0
Awesum4sum<br />
Team Members<br />Lisha Murthy (1MS07IS041)<br />Anitha B. S (1MS07IS005)<br />Caroline I (1MS07IS017)<br />Prabha P (1MS0...
Index<br />Introduction to Proxy Server<br />Anonymous Proxy Server<br />HTTP Proxy Server <br />FTP Proxy Server<br />Cac...
PROXY SERVER <br />
WHAT  IS  A PROXY  SERVER<br />
 Client sends a request<br />Server provides the services<br />CLIENT<br />WEB SERVER<br />
PROXY SERVER<br />Sends request to the <br />      Proxy Server<br />Makes requests  for<br />         the client<br />CLI...
ANONYMOUS PROXY  SERVERS<br />
                   WHY DO WE NEED AN<br />          ANONYMOUS PROXY SERVER <br />Web resources can collect information abo...
WHAT  IS  AN ANONYMOUS  PROXY  SERVER  <br />Anonymous Proxy Server  hides your <br />IP address.<br />192.245.17.1<br />2...
When few sites are blocked by the internet providers in certain countries or geographical areas, anonymous proxy servers c...
Anonymous surfing proxy sites<br />    They allow you to enter the address (URL) of the site you wish to go to at the anon...
Introduction to HTTP<br />
Hypertext<br />or<br />Hyperlinks<br />
Thus formed Internet…<br />
Ideal Scenario<br />
With Proxy<br />
FTP<br />
File Sharing<br /><ul><li> Over Windows LAN
 FTP
 P2P
 Email
 Online sharing</li></li></ul><li>File Transfer Protocol<br />
FTP Proxy Servers<br />
Available applications for both HTTP and FTP Proxy servers<br /><ul><li> Web browsers
 Proxy Chains
 Download managers
 Operating system (with lots of configuration)</li></li></ul><li>
<ul><li>Cache</li></ul>It is a collection of data<br />duplicating original values<br />stored elsewhere <br />
Caching proxy server<br />
Page-fetch  algorithm<br /><ul><li> Check cache for existing copy of object
 If it exists in cache…….
 If object is not in cache, expired, or otherwise invalidated…….</li></li></ul><li>Cacheable objects<br /><ul><li>HTTP
 FTP</li></ul>      Non-cacheable objects<br /><ul><li> HTTPS
 WAIS</li></li></ul><li>Content filtering proxy server<br />Content filtering is the<br />process of removing certain cont...
Internet Content Adaptation Protocol (ICAP)<br />ICAP servers are focused on a specific function, for example, add inserti...
Functions of icap<br /><ul><li>For request modification…….</li></ul>     ….redirection, header filtering, etc.<br /><ul><l...
REVERSE PROXY<br />
WEB SERVER<br />CLIENT 1<br />CLIENT 3<br />CLIENT 2<br />
FORWARD PROXY SERVER<br />WEB SERVER<br />INTERNET<br />PROXY SERVER<br />CLIENT 1<br />CLIENT 3<br />CLIENT 2<br />
REVERSE PROXY SERVER<br />WEB SERVER<br />INTERNET<br />REVERSE PROXY SERVER<br />CLIENT 3<br />CLIENT 1<br />CLIENT 2<br />
Upcoming SlideShare
Loading in...5
×

Group18_Awesome4some:Proxy server.ppt

6,619

Published on

Published in: Education
1 Comment
1 Like
Statistics
Notes
No Downloads
Views
Total Views
6,619
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
307
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide
  • Hypertext is words/ phrases/ images which upon a click or stroke from the keyboard redirects to the related page. Thus hypertext (hyperlinks) forms a sort of network of related data.
  • This kind of networking led to the implementation of Internet by Tim Berners Lee.
  • Ideal scenario would have been that all the systems be connected to the Internet directly. Any request/ response transaction involves only two entities like in the case of mobile phones where in this case the client system requests something from the server and the server responds back.
  • But in case of institutions or organizations where tend to block certain sites which are often found very useful to the people there  there arises the need for proxy server. Like the telephone operators in olden days, proxy servers intercept the requests and finally our goal is achieved through an alternate IP address.
  • Transcript of "Group18_Awesome4some:Proxy server.ppt"

    1. 1. Awesum4sum<br />
    2. 2. Team Members<br />Lisha Murthy (1MS07IS041)<br />Anitha B. S (1MS07IS005)<br />Caroline I (1MS07IS017)<br />Prabha P (1MS07IS068)<br />
    3. 3. Index<br />Introduction to Proxy Server<br />Anonymous Proxy Server<br />HTTP Proxy Server <br />FTP Proxy Server<br />Caching<br />Content Filtering<br />ICAP<br />Reverse Proxy Server<br />Advantages and Disadvantages of Proxy Server<br />Demonstration on CC Proxy<br />
    4. 4. PROXY SERVER <br />
    5. 5. WHAT IS A PROXY SERVER<br />
    6. 6. Client sends a request<br />Server provides the services<br />CLIENT<br />WEB SERVER<br />
    7. 7. PROXY SERVER<br />Sends request to the <br /> Proxy Server<br />Makes requests for<br /> the client<br />CLIENT<br />WEB SERVER<br />
    8. 8. ANONYMOUS PROXY SERVERS<br />
    9. 9. WHY DO WE NEED AN<br /> ANONYMOUS PROXY SERVER <br />Web resources can collect information about<br />you, using your IP address.<br />You might be targeted by the marketers who send regular spam and junk e-mails.<br />A website can automatically exploit the security holes in your system.<br />
    10. 10. WHAT IS AN ANONYMOUS PROXY SERVER <br />Anonymous Proxy Server hides your <br />IP address.<br />192.245.17.1<br />201.124.17.1<br />They do not let anyone know what you are surfing.<br />
    11. 11. When few sites are blocked by the internet providers in certain countries or geographical areas, anonymous proxy servers can be used.<br />
    12. 12. Anonymous surfing proxy sites<br /> They allow you to enter the address (URL) of the site you wish to go to at the anonymous surfing proxy site.<br /> The site will retrieve the page for you and present it to you.<br /> The site you visit will not receive any particulars about your system. <br />
    13. 13. Introduction to HTTP<br />
    14. 14. Hypertext<br />or<br />Hyperlinks<br />
    15. 15. Thus formed Internet…<br />
    16. 16. Ideal Scenario<br />
    17. 17. With Proxy<br />
    18. 18. FTP<br />
    19. 19. File Sharing<br /><ul><li> Over Windows LAN
    20. 20. FTP
    21. 21. P2P
    22. 22. Email
    23. 23. Online sharing</li></li></ul><li>File Transfer Protocol<br />
    24. 24. FTP Proxy Servers<br />
    25. 25. Available applications for both HTTP and FTP Proxy servers<br /><ul><li> Web browsers
    26. 26. Proxy Chains
    27. 27. Download managers
    28. 28. Operating system (with lots of configuration)</li></li></ul><li>
    29. 29. <ul><li>Cache</li></ul>It is a collection of data<br />duplicating original values<br />stored elsewhere <br />
    30. 30. Caching proxy server<br />
    31. 31. Page-fetch algorithm<br /><ul><li> Check cache for existing copy of object
    32. 32. If it exists in cache…….
    33. 33. If object is not in cache, expired, or otherwise invalidated…….</li></li></ul><li>Cacheable objects<br /><ul><li>HTTP
    34. 34. FTP</li></ul> Non-cacheable objects<br /><ul><li> HTTPS
    35. 35. WAIS</li></li></ul><li>Content filtering proxy server<br />Content filtering is the<br />process of removing certain content from the internet before it gets to the user that requested that User.<br />Eg: Twilight utilities proxy server<br /> Safeguard content filtering proxy.<br />
    36. 36. Internet Content Adaptation Protocol (ICAP)<br />ICAP servers are focused on a specific function, for example, add insertion, virus scanning, content translation, language translation, or content filtering.<br />ICAP allows its clients to pass HTTP based (HTML) messages (Content) to ICAP servers for adaptation (content manipulation).<br />
    37. 37. Functions of icap<br /><ul><li>For request modification…….</li></ul> ….redirection, header filtering, etc.<br /><ul><li>For response modification…….</li></ul> …. virus scanning, content modification, block inappropriate content, etc.<br />
    38. 38. REVERSE PROXY<br />
    39. 39. WEB SERVER<br />CLIENT 1<br />CLIENT 3<br />CLIENT 2<br />
    40. 40. FORWARD PROXY SERVER<br />WEB SERVER<br />INTERNET<br />PROXY SERVER<br />CLIENT 1<br />CLIENT 3<br />CLIENT 2<br />
    41. 41. REVERSE PROXY SERVER<br />WEB SERVER<br />INTERNET<br />REVERSE PROXY SERVER<br />CLIENT 3<br />CLIENT 1<br />CLIENT 2<br />
    42. 42. SECURITY<br />WEB SERVER<br />INTERNET<br />REVERSE PROXY<br />Acts as a additional layer of defense and protects against some OS and Web server specific attacks.<br />
    43. 43. CACHING<br />WEB SERVER<br />Can offload the web server by caching most frequently used web pages.<br />INTERNET<br />cache<br />
    44. 44. LOAD BALANCING<br />WEB SERVER<br />INTERNET<br />Less load on the server as the cache stores the static web pages<br />cache<br />
    45. 45. COMPRESSION<br />Awesum 4sum<br />Awesum 4sum<br />Compress content before delivering it to site visitors to optimize load times.<br />
    46. 46. TUNNELING<br />WEB SERVER<br />INTERNET<br />Proxy server<br />It is a web-based page that takes a site that is blocked and &quot;tunnels&quot; it, allowing the user to view blocked pages.<br />CLIENT 1<br />
    47. 47. ADVANTAGES<br /><ul><li>Remain anonymous to the server.
    48. 48. Cache proxies reduces load on main server.
    49. 49. Acts as a security layer for clients and main server.
    50. 50. Can block any website from access
    51. 51. Can be used to view certain unblocked web sites.
    52. 52. Faster loading of page is achieved.</li></li></ul><li>DISADVANTAGES<br />Not completely anonymous.<br />Data can be misused.<br />Need to maintain a database for Blacklist and White list.<br />
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×