Changes between Initial Version and Version 1 of FunctionalRequirements


Ignore:
Timestamp:
Jan 3, 2010, 12:03:41 PM (15 years ago)
Author:
huub
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • FunctionalRequirements

    v1 v1  
     1Generic Proxy: Requirements
     2Thu, 2009-07-02 21:07 — admin
     3(from http://www.genericproxy.org)
     4 
     5The device should deliver proxy services to an external network by, sharing parts of thebandwidth provided by the users' broadband connection.
     6 
     7To connect the networks to the device we need 3 network interfaces, LAN, INT and EXT (community) network.
     8 
     9The device should be able to work as a (non-transparent) proxy between the LAN and theINTernet, the EXTernal network and the INTernet and (switchable) between the LAN and theEXTernal network. Bandwidth management should be in place and controllable by the user.
     10Bandwidth should be limitable between the EXT network and the Internet.
     11 
     12The device should have 2 distinct user levels: the user (who is donating bandwith) and thenetwork manager of the EXT network. Both should have their own scope of control over the
     13device.
     14 
     15Monitoring should be in place to give the network manager of the EXTernal network a meansof controlling the total bandwidth donated and used by the sharing devices (the generic proxy appliances).
     16 
     17Extra functionality should be provided by means of adding the ability to create tunnels overthe internet between multiple proxy devices, to be able to logically connect parts of the EXTernal (community) network.
     18The device should be easy to configure, require no user maintenance, be as compatible aspossible with various broadband providers and be self contained.
     19 
     20Delivery should be as an image to be programmed in flash on an embedded board, a flashUSB stick or CDROM image for ordinary PC hardware.
     21 
     22The device should be safe and impose strict firewall rules on the traffic. There should be nodirect possibility of logging privacy sensitive data within the device by whatever user.