IP Scanner Full
IP Scanner Full
IP Scanner Full
SYNOPSIS
This Project Titled “IP SCANNER” is the software application developed for
analyzing networks. The project lets us to have all information about network
computers. The project is developed using Microsoft Visual Basic .Net 2003 and
Microsoft Access 2000 as back end. The .Net Framework version used is 1.1.
The project contains options for scanning IP addresses in any range. The IP
scanner simply pings each IP address to check if it's alive, then optionally it is
resolving its hostname, determines the MAC address, scans ports, etc. The amount of
gathered data about each host can be extended. Scanning results can be saved as TXT
or HTML page.
We can determine the computer name, workgroup name, MAC Address and
other port details of the required computer in the network. We can also explore the
remote system.
The project can scan 'B' (Class B networks (128.0.x.x to 191.255.x.x) have a
16-bit network prefix with a 16-bit host number, and are also referred to as /16
networks) or even 'C' (Class C networks (192.0.0.x to 223.255.255.x) require 24 bits
to identify the network, leaving 8 to identity the host, and are also referred to as /24
networks) class.
CONTENTS
S. PAGE
TITLE
No. No.
1 INTRODUCTION
1.1 About the Organization
1.2 Overview of the Project
2 SYSTEM ANALYSIS
2.1 System Study
2.2 Existing System
2.3 Feasibility Study
2.4 Proposed System
3 SYSTEM REQUIREMENT
3.1 Hardware Configuration
3.2 Software Configuration
3.3 About The Software
4 SYSTEM DESIGN
4.1 Input Design
4.2 Database Design
4.3 Code Design
4.4 Output Design
4.5 System Flow Diagram
4.6 Data Flow Diagram
5 SYSTEM TESTING
5.1 Unit Testing
5.2 Integration Testing
5.3 Validation Testing
5.4 User Acceptance Testing
6 SYSTEM IMPLEMENTATION AND MAINTENANCE
6.1 Implementation
6.2 Maintenance
7 CONCLUSION
8 SCOPE FOR FUTURE ENHANCEMENT
9 BIBLIOGRAPHY
10 APPENDIX
10.1 Screens
10.2 Reports
10.3 Source Coding
1. INTRODUCTION
Zigma computers Links has maintains a quality control and delivers standard
products to its customer.
.
1.2 OVER VIEW OF THE PROJECT
MODULE DESCRIPTION
The project contains the following modules:
1. IP Address Details
2. Gathering Node Details
3. Port Scanning
4. Nodes Details View
5. User Management
1. IP Address Details
The module contains options for adding IP Address to the table. We enter the
IP Address by selecting values cell by cell. We can also type the Website name to
obtain the IP Address and thereby add it to the table. We can view all the IP Addresses
added.
3. Port Scanning
The module contains options for scanning local as well as remote system port
whether the port is in use or free.
5. User Management
The module contains options for creating users who can logging to this
application and change the password.
2. SYSTEM ANALYSIS
The system is studied to the minutest detail and analyzed. The system study
plays the role of an interrogator and dwells deep into the working of the present
system. The system is viewed as a whole and the inputs to the system are identified.
The outputs from the organization are traced through the various processing that the
inputs phase through in the organization.
Economical Feasibility
Technical Feasibility
Social Feasibility
I. ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system will
have on the organization. The amount of fund that the company can spend into the
research and development of the system is limited. The expenditures must be justified.
Thus the developed system as well within the budget and this was achieved because
most of the technologies used are freely available. Only the customized products had
to be purchased.
The aspect of study is to check the level of acceptance of the system by the
user. This includes the process of training the user to use the system efficiently. The
user must not feel threatened by the system, instead must accept it as a necessity. The
level of acceptance by the users solely depends on the methods that are employed to
educate the user about the system and to make him familiar with it. His level of
confidence must be raised so that he is also able to make some constructive criticism,
which is welcomed, as he is the final user of the system.
IP address
a. Add IP address
b. Delete IP Address
Show
c. Computer Name
d. Group Name
e. MAC address
f. Time To Live
g. Ping
h. Trace Route
i. Listen Local ports
j. Listen Remove ports
View
k. IP address List.
Connect
l. FTP
m. HTTP
Settings
n. Change password
User
o. Create user
p. Change password
Exit
IP Address
a. Add IP Address
It is used to update the new IP address and allows editing and clearing the IP
Address.
b. Delete IP Address
It is used to delete the existing IP address.
Show
c. Computer Name
It is used to give the computer, Workgroup Name and MAC Address depends
upon the IP address.
d. Group Name
It is used to display the group name of the computers.
e. MAC (Media Access Control)
It is used to display the Media Access Control Address.
View
f. IP Address List
It is used to view the IP Address, computer Name, Work Group Name and its
MAC address.
Connect
g. FTP
Its acronym is File Transfer Protocol; it is used to enable the FTP connectivity
for the required IP address.
h. HTTP
Its acronym is Hyper Text Transfer Protocol; it is used to enable the HTTP
connectivity for the required IP address.
Settings
i. Change password
It is used to change the password of the existing one.
Users
j. Create User
It is used to create the new user, for this it should have name and its password.
k. Change password
It is used to change the user password.
Exit
It is used to exiting from the application.
3. SYSTEM REQUIREMENT
RAM : 128 MB
Mouse : 3 buttons
In this project .NET Framework is used as front end tool. .NET is one
of the most beautiful and recently more popular front-end tools. It contains several
parts of techniques. They are VB.NET, ASP.NET, and XML.NET. This is used in this
project. In this project SQL Server is used as the back-end tool. This is the default
back-end tool of VB.NET. Then it comes the turn of the operating system. The good
and preferred OS for .NET is Window 2003. We can also use Windows 2000 Server
and Window XP. In this project we are using Windows 2003 as platform.
VB.NET AN OVERVIEW:
Features of VB.NET
VB.NET is a program that is the advanced version of VB 6.0.
Microsoft is the company that developed this language. VB.NET is a good and
powerful language. The main features of the VB.NET are
Object oriented language.
Powerful language for development of application programs
Multithreading and Multitasking
Internet Programming
Intranet Programming
Interpretability
.
Common Language Runtime
Class Libraries
Programming Languages
(VB.NET, C#, VC++, Jscript.NET)
ASP.NET
SOFTWARE DESCRIPTION
SOFTWARE DESCRIPTION
The .NET Framework can be hosted by unmanaged components that load the
common language runtime into their processes and initiate the execution of managed
code, thereby creating a software environment that can exploit both managed and
unmanaged features. The .NET Framework not only provides several runtime hosts,
but also supports the development of third-party runtime hosts.
Security
Robustness
Productivity
Performance
SECURITY
The runtime enforces code access security. The security features of the runtime
thus enable legitimate Internet-deployed software to be exceptionally feature rich.
With regards to security, managed components are awarded varying degrees of trust,
depending on a number of factors that include their origin to perform file-access
operations, registry-access operations, or other sensitive functions.
ROBUSTNESS
The runtime also enforces code robustness by implementing a strict type- and
code-verification infrastructure called the common type system(CTS). The CTS
ensures that all managed code is self-describing. The managed environment of the
runtime eliminates many common software issues.
PRODUCTIVITY
The runtime also accelerates developer productivity. For example, programmers
can write applications in their development language of choice, yet take full
advantage of the runtime, the class library, and components written in other languages
by other developers.
PERFORMANCE
The runtime is designed to enhance performance. Although the common
language runtime provides many standard runtime services, managed code is never
interpreted. A feature called just-in-time (JIT) compiling enables all managed code to
run in the native machine language of the system on which it is executing. Finally, the
runtime can be hosted by high-performance, server-side applications, such as
Microsoft® SQL Server™ and Internet Information Services (IIS).
DATA ACCESS WITH ADO.NET
As we develop applications using ADO.NET, you will have different
requirements for working with data. You might never need to directly edit an XML
file containing data - but it is very useful to understand the data architecture in
ADO.NET.
ADO.NET offers several advantages over previous versions of ADO:
Interoperability
Maintainability
Programmability
Performance Scalability
INTEROPERABILITY
ADO.NET applications can take advantage of the flexibility and broad
acceptance of XML. Because XML is the format for transmitting datasets across the
network, any component that can read the XML format can process data. The
receiving component need not be an ADO.NET component.
The transmitting component can simply transmit the dataset to its destination
without regard to how the receiving component is implemented. The destination
component might be a Visual Studio application or any other application implemented
with any tool whatsoever.
The only requirement is that the receiving component be able to read XML.
SO, XML was designed with exactly this kind of interoperability in mind.
MAINTAINABILITY
In the life of a deployed system, modest changes are possible, but substantial,
Architectural changes are rarely attempted because they are so difficult. As the
performance load on a deployed application server grows, system resources can
become scarce and response time or throughput can suffer. Faced with this problem,
software architects can choose to divide the server's business-logic processing and
user-interface processing onto separate tiers on separate machines.
In effect, the application server tier is replaced with two tiers, alleviating the
shortage of system resources. If the original application is implemented in ADO.NET
using datasets, this transformation is made easier.
ADO.NET data components in Visual Studio encapsulate data access
functionality in various ways that help you program more quickly and with fewer
mistakes.
PERFORMANCE
ADO.NET datasets offer performance advantages over ADO disconnected
record sets. In ADO.NET data-type conversion is not necessary.
SCALABILITY
ADO.NET accommodates scalability by encouraging programmers to conserve
limited resources. Any ADO.NET application employs disconnected access to data; it
does not retain database locks or active database connections for long durations.
VISUAL STUDIO .NET
Visual Studio .NET is a complete set of development tools for building ASP
Web applications, XML Web services, desktop applications, and mobile applications
In addition to building high-performing desktop applications, you can use Visual
Studio's powerful component-based development tools and other technologies to
simplify team-based design, development, and deployment of Enterprise solutions.
Visual Basic .NET, Visual C++ .NET, and Visual C# .NET all use the same
integrated development environment (IDE), which allows them to share tools and
facilitates in the creation of mixed-language solutions. In addition, these languages
leverage the functionality of the .NET Framework and simplify the development of
ASP Web applications and XML Web services.
Visual Basic. NET, the latest version of visual basic, includes many new
features. The Visual Basic supports interfaces but not implementation inheritance.
Visual basic.net supports implementation inheritance, interfaces and overloading. In
addition, Visual Basic .NET supports multithreading concept.
COMMON LANGUAGE SPECIFICATION (CLS)
IMPLEMENTATION
Visual Basic.NET supports implementation inheritance. This means that, while
creating applications in Visual Basic.NET, we can drive from another class, which is
know as the base class that derived class inherits all the methods and properties of the
base class. In the derived class, we can either use the existing code of the base class or
override the existing code. Therefore, with help of the implementation inheritance,
code can be reused.
OVERLOADING
Overloading is another feature in Visual Basic.NET. Overloading enables us to
define multiple procedures with the same name, where each procedure has a different
set of arguments. Besides using overloading for procedures, we can use it for
constructors and properties in a class.
MULTITHREADING
Visual Basic.NET also supports multithreading. An application that supports
multithreading can handle multiple tasks simultaneously, we can use multithreading to
decrease the time taken by an application to respond to user interaction. To decrease
the time taken by an application to respond to user interaction, we must ensure that a
separate thread in the application handles user interaction.
STRUCTURED EXCEPTION HANDLING
Visual Basic.NET supports structured handling, which enables us to detect and
remove errors at runtime. In Visual Basic.NET, we need to use Try…Catch…Finally
statements to create exception handlers. Using Try…Catch…Finally statements, we
can create robust and effective exception handlers to improve the performance of our
application.
MS -ACCESS 2000
It is a personal computer based RDBMS. This provides most of the features
available in the high-end RDBMS products like Oracle, Sybase, Ingress etc. VB keeps
access as its native database. Developer can create a database for development &
further can create.
The tables are required to store data. During the initial Development phase
data can be stored in the access database & during the implementation phase
depending on the volume data can use a higher – end database.
Office Access, previously known as Microsoft Access, is an active secure
database embedded in a virtual object-oriented work cluster. It is a member of the
2007 Microsoft Office system.
Access can use data stored in Access/Jet, Microsoft SQL Server, Oracle, or
any ODBC-compliant data container. Skilled software developers and data architects
use it to develop application software. Relatively unskilled programmers and non-
programmer "power users" can use it to build simple applications. It supports some
object-oriented (OO) techniques but falls short of being a fully OO development tool.
Access was also the name of a communications program from Microsoft, meant to
compete with ProComm and other programs. This Access proved a failure and was
dropped. Years later Microsoft reused the name for its database software.
4. SYSTEM DESIGN
The design of the system is essentially a blue print, or plan for a solution of
the system to be developed. A part of the system or subsystem of a whole of the
system can itself be considered a system with its own complements.
Here the focus is on detecting that which is all the modules method needed for
the system, the specification of these design is the only way by which we can
accurately translate the end-user requirements in to a finished software product or
system.
The data flow oriented design in an architectural design method that allows a
convenient transition from the analysis model to a design description of program
structure the DFD presents a system overview depicting its overall purpose an its
interactions with external objects it provides a general pictorial of data
transformations in the system.
A DFD shows the flow of data through a system which may be a manual
procedure software system, a hard ware system or any combination of these. A DFD
shows the movements of the data through the different transformations, which are the
process in the system. DFD are made up of a number of symbols, which represent
system components, process, data store, and data flow and external entities.
Data Integration
Data Integrity
Data Independence
Data Integration
In a database, information from several files are coordinated, accessed and
operated upon as through it is in a single file. Logically, the information are
centralized, physically, the data may be located on different devices, connected
through data communication facilities.
Data Integrity
Data integrity means storing all data in one place only and how each
application to access it. This approach results in more consistent information, one
update being sufficient to achieve a new record status for all applications, which use
it. This leads to less data redundancy; data items need not be duplicated; a reduction
in the direct access storage requirement.
Data Independence
The tables needed for each module were designed and the specification of
each and every column was given based on the records and details collected during
record specification of the system study.
TABLE DESIGN
Table: Nodes
S. No Number 4
IP Address Text 15
Table: Users
Password Text 15
4.3 CODE DESIGN
The code design should be such that with less amount of coding we can
achieve more results. The speed of the system will be more if the coding is less.
Whether the data in the system is usable and readable by the system is depending on
the coding.
In the project, the coding is being done such that proper validations are made
to get the perfect input. No error inputs are accepted. In addition care is taken such
that the data integrity and referential integrity is not violated in the database. When
large volumes of data are being handled, it is important that the items to be stored
selected easily and quickly.
To accomplish this, each data item must have a unique specification and must
be related to other forms or item of data of the same type. The master file transaction
within related to the same type in the other table with using primary key. A primary
key item in master file is related to another table. In that table, it acts as the foreign
key.
SYSTEM FL OW DIAGRAM
ADD IP COPUTER IP ADDRESS FTP CHANGE CREATE
ADDRESS NAME LIST PASSWORD USER
TIME TO LIVE
PING
TRACE ROUTE
LISTEN LOCAL PORTS
LISTEN REMOVE PORTS
4.6 DATA FLOW DIAGRAM
The main merit of DFD is that it can provide an overview of what data
a system would process, what transformation of data are done, what files are used,
and where the result flow.
Basic DFD Symbols
Level - 0
IP SCANNER
LOGIN
USERS
Level - 1
IP ADDRESS
NODES
NODE
DETAILS
5. SYSTEM TESTING
TESTING
After the source code has been completed, documented as related data
structures. Completed the project has to undergo testing and validation where there is
subtitle and definite attempt to get errors. The project developer treads lightly,
designing and execution test that will demonstrates that the program works rather than
uncovering errors, unfortunately errors will be present and if the project developer
doesn’t find them, the user will find out.
The project developer is always responsible for testing the individual units i.e.
modules of the program. In many cases developer also conducts integration testing i.e.
the testing step that leads to the construction of the complete program structure.
This project has undergone the following testing procedures to ensure its
correctness.
Unit testing
Integration testing
Validation testing
6.1 IMPLEMENTATION
When the initial design was done for the system, the client was consulted for
the acceptance of the design so that further proceedings of the system development
can be carried on. After the development of the system a demonstration was given to
them about the working of the system. The aim of the system illustration was to
identify any malfunction of the system.
After the management of the system was approved the system implemented in
the concern, initially the system was run parallaly with existing manual system. The
system has been tested with live data and has proved to be error free and user friendly.
Implementation is the process of converting a new or revised system design
into an operational one when the initial design was done by the system; a
demonstration was given to the end user about the working system. This process is
uses to verify and identify any logical mess working of the system by feeding various
combinations of test data. After the approval of the system by both end user and
management the system was implemented.
System implementation is made up of many activities.
The six major activities as follows.
Coding
Testing
Installation
Documentation
Testing
Once the coding process is begin and proceed in parallel, as each program
module can be tested.
Installation
Installation is the process during which the current system is replaced by the
new system. This includes conversion of existing data, software, and documentation
and work procedures to those consistent with the new system.
Documentation
It is result from the installation process, user guides provides the information
of how the use the system and its flow.
Software maintenance is one of the phases in, and follows deployment of the
software into the field. The software maintenance phase involves changes to the
software in order to correct defects and deficiencies found during field usage as well
as the addition of new functionality to improve the software's and applicability.
Corrective
Adaptive
Perfective.
CORRECTIVE MAINTENANCE
ADAPTIVE MAINTENANCE
Adaptive maintenance means changing the program function. Of these types
more time and money are spent on perfective than on corrective and adaptive
maintenance together. This project should be inter-operability with Hardware devices
and also interact with the other software’s.
7. CONCLUSION
It is believed that almost all the system objectives that have been planned at
the commencement of the software development have been net with and the
implementation process of the project is completed.
A trial run of the system has been made and is giving good results the
procedures for processing is simple and regular order.
The process of preparing plans had been a new experience, which was found
use full in later phases of the project is completed.
Efforts have been taken to make the system user friendly and as simple as
possible.
However at some points some features may have been missed out which might
be considered for further modification of the application
8. SCOPE FOR FUTURE DEVELOPMENT
The project provides a best assistance in the network based regime.
It allows adding up the following facilities in future,
It can able to restrict the particular type of files from the network.
WEBSITES
1.http://www.dotnetheaven.com
2.http://www.startvbdotnet.com/
3.http://msdn.microsoft.com/vbasic/using/understanding/data/default.aspx
10. APPENDIX
10.1 SCREENS
LOGIN DETAILS
MAIN PAGE OF IP SCANNER PROJECT
SAVING OF IP ADDRESS
DELETING OF IP ADDRESS
ELECTING OF NODE DETAILS
SELECTING OF IP ADDRESS
SCANNING OF LOCAL PORTS
SELECTION AND FTP CONNECTIVITY
SELECTION AND HTTP CONNECTIVITY
CHANGING OF PASSWORD
CREATION OF NEW USER
10.2 REPORTS
End Sub
Imports TraceRouter
Imports System
Imports System.Drawing
Imports System.Collections
Imports System.ComponentModel
Imports System.Windows.Forms
'Imports Magenic.Network.Diagnostic
''' <summary>
''' Summary description for Diag.
''' </summary>
Public Class frmTraceRoute
Inherits System.Windows.Forms.Form
Private Enum TraceStatus
TraceNotRunning = 0
TraceRunning = 1
TraceTerminated = 2
End Enum
Friend WithEvents CloseButton As System.Windows.Forms.Button
Friend WithEvents StartCancelButton As System.Windows.Forms.Button
Friend Server As System.Windows.Forms.TextBox
Friend ServerLabel As System.Windows.Forms.Label
Private components As System.ComponentModel.IContainer
''' <summary>
''' Required designer variable.
''' </summary>
''' <summary>
''' Clean up any resources being used.
''' </summary>
Protected Overloads Overrides Sub Dispose(ByVal disposing As Boolean)
If disposing Then
If Not components Is Nothing Then
components.Dispose()
End If
End If
MyBase.Dispose(disposing)
End Sub
#End Region
' Dim res As IAsyncResult
' Dim a As New AsyncCallback(AddressOf TraceRouteCallBack)
EnableControls(True, False)
traceStatus1 = TraceStatus.TraceNotRunning
traceRoute = Nothing
End If
End If
End Sub
Application.DoEvents()
If traceStatus1 = TraceStatus.TraceNotRunning Then
Timer1.Enabled = True
Label1.Visible = True
StartCancelButton.Text = "C&ancel"
' EnableControls(False, True)
Application.DoEvents()
Try
'Dim a As New AsyncCallback(AddressOf TraceRouteCallBack)
traceRoute = New TraceRouter.TraceRoute(AddressOf TraceRouteCallBack)
traceRoute.SendTrace(Server.Text)
traceStatus1 = TraceStatus.TraceRunning
' Timer1.Enabled = False
' Label1.Visible = False
Catch err As ApplicationException
Dim errorMsg As String
StartCancelButton.Text = "&Start"
' EnableControls(True, False)
CloseButton.Enabled = True
Label1.Visible = False
If err.Message =
NetworkMessage.NetworkMessageException.HostNameNotFound.ToString() Then
errorMsg = "Host not found."
Else
errorMsg = err.Message
End If
MessageBox.Show(Me, errorMsg, "Error")
End Try
Else
traceRoute.Cancel()
traceStatus1 = TraceStatus.TraceTerminated
' EnableControls(False, False)
CloseButton.Enabled = True
Label1.Visible = False
End If
End Sub
End Sub