Your SlideShare is downloading. ×
0
Reverse proxy
Reverse proxy
Reverse proxy
Reverse proxy
Reverse proxy
Reverse proxy
Reverse proxy
Reverse proxy
Reverse proxy
Reverse proxy
Reverse proxy
Reverse proxy
Reverse proxy
Reverse proxy
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Reverse proxy

329

Published on

In computer networks, a reverse proxy is a type of buy proxy server that retrieves resources on behalf of a client from one or more servers.

In computer networks, a reverse proxy is a type of buy proxy server that retrieves resources on behalf of a client from one or more servers.

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
329
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Reverse proxy and it's uses
  • 2. In computer networks, a reverse proxy is a type of buy proxy server that retrieves resources on behalf of a client from one or more servers. These resources are then returned to the client as though they originated from the proxy server itself. While a forward proxy acts as an intermediary for its associated client and returns to them resources accessible on the Internet, a reverse proxy acts as an intermediary for its associated server and only returns resources provided by those associated server
  • 3. Uses of reverse proxies
  • 4. Reverse proxies can hide the existence and characteristics of an origin server or servers.
  • 5. Application firewall features can protect against common web-based attacks. Without a reverse proxy, removing malware or initiating takedowns, for example, can become difficult.
  • 6. In the case of secure websites, a web server may not perform SSL encryption itself, but instead offloads the task to a reverse proxy that may be equipped with SSL acceleration hardware.
  • 7. A elite proxy can distribute the load from incoming requests to several servers, with each server serving its own application area. In the case of reverse proxying in the neighborhood of web servers, the reverse proxy may have to rewrite the URL in each incoming request in order to match the relevant internal location of the requested resource.
  • 8. A reverse proxy can reduce load on its origin servers by caching static content, as well as dynamic content - also known as web acceleration. Proxy caches of this sort can often satisfy a considerable number of website requests, greatly reducing the load on the origin server
  • 9. A reverse proxy can optimize content by compressing it in order to speed up loading times.
  • 10. In a technique known as "spoon feeding" a dynamically generated page can be produced all at once and served to the buy proxy list, which can then return it to the client a little bit at a time. The program that generates the page need not remain open, thus releasing server resources during the possibly extended time the client requires to complete the transfer.
  • 11. reverse proxy can operate whenever multiple web-servers must be accessible via a single public IP address. The web servers listen on different ports in the same machine, with the same local IP address or, possibly, on different machines and different local IP addresses altogether. The reverse proxy analyzes each incoming request and delivers it to the right server within the local area network.
  • 12. buy proxy server can perform A/B testing and multivariate testing without placing javascript tags or code into pages.
  • 13. Reverse proxy is also a concept used in Search Engine Marketing to automatically instrument a destination website with usage tracking code that can be used for campaign reporting or campaign optimisation. It is a technique typically accepted as being bad practice.
  • 14. Thanking you... For more info log on too.. http://proxiesforent.com

×