The Key Concepts Of Port Scanning Information Technology Essay

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

GUI and Login Authentication Module: Actually every application has one user interface for accessing the entire application. In this application also we are providing one user interface .For accessing this application. The user interface designed completely based on the end users. It is provide friendly accessing to the users. This user interface has attractive look and feel. Technically I am using the swings in core java for preparing this user interface.

In this application we are maintain login page at the time of application beginning. At that time some authentication is there. The application can checked out the client name and password with the existing user name and password. If the username is existing in the existing users list than its allowed for remaining operations otherwise it's not allowed. it can display some error message like "Invalid Username and Password"

Port Scanning:

In this module we develop the code for scanning the ports in the system.

The scanning Is in three categories these are

UDP ports Scanning:

In this section the application can scan only the UDP ports in the system.

Generally in every system Datagram Socket () function can use the UDP protocol in the system. Based on that the application can find out the how many are assign for the UDP ports. It will display the status for ports as "open" if the number is allocated. Otherwise it displays the status as "Close". The total no of range for UDP ports is 1024------65535.

Local ports Scanning:

In this section the application can scan only the UDP ports in the system.

Generally in every system Server Socket () function can use the UDP protocol in the system. Based on that the application can find out the how many are assign for the UDP ports. It will display the status for ports as "open" if the number is allocated. Otherwise it display the status as "Close". The total no of range for UDP ports is 1024------65535.

Port Scanning within the Range:

In this section the ports are scanned in between the range. Here the range is user defined. The user has a facility to give the starting port and ending port for scanning. In this section it will the messages as if the port is available than it will display some message as "The port is open". If not it shows the port is closed.

Port scanning within the Network:

In this module the port scanning are performed over the network. All those types of scanning like UDP Scanning, Local port scanning and scanning within the range of ports are perform over the Network. Same works are done in this module also.

Printer scanning module:

In this module we are preparing the code for scanning the printers within the LAN. It will find out the how many printers are connected to Network and which system is connected with the printer. And finally display the information on the screen.

Packet Monitoring Module:

Client:

In this module, the client sends the query to the server. Due to that query the server send the corresponding file to the client. Before this process, the client authentication step is involved for quit the unauthorized person. In this client side, we also generate the acknowledgement factor for congestion detection process.

Server:

In the server side, it checks the client name and its password for security process. If it is satisfied and then received the queries from the client and search the corresponding files in the database. Lastly, locate to folder then propel to user. The segmentation process and retransmitting procedure are coupled with this server process. The Congestion packet counts are also store in its memory space and retrieve it for retransmitting procedure.

The important works are as Follows

In this project we are preparing the project for monitoring the entire LAN.

In this application we are developing the three important scanning these are

By conducting the requirements analysis we listed out the requirements that are useful to restate the problem definition.

UDP ports scanning

Local Ports Scanning

Port scanning in the Network.

Packet monitoring

Printers scanning

Previous Research Concentrated

I am particularly concentrated on the LAN communication only.

EXISTING SYSTEM:

In the existing system has only the packet sending. There is no packet capturing. And in the previous application have only the ports scanning within the system only there is no possible scanning within the network. And also there is no category of scanning like UDP category, Local category etc…….Only it will check out the given port no is available or not that's it. All these are the drawbacks of the previous applications.

PROPOSED SYSTEM:

We are preparing the new application; it will overcome all the drawbacks in the previous applications. Compare to previous applications it has lot of options these are

UDP ports scanning

Local Ports Scanning

Port scanning in the Network.

Packet monitoring

Printers scanning

In this applications we are maintaining the scanning in different categories like UDP Scanning, Local Scanning ,Scanning With in Network ,Printer Scanning etc………

Methodologies Used

I am maintaining "Spiral Model" for preparing this project.

SDLC METHDOLOGIES:

This manuscript plays a very important role in the enlargement of life cycle (SDLC) as it describes the whole necessity of the structure. SPIRAL MODEL was introduced by Barry Boehm in 1988 editorial, a spiral Model of Software Development and Enhancement. This sculpt was not the earliest sculpt to confer iterative improvement, other than it was the earliest sculpt toward make clear why the iteration sculpt.

The Following are the steps for SPIRL MODEL

The introduction intends has designed for latest structure.

The initial model of latest structure was built from the introduction intend

The next model is evolve for fourfold process

According to client point of view the whole task is able to abort if danger be deeming to immense.

The previous steps do until client satisfies so as to sophisticated model represent ultimate produce preferred.

On the other hand last structure construct's base on sophisticated model.

The last structure methodically evaluate and veteran. Custom preservation approved on top of long-lasting to avert hefty range failure & reduce downward moment.

Merits:

Estimate becomes further sensible effort progress since significant issue exposed previous.

The SDLC is capable to manage through change i.e., software enlargement usually entail..

Gaps in Research

There are no gaps in my research. But I have to face some problems at the time of code preparation for packet scanning finally I am using threading concept in this coding finally I got the correct output.

The New Ways of looking at the Topic

In this packet scanning we are implementing the packet scanning in new way.

First of all we can monitoring the packets at the time of file sending and also we can find out the missing packets at the time of sending based on acknowledgement and finally we are giving a chance to the sender to resend the missing packets. In the previous concept the sender can't take any responsibility for the sending packets. But in this section the sender can take the responsibility for the sending packets. If the packet was not sending the sender again send the missing packets.

The future Directions for Research

In my future I would like to implement the internet server based on this requirement than no downloading problems occurred. Then there is no congestions in downloading if any congestion sis occurred the server will resend the missing packets to the client.

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.