SlideShare a Scribd company logo
NETWORK SCANNER
Shree Rayeshwar Institute of Engineering and Information Technology
Department of Information Technology
Group No. 04
1.Sidhant Amonkar
2.Radhaprasad Borkar
3.Shrikrishna Parab
4.Sainath Dhargalkar
Internal Guides:
1. Mr. Saiesh Prabhu Verlekar
2.Ms. Sampada Desai
External Guide:
Mr. V. Francis Xavier
Agenda
1. Network Scanner
-What?
-Why?
-Where?
2. How it is different from other network scanners?
3.Features of the project
4. Scope of the project
5. Phases of implementation
6. Conclusion
What is the Network Scanner?
Network Scanner is a tool for network analysis which
scans the network on a real time basis.
Explores the network and gives the status of all
connected computers.
Scans both, a list of IP addresses or computers and
ranges of IP addresses.
Why it is used?
Allows the administrator to analyze the network
efficiently.
To monitor the network effectively.
Used to retrieve user names, and information on groups,
shares and services of networked computer.
To identify active host on the network.
Where it is used?
Can be used wherever there is a presence of a network.
Such as
-Educational institutes
-Business firms
-Government organizations
Where it is not feasible for the admin to analyze the
network manually.
What makes it different from others?
Classifies the network components as PC, printer,
scanner, router, etc.
Bandwidth monitoring and control.
Wake-On-LAN ensures that even sleeping devices are
scanned.
Features:
Platform independent.
One click application (requires no installation).
Works on both, wired and wireless network.
Easy to use application.
Scope of the Project
 Remote access control
 Remote reboot & shutdown
 Wake-On-LAN
 Remote OS detection
 Hardware components detection
 Bandwidth monitoring and control
 Exports result to TEXT format
Phases of Implementation
Module 1:
GUI design module.
Module 2:
Address calculation.
Module 3:
Bandwidth capturing.
Module 4:
Remote access.
GUI design module.
 Graphical user interface makes it easy for the admin to use the
functionality offered by the system.
 Perfect representation of the network and information about the
components present on the network is presented in a simplified form.
 Graphical representation of the bandwidth utilized by every system on
the network.
 Easy-to-use reporting interface that lets you quickly generate custom,
snazzy-looking reports on all of your network assets
GUI at the start
Scan
IP address from Host name
Hostname from IP address
GUI for Bandwidth Monitoring
Address Calculation Module
Determines the IP address of every node.
Determines the MAC address of every node.
Classifies the components of the network as a PC,
printer, scanner, router, etc based on address calculation.
Bandwidth capturing Module
This feature allows the admin to control the amount
of network traffic generated by the client.
 The bandwidth counted includes the network
activities such as downloads.
Graphical representation of the bandwidth utilized by
every system on the network
Remote access Module
 Remote access control is an easy-to -use admin interface
which enables the admin access the client machine.
 It can also control the process currently running on the
client machine and terminate that process if require.
 Includes Remote shutdown, Reboot.
 Enables Wake-On-LAN.
Data Flow Diagram
Use Case Diagram
Activity Diagram
Conclusion
The network scanner with all this feature is a handy
tool that will help the administrator to get a clear
understanding of the network.
With features like bandwidth monitoring the
administrator can trace the malicious usage of the
bandwidth.
A large amount of administrator’s time will be saved
with the use of feature like remote access.
THANK YOU

More Related Content

What's hot

Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
Arpit Suthar
 
Wireshark - presentation
Wireshark - presentationWireshark - presentation
Wireshark - presentation
Kateryna Haskova
 
NMAP - The Network Scanner
NMAP - The Network ScannerNMAP - The Network Scanner
NMAP - The Network Scanner
n|u - The Open Security Community
 
Nmap tutorial
Nmap tutorialNmap tutorial
Nmap tutorial
Varun Kakumani
 
Netcat
NetcatNetcat
Wireshark
WiresharkWireshark
Wireshark
Kasun Madusanke
 
Nmap
NmapNmap
Wireshark
Wireshark Wireshark
Wireshark
antivirusspam
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap
OWASP Delhi
 
Demo of security tool nessus - Network vulnerablity scanner
Demo of security tool nessus - Network vulnerablity scannerDemo of security tool nessus - Network vulnerablity scanner
Demo of security tool nessus - Network vulnerablity scanner
Ajit Dadresa
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
itmind4u
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
Sam Bowne
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
Ishraq Al Fataftah
 
Network scanning
Network scanningNetwork scanning
Network scanning
MD SAQUIB KHAN
 
Nmap and metasploitable
Nmap and metasploitableNmap and metasploitable
Nmap and metasploitable
Mohammed Akbar Shariff
 
Snort
SnortSnort
Metasploit
MetasploitMetasploit
Metasploit
henelpj
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
NishaYadav177
 
Nmap
NmapNmap
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 

What's hot (20)

Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
Wireshark - presentation
Wireshark - presentationWireshark - presentation
Wireshark - presentation
 
NMAP - The Network Scanner
NMAP - The Network ScannerNMAP - The Network Scanner
NMAP - The Network Scanner
 
Nmap tutorial
Nmap tutorialNmap tutorial
Nmap tutorial
 
Netcat
NetcatNetcat
Netcat
 
Wireshark
WiresharkWireshark
Wireshark
 
Nmap
NmapNmap
Nmap
 
Wireshark
Wireshark Wireshark
Wireshark
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap
 
Demo of security tool nessus - Network vulnerablity scanner
Demo of security tool nessus - Network vulnerablity scannerDemo of security tool nessus - Network vulnerablity scanner
Demo of security tool nessus - Network vulnerablity scanner
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
 
Network scanning
Network scanningNetwork scanning
Network scanning
 
Nmap and metasploitable
Nmap and metasploitableNmap and metasploitable
Nmap and metasploitable
 
Snort
SnortSnort
Snort
 
Metasploit
MetasploitMetasploit
Metasploit
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Nmap
NmapNmap
Nmap
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 

Viewers also liked

Trailer Name
Trailer NameTrailer Name
Trailer Name
PriSolanki
 
Hrm final
Hrm finalHrm final
Hrm final
Rahul Bajaj
 
Notes packaging
Notes packagingNotes packaging
Notes packaging
Swati Sinha
 
Moral Panic Theory
Moral Panic TheoryMoral Panic Theory
Moral Panic Theory
PriSolanki
 
Expanding on the Male Gaze Theory
Expanding on the Male Gaze TheoryExpanding on the Male Gaze Theory
Expanding on the Male Gaze Theory
PriSolanki
 
Interrogation Scene Images
Interrogation Scene ImagesInterrogation Scene Images
Interrogation Scene ImagesPriSolanki
 
BabelNet 3.0
BabelNet 3.0BabelNet 3.0
BabelNet 3.0
Shrikrishna Parab
 
Extended WordNet
Extended WordNetExtended WordNet
Extended WordNet
Shrikrishna Parab
 
Paul well’s research into horror audience
Paul well’s research into horror audiencePaul well’s research into horror audience
Paul well’s research into horror audience
PriSolanki
 
Rock music magazine analysis
Rock music magazine analysisRock music magazine analysis
Rock music magazine analysis
PriSolanki
 
News articles classification
News articles classificationNews articles classification
News articles classification
Shrikrishna Parab
 
Introduction to apache lucene
Introduction to apache luceneIntroduction to apache lucene
Introduction to apache lucene
Shrikrishna Parab
 
Gamification
GamificationGamification
Gamification
Shrikrishna Parab
 
Embedded dram
Embedded dramEmbedded dram
Embedded dram
Shrikrishna Parab
 

Viewers also liked (14)

Trailer Name
Trailer NameTrailer Name
Trailer Name
 
Hrm final
Hrm finalHrm final
Hrm final
 
Notes packaging
Notes packagingNotes packaging
Notes packaging
 
Moral Panic Theory
Moral Panic TheoryMoral Panic Theory
Moral Panic Theory
 
Expanding on the Male Gaze Theory
Expanding on the Male Gaze TheoryExpanding on the Male Gaze Theory
Expanding on the Male Gaze Theory
 
Interrogation Scene Images
Interrogation Scene ImagesInterrogation Scene Images
Interrogation Scene Images
 
BabelNet 3.0
BabelNet 3.0BabelNet 3.0
BabelNet 3.0
 
Extended WordNet
Extended WordNetExtended WordNet
Extended WordNet
 
Paul well’s research into horror audience
Paul well’s research into horror audiencePaul well’s research into horror audience
Paul well’s research into horror audience
 
Rock music magazine analysis
Rock music magazine analysisRock music magazine analysis
Rock music magazine analysis
 
News articles classification
News articles classificationNews articles classification
News articles classification
 
Introduction to apache lucene
Introduction to apache luceneIntroduction to apache lucene
Introduction to apache lucene
 
Gamification
GamificationGamification
Gamification
 
Embedded dram
Embedded dramEmbedded dram
Embedded dram
 

Similar to Network scanner

Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
kristinatemen
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
ashutosh rai
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
theijes
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
theijes
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
Shakib Ansaar
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
cscpconf
 
Hp open view
Hp open viewHp open view
Hp open view
Ganesh Kumar Veerla
 
E044062528
E044062528E044062528
E044062528
IJERA Editor
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
MOHD ARISH
 
ManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical OverviewManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical Overview
ManageEngine, Zoho Corporation
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
IRJET Journal
 
As4301234238
As4301234238As4301234238
As4301234238
IJERA Editor
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET Journal
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
Alexander Decker
 
OpManager Review
OpManager ReviewOpManager Review
OpManager Review
guesta265a9
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
IJERA Editor
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
sweta dargad
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
Alexander Decker
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
Chathurangi Shyalika
 

Similar to Network scanner (20)

Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
Hp open view
Hp open viewHp open view
Hp open view
 
E044062528
E044062528E044062528
E044062528
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
ManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical OverviewManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical Overview
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
 
As4301234238
As4301234238As4301234238
As4301234238
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFID
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
OpManager Review
OpManager ReviewOpManager Review
OpManager Review
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 

Recently uploaded

Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 

Recently uploaded (20)

Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 

Network scanner

  • 1. NETWORK SCANNER Shree Rayeshwar Institute of Engineering and Information Technology Department of Information Technology
  • 2. Group No. 04 1.Sidhant Amonkar 2.Radhaprasad Borkar 3.Shrikrishna Parab 4.Sainath Dhargalkar Internal Guides: 1. Mr. Saiesh Prabhu Verlekar 2.Ms. Sampada Desai External Guide: Mr. V. Francis Xavier
  • 3. Agenda 1. Network Scanner -What? -Why? -Where? 2. How it is different from other network scanners? 3.Features of the project 4. Scope of the project 5. Phases of implementation 6. Conclusion
  • 4. What is the Network Scanner? Network Scanner is a tool for network analysis which scans the network on a real time basis. Explores the network and gives the status of all connected computers. Scans both, a list of IP addresses or computers and ranges of IP addresses.
  • 5. Why it is used? Allows the administrator to analyze the network efficiently. To monitor the network effectively. Used to retrieve user names, and information on groups, shares and services of networked computer. To identify active host on the network.
  • 6. Where it is used? Can be used wherever there is a presence of a network. Such as -Educational institutes -Business firms -Government organizations Where it is not feasible for the admin to analyze the network manually.
  • 7. What makes it different from others? Classifies the network components as PC, printer, scanner, router, etc. Bandwidth monitoring and control. Wake-On-LAN ensures that even sleeping devices are scanned.
  • 8. Features: Platform independent. One click application (requires no installation). Works on both, wired and wireless network. Easy to use application.
  • 9. Scope of the Project  Remote access control  Remote reboot & shutdown  Wake-On-LAN  Remote OS detection  Hardware components detection  Bandwidth monitoring and control  Exports result to TEXT format
  • 10. Phases of Implementation Module 1: GUI design module. Module 2: Address calculation. Module 3: Bandwidth capturing. Module 4: Remote access.
  • 11. GUI design module.  Graphical user interface makes it easy for the admin to use the functionality offered by the system.  Perfect representation of the network and information about the components present on the network is presented in a simplified form.  Graphical representation of the bandwidth utilized by every system on the network.  Easy-to-use reporting interface that lets you quickly generate custom, snazzy-looking reports on all of your network assets
  • 12. GUI at the start
  • 13. Scan
  • 14. IP address from Host name
  • 15. Hostname from IP address
  • 16. GUI for Bandwidth Monitoring
  • 17. Address Calculation Module Determines the IP address of every node. Determines the MAC address of every node. Classifies the components of the network as a PC, printer, scanner, router, etc based on address calculation.
  • 18. Bandwidth capturing Module This feature allows the admin to control the amount of network traffic generated by the client.  The bandwidth counted includes the network activities such as downloads. Graphical representation of the bandwidth utilized by every system on the network
  • 19. Remote access Module  Remote access control is an easy-to -use admin interface which enables the admin access the client machine.  It can also control the process currently running on the client machine and terminate that process if require.  Includes Remote shutdown, Reboot.  Enables Wake-On-LAN.
  • 23. Conclusion The network scanner with all this feature is a handy tool that will help the administrator to get a clear understanding of the network. With features like bandwidth monitoring the administrator can trace the malicious usage of the bandwidth. A large amount of administrator’s time will be saved with the use of feature like remote access.