You are on page 1of 11

INTRODUTION

Project is divided into two phases

Phase I: Proxy Server with enhanced features


Phase II: Network Monitoring Tools

Phase I

Proxy Server with Enhanced Features

Caching:

Caching is a technology based on the memory subsystem of your computer. The main
purpose of a cache is to accelerate your computer while keeping the price of the
computer low. Caching allows you to do your computer tasks more rapidly.

HTTP:

Hypertext Transfer Protocol


The underlying protocol used by the World Wide Web. HTTP defines how messages
are formatted and transmitted, and what actions Web servers and browsers should
take in response to various commands. For example, when you enter a URL in your
browser, this actually sends an HTTP command to the Web server directing it to fetch
and transmit the requested Web page.

1
Fig 1.1 HTTP Functionality

Introduction To Ccproxy

Proxy Server Ccproxy is easy-to-use and powerful Internet connection sharing


software. Supporting broadband, DSL, dial-up, optical fiber, satellite, ISDN and DDN
connections, It helps you build your own proxy server and share Internet access
within the LAN efficiently and easily. CC Proxy Server can act as HTTP, mail, FTP,
SOCKS, news and telnet proxy server. And It features powerful account management
functions, including Internet access control, bandwidth control, Internet web filtering,
content filtering and time control. It also provides web caching, online access
monitoring, access logging and bandwidth usage statistics functions. CC Proxy is
compatible with Win98, WinME, WinNT, Win2000, WinXP, Win2003, Vista and
Win2008.

Caching Proxy Server:

 A proxy acts as an intermediary agent between its clients and the servers
which they want to access, performing functions directed towards a variety of
purposes, like security, caching, etc.

 In its capacity as an intermediary. Specifically, caching HTTP Proxy Servers


are intermediate servers, which maintain a cache of Internet objects like html
files, image files, etc which are obtained via HTTP.

2
Fig.1.2 Proxy server as an intermediate

Current proxy has following features:

 Disable access to certain sites, like www.orkut.com or www.facebook.com.


 Disable access to sites, containing banned keywords, like "proxy“.
 Cut off certain parts on pages (banners).
 Log web surfing activity and send report to system administrator with all web
pages visited.

Proxy with enhanced features:

 Providing different privileges to different networks.


 Access control (providing access of a webpage to a particular client for a specific
time period)
 Restricting specific protocols (like FTP,HTTPS etc.)

3
Phase II
Network management tool

Network management refers to the activities, methods, procedures, and tools that
pertain to the operation, administration, maintenance, and provisioning of networked
systems. Operation deals with keeping the network (and the services that the network
provides) up and running smoothly. It includes monitoring the network to spot
problems as soon as possible, ideally before users are affected.

With the help of the Network management tool discussed in this project a person is
able to get the following information of a network without knowing any networking
commands. It gives the same information as the following commands presents

Ping – ping(packet internet gropher) is used to check the connectivity between two
machines.

Ping Scan – Using this tool you can scan an entire range of IP Addresses to check
their availability. The tool displays the IP Address, the response time, and the DNS
name of the discovered device. This tool uses the basic PING function as a base to
perform the scan.

Enhanced Ping – Enhanced Ping can be used to continuously monitor a number of


servers, routers, workstations, or other devices and continually show real-time
response rates.

Tracert : Tracert command is used to determine the path of the remote system. This
tool also provides the number of hops and the IP address of each hop.

MAC Address Resolver – The tool can fetch the MAC Address for any SNMP-
enabled node, with the provided IP Address. This tool also discovers the physical
address of a device and maps it with the corresponding IP address. In addition to
showing the MAC address, the tool also shows the SNMP availability, IP address,
DNS name, port number, community, system type, and system description.

MAC Address Scan – This is for scanning IP address and MAC address. It can
automatically detect all subnets according to the IP addresses configured on multiple
NICs of a machine and scan the MAC addresses and IP addresses of defined subnets
as your need. By sending ARP queries to the specified subnet and listens to the ARP
responses, list IP addresses and MAC addresses with their correlation in seconds.
Scan results can be edited and attached with attributes showing where the host is and
who the user is.

DNS Resolver – Network engineers can use this tool to quickly get the host name of
any node whose IP Address is known and vice versa. It also shows details like the
default netmask, network type, and the status for the forward and reverse lookups.

4
DNS Scan – Using this tool one can scan a range of IP addresses to see whether the
forward and reverse lookup actions are working fine for the devices. It also shows the
response time. In cases where an IP is not used in the network, the tool prompts that
the system does not exist in the network.

Node Calculator – It is a tool to collect the network data for any given device.

Subnet Calculator – Used to calculate or design sub-networks based on a given IP


Address or Netmask.

IP Address Manager - Tool to identify whether an IP Address is currently available


or not.

System Snapshot – System Snapshot feature enables you to quickly obtain a detailed
inventory of hardware configurations This detailed hardware inventory includes
information about their CPU type and speed, memory, operating system, service pack
information, printers, screen type and display driver, drive size and free space,
network domain, network card and much more! This information is presented in the
System Snapshot dialog, organized by category into a number of tabs.

5
MOTIVATION & OBJECTIVE

MOTIVATION: Enhancement Features in the HTTP Caching Proxy Server.

OBJECTIVE:

SCOPE OF THE PROJECT

Proxy : Optimizing Web Delivery

A caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces
bandwidth and improves response times by caching and reusing frequently-requested
web pages . Proxy has extensive access controls and makes a great server accelerator.
It runs on most available operating systems, including Windows and is licensed under
the GNU GPL.

A Caching Proxy Server with the feature of providing different privileges to the
different networks in same subnet would be advantageous in case where some web
pages request for specific clients are dummy i.e. not useful for those clients. Thus
Proxy may save some time by not accessing those web pages.

Making the most of your Internet Connection

Caching is used by hundreds of Internet Providers world-wide to provide their users


with the best possible web access. Proxy optimizes the data flow between client and
server to improve performance and caches frequently-used content to save bandwidth.
Proxy can also route content requests to servers in a wide variety of ways to build
cache server hierarchies which optimize network throughput.

6
The advanced proxy server with cache would provide access of web pages for a
specific time period for notified clients .It would improve the caching by frequently
reusing the objects created in cache table in the given time period .Thus it would
improve the server efficiency immensely.

Network management tool preventing complex


environment:
The presented network management tool with the windows interface is less
complex in use. Providing basic networking commands such as ping, tracert etc
on one interface would help the user to use those commands on just one click.
It will save the time on the large scale in the networking industries.

Requirement analysis

Hardware Requirements

 Three Personal Computers


Each with 2 GB hard-disk and 256 MB RAM
 Ethernet Cables
 Internet Connection

Software Requirements:

 Windows / higher versions of windows


 C/C++/JAVA Compiler
 Ccproxy v6.64

7
OVERALL DESCRIPTION

A proxy server is a kind of buffer between your computer and the Internet
resource(s) you are accessing. The data you request come to the proxy first, and only
then it transmits the data to you. A proxy server receives a request for an Internet
service (such as a web page request) from a user. If the proxy server is also a cache
server, it can use its local cache of previously downloaded web pages to provide the
page without forwarding the request to the Internet. If the page is not in the cache, the
proxy server uses one of its own IP addresses to request the page from the server on
the Internet. When the page is returned, the proxy server relates it to the original
request and forwards it to the user.

Current proxy has following features:

 Disable access to certain sites, like www.orkut.com or www.facebook.com.


 Disable access to sites, containing banned keywords, like "proxy“.
 Cut off certain parts on pages (banners).
 Log web surfing activity and send report to system administrator with all web
pages visited.

Enhanced feature:

 Providing different privileges to different networks.


 Access control (providing access of a webpage to a particular client for a specific
time period)

8
 Restricting specific protocols (like FTP,HTTPS etc.)

Fig.5.1 Data flow in proxy server is shown in figure:-

Unsponsored sponsored
websites websites

websites

Proxy server
communicates
with sponsored
URL not matching server
proxy configuration
are blocked or sent to
unsponsored website
Proxy
server

Only URL’S
matching the proxy
configuration are 9
redirected to proxy
User at
User at
computer
computer

Network Management Tool:-

There exists a wide variety of software and hardware products that help network
system administrators manage a network. Network management
Covers a wide area, including:

 Security: Ensuring that the network is protected from unauthorized users.


 Performance: Eliminating bottlenecks in the network.
 Reliability: Making sure the network is available to users and responding
to hardware and software malfunctions.

The network management tool installs in the server machine and help the
administrator if in case he want all the information like IP address, MAC address of
the client machines in the network without typing the commands in command line
processor and also access some other commands like tracert root.

Fig 5.2 Network Created in Simulator

10
References

 .www.bluecoat.com
 www.w3.org/Protocols/rfc2616/rfc2616.html
 http://objectclub.esm.co.jp/Jude/ - For UML tool for Detailed Design
 http://argouml.tigris.org/ - Another UML tool
 Unix network programming” by Richard Stevens
 .http://www.javaworld.com/javaworld/jw-12-1996/jw-12-sockets.html
 .http://pont.net/socket/java/
 www.webopedia.com

11

You might also like