There will be an intermediary server between client and the internet, this is called Proxy Server. Proxy servers provides the below basic functionalities:
Proxy servers allow to hide, conceal and make your network id anonymous by hiding your IP address.
Below are the reasons for using proxy servers:
Several kind of filtering can be performed from Proxy Servers.
Content is cached at regular intervals and this content is retrieved when the request was made by the client thus improving performance.
This helps in customizing the source site by taking away the source content or substituting the source content with original local content for the local users. In this the traffic from the users globally is routed to the source website through Translation proxy.
Using proxy server, the destination server receives the request from proxy server making it unaware of the information regarding the end user.
Hackers can’t hack the identity of the user as the Proxy server hides this information.
Below table explains on the types of proxies:
Forward Proxies are used when the client requests its internal network server to forward to the internet.
Clients can conceal their IP address while browsing the web using Open Proxies.
Here, the requests are sent to one or more proxy servers and the response from the proxy server is retrieved as if it came from the real server.
The proxy server architecture is classified into different modules as shown below:
This module has the control over and the manage the user interface and offers an simple and easy to use GUI. This menu provides the below functionalities:
This is the listener where the client browser is listened. This can also block the clients from the list given by user.
It consists of the main functionality of the proxy server. It performs the below functionalities:
If the caching is not allowed, then the page is cached accordingly.
This module takes care of storing, deleting, searching and clearing of web pages in the cache.
Log manager responsibilities are viewing, clearing and updating the logs.
Helps in creating configuration settings which let the other modules to perform required configurations like caching.
Internet Technologies Related Interview Questions
|HTML Interview Questions||Search Engine Optimization (SEO) Interview Questions|
|Internet Security Interview Questions||Internet Interview Questions|
|Internet Protocol version 6 (IPv6) Interview Questions||Internet Protocol version 4 (IPv4) Interview Questions|
|Web hosting Interview Questions||Web Security Interview Questions|
|Email Etiquette Interview Questions||Email Handling Interview Questions|
|Web Browser Interview Questions||Internet of things (IoT) Interview Questions|
|Website Builder Interview Questions||Internet Programming Interview Questions|
Internet Technologies Tutorial
All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd
Wisdomjobs.com is one of the best job search sites in India.