{"id":34,"date":"2020-10-04T18:28:19","date_gmt":"2020-10-04T16:28:19","guid":{"rendered":"http:\/\/blog.espol.edu.ec\/knowledge\/?p=34"},"modified":"2020-10-04T18:28:19","modified_gmt":"2020-10-04T16:28:19","slug":"proxy-server","status":"publish","type":"post","link":"https:\/\/blog.espol.edu.ec\/knowledge\/2020\/10\/04\/proxy-server\/","title":{"rendered":"Proxy Server"},"content":{"rendered":"<p><span style=\"font-weight: 400\">A proxy server is a computer that can be connected as an interface between two computers or networks. It assumes a proxy function, receiving requests and transmitting them with its own IP address to another network. Proxy servers can be used on the Internet to hide the IP address.<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Definition<\/span><\/h2>\n<p><span style=\"font-weight: 400\">The basic meaning of the word ''proxy'' is \"the agency, function, or office of someone acting as a substitute for another\" (Merriam Webster's English dictionary). So the main purpose of a proxy is to act as a substitute.<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Internet or network solution<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Proxy servers are used for both the Internet and proprietary networks. In principle, anyone can set up their own proxy server.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400\">Network Proxy<\/span><\/h3>\n<p><span style=\"font-weight: 400\">A proxy server can also be used as part of a network, which is known as a network proxy. Two communication partners can exchange files or requests without transmitting the actual network address. A connection can also be established when both network addresses are not compatible.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400\">Dedicated proxy<\/span><\/h3>\n<p><span style=\"font-weight: 400\">A dedicated proxy not only connects two communication partners, but also has a direct effect on the form of communication. You can manipulate, filter or cache the data packets sent to you. Caching is widely applied, especially on the Internet. In this way, the requested files are available more quickly to the Internet user. For data transmission, the dedicated proxy can read and apply various protocols such as http or ftp.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400\">Circuit-level proxy<\/span><\/h3>\n<p><span style=\"font-weight: 400\">A circuit level proxy is typically installed on a firewall. It works independently of the network protocol as a filter for traffic from specific addresses or ports. Thus, the generic proxy, as it is also called, can request authentication for the use of a website.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400\">Functions<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Proxy servers have multiple functions. The most common ones are briefly explained below.<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Interface between the home network and the public network: You can access a public website through a proxy. This system is often used by universities. Students can access the university network and download e-Media, watch it at home or on the go through a proxy server. The use of a proxy provides additional protection against unwanted access to the network.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Control of network bandwidth: By using a proxy, a webmaster can control network traffic. Users and groups of users are only assigned certain resources. Control tasks also include monitoring server availability.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Protection against network attacks: The proxy server is placed between the actual data server and the users. Websites that work with confidential customer data, such as online stores, often use this solution to protect their servers.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Network logging: Proxy servers are commonly used to record network activity. In this way, harmful access can be identified more quickly.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Traffic Anonymization: Internet users often use proxy services to anonymize their own IP address. In this way, restrictions on the use of a website can be circumvented and the webmaster of the website accessed with a proxy will not be able to determine the actual sender of the IP request.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Intermediate storage to reduce server load: a proxy server can store the requests that have been sent to it. Since there are server requests, especially in Internet use, that are repeated, the proxy can deliver the requested information without causing an actual load to the server. At the same time, the requesting agent receives the information more quickly.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Content blocking: In public networks, access to the Internet can be blocked through a proxy server. On their home network, parents can prevent their children from being directed to websites with pornographic or racist content while surfing. Proxy servers are also used in some repressive countries to censor the Internet. The filtering functions of a proxy can also include the removal of interfering advertising while surfing.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Of course, the increase in Internet browsing from mobile devices such as smartphones and tablets has led to a growing need for <\/span><a href=\"https:\/\/pox23.io\/\"><span style=\"font-weight: 400\">4G proxies<\/span><\/a><span style=\"font-weight: 400\">. The <\/span><a href=\"https:\/\/pox23.io\/\"><span style=\"font-weight: 400\">4G mobile proxy<\/span><\/a><span style=\"font-weight: 400\"> is specially designed for this type of device and for the increasingly common use of Internet users, who connect to the network from these devices with 4G technology.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400\">Relevance to search engine optimization<\/span><\/h2>\n<p><span style=\"font-weight: 400\">SEOs can take advantage of proxies in their work. However, proxy servers are also sometimes used for black hat techniques.<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Page views: For search engine optimization, the use of proxy servers has the advantage that search engines cannot draw any conclusions about common server requests. This is mainly used for automatic site queries, such as SERP ratings, so that the user's IP address is not blocked due to the many requests.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reverse IP proxy: This type of IP manipulation is used by SEOs as a black hat technique to give their projects different Class C virtual networks and IP addresses. In fact, all websites are located on one server. The proxy issues different IPs and Class C networks for the networks' requests.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Spamming: Proxy servers are also often used to send out spam requests or spam comments on blogs. This avoids blocking the IP.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Analysis of user behavior: Proxy servers can complicate the analysis of web traffic. Therefore, it is possible that a German online store gets a lot of traffic from overseas or Eastern European countries. This association can be made, because many of the site visitors use a proxy server, and it transmits an IP address from those regions to the server. This \"wrong\" IP address is stored in the log file.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A proxy server is a computer that can be connected as an interface between two computers or networks. It assumes a proxy function, receiving requests and transmitting them with its own IP address to another network. Proxy servers can be used on the Internet to hide the IP address. Definition The basic meaning of the &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blog.espol.edu.ec\/knowledge\/2020\/10\/04\/proxy-server\/\" class=\"more-link\">Continuar leyendo<span class=\"screen-reader-text\"> \"Proxy Server\"<\/span><\/a><\/p>\n","protected":false},"author":11121,"featured_media":35,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[818],"tags":[],"class_list":["post-34","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categoria"],"_links":{"self":[{"href":"https:\/\/blog.espol.edu.ec\/knowledge\/wp-json\/wp\/v2\/posts\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.espol.edu.ec\/knowledge\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.espol.edu.ec\/knowledge\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.espol.edu.ec\/knowledge\/wp-json\/wp\/v2\/users\/11121"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.espol.edu.ec\/knowledge\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":1,"href":"https:\/\/blog.espol.edu.ec\/knowledge\/wp-json\/wp\/v2\/posts\/34\/revisions"}],"predecessor-version":[{"id":36,"href":"https:\/\/blog.espol.edu.ec\/knowledge\/wp-json\/wp\/v2\/posts\/34\/revisions\/36"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.espol.edu.ec\/knowledge\/wp-json\/wp\/v2\/media\/35"}],"wp:attachment":[{"href":"https:\/\/blog.espol.edu.ec\/knowledge\/wp-json\/wp\/v2\/media?parent=34"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.espol.edu.ec\/knowledge\/wp-json\/wp\/v2\/categories?post=34"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.espol.edu.ec\/knowledge\/wp-json\/wp\/v2\/tags?post=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}