Preview

Function of a Proxy Server Essay Example

Good Essays
Open Document
Open Document
745 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Function of a Proxy Server Essay Example
FUNCTIONS OF A PROXY SERVER
A proxy server has a large variety of potential purposes, including:
• To keep machines behind it anonymous (mainly for security).
• To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.
• To apply access policy to network services or content, e.g. to block undesired sites.
• To log / audit usage, i.e. to provide company employee Internet usage reporting.
• To bypass security/ parental controls.
• To scan transmitted content for malware before delivery.
• To scan outbound content, e.g., for data leak protection.
• To circumvent regional restrictions.

Proxy servers implement one or more of the following functions:
Caching proxy server a caching proxy server accelerates service requests by retrieving content saved from a previous request made by the same client or even other clients. Caching proxies keep local copies of frequently requested resources, allowing large organizations to significantly reduce their upstream bandwidth usage and cost, while significantly increasing performance. Most ISPs and large businesses have a caching proxy. These machines are built to deliver superb file system performance (often with RAID and journaling) and also contain hot-rodded versions of TCP. Caching proxies were the first kind of proxy server.

The HTTP 1.0 and later protocols contain many types of headers for declaring static (cacheable) content and verifying content freshness with an original server, e.g. ETAG (validation tags), If-Modified-Since (date-based validation), Expiry (timeout-based invalidation), etc. Other protocols such as DNS support expiry only and contain no support for validation.

Some poorly-implemented caching proxies have had downsides (e.g., an inability to use user authentication). Some problems are described in RFC 3143 (Known HTTP Proxy/Caching Problems).

Web proxy

A proxy that focuses on WWW traffic is called a "web proxy". The most

You May Also Find These Documents Helpful

  • Best Essays

    Nt1310 Unit 4 Exercise 1

    • 1486 Words
    • 6 Pages

    Phase 5: File caching strategy: The caching strategy is used to cache local index file and correlated files. Based on the strategy, communications with HDFS are drastically reduced thus to improve the access efficiency, when downloading files. When a requested file misses in cache, the client needs to query NameNode for file metadata. According to the metadata, the client connects with appropriate DataNodes where blocks locate. When the local index file is firstly read, based on the offset and length, the requested file is split from the block, and is returned to the client.…

    • 1486 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Lab10 worksheet

    • 1151 Words
    • 5 Pages

    Because you need user to browse the internet but also having their sites track later.…

    • 1151 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit 6 Problem Set 1

    • 116 Words
    • 1 Page

    distributed cache mode ____H___ 5. volume shadow copies ___D____ 6. incremental backup ____I___ 7. Windows RE ___C____ 8. hosted cache mode ____G___ 9.…

    • 116 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Clearing the cache is important to ensure that you do not access a locally stored representation of the web site, which may be down when you first access it and may be currently active, however it displays the cached version of the connection.…

    • 560 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The updated server addresses, without informing the clients they will need to update their web response address.…

    • 811 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It is a tool that you can use to eliminate repetitive types of information on your web pages. It is a file the server includes in a web page before sending it out to a browser. It uses headers, navigation panels, and footers. It’s useful because you only need to change one file and every web page using that element picks up the update.…

    • 411 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Powerful central processing units (CPUs) demand large amounts of data, and they need that data fast. Otherwise, CPU performance is hindered by the lack of data storage support; therefore, computers have been designed to supply data through tiering memory and caches, which use the hard drive in combination with random access memory (RAM) to deliver massive amounts of data to the CPU. The speed of the RAM is crucial to the performance of data delivery; you want the most RAM at the fastest speed possible so the CPU is not waiting for information.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    For the first section of this Mid Term, I will describe the fields in the IP version 4 (IPv4) packet header. (What is the structure (each field) of an IPv4 packet?). The first field is a 4-bit version field. Next we have a 4-bit Internet Header Length (IHL) that tells the number of 32-bit words in the IPv4 header. The next field is an 8-bit Type of Service (ToS) field. This technology was never fully implemented so new technology has been developed to utilize this portion of the header. It now relays the DiffServ and Explicit Congestion Notification (ECN) to help the reliability of real time data streaming technologies. The Total Length filed is next. This is a 16-bit field that shows the entire datagram size including header and data, in 8-bit bytes. Next we have a 16-bit Identification field. This field is used primarily to uniquely identify fragment of an original IP datagram. A 3-bit field to control or identify fragments is next. This field must either be zero for reserved, don't fragment, and more fragments. The fragment offset field in next and is a 13-bit field used to determine the particular place of a fragment in the original IP datagram. The 8-bit Time to Live (TTL) field follows. This field stops a datagram from going in circles on a network. It used to be measured in seconds, but is now a hop count field. Once the field comes to zero after passing each switch or router, the packet is no longer forwarded. The 8-bit protocol field follows to show the protocol used in the data portion of the datagram. There are predestinated values for different protocols such as ICMP (1), TCP (6), and UDP (17). Next is the 16-bit header Checksum field. Since some values in an IPv4 header may change, the checksum must be adjusted through the network. Following the checksum field there is a 32-bit Source address field directly followed by another 32-bit Destination address field. Finally, before the data, there can also be additional header fields…

    • 1582 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Client Server Model

    • 974 Words
    • 4 Pages

    The Internet is based on a client-server model, where every day, millions and millions of computers are accessing thousands and thousands of servers. Many of the things we use our computers for today make use of this model, from web browsing to electronic mail. Over the years, competing models of networking emerged to compete with the client-server model. The peer-to-peer model has been a prominent competitor with vast differences. Mainframe architecture, from which the client-server evolved, still has a place in business today and the two compete on the back-end. This essay will discuss the client-server model, and compare it with other models it has been in competition with – the peer-to-peer model, and mainframe architecture.…

    • 974 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Although Proxy Server's ability to cache resources saves on performance over the Internet communication link, it does not decrease the amount of data ultimately transferred to the client. Even if 100 percent of requested data is stored in the proxy server's cache, it will still be sent across your local network to the client computer, increasing network traffic significantly.…

    • 4134 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    cs601

    • 427 Words
    • 2 Pages

    Twice NAT is another variant of NAT. it is used with site that runs server. In this…

    • 427 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It Latest Cms Tool

    • 3519 Words
    • 15 Pages

    A web caching proxy and load balancing tool that works as a layer in front of your CQ instances. It can either be used as a load balancer or you can put it behind your hardware load balancer. Works as a module installed to a web server such as Apache. Works with these web servers:…

    • 3519 Words
    • 15 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Internet Server Application Programming Interface (ISAPI) is the second generation version of CGI. Developers wanted to move away from having to run individual programs for each user and ISAPI satisfied those needs. There are 2 types of ISAPI although only 1 is still being used, first is ISAPI extensions; which utilize information from a database or information supplied by a client using a form and enables in-process applications that are generated dynamically. (Zacker, 2008) The second and less commonly used form is ISAPI Filters which is a routine that operates between the HTTP server and the HTTP listener. It is used to provide authentication, encryption and data compression. This form of ISAPI is out of date due to ISAPI extensions which run more efficiently. (Zacker, 2008)…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    To overcome this we can use CoAS (Constrained Application Protocol) which transport over UDP providing reliable service transmission. The CoAS also supports the ReST method and provides one to one correspondence with the HTTP Protocol. We can also use cross proxy which act as an intermediary between HTTP-CoAS that translate requests/responses between the two…

    • 1475 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Netsolve Case Study

    • 1622 Words
    • 7 Pages

    The goal of this in NetSolve is to create proxy servers which serve as link for getting requests from clients who are seeking resources in a server. These proxy servers are then able to distribute client’s requests to the appropriate external scheduling and execution services. The main way in which this is implemented is by how the services are defined. A NetSolve service is defined by a formal statement of the calling sequence. This is known as the Interface Definition Language which is defined as “The Interface Definition Language (IDL) is a language for specifying operations (procedures or functions), parameters to these operations, and data types” . Because of this, the client and the server will know how to marshall and unmarshall the data. The implementation of the service is stored in an external library and is called upon at compilation time. This means that any library that has the same calling sequence can communicate with a library. Multiple NetSolve servers that perform the same service are able to perform that service in very different ways. How is this possible. It is possible because of the formal statement of the calling…

    • 1622 Words
    • 7 Pages
    Good Essays