Skip to main content

Proxy Server Types Explained


A special purpose computer that allows clients to make indirect connections with other network services through a computer network service is called a proxy server. While using a proxy, the client first connects to the proxy server and then requests for a file, connection or any other resource present on the different server. The resource is provided is either by serving it from cache or by connecting to the specific server. The server's response or the client's request may get altered in some cases. Following explains the different proxy server types:
• Web proxies
Web proxy is a commonly used proxy application. The file and web pages available on the remote web servers are provided through the nearby cache. In this way, local clients can access the information more reliably and quickly.
A web based proxy server looks for a URL in local cache when a specific web resource or URL is requested. The document is returned immediately if it is found on the local cache. In other cases, the server requests the page from the remote server and then returns it to the client and saves a copy in the cache. An expiry algorithm is used to delete the documents from the cache depending upon the access history, size and age. Least Frequently Used (LFU) and Least Recently Used (LRU) are the two expiry algorithms that are used in this case. Least frequently used documents are removed by LFU while the least recently used documents are removed by LRU.
CGI proxies are special web proxies. These are special types of websites that allows clients to access the desired site through them. In order to implement proxy, CGI or PHP are used.
The content of the web page is filtered in case of some web based proxy. Some may reformat the page while others may block inappropriate content displayed on the website. These types of servers can be implemented to intercept viruses and other content present on remote pages.
• Transparent Proxy Servers
Transparent Proxy reveals its identity and by using http headers, the original IP address can be made available. These servers have the ability to cache websites but they do not provide any anonymity. However, using transparent proxy may lead to simple IP bans.
• Distorting Proxy Servers
It reveals its identity as a proxy server but provides an incorrect IP address when requested through http headers.
• Anonymous Proxy Servers
Although it reveals its identity as a server but does not provide the original IP address. However, this type of server is detectable but it provides an ample amount of anonymity to clients.
• High Anonymity Proxy Servers
These types of servers do not reveal their identity. Moreover, they do not provide the original IP address as it gives an incorrect IP address through http headers. This explains the different types of proxies that can be used to hide the original IP address of a computer. However, it may not be beneficial in some cases as other devices contact to your computer through IP address only.
Michael Maxstead is a computer networking consultant who likes to write about VPN and Networking related technologies. If you visit his website VPNreviewz.com you can learn about what is a proxy server and iPredator.

Comments

  1. If you are looking for a reliable and experienced web hosting service provider then Hosting Raja is can be the answer for you. You can easily find many plans here, you can select the best  Hosting plan according you needs.

    ReplyDelete

Post a Comment

Popular posts from this blog

Computer Recycling Helps To Save The Environment

Computer recycling is a way to prevent valuable parts from entering landfills by finding ways to reuse or restore them. Re-purposing computers prevents harmful toxins from entering into the environment. Environmental benefits are not the only benefits derived from re-purposing these machines. Despite these computers being outdated, recycled computer parts are very valuable. There are several things people can do to recycle their no longer wanted computers. Recycling computers is helps to prevent valuable parts from entering landfills. Recycling or re-using computers involves finding new ways to use the various parts or the computer itself. The majority of recycling involves salvaging any usable parts from the machines. In other cases, the computers are fixed and end up donated or resold. Re-purposing takes a machine that is slated for the landfill and gives them a longer lifespan. Re-using old computers is important to the environment. Computers are in the category of hazardous ...

From Silicon to Software The Evolution of Computer Technology

  From Silicon to Software: The Evolution of Computer Technology The story of computer technology is one of rapid evolution, marked by monumental shifts from simple silicon-based devices to sophisticated software that drives our digital world. This narrative is not just about the hardware and software, but the profound impact these technologies have had on society, reshaping how we communicate, work, and think. In this article, we explore the key developments in computer technology, examining the pivotal moments and the future directions of this dynamic field. The Dawn of Computing The genesis of modern computing can be traced back to the 1940s with the development of the first electronic computers. These machines, such as the ENIAC (Electronic Numerical Integrator and Computer), were vast, room-sized installations that used vacuum tubes for circuitry and magnetic drums for memory. While powerful for their time, they were inflexible and required extensive manual intervention to rep...

Unleashing Boundless Potential: Harnessing the Power of Computers for a Brighter Future

  Unleashing Boundless Potential: Harnessing the Power of Computers for a Brighter Future Unleashing Boundless Potential: Harnessing the Power of Computers for a Brighter Future In the ever-evolving tapestry of human progress, few tools have wielded as much influence and promise as computers. From their inception as room-sized behemoths to today's sleek, portable devices, computers have continually pushed the boundaries of what is possible, revolutionizing industries, empowering individuals, and shaping the very fabric of society. In this exploration, we delve into the vast potential of computers to unlock a future brimming with innovation, connectivity, and opportunity. At the heart of the computer's transformative power lies its ability to process information with unparalleled speed and precision. This capacity for computation has enabled breakthroughs in fields as diverse as science, engineering, finance, and beyond. From modeling complex physical phenomena to optimizing sup...