A proxy server is a computer that offers a computer network service to allow clients to make
indirect network connections to other network services. A client connects to the proxy server,
and then requests a connection, file, or other resource available on a different server.
The proxy provides the resource either by connecting to the specified server or by serving
it from a cache. In some cases, the proxy may alter the client's request or the server's response
for various purposes, usually to view websites that are normally not allowed, such as game
sites in school or work place. A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. Specifically, caching HTTP Proxy Servers are intermediate servers, which maintain a cache of Internet objects like html files, image files, etc which are obtained via HTTP.
INTRODUCTION TO PROJECT
In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. Specifically, caching http proxy servers are intermediate servers, which maintain a cache of internet objects like html files, image files, etc which are obtained via http. Aims and objectives of the study The following aims and objectives will be fulfilled: to keep machines behind it anonymous (mainly for security) to speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server. to apply access policy to network services or content
PURPOSE OF THE PROJECT
To block undesired sites. to log / audit usage, i. e . To provide company employee internet usage reporting. to bypass security/ parental controls. to scan transmitted content for malware before delivery. to scan outbound content, e. g . , for data leak protection. to circumvent regional restrictions. A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy. Scope of study A caching proxy server accelerates service requests by retrieving content saved from a previous request made by the same client or even other clients. Caching proxies keep local copies of frequently requested resources, allowing large organizations to significantly reduce their upstream bandwidth usage and cost, while significantly increasing performance.
PROBLEM IN EXISTING SYSTEM
• Cannot Upload and Download the latest updates.
• No use of Web Services and Remoting.
• Risk of mismanagement and of data when the project is under development.
• Less Security.
• No proper coordination between different Applications and Users.
• Fewer Users - Friendly.
• Manual system need man power a lot.
• Communication between customer and owner is not directly.
• To maintain huge no of products is tuff job.
• The complete hierarchy is doesn’t implemented in manually.
• In big organization it is time consuming process.
SOLUTION OF THESE PROBLEMS
The development of the new system contains the following activities, which try to automate the entire process keeping in view of the database integration approach.
1. User friendliness is provided in the application with various controls.
2. The system makes the overall project management much easier and flexible.
3. Readily upload the latest updates, allows user to download the alerts by clicking the URL.
4. There is no risk of data mismanagement at any level while the project development is under process.
5. It provides high level of security with different level of authentication.
After analyzing the requirements of the task to be performed, the next step is to analyze the problem and understand its context. The first activity in the phase is studying the existing system and other is to understand the requirements and domain of the new system. Both the activities are equally important, but the first activity serves as a basis of giving the functional specifications and then successful design of the proposed system. Understanding the properties and requirements of a new system is more difficult and requires creative thinking and understanding of existing running system is also difficult, improper understanding of present system can lead diversion from solution.
The model that is basically being followed is the WATER FALL MODEL, which states that the phases are organized in a linear order. First of all the feasibility study is done. Once that part is over the requirement analysis and project planning begins. If system exists one and modification and addition of
In the flexibility of the uses the interface has been developed a graphics concept in mind, associated through a browses interface. The GUI’S at the top level have been categorized as
1. Administrative user interface
2. The operational or generic user interface
The administrative user interface concentrates on the consistent information that is practically, part of the organizational activities and which needs proper authentication for the data collection. The interfaces help the administrations with all the transactional states like Data insertion, Data deletion and Date updation along with the extensive data search capabilities.
The operational or generic user interface helps the users upon the system in transactions through the existing data and required services. The operational user interface also helps the ordinary users in managing their own information helps the ordinary users in managing their own information in a customized manner as per the assisted flexibilities.
NUMBER OF MODULES
The system after careful analysis has been identified to be presented with the following modules:
The modules involved are:
This module the administrator has maintain this system and search the network place and find all transferring the data and whose system should be work and how many computers will working this system.