IJRIT International Journal of Research in Information Technology, Volume 1, Issue 11, November, 2013, Pg. 342-347

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

The Proxy Server Rishabh Kumar Taneja1, Sahil Sarpal2, Pulkit Arora3 1

Student, Information Technology, Maharishi Dayanand University New Delhi, Delhi, India 2 Student, Information Technology, Maharishi Dayanand University New Delhi, Delhi, India 3 Student, Information Technology, Maharishi Dayanand University New Delhi, Delhi, India 1

[email protected], [email protected], [email protected]

Abstract Proxy servers reduce client’s access time by acting as an intermediary between the real server and the client which reduces load on the servers and networks as well. This paper will discuss the exciting features of a proxy server along with its shortcomings. Also, the various implementations related to proxy servers are discussed.

Keywords: Caching, Proxy Server, Reverse Proxy, Server Side Proxy.

1. Introduction A Proxy Server is a medium in which users within the LAN can gain access to the Internet efficiently and much more securely. The proxy server acts as an intermediate server that relays requests between a client and a server. The proxy server keeps track of all the client-server interactions, which allows you to monitor exactly what is going on, without having to access the main server. Proxy servers are desktop workstations not directly addressable from the outside world. It acts as a server while talking with a client, and as a client while talking with a server. It is mostly used for the reason of caching. By caching frequently accessed objects and servicing requests for these objects from the cache, proxies can reduce the load on network links and servers, as well as reduce client access latencies. This way it enhances the performance of the network.

Rishabh Kumar Taneja, IJRIT

342

Fig. 1 Proxy Server Placing in the Network

2. Features of a Proxy Server These are the properties possessed by proxy servers which explain why they are used. 2.1 Filtering Proxy servers can be programmed to sort the requests made by the user. Examples of some of these requests are:1.

Prevent users from accessing a specific set of web sites.

2.

Prevent users for accessing pages containing some specified strings.

3.

Prevent users from accessing video files, etc.

2.2 Performance It creates a substantial increase in the performance of the network. This happens because of the following reasons:1.

Can dramatically improve performance for a group of users.

2.

It saves all the results of requests in a cache.

3.

Can greatly conserve bandwidth.

4.

Reduces load on the actual server and on the network as well.

2.3 Caching A feature of the proxy server is that it caches retrieved web pages on the servers hard disk so that the pages can be quickly retrieved by the same or different user the next time that page is requested. The proxy cache eases bandwidth requirements and reduces delays that are inherent in a heavily trafficked, internet connected network. Because the page is stored locally on the proxy server, the page is delivered to the next request at local network speeds. The proxy cache also is advantageous when browsing multiple pages of the same web site. The proxy cache

Rishabh Kumar Taneja, IJRIT

343

also stores all the images and sub-files for the visited pages, so if the user jumps to a new page within the same site that uses, for example, the same images, the proxy cache has them already stored and can load them in the users browser quicker than having them retrieved from the web sites original server.

3. Uses of a Proxy Server Proxy servers have numerous uses and they are listed below:1. 2. 3. 4. 5. 6.

7.

To keep machines behind it anonymous, this is done mainly regarding security issues. To speed up access to resources (using caching). To prevent downloading the same content again and again, that is, multiple times and hence saves bandwidth. To audit usage, that is, to provide company employee internet usage reporting. To scan transmitted content for malware before delivery. To scan outbound content, e.g., data loss prevention. Access restriction: To apply access policies e.g. blocking of undesired sites.

4. Protocols of Operation in a Proxy Server The proxy server acts as an intermediate server that relays requests between a client and a server. The proxy server keeps track of all the client-server interactions, which allows us to monitor exactly what is going on, without having to access the main server. We can use the proxy server to monitor all client-server interaction, regardless of the communication protocol. For example, we can monitor the following protocols: 1.

HTTP for Web pages.

2.

HTTPS for secure Web pages.

3.

SMTP for email messages.

4.

LDAP for user management.

5. Different Implementations for a Proxy Server Based on the placement of the proxy server in the network architecture, they can be categorized into different types. These types have been explained underneath:5.1 Dual-Homed Host

Fig. 2 Dual-Homed Host

Rishabh Kumar Taneja, IJRIT

344

Dual-homed host has two network interfaces in which one connects to the internal LAN and the other one to the internet. Its firewall architecture acts as a software router providing secure connectivity. Proxy in conjunction with dual-homed host provides a complete firewall solution. In addition to caching, proxy server begins fine-grain filtering and virus scanning. 5.2 Screened Hosts

Fig. 3 Screened Hosts A screened host consists of a router deployed in front of the server. The router provides packet-filtering and restrict inbound access to the internal network. A screening router could support multiple hosts. Proxy server allows network traffic to gain internet access through the router. 5.3 Screened Sub-network

Fig. 4 Screened Sub-networks A screened sub-network consists of multiple routers sandwiching a non-secure network. This sub-network is commonly referred to as Demilitarized Zone (DMZ). Proxy in DMZ allows access to both internal and external network through the routers. Neither internal nor external traffic can pass through without the help of proxy server. The screened sub-network is a popular choice for large organizations with heavily trafficked. Security is critical and therefore redundancy is imperative.

5.4 Reverse Proxy Reverse proxy is the type of proxy server that retrieves resources on behalf of a client from one or more servers. It is present in either if the following two configurations:-

Rishabh Kumar Taneja, IJRIT

345

5.4.1 Server Stand In

Fig. 5 Server Stand In Reverse Proxy

In server stand-in mode, proxy receives requests for a web server protected behind the firewall. Server stand-in prevents direct, unmonitored access of internal resources from outside. Proxy server acts like a virtual server mirror and provides replication only. Contents of the secure server will be replicated in the proxy server cache.

5.4.2 Load Balancing

Fig. 6 Load Balancing In Reverse Proxy Multiple reverse proxy servers can be used to balance the load on an overtaxed server. Load balancing helps the host machine handle high-volume requests while reducing the impact on overall performance.

6. Drawbacks of a Proxy Server A proxy server will allow greater access from inside the protected network to the outside, but will keep the inside completely inaccessible from the outside. This means no servers, talk or archive connections, or direct mailing to the inside computers. These drawbacks might seem slight, but think of it this way: Consider a person has left a report he was doing on a system inside a firewall protected network. Suppose that now the person is at home, and he decides that he would like to go over it. He cannot. He cannot reach the system because it is behind the firewall. He will then try to log into firewall first, but since everyone has proxy server access, no one has set up an account for him on it. This is the biggest drawback of using proxy servers.

Rishabh Kumar Taneja, IJRIT

346

The inability to use UDP packets represents another big drawback associated with the proxy servers. FTP causes another problem with a proxy server. When getting or doing an l’s, the FTP server opens a socket on the client machine and sends the information through it. A proxy server will not allow this, so FTP doesn't particularly work. And, proxy servers run slow. Because of the greater overhead, almost any other means of getting this access will be faster.

4. Conclusions After conducting the thorough study of the proxy models we would like to conclude that proxy servers have their advantages and their disadvantages but the advantages weight out the disadvantages by a long margin. Also, these are of various types and are multipurpose and can be used according to the requirement. Talking about uses, these are very important in high traffic networks and really help in controlling congestion, saving bandwidth and speeding up the entire system. To conclude we would that proxy servers are very much important for us to use as they are secure and save time and resources.

5. Acknowledgments We would like to thank the entire faculty of IT Department, Dronacharya College of Engineering, Gurgaon, Haryana for their support, encouragement and patience.

6. References

[1] S. V. Gumaste, V. M. Thakare, M. U. Kharat and Aditya Patki, “Proxy Server Experiment and the Behaviour of the Web”, International Journal of Advanced Research in Computer Science, Vol. 4, No. 2, Jan-Feb 2013, pp. 84-87. [2] Donald Parungao, Liksun Lo, Zongyang Liu and Maochen Chang, “Installing and Setting Up a Proxy Server, CSULA, Spring 2000. [3] Sambit Sahu, “Design Considerations for Integrated Proxy Servers”, Computer Science Department Faculty Pulication Series, Paper 222, 1999. http://scholarworks.umass.edu/cgi/viewcontent.cgi?article=1221&context=cs_faculty_pubs [4] Swapan Purkait, “Proxy Server, Network Address Translator, Firewall”. http://www.nettech.in/course/proxy-server-nat-firewall.pdf [5] Mark Grennan, “Firewall and Proxy Server HOWTO”, Feb 26, 2000. http://www.tldp.org/HOWTO/Firewall-HOWTO.html [6] http://skproxy.com/ [7]http://www.webopedia.com/TERM/P/proxy_cache.html

Rishabh Kumar Taneja, IJRIT

347

The Proxy Server

Introduction. A Proxy Server is a medium in which users within the LAN can gain access to the Internet efficiently and much more securely. The proxy server acts ...

841KB Sizes 1 Downloads 210 Views

Recommend Documents

Java-based HTTP proxy server
standing between the mobile handset and web ... based on WSP(Wireless Session Protocol [2])/HTTP ... order to enable handset to access the IP network,.

Java-based HTTP proxy server
Web Computing Lab. Computer Science and Information Engineering Department. Fu Jen Catholic University http://weco.csie.fju.edu.tw. Abstract. The WAP gateway is the key component standing between the mobile handset and web servers. Accessing Internet

wingate proxy server configuration pdf
Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more ...

Java-based HTTP proxy server
After receiving the response sent by origin server, proxy would cache the message if it is a cacheable message. 7. At last, the response is replied to user agent. Figure 1. Traditional HTTP Proxy operation. 2.2 WAP Gateway Operations. In general, WAP

pdf-15103\squid-proxy-server-31-beginners-guide-by ...
pdf-15103\squid-proxy-server-31-beginners-guide-by-kulbir-saini.pdf. pdf-15103\squid-proxy-server-31-beginners-guide-by-kulbir-saini.pdf. Open. Extract.

Membuat Proxy Server.pdf
Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Membuat Proxy Server.pdf. Membuat Proxy

ergo proxy Complete.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect ...

ergo proxy raw.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect ...

Flywheel: Google's Data Compression Proxy for the ... - Matt Welsh
to track and manage consumption to avoid throttling or overage fees. ..... logic like rate-limiting and handling untrusted external input. ..... Our evaluation answers two main ques- ..... bility issues, carrier dependencies, or legal constraints.

Flywheel: Google's Data Compression Proxy for the ... - Matt Welsh
apple-touch-icon requests that return a 404 error since the error page is not ... connection errors, software bugs, high server load) may occur along the path ...

Flywheel: Google's Data Compression Proxy for the Mobile Web
in their network, for example to support automatic login to a billing portal site. Although web content filtering can be used as a means of censorship, our goal is ...

EMSA SA Proxy Form.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. EMSA SA Proxy ...

Blissfest PROXY Form 2015.pdf
BMO MEMBER NUMBER OF ABSENTEE VOTER: Signature of Absentee voter: Page 1 of 1. Blissfest ... m 2015.pdf. Blissfest ... m 2015.pdf. Open. Extract.

PROXY FOR SGC Per the current SGC Bylaws ... -
ARTICLE VI. Proxies. Section 1. The right of proxy representation at business meetings of the Corporation may be exercised by the members or the directors.

Proxy Statement - Office of Insurance Regulation
May 28, 2013 - operates more than 560 retail stores from California to Florida. ... the 2009 Distinguished Alumni Medal from the University of Georgia's College of .... with Florida Blue's Consolidated Financial Statements for the years ended ...

B&NES proxy vote.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

Flywheel: Google's Data Compression Proxy for the ... - Matt Welsh
spective, backed by usage data gained from several years of deployment and millions ... Figure 1: Flywheel sits between devices and origins, au- tomatically .... schools, etc. ... can be significant, requiring care in managing the trade- offs. At the

Flywheel: Google's Data Compression Proxy for the Mobile Web
We describe Flywheel from an operational and design per- spective, backed by usage data gained from several years of deployment and millions of active users. Flywheel's data reduction benefits rely on coopera- tion between the browser and server infr

Flywheel: Google's Data Compression Proxy for the Mobile Web
ica, mobile page loads are 19% of total traffic volume with 8% ..... and preconnect against overhead by issuing a bounded number of ...... Hierarchical Substring.

Modul_UKK PROXY, DNS, WEB, FTP.pdf
berubah (sesuai kebutuhan) konfigurasi sukses, bila tidak ulangi langkah 4-6. Page 3 of 24. Modul_UKK PROXY, DNS, WEB, FTP.pdf. Modul_UKK PROXY ...

Proxy Statement - Office of Insurance Regulation
May 28, 2013 - Proposal 2: to re-elect four directors, each for a three-year term (see page 29). ...... Schools. She chairs Bank of America's Environmental Council and .... These include licensing and examination, price setting, trade practices,.