SlideShare a Scribd company logo
1 of 4
Download to read offline
ISSN: XXXX-XXXX Volume X, Issue X, Month Year
Proxy Server and the Changing Nature
of the Web
Manjunath N.Wali
Dept of Computer Science and Engineering
BTL Institute of Technology
Bangalore, India
manjunath.wali44@gmail.com
Abstract: The use of proxy server could help pro-
vide equal access and response time to large num-
bers of World Wide Web (WWW) users requesting
previously accessed page. The proxy server acts as
an intermediate server that relays requests between a
client and a server. The proxy server keeps track of
all the client-server interactions, which allows you to
monitor exactly what is going on, without having to
access the main server, also use the proxy server to
monitor all client-server interaction, regardless of
the communication decrease associated with the use
of proxy server. Due to lack of recently published
scholarly article that test the performance of proxy
server, we carry out an in-depth study of the behavior
of a proxy server over a six month period. The study
indicates the effectiveness of the proxy server and
helps evaluate the tradeoff between money spent on
higher bandwidth lower latency connections, versus
the cost/performance of using a caching intermedi-
ary.
1. INTRODUCTION
Acts on behalf of other clients, and presents re-
quests from other clients to a server. Acts as a server
while talking with a client, and as a client while talk-
ing with a server. It stops all requests to the real serv-
er to see if it can fulfill the requests itself. If not, it
forwards the request to the real server. The WWW
has witnessed significant growth in the last few dec-
ades; this is due partly to the large numbers of users
and the type of traffic generated. A typical solution
which is not scalable is to increase the bandwidth.
Since increasing the bandwidth can be achieved with
associated monthly cost, many organizations are us-
ing proxy server to provide adequate access and re-
sponse time to their ever growing number of users
requesting internet connectivity. The performance
increase due to proxy servers has been widely report-
ed, however a study reported that proxy servers actu-
ally decrease performance.
Fig 1: Network Architecture using Proxy Server, Source [5]
In order to further understand the nature of proxy
server and how it can be used to provide enough ac-
cess and response time to large numbers of users re-
International Journal of Innovatory research in Science and Management - IJIRSM
ISSN: XXXX-XXXX Volume X, Issue X, Month Year 18
questing same object from the Internet, we carried
out an in-depth study of the behavior of a proxy serv-
er over a six month period. In our earlier work, a non-
busy network traffic monitoring system was devel-
oped to monitor and analyze network traffic. A major
contribution of this work is to show the effectiveness
of the proxy server and help evaluate the tradeoff
between money spent on higher bandwidth lower
latency connections, versus the cost/performance of
using a caching intermediary.
Fig 2: Working of Proxy Server. Source [3]
2. RELATED WORK
Caching can be applied at several locations namely;
the web client, web server and within the network
(proxy servers). Several studies have reported per-
formance increase due to proxy servers. The result of
a study in showed that the average response time of a
hit may be five times smaller than a miss. A 20% to
25% improvement in user perceived response time
was reported in . Research on the effectiveness of
proxy caching is very active. A study at Virginia
Tech has shown that hit rates of 30% to 50% can be
achieved by a caching proxy. Other studies gave a
range from between 20% to 60% hit rate reported hit
rates of between 10% to 40% for a three level cach-
ing hierarchy, and about 35% to 40% for a universi-
ty-level web proxy cache.
However, a study conducted in reported a hit rate of
4%, which shows a decrease in performance. The
reason for this decrease in performance was traced to
the changing nature of the web, i.e. the web is evolv-
ing from static nature to dynamic repository. Fur-
thermore, research into the ability of proxy servers to
cache video was reported in . Research efforts in the
last few years address performance of multi-level
proxy cache configuration. Other factors that may
improve proxy cache performance are the replace-
ment policies used by the cache and the workload
characteristics. Data for web usage mining can be
collected at several levels. We may be faced with
data from a single user or a multitude of them on one
hand and a single site or a multitude of sites.
Fig 3: Firewall Proxy Server. Source [8]
Combining both factors offerings four possibilities,
Data about behavior of a single user on a single site
can be collected by means of Java scripts or Java
International Journal of Innovatory research in Engineering and Technology - IJIRET
ISSN: XXXX-XXXX Volume X, Issue X, Month Year 19
applets. Both methods require user participation in
the sense that the user has to enable their functionali-
ty.
3. ARCHITECTURE
Architecture of a Web proxy server as the way a
proxy server interacts with a file system. Cache archi-
tecture names, stores, and recollects objects from a
file system, and maintains application-level metadata
about cached objects. To better understand the impact
of cache architectures on file systems we first re-
view the basic design goals of file systems and then
de- scribe the Unix Fast File System (FFS), the
standard file system available on most variants of the
UNIX operating system.
Fig 4: N/W Architecture using a Proxy Server.
Source [7]
4. CONCLUSION
This paper focuses on testing the performance of
proxy servers experimentally and investigates the
effect of the changing nature of the web on proxy
server performance. We carry out an in-depth study
of the behavior of a proxy server over a six month
period. Access logs of varying durations were col-
lected, from three different proxy servers.
We analyzed the logs using Web browser. Two per-
formance parameters, DHR and BHR were used to
evaluate the performance of the proxy servers. We
computed DHR and BHR for the entire period, and
on a monthly and hourly basis to see if there will be
drastic variations. Our result shows a hit rate of about
21% to 38% and a byte rate of 21% to 28%, further-
more, a high variation was observed during the peak
periods from the y-error bar graphs. The COV graph
shows a low or constant variation during the peak
periods indicating that neither hit ratios depend on
traffic load. About 60 to 78% of requests to the proxy
servers are for dynamic content; this indicates that
the web is changing from the static nature to dynamic
information repository. The results of our experiment
show the effectiveness of the proxy server and helps
evaluate the tradeoff between money spent on higher
bandwidth lower latency connections, versus the
cost/performance of using a caching intermediary.
Future work will focus on other techniques that can
be used to improve proxy performance, this include
multicast delivery of pages and the use of cyclic mul-
ticast engine.
REFERENCES
[1] R. Howard, and B. J. Jansen, "A Proxy server
experiment: an indication of the changing nature of
the web," Proc of the Seventh International Confer-
ence on computer Communications and Networks
(ICCCN '98), pp. 646–649, Washington, DC, October
1998.
[2] O.O. Abiona, C.E. Onime, A.I. Oluwaranti, E.R.
Adagunodo, L.O. Kehinde, and S.M. Radicella, "De-
velopment of a Non Intrusive Network Traffic Moni-
toring and Analysis system”. African Journal of Sci-
International Journal of Innovatory research in Science and Management - IJIRSM
ISSN: XXXX-XXXX Volume X, Issue X, Month Year 20
ence and Technology, Vol.7, no. 2, pp. 54–69, De-
cember 2006.
[3] A. Rousskov, and V. Soloviev, “On performance
of caching proxies” Proceedings of the 1998 ACM
SIGMETRICS joint international conference on
Measurement and modeling of computer systems
SIGMETRICS '98/PERFORMANCE '98, Vol. 26,
no. 1, pp. 272–273, 1998.
[4] R. Caceres, F. Douglis, A. Feldmann, G. Glass,
and M. Rabinovich, “Web proxy caching: the devil is
in the details”, ACM Performance Evaluation Re-
view, vol. 26, no. 1, pp. 11–15, December 1998.
[5] G. Abdulla, E. Fox, M. Abrams, and S. Williams,
“WWW proxy traffic characterization with applica-
tion to caching”, Technical Report TR-97- 03, Com-
puter Science Department, Virginia Tech., March
1997.
[6] L. DiDio, “Proxy servers gain user appeal,” Com-
puterworld, v31 n16, pp.16 (1) April 21, 1997.
[7] S. Machlis, “Planning blunts Web traffic spikes,”
Computerworld, v31 n46, pp. 6(1), November 17,
1997.
[8] S. Williams, M. Abrams, C. R. Standridge, G.
Abdulla and E. A. Fox, “Removal policies in network
caches for world wide web documents”, Proc, ACM
SIGCOMM, August, 1997.
[9] S. Glassman, “A caching relay for the world wide
web”, proc First International World-Wide Web Con-
ference, pp. 69–76, May 1994; also appeared in
Computer Networks and ISDN Systems 27, no. 2,
1994.
[10] M. Busari and C. L. Williamson, "Simulation
evaluation of a heterogeneous web proxy caching
hierarchy", Proc. IEEE MASCOTS 2001, Cincinatti,
OH, pp. 379–388, August 2001.
[11] A. Mahanti, C. Williamson, and D. Eager, “Traf-
fic analysis of a web proxy caching hierarchy”, IEEE
Network, vol. 14, no. 3, pp. 16–23, May/June 2000.

More Related Content

Viewers also liked

laxman final new cv
laxman final new cvlaxman final new cv
laxman final new cvLaxman Das
 
Final exam review game (5) (2)
Final exam review game (5) (2)Final exam review game (5) (2)
Final exam review game (5) (2)Sharoyal Nicole
 
Show and tell : Hinari
Show and tell : HinariShow and tell : Hinari
Show and tell : HinariAPLICwebmaster
 
An Integrated DHS system
An Integrated DHS systemAn Integrated DHS system
An Integrated DHS systemAPLICwebmaster
 
Repzo presentation
Repzo presentationRepzo presentation
Repzo presentationHassan Atmeh
 
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systemsIjiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systemsIJIR JOURNALS IJIRUSA
 
APLIC 2014 - Beth Kantor on Content Curation
APLIC 2014 - Beth Kantor on Content CurationAPLIC 2014 - Beth Kantor on Content Curation
APLIC 2014 - Beth Kantor on Content CurationAPLICwebmaster
 

Viewers also liked (11)

Perilaku dalam teori sosial
Perilaku dalam teori sosialPerilaku dalam teori sosial
Perilaku dalam teori sosial
 
Hello sp
Hello spHello sp
Hello sp
 
laxman final new cv
laxman final new cvlaxman final new cv
laxman final new cv
 
Final exam review game (5) (2)
Final exam review game (5) (2)Final exam review game (5) (2)
Final exam review game (5) (2)
 
Show and tell : Hinari
Show and tell : HinariShow and tell : Hinari
Show and tell : Hinari
 
Dangers of facebook by sani
Dangers of facebook by saniDangers of facebook by sani
Dangers of facebook by sani
 
ad web
ad webad web
ad web
 
An Integrated DHS system
An Integrated DHS systemAn Integrated DHS system
An Integrated DHS system
 
Repzo presentation
Repzo presentationRepzo presentation
Repzo presentation
 
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systemsIjiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
 
APLIC 2014 - Beth Kantor on Content Curation
APLIC 2014 - Beth Kantor on Content CurationAPLIC 2014 - Beth Kantor on Content Curation
APLIC 2014 - Beth Kantor on Content Curation
 

More from IJIR JOURNALS IJIRUSA

Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Ijirsm ranpreet-kaur-the-study-of-dividend policy-a-review-of-irrelevance-theory
Ijirsm ranpreet-kaur-the-study-of-dividend policy-a-review-of-irrelevance-theoryIjirsm ranpreet-kaur-the-study-of-dividend policy-a-review-of-irrelevance-theory
Ijirsm ranpreet-kaur-the-study-of-dividend policy-a-review-of-irrelevance-theoryIJIR JOURNALS IJIRUSA
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...IJIR JOURNALS IJIRUSA
 
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-servicesIjirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-servicesIJIR JOURNALS IJIRUSA
 
Ijirsm amrutha-s-efficient-complaint-registration-to-government-bodies
Ijirsm amrutha-s-efficient-complaint-registration-to-government-bodiesIjirsm amrutha-s-efficient-complaint-registration-to-government-bodies
Ijirsm amrutha-s-efficient-complaint-registration-to-government-bodiesIJIR JOURNALS IJIRUSA
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIJIR JOURNALS IJIRUSA
 
Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...
Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...
Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...IJIR JOURNALS IJIRUSA
 

More from IJIR JOURNALS IJIRUSA (7)

Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Ijirsm ranpreet-kaur-the-study-of-dividend policy-a-review-of-irrelevance-theory
Ijirsm ranpreet-kaur-the-study-of-dividend policy-a-review-of-irrelevance-theoryIjirsm ranpreet-kaur-the-study-of-dividend policy-a-review-of-irrelevance-theory
Ijirsm ranpreet-kaur-the-study-of-dividend policy-a-review-of-irrelevance-theory
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
 
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-servicesIjirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
 
Ijirsm amrutha-s-efficient-complaint-registration-to-government-bodies
Ijirsm amrutha-s-efficient-complaint-registration-to-government-bodiesIjirsm amrutha-s-efficient-complaint-registration-to-government-bodies
Ijirsm amrutha-s-efficient-complaint-registration-to-government-bodies
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
 
Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...
Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...
Ijiret archana-kv-increasing-memory-performance-using-cache-optimizations-in-...
 

Recently uploaded

Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 

Recently uploaded (11)

Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 

Ijirsm manjunath-n-wali-proxy-server-and-the-changing-nature-of-the-web

  • 1. ISSN: XXXX-XXXX Volume X, Issue X, Month Year Proxy Server and the Changing Nature of the Web Manjunath N.Wali Dept of Computer Science and Engineering BTL Institute of Technology Bangalore, India manjunath.wali44@gmail.com Abstract: The use of proxy server could help pro- vide equal access and response time to large num- bers of World Wide Web (WWW) users requesting previously accessed page. The proxy server acts as an intermediate server that relays requests between a client and a server. The proxy server keeps track of all the client-server interactions, which allows you to monitor exactly what is going on, without having to access the main server, also use the proxy server to monitor all client-server interaction, regardless of the communication decrease associated with the use of proxy server. Due to lack of recently published scholarly article that test the performance of proxy server, we carry out an in-depth study of the behavior of a proxy server over a six month period. The study indicates the effectiveness of the proxy server and helps evaluate the tradeoff between money spent on higher bandwidth lower latency connections, versus the cost/performance of using a caching intermedi- ary. 1. INTRODUCTION Acts on behalf of other clients, and presents re- quests from other clients to a server. Acts as a server while talking with a client, and as a client while talk- ing with a server. It stops all requests to the real serv- er to see if it can fulfill the requests itself. If not, it forwards the request to the real server. The WWW has witnessed significant growth in the last few dec- ades; this is due partly to the large numbers of users and the type of traffic generated. A typical solution which is not scalable is to increase the bandwidth. Since increasing the bandwidth can be achieved with associated monthly cost, many organizations are us- ing proxy server to provide adequate access and re- sponse time to their ever growing number of users requesting internet connectivity. The performance increase due to proxy servers has been widely report- ed, however a study reported that proxy servers actu- ally decrease performance. Fig 1: Network Architecture using Proxy Server, Source [5] In order to further understand the nature of proxy server and how it can be used to provide enough ac- cess and response time to large numbers of users re-
  • 2. International Journal of Innovatory research in Science and Management - IJIRSM ISSN: XXXX-XXXX Volume X, Issue X, Month Year 18 questing same object from the Internet, we carried out an in-depth study of the behavior of a proxy serv- er over a six month period. In our earlier work, a non- busy network traffic monitoring system was devel- oped to monitor and analyze network traffic. A major contribution of this work is to show the effectiveness of the proxy server and help evaluate the tradeoff between money spent on higher bandwidth lower latency connections, versus the cost/performance of using a caching intermediary. Fig 2: Working of Proxy Server. Source [3] 2. RELATED WORK Caching can be applied at several locations namely; the web client, web server and within the network (proxy servers). Several studies have reported per- formance increase due to proxy servers. The result of a study in showed that the average response time of a hit may be five times smaller than a miss. A 20% to 25% improvement in user perceived response time was reported in . Research on the effectiveness of proxy caching is very active. A study at Virginia Tech has shown that hit rates of 30% to 50% can be achieved by a caching proxy. Other studies gave a range from between 20% to 60% hit rate reported hit rates of between 10% to 40% for a three level cach- ing hierarchy, and about 35% to 40% for a universi- ty-level web proxy cache. However, a study conducted in reported a hit rate of 4%, which shows a decrease in performance. The reason for this decrease in performance was traced to the changing nature of the web, i.e. the web is evolv- ing from static nature to dynamic repository. Fur- thermore, research into the ability of proxy servers to cache video was reported in . Research efforts in the last few years address performance of multi-level proxy cache configuration. Other factors that may improve proxy cache performance are the replace- ment policies used by the cache and the workload characteristics. Data for web usage mining can be collected at several levels. We may be faced with data from a single user or a multitude of them on one hand and a single site or a multitude of sites. Fig 3: Firewall Proxy Server. Source [8] Combining both factors offerings four possibilities, Data about behavior of a single user on a single site can be collected by means of Java scripts or Java
  • 3. International Journal of Innovatory research in Engineering and Technology - IJIRET ISSN: XXXX-XXXX Volume X, Issue X, Month Year 19 applets. Both methods require user participation in the sense that the user has to enable their functionali- ty. 3. ARCHITECTURE Architecture of a Web proxy server as the way a proxy server interacts with a file system. Cache archi- tecture names, stores, and recollects objects from a file system, and maintains application-level metadata about cached objects. To better understand the impact of cache architectures on file systems we first re- view the basic design goals of file systems and then de- scribe the Unix Fast File System (FFS), the standard file system available on most variants of the UNIX operating system. Fig 4: N/W Architecture using a Proxy Server. Source [7] 4. CONCLUSION This paper focuses on testing the performance of proxy servers experimentally and investigates the effect of the changing nature of the web on proxy server performance. We carry out an in-depth study of the behavior of a proxy server over a six month period. Access logs of varying durations were col- lected, from three different proxy servers. We analyzed the logs using Web browser. Two per- formance parameters, DHR and BHR were used to evaluate the performance of the proxy servers. We computed DHR and BHR for the entire period, and on a monthly and hourly basis to see if there will be drastic variations. Our result shows a hit rate of about 21% to 38% and a byte rate of 21% to 28%, further- more, a high variation was observed during the peak periods from the y-error bar graphs. The COV graph shows a low or constant variation during the peak periods indicating that neither hit ratios depend on traffic load. About 60 to 78% of requests to the proxy servers are for dynamic content; this indicates that the web is changing from the static nature to dynamic information repository. The results of our experiment show the effectiveness of the proxy server and helps evaluate the tradeoff between money spent on higher bandwidth lower latency connections, versus the cost/performance of using a caching intermediary. Future work will focus on other techniques that can be used to improve proxy performance, this include multicast delivery of pages and the use of cyclic mul- ticast engine. REFERENCES [1] R. Howard, and B. J. Jansen, "A Proxy server experiment: an indication of the changing nature of the web," Proc of the Seventh International Confer- ence on computer Communications and Networks (ICCCN '98), pp. 646–649, Washington, DC, October 1998. [2] O.O. Abiona, C.E. Onime, A.I. Oluwaranti, E.R. Adagunodo, L.O. Kehinde, and S.M. Radicella, "De- velopment of a Non Intrusive Network Traffic Moni- toring and Analysis system”. African Journal of Sci-
  • 4. International Journal of Innovatory research in Science and Management - IJIRSM ISSN: XXXX-XXXX Volume X, Issue X, Month Year 20 ence and Technology, Vol.7, no. 2, pp. 54–69, De- cember 2006. [3] A. Rousskov, and V. Soloviev, “On performance of caching proxies” Proceedings of the 1998 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems SIGMETRICS '98/PERFORMANCE '98, Vol. 26, no. 1, pp. 272–273, 1998. [4] R. Caceres, F. Douglis, A. Feldmann, G. Glass, and M. Rabinovich, “Web proxy caching: the devil is in the details”, ACM Performance Evaluation Re- view, vol. 26, no. 1, pp. 11–15, December 1998. [5] G. Abdulla, E. Fox, M. Abrams, and S. Williams, “WWW proxy traffic characterization with applica- tion to caching”, Technical Report TR-97- 03, Com- puter Science Department, Virginia Tech., March 1997. [6] L. DiDio, “Proxy servers gain user appeal,” Com- puterworld, v31 n16, pp.16 (1) April 21, 1997. [7] S. Machlis, “Planning blunts Web traffic spikes,” Computerworld, v31 n46, pp. 6(1), November 17, 1997. [8] S. Williams, M. Abrams, C. R. Standridge, G. Abdulla and E. A. Fox, “Removal policies in network caches for world wide web documents”, Proc, ACM SIGCOMM, August, 1997. [9] S. Glassman, “A caching relay for the world wide web”, proc First International World-Wide Web Con- ference, pp. 69–76, May 1994; also appeared in Computer Networks and ISDN Systems 27, no. 2, 1994. [10] M. Busari and C. L. Williamson, "Simulation evaluation of a heterogeneous web proxy caching hierarchy", Proc. IEEE MASCOTS 2001, Cincinatti, OH, pp. 379–388, August 2001. [11] A. Mahanti, C. Williamson, and D. Eager, “Traf- fic analysis of a web proxy caching hierarchy”, IEEE Network, vol. 14, no. 3, pp. 16–23, May/June 2000.