SlideShare a Scribd company logo
Awesum4sum
Team Members Lisha Murthy (1MS07IS041) Anitha B. S (1MS07IS005) Caroline I (1MS07IS017) Prabha P (1MS07IS068)
Index Introduction to Proxy Server Anonymous Proxy Server HTTP Proxy Server  FTP Proxy Server Caching Content Filtering ICAP Reverse Proxy Server Advantages and Disadvantages of Proxy Server Demonstration on CC Proxy
PROXY SERVER
WHAT  IS  A PROXY  SERVER
 Client sends a request Server provides the services CLIENT WEB SERVER
PROXY SERVER Sends request to the        Proxy Server Makes requests  for          the client CLIENT WEB SERVER
ANONYMOUS PROXY  SERVERS
                   WHY DO WE NEED AN           ANONYMOUS PROXY SERVER  Web resources can collect information about you, using your IP address. You might be targeted by the marketers who send regular spam and junk e-mails. A website can automatically exploit the security holes in your system.
WHAT  IS  AN ANONYMOUS  PROXY  SERVER   Anonymous Proxy Server  hides your  IP address. 192.245.17.1 201.124.17.1 They do not let anyone know what you are surfing.
When few sites are blocked by the internet providers in certain countries or geographical areas, anonymous proxy servers can be used.
Anonymous surfing proxy sites     They allow you to enter the address (URL) of the site you wish to go to at the anonymous surfing proxy site.     The site will retrieve the page for you and present it to you.     The site you visit will not receive any particulars about your system.
Introduction to HTTP
Hypertext or Hyperlinks
Thus formed Internet…
Ideal Scenario
With Proxy
FTP
File Sharing ,[object Object]
 FTP
 P2P
 Email
 Online sharing,[object Object]
FTP Proxy Servers
Available applications for both HTTP and FTP Proxy servers ,[object Object]
 Proxy Chains
 Download managers
 Operating system (with lots of configuration),[object Object]
[object Object],It is a collection of data duplicating original values stored elsewhere
Caching proxy server
Page-fetch  algorithm ,[object Object]
 If it exists in cache…….
 If object is not in cache, expired, or otherwise invalidated…….,[object Object]
 FTP      Non-cacheable objects ,[object Object]
 WAIS,[object Object]
Internet Content Adaptation Protocol (ICAP) ICAP servers are focused on a specific function, for example, add insertion, virus scanning, content translation, language translation, or content filtering. ICAP allows its clients to pass HTTP based (HTML) messages (Content) to ICAP servers for adaptation (content manipulation).
Functions of icap ,[object Object],     ….redirection, header filtering, etc. ,[object Object],     …. virus scanning, content modification, block inappropriate content, etc.
REVERSE PROXY
WEB SERVER CLIENT 1 CLIENT 3 CLIENT 2
FORWARD PROXY SERVER WEB SERVER INTERNET PROXY SERVER CLIENT 1 CLIENT 3 CLIENT 2
REVERSE PROXY SERVER WEB SERVER INTERNET REVERSE PROXY SERVER CLIENT 3 CLIENT 1 CLIENT 2

More Related Content

What's hot

Proxy servers
Proxy serversProxy servers
Proxy serversKumar
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
greatbury
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
primeteacher32
 
seminar on proxyserver
seminar on proxyserverseminar on proxyserver
seminar on proxyserverNiraj Barnwal
 
How to set up a proxy server on windows
How to set up a proxy server on windows How to set up a proxy server on windows
How to set up a proxy server on windows
codeandyou forums
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
Proxies Rent
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy Server
Jainul Musani
 
Proxy server
Proxy serverProxy server
Proxy server
Dlovan Salih
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
LakshyaArora12
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Servervinay arora
 
KILLME NOWITSELF
KILLME NOWITSELFKILLME NOWITSELF
KILLME NOWITSELFShehab Imam
 
Kerio Connect 7 Features and Benefits
Kerio Connect 7 Features and BenefitsKerio Connect 7 Features and Benefits
Kerio Connect 7 Features and Benefits
Kerio Technologies
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
primeteacher32
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
HTS Hosting
 
Introduction to stable proxies.
Introduction to stable proxies.Introduction to stable proxies.
Introduction to stable proxies.
stableproxies
 
Meeting 4 : proxy
Meeting 4 : proxyMeeting 4 : proxy
Meeting 4 : proxy
Syaiful Ahdan
 
Web proxy server
Web proxy serverWeb proxy server
Web proxy server
Vikas Merugu
 

What's hot (20)

Proxy servers
Proxy serversProxy servers
Proxy servers
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
seminar on proxyserver
seminar on proxyserverseminar on proxyserver
seminar on proxyserver
 
How to set up a proxy server on windows
How to set up a proxy server on windows How to set up a proxy server on windows
How to set up a proxy server on windows
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy Server
 
Proxy
ProxyProxy
Proxy
 
Proxy server
Proxy serverProxy server
Proxy server
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
 
KILLME NOWITSELF
KILLME NOWITSELFKILLME NOWITSELF
KILLME NOWITSELF
 
Kerio Connect 7 Features and Benefits
Kerio Connect 7 Features and BenefitsKerio Connect 7 Features and Benefits
Kerio Connect 7 Features and Benefits
 
Cc proxy
Cc proxyCc proxy
Cc proxy
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
 
Introduction to stable proxies.
Introduction to stable proxies.Introduction to stable proxies.
Introduction to stable proxies.
 
Meeting 4 : proxy
Meeting 4 : proxyMeeting 4 : proxy
Meeting 4 : proxy
 
Web proxy server
Web proxy serverWeb proxy server
Web proxy server
 

Similar to Group18_Awesome4some:Proxy server.ppt

Proxy http ftp dns email
Proxy http ftp dns emailProxy http ftp dns email
Proxy http ftp dns email
Heera K S
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
Netwax Lab
 
Uses of proxies
Uses of proxiesUses of proxies
Uses of proxies
Proxies Rent
 
gofortution
gofortutiongofortution
gofortution
gofortution
 
Web Server Types - Understanding a Web Server
Web Server Types - Understanding a Web ServerWeb Server Types - Understanding a Web Server
Web Server Types - Understanding a Web Server
Cloudtechtiq
 
Web server
Web serverWeb server
Web server
Nirav Daraniya
 
Using Proxies To Secure Applications And More
Using Proxies To Secure Applications And MoreUsing Proxies To Secure Applications And More
Using Proxies To Secure Applications And More
Josh Sokol
 
web-servers3952 (1)qwjelkjqwlkjkqlwe.ppt
web-servers3952 (1)qwjelkjqwlkjkqlwe.pptweb-servers3952 (1)qwjelkjqwlkjkqlwe.ppt
web-servers3952 (1)qwjelkjqwlkjkqlwe.ppt
20521742
 
IIS internet information service NSA.ppt
IIS internet information service NSA.pptIIS internet information service NSA.ppt
IIS internet information service NSA.ppt
ImranAhmadAhmad
 
Configuring the Apache Web Server
Configuring the Apache Web ServerConfiguring the Apache Web Server
Configuring the Apache Web Serverwebhostingguy
 
What is Web Server & It's Types.pdf
What is Web Server & It's Types.pdfWhat is Web Server & It's Types.pdf
What is Web Server & It's Types.pdf
Dinesh Katyare
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Jeremiah Grossman
 
web hosting
web hostingweb hosting
web hosting
Thush madu
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Softwarewebhostingguy
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
tim4911
 
Squid
SquidSquid

Similar to Group18_Awesome4some:Proxy server.ppt (20)

Proxy http ftp dns email
Proxy http ftp dns emailProxy http ftp dns email
Proxy http ftp dns email
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
web server
web serverweb server
web server
 
Uses of proxies
Uses of proxiesUses of proxies
Uses of proxies
 
gofortution
gofortutiongofortution
gofortution
 
Web Server Types - Understanding a Web Server
Web Server Types - Understanding a Web ServerWeb Server Types - Understanding a Web Server
Web Server Types - Understanding a Web Server
 
Web server
Web serverWeb server
Web server
 
Using Proxies To Secure Applications And More
Using Proxies To Secure Applications And MoreUsing Proxies To Secure Applications And More
Using Proxies To Secure Applications And More
 
Web servers
Web serversWeb servers
Web servers
 
web-servers3952 (1)qwjelkjqwlkjkqlwe.ppt
web-servers3952 (1)qwjelkjqwlkjkqlwe.pptweb-servers3952 (1)qwjelkjqwlkjkqlwe.ppt
web-servers3952 (1)qwjelkjqwlkjkqlwe.ppt
 
IIS internet information service NSA.ppt
IIS internet information service NSA.pptIIS internet information service NSA.ppt
IIS internet information service NSA.ppt
 
Configuring the Apache Web Server
Configuring the Apache Web ServerConfiguring the Apache Web Server
Configuring the Apache Web Server
 
What is Web Server & It's Types.pdf
What is Web Server & It's Types.pdfWhat is Web Server & It's Types.pdf
What is Web Server & It's Types.pdf
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
 
web hosting
web hostingweb hosting
web hosting
 
5-WebServers.ppt
5-WebServers.ppt5-WebServers.ppt
5-WebServers.ppt
 
5-WebServers.ppt
5-WebServers.ppt5-WebServers.ppt
5-WebServers.ppt
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Software
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
Squid
SquidSquid
Squid
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 

Group18_Awesome4some:Proxy server.ppt

  • 2. Team Members Lisha Murthy (1MS07IS041) Anitha B. S (1MS07IS005) Caroline I (1MS07IS017) Prabha P (1MS07IS068)
  • 3. Index Introduction to Proxy Server Anonymous Proxy Server HTTP Proxy Server FTP Proxy Server Caching Content Filtering ICAP Reverse Proxy Server Advantages and Disadvantages of Proxy Server Demonstration on CC Proxy
  • 5. WHAT IS A PROXY SERVER
  • 6. Client sends a request Server provides the services CLIENT WEB SERVER
  • 7. PROXY SERVER Sends request to the Proxy Server Makes requests for the client CLIENT WEB SERVER
  • 8. ANONYMOUS PROXY SERVERS
  • 9. WHY DO WE NEED AN ANONYMOUS PROXY SERVER Web resources can collect information about you, using your IP address. You might be targeted by the marketers who send regular spam and junk e-mails. A website can automatically exploit the security holes in your system.
  • 10. WHAT IS AN ANONYMOUS PROXY SERVER Anonymous Proxy Server hides your IP address. 192.245.17.1 201.124.17.1 They do not let anyone know what you are surfing.
  • 11. When few sites are blocked by the internet providers in certain countries or geographical areas, anonymous proxy servers can be used.
  • 12. Anonymous surfing proxy sites They allow you to enter the address (URL) of the site you wish to go to at the anonymous surfing proxy site. The site will retrieve the page for you and present it to you. The site you visit will not receive any particulars about your system.
  • 18. FTP
  • 19.
  • 23.
  • 25.
  • 28.
  • 29.
  • 31.
  • 32. If it exists in cache…….
  • 33.
  • 34.
  • 35.
  • 36. Internet Content Adaptation Protocol (ICAP) ICAP servers are focused on a specific function, for example, add insertion, virus scanning, content translation, language translation, or content filtering. ICAP allows its clients to pass HTTP based (HTML) messages (Content) to ICAP servers for adaptation (content manipulation).
  • 37.
  • 39. WEB SERVER CLIENT 1 CLIENT 3 CLIENT 2
  • 40. FORWARD PROXY SERVER WEB SERVER INTERNET PROXY SERVER CLIENT 1 CLIENT 3 CLIENT 2
  • 41. REVERSE PROXY SERVER WEB SERVER INTERNET REVERSE PROXY SERVER CLIENT 3 CLIENT 1 CLIENT 2
  • 42. SECURITY WEB SERVER INTERNET REVERSE PROXY Acts as a additional layer of defense and protects against some OS and Web server specific attacks.
  • 43. CACHING WEB SERVER Can offload the web server by caching most frequently used web pages. INTERNET cache
  • 44. LOAD BALANCING WEB SERVER INTERNET Less load on the server as the cache stores the static web pages cache
  • 45. COMPRESSION Awesum 4sum Awesum 4sum Compress content before delivering it to site visitors to optimize load times.
  • 46. TUNNELING WEB SERVER INTERNET Proxy server It is a web-based page that takes a site that is blocked and "tunnels" it, allowing the user to view blocked pages. CLIENT 1
  • 47.
  • 48. Cache proxies reduces load on main server.
  • 49. Acts as a security layer for clients and main server.
  • 50. Can block any website from access
  • 51. Can be used to view certain unblocked web sites.
  • 52.

Editor's Notes

  1. Hypertext is words/ phrases/ images which upon a click or stroke from the keyboard redirects to the related page. Thus hypertext (hyperlinks) forms a sort of network of related data.
  2. This kind of networking led to the implementation of Internet by Tim Berners Lee.
  3. Ideal scenario would have been that all the systems be connected to the Internet directly. Any request/ response transaction involves only two entities like in the case of mobile phones where in this case the client system requests something from the server and the server responds back.
  4. But in case of institutions or organizations where tend to block certain sites which are often found very useful to the people there  there arises the need for proxy server. Like the telephone operators in olden days, proxy servers intercept the requests and finally our goal is achieved through an alternate IP address.