Skip to main content

Proxy Server Types Explained


A special purpose computer that allows clients to make indirect connections with other network services through a computer network service is called a proxy server. While using a proxy, the client first connects to the proxy server and then requests for a file, connection or any other resource present on the different server. The resource is provided is either by serving it from cache or by connecting to the specific server. The server's response or the client's request may get altered in some cases. Following explains the different proxy server types:
• Web proxies
Web proxy is a commonly used proxy application. The file and web pages available on the remote web servers are provided through the nearby cache. In this way, local clients can access the information more reliably and quickly.
A web based proxy server looks for a URL in local cache when a specific web resource or URL is requested. The document is returned immediately if it is found on the local cache. In other cases, the server requests the page from the remote server and then returns it to the client and saves a copy in the cache. An expiry algorithm is used to delete the documents from the cache depending upon the access history, size and age. Least Frequently Used (LFU) and Least Recently Used (LRU) are the two expiry algorithms that are used in this case. Least frequently used documents are removed by LFU while the least recently used documents are removed by LRU.
CGI proxies are special web proxies. These are special types of websites that allows clients to access the desired site through them. In order to implement proxy, CGI or PHP are used.
The content of the web page is filtered in case of some web based proxy. Some may reformat the page while others may block inappropriate content displayed on the website. These types of servers can be implemented to intercept viruses and other content present on remote pages.
• Transparent Proxy Servers
Transparent Proxy reveals its identity and by using http headers, the original IP address can be made available. These servers have the ability to cache websites but they do not provide any anonymity. However, using transparent proxy may lead to simple IP bans.
• Distorting Proxy Servers
It reveals its identity as a proxy server but provides an incorrect IP address when requested through http headers.
• Anonymous Proxy Servers
Although it reveals its identity as a server but does not provide the original IP address. However, this type of server is detectable but it provides an ample amount of anonymity to clients.
• High Anonymity Proxy Servers
These types of servers do not reveal their identity. Moreover, they do not provide the original IP address as it gives an incorrect IP address through http headers. This explains the different types of proxies that can be used to hide the original IP address of a computer. However, it may not be beneficial in some cases as other devices contact to your computer through IP address only.
Michael Maxstead is a computer networking consultant who likes to write about VPN and Networking related technologies. If you visit his website VPNreviewz.com you can learn about what is a proxy server and iPredator.

Comments

  1. If you are looking for a reliable and experienced web hosting service provider then Hosting Raja is can be the answer for you. You can easily find many plans here, you can select the best  Hosting plan according you needs.

    ReplyDelete

Post a Comment

Popular posts from this blog

The Evolution of Smart Home Technology: From Convenience to Necessity

  The Evolution of Smart Home Technology: From Convenience to Necessity Smart home technology, once a novelty showcasing the heights of luxury and convenience, has rapidly evolved into a mainstream necessity for modern living. This transformation has been fueled by advancements in IoT (Internet of Things) technology, artificial intelligence, and consumer demand for greater sustainability and security. Today, smart home solutions not only offer enhanced convenience but also significantly improve energy efficiency, security, and even health monitoring. Here's how the landscape of smart home technology has shifted from a mere convenience to an essential part of everyday life. Early Stages: The Luxury of Convenience The initial allure of smart home technology was centered around convenience. Early adopters were fascinated by the ability to control lighting, climate, and entertainment systems remotely or via voice commands. Products like smart thermostats, which could learn a user's...

Getting the Most Out of Your IT Set Up

As a not for profit organisation, you will have lots on your mind. There are endless donor lists, causes, campaigns to be planned and much work to be done. All of this naturally needs the backing of a sound IT set up and, for this, good IT Support is absolutely essential. Most small, not for profit organisations feel that this is something they can easily work around. Hiring a part time IT professional, who may not be all that qualified, is what most places resort to; however, in the long run, this is not a good idea. When setting up a not for profit organisation it would be a good idea to start up strong. This way you will not have issues going forward. Rather than visit discount sales for hardware, speak to suppliers and see if they can give you quality products for a good price. This way you know you have good computers and hardware to begin with, remember the total cost of ownership is the primary consideration, the investment in getting equipment setup to your specific needs ...

Computer Recycling Helps To Save The Environment

Computer recycling is a way to prevent valuable parts from entering landfills by finding ways to reuse or restore them. Re-purposing computers prevents harmful toxins from entering into the environment. Environmental benefits are not the only benefits derived from re-purposing these machines. Despite these computers being outdated, recycled computer parts are very valuable. There are several things people can do to recycle their no longer wanted computers. Recycling computers is helps to prevent valuable parts from entering landfills. Recycling or re-using computers involves finding new ways to use the various parts or the computer itself. The majority of recycling involves salvaging any usable parts from the machines. In other cases, the computers are fixed and end up donated or resold. Re-purposing takes a machine that is slated for the landfill and gives them a longer lifespan. Re-using old computers is important to the environment. Computers are in the category of hazardous ...