• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Proxy Server: Design Pattern in Programming

By Abhishek Ghosh January 30, 2023 6:00 pm Updated on January 30, 2023

Proxy Server: Design Pattern in Programming

Advertisement

A proxy is a computer software component that acts as an intermediary by placing itself between two hosts to facilitate or monitor their exchanges. In computer networks, a proxy is then a program serving as an intermediary to access another network (usually the network is public Internet). By extension, we also call a hardware proxy when such as a server set up to ensure the operation of services.

The proxy is located at the application layer (HTTP, FTP, SSH, etc. level 7 of the OSI model). A common mistake is to use the traceroute command (or tracert on Windows) to try to see the proxy. It does not appear because this command uses the IP level 3 network protocol and therefore cannot know the proxy.

 

Design Pattern in Programming

 

The concept of proxy can be used in any computer program. If two people who do not speak the same language want to communicate, they need an interpreter. In computer science, two entities using different technologies can communicate with each other through an intermediary who interprets their exchanges.

Advertisement

---

Network proxy

In the more specific environment of networks, a proxy server, proxy server1 or agent1, is a client-server computing function that relays requests between a client function and a server function (layers 5 to 7 of the OSI model). Proxy servers are used to perform the following functions:

  • Navigation acceleration: cache, data compression ;
  • History (logs): logging of requests;
  • LAN security
  • filtering: site restrictions, blocking ads or heavy content (Java, Flash) ;
  • Anonymity ;
  • load balancing ;

Internet access

Internet Service Providers (ISPs) can offer proxies for their subscribers’ connection. This requires the subscriber to correctly configure his system (via installation software provided by the ISP). But it is also possible that the ISP uses a transparent proxy (without user configuration). This proxy allows, for example, the access provider to know the browsing habits of its subscribers or to reduce the number of effective accesses to remote sites.

In the context of security

The usefulness of proxy servers is important, especially in the context of securing information systems. For example, it is almost systematic in companies or schools that Internet access is through a proxy server. The user does not see the difference, except when the user tries to browse a prohibited site, in which case he may receive an error message: such a proxy is called a filtering proxy. You may also see a dialog box asking for a username and password before you can surf the Internet.

Conversely, a proxy can also be used to bypass filters. Suppose the case of a country that blocks access to certain sites considered “subversive”, but performs this filtering only based on the address of the site you want to visit. In this case, by using a proxy as an intermediary (located in another country therefore not affected by filtering), you can get rid of filtering (unless of course the proxy address is itself prohibited).

The principle also works the other way around. Suppose a website only accepts Internet users from a certain country (concrete example: a US presidential campaign site that only accepts connections from the United States). In this case, through a proxy located in the United States, a French Internet user will be able to visit the site.

A third role of the proxy is to complicate the escalation to the user (anonymization). In the previous example, we deceived the American site that was not able to trace back to the user through the proxy. Some advanced techniques allow you to go back through the proxy. In this case, a user will be able to use many chain proxies such as the Tor network and stop the connection before those who track him are traced back to him.

Proxy Server: Design Pattern in Programming

Web proxy

Normally, the use of a full proxy is done by configuring your browser or computer. But there is a much easier to use category of proxy: web proxies. It is a simple website whose page offers a field to type the address of the site you want to visit. Once entered, the requested page is displayed inside the first page. But the address that appears in the address bar is always that of the proxy.

This type of proxy is less powerful than a normal proxy. Indeed, pages using advanced techniques to update themselves (AJAX) do not “know” that they are going through a proxy, and therefore try to reach their servers directly. If this server was banned, then the request fails. Most web proxies also do not allow the use of secure sites using HTTPS, such as banks for example.

Many web proxies are available for free on the Internet, mainly to allow Internet users to bypass the protections of their surfing places (company, school, as explained above). Most finance themselves by displaying advertising in addition to the requested page. But some may also try to capture passwords or other sensitive information (credit card number) or even redirect the user to a fake site. So you have to be extremely careful before using a free proxy on the Internet.

The principle of web proxies is used by university libraries to allow their users to access online resources for which they have a subscription. The IP address of the proxy server is declared to the provider who gives access to the content to users passing through the proxy and therefore presenting themselves with the authorized IP address.

This Article Has Been Shared 734 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Proxy Server: Design Pattern in Programming

Actually a list should normally appear here. Automated calculation failed.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Is it Good to Run Apache Web server and MySQL Database on Separate Cloud Servers? March 27, 2023
  • Advantages of Cloud Server Over Dedicated Server for Hosting WordPress March 26, 2023
  • Get Audiophile-Grade Music on Your Smartphone March 25, 2023
  • Simple Windows Security and Privacy Checklist for 2023 March 24, 2023
  • 7 Best Artificial Intelligence (AI) Software March 24, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Proxy Server: Design Pattern in Programming," in The Customize Windows, January 30, 2023, March 28, 2023, https://thecustomizewindows.com/2023/01/proxy-server-design-pattern-in-programming/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT