Beruflich Dokumente
Kultur Dokumente
IP ADDRESS
CALCULATOR
Submitted to
BACHELOR OF ENGINEERING IN
Computer Science & Engineering
By
Anjali Sahu (0608CS111005)
Surbhi Sahu(0608CS111058)
Shilpi Rajak (0608CS111050)
BTIRT
Declaration
Anjali Sahu(0608CS111005)
Surbhi Sahu(0608CS111058)
Shilpi Rajak (0608CS111044)
BABULAL TARABAI INSTITUTE OF RESEARCH & TECHNOLOGY
NH-26, Narsinghpur Road, Sironja, Sagar (M.P.)
Approved by AICTE New Delhi & Affiliated to RGPV Bhopal M.P.
BTIRT
Declaration
chourasia.
.
BABULAL TARABAI INSTITUTE OF RESEARCH & TECHNOLOGY
NH-26, Narsinghpur Road, Sironja, Sagar (M.P.)
Approved by AICTE New Delhi & Affiliated to RGPV Bhopal M.P.
BTIRT
CERTIFICATE
This is to certify that the project entitled IP ADDRESS CALCULATOR has been
( 0 6 0 8 C S 1 1 1 0 5 8 ) a n d S h i l p i R a j a k ( 0 6 0 8 C S 1 1 1 0 4 4 ) under my
At the end I would like to express my sincere thanks to all my friends and others
who helped me directly or indirectly during this dissertation work.
Anjali Sahu(0608CS111005)
Surbhi Sahu(0608CS111058)
Shilpi Rajak(0608CS111044)
INDEX
Page no
Abstract
(i) Aim Of Project
(ii) Need Of Project
Chapter - 1 Analysis
1. Hardware And Software Required
2. System Analysis
3. Software Development Life Cycle
4. E- R Diagram
5. DFD Diagram
Chapter -2 Front end And Back end technology
2.1
2.2
2.3
Chapter-3 Design Methodology
3.1
3.2
3.3
Chapter -4 Coding
Chapter -5Testing
4.1
4.2
4.3
Chapter -6 Scope and Conclusion
Chapter -7 Reference
ABSTRACT
An internet protocols address is a numerical label assigned to each device (e.g. computer,
printer) participating in a computer network that use the internet protocol for
communication. Subnetting an IP network allows for the flow of network traffic to be
segregated based on a network configuration. It essentially organizes the hosts into logical
groups, and provides for improving network security and performance. The most common
reason for Subnetting IP networks is to control network traffic. Traditionally, in an Ethernet
network, it is very common for all nodes on a segment to see all the packets transmitted by
all the other nodes on that segment, which introduces collisions, and the resulting
retransmissions under heavy traffic loads. An IP address service to principal function: host
or network interface identification and location addressing.
AIM OF PROJECT
The main aim of this project is to reduce the lengthy calculation of Subnetting. As
we know that Subnetting is too lengthy and a big process that’s why it takes more time to
do calculation. To reduce that waste of time, we made this. This is a desktop application
that can install in any operating system, without any problem. This project that is IP
ADDRESS CALCULATOR has made in visual studio 2010 by C# language. This is a
more straightforward and faster IP subnet calculator, giving you a complete list of
information concerning an IP address and Subnet Mask, including the Network and Host
address size.
This calculator we have made to provide efficient result and it take less input and
provide more output. Subnetting is essentially the modificationof a single IP network to
create two or more logically visible sub-sections. Itentails changing the subnet mask of the
local network number to produce an evennumber of smaller network numbers, each with a
corresponding range of IPaddresses. When is subnetting necessary? Subnetting is required
when onenetwork number needs to be distributed across multiple LAN segments. This may
be the case in instances when: A company uses two or more types of LAN technology (for
example, Ethernet, Token Ring) on their network. Two network segments arerestricted by
distance limitations (for example, remote offices linked viapoint-to-point circuit). Segments
need to be localized for network managementreasons (accounting segment, sales segment,
etc.). Hosts which dominate mostof the LAN bandwidth need to be isolated.
CHAPTER-1
ANALYSIS
1.1 HARDWARE AND SOFTWARE REQUIREMENT
HARDWARE REQUIREMENT:-
SOFTWARE REQUIREMENT:-
Operating System : Window 7, Window 8, Window XP
Language : C# visual basic
1.2 SYSTEM ANALYSIS:-
Systems analysis is an explicit formal inquiry carried out to help someone (referred
to as the decision maker) identify a better action and make a better decision than he might
otherwise have made. The characteristic attributes of a problem situation where systems
analysis is called upon are complexity of the issue and uncertainty of the outcome of any
course of action that might reasonably be taken. Systems analysis usually has some
combination of the following: identification and re-identification) of objectives, constraints,
and alternative courses of action; examination of the probable consequences of the
alternatives in terms of costs, benefits, and risks; presentation of the results in a comparative
framework so that the decision maker can make an informed choice from among the
alternatives. The typical use of systems analysis is to guide decisions on issues such as
national or corporate plans and programs, resource use and protection policies, research and
development in technology, regional and urban development, educational systems, and
other social services. Clearly, the nature of these problems requires an interdisciplinary
approach. There are several specific kinds or focuses of systems analysis for which different
terms are used: A systems analysis related to public decisions is often referred to as a
POLICY ANALYSIS (in the United States the terms are used interchangeably). A systems
analysis that concentrates on comparison and ranking of alternatives on basis of their known
characteristics is referred to as decision analysis.
That part or aspect of systems analysis that concentrates on finding out whether an intended
course of action violates any constraints is referred to as FEASIBILITY analysis. A systems
analysis in which the alternatives are ranked in terms of effectiveness for fixed cost or in
terms of cost for equal effectiveness is referred to as COST-
EFFECTIVENESS analysis. COST- BENEFIT ANALYSIS is a study where for each
alternative the time stream of costs and the time stream of benefits are discounted to yield
their present values. The comparison and ranking are made in terms of net benefits (benefits
minus cost) or the ratio of benefits to costs. In risk-BENEFIT ANALYSIS , cost (in
monetary units) is assigned to each risk so as to make possible a comparison of the
discounted sum of these costs (and of other costs as well) with the discounted sum of
benefits that are predicted to result from the decision.
Requirements: -
Once the requirement analysis is done the next step is to clearly define and document the
product requirements and get them approved from the customer or the market analysts. This
is done through ‘SRS’ – Software Requirement Specification document which consists of
all the product requirements to be designed and developed during the project life cycle.
SRS is the reference for product architects to come out with the best architecture for the
product to be developed. Based on the requirements specified in SRS, usually more than
one design approach for the product architecture is proposed and documented in a DDS -
Design Document Specification. This DDS is reviewed by all the important stakeholders
and based on various parameters as risk assessment, product robustness, design modularity ,
budget and time constraints , the best design approach is selected for the product.
A design approach clearly defines all the architectural modules of the product along
with its communication and data flow representation with the external and third party
modules (if any). The internal design of all the modules of the proposed architecture should
be clearly defined with the minutest of the details in DDS.
Maintenance:
Once the product is tested and ready to be deployed it is released formally in the
appropriate market. Sometime product deployment happens in stages as per the
organizations’ business strategy. The product may first be released in a limited segment and
tested in the real business environment .
Then based on the feedback, the product may be released as it is or with suggested
enhancements in the targeting market segment. After the product is released in the market
segment.
1.4 E-R diagram of ip Address Calculator
An entity–relationship model (ER model) is a data model for describing the data or
information aspects of a business domain or its process requirements, in an abstract way
that lends itself to ultimately being implemented in a database such as arelational database.
The main components of ER models are entities (things) and the relationships that can exist
among them.
1.5 DFD of IP Address calculator
A data flow diagram (DFD) is a graphical representation of the "flow" of data through an
information system, modeling its process aspects. Often they are a preliminary step used to
create an overview of the system which can later be elaborated.DFDs can also be used for
the visualization of data processing (structured design).
CHAPTER-2
Frontend Technology
2.1 Frontend technology
Visual C# - Visual C# is a modern, type-safe, and object-oriented programming language
designed for developing applications for the .NET Framework. It also provides an
Integrated Development Environment (IDE) with a collection of development tools,
debuggers, and visual designers. Visual C# 2010 simplifies programming and deployment
with the Microsoft Office APIs, allows easier interop with dynamic languages, and
provides greater support for Test-Driven Development and quick code navigation.
When you start Visual C#, Start Page is displayed. Start Page has two columns; the left
column holds Start and Recent sections. These sections contain options for developers to
create a new application or work with an existing one, respectively.
Visual C# places Get Started and Latest News tabs in the left column so developers can find
useful information about application development, resources, and a tutorial. It is necessary
for the user to have an internet connection to access the latest news.
Menubar provides functions to developers for coding, maintaining and executing their
programs. Menubar contains:
Controls
Properties describe shape, size and other characteristics of control. Controls inherit or
override properties, which defined in the System.Windows.Forms.Control class to create
their own properties. The following table lists some common properties of Visual C#
controls.
Name Description
BackColor Get or set the background color.
Get or set Enabled characteristic of control. Set to "True" means that
Enabled control can receive data from a user and "False" means users can't
interact with control.
ForeColor Get or set the ForeColor.
Height Get or set the height of control.
Get or set the name of control. Developer uses this name to refer to the
Name
control when they are coding.
Right Get the right edge of control relative to the top of its container.
Text Get or set the text presented in control.
Top Get or set the top edge of control relative to the top of its container.
Visible Get or set the visible of control.
Width Get or set the width of control.
CHAPTER-3
DESIGN
METHODOLOGY
3.1- Design Of Ip address Calculator
To design IP Address Calculator I have use a From to draw the window and I have also
use some contols they are-
1.Labels
2. Textbox
3.Listbox
4.Button
5.Image Icons
CHAPTER-4
CODING
Coding
using System;
using System.Net;
namespace NetCalc
{
/// <summary>
/// Summary description for IPTool.
/// </summary>
public class IPTool
{
// first (0x00) only for fill - so array starts with bit 1
static byte [] bit = { 0x00, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40,
(byte)0x80 };
return r;
}
return r;
}
/*
* return true if domainName is an IP
*/
static public bool isIP (String domainName)
{
//if (domainName.matches("[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}\\.[0-
9]{1,3}"))
if (domainName.Equals("[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}\\.[0-
9]{1,3}"))
return true;
else return false;
}
/*
* Converts (unsigned)byte to int
*/
public static int byte2int (byte b)
{
int i = b;
if (b < 0) i = b & 0x7f + 128;
return i;
}
/**
* @return
*/
public int getNetworkPrefix()
{
return this.networkPrefix;
}
/**
* @param prefix
*/
public void setNetworkPrefix(int prefix)
{
this.networkPrefix = prefix;
}
/*
* 0=Class A
* 1=Class B
* 2=Class C
* 3=Class D
* 4=Class E
* -1=error
*/
public int getNetworkClass ()
{
// Test Class A: first bit=0
if (!IPTool.isBitSet(this.get1Byte(),8)) return 0;
// Test Class B: first 2bit=10
else if (!IPTool.isBitSet(this.get1Byte(),7)) return 1;
// Test Class C: first 3bit=110
else if (!IPTool.isBitSet(this.get1Byte(),6)) return 2;
// Test Class D: first 4bit=1110
else if (!IPTool.isBitSet(this.get1Byte(),5)) return 3;
// Test Class E: first 4bit=1111 ( = all other)
// else if (!IPTool.isBitSet(this.get1Byte(),8))
return 4;
else return 4;
/*
// Test Class A: first bit=0
if ((this.get1Byte() | (byte)0x7f) == (byte)0x7f) return
0;
// Test Class B: first 2bit=10
if ((this.get1Byte() | 0xbf) == 0xbf) return 1;
// Test Class C: first 3bit=110
if ((this.get1Byte() | 0xdf) == 0xdf) return 2;
// Test Class D: first 4bit=1110
if ((this.get1Byte() | 0xef) == 0xef) return 3;
// Test Class E: first 4bit=1111
if ((this.get1Byte() & 0xf0) == 0xf0) return 4;
return -1;
*/
return a+"."+b+"."+c+"."+d;
}
return nextIp;
return ip;
}
}
}
CHAPTER-4
TESTING
5.1 TESTING
In software development process, error can be at any stage during development.
For each phase, different techniques are used for detecting errors. During testing the
program to be tested and executable with a set of test cases is evaluated to determine the
program is performing as expected.
During the requirement analysis and design, the output is a document that is
usually textual and no executable. After the coding phase, the program are available that
cannot be executable for the testing purpose.
Hence the different level of testing is used.
The objective is to design tests that systematically uncover different classes of errors
and do so with minimal amount of time and effort.
A good testing case is one that has a high probability of finding a uncovered errors.
Testing should begins in the small and progress towards testing in the large.
Black box testing treats the software as black box without any knowledge of internal system
design is not considered in this type of testing. Tests are based on requirements and
functionality. Black box tester has no bonds with the code and a tester perception is very
simple, a code must have bugs. Therefore, black box testing has the advantage of an
unaffiliated opinion on the other hand, disadvantage of blind exploring.
Finally, acceptance testing is performed to see all the requirement is satisfied in the user
view.
After completion of coding part, the system was tested under various tests. For each and
every module all possible condition is tested to find out the traced errors.
After integration all the modules, the software thoroughly tested by simulating all possible
situation for both outline and offline activities and found to be satisfactory.
CHAPTER 6
SCOPE AND
CONCLUSION
SCOPE
These types of software are available in market rarely. So we have made this
software for the users to calculate the subnet mask, network ip, broadcast ip, valid max.
range of IP, max no. of host. Users can also implement ipv6 in it, in future. User can also
get output in binary format if they want, in future after implementation of this feature.
In future It will also calculate the Ipv6 addresses. There are many things can implement in
this application in future. It will become less light weighted application.So the scope of this
application is very bright.
CONCLUSION
Its just a desktop software which is use for calculate the subnet mask, as we know
that the subnetting process is to lenthy . So reduse the complexity and provide
efficient and better output to user ,that why we have made this.
This application can install in any type of operating system , it means its platform
independent,easy to install and understanable to user. By this user can calculate
Subnet mask, Network IP , Broadcast IP , IP range , No of host etc. In a few second.
It provide more output in some input.It is small application so it take less space in
your system memory.
CHAPTER 7
REFERENCE
Reference
1.IP Addressing and Subnetting, Including IPv6
by Syngress (Author).