SlideShare ist ein Scribd-Unternehmen logo
1 von 24
NETWORK SCANNER
Shree Rayeshwar Institute of Engineering and Information Technology
Department of Information Technology
Group No. 04
1.Sidhant Amonkar
2.Radhaprasad Borkar
3.Shrikrishna Parab
4.Sainath Dhargalkar
Internal Guides:
1. Mr. Saiesh Prabhu Verlekar
2.Ms. Sampada Desai
External Guide:
Mr. V. Francis Xavier
Agenda
1. Network Scanner
-What?
-Why?
-Where?
2. How it is different from other network scanners?
3.Features of the project
4. Scope of the project
5. Phases of implementation
6. Conclusion
What is the Network Scanner?
Network Scanner is a tool for network analysis which
scans the network on a real time basis.
Explores the network and gives the status of all
connected computers.
Scans both, a list of IP addresses or computers and
ranges of IP addresses.
Why it is used?
Allows the administrator to analyze the network
efficiently.
To monitor the network effectively.
Used to retrieve user names, and information on groups,
shares and services of networked computer.
To identify active host on the network.
Where it is used?
Can be used wherever there is a presence of a network.
Such as
-Educational institutes
-Business firms
-Government organizations
Where it is not feasible for the admin to analyze the
network manually.
What makes it different from others?
Classifies the network components as PC, printer,
scanner, router, etc.
Bandwidth monitoring and control.
Wake-On-LAN ensures that even sleeping devices are
scanned.
Features:
Platform independent.
One click application (requires no installation).
Works on both, wired and wireless network.
Easy to use application.
Scope of the Project
 Remote access control
 Remote reboot & shutdown
 Wake-On-LAN
 Remote OS detection
 Hardware components detection
 Bandwidth monitoring and control
 Exports result to TEXT format
Phases of Implementation
Module 1:
GUI design module.
Module 2:
Address calculation.
Module 3:
Bandwidth capturing.
Module 4:
Remote access.
GUI design module.
 Graphical user interface makes it easy for the admin to use the
functionality offered by the system.
 Perfect representation of the network and information about the
components present on the network is presented in a simplified form.
 Graphical representation of the bandwidth utilized by every system on
the network.
 Easy-to-use reporting interface that lets you quickly generate custom,
snazzy-looking reports on all of your network assets
GUI at the start
Scan
IP address from Host name
Hostname from IP address
GUI for Bandwidth Monitoring
Address Calculation Module
Determines the IP address of every node.
Determines the MAC address of every node.
Classifies the components of the network as a PC,
printer, scanner, router, etc based on address calculation.
Bandwidth capturing Module
This feature allows the admin to control the amount
of network traffic generated by the client.
 The bandwidth counted includes the network
activities such as downloads.
Graphical representation of the bandwidth utilized by
every system on the network
Remote access Module
 Remote access control is an easy-to -use admin interface
which enables the admin access the client machine.
 It can also control the process currently running on the
client machine and terminate that process if require.
 Includes Remote shutdown, Reboot.
 Enables Wake-On-LAN.
Data Flow Diagram
Use Case Diagram
Activity Diagram
Conclusion
The network scanner with all this feature is a handy
tool that will help the administrator to get a clear
understanding of the network.
With features like bandwidth monitoring the
administrator can trace the malicious usage of the
bandwidth.
A large amount of administrator’s time will be saved
with the use of feature like remote access.
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

( Ethical hacking tools ) Information grathring
( Ethical hacking tools ) Information grathring( Ethical hacking tools ) Information grathring
( Ethical hacking tools ) Information grathring
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
VPN
VPNVPN
VPN
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Network security
Network securityNetwork security
Network security
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumeration
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Event Management System
Event Management SystemEvent Management System
Event Management System
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Kali linux useful tools
Kali linux useful toolsKali linux useful tools
Kali linux useful tools
 
Netcat
NetcatNetcat
Netcat
 
Ceh v5 module 03 scanning
Ceh v5 module 03 scanningCeh v5 module 03 scanning
Ceh v5 module 03 scanning
 

Andere mochten auch

Moral Panic Theory
Moral Panic TheoryMoral Panic Theory
Moral Panic TheoryPriSolanki
 
Expanding on the Male Gaze Theory
Expanding on the Male Gaze TheoryExpanding on the Male Gaze Theory
Expanding on the Male Gaze TheoryPriSolanki
 
Interrogation Scene Images
Interrogation Scene ImagesInterrogation Scene Images
Interrogation Scene ImagesPriSolanki
 
Paul well’s research into horror audience
Paul well’s research into horror audiencePaul well’s research into horror audience
Paul well’s research into horror audiencePriSolanki
 
Rock music magazine analysis
Rock music magazine analysisRock music magazine analysis
Rock music magazine analysisPriSolanki
 
News articles classification
News articles classificationNews articles classification
News articles classificationShrikrishna Parab
 
Introduction to apache lucene
Introduction to apache luceneIntroduction to apache lucene
Introduction to apache luceneShrikrishna Parab
 

Andere mochten auch (14)

Trailer Name
Trailer NameTrailer Name
Trailer Name
 
Hrm final
Hrm finalHrm final
Hrm final
 
Notes packaging
Notes packagingNotes packaging
Notes packaging
 
Moral Panic Theory
Moral Panic TheoryMoral Panic Theory
Moral Panic Theory
 
Expanding on the Male Gaze Theory
Expanding on the Male Gaze TheoryExpanding on the Male Gaze Theory
Expanding on the Male Gaze Theory
 
Interrogation Scene Images
Interrogation Scene ImagesInterrogation Scene Images
Interrogation Scene Images
 
BabelNet 3.0
BabelNet 3.0BabelNet 3.0
BabelNet 3.0
 
Extended WordNet
Extended WordNetExtended WordNet
Extended WordNet
 
Paul well’s research into horror audience
Paul well’s research into horror audiencePaul well’s research into horror audience
Paul well’s research into horror audience
 
Rock music magazine analysis
Rock music magazine analysisRock music magazine analysis
Rock music magazine analysis
 
News articles classification
News articles classificationNews articles classification
News articles classification
 
Introduction to apache lucene
Introduction to apache luceneIntroduction to apache lucene
Introduction to apache lucene
 
Gamification
GamificationGamification
Gamification
 
Embedded dram
Embedded dramEmbedded dram
Embedded dram
 

Ähnlich wie Network scanner

Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdfkristinatemen
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureMOHD ARISH
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET Journal
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET Journal
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 
OpManager Review
OpManager ReviewOpManager Review
OpManager Reviewguesta265a9
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE IJERA Editor
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring Systemsweta dargad
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Alexander Decker
 
Netscan and Networx for Management Bandwidth and Traffic with Simple Routing
Netscan and Networx for Management Bandwidth and Traffic with Simple RoutingNetscan and Networx for Management Bandwidth and Traffic with Simple Routing
Netscan and Networx for Management Bandwidth and Traffic with Simple RoutingTELKOMNIKA JOURNAL
 

Ähnlich wie Network scanner (20)

Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
Hp open view
Hp open viewHp open view
Hp open view
 
E044062528
E044062528E044062528
E044062528
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
ManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical OverviewManageEngine OpUtils Technical Overview
ManageEngine OpUtils Technical Overview
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
 
As4301234238
As4301234238As4301234238
As4301234238
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFID
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
OpManager Review
OpManager ReviewOpManager Review
OpManager Review
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Netscan and Networx for Management Bandwidth and Traffic with Simple Routing
Netscan and Networx for Management Bandwidth and Traffic with Simple RoutingNetscan and Networx for Management Bandwidth and Traffic with Simple Routing
Netscan and Networx for Management Bandwidth and Traffic with Simple Routing
 

Kürzlich hochgeladen

home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxachiever3003
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentBharaniDharan195623
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 

Kürzlich hochgeladen (20)

home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managament
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 

Network scanner

  • 1. NETWORK SCANNER Shree Rayeshwar Institute of Engineering and Information Technology Department of Information Technology
  • 2. Group No. 04 1.Sidhant Amonkar 2.Radhaprasad Borkar 3.Shrikrishna Parab 4.Sainath Dhargalkar Internal Guides: 1. Mr. Saiesh Prabhu Verlekar 2.Ms. Sampada Desai External Guide: Mr. V. Francis Xavier
  • 3. Agenda 1. Network Scanner -What? -Why? -Where? 2. How it is different from other network scanners? 3.Features of the project 4. Scope of the project 5. Phases of implementation 6. Conclusion
  • 4. What is the Network Scanner? Network Scanner is a tool for network analysis which scans the network on a real time basis. Explores the network and gives the status of all connected computers. Scans both, a list of IP addresses or computers and ranges of IP addresses.
  • 5. Why it is used? Allows the administrator to analyze the network efficiently. To monitor the network effectively. Used to retrieve user names, and information on groups, shares and services of networked computer. To identify active host on the network.
  • 6. Where it is used? Can be used wherever there is a presence of a network. Such as -Educational institutes -Business firms -Government organizations Where it is not feasible for the admin to analyze the network manually.
  • 7. What makes it different from others? Classifies the network components as PC, printer, scanner, router, etc. Bandwidth monitoring and control. Wake-On-LAN ensures that even sleeping devices are scanned.
  • 8. Features: Platform independent. One click application (requires no installation). Works on both, wired and wireless network. Easy to use application.
  • 9. Scope of the Project  Remote access control  Remote reboot & shutdown  Wake-On-LAN  Remote OS detection  Hardware components detection  Bandwidth monitoring and control  Exports result to TEXT format
  • 10. Phases of Implementation Module 1: GUI design module. Module 2: Address calculation. Module 3: Bandwidth capturing. Module 4: Remote access.
  • 11. GUI design module.  Graphical user interface makes it easy for the admin to use the functionality offered by the system.  Perfect representation of the network and information about the components present on the network is presented in a simplified form.  Graphical representation of the bandwidth utilized by every system on the network.  Easy-to-use reporting interface that lets you quickly generate custom, snazzy-looking reports on all of your network assets
  • 12. GUI at the start
  • 13. Scan
  • 14. IP address from Host name
  • 15. Hostname from IP address
  • 16. GUI for Bandwidth Monitoring
  • 17. Address Calculation Module Determines the IP address of every node. Determines the MAC address of every node. Classifies the components of the network as a PC, printer, scanner, router, etc based on address calculation.
  • 18. Bandwidth capturing Module This feature allows the admin to control the amount of network traffic generated by the client.  The bandwidth counted includes the network activities such as downloads. Graphical representation of the bandwidth utilized by every system on the network
  • 19. Remote access Module  Remote access control is an easy-to -use admin interface which enables the admin access the client machine.  It can also control the process currently running on the client machine and terminate that process if require.  Includes Remote shutdown, Reboot.  Enables Wake-On-LAN.
  • 23. Conclusion The network scanner with all this feature is a handy tool that will help the administrator to get a clear understanding of the network. With features like bandwidth monitoring the administrator can trace the malicious usage of the bandwidth. A large amount of administrator’s time will be saved with the use of feature like remote access.