You are on page 1of 10

LINUX BASED PROXY SERVER

A PROJECT REPORT (STAGE-1)

Submitted by

JATIN (07ESMCS025)

DIVYA (07ESMCS021)

BHAVNA(O7ESMCS017)

NIKITA(07ESMCS039)

in partial fulfillment for the award of the degree

of
BACHELOR OF TECHNOLOGY

in

COMPUTER SCIENCE AND ENGINEERING

St.Margaret Engineering College,Neemrana

RAJASTHAN TECHNICAL UNIVERSITY, KOTA


DEC. 2010

I
LINUX BASED PROXY SERVER

A PROJECT REPORT (STAGE-1)

Submitted by
JATIN (07ESMCS025)

DIVYA (07ESMCS021)

BHAVNA(O7ESMCS017)

NIKITA(07ESMCS039)

in partial fulfillment for the award of the degree

of
BACHELOR OF TECHNOLOGY
in

COMPUTER SCIENCE AND ENGINEERING

INTERNAL SUPERVISOR EXTERNAL SUPERVISOR


BRAHM DEO PRASAD SHAILENDRA SONI
ASST PROFESSOR ASST PROFESSOR
CS-IT Department CS-IT Department

St.Margaret Engineering College,Neemrana

RAJASTHAN TECHNICAL UNIVERSITY, KOTA

II
DEC. 2010

ST. MARGARET ENGINEERING COLLEGE, NEEMRANA

CERTIFICATION OF AUTHENTICATION

We Solemnly declare that this project report “linux based proxy server” is the
bonafide work done by purely by us, carried out under the supervision of Mr. Brahm
Deo Prasad,Asstt.Prof(CS/IT) toward partial fulfilment of the requirements of the
degree of Bachelor of Technology in Computer Science & Engineering from
Rajasthan Technical University, Kota during the year 2007-2011.

It is further satisfied that this work has not been submitted, either in part of in a full, to
any other department of the Rajasthan technical University, institution or elsewhere,
or for publication in any form.

(JATIN) (DIVYA) (BHAVNA) (NIKITA)


(07ESMCS025) (07ESMCS021) (07ESMCS017) (07ESMCS039)

III
ACKNOWLEDGEMENT

We have taken efforts in this project. However, it would not have been possible without the
kind support and help of many individuals and College administration. We would like to
extend our sincere thanks to all of them.

We are highly indebted to Mr. Shailender Soni for his guidance and constant supervision as
well as for providing necessary information regarding the project & also for their support in
completing the project.

We would like to express our gratitude towards our parents & Mr. Brahm Deo Prasad for
their kind co-operation and encouragement which help us in completion of this project.

We would like to express our special gratitude and thanks to Mr. Sunil Rankawat for giving
us such attention and time.

Our thanks and appreciations also go to our colleague in developing the project and people
who have willingly helped us out with their abilities.

IV
ABSTRACT

PROXY SERVER:

In big organizations there are so many computers connected to server each and every time.
And each computer accesses a single website lots of time. To open that particular website
computer fetches information from the web-server of local INTERNET SERVICE
PROVIDER. That consumes lot of time and also costs more. So, our idea is to less down the
time to access that particular sites and reduce the cost of fetching the same website again and
again.

To solve the above discussed problem we decide to make a PROXY SERVER. This proxy
server is been placed in between the client and the web-server. And will work as a web server
to all those clients that are connected directly to the PROXY SERVER.

FEATURES OF PROXY SERVER:

 To keep machines behind it anonymous (mainly for security).


 To speed up access to resources (using caching). Web proxies are commonly used to
cache web pages from a web server.
 To apply access policy to network services or content, e.g. to block undesired sites.
 To log / audit usage, i.e. to provide company employee Internet usage reporting.
 To bypass security/ parental controls.
 To scan transmitted content for malware before delivery.
 To scan outbound content, e.g., for data leak protection.
 To circumvent regional restrictions.

V
WHAT PROXY SERVER DO:

A proxy server is a kind of buffer between your computer and the Internet resources you are
accessing. They accumulate and save files that are most often requested by thousands of
Internet users in a special database, called “cache”. Therefore, proxy servers are able to
increase the speed of your connection to the Internet. The cache of a proxy server may
already contain information you need by the time of your request, making it possible for the
proxy to deliver it immediately. The overall increase in performance may be very high. Also,
proxy servers can help in cases when some owners of the Internet resources impose some
restrictions on users from certain countries or geographical regions. In addition to that,
among proxy servers there are so called anonymous proxy servers that hide your IP address
thereby saving you from vulnerabilities concerned with it

The functions of proxy, firewall, and caching can be in separate server programs or combined
in a single package. Different server programs can be in different computers. For example, a
proxy server may in the same machine with a firewall server or it may be on a separate server
and forward requests through the firewall.

VI
TABLE OF CONTENT:

Cover Page I

Title Page II

Certificate of Authentication III

Acknowledgement IV

Abstract V

Table of Contents VII

List of Figures IX

1. INTRODUCTION (1-5)

1.1 Proxy server 2

1.2 Features of Proxy Server 4

1.3 Firewall 4

1.4 Linux 5

1.5 Squid 5

2. LITERATURE REVIEW (6-12)

3. REQUIREMENT (13-15)

3.1 Hardware Interface 14

3.2 Communication Interface 14

3.3 Software Interface 15

VII
3.4 Other Requirements 15

4. METHODOLOGY (16-22)

4.1 Introduction to methodology 16

4.2 Stepwise Details 16

5. RESULT (23-29)

6. CONCLUSION/FINDINGS (30-32)

6.1 Conclusion 31

6.2 Findings 31

6.3 Future Scope 32

7. REFRENCES (33-34)

VIII
LIST OF FIGURES

Figure No. Name Of figure Page


No.
1.1 PROXY SERVER 4
2.1 PARALLEL DOWNLOADING 9
4.1 Configuration file 18
4.2 Configuring IP Address 21
4.3 Setting IP Address 21
5.1 PROXY SERVER 24
5.2 YUM SERVER Coding 25
5.3 Configuring Proxy server 25
5.4 Modification in Connection Settings 26
5.5 Inserting IP address 27
5.6 Username & Password Prompt 27
5.7 Restricted Site 28
5.8 Setting on Server Side 28
5.9 Prompt fo Username & Password 29
5.10 Denial of Restricted Site 29

IX
X

You might also like