cisco Packet Tracer Network simulation program that allows students to experiment with network behaviorProvides simulation, visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching and learning or complex technology concepts
18 GNS3 (Graphical Network Simulator) Open source
Software for simulate complex networks while to the way real networks perform.

Software that provides an intuitive graphical user interface to design and configure virtual networks.

Compatible with other platforms
19 PuTTY Free and open source software
Terminal emulator
Popular SSH, Telnet, and SFTP client
Used for remote access to server computers over a network using SSH protocol.

20 NetBeans IDE Best support for latest JAVA technologies
Fast and smart code editing
Rapid user interface development
Support for C/C++ and PHP developers
Can be installed on all operating system that support JAVA
21 Virtual Box Portability
Runs on a large number of 32-bit and 64-bit host operating system
No hardware virtualization required
Guest addition: shared folders, seamless windows, 3D virtualization
USB device support
22 Metasploit Framework An open source project that provides a public resource for researching security vulnerabilities
It offers penetration testing software and provides tools for automating the comparison of a program’s vulnerability
23 Aircrack-ng An 801.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured
It implements the standard FMS attack along with some optimizations, making the attack much faster compared to other WEP cracking tools
24 ClamAV Virus database updated multiple times per day
Built-in support for various archive formats
Built-in support for popular document formats
25 Snort Free and open source
This network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks
3.11 Budget costing
The following subsection is about the project budget and costing of hardware and software requirements. Table 3.3 shows the hardware and table 3.4 shows the software estimated budget and cost.

3.11.1 Hardware Budget
Table 3.3 shows the table of hardware budget which consists 1 laptop as a requirement for NetSys Operating System to run efficiently.

Table 3.3 Hardware Budget
No Hardware Quantity Price (RM) Total Price (RM) Remarks
1 Laptop 1 3000 3000 Student’s Personal Property
Total 3000 –
3.11.2 Software Budget
Table 3.4 shows the table of software budget. There are the softwares of a free and open source which will be installed in the NetSys Operating System.
Table 3.4 Software Budget
No Software Quantity Price (RM) Total Price Remarks
1 Ubuntu 1 0 0 Open-Source
2 Aircrack-Ng 1 0 0 Open-Source
3 Libre Office 1 0 0 Free
4 Packet Tracer 1 0 0 Free
5 Nmap 1 0 0 Open Source
6 Netbeans IDE 1 0 0 Free
7 Virtual Box 1 0 0 Free
8 Metasploit Framework 1 0 0 Open-Source
9 Social Engineering Toolkits 1 0 0 Open-Source
10 Armitage 1 0 0 Open-Source
11 Wireshark 1 0 0 Open Source
12 Digital Forensic Framework 1 0 0 Open-Source
13 Xhydra1 0 0 Free
14 Sqlmap1 0 0 Free
15 Ettercap 1 0 0 Open-Source
16 Cfree1 0 0 Free
17 Xampp Control Panel 1 0 0 Free
18 Vlc Media Player 1 0 0 Free
19 Wine Hq1 0 0 Free
20 System Back 1 0 0 Free
21 GNS 3 (Graphical Network Simulator) 1 0 0 Free
22 PuTTY 1 0 0 Free
21 Clamav1 0 0 Free
22 Snort 1 0 0 Open Source
Total 0 –
Questionnaire’s Result
During the analysis phase, a set of 7 questionnaires online had been distributed to networking students and lecturers in unikl miit. This action required to know the requirement of the respondents to enhance this project. The list of questionnaires will be attached at appendix section in this documentation.
Figure 3.10 Demographic Question

Figure 3.10 shows the difference between respondents. Most of them are the female respondents which are consists 12 of female while others are 9 males
Figure 3.11 the difference between respondents
Figure 3.11 shows the difference between respondents. 95% of respondents are the students, 5% is lecturer and other is alumni
Figure3.12 the difference of course

Figure 3.12 shows a big majority of the respondents (90.48 percent) are from the networking system section. The other is from the account and mechatronic course.

Figure 3.13 the experience of computers

Figure 3.13 shows 71.43 percent of the respondents stated that average as their level of experience with the computer, because most of the respondents are students and have knowledge about computer.

Figure3 .14 the purpose of learning

Figure 3.14 shows a majority of respondents thought that this project prefers for learning purpose because the project it is taking short time for understand.

Figure 3.15 the use of project

Figure 3.15 shows the difference of usage of the project from the respondents. As for the reasons in choosing an operating system for networking learning, a majority of respondents responded that by having this operating system is useful for their learning networking
Figure 3.16 the opinions from respondents

Figure 3.16 shows the opinion and support from the respondents. This can help us to improve the project
Figure 3.17 the opinions from respondents

Figure 3.17 shows the list of comment support from the respondents. By having their feedback can help the project will be noble.

1 Ponto Julie Ann, Ellington Lee, Mellon Suzanne, Beck Susan L. Predictors of adjustment and growth in women with recurrent ovarian cancer. Oncology nursing forum. 2010;37:357–364.

2Patton, Q. M. (1987). How to use qualitative methods in evaluation. Newsbury Park, London, New Dehli: Sage Publications.


I'm Delia!

Would you like to get a custom essay? How about receiving a customized one?

Check it out