SlideShare a Scribd company logo
THE  SPARK PRESENTING PROXY SERVER
TEAM MEMBERS Ekta Supriya Malini Manasa Gowri
AGENDA Introduction What is a proxy server? Purpose of proxy server Types of proxy server Mechanism of proxy server Understanding briefly about http and ftp protocol  Understanding http and ftp proxy servers
PROTOCOL A protocol is set of rules for data representation, authentication, and error detection.
INTRODUCTION TO HTTP Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems.
PROXY SERVER A proxy server is a server that acts as an  intermediary  for requests from clients seeking resources from other servers.
PURPOSE OF PROXY SERVER Proxy servers have two main purposes: To keep machines behind it anonymous (mainly  for security) To speed up access to a resource (via caching). It is commonly used to cache web pages from a web server.
OPERATING PRINCIPLE OF PROXY SERVERS
TYPES OF PROXY SERVERS Caching proxy server Web proxy server Content-filtering web proxy Anonymizing proxy server
MECHANISM OF PROXY SERVER Proxy server client ISP Block  www.xyz.com www.abc.com www.xyz.com www.abc.com www.abc.com
MECHANISM OF PROXY SERVER  Proxy server accepts request from client. It  generates response based on two conditions.  If the document exits in the local cache, proxy server itself provides the required retrieval to the client.
MECHANISM OF PROXY SERVER  If there is a cache miss then the request is been forwarded to the original server.  The proxy server transfers the replies to the client and also being caches them. The proxy server thus acts both as the client and the server.
HYPER TEXT TRANSFER PROTOCOL(HTTP) Used to access data in WWW.  to transfer data in the form of hypertext, plaintext,  audio, video.  It functions like a combination of FTP and SMTP.
HYPER TEXT TRANSFER PROTOCOL(HTTP) It is similar to FTP because it transfers files and uses the services of TCP.  It is simpler than FTP as it uses only one TCP connection on a well known port 80.
HTTP (CONT…) It is similar to SMTP since data are transferred from client and the server. Http differs from SMTP in the way messages are sent. Http are not destined to be read by humans They are read and interpreted by the http server and http client. Client sends a request which look like mail to the server. The server sends the response which looks like a mail reply to the client. Http itself is a stateless protocol.
HTTP (CONT..) Client sends a request which look like mail to the server. The server sends the response which looks like a mail reply to the client. Http itself is a stateless protocol.
FILE TRANSFER PROTOCOL (FTP) It is a standard mechanism provided by the internet for copying a file from one host to another.  There are many difficulties in file transfer.  It establishes two TCP connections between the client and the server.
FILE TRANSFER PROTOCOL (FTP) One connection for data transfer other for control information(commands and response). It is more efficient and the control connection is simpler whereas the data connection is complex.
HTTP PROXY SERVERS "Middlemen" between clients and servers Proxies which process http and (not always) ftp requests are known as http proxy servers Proxy  Server Looks like a server sending responses Looks like a client  making requests
KEY FEATURES OF HTTP PROXY SERVERS It  may rewrite the client’s requests It Provides Anonymity and Security It is a Caching Proxy server Serves  as content filter Multithreading
ANONYMITY OF A HTTP PROXY HTTP proxy servers have several anonymity levels Based on Anonymity degree, they are classified as: Transparent Anonymous Distorting Highly Anonymous
CACHING MECHANISM
FUNCTIONS OF HTTP PROXY SERVER Caching Reduces Latency Reduces Traffic on the web Bandwidth Conservation Increases accessibility firewalling and filtering  connection sharing
ADVANTAGES  OF HTTP PROXY SERVERS Better Performance Less trafficking Reduces latency Conserves bandwidth Good at logging
DISADVANTAGES OF HTTP PROXY SERVERS Proxy services lag behind nonproxied services Proxy services may require different servers for each service Proxy services usually require modifications to clients, procedures, or both Proxy services don't protect you from all protocol weaknesses Proxy services are not workable for some services
FTP PROXY SERVERS An ftp proxy server support file sharing on networks using the file transfer protocol (ftp) Concurrency control Master mechanism Opens port Waits for client Choose port Starts slave Continue
FTP PROXY SERVER(CONT..) Slave Mechanism Keep control processes and the control connection alive as long as the ftp session is alive We can use ftp proxy server in two modes Active Passive
Ad

More Related Content

What's hot (20)

Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
Mohit Dhankher
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
primeteacher32
 
Proxy servers
Proxy serversProxy servers
Proxy servers
Kumar
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
Gurjot Singh
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Firewall
FirewallFirewall
Firewall
Saurabh Chauhan
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
Harshit Srivastava
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
Mehdi Poustchi Amin
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
BharathiKrishna6
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
OECLIB Odisha Electronics Control Library
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
simplyharshad
 
Http protocol
Http protocolHttp protocol
Http protocol
Arpita Naik
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
Sourav Roy
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
Šhæÿæñ Æhmęd
 
Proxy
ProxyProxy
Proxy
Triad Square InfoSec
 
IP Security
IP SecurityIP Security
IP Security
Keshab Nath
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Adarsh Kumar Yadav
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
Mohammed Maajidh
 

Viewers also liked (18)

Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
amanchaurasia
 
Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
Sourav Roy
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
Nascenia IT
 
Spark Compute as a Service at Paypal with Prabhu Kasinathan
Spark Compute as a Service at Paypal with Prabhu KasinathanSpark Compute as a Service at Paypal with Prabhu Kasinathan
Spark Compute as a Service at Paypal with Prabhu Kasinathan
Databricks
 
Spark on yarn
Spark on yarnSpark on yarn
Spark on yarn
datamantra
 
Spark Summit Europe: Building a REST Job Server for interactive Spark as a se...
Spark Summit Europe: Building a REST Job Server for interactive Spark as a se...Spark Summit Europe: Building a REST Job Server for interactive Spark as a se...
Spark Summit Europe: Building a REST Job Server for interactive Spark as a se...
gethue
 
Hadoop and Spark Analytics over Better Storage
Hadoop and Spark Analytics over Better StorageHadoop and Spark Analytics over Better Storage
Hadoop and Spark Analytics over Better Storage
Sandeep Patil
 
Dynamically Allocate Cluster Resources to your Spark Application
Dynamically Allocate Cluster Resources to your Spark ApplicationDynamically Allocate Cluster Resources to your Spark Application
Dynamically Allocate Cluster Resources to your Spark Application
DataWorks Summit
 
Get most out of Spark on YARN
Get most out of Spark on YARNGet most out of Spark on YARN
Get most out of Spark on YARN
DataWorks Summit
 
Productionizing Spark and the Spark Job Server
Productionizing Spark and the Spark Job ServerProductionizing Spark and the Spark Job Server
Productionizing Spark and the Spark Job Server
Evan Chan
 
Producing Spark on YARN for ETL
Producing Spark on YARN for ETLProducing Spark on YARN for ETL
Producing Spark on YARN for ETL
DataWorks Summit/Hadoop Summit
 
Spark-on-YARN: Empower Spark Applications on Hadoop Cluster
Spark-on-YARN: Empower Spark Applications on Hadoop ClusterSpark-on-YARN: Empower Spark Applications on Hadoop Cluster
Spark-on-YARN: Empower Spark Applications on Hadoop Cluster
DataWorks Summit
 
ETL with SPARK - First Spark London meetup
ETL with SPARK - First Spark London meetupETL with SPARK - First Spark London meetup
ETL with SPARK - First Spark London meetup
Rafal Kwasny
 
Why your Spark job is failing
Why your Spark job is failingWhy your Spark job is failing
Why your Spark job is failing
Sandy Ryza
 
Apache Spark Model Deployment
Apache Spark Model Deployment Apache Spark Model Deployment
Apache Spark Model Deployment
Databricks
 
Spark 2.x Troubleshooting Guide
Spark 2.x Troubleshooting GuideSpark 2.x Troubleshooting Guide
Spark 2.x Troubleshooting Guide
IBM
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
amanchaurasia
 
Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
Sourav Roy
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
Nascenia IT
 
Spark Compute as a Service at Paypal with Prabhu Kasinathan
Spark Compute as a Service at Paypal with Prabhu KasinathanSpark Compute as a Service at Paypal with Prabhu Kasinathan
Spark Compute as a Service at Paypal with Prabhu Kasinathan
Databricks
 
Spark Summit Europe: Building a REST Job Server for interactive Spark as a se...
Spark Summit Europe: Building a REST Job Server for interactive Spark as a se...Spark Summit Europe: Building a REST Job Server for interactive Spark as a se...
Spark Summit Europe: Building a REST Job Server for interactive Spark as a se...
gethue
 
Hadoop and Spark Analytics over Better Storage
Hadoop and Spark Analytics over Better StorageHadoop and Spark Analytics over Better Storage
Hadoop and Spark Analytics over Better Storage
Sandeep Patil
 
Dynamically Allocate Cluster Resources to your Spark Application
Dynamically Allocate Cluster Resources to your Spark ApplicationDynamically Allocate Cluster Resources to your Spark Application
Dynamically Allocate Cluster Resources to your Spark Application
DataWorks Summit
 
Get most out of Spark on YARN
Get most out of Spark on YARNGet most out of Spark on YARN
Get most out of Spark on YARN
DataWorks Summit
 
Productionizing Spark and the Spark Job Server
Productionizing Spark and the Spark Job ServerProductionizing Spark and the Spark Job Server
Productionizing Spark and the Spark Job Server
Evan Chan
 
Spark-on-YARN: Empower Spark Applications on Hadoop Cluster
Spark-on-YARN: Empower Spark Applications on Hadoop ClusterSpark-on-YARN: Empower Spark Applications on Hadoop Cluster
Spark-on-YARN: Empower Spark Applications on Hadoop Cluster
DataWorks Summit
 
ETL with SPARK - First Spark London meetup
ETL with SPARK - First Spark London meetupETL with SPARK - First Spark London meetup
ETL with SPARK - First Spark London meetup
Rafal Kwasny
 
Why your Spark job is failing
Why your Spark job is failingWhy your Spark job is failing
Why your Spark job is failing
Sandy Ryza
 
Apache Spark Model Deployment
Apache Spark Model Deployment Apache Spark Model Deployment
Apache Spark Model Deployment
Databricks
 
Spark 2.x Troubleshooting Guide
Spark 2.x Troubleshooting GuideSpark 2.x Troubleshooting Guide
Spark 2.x Troubleshooting Guide
IBM
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar
 
Ad

Similar to Proxy Server (20)

Group20 Dynamic Networks
Group20 Dynamic NetworksGroup20 Dynamic Networks
Group20 Dynamic Networks
hariprasadnr
 
CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
VISWANATHAN R V
 
Proxy http ftp dns email
Proxy http ftp dns emailProxy http ftp dns email
Proxy http ftp dns email
Heera K S
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
Abshar Fatima
 
Www and http
Www and httpWww and http
Www and http
Nitesh Singh
 
application layer
application layerapplication layer
application layer
BishalWosti1
 
internet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcainternet programming and java notes 5th sem mca
internet programming and java notes 5th sem mca
Renu Thakur
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
Rajan Pandey
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds
 
Configuring the Apache Web Server
Configuring the Apache Web ServerConfiguring the Apache Web Server
Configuring the Apache Web Server
webhostingguy
 
presentation nasir11111111111111111.pptx
presentation nasir11111111111111111.pptxpresentation nasir11111111111111111.pptx
presentation nasir11111111111111111.pptx
MuhammadNasir342806
 
WWW & HTTP
WWW & HTTPWWW & HTTP
WWW & HTTP
subbarayudu chakali
 
Server Side Programming
Server Side ProgrammingServer Side Programming
Server Side Programming
Milan Thapa
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
Srihari
 
SNA lab.pptx
SNA lab.pptxSNA lab.pptx
SNA lab.pptx
AnonymousDevil2
 
APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
ArnavPlayz
 
Www and http
Www and httpWww and http
Www and http
SanthiNivas
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
JUW Jinnah University for Women
 
1 web technologies
1 web technologies1 web technologies
1 web technologies
Jalpesh Vasa
 
Web protocol.pptx
Web protocol.pptxWeb protocol.pptx
Web protocol.pptx
SindhuVelmukull
 
Group20 Dynamic Networks
Group20 Dynamic NetworksGroup20 Dynamic Networks
Group20 Dynamic Networks
hariprasadnr
 
Proxy http ftp dns email
Proxy http ftp dns emailProxy http ftp dns email
Proxy http ftp dns email
Heera K S
 
internet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcainternet programming and java notes 5th sem mca
internet programming and java notes 5th sem mca
Renu Thakur
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
Rajan Pandey
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds
 
Configuring the Apache Web Server
Configuring the Apache Web ServerConfiguring the Apache Web Server
Configuring the Apache Web Server
webhostingguy
 
presentation nasir11111111111111111.pptx
presentation nasir11111111111111111.pptxpresentation nasir11111111111111111.pptx
presentation nasir11111111111111111.pptx
MuhammadNasir342806
 
Server Side Programming
Server Side ProgrammingServer Side Programming
Server Side Programming
Milan Thapa
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
Srihari
 
APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
ArnavPlayz
 
1 web technologies
1 web technologies1 web technologies
1 web technologies
Jalpesh Vasa
 
Ad

Recently uploaded (20)

GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
James Anderson
 
AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
Ivano Malavolta
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Viam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdfViam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdf
camilalamoratta
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
AI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of DocumentsAI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of Documents
UiPathCommunity
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Top-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptxTop-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptx
BR Softech
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Raffi Khatchadourian
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
James Anderson
 
AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
Ivano Malavolta
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Viam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdfViam product demo_ Deploying and scaling AI with hardware.pdf
Viam product demo_ Deploying and scaling AI with hardware.pdf
camilalamoratta
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
AI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of DocumentsAI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of Documents
UiPathCommunity
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Top-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptxTop-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptx
BR Softech
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Raffi Khatchadourian
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 

Proxy Server

  • 1. THE SPARK PRESENTING PROXY SERVER
  • 2. TEAM MEMBERS Ekta Supriya Malini Manasa Gowri
  • 3. AGENDA Introduction What is a proxy server? Purpose of proxy server Types of proxy server Mechanism of proxy server Understanding briefly about http and ftp protocol Understanding http and ftp proxy servers
  • 4. PROTOCOL A protocol is set of rules for data representation, authentication, and error detection.
  • 5. INTRODUCTION TO HTTP Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems.
  • 6. PROXY SERVER A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers.
  • 7. PURPOSE OF PROXY SERVER Proxy servers have two main purposes: To keep machines behind it anonymous (mainly for security) To speed up access to a resource (via caching). It is commonly used to cache web pages from a web server.
  • 8. OPERATING PRINCIPLE OF PROXY SERVERS
  • 9. TYPES OF PROXY SERVERS Caching proxy server Web proxy server Content-filtering web proxy Anonymizing proxy server
  • 10. MECHANISM OF PROXY SERVER Proxy server client ISP Block www.xyz.com www.abc.com www.xyz.com www.abc.com www.abc.com
  • 11. MECHANISM OF PROXY SERVER Proxy server accepts request from client. It generates response based on two conditions. If the document exits in the local cache, proxy server itself provides the required retrieval to the client.
  • 12. MECHANISM OF PROXY SERVER If there is a cache miss then the request is been forwarded to the original server. The proxy server transfers the replies to the client and also being caches them. The proxy server thus acts both as the client and the server.
  • 13. HYPER TEXT TRANSFER PROTOCOL(HTTP) Used to access data in WWW. to transfer data in the form of hypertext, plaintext, audio, video. It functions like a combination of FTP and SMTP.
  • 14. HYPER TEXT TRANSFER PROTOCOL(HTTP) It is similar to FTP because it transfers files and uses the services of TCP. It is simpler than FTP as it uses only one TCP connection on a well known port 80.
  • 15. HTTP (CONT…) It is similar to SMTP since data are transferred from client and the server. Http differs from SMTP in the way messages are sent. Http are not destined to be read by humans They are read and interpreted by the http server and http client. Client sends a request which look like mail to the server. The server sends the response which looks like a mail reply to the client. Http itself is a stateless protocol.
  • 16. HTTP (CONT..) Client sends a request which look like mail to the server. The server sends the response which looks like a mail reply to the client. Http itself is a stateless protocol.
  • 17. FILE TRANSFER PROTOCOL (FTP) It is a standard mechanism provided by the internet for copying a file from one host to another. There are many difficulties in file transfer. It establishes two TCP connections between the client and the server.
  • 18. FILE TRANSFER PROTOCOL (FTP) One connection for data transfer other for control information(commands and response). It is more efficient and the control connection is simpler whereas the data connection is complex.
  • 19. HTTP PROXY SERVERS "Middlemen" between clients and servers Proxies which process http and (not always) ftp requests are known as http proxy servers Proxy Server Looks like a server sending responses Looks like a client making requests
  • 20. KEY FEATURES OF HTTP PROXY SERVERS It may rewrite the client’s requests It Provides Anonymity and Security It is a Caching Proxy server Serves as content filter Multithreading
  • 21. ANONYMITY OF A HTTP PROXY HTTP proxy servers have several anonymity levels Based on Anonymity degree, they are classified as: Transparent Anonymous Distorting Highly Anonymous
  • 23. FUNCTIONS OF HTTP PROXY SERVER Caching Reduces Latency Reduces Traffic on the web Bandwidth Conservation Increases accessibility firewalling and filtering connection sharing
  • 24. ADVANTAGES OF HTTP PROXY SERVERS Better Performance Less trafficking Reduces latency Conserves bandwidth Good at logging
  • 25. DISADVANTAGES OF HTTP PROXY SERVERS Proxy services lag behind nonproxied services Proxy services may require different servers for each service Proxy services usually require modifications to clients, procedures, or both Proxy services don't protect you from all protocol weaknesses Proxy services are not workable for some services
  • 26. FTP PROXY SERVERS An ftp proxy server support file sharing on networks using the file transfer protocol (ftp) Concurrency control Master mechanism Opens port Waits for client Choose port Starts slave Continue
  • 27. FTP PROXY SERVER(CONT..) Slave Mechanism Keep control processes and the control connection alive as long as the ftp session is alive We can use ftp proxy server in two modes Active Passive
  翻译: