Post Page Advertisement [Top]

ABSTRACT
Networks grow larger and larger by the order of the organization’s growth, maintaining the networks will be a huge task.  In any networking environment there will be many factors that are to be considered by the administrator (server).The administrator will not be having firm grip on the end users. Moreover the administrator has to know all the details of the end-users from network it and he may not be able to configure the systems of the end-users from his place.
Gover LAN is an enterprise project that is used to maintain and govern an enterprise LAN in a simpler and secured way. It aims in assisting the network administrators by maintaining proxy servers and port mappings. Gover LAN plays a vital role for Enterprise Administration, System Administration and User-Level Support Team.
Gover LAN is mainly classified into 3 major components:
       1. Gover LAN Management Console
       2. Gover LAN Scope Actions
       3. Gover LAN Remote Control
The Gover LAN Management Console performs real-time remote administration and trouble-shooting on end-users.
Gover LAN Scope Actions enables us to take control of the machines, users and groups as a whole.
What is GoverLan?
GoverLan  is an enterprise project  that is used to maintain  and govern an enterprise LAN  in a simpler and secured  way. It aims in assisting the network administrators
by maintaining proxy servers and port mappings. Gover LAN plays a vital role for Enterprise Administration, System Administration and User-Level Support Team.


 What is a Lan?
          Local area networks, generally called LANs are privately-owned networks within a single building or campus of up to a few kilometers in size. They are widely Used to connect personal computers and workstations in company offices and factories to share resources and exchange information LANs are distinguished From other kinds of networks by 3 characteristics.
(1) Their size
(2) Their transmission Technology
(3) Their topology.
LANs are restricted in size, which means that transmission time is bounded in advance. It also simplifies network management.LANs often use a transmission technology consisting of a single cable to which all the machines are attached, like the telephone company party lines once in rural areas. Various Topologies are possible for broadcast LANs. In a bus (i.e., a linear cable), at any Instant one machine is the master and is allowed to transmit. All others are required to refrain from sending. A second type of broadcast system is the ring. In a ring. Each bit propagates around on its own, not waiting for the rest of the packet to which it belongs.
                  Broadcast networks can be further divided into static and dynamic, depending in how the channel is allocated. A typical static allocation would be to divide up time into discrete intervals and run a round robin algorithm, allowing each machine to broadcast only when its time slot comes up.
Dynamic allocation methods for a common channel are either centralized Or decentralized. In centralized there is single entity, but in decentralized there is no central entity; each machine must decide for itself whether or not to transmit.
The other kind of LAN is built using point-to-point lines. 


What is HTTP Proxy Server?
The Http Proxy Server is a piece of software of that dials up to the Internet. When a node has been connected with Internet, the access of Internet could be done. Through only from that single node, if number of clients has to access the Internet to the net, this Proxy Server concept has greater utility of sharing the Internet to the clients by changing that connected node as a server so that the users in the network can access Internet throughthat proxy. This server uses the concept of multithreading; each thread being expected a request from the client.  A server speaks about the client side of a protocol to another server. This is often required when clients have certain restrictions on which server they connect to. Thus, a client would connect to a Proxy Server, who did not have such restriction; the Proxy would in turn communicate to the client.
            When a popular website is being hit by hundred’s of users, a Proxy Server  can get the contents of the web server’s popular page once, saving expense internet work transfers, while providing faster access to those page to the clients.

What is Scanning?

The process of gathering information on computing systems, which may be used for system maintenance, security assessment and investigation, and for attack.
What is Port Mapping?

 The process of finding the active ports that is , sending data packets to selected service port numbers (HTTP-80, Telnet-23, etc.) of a computing system with the purpose of identifying available network services on that system.



What is Port Scanning?

Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is opened or not.
The simplest port scan tries (i.e., sends a carefully constructed packet with a chosen destination port number) each of the ports from 0 to 65535 on the victim to see which ones are open.
Motivation for Http Proxy Server:
            Being in the INTERNET WORLD, People want to send message electronically at a faster speed that to without any data loss.
            It’s difficult to connect each node with a modem and other equips for Internet access and when more number of clients accesses the same WebPages, these could slow done the process and there is a chance of network failure.
            This motivated us to develop software that will provide a faster access without any data loss and network failure.

Motivation for Port Mapping

The server must be able to control all of its clients from the highest level itself. Hence, it has to know all the services accessed by clients. In general Port Scanning utilities are used for checking which ever ports are active on the network so that if some restricted port is opened, the administrator will be notified of this and if needed he can close the Port as well as the application that is used on the port.



SYSTEM REQUIREMENT SPECIFICATION:
Hardware Requirements:
            System Processor                    :           PentiumIII
            Clock Speed                            :           750MHz
            RAM                                       :           1GB
            Hard Disk                               :           20GB
            Floppy Drive                           :           1.44 MB
            Key Board                              :           106 Soft Touch Keyboard

Software Requirements:

            Software                                 :           jdk1.2, Java Runtime
           Operating System                    :           WINDOWS 98
            Platform                                  :           WINDOWS NT 4.0










No comments:

Post a Comment

Bottom Ad [Post Page]

| Designed by Colorlib