SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
SECURE WEB CACHE
             PROXY SERVER
INTRODUCTION
Some home networks, corporate intranets, and Internet Service Providers (ISPs) use
proxy servers (also known as proxies). Proxy servers act as a "middleman" or broker
between the two ends of a client/server network connection. Proxy servers work with Web
browsers and servers, or other applications, by supporting underlying network protocols
like HTTP.
The proxy technology, which has developed greatly in the last years, offers the perfect
solution for organizations sitting on a closed subnet behind a firewall, who are interested
in giving their employees a controlled access to the Internet.
To maximize employee productivity, organizations need to ensure a high quality Internet
experience for users. In addition, enterprises need to implement content and user policies
to manage Web traffic growth, while effectively using network resources.
Hence the solution for this is a Proxy server. By definition, "proxy" refers to a person or
agency who has authority to act for another. So, taken literally, this means that mean a
"proxy server" acts in place of another server?
A www proxy server is the answer for many companies, who are looking for ways of
minimizing the costs of giving their employees access to the Internet, and yet, increasing
the access control the company has over its accessible web sites. The www proxy server
provides access to the Web for people on closed subnets who can only access the
Internet through a firewall machine.
A proxy server is a kind of buffer between your computer and the Internet resources you
are accessing (Web sites, FTP archives etc.). The data you request come to the proxy
first, and only then it transmits the data to the user.
It is to be taken care that the Internet's growth and success is strongly related to its
"open" nature. An Internet which would have been segmented from the start with firewalls,
packet filters, and proxies may not have become what it is today.
The proxy allows managing the kind of activities that the different users are authorized to
do. It can also give reports of users activity and one very useful thing which is providing
information using smart cache system, therefore making response time shorter, after the
first document fetch.


DEFINITION OF A PROXY SERVER
Proxies are store-and-forward caches. When a web browser is configured to use a proxy,
it never connects to the URL. Instead, it always connects to the proxy server, and asks it
to get the URL for the connection. Proxies can be used as a sort of firewall, because it
isolates the user from connecting to the Internet.


MERITS OF USING A PROXY SERVER?
An advantage of using a proxy server is that its cache can serve all users. If one or more
Internet sites are frequently requested, these are likely to be in the proxy's cache, which
will improve the user’s response time.
There are different types of proxy servers with different features, some are anonymous
proxies, which are used to hide the real IP address and some are used to filter sites,
which contain material that may be unsuitable for people to view. When you connect to a
web site, the user’s true IP address will not be shown, but the proxy servers IP will.
The features of proxy servers are especially important on larger networks like corporate
intranets and ISP networks. The more users on a LAN and the more critical the need for
data privacy, the greater the need for proxy server functionality.


AIM OR OBJECTIVE OF THE PROPOSED SYSTEM
The objective of the proposed system is to develop a standard HTTP based proxy server
with web (site) caching facility and filtering aspects along with security using firewall
implementation to enable any organization to speeden up the internet traffic usage as well
as improve the bandwidth effciency thereby improving the scalability and performance of
the server.


NEED FOR A PROXY SERVER IN ANY ORGANIZATION
The main reason for using a proxy server is to give access to the Internet from within a
firewall. An application-level proxy makes a firewall safely permeable for users in an
organization, without creating a potential security hole through which one might get into
the subnet.
The proxy can control services for individual methods, host and domain, and more-filtering
client transactions. A very important thing about proxies is that even a client without DNS
can use the Web: It needs only the IP address of the proxy.
Application level proxy facilitates caching at the proxy. Usually, one proxy server is used
by all clients connected to a subnet. This is why the proxy is able to do efficient caching of
documents that are requested by more than one client. The fact that proxies can provide
efficient caching makes them useful even when no firewall machine is in order.


EXISTING SYSTEM
•   The WWW which is very popular can be considered as a large distributed information
    system.
•   The Internet usage is relatively inexpensive and itsv exponential growth in size.
•   Statisc reporst shows that on an average 600-800 millions of static web pages are
    launched along with several dynamic web pages which is an enormous increases
•   Accessing information is very fast and documents appeal to a wide range of interests
•   Network congestion and Server overloading
•   Bandwidth is not growing fast enough.
•   Without solution WWW will become too congested and its entire appeal would be lost.


PROPOSED SYSTEM ADVANTAGES
•   Belonging to same organization, clients share common interests and they probably
    access the same set of documents.
•   On the proxy server, a previously requested and cached documents would likely result
    in future hits
•   Caching most popular web pages on the proxy server can save network bandwidth
    and lower the access latency for the client
•   Reduces bandwidth consumption and decreases network traffic
•   Lessens network congestion
•   The proposed software has fast access, robustness
•   The proposed software has better transparency and scalability
•   The proposed software has better efficiency and adaptively
•   The proposed software has good stability and load balance
•   The proposed software has an ability to deal with heterogeneity and it is simple and
    easy to use


            PROPOSED SYSTEM HARDWARE REQUIREMENTS
HARDWARE
Processor    -   PIII or higher processor
RAM          -   128 MB or higher
HDD          -   40 GB or higher
FDD          -   1.44 MB
MONITOR -        LG/SAMSUNG colour
Keyboard / Mouse / ATX Cabinet


SOFTWARE
OPERATING SYSTEM :             WIN 2000/WIN XP/WIN 98
SOFTWARE                   :   JDK 1.3 OR HIGHER
WEB SERVER                 :   Tomcat / Web Logic server
DATABASE                   :   Oracle 8i


ABOUT THE PROPOSED PROJECT
The proposed Proxy is, an HTTP server that sits on a firewall machine and usually
has a caching ability making surfing much faster. This ability makes it attractive
also in case there is no firewall. It also allows one to read documents "unplugged"
to the Internet.
This caching proxy functions as a server when connected by a client, and as a
client when contacting the original server. The proposed server is quite a
sophisticated one , so that the security "lacks" are minimal.
Our proxy server is designed to improve the performance and security of
communications across a TCP/IP network such as the Internet.
Performance is improved because the server stores frequently accessed pages
locally on it's hard drive. As a web page request is sent to the proxy server, the
proxy first retrieves the web page header from the destination computer and
checks to see if it has a copy locally on it's hard drive.
If the file has been accessed in the past week, it serves the web page from it's own
hard drive thus increasing the client's response time dramatically.
If the destination web server's web page is newer than the copy cached on the
proxy server's local hard drive, the proxy server gets the web page from the
destination server while caching it locally on it's hard drive and sending it to the
client.
The organization uses a proxy server and the Internet access is possible only
through it, so that we can build a chain, being based on a type of the corporate or
organization:
•   The proposed proxy server is a HTTP proxy, so that we can create a chain,
    using HTTP

SITUATIONS AT, WHICH OUR PROXY SHOULD BE USED
We can use a proxy server if we have a child or student and wish to restrict the sites they
are viewing, we will need to make sure we get the correct type of proxy because not all
proxies filter sites. We can use it to protect the user’s own self computer, it can be used to
hide the respective IP which is useful because it means hackers can not get info about the
users using it. They will only get the proxy servers IP.
Our Proxy servers are not hard to set up, no hardware or software is needed, we just
need to configure our browser to connect through it.


Our Proxy server has a Caching facility
Which places popular objects at locations close to the clients. The proposed system
implement a hierarchical cache concept. HTTP servers are used and handled by
companies for security reasons.

The cache does the following
•   Frequently used docs are cached nearby
•   Less traffic and hence shorter delays for documents that are not cached
•   The cache reduces workload of remote server
•   Data can be accessed when remote server is down
•   Allows analysis of organization usage patterns
•   Cooperation between caches increases efficiency


The bottleneck of the connection between the client and the internet and hence it can be
shared by all clients inside the firewall. There is a feature of access latency. Our system
also implements a firewall for security reasons.
Perhaps the most common form of network firewall is a proxy server. Proxy servers act as
an intermediary between intranet and Internet computers by receiving and selectively
blocking data packets at the network boundary.
These network firewalls also provide an extra measure of safety by hiding internal LAN
addresses from the outside Internet. In a proxy server firewall environment, network
requests from multiple clients appear to the outsider as all coming from the same proxy
server address.
OUR PROPSOED SYSTEM FEATURES
•   Popular web pages are stored locally and served from our local server
•   Telecommunications traffic to the Internet can be substantially reduced
•   Faster web page and FTP response times
•   Better utilization of the limited bandwidth


                    PROPOSED SYSTEM MODULES
A. SERVER SIDE MONITOR
    1. Administration

    2. Account manager
           Permit category
           Authentication types
           Account configuration

    3. Bandwidth management

    4. Proxy Web filter

    5. Time management and control

    6. Caching

    7. Firewall

    8. Reports
           Log reports
           User usage reports


B. CLIENT SIDE MONITOR

    1. User registration

    2. Login management

    3. Site access

    4. Client backup utility

Más contenido relacionado

Más de ncct

Cockpit White Box
Cockpit White BoxCockpit White Box
Cockpit White Boxncct
 
Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspectorncct
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...ncct
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detectorncct
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protectionncct
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammerncct
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projectsncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects Bncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009ncct
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...ncct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S Pncct
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C Tncct
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projectsncct
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computingncct
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projectsncct
 
A S P
A S PA S P
A S Pncct
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S Pncct
 

Más de ncct (20)

Cockpit White Box
Cockpit White BoxCockpit White Box
Cockpit White Box
 
Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspector
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
 
A S P
A S PA S P
A S P
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S P
 

Último

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Último (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Java Abs Secure Web Cache Proxy Server

  • 1. SECURE WEB CACHE PROXY SERVER INTRODUCTION Some home networks, corporate intranets, and Internet Service Providers (ISPs) use proxy servers (also known as proxies). Proxy servers act as a "middleman" or broker between the two ends of a client/server network connection. Proxy servers work with Web browsers and servers, or other applications, by supporting underlying network protocols like HTTP. The proxy technology, which has developed greatly in the last years, offers the perfect solution for organizations sitting on a closed subnet behind a firewall, who are interested in giving their employees a controlled access to the Internet. To maximize employee productivity, organizations need to ensure a high quality Internet experience for users. In addition, enterprises need to implement content and user policies to manage Web traffic growth, while effectively using network resources. Hence the solution for this is a Proxy server. By definition, "proxy" refers to a person or agency who has authority to act for another. So, taken literally, this means that mean a "proxy server" acts in place of another server? A www proxy server is the answer for many companies, who are looking for ways of minimizing the costs of giving their employees access to the Internet, and yet, increasing the access control the company has over its accessible web sites. The www proxy server provides access to the Web for people on closed subnets who can only access the Internet through a firewall machine. A proxy server is a kind of buffer between your computer and the Internet resources you are accessing (Web sites, FTP archives etc.). The data you request come to the proxy first, and only then it transmits the data to the user. It is to be taken care that the Internet's growth and success is strongly related to its "open" nature. An Internet which would have been segmented from the start with firewalls, packet filters, and proxies may not have become what it is today. The proxy allows managing the kind of activities that the different users are authorized to do. It can also give reports of users activity and one very useful thing which is providing information using smart cache system, therefore making response time shorter, after the first document fetch. DEFINITION OF A PROXY SERVER Proxies are store-and-forward caches. When a web browser is configured to use a proxy, it never connects to the URL. Instead, it always connects to the proxy server, and asks it to get the URL for the connection. Proxies can be used as a sort of firewall, because it isolates the user from connecting to the Internet. MERITS OF USING A PROXY SERVER? An advantage of using a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve the user’s response time.
  • 2. There are different types of proxy servers with different features, some are anonymous proxies, which are used to hide the real IP address and some are used to filter sites, which contain material that may be unsuitable for people to view. When you connect to a web site, the user’s true IP address will not be shown, but the proxy servers IP will. The features of proxy servers are especially important on larger networks like corporate intranets and ISP networks. The more users on a LAN and the more critical the need for data privacy, the greater the need for proxy server functionality. AIM OR OBJECTIVE OF THE PROPOSED SYSTEM The objective of the proposed system is to develop a standard HTTP based proxy server with web (site) caching facility and filtering aspects along with security using firewall implementation to enable any organization to speeden up the internet traffic usage as well as improve the bandwidth effciency thereby improving the scalability and performance of the server. NEED FOR A PROXY SERVER IN ANY ORGANIZATION The main reason for using a proxy server is to give access to the Internet from within a firewall. An application-level proxy makes a firewall safely permeable for users in an organization, without creating a potential security hole through which one might get into the subnet. The proxy can control services for individual methods, host and domain, and more-filtering client transactions. A very important thing about proxies is that even a client without DNS can use the Web: It needs only the IP address of the proxy. Application level proxy facilitates caching at the proxy. Usually, one proxy server is used by all clients connected to a subnet. This is why the proxy is able to do efficient caching of documents that are requested by more than one client. The fact that proxies can provide efficient caching makes them useful even when no firewall machine is in order. EXISTING SYSTEM • The WWW which is very popular can be considered as a large distributed information system. • The Internet usage is relatively inexpensive and itsv exponential growth in size. • Statisc reporst shows that on an average 600-800 millions of static web pages are launched along with several dynamic web pages which is an enormous increases • Accessing information is very fast and documents appeal to a wide range of interests • Network congestion and Server overloading • Bandwidth is not growing fast enough. • Without solution WWW will become too congested and its entire appeal would be lost. PROPOSED SYSTEM ADVANTAGES • Belonging to same organization, clients share common interests and they probably access the same set of documents. • On the proxy server, a previously requested and cached documents would likely result in future hits
  • 3. Caching most popular web pages on the proxy server can save network bandwidth and lower the access latency for the client • Reduces bandwidth consumption and decreases network traffic • Lessens network congestion • The proposed software has fast access, robustness • The proposed software has better transparency and scalability • The proposed software has better efficiency and adaptively • The proposed software has good stability and load balance • The proposed software has an ability to deal with heterogeneity and it is simple and easy to use PROPOSED SYSTEM HARDWARE REQUIREMENTS HARDWARE Processor - PIII or higher processor RAM - 128 MB or higher HDD - 40 GB or higher FDD - 1.44 MB MONITOR - LG/SAMSUNG colour Keyboard / Mouse / ATX Cabinet SOFTWARE OPERATING SYSTEM : WIN 2000/WIN XP/WIN 98 SOFTWARE : JDK 1.3 OR HIGHER WEB SERVER : Tomcat / Web Logic server DATABASE : Oracle 8i ABOUT THE PROPOSED PROJECT The proposed Proxy is, an HTTP server that sits on a firewall machine and usually has a caching ability making surfing much faster. This ability makes it attractive also in case there is no firewall. It also allows one to read documents "unplugged" to the Internet. This caching proxy functions as a server when connected by a client, and as a client when contacting the original server. The proposed server is quite a sophisticated one , so that the security "lacks" are minimal. Our proxy server is designed to improve the performance and security of communications across a TCP/IP network such as the Internet. Performance is improved because the server stores frequently accessed pages locally on it's hard drive. As a web page request is sent to the proxy server, the proxy first retrieves the web page header from the destination computer and checks to see if it has a copy locally on it's hard drive.
  • 4. If the file has been accessed in the past week, it serves the web page from it's own hard drive thus increasing the client's response time dramatically. If the destination web server's web page is newer than the copy cached on the proxy server's local hard drive, the proxy server gets the web page from the destination server while caching it locally on it's hard drive and sending it to the client. The organization uses a proxy server and the Internet access is possible only through it, so that we can build a chain, being based on a type of the corporate or organization: • The proposed proxy server is a HTTP proxy, so that we can create a chain, using HTTP SITUATIONS AT, WHICH OUR PROXY SHOULD BE USED We can use a proxy server if we have a child or student and wish to restrict the sites they are viewing, we will need to make sure we get the correct type of proxy because not all proxies filter sites. We can use it to protect the user’s own self computer, it can be used to hide the respective IP which is useful because it means hackers can not get info about the users using it. They will only get the proxy servers IP. Our Proxy servers are not hard to set up, no hardware or software is needed, we just need to configure our browser to connect through it. Our Proxy server has a Caching facility Which places popular objects at locations close to the clients. The proposed system implement a hierarchical cache concept. HTTP servers are used and handled by companies for security reasons. The cache does the following • Frequently used docs are cached nearby • Less traffic and hence shorter delays for documents that are not cached • The cache reduces workload of remote server • Data can be accessed when remote server is down • Allows analysis of organization usage patterns • Cooperation between caches increases efficiency The bottleneck of the connection between the client and the internet and hence it can be shared by all clients inside the firewall. There is a feature of access latency. Our system also implements a firewall for security reasons. Perhaps the most common form of network firewall is a proxy server. Proxy servers act as an intermediary between intranet and Internet computers by receiving and selectively blocking data packets at the network boundary. These network firewalls also provide an extra measure of safety by hiding internal LAN addresses from the outside Internet. In a proxy server firewall environment, network requests from multiple clients appear to the outsider as all coming from the same proxy server address.
  • 5. OUR PROPSOED SYSTEM FEATURES • Popular web pages are stored locally and served from our local server • Telecommunications traffic to the Internet can be substantially reduced • Faster web page and FTP response times • Better utilization of the limited bandwidth PROPOSED SYSTEM MODULES A. SERVER SIDE MONITOR 1. Administration 2. Account manager Permit category Authentication types Account configuration 3. Bandwidth management 4. Proxy Web filter 5. Time management and control 6. Caching 7. Firewall 8. Reports Log reports User usage reports B. CLIENT SIDE MONITOR 1. User registration 2. Login management 3. Site access 4. Client backup utility