Print Email Download Reference This Send to Kindle Reddit This
submit to reddit

The Key Concepts Of Port Scanning Information Technology Essay

GUI and Login Authentication Module: Actually every application has one user interface for accessing the entire application. In this application also we are providing one user interface .For accessing this application. The user interface designed completely based on the end users. It is provide friendly accessing to the users. This user interface has attractive look and feel. Technically I am using the swings in core java for preparing this user interface.

In this application we are maintain login page at the time of application beginning. At that time some authentication is there. The application can checked out the client name and password with the existing user name and password. If the username is existing in the existing users list than its allowed for remaining operations otherwise it’s not allowed. it can display some error message like “Invalid Username and Password”

Port Scanning:

In this module we develop the code for scanning the ports in the system.

The scanning Is in three categories these are

UDP ports Scanning:

In this section the application can scan only the UDP ports in the system.

Generally in every system Datagram Socket () function can use the UDP protocol in the system. Based on that the application can find out the how many are assign for the UDP ports. It will display the status for ports as “open” if the number is allocated. Otherwise it displays the status as “Close”. The total no of range for UDP ports is 1024------65535.

Local ports Scanning:

In this section the application can scan only the UDP ports in the system.

Generally in every system Server Socket () function can use the UDP protocol in the system. Based on that the application can find out the how many are assign for the UDP ports. It will display the status for ports as “open” if the number is allocated. Otherwise it display the status as “Close”. The total no of range for UDP ports is 1024------65535.

Port Scanning within the Range:

In this section the ports are scanned in between the range. Here the range is user defined. The user has a facility to give the starting port and ending port for scanning. In this section it will the messages as if the port is available than it will display some message as “The port is open”. If not it shows the port is closed.

Port scanning within the Network:

In this module the port scanning are performed over the network. All those types of scanning like UDP Scanning, Local port scanning and scanning within the range of ports are perform over the Network. Same works are done in this module also.

Printer scanning module:

In this module we are preparing the code for scanning the printers within the LAN. It will find out the how many printers are connected to Network and which system is connected with the printer. And finally display the information on the screen.

Packet Monitoring Module:

Client:

In this module, the client sends the query to the server. Due to that query the server send the corresponding file to the client. Before this process, the client authentication step is involved for quit the unauthorized person. In this client side, we also generate the acknowledgement factor for congestion detection process.

Server:

In the server side, it checks the client name and its password for security process. If it is satisfied and then received the queries from the client and search the corresponding files in the database. Lastly, locate to folder then propel to user. The segmentation process and retransmitting procedure are coupled with this server process. The Congestion packet counts are also store in its memory space and retrieve it for retransmitting procedure.

The important works are as Follows

In this project we are preparing the project for monitoring the entire LAN.

In this application we are developing the three important scanning these are

By conducting the requirements analysis we listed out the requirements that are useful to restate the problem definition.

UDP ports scanning

Local Ports Scanning

Port scanning in the Network.

Packet monitoring

Printers scanning

Previous Research Concentrated

I am particularly concentrated on the LAN communication only.

EXISTING SYSTEM:

In the existing system has only the packet sending. There is no packet capturing. And in the previous application have only the ports scanning within the system only there is no possible scanning within the network. And also there is no category of scanning like UDP category, Local category etc…….Only it will check out the given port no is available or not that’s it. All these are the drawbacks of the previous applications.

PROPOSED SYSTEM:

We are preparing the new application; it will overcome all the drawbacks in the previous applications. Compare to previous applications it has lot of options these are

UDP ports scanning

Local Ports Scanning

Port scanning in the Network.

Packet monitoring

Printers scanning

In this applications we are maintaining the scanning in different categories like UDP Scanning, Local Scanning ,Scanning With in Network ,Printer Scanning etc………

Methodologies Used

I am maintaining “Spiral Model” for preparing this project.

SDLC METHDOLOGIES:

This manuscript plays a very important role in the enlargement of life cycle (SDLC) as it describes the whole necessity of the structure. SPIRAL MODEL was introduced by Barry Boehm in 1988 editorial, a spiral Model of Software Development and Enhancement. This sculpt was not the earliest sculpt to confer iterative improvement, other than it was the earliest sculpt toward make clear why the iteration sculpt.

The Following are the steps for SPIRL MODEL

The introduction intends has designed for latest structure.

The initial model of latest structure was built from the introduction intend

The next model is evolve for fourfold process

According to client point of view the whole task is able to abort if danger be deeming to immense.

The previous steps do until client satisfies so as to sophisticated model represent ultimate produce preferred.

On the other hand last structure construct’s base on sophisticated model.

The last structure methodically evaluate and veteran. Custom preservation approved on top of long-lasting to avert hefty range failure & reduce downward moment.

Merits:

Estimate becomes further sensible effort progress since significant issue exposed previous.

The SDLC is capable to manage through change i.e., software enlargement usually entail..

Gaps in Research

There are no gaps in my research. But I have to face some problems at the time of code preparation for packet scanning finally I am using threading concept in this coding finally I got the correct output.

The New Ways of looking at the Topic

In this packet scanning we are implementing the packet scanning in new way.

First of all we can monitoring the packets at the time of file sending and also we can find out the missing packets at the time of sending based on acknowledgement and finally we are giving a chance to the sender to resend the missing packets. In the previous concept the sender can’t take any responsibility for the sending packets. But in this section the sender can take the responsibility for the sending packets. If the packet was not sending the sender again send the missing packets.

The future Directions for Research

In my future I would like to implement the internet server based on this requirement than no downloading problems occurred. Then there is no congestions in downloading if any congestion sis occurred the server will resend the missing packets to the client.

Print Email Download Reference This Send to Kindle Reddit This

Share This Essay

To share this essay on Reddit, Facebook, Twitter, or Google+ just click on the buttons below:

Request Removal

If you are the original writer of this essay and no longer wish to have the essay published on the UK Essays website then please click on the link below to request removal:

Request the removal of this essay.


More from UK Essays

Doing your resits? We can help!