IP Scanner Full

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 65

IP SCANNER

SYNOPSIS
This Project Titled “IP SCANNER” is the software application developed for
analyzing networks. The project lets us to have all information about network
computers. The project is developed using Microsoft Visual Basic .Net 2003 and
Microsoft Access 2000 as back end. The .Net Framework version used is 1.1.
The project contains options for scanning IP addresses in any range. The IP
scanner simply pings each IP address to check if it's alive, then optionally it is
resolving its hostname, determines the MAC address, scans ports, etc. The amount of
gathered data about each host can be extended. Scanning results can be saved as TXT
or HTML page.

We can determine the computer name, workgroup name, MAC Address and
other port details of the required computer in the network. We can also explore the
remote system.

The project can scan 'B' (Class B networks (128.0.x.x to 191.255.x.x) have a
16-bit network prefix with a 16-bit host number, and are also referred to as /16
networks) or even 'C' (Class C networks (192.0.0.x to 223.255.255.x) require 24 bits
to identify the network, leaving 8 to identity the host, and are also referred to as /24
networks) class.
CONTENTS
S. PAGE
TITLE
No. No.
1 INTRODUCTION
1.1 About the Organization
1.2 Overview of the Project
2 SYSTEM ANALYSIS
2.1 System Study
2.2 Existing System
2.3 Feasibility Study
2.4 Proposed System
3 SYSTEM REQUIREMENT
3.1 Hardware Configuration
3.2 Software Configuration
3.3 About The Software
4 SYSTEM DESIGN
4.1 Input Design
4.2 Database Design
4.3 Code Design
4.4 Output Design
4.5 System Flow Diagram
4.6 Data Flow Diagram
5 SYSTEM TESTING
5.1 Unit Testing
5.2 Integration Testing
5.3 Validation Testing
5.4 User Acceptance Testing
6 SYSTEM IMPLEMENTATION AND MAINTENANCE
6.1 Implementation
6.2 Maintenance
7 CONCLUSION
8 SCOPE FOR FUTURE ENHANCEMENT
9 BIBLIOGRAPHY
10 APPENDIX
10.1 Screens
10.2 Reports
10.3 Source Coding
1. INTRODUCTION

1.1 ABOUT THE ORGANIZATION

The “ZIGMA COMPUTERS LINKS” is an organization for computer


Hardware and Service center was proudly started in 1990 by Mr. B. Dharmaraj, deals
with all quality branded hardware products. This organization has a chained link of
effective dealers around the city.

Around 25 employees are currently working in the service center and


management. It is located near Kalaimagal School lane, Erode, and it is well known
among the computer centers by their timely sales and services. It has separate
hardware service centre for customizing the product and services.
Zigma computers links as an organization plays a leading role in the
development of computer usage in homes and organization in and around the city. As
an organization, Zigma has achieved many targeted miles like quality award, best
dealership award and as a largest dealer for Vinton products in the state.

Zigma computers Links has maintains a quality control and delivers standard
products to its customer.
.
1.2 OVER VIEW OF THE PROJECT
MODULE DESCRIPTION
The project contains the following modules:
1. IP Address Details
2. Gathering Node Details
3. Port Scanning
4. Nodes Details View
5. User Management

1. IP Address Details
The module contains options for adding IP Address to the table. We enter the
IP Address by selecting values cell by cell. We can also type the Website name to
obtain the IP Address and thereby add it to the table. We can view all the IP Addresses
added.

2. Gathering Node Details


The module contains options for finding computer name, workgroup name the
computer belongs, the MAC Address, ping time to the node, and TTL(Time To Live)
value. The gathered data is saved into the table for future reference.

3. Port Scanning
The module contains options for scanning local as well as remote system port
whether the port is in use or free.

4. Node details view


The module contains options for viewing all the IP Addresses with other
information such as computer name, workgroup name, etc

5. User Management
The module contains options for creating users who can logging to this
application and change the password.
2. SYSTEM ANALYSIS

2.1 SYSTEM STUDY

The system is studied to the minutest detail and analyzed. The system study
plays the role of an interrogator and dwells deep into the working of the present
system. The system is viewed as a whole and the inputs to the system are identified.
The outputs from the organization are traced through the various processing that the
inputs phase through in the organization.

2.2 EXISTING SYSTEM


The Existing system is working under command mode in the disk operating
system for getting the data from the other nodes in the networks like ping, route, etc.,
for accessing every information the user wants to have in the disk operating system
and access the information by type in keyboard in DOS mode. External command
program directly executable by the operating system.

DISADVANTAGES OF THE EXISTING SYSTEM


The disadvantages of the Existing system…
 Memorizing the command is necessary.
 We can’t get the abundant information about nodes in the enterprises.
 It has low security.
 Here couldn’t connect the FTP and HTTP protocols.
 Low privileges to the administrator
 Cannot get the multi information simultaneously due to Single tasking
operating system.
2.3 FEASIBILITY STUDY
The feasibility of the project is analyzed in this phase and business proposal is
put forth with a very general plan for the project and some cost estimates. During
system analysis the feasibility study of the proposed system is to be carried out. This
is to ensure that the proposed system is not a burden to the company. For feasibility
analysis, some understanding of the major requirements for the system is essential.

Three key considerations involved in the feasibility analysis are

 Economical Feasibility

 Technical Feasibility

 Social Feasibility

I. ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system will
have on the organization. The amount of fund that the company can spend into the
research and development of the system is limited. The expenditures must be justified.
Thus the developed system as well within the budget and this was achieved because
most of the technologies used are freely available. Only the customized products had
to be purchased.

II. TECHNICAL FEASIBILITY


This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on
the available technical resources. This will lead to high demands on the available
technical resources. This will lead to high demands being placed on the client. The
developed system must have a modest requirement, as only minimal or null changes
are required for implementing this system.
III. SOCIAL FEASIBILITY

The aspect of study is to check the level of acceptance of the system by the
user. This includes the process of training the user to use the system efficiently. The
user must not feel threatened by the system, instead must accept it as a necessity. The
level of acceptance by the users solely depends on the methods that are employed to
educate the user about the system and to make him familiar with it. His level of
confidence must be raised so that he is also able to make some constructive criticism,
which is welcomed, as he is the final user of the system.

2.4 PROPOSED SYSTEM


The proposed system is working under GUI mode, IP Scanner is a port
scanning regime, it is a cross-platform network scanner designed to be fast and simple
to use. It scans IP addresses and ports as well as has many other features.
It is widely used by network administrators and just curious users around the
world, including large and small enterprises, banks, and government agencies. It lets
you have various types of information about local network computers in a few
seconds. It gives you one-click access.

ADVANTAGES OF THE PROPOSED SYSTEM


The proposed system has following advantages…
 This system can scans the hundreds of computers and list out the IP Address.
 It enables us to connect the HTTP and FTP protocol.
 Enable us to add and delete the new computer in the network.
 It provides the in depth scanning of the network.
 More reliability than existing system.
 Time consumption is very less.
 Access the multi-information simultaneously because of multi-tasking.
PROJECT DESCRIPTION
This project has following modules…

IP address

a. Add IP address
b. Delete IP Address
Show

c. Computer Name
d. Group Name
e. MAC address
f. Time To Live
g. Ping
h. Trace Route
i. Listen Local ports
j. Listen Remove ports

View

k. IP address List.

Connect

l. FTP
m. HTTP

Settings

n. Change password

User

o. Create user
p. Change password
Exit
IP Address
a. Add IP Address
It is used to update the new IP address and allows editing and clearing the IP
Address.
b. Delete IP Address
It is used to delete the existing IP address.

Show
c. Computer Name
It is used to give the computer, Workgroup Name and MAC Address depends
upon the IP address.
d. Group Name
It is used to display the group name of the computers.
e. MAC (Media Access Control)
It is used to display the Media Access Control Address.

View
f. IP Address List
It is used to view the IP Address, computer Name, Work Group Name and its
MAC address.

Connect
g. FTP
Its acronym is File Transfer Protocol; it is used to enable the FTP connectivity
for the required IP address.
h. HTTP
Its acronym is Hyper Text Transfer Protocol; it is used to enable the HTTP
connectivity for the required IP address.
Settings
i. Change password
It is used to change the password of the existing one.

Users
j. Create User
It is used to create the new user, for this it should have name and its password.
k. Change password
It is used to change the user password.

Exit
It is used to exiting from the application.
3. SYSTEM REQUIREMENT

HARDWARE AND SOFTWARE CONFIGURATION

3.1 HARDWARE SPECIFICATION

The hardware used for the development of the project is:

Processor : Pentium III 866 MHz

Hard Disk Capacity : 40 GB

RAM : 128 MB

Monitor : 15” Color

Keyboard : 102 keys

Mouse : 3 buttons

3.2 SOFTWARE SPECIFICATION

The software used for the development of the project is:

Operating system : Windows XP professional

Environment : Visual studio .Net 2003

.Net framework : Version 1.1

Front end : Visual Basic.Net

Back end : Ms Access 2000.


3.3 ABOUT SOFTWARE

In this project .NET Framework is used as front end tool. .NET is one
of the most beautiful and recently more popular front-end tools. It contains several
parts of techniques. They are VB.NET, ASP.NET, and XML.NET. This is used in this
project. In this project SQL Server is used as the back-end tool. This is the default
back-end tool of VB.NET. Then it comes the turn of the operating system. The good
and preferred OS for .NET is Window 2003. We can also use Windows 2000 Server
and Window XP. In this project we are using Windows 2003 as platform.

VB.NET AN OVERVIEW:

The Microsoft Visual Basic .NET programming language is a high-


level programming language for the Microsoft.NET Framework. Although it is
designed to be an approachable and easy-to-learn language, it is also powerful enough
to satisfy the needs of experienced programmers. The Visual Basic .NET
programming language is closely related to the Visual Basic programming language
but the two languages are not the same. A discussion of the different between Visual
Basic.NET and Visual Basic 6.0 is beyond the scope of this document.

The Visual Basic .NET programming language has a syntax that is


similar to English, which promotes the clarity and readability of Visual Basic .NET
code. Wherever possible, meaningful words or phases are used instead of
abbreviations, acronyms, or special character. Extraneous or unneeded syntax is
generally allowed but not required.

The Visual Basic .NET programming language can be either a strongly


typed or a loosely typed language. Loose typing defers much of the burden of type
checking until a program is already running. This includes not only type checking of
conversions but also of method calls, meaning that the binding of a method call can be
deferred until run-time. This is useful when building prototypes or other programs in
which speed of development is more important than execution speed. The Visual
Basic .NET programming language also provides strongly typed semantics that
performs all type checking at compile-time and disallows strongly typed semantics
that performs all type checking at compile-time and disallows run-time binding of
method calls. This guarantees maximum performance and helps ensure that type
conversions are correct. This is useful when building production applications in
which speed of execution and execution correctness is important.

Features of VB.NET
VB.NET is a program that is the advanced version of VB 6.0.
Microsoft is the company that developed this language. VB.NET is a good and
powerful language. The main features of the VB.NET are
 Object oriented language.
 Powerful language for development of application programs
 Multithreading and Multitasking
 Internet Programming
 Intranet Programming
 Interpretability

Microsoft’s Visual Studio.NET Framework

.
Common Language Runtime

Class Libraries

Programming Languages
(VB.NET, C#, VC++, Jscript.NET)

ASP.NET
SOFTWARE DESCRIPTION
SOFTWARE DESCRIPTION

THE .NET FRAMEWORK


The .NET Framework is a new computing platform that simplifies application
development in the highly distributed environment of the Internet.

OBJECTIVES OF. NET FRAMEWORK

1. To provide a consistent object-oriented programming environment whether


object codes is stored and executed locally on Internet-distributed, or
executed remotely.

2. To provide a code-execution environment to minimizes software deployment


and guarantees safe execution of code.

3. Eliminates the performance problems.

There are different types of application, such as Windows-based applications


and Web-based applications.To make communication on distributed environment to
ensure that code be accessed by the .NET Framework can integrate with any other
code.
COMPONENTS OF. NET FRAMEWORK

THE COMMON LANGUAGE RUNTIME (CLR)


The common language runtime is the foundation of the .NET Framework. It
manages code at execution time, providing important services such as memory
management, thread management, and remoting and also ensures more security and
robustness. The concept of code management is a fundamental principle of the
runtime. Code that targets the runtime is known as managed code, while code that
does not target the runtime is known as unmanaged code.

THE .NET FRAME WORK CLASS LIBRARY

It is a comprehensive, object-oriented collection of reusable types used to


develop applications ranging from traditional command-line or graphical user
interface (GUI) applications to applications based on the latest innovations provided
by ASP.NET, such as Web Forms and XML Web services.

The .NET Framework can be hosted by unmanaged components that load the
common language runtime into their processes and initiate the execution of managed
code, thereby creating a software environment that can exploit both managed and
unmanaged features. The .NET Framework not only provides several runtime hosts,
but also supports the development of third-party runtime hosts.

Internet Explorer is an example of an unmanaged application that hosts the


runtime (in the form of a MIME type extension). Using Internet Explorer to host the
runtime to enables embeds managed components or Windows Forms controls in
HTML documents.
FEATURES OF THE COMMON LANGUAGE RUNTIME
The common language runtime manages memory; thread execution, code
execution, code safety verification, compilation, and other system services these are
all run on CLR.

 Security

 Robustness

 Productivity

 Performance

SECURITY
The runtime enforces code access security. The security features of the runtime
thus enable legitimate Internet-deployed software to be exceptionally feature rich.
With regards to security, managed components are awarded varying degrees of trust,
depending on a number of factors that include their origin to perform file-access
operations, registry-access operations, or other sensitive functions.

ROBUSTNESS
The runtime also enforces code robustness by implementing a strict type- and
code-verification infrastructure called the common type system(CTS). The CTS
ensures that all managed code is self-describing. The managed environment of the
runtime eliminates many common software issues.

PRODUCTIVITY
The runtime also accelerates developer productivity. For example, programmers
can write applications in their development language of choice, yet take full
advantage of the runtime, the class library, and components written in other languages
by other developers.
PERFORMANCE
The runtime is designed to enhance performance. Although the common
language runtime provides many standard runtime services, managed code is never
interpreted. A feature called just-in-time (JIT) compiling enables all managed code to
run in the native machine language of the system on which it is executing. Finally, the
runtime can be hosted by high-performance, server-side applications, such as
Microsoft® SQL Server™ and Internet Information Services (IIS).
DATA ACCESS WITH ADO.NET
As we develop applications using ADO.NET, you will have different
requirements for working with data. You might never need to directly edit an XML
file containing data - but it is very useful to understand the data architecture in
ADO.NET.
ADO.NET offers several advantages over previous versions of ADO:

 Interoperability

 Maintainability

 Programmability

 Performance Scalability

INTEROPERABILITY
ADO.NET applications can take advantage of the flexibility and broad
acceptance of XML. Because XML is the format for transmitting datasets across the
network, any component that can read the XML format can process data. The
receiving component need not be an ADO.NET component.

The transmitting component can simply transmit the dataset to its destination
without regard to how the receiving component is implemented. The destination
component might be a Visual Studio application or any other application implemented
with any tool whatsoever.

The only requirement is that the receiving component be able to read XML.
SO, XML was designed with exactly this kind of interoperability in mind.
MAINTAINABILITY
In the life of a deployed system, modest changes are possible, but substantial,
Architectural changes are rarely attempted because they are so difficult. As the
performance load on a deployed application server grows, system resources can
become scarce and response time or throughput can suffer. Faced with this problem,
software architects can choose to divide the server's business-logic processing and
user-interface processing onto separate tiers on separate machines.

In effect, the application server tier is replaced with two tiers, alleviating the
shortage of system resources. If the original application is implemented in ADO.NET
using datasets, this transformation is made easier.
ADO.NET data components in Visual Studio encapsulate data access
functionality in various ways that help you program more quickly and with fewer
mistakes.

PERFORMANCE
ADO.NET datasets offer performance advantages over ADO disconnected
record sets. In ADO.NET data-type conversion is not necessary.

SCALABILITY
ADO.NET accommodates scalability by encouraging programmers to conserve
limited resources. Any ADO.NET application employs disconnected access to data; it
does not retain database locks or active database connections for long durations.
VISUAL STUDIO .NET

Visual Studio .NET is a complete set of development tools for building ASP
Web applications, XML Web services, desktop applications, and mobile applications
In addition to building high-performing desktop applications, you can use Visual
Studio's powerful component-based development tools and other technologies to
simplify team-based design, development, and deployment of Enterprise solutions.

Visual Basic .NET, Visual C++ .NET, and Visual C# .NET all use the same
integrated development environment (IDE), which allows them to share tools and
facilitates in the creation of mixed-language solutions. In addition, these languages
leverage the functionality of the .NET Framework and simplify the development of
ASP Web applications and XML Web services.

Visual Studio supports the .NET Framework, which provides a common


language runtime and unified programming classes; ASP.NET uses these components
to create ASP Web applications and XML Web services. Also it includes MSDN
Library, which contains all the documentation for these development tools.

VISUAL BASIC .NET

Visual Basic. NET, the latest version of visual basic, includes many new
features. The Visual Basic supports interfaces but not implementation inheritance.
Visual basic.net supports implementation inheritance, interfaces and overloading. In
addition, Visual Basic .NET supports multithreading concept.
COMMON LANGUAGE SPECIFICATION (CLS)

Visual Basic.NET is also compliant with CLS (Common Language


Specification) and supports structured exception handling. CLS is set of rules and
constructs that are supported by the CLR (Common Language Runtime). CLR is the
runtime environment provided by the .NET Framework; it manages the execution of
the code and also makes the development process easier by providing services.

Visual Basic.NET is a CLS-compliant language. Any objects, classes, or


components that created in Visual Basic.NET can be used in any other CLS-compliant
language. In addition, we can use objects, classes, and components created in other
CLS-compliant languages in Visual Basic.NET .The use of CLS ensures complete
interoperability among applications, regardless of the languages used to create the
application.

IMPLEMENTATION
Visual Basic.NET supports implementation inheritance. This means that, while
creating applications in Visual Basic.NET, we can drive from another class, which is
know as the base class that derived class inherits all the methods and properties of the
base class. In the derived class, we can either use the existing code of the base class or
override the existing code. Therefore, with help of the implementation inheritance,
code can be reused.

CONSTRUCTORS AND DESTRUCTORS


Constructors are used to initialize objects, whereas destructors are used to
destroy them. In other words, destructors are used to release the resources allocated to
the object. In Visual Basic.NET the sub finalize procedure is available. The sub
finalize procedure is used to complete the tasks that must be performed when an
object is destroyed. The sub finalize procedure is called automatically when an object
is destroyed. In addition, the sub finalize procedure can be called only from the class
it belongs to or from derived classes.
GARBAGE COLLECTION
Garbage Collection is another new feature in Visual Basic.NET. The .NET
Framework monitors allocated resources, such as objects and variables. In addition,
the .NET Framework automatically releases memory for reuse by destroying objects
that are no longer in use. In Visual Basic.NET, the garbage collector checks for the
objects that are not currently in use by applications. When the garbage collector
comes across an object that is marked for garbage collection, it releases the memory
occupied by the object.

OVERLOADING
Overloading is another feature in Visual Basic.NET. Overloading enables us to
define multiple procedures with the same name, where each procedure has a different
set of arguments. Besides using overloading for procedures, we can use it for
constructors and properties in a class.

MULTITHREADING
Visual Basic.NET also supports multithreading. An application that supports
multithreading can handle multiple tasks simultaneously, we can use multithreading to
decrease the time taken by an application to respond to user interaction. To decrease
the time taken by an application to respond to user interaction, we must ensure that a
separate thread in the application handles user interaction.
STRUCTURED EXCEPTION HANDLING
Visual Basic.NET supports structured handling, which enables us to detect and
remove errors at runtime. In Visual Basic.NET, we need to use Try…Catch…Finally
statements to create exception handlers. Using Try…Catch…Finally statements, we
can create robust and effective exception handlers to improve the performance of our
application.

MS -ACCESS 2000
It is a personal computer based RDBMS. This provides most of the features
available in the high-end RDBMS products like Oracle, Sybase, Ingress etc. VB keeps
access as its native database. Developer can create a database for development &
further can create.
The tables are required to store data. During the initial Development phase
data can be stored in the access database & during the implementation phase
depending on the volume data can use a higher – end database.
Office Access, previously known as Microsoft Access, is an active secure
database embedded in a virtual object-oriented work cluster. It is a member of the
2007 Microsoft Office system.
Access can use data stored in Access/Jet, Microsoft SQL Server, Oracle, or
any ODBC-compliant data container. Skilled software developers and data architects
use it to develop application software. Relatively unskilled programmers and non-
programmer "power users" can use it to build simple applications. It supports some
object-oriented (OO) techniques but falls short of being a fully OO development tool.
Access was also the name of a communications program from Microsoft, meant to
compete with ProComm and other programs. This Access proved a failure and was
dropped. Years later Microsoft reused the name for its database software.
4. SYSTEM DESIGN
The design of the system is essentially a blue print, or plan for a solution of
the system to be developed. A part of the system or subsystem of a whole of the
system can itself be considered a system with its own complements.
Here the focus is on detecting that which is all the modules method needed for
the system, the specification of these design is the only way by which we can
accurately translate the end-user requirements in to a finished software product or
system.
The data flow oriented design in an architectural design method that allows a
convenient transition from the analysis model to a design description of program
structure the DFD presents a system overview depicting its overall purpose an its
interactions with external objects it provides a general pictorial of data
transformations in the system.
A DFD shows the flow of data through a system which may be a manual
procedure software system, a hard ware system or any combination of these. A DFD
shows the movements of the data through the different transformations, which are the
process in the system. DFD are made up of a number of symbols, which represent
system components, process, data store, and data flow and external entities.

4.1 INPUT DESIGN


Input Design is one of the most expensive phases of the operation of
computerized system and is often the major problem of a system. A large
number of problems with a system can usually be tracked backs to fault input
design and method. Needless to say, therefore, that the input data is the life
blood of a system and have to be analysed and designed with utmost case and
consideration.
The decisions made during the input design are
 To provide cost effective method of input.
 To achieve the highest possible level of accuracy.
 To ensure that the input is understand by the user.
System analysis decide the following input design details like, what data
to input, what medium to use, hoe the data should be arranged or coded, data
items and transactions needing validations to detect errors and at last the
dialogue to guide user in providing input.
Input data of a system may not be necessarily be raw data captured in
the system from scratch. These can also be the output of another system or
sub system. The design of input covers all phases of input from the creation of
initial data to actual entering the data to the system for processing. The design
of inputs involves identifying the data needed, specifying the characteristics of each
data item, capturing and preparing data for computer processing and ensuring
correctness of data.

4.2 DATABASE DESIGN


The most important consideration in designing the database is how
information will be used.

The main objectives of designing a database are:

 Data Integration

 Data Integrity

 Data Independence

Data Integration
In a database, information from several files are coordinated, accessed and
operated upon as through it is in a single file. Logically, the information are
centralized, physically, the data may be located on different devices, connected
through data communication facilities.
Data Integrity

Data integrity means storing all data in one place only and how each
application to access it. This approach results in more consistent information, one
update being sufficient to achieve a new record status for all applications, which use
it. This leads to less data redundancy; data items need not be duplicated; a reduction
in the direct access storage requirement.

Data Independence

Data independence is the insulation of application programs from changing


aspects of physical data organization. This objective seeks to allow changes in the
content and organization of physical data without reprogramming of applications and
to allow modifications to application programs without reorganizing the physical data.

The tables needed for each module were designed and the specification of
each and every column was given based on the records and details collected during
record specification of the system study.
TABLE DESIGN

Table: Nodes

Primary Key: IP Address

Field Name Type Size

S. No Number 4

IP Address Text 15

Computer Name Text 255

Workgroup Name Text 255

MAC Address Text 20

Table: Users

Field Name Type Size

User Name Text 15

Password Text 15
4.3 CODE DESIGN
The code design should be such that with less amount of coding we can
achieve more results. The speed of the system will be more if the coding is less.
Whether the data in the system is usable and readable by the system is depending on
the coding.
In the project, the coding is being done such that proper validations are made
to get the perfect input. No error inputs are accepted. In addition care is taken such
that the data integrity and referential integrity is not violated in the database. When
large volumes of data are being handled, it is important that the items to be stored
selected easily and quickly.
To accomplish this, each data item must have a unique specification and must
be related to other forms or item of data of the same type. The master file transaction
within related to the same type in the other table with using primary key. A primary
key item in master file is related to another table. In that table, it acts as the foreign
key.

4.4 OUTPUT DESIGN


Output Design generally refers to the results and information’s that are
generated by the system for many end-users, output is the main reason for
developing the system and the basis on which they evaluate the usefulness of
the application.
The objective of a system finds its shape in terms of the output. The
analysis of the objective of a system leads to determination of outputs. Outputs
of a system can face various forms. The most common are reports, screen
displays, printed forms, graphical drawings etc.,The output also vary in terms of
their contents frequency, timing and format. The user of the output from a
system are the justification for its existence. If the output are inadequate in any
way, the system are itself is adequate. The basic requirements of output are that
it should be accurate, timely and appropriate, in terms of content, medium and
layout for its intended purpose.
When designing output, system analysis most accomplish things like, to
determine what information to be present, to decide whether to display or print
the information and select the output medium and to decide how to distribute
the output to intended recipients.
External outputs are those whose destination will be outside the
organization and which require special attention as they project the image of
the organization. Internal outputs are those whose destination is within the
organization. it is to be carefully designed as they are the users main interface
with the system.
IP SCANNER

4.5 SYSTEM FLOW DIAGRAM


IP ADDRESS  SHOW VIEW CONNECT  SETTINGS  ABOUT USER EXIT

SYSTEM FL OW DIAGRAM
ADD IP  COPUTER  IP ADDRESS  FTP CHANGE  CREATE 
ADDRESS NAME  LIST  PASSWORD  USER

DELETE IP  GROUP  NAME  HTTP


ADDRESS CHANGE 
PASSWORD 
MAC ADDRESS

TIME TO LIVE 

PING 

TRACE ROUTE 

LISTEN LOCAL PORTS 

LISTEN REMOVE PORTS  
4.6 DATA FLOW DIAGRAM

A Data Flow Diagram (DFD) or a Bubble Chart is a graphical tool for


structured analysis, it was De Marco (1978) and Gane and Sarson (1979) who
introduced DFD. DFD models a system by using external entities from which data
flows to process, which transforms the data and creates, output-data-flows which go
to other processes or external entities or files. Data in files may also flow to processes
as inputs.

These are various symbols used in a DFD. Bubbles represent the


processes. Named arrows indicate the dataflow. External entities are represented by
rectangles and are outside the system such as vendors or customers with whom the
system interacts. They either supply or consume data. Entities supplying data are
known as sources and those that consume data are called sinks. Data are stored in a
data store by a process in the system. Each component in a DFD is labeled with a
descriptive name. Process names are further identified with a number.

DFD’s can be hierarchically organized, which help in partitioning and


analyzing large systems. As a first step, one Data Flow Diagram can depict and entire
system which gives he system overview. It is called Context Diagram of level 0 DFD.
The Context Diagram can be further expanded. The successive expansion of a DFD
from the context diagram to those giving more details is known as leveling of DFD.
Thus a top down approach is used, starting with an overview and then working out the
details.

The main merit of DFD is that it can provide an overview of what data
a system would process, what transformation of data are done, what files are used,
and where the result flow.
Basic DFD Symbols

A data flow is a route, which enables packets of data to travel


from one point to another. Data may flow a source to a processor and
from data store or process. An arrow line depicts The Flow, with arrow
head pointing in the direction of the flow.

A process represents transformation where incoming data flows


are changed into outgoing data flows.

A data stored is repository of data that is to be stored for use by


one or more processes. It may be as simple a buffer or queue or
sophisticated as relational database. They should have clear names. If
a process merely uses the content of store and does not alert it, the
arrowhead goes only from the store to the process. If a process alters
the detail in the store then a double-headed arrow is used.

A source or sink is a person or part of an organization which


enter or receives information from the system, but is considered to be
outside the contest of dataflow model.
DATA FLOW DIAGRAM

DATA FLOW DIAGRAM

Level - 0

IP SCANNER

LOGIN

GET INTO THE SYSTEM

USERS
Level - 1

IP ADDRESS

NODES

NODE
DETAILS
5. SYSTEM TESTING

TESTING
After the source code has been completed, documented as related data
structures. Completed the project has to undergo testing and validation where there is
subtitle and definite attempt to get errors. The project developer treads lightly,
designing and execution test that will demonstrates that the program works rather than
uncovering errors, unfortunately errors will be present and if the project developer
doesn’t find them, the user will find out.
The project developer is always responsible for testing the individual units i.e.
modules of the program. In many cases developer also conducts integration testing i.e.
the testing step that leads to the construction of the complete program structure.
This project has undergone the following testing procedures to ensure its
correctness.

 Unit testing

 Integration testing

 Validation testing

 User Acceptance Testing


5.1 UNIT TESTING
In unit testing, we have to test the programs making up the system. For this
reason, Unit testing sometimes called as Program testing. The software units in a
system are the modules and routines that are assembled and integrated to perform a
specific function, Unit testing first on the modules indepently of one another, to locate
errors. This enables, to detect errors in coding and logic that are contained with the
module alone. The testing was carried out during programming stage itself.

5.2 INTEGRATION TESTING


Integration testing is a systematic technique for constructing the program
structure. While at the same time conducting tests to uncover errors associated with
interfacing. The objective is to take unit tested modules and build a program structure
that has been dictated by design.
In this integration testing its done using the main module and based on the
type of integration testing the subordinate stubs are replaced one at a time with actual
modules.

5.3 VALIDATION TESTING


In the project Validation is made such that, only the raw materials entered in
the raw material master table can be accepted during the purchase. Only after the
selection of the products, the record can be added. Otherwise a message is displayed
to enter the product details. During the purchase return, the item quantity returned
cannot exceed the stock maintained. Negative stock is not allowed. The customer
details entered in the lot section details alone can be entered in the delivery bill.

5.4 USER ACCEPTANCE TESTING

The system under consideration is tested for user acceptance by constantly


keeping in touch with the prospective system user at the time of developing and
making changes whenever required.
6. SYSTEM IMPLEMENTATION AND
MAINTENANCE

6.1 IMPLEMENTATION
When the initial design was done for the system, the client was consulted for
the acceptance of the design so that further proceedings of the system development
can be carried on. After the development of the system a demonstration was given to
them about the working of the system. The aim of the system illustration was to
identify any malfunction of the system.
After the management of the system was approved the system implemented in
the concern, initially the system was run parallaly with existing manual system. The
system has been tested with live data and has proved to be error free and user friendly.
Implementation is the process of converting a new or revised system design
into an operational one when the initial design was done by the system; a
demonstration was given to the end user about the working system. This process is
uses to verify and identify any logical mess working of the system by feeding various
combinations of test data. After the approval of the system by both end user and
management the system was implemented.
System implementation is made up of many activities.
The six major activities as follows.

 Coding

 Testing

 Installation

 Documentation

 Training and support


Coding
Coding is the process of whereby the physical design specifications created by
the analysis team turned into working computer code by the programming team.

Testing
Once the coding process is begin and proceed in parallel, as each program
module can be tested.

Installation
Installation is the process during which the current system is replaced by the
new system. This includes conversion of existing data, software, and documentation
and work procedures to those consistent with the new system.

Documentation
It is result from the installation process, user guides provides the information
of how the use the system and its flow.

Training and support


Training plan is a strategy for training user so they quickly learn to the new
system. The development of the training plan probably began earlier in the project.
The best-suited application package to develop medical system is Visual Basic .NET
under windows XP’ environment. Visual Basic .NET has all them features that can
store, edit, retrieve, and print information quickly and easily access the broad range of
application.
6.2 MAINTENANCE

After development of the software, Maintenance of software is important


aspect.
Maintainability is the ease with which software can be understood and
corrected, adapted and enhanced. The goal is to improve the ease with which changes
can be accommodated and reduce the amount of effort expanded on maintenance.

Software maintenance is one of the phases in, and follows deployment of the
software into the field. The software maintenance phase involves changes to the
software in order to correct defects and deficiencies found during field usage as well
as the addition of new functionality to improve the software's and applicability.

Maintenance can be classified as,

 Corrective

 Adaptive

 Perfective.

CORRECTIVE MAINTENANCE

Corrective maintenance means repairing processing or performance failures or


making changes because of previously uncorrected problems of false assumptions. In
this project, the existing system can’t control the task manger with maximum duration
of the time, now it is over come with user time consumption.
PERFECTIVE MAINTENANCE
Perfective maintenance means enhancing performance or modifying the
programs to respond to the user’s additional or changing needs. In this project,
various links are available instead of menus are available so it successfully interactive
with the user.

ADAPTIVE MAINTENANCE
Adaptive maintenance means changing the program function. Of these types
more time and money are spent on perfective than on corrective and adaptive
maintenance together. This project should be inter-operability with Hardware devices
and also interact with the other software’s.
7. CONCLUSION
It is believed that almost all the system objectives that have been planned at
the commencement of the software development have been net with and the
implementation process of the project is completed.
A trial run of the system has been made and is giving good results the
procedures for processing is simple and regular order.
The process of preparing plans had been a new experience, which was found
use full in later phases of the project is completed.
Efforts have been taken to make the system user friendly and as simple as
possible.
However at some points some features may have been missed out which might
be considered for further modification of the application
8. SCOPE FOR FUTURE DEVELOPMENT
The project provides a best assistance in the network based regime.
It allows adding up the following facilities in future,

 It can able to control the remote port of the computer.

 It can able to restrict the particular type of files from the network.

 As single software able to provide in the network to the whole network.


9. BIBLIOGRAPHY
1) “. NET developers guide 2002”- Prentice-Hall India.- Grey Buczek,

2) “VB.NET by example 2003” – TataMcGraw-Hill- Benolt Marchal,

3) “System Analysis & Design” – Alenis Leon.

4) “An Integral approach to software engineering” – Pankaj Jalole.

5) “Microsoft Visual Basic.NET Programmer’s Cookbook”-


(TataMcGraw-Hill Edition)-MATTHEW MACDONALD

6) Jittery R.Shapiro, “The Complete Reference Visual Basic .NET” Edition


2002, Tata McGraw-Hill, Publishing Company Limited, New Delhi.

7) Ian Sommerville “Software Engineering”

8) “Modern System Analysis and Design”


 Jeffrey A.Hoffer
 Joey F.George
 Joseph S.Valacich

WEBSITES

1.http://www.dotnetheaven.com

2.http://www.startvbdotnet.com/

3.http://msdn.microsoft.com/vbasic/using/understanding/data/default.aspx
10. APPENDIX

10.1 SCREENS

LOGIN DETAILS
MAIN PAGE OF IP SCANNER PROJECT
SAVING OF IP ADDRESS
DELETING OF IP ADDRESS
ELECTING OF NODE DETAILS
SELECTING OF IP ADDRESS
SCANNING OF LOCAL PORTS
SELECTION AND FTP CONNECTIVITY
SELECTION AND HTTP CONNECTIVITY
CHANGING OF PASSWORD
CREATION OF NEW USER
10.2 REPORTS

DISPLAYING MULTIPLE NODE DETAILS


DISPLAYING OF NODE DETAILS
10.3 SOURCE CODING

Private Sub MenuItem2_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MenuItem2.Click
Dim f As New frmAddIP
f.ShowDialog()

End Sub

Private Sub frmMain_Load(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MyBase.Load
Me.Visible = False
Dim f As New frmlogin
f.ShowDialog()
If f.OK = True Then
Me.Visible = True
Else
End
End If
End Sub

Private Sub MenuItem3_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MenuItem3.Click
Dim f As New frmAddIP
f.Button2.Enabled = False
f.Button4.Enabled = True
f.ShowDialog()
End Sub

Private Sub MenuItem25_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MenuItem25.Click
End
End Sub

Private Sub MenuItem28_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MenuItem28.Click
MsgBox("IP Scanner Version 1.0", MsgBoxStyle.Information)
End Sub

Private Sub MenuItem30_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MenuItem30.Click
Dim f As New frmchangepassword
f.ShowDialog()
End Sub

Private Sub MenuItem23_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MenuItem23.Click
Dim F As New frmFTP
F.ShowDialog()
End Sub
Private Sub MenuItem24_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles MenuItem24.Click
Dim F As New frmHTTP
F.ShowDialog()
End Sub

Private Sub MenuItem17_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MenuItem17.Click
Dim f As New frmView
f.Show()
End Sub

Private Sub MenuItem7_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MenuItem7.Click
Dim f As New frmSelect
f.ShowDialog()
SelectedIPAddress = f.IPAddress
If SelectedIPAddress = "" Then
MsgBox("IP Address Not Selected...", MsgBoxStyle.Critical)
Else
Dim f1 As New frmShowDetails
f1.ShowDialog()
End If
End Sub

Private Sub MenuItem12_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MenuItem12.Click
Dim f As New frmSelect
f.ShowDialog()
ModDB.SelectedIPAddress = f.IPAddress
If ModDB.SelectedIPAddress = "" Then
MsgBox("IP Address Not Selected...", MsgBoxStyle.Critical)
Else
Dim f1 As New frmTraceRoute
f1.Server.Text = SelectedIPAddress
f1.ShowDialog()
End If
End Sub

Private Sub MenuItem19_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MenuItem19.Click
Dim f As New frmLocalPort
f.ShowDialog()
Exit Sub
'Dim f As New frmSelect
'f.ShowDialog()
'SelectedIPAddress =
System.Net.Dns.GetHostByName(System.Net.Dns.GetHostName).AddressList(0).ToString '
f.IPAddress
'If SelectedIPAddress = "" Then
' MsgBox("IP Address Not Selected...", MsgBoxStyle.Critical)
'Else
' Dim f1 As New frmScanPort
' f1.ShowDialog()
'End If
End Sub

Private Sub MenuItem33_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MenuItem33.Click
Dim f As New frmchangepassword
f.ShowDialog()
End Sub

Private Sub MenuItem32_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MenuItem32.Click
Dim f As New frmCreateUser
f.ShowDialog()
End Sub

Private Sub MenuItem20_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MenuItem20.Click
Dim f As New frmSelect
f.ShowDialog()
SelectedIPAddress = f.IPAddress
'System.Net.Dns.GetHostByName(System.Net.Dns.GetHostName).AddressList(0).ToString
'
If SelectedIPAddress = "" Then
MsgBox("IP Address Not Selected...", MsgBoxStyle.Critical)
Else
Dim f1 As New frmLocalPort
f1.txtAddr.Text = SelectedIPAddress
f1.RemotePorts = True
f1.ShowDialog()
End If
End Sub
End Class

Imports TraceRouter
Imports System
Imports System.Drawing
Imports System.Collections
Imports System.ComponentModel
Imports System.Windows.Forms

'Imports Magenic.Network.Diagnostic
''' <summary>
''' Summary description for Diag.
''' </summary>
Public Class frmTraceRoute
Inherits System.Windows.Forms.Form
Private Enum TraceStatus
TraceNotRunning = 0
TraceRunning = 1
TraceTerminated = 2
End Enum
Friend WithEvents CloseButton As System.Windows.Forms.Button
Friend WithEvents StartCancelButton As System.Windows.Forms.Button
Friend Server As System.Windows.Forms.TextBox
Friend ServerLabel As System.Windows.Forms.Label
Private components As System.ComponentModel.IContainer
''' <summary>
''' Required designer variable.
''' </summary>

Private traceRoute As TraceRouter.TraceRoute


Private traceStatus1 As TraceStatus = TraceStatus.TraceNotRunning

Public Sub New()


'
' Required for Windows Form Designer support
'
InitializeComponent()
End Sub

''' <summary>
''' Clean up any resources being used.
''' </summary>
Protected Overloads Overrides Sub Dispose(ByVal disposing As Boolean)
If disposing Then
If Not components Is Nothing Then
components.Dispose()
End If
End If
MyBase.Dispose(disposing)
End Sub

#Region "Windows Form Designer generated code"


''' <summary>
''' Required method for Designer support - do not modify
''' the contents of this method with the code editor.
''' </summary>
Friend WithEvents ListBox1 As System.Windows.Forms.ListBox
Friend WithEvents Label1 As System.Windows.Forms.Label
Friend WithEvents Timer1 As System.Windows.Forms.Timer
Private Sub InitializeComponent()
Me.components = New System.ComponentModel.Container
Me.CloseButton = New System.Windows.Forms.Button
Me.StartCancelButton = New System.Windows.Forms.Button
Me.Server = New System.Windows.Forms.TextBox
Me.ServerLabel = New System.Windows.Forms.Label
Me.ListBox1 = New System.Windows.Forms.ListBox
Me.Label1 = New System.Windows.Forms.Label
Me.Timer1 = New System.Windows.Forms.Timer(Me.components)
Me.SuspendLayout()
'
'CloseButton
'
Me.CloseButton.DialogResult = System.Windows.Forms.DialogResult.Cancel
Me.CloseButton.Location = New System.Drawing.Point(144, 56)
Me.CloseButton.Name = "CloseButton"
Me.CloseButton.TabIndex = 23
Me.CloseButton.Text = "&Quit"
'
'StartCancelButton
'
Me.StartCancelButton.Location = New System.Drawing.Point(24, 56)
Me.StartCancelButton.Name = "StartCancelButton"
Me.StartCancelButton.TabIndex = 22
Me.StartCancelButton.Text = "&Start"
'
'Server
'
Me.Server.Location = New System.Drawing.Point(8, 24)
Me.Server.Name = "Server"
Me.Server.Size = New System.Drawing.Size(272, 20)
Me.Server.TabIndex = 13
Me.Server.Text = ""
'
'ServerLabel
'
Me.ServerLabel.Font = New System.Drawing.Font("Microsoft Sans Serif", 8.25!,
System.Drawing.FontStyle.Bold, System.Drawing.GraphicsUnit.Point, CType(0, Byte))
Me.ServerLabel.Location = New System.Drawing.Point(8, 8)
Me.ServerLabel.Name = "ServerLabel"
Me.ServerLabel.Size = New System.Drawing.Size(120, 20)
Me.ServerLabel.TabIndex = 12
Me.ServerLabel.Text = "Server:"
'
'ListBox1
'
Me.ListBox1.Location = New System.Drawing.Point(16, 128)
Me.ListBox1.Name = "ListBox1"
Me.ListBox1.Size = New System.Drawing.Size(808, 394)
Me.ListBox1.TabIndex = 24
'
'Label1
'
Me.Label1.Font = New System.Drawing.Font("Microsoft Sans Serif", 8.25!,
System.Drawing.FontStyle.Bold, System.Drawing.GraphicsUnit.Point, CType(0, Byte))
Me.Label1.Location = New System.Drawing.Point(16, 96)
Me.Label1.Name = "Label1"
Me.Label1.Size = New System.Drawing.Size(800, 20)
Me.Label1.TabIndex = 25
Me.Label1.Text = "Wait ..."
Me.Label1.Visible = False
'
'Timer1
'
'
'frmTraceRoute
'
Me.AutoScaleBaseSize = New System.Drawing.Size(5, 13)
Me.ClientSize = New System.Drawing.Size(842, 543)
Me.ControlBox = False
Me.Controls.Add(Me.Label1)
Me.Controls.Add(Me.ListBox1)
Me.Controls.Add(Me.CloseButton)
Me.Controls.Add(Me.StartCancelButton)
Me.Controls.Add(Me.Server)
Me.Controls.Add(Me.ServerLabel)
Me.FormBorderStyle = System.Windows.Forms.FormBorderStyle.FixedDialog
Me.Name = "frmTraceRoute"
Me.StartPosition = System.Windows.Forms.FormStartPosition.CenterParent
Me.Text = "Server Name"
Me.ResumeLayout(False)
End Sub

#End Region
' Dim res As IAsyncResult
' Dim a As New AsyncCallback(AddressOf TraceRouteCallBack)

Private Sub TraceRouteCallBack(ByVal ar As IAsyncResult)


' res = ar
Dim traceResponse As TraceRouter.TraceRoute.TraceResponse
Dim responseText As String
Const TAB_CHAR As Char = Chr(9)

If TypeOf ar Is TraceRouter.TraceRoute.TraceResponse Then


traceResponse = DirectCast(ar, TraceRouter.TraceRoute.TraceResponse)
responseText = traceResponse.TTL.ToString() + TAB_CHAR
For Each packetTime As Integer In traceResponse.TimingCollection
If packetTime < 10 Then
responseText = responseText + "<10 ms" + TAB_CHAR
Else
responseText = responseText + packetTime.ToString() + " ms" + TAB_CHAR
End If
Next
For alignText As Integer = traceResponse.TimingCollection.Count To
traceRoute.NumberPackets - 1
responseText = responseText + TAB_CHAR
Next

responseText = responseText + traceResponse.Address.ToString() + TAB_CHAR +


traceResponse.HostName
ListBox1.Items.Add(responseText)

If traceResponse.IsCompleted OrElse (traceStatus1 = TraceStatus.TraceTerminated)


Then
StartCancelButton.Text = "&Start"

EnableControls(True, False)

traceStatus1 = TraceStatus.TraceNotRunning
traceRoute = Nothing
End If
End If
End Sub

Private Sub StartCancelButton_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles StartCancelButton.Click

Application.DoEvents()
If traceStatus1 = TraceStatus.TraceNotRunning Then
Timer1.Enabled = True
Label1.Visible = True
StartCancelButton.Text = "C&ancel"
' EnableControls(False, True)
Application.DoEvents()
Try
'Dim a As New AsyncCallback(AddressOf TraceRouteCallBack)
traceRoute = New TraceRouter.TraceRoute(AddressOf TraceRouteCallBack)
traceRoute.SendTrace(Server.Text)
traceStatus1 = TraceStatus.TraceRunning
' Timer1.Enabled = False
' Label1.Visible = False
Catch err As ApplicationException
Dim errorMsg As String

StartCancelButton.Text = "&Start"
' EnableControls(True, False)
CloseButton.Enabled = True
Label1.Visible = False
If err.Message =
NetworkMessage.NetworkMessageException.HostNameNotFound.ToString() Then
errorMsg = "Host not found."
Else
errorMsg = err.Message
End If
MessageBox.Show(Me, errorMsg, "Error")
End Try
Else
traceRoute.Cancel()
traceStatus1 = TraceStatus.TraceTerminated
' EnableControls(False, False)
CloseButton.Enabled = True
Label1.Visible = False
End If
End Sub

Private Sub Diag_Closing(ByVal sender As System.Object, ByVal e As


System.ComponentModel.CancelEventArgs) Handles MyBase.Closing
If traceStatus1 <> TraceStatus.TraceNotRunning Then
e.Cancel = True
End If
End Sub
Private Sub EnableControls(ByVal enabled As Boolean, ByVal KeepStartCancel As
Boolean)
For Each control As Control In Controls
If Not KeepStartCancel OrElse (control.Name <> "StartCancelButton") Then
control.Enabled = enabled
End If
Next
End Sub

Private Sub Diag_Load(ByVal sender As System.Object, ByVal e As System.EventArgs)


Handles MyBase.Load

End Sub

Private Sub CloseButton_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles CloseButton.Click
If Not traceRoute Is Nothing Then traceRoute.Cancel()
End
' Application.ThreadExit(a, e)
Me.Close()
End Sub

Private Sub Timer1_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs)


Handles Timer1.Tick
Label1.Text &= "."
End Sub
End Class

You might also like