Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
9527880 Troytech 70088 MCSE Study Guide Proxy2

9527880 Troytech 70088 MCSE Study Guide Proxy2

Ratings: (0)|Views: 26 |Likes:
Published by sumanthdarshan

More info:

Published by: sumanthdarshan on Sep 19, 2009
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





Troy Technologies USA
Proxy Server 2.0 Exam 70-88
You have purchased one of the Troy Technologies USA MCSE StudyGuides.This study guide consists of a selection of questions and answers very, verysimilar to the ones you will find on the official MCSE exam. All you need todo is study and memorize the following questions and answers.....and youwill be ready to take the exam. Remember, we guarantee it!Average study time is 10 to 12 hours. Then you are ready.GOOD LUCK!GuaranteeShould you use this study guide and still fail the appropriate MCSE exam,then send your original of the official score notice, along with your mailingaddress to:Troy Technologies USA11134 Hunter OaksSan Antonio, TX 78233We will gladly refund the full cost of this study guide. However, you are notgoing to need this guarantee if you follow the above instructions.
Copyright 1998 Troy Technologies USA. All Rights Reserved.
Proxy Server Concepts
The primary functions of Microsoft Proxy Server is to act as a gateway to and from the Internet. Clientsconnect to Proxy Server when they make a request for resources located on the Internet. Proxy Server getsthe resource and returns it to the client. The Server can also allow selected computers or protocols toaccess the internal network. Since you are only presenting one IP address to the Internet, Proxy Servereffectively hides your internal network.A Proxy Server has one network card for the private internal network and it has another network adapterwith which to connect to the Internet. This adapter may be another network card or it may be an ISDNadapter. The Proxy Server is the only computer in the network attached to both internal and externalnetworks.Microsoft Proxy Server consists of 3 different services: Web Proxy, WinSock Proxy, and SOCKS Proxy.
Web Proxy Service
The Web Proxy service runs as a service on a Windows NT Server. It runs as an extension to IIS 3.0 orhigher. You must have IIS installed on your NT server in order for the Web Proxy service to run. Clientscontact the Web Proxy service and it contacts other Web servers on behalf of the client and then relays theinformation back.The Web Proxy service supports Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP) forcomputers on the local LAN.
The Web Proxy service maintains a local copy of HTTP and FTP objects on a local hard disk. This iscalled caching. Not all objects are cached. Some objects change frequently, even each time they areaccessed, so caching them is a waste of processing time. Some objects have a security context and are notcached for security reasons. The Proxy Server performs two types of caching: Passive caching and Activecaching.
Passive Caching
Passive caching is the method used most. It is also know as on-demand caching because it is available ondemand when the client makes the request.In a network that does not have a Proxy Server, the client contacts the Web server on the Internet. TheWeb server responds to the request and sends the requested objects directly back to the client. ProxyServer sits in the middle of this process. The Proxy client contacts Proxy Server with the request. ProxyServer goes to the Internet with the request and retrieves the requested object. It caches that object. If you,or any other client, requests the object again, Proxy Server gets the object from the local cache rather thanfrom the Web server on the Internet.In order to ensure that the cached information is still current, several techniques are used. One techniqueis to set an expiration time on the object. This expiration time is known as the time to live (TTL). When aclient requests an object that is cached, Proxy Server checks the TTL to determine if the requested objectis still valid. If the TTL has not expired, then the object is returned to the client. If the TTL has expired,then Proxy Server goes out to the Internet and retrieves the object and the TTL process begins again.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->