Sunteți pe pagina 1din 6

c c

  

 ??


?

In the present LAN scenario, each request of the end user for a web page is sent to the
server placed at the gateways, where it is processed. It increases the bandwidth and response
times. There is less security in blocking users based on IP address and blocking the anonymous
access. For big organizations, a local flat-hierarchy Intranet is not a good solution.

One convenient way of utilizing the resources is that the Intranet is built as a hierarchy of
sub-Intranets, each of these sub-nets is gatewayed to the main Intranet through a proxy, and the
entire Intranet is gatewayed through a proxy to the Internet.

Following are some of the administrative issues that must be resolved:


V? It should support multiple requests from different users at the same time.
V? It should allow for caching of internet objects such as HTML, Image files etc.
V? It should also support both HTTP 1.0 and 1.1. The proxy should support for all important
HTTP messages.
V? It should have security features which will allow specific users or machines/ip to be
allowed or denied access. Alternatively it should be able to block a website to be
accessed as well. It should have a rule file to describe all the security rules.
V? Monitoring the status of the proxy and refresh rate of the cache.

 ? ?
 ?

One solution to the above problem is to make use of software that are dedicated to the
administrator that address the above mentioned administrative issues. HTTP Caching proxy is
software that is designed for the administrator to effectively monitor the status of the proxy and
recommends that organization users can be informed of their specific policies concerning
internet access .Web filter act as a tool for monitoring activity and enforcing the policies.

 


V? ºnables to use a hierarchy of caching proxy servers.


V? To resolve administrative issues like accessing certain URL¶s, spam etc.
V? To maintain the centralized database which makes maintenance an easy task.
V? It also serves as a user friendly application.

?? 


It reduces bandwidth and improves response times by caching and reusing frequently-
requested web pages. It runs on most available operating systems, including Windows. It can
also route content requests to servers in a wide variety of ways to build cache server hierarchies
which optimize network throughput. Concurrency issues are handled.

Strict surveillance can be achieved which protects the integrity of the organization
V? The Maintenance and the Servicing activities enable the administrator to satisfy the needs
of the organization.
V? Updating the necessary configuration can be easily achieved by the administrator.

?

 ?

HTTP proxy caching software cannot be applied to stand alone systems due to DHCP. A
centralized view of the processes, resources and the services is being maintained which may lead
to single point failure.

?
 ?  ? ?
!?
A Local Area Network (LAN) supplies networking capability to a group of computers in
close proximity to each other such as in an office building, a school, or a home. A Local Area
Network is useful for sharing resources like files, printers, games or other applications. A LAN
in turn often connects to other LANs, and to the Internet or other Wide area Network (WAN).

Most local area networks are built with relatively inexpensive hardware such
as ºthernet cables, network adapters, and hubs. Wireless LAN and other more advanced LAN
hardware options also exist. Specialized operating system software may be used to configure a
local area network.

 ? ? 

?

The LAN administration is specifically designed for the administrator. The LAN
administrator can monitor all the processes running on the clients that are connected to the
network. The LAN administrator has the privilege to check for the illegal accesses of internet on
the client system.?

The LAN administrator provides support and management of the local area network
within a company or non-profit organization. As part of the regular maintenance of the network,
the LAN administrator will monitor the daily activity on the network.

? HTT?"#? ?

In an enterprise that uses the Internet, a proxy server is a server that acts as an
intermediary between a workstation user and the Internet so that the enterprise can ensure
security, administrative control, and caching service. A proxy server is associated with or part of
a gateway server that separates the enterprise network from the outside network and a firewall
server that protects the enterprise network from outside intrusion. Squid is a popular product that
combines proxy and cache functions.
? $??"#? ?

Squid is a fully-featured HTTP/1.0 proxy. Squid offers a authorization and logging


environment to develop web proxy and content serving applications. Squid is based on the
Harvest Cache Daemon. Some companies have embedded Squid in their home or office firewall
devices, others use Squid in large-scale web proxy installations to speed up broadband and
dialup internet access. Squid is being increasingly used in content delivery architectures to
deliver static and streaming video/audio to internet users worldwide. Squid is a caching proxy for
the Web supporting HTTP, HTTPS, FTP. It reduces bandwidth and improves response times by
caching and reusing frequently-requested web pages.

? ?! %?

IP blocking prevents the connection between a server/website and certain IP addresses or


ranges of addresses. IP blocking effectively bans undesired connections from those computers to
a website, mail server, or other Internet server.

Both companies and schools offering remote user access, and people wanting to access
their home computers from remote locations, use Linux programs such as BlockHosts,
DenyHosts or Fail2ban for protection from unauthorized access while allowing permitted remote
access.

It is also used for censorship. One example is the July 2003 decision by techfocus.org to
ban the Recording Industry Association of America (RIAA) and Motion Picture Association of
America (MPAA) from its website for various abuses by those two organizations of the content
on it.

&? Ñ ? ?

?
 %?
URL filtering is the technique whereby content is blocked or allowed based on analysis
of its content, rather than its source or other criteria. It is most widely used on the internet to
filter email and web access.URL filtering is the most commonly used group of methods to filter
spam. URL filters act either on the content, the information contained in the mail body, or on the
mail headers to either classify, accept or reject a message. URL filtering is commonly used by
organizations such as offices and schools to prevent computer users from viewing inappropriate
web sites or content, or as a pre-emptive security measure to prevent access of known malware
hosts. The most popular filter is the Bayesian filter, which is a statistical filter.

 ? ?? 

?'(  

 ?

The LAN administration is specifically designed for the administrator. The LAN
administrator can monitor all the processes running on the clients that are connected to the
network. One of the initialization operations done at startup by the administrator is to handle
communication with the clients, and sets/gets parameters from other components.

The LAN administrator has the privilege to check for the illegal access from the client
system. The LAN administrator provides support and management of the local area network
within a company or non-profit organization. As part of the regular maintenance of the network,
the LAN administrator will monitor the daily activity on the network. The client or the user has
no role to play in the software. The client system is monitored by the administrator in the
network.

? 
? $
?
?

) *? ??
V? Operating System-preferably Windows 98 or higher
V? Front end- JDK 1.5 or later, Net Beans IDº 6.1, Servlets, JSP
V? Back ºnd- MySQL
V? LAN- 10Mbps LAN Connection

)*? '
??
V? Operating System-preferably Windows 98 or higher
V? Front end- JDK 1.5 or later, Net Beans IDº 6.1, Servlets, JSP
V? LAN- 10Mbps LAN Connection
V? Web browsers.

? H  ? $


?
?
) *? ??
V? Processor- preferably Intel Pentium 4 processor and above?
V? Memory- 512MB RAM or more?
V??? Hard Disk- 80 GB?
?
)*? ?'
??
V? Processor- preferably Intel Pentium 4 processor and above?
V? Memory- 512MB RAM or more?
V? Hard Disk- 20GB or more?

?


S-ar putea să vă placă și