Design and Analysis of Enhanced HTTP Proxy Cashing Server
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 2
Abstract
A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. A server is anything that has some resource that can be shared. A server process is said to “listen” to a port until a client connects to it. A “port” is a numbered socket on a particular machine. Proxy servers are commonly used to create an access point to the Internet that can be shared by all users. In this paper we present a new method of caching HTTP Proxy servers which takes lower bandwidth by maintaining a cache of Internet objects like html files, image files, etc. which are obtained via HTTP in local machine. The size of cache is dynamic and automatically determined time to time. When the local system memory is not enough to store the internet objects then paging system is implemented automatically without interference of users. Once an internet objects comes into local machine then no external objects is needed
Authors and Affiliations
Vimal Bibhu , Narendra Kumar , Mohammad Islam , Shashank Bhardwj
Operating System based Compliance Validation of Trusted Computing
The concept of trusted computing given was by Anderson [2]. Trust is an expectation that a device behaves in a particular manner. A trusted component, operation or process is one whose behavior is pr...
Selection of Best Web Site by Applying COPRAS-G method
The presence of multiple websites offering similar services has changed the user outlook. The user now prefers to visit those sites, which are easy to use. Many different methods have been proposed to measure usage of a...
Retrieving Business Applications using Open Web API’s Web Mining – Executive Dashboard Application Case Study
Web mining is new area of research in information technology; so many business applications that utilize data mining and text mining techniques to extract useful business information on the we...
Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol
In this paper, we develop a trust based security protocol based on a cross-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the p...
Pattern Extraction, Classification and Comparison Between Attribute Selection Measures
In this research, we have compared three different attribute selection measures algorithms. We have used ID3 algorithm, C4.5 algorithm and CART algorithm. All these algorithms are decision tree based algor...