Design and Analysis of Enhanced HTTP Proxy Cashing Server
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 2
Abstract
A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. A server is anything that has some resource that can be shared. A server process is said to “listen” to a port until a client connects to it. A “port” is a numbered socket on a particular machine. Proxy servers are commonly used to create an access point to the Internet that can be shared by all users. In this paper we present a new method of caching HTTP Proxy servers which takes lower bandwidth by maintaining a cache of Internet objects like html files, image files, etc. which are obtained via HTTP in local machine. The size of cache is dynamic and automatically determined time to time. When the local system memory is not enough to store the internet objects then paging system is implemented automatically without interference of users. Once an internet objects comes into local machine then no external objects is needed
Authors and Affiliations
Vimal Bibhu , Narendra Kumar , Mohammad Islam , Shashank Bhardwj
AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION
Automatic image retargeting is used for large image.That are to be fit in small size display devices. Without any loss of information.our proposed methods one is saliency based mesh parameterization method is used to re...
Role of soft computing as a tool in data mining
we live in a world where we can be overwhelmed with information; therefore it has become increasingly important to extract relevant information from the explosive amount of data for. Data Mining is the iterative and inte...
A new horizon in data security by Cryptography & Steganography
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic t...
NETWORK STORAGE AND ITS FUTURE
In the IT world storage becomes a serious issue. Information storage systems are the bedrock on which a modern company rests. Data has to be available to whoever needs it, whenever they need it, from...
Skin Detection Based Cryptography in Steganography (SDBCS)
As the popularity of digital cameras increases, some limitations of digital technology are becoming apparent and on the other hand it has become imperative to ensure security of information. Looking ahead...