Sunteți pe pagina 1din 5

Java FTP Proxy Server Implementation

INTRODUCTION
In todays world, Internet is playing crucial role. Everyone need Internet
for Information gathering, communication and entertainment. A system can access
Internet only if it has dedicated Internet connection. Any client system in the network
(LAN cant access Internet without a dedicated Internet !onnection to each system"
even the server has an Internet connection. #ne more pro$lem is, if the system is
directly connected to Internet, the system can $e attacked $y the viruses and worms
in the Internet. %hese pro$lems can $e overcome $y the introduction of &ro'y server
into the system which is connected to Internet.
(ome home networks, corporate intranets, and Internet (ervice
&roviders (I(&s use pro'y servers (also known as pro'ies.
%his pro)ect has mainly three modules.
!onnection sharing
!aching
*iltering
%he !onnection sharing module provides shared Internet Access. A
single Internet connection is pro'ied and is shared among multiple clients. %hat is,
rather than giving each client system an individual direct Internet connection, a
single connection is shared and all internal connections can $e tunneled through the
pro'y system which is connected to the Internet.
%he caching module stores all the re+uested we$ pages in a local disk
cache. ,henever a client re+uests a we$ page, the cache manager checks that page
in the local cache, if it is availa$le then the page is sent to the re+uested client,
otherwise a re+uest is made to the parent pro'y in child pro'y server mode. %he
server sends re+uests directly to the we$ server if it is started as main pro'y server.
After receiving the response, the page is cached in local cache and then it is
forwarded to client.
%he -ltering module -lters all the re+uests made $y the client. In this
pro'y server the -ltering module has su$ modules named site -ltering and word
-ltering. In site -ltering, whenever a client re+uests a we$ page, -rst the page is
checked with in the restricted sites domain, if it is not in the restricted domain, then
the re+uest is forwarded to the cache manager. In word -ltering, a page downloaded
from parent pro'y or we$ server is checked against the restricted words domain. If
the words in the downloaded page are matched with the words in the restricted list, a
warning message is forwarded to the client, otherwise a copy of the page is
forwarded to the client and another copy is forwarded to the cache manager. %he
-ltering feature makes the pro'y server to act as a -rewall.
PROBLEM DEFINITION
PROBLEM STATEMENT
!omputers in an organi.ation that are directly connected to the Internet
are prone to certain malicious attacks from e'ternal sources. /oreover, when a
popular we$ site is $eing hit $y a num$er of users in the organi.ation, it re+uires a lot
of inter network down transfers and thus slows the access to those pages $y the
users.
0sing a pro'y server lets the e'ternal hosts to know only a$out the pro'y
server. %hey do not learn the names and I& addresses of the internal machines,
making it more di1cult to $reak into the systems. %hus the internals systems are
more secure.If more than one client re+uests the same page, the pro'y can make
only one re+uest to a remote server and distri$ute the received data to all waiting
clients.
EISTIN! S"STEM
In the present system, if a user wants to access ,e$, he2she must
have to forward his2her we$ re+uest directly to Internet. 3efore this he2she has to
esta$lish a dedicated Internet !onnection. If a group of (ystems want to access we$,
then each system must have an Internet !onnection and each system must $e
e+uipped with a modem, phone line, and Internet package.
LIMITATIONS OF EISTIN! S"STEM
It is very costly process to provide we$ service to each system where each
system must $e e+uipped with individual modem and phone connection.
It takes so much time to access we$ pages due to no default caching of pages
is availa$le in the system and it increases the response time and cost.
%he systems can $e attacked from Internet 4iruses and worms, so each
system in the network can $e attacked $y those 4iruses and worms.
Each system sends their re+uest to we$ servers which lead to more overhead
on servers and it leads to slow processing of re+uests and reduces the
network performance.
PROPOSED S"STEM # OBJECTI$ES
In the proposed system, all the draw$acks of the e'isting system are solved $y
providing e1cient solutions.
&ro'y server is the only system that re+uires Internet connection and all the
remaining systems in the network can $e connected to the &ro'y (erver
system and can access Internet. (o the cost of an organi.ation can drastically
decrease.
%he caching is provided in the proposed system, so the client can get the
re+uested pages in very less response time and even if the net is down, still
the pages (static only in the cache can $e forwarded to the client.
Even if the system is attacked $y the Internet viruses and worms, only the
pro'y server installed system get a5ected and remaining systems in the
network can $e safe.
%he pro'y server can controls the clients re+uests and it provides caching, so
it can improve the performance of the network.
It can provide security in the network $y the feature of -ltering.
%ARD&ARE EN$IRONMENT
%his pro)ect re+uires the following minimum hardware re+uirements.
&rocessor 6 &entium I or a$ove
7ard 8isk 6 9 :3
;A/ 6 <9= /3
/odem 6 >? @3&(
A relia$le LAN2,AN or Internet card.
SOFT&ARE CONSTRAINTS
%his pro)ect re+uires the following minimum software re+uirements.
#perating (ystem 6 ,indows A& or later.
(oftware 6 )dk<.>
,e$ 3rowser 6 Internet E'plorer or Netscape Navigator.

S-ar putea să vă placă și