Professional Documents
Culture Documents
Phase I
Caching:
Caching is a technology based on the memory subsystem of your computer. The main
purpose of a cache is to accelerate your computer while keeping the price of the
computer low. Caching allows you to do your computer tasks more rapidly.
HTTP:
1
Fig 1.1 HTTP Functionality
Introduction To Ccproxy
A proxy acts as an intermediary agent between its clients and the servers
which they want to access, performing functions directed towards a variety of
purposes, like security, caching, etc.
2
Fig.1.2 Proxy server as an intermediate
3
Phase II
Network management tool
Network management refers to the activities, methods, procedures, and tools that
pertain to the operation, administration, maintenance, and provisioning of networked
systems. Operation deals with keeping the network (and the services that the network
provides) up and running smoothly. It includes monitoring the network to spot
problems as soon as possible, ideally before users are affected.
With the help of the Network management tool discussed in this project a person is
able to get the following information of a network without knowing any networking
commands. It gives the same information as the following commands presents
Ping – ping(packet internet gropher) is used to check the connectivity between two
machines.
Ping Scan – Using this tool you can scan an entire range of IP Addresses to check
their availability. The tool displays the IP Address, the response time, and the DNS
name of the discovered device. This tool uses the basic PING function as a base to
perform the scan.
Tracert : Tracert command is used to determine the path of the remote system. This
tool also provides the number of hops and the IP address of each hop.
MAC Address Resolver – The tool can fetch the MAC Address for any SNMP-
enabled node, with the provided IP Address. This tool also discovers the physical
address of a device and maps it with the corresponding IP address. In addition to
showing the MAC address, the tool also shows the SNMP availability, IP address,
DNS name, port number, community, system type, and system description.
MAC Address Scan – This is for scanning IP address and MAC address. It can
automatically detect all subnets according to the IP addresses configured on multiple
NICs of a machine and scan the MAC addresses and IP addresses of defined subnets
as your need. By sending ARP queries to the specified subnet and listens to the ARP
responses, list IP addresses and MAC addresses with their correlation in seconds.
Scan results can be edited and attached with attributes showing where the host is and
who the user is.
DNS Resolver – Network engineers can use this tool to quickly get the host name of
any node whose IP Address is known and vice versa. It also shows details like the
default netmask, network type, and the status for the forward and reverse lookups.
4
DNS Scan – Using this tool one can scan a range of IP addresses to see whether the
forward and reverse lookup actions are working fine for the devices. It also shows the
response time. In cases where an IP is not used in the network, the tool prompts that
the system does not exist in the network.
Node Calculator – It is a tool to collect the network data for any given device.
System Snapshot – System Snapshot feature enables you to quickly obtain a detailed
inventory of hardware configurations This detailed hardware inventory includes
information about their CPU type and speed, memory, operating system, service pack
information, printers, screen type and display driver, drive size and free space,
network domain, network card and much more! This information is presented in the
System Snapshot dialog, organized by category into a number of tabs.
5
MOTIVATION & OBJECTIVE
OBJECTIVE:
A caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces
bandwidth and improves response times by caching and reusing frequently-requested
web pages . Proxy has extensive access controls and makes a great server accelerator.
It runs on most available operating systems, including Windows and is licensed under
the GNU GPL.
A Caching Proxy Server with the feature of providing different privileges to the
different networks in same subnet would be advantageous in case where some web
pages request for specific clients are dummy i.e. not useful for those clients. Thus
Proxy may save some time by not accessing those web pages.
6
The advanced proxy server with cache would provide access of web pages for a
specific time period for notified clients .It would improve the caching by frequently
reusing the objects created in cache table in the given time period .Thus it would
improve the server efficiency immensely.
Requirement analysis
Hardware Requirements
Software Requirements:
7
OVERALL DESCRIPTION
A proxy server is a kind of buffer between your computer and the Internet
resource(s) you are accessing. The data you request come to the proxy first, and only
then it transmits the data to you. A proxy server receives a request for an Internet
service (such as a web page request) from a user. If the proxy server is also a cache
server, it can use its local cache of previously downloaded web pages to provide the
page without forwarding the request to the Internet. If the page is not in the cache, the
proxy server uses one of its own IP addresses to request the page from the server on
the Internet. When the page is returned, the proxy server relates it to the original
request and forwards it to the user.
Enhanced feature:
8
Restricting specific protocols (like FTP,HTTPS etc.)
Unsponsored sponsored
websites websites
websites
Proxy server
communicates
with sponsored
URL not matching server
proxy configuration
are blocked or sent to
unsponsored website
Proxy
server
Only URL’S
matching the proxy
configuration are 9
redirected to proxy
User at
User at
computer
computer
There exists a wide variety of software and hardware products that help network
system administrators manage a network. Network management
Covers a wide area, including:
The network management tool installs in the server machine and help the
administrator if in case he want all the information like IP address, MAC address of
the client machines in the network without typing the commands in command line
processor and also access some other commands like tracert root.
10
References
.www.bluecoat.com
www.w3.org/Protocols/rfc2616/rfc2616.html
http://objectclub.esm.co.jp/Jude/ - For UML tool for Detailed Design
http://argouml.tigris.org/ - Another UML tool
Unix network programming” by Richard Stevens
.http://www.javaworld.com/javaworld/jw-12-1996/jw-12-sockets.html
.http://pont.net/socket/java/
www.webopedia.com
11