SlideShare a Scribd company logo
1 of 3
Download to read offline
13/08/2014 
1 
Website 
Web-Application 
Defined by its Content. 
Defined by its Interaction with the User. 
Website consist of static content to its all visitors. 
Web-application includes interaction & requires user- input & data-processing. 
e.g., News-Site 
e.g., Calendar 
2 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 
Q. HOW CAN V DIFFERENTIATE Website & Web- application ???? 
An application software that runs in Web-browser. 
They are stored on Web-Servers. 
Tools Used:- Database, JavaScript, PHP 
Well-known Example:- Google Docs , Social n/w (Facebook) 
Features:- 
To submit and retrieve data to/from a database over the web 
Backup and easy access from anywhere 
Free, others, shareware (pay a small fee) 
Require only internet access and a web browser 
No need to download and install software 
3 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 
PAS Model 
4 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 
1st Layer (Presentation) On the users side and consists of a basic browser 
2nd Layer (Application) 
Contains a dynamic content generation tool - such as Java, active server pages, or php 
3rd Layer (Storage) 
The data is stored & consists of back end database software 
A Proxy Server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. 
A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. 
Proxies were invented to add structure and encapsulation to distributed systems. 
5 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 
A Proxy is a host which relays web access requests from clients. 
Uses:- 
 Used when clients do not access the web directly 
 Used for security, logging, accounting and improving performance 
Content filtering , Access control, Translation 
6 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 )
13/08/2014 
2 
Q. Why Web-Caching is used in Proxy- Server??? 
Storing copies of recently accessed web pages 
Pages are delivered from the cache when requested again 
- Browser caches 
- Proxy caches 
Shorter response time 
Reduced bandwidth requirement 
Reduced load on servers 
Access control and logging 
7 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 
Forwarding Proxy 
A forward proxy taking requests from an internal network and forwarding them to the Internet. 
In these proxies , the client server names the target server to connect to. 
It is an Internet-facing proxy used to retrieve from a wide range of sources anywhere on the Internet. 
8 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 
Open Proxy 
An open proxy forwarding requests from and to anywhere on the Internet. 
It is a forwarding proxy server that is accessible by any Internet user. 
An anonymous open proxy allows users to conceal their IP address while browsing the Web or using other Internet services. 
9 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 
Reverse Proxy 
A reverse proxy taking requests from the Internet & forwarding them to servers in an internal network. 
It is a proxy server that appears to clients to be an ordinary server. 
Requests are forwarded to one or more proxy servers which handle the request. 
The response from the proxy server is returned as if it came directly from the origin server, leaving the client no knowledge of the origin servers. 
10 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 
They are installed in the neighborhood of one or more web servers. 
All traffic coming from the Internet and with a destination of one of the neighborhood's web servers goes through the proxy server. 
There are several reasons for installing reverse proxy servers:- 
Encryption / SSL acceleration 
Serve/cache static content 
Load-balancing 
Compression 
Security 
Spoon feeding 
Extranet Publishing 
11 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 
Terminates the TCP connection before relaying to target host (in and out) 
Hide internal clients from external network 
Blocking of dangerous URLs 
Filter dangerous content 
Check consistency of retrieved content 
Eliminate need for transport layer routing between networks 
Single point of access, control and logging 
12 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 )
13/08/2014 
3 
Single point of failure 
◦If the proxy dies, no one can get to the external network 
Client software must usually be designed to use a proxy 
Proxies must exist for each service 
Doesn’t protect the OS 
◦Proxies run at the application level 
Create a service bottleneck 
◦Solved via parallelism (more proxies, and load balance) 
13 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 
Different Ways 
Web-Proxy Servers 
SOCKS proxy 
Transparent proxy 
CGI proxy 
Anonymous HTTPs proxy 
Suffix proxy 
TOR(The Onion Router) onion proxy server 
I2P anonymous proxy 
DNS proxy 
14 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 
Not a true application layer proxy 
SOCKS protocol provides a framework for developing secure communications by easily integrating other security technologies. 
SOCKS includes 2-components:- 
◦SOCKS server :- implemented at the application layer 
◦SOCKS client:-implemented between the application & transport layers 
Purpose of the Protocol:- To enable hosts on one side of a SOCKS server to gain access to hosts on the other side of a SOCKS Server, without requiring direct IP-reachability. 
Copies packet payloads through the proxy 
15 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 
SOCKS Architecture 
16 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 
17 
ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 )

More Related Content

What's hot

Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy ServerSourav Roy
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management nullowaspmumbai
 
Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptGroup18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptAnitha Selvan
 
amrapali builders@@@hacking d link routers with hnap.pdf
amrapali builders@@@hacking d link routers with hnap.pdfamrapali builders@@@hacking d link routers with hnap.pdf
amrapali builders@@@hacking d link routers with hnap.pdfamrapalibuildersreviews
 
seminar on proxyserver
seminar on proxyserverseminar on proxyserver
seminar on proxyserverNiraj Barnwal
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy servergreatbury
 
Service Mesh vs. Frameworks: Where to put the resilience?
Service Mesh vs. Frameworks: Where to put the resilience?Service Mesh vs. Frameworks: Where to put the resilience?
Service Mesh vs. Frameworks: Where to put the resilience?Michael Hofmann
 
Apache struts vulnerabilities compromise corporate web servers 
Apache struts vulnerabilities compromise corporate web servers Apache struts vulnerabilities compromise corporate web servers 
Apache struts vulnerabilities compromise corporate web servers Jeff Suratt
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security AttacksSajid Hasan
 
Hacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedSiddharth Bhattacharya
 
Come ti "pusho" il web con WebSockets: da 0 a SignalR
Come ti "pusho" il web con WebSockets: da 0 a SignalR Come ti "pusho" il web con WebSockets: da 0 a SignalR
Come ti "pusho" il web con WebSockets: da 0 a SignalR Alessandro Melchiori
 

What's hot (20)

Web proxy server
Web proxy serverWeb proxy server
Web proxy server
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
 
Meeting 4 : proxy
Meeting 4 : proxyMeeting 4 : proxy
Meeting 4 : proxy
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management
 
Proxy server
Proxy serverProxy server
Proxy server
 
Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptGroup18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.ppt
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
amrapali builders@@@hacking d link routers with hnap.pdf
amrapali builders@@@hacking d link routers with hnap.pdfamrapali builders@@@hacking d link routers with hnap.pdf
amrapali builders@@@hacking d link routers with hnap.pdf
 
seminar on proxyserver
seminar on proxyserverseminar on proxyserver
seminar on proxyserver
 
UMA for ACE
UMA for ACEUMA for ACE
UMA for ACE
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
 
Service Mesh vs. Frameworks: Where to put the resilience?
Service Mesh vs. Frameworks: Where to put the resilience?Service Mesh vs. Frameworks: Where to put the resilience?
Service Mesh vs. Frameworks: Where to put the resilience?
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Apache struts vulnerabilities compromise corporate web servers 
Apache struts vulnerabilities compromise corporate web servers Apache struts vulnerabilities compromise corporate web servers 
Apache struts vulnerabilities compromise corporate web servers 
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
 
Hacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques Used
 
Come ti "pusho" il web con WebSockets: da 0 a SignalR
Come ti "pusho" il web con WebSockets: da 0 a SignalR Come ti "pusho" il web con WebSockets: da 0 a SignalR
Come ti "pusho" il web con WebSockets: da 0 a SignalR
 

Similar to Web application & proxy server

Transparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABTransparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABBenith T
 
Design and Configuration of App Supportive Indirect Internet Access using a ...
Design and Configuration of App Supportive Indirect Internet  Access using a ...Design and Configuration of App Supportive Indirect Internet  Access using a ...
Design and Configuration of App Supportive Indirect Internet Access using a ...IJMER
 
B04010 01 0917
B04010 01 0917B04010 01 0917
B04010 01 0917IJMER
 
Real time web_apps_pycon2012-v1
Real time web_apps_pycon2012-v1Real time web_apps_pycon2012-v1
Real time web_apps_pycon2012-v1Avinash Prasad
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE AWS Chicago
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityDigicomp Academy AG
 
Remotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal NetworkRemotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal Networkijtsrd
 
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...mfrancis
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecuritiesamiable_indian
 
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Tal Lavian Ph.D.
 
NetFoundry - Zero Trust Customer Journey-v1-ext.pptx
NetFoundry - Zero Trust Customer Journey-v1-ext.pptxNetFoundry - Zero Trust Customer Journey-v1-ext.pptx
NetFoundry - Zero Trust Customer Journey-v1-ext.pptxSurendran Naidu
 
What’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesWhat’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesCloudflare
 
InduSoft Thin Client Webinar 2012
InduSoft Thin Client Webinar 2012InduSoft Thin Client Webinar 2012
InduSoft Thin Client Webinar 2012AVEVA
 

Similar to Web application & proxy server (20)

Transparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABTransparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LAB
 
Design and Configuration of App Supportive Indirect Internet Access using a ...
Design and Configuration of App Supportive Indirect Internet  Access using a ...Design and Configuration of App Supportive Indirect Internet  Access using a ...
Design and Configuration of App Supportive Indirect Internet Access using a ...
 
B04010 01 0917
B04010 01 0917B04010 01 0917
B04010 01 0917
 
Real time web_apps_pycon2012-v1
Real time web_apps_pycon2012-v1Real time web_apps_pycon2012-v1
Real time web_apps_pycon2012-v1
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise Mobility
 
12-Factor Apps
12-Factor Apps12-Factor Apps
12-Factor Apps
 
Remotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal NetworkRemotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal Network
 
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
 
zigbee
zigbeezigbee
zigbee
 
Squid
SquidSquid
Squid
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
 
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
 
NetFoundry - Zero Trust Customer Journey-v1-ext.pptx
NetFoundry - Zero Trust Customer Journey-v1-ext.pptxNetFoundry - Zero Trust Customer Journey-v1-ext.pptx
NetFoundry - Zero Trust Customer Journey-v1-ext.pptx
 
DevCon5 (July 2014) - Acision SDK
DevCon5 (July 2014) - Acision SDKDevCon5 (July 2014) - Acision SDK
DevCon5 (July 2014) - Acision SDK
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
What’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesWhat’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product Launches
 
InduSoft Thin Client Webinar 2012
InduSoft Thin Client Webinar 2012InduSoft Thin Client Webinar 2012
InduSoft Thin Client Webinar 2012
 
KrakenD API Gateway
KrakenD API GatewayKrakenD API Gateway
KrakenD API Gateway
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 

Recently uploaded

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 

Recently uploaded (11)

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 

Web application & proxy server

  • 1. 13/08/2014 1 Website Web-Application Defined by its Content. Defined by its Interaction with the User. Website consist of static content to its all visitors. Web-application includes interaction & requires user- input & data-processing. e.g., News-Site e.g., Calendar 2 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) Q. HOW CAN V DIFFERENTIATE Website & Web- application ???? An application software that runs in Web-browser. They are stored on Web-Servers. Tools Used:- Database, JavaScript, PHP Well-known Example:- Google Docs , Social n/w (Facebook) Features:- To submit and retrieve data to/from a database over the web Backup and easy access from anywhere Free, others, shareware (pay a small fee) Require only internet access and a web browser No need to download and install software 3 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) PAS Model 4 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 1st Layer (Presentation) On the users side and consists of a basic browser 2nd Layer (Application) Contains a dynamic content generation tool - such as Java, active server pages, or php 3rd Layer (Storage) The data is stored & consists of back end database software A Proxy Server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Proxies were invented to add structure and encapsulation to distributed systems. 5 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) A Proxy is a host which relays web access requests from clients. Uses:-  Used when clients do not access the web directly  Used for security, logging, accounting and improving performance Content filtering , Access control, Translation 6 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 )
  • 2. 13/08/2014 2 Q. Why Web-Caching is used in Proxy- Server??? Storing copies of recently accessed web pages Pages are delivered from the cache when requested again - Browser caches - Proxy caches Shorter response time Reduced bandwidth requirement Reduced load on servers Access control and logging 7 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) Forwarding Proxy A forward proxy taking requests from an internal network and forwarding them to the Internet. In these proxies , the client server names the target server to connect to. It is an Internet-facing proxy used to retrieve from a wide range of sources anywhere on the Internet. 8 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) Open Proxy An open proxy forwarding requests from and to anywhere on the Internet. It is a forwarding proxy server that is accessible by any Internet user. An anonymous open proxy allows users to conceal their IP address while browsing the Web or using other Internet services. 9 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) Reverse Proxy A reverse proxy taking requests from the Internet & forwarding them to servers in an internal network. It is a proxy server that appears to clients to be an ordinary server. Requests are forwarded to one or more proxy servers which handle the request. The response from the proxy server is returned as if it came directly from the origin server, leaving the client no knowledge of the origin servers. 10 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) They are installed in the neighborhood of one or more web servers. All traffic coming from the Internet and with a destination of one of the neighborhood's web servers goes through the proxy server. There are several reasons for installing reverse proxy servers:- Encryption / SSL acceleration Serve/cache static content Load-balancing Compression Security Spoon feeding Extranet Publishing 11 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) Terminates the TCP connection before relaying to target host (in and out) Hide internal clients from external network Blocking of dangerous URLs Filter dangerous content Check consistency of retrieved content Eliminate need for transport layer routing between networks Single point of access, control and logging 12 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 )
  • 3. 13/08/2014 3 Single point of failure ◦If the proxy dies, no one can get to the external network Client software must usually be designed to use a proxy Proxies must exist for each service Doesn’t protect the OS ◦Proxies run at the application level Create a service bottleneck ◦Solved via parallelism (more proxies, and load balance) 13 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) Different Ways Web-Proxy Servers SOCKS proxy Transparent proxy CGI proxy Anonymous HTTPs proxy Suffix proxy TOR(The Onion Router) onion proxy server I2P anonymous proxy DNS proxy 14 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) Not a true application layer proxy SOCKS protocol provides a framework for developing secure communications by easily integrating other security technologies. SOCKS includes 2-components:- ◦SOCKS server :- implemented at the application layer ◦SOCKS client:-implemented between the application & transport layers Purpose of the Protocol:- To enable hosts on one side of a SOCKS server to gain access to hosts on the other side of a SOCKS Server, without requiring direct IP-reachability. Copies packet payloads through the proxy 15 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) SOCKS Architecture 16 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 ) 17 ADVANCED INTERNET TECHNOLOGY ( Subject Code: 730202 )