Proxy Firewall
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics
Active In SP
**

Posts: 2,492
Joined: Mar 2010
#1
22-04-2010, 12:25 AM


Proxy Firewall

The Proxy Firewall is developed, keeping the idea of extensive use of extensive use of Internet by institutions and companies in mind. It helps more than one person to use the internet at same time from different computers in a network through just one simple connection with existing service provider.

Proxy Firewall speaks the client side of a protocol to another server. This is often required when clients have certain restrictions on which server they can connect to.Thus a client would connect to Proxy Firewall, which does not have such restrictions, and the Proxy Firewall will in turn communicate for the client.

The project and implimentation has 4 modules and they are loaded in the server system of the network within an Internet connection. There are a number of client systems connected to the server. These clients can use Internet simultaneously.

The four modules are:

Administration
Downloading
Caching
Security
Administration:
An Administration module is responsible for the working of the Proxy Firewall. It involves

Client Administration
Security checking
Maintaining the restricted sites &clients
Cache clearing
Downloading
Downloading includes the downloading of a particular site that the user requests. The site is downloaded using the Internet Explorer of client by establishing the connection with the remote server. It involves:

Validating the client
Checking security
Checking client security
Caching
Caching means storing the sites downloaded for further request. If the clients request the same file frequently, it will be given from the cache by avoiding connection with the remote server each time. This will increase the efficiency of the entire system. it involves:

Checking file in cache
Storing in cache
Security
Proxy Firewall provides security by screening the unwanted sites. When a request for a particular site is given, it will first check for security provided by administrator. If that site is restricted, it will not service the request. In addition to security checking Proxy Firewall produces the validation of clients. Before servicing the request given by the client the server will check whether the request is from a valid client and whether he is requesting in his allotted time.

The project and implimentation can be implemented using .NET framework
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
jessy_babu
Active In SP
**

Posts: 1
Joined: Oct 2010
#2
20-10-2010, 11:04 AM

please help me....... send the proxy firewall- project and implimentation details and implementation in java.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cross-Domain Privacy-Preserving Cooperative Firewall Optimization Vasudevan313 0 391 24-10-2013, 11:11 PM
Last Post: Vasudevan313
  PROXY FOR FTP REPORT study tips 0 246 21-05-2013, 01:18 PM
Last Post: study tips
  firewall full report project report tiger 19 12,916 13-05-2013, 03:58 AM
Last Post: Guest
  Proxy Re-Encryption Scheme For Cloud Storage System PPT study tips 0 406 10-05-2013, 04:28 PM
Last Post: study tips
  Detecting and Resolving Firewall Policy Anomalies full report seminar tips 2 863 23-02-2013, 09:39 AM
Last Post: seminar tips
  Detecting and Resolving Firewall Policy Anomalies seminar flower 1 1,491 05-02-2013, 11:32 AM
Last Post: project girl
  A THRESHOLD PROXY ORIENTED ERASURE CODE -BASED CLOUD STORAGE WITH SECURE DATA project girl 0 517 14-12-2012, 04:55 PM
Last Post: project girl
  Analysis of SQL injection prevention using a filtering proxy server seminar tips 0 265 14-11-2012, 01:57 PM
Last Post: seminar tips
  FIREWALL RULE-BASE STATISTICS APPLYING IN GEM ALGORITHM seminar ideas 0 466 21-05-2012, 01:53 PM
Last Post: seminar ideas
  Proxy-Server ppt seminar ideas 0 988 08-05-2012, 10:46 AM
Last Post: seminar ideas