473,320 Members | 2,004 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,320 software developers and data experts.

real & transparent proxy

Hi all,
Can any one explain the relationship between real & transparent proxy?
I couldn't fully understand it from the explanation at MSDN.
Thanks,
Sharon.

Mar 16 '06 #1
4 5042
Hello Sharon,

Do u mean Reverse/Transparent proxy? coz I haven't heard abt "real" one

proxy is a node used several cliens go to the server or smth else like network
to hide info about clients (transparent proxy).

Reverse one is vice versa proxy. It's used on the sever, thus calls from
ouside know nothing about your servers. It's like NLB (node load balacing)
component, that redirect calls from outside to your internal servers (http://en.wikipedia.org/wiki/Reverse_proxy)

S> Hi all,
S> Can any one explain the relationship between real & transparent
S> proxy?
S> I couldn't fully understand it from the explanation at MSDN.
S> Thanks,
S> Sharon.
---
WBR,
Michael Nemtsev :: blog: http://spaces.msn.com/laflour

"At times one remains faithful to a cause only because its opponents do not
cease to be insipid." (c) Friedrich Nietzsche
Mar 16 '06 #2
Sorry Michael,
I should have mentioned that i'm asking about
the Proxy class, used in remoting.
Sharon.

"Michael Nemtsev" <ne*****@msn.com> wrote in message
news:9c**************************@msnews.microsoft .com...
Hello Sharon,

Do u mean Reverse/Transparent proxy? coz I haven't heard abt "real" one

proxy is a node used several cliens go to the server or smth else like
network to hide info about clients (transparent proxy).

Reverse one is vice versa proxy. It's used on the sever, thus calls from
ouside know nothing about your servers. It's like NLB (node load
balacing) component, that redirect calls from outside to your internal
servers (http://en.wikipedia.org/wiki/Reverse_proxy)

S> Hi all,
S> Can any one explain the relationship between real & transparent
S> proxy?
S> I couldn't fully understand it from the explanation at MSDN.
S> Thanks,
S> Sharon.
---
WBR,
Michael Nemtsev :: blog: http://spaces.msn.com/laflour

"At times one remains faithful to a cause only because its opponents do
not cease to be insipid." (c) Friedrich Nietzsche

Mar 16 '06 #3
Hello Sharon,

:)))

Ok, let start about remoting :) I recomend u to view this presentation from
wintillect where they explained these proxies
http://www.wiseowl.com/downloads/Remoting.ppt

S> Sorry Michael,
S> I should have mentioned that i'm asking about
S> the Proxy class, used in remoting.
S> Sharon.
S> "Michael Nemtsev" <ne*****@msn.com> wrote in message
S> news:9c**************************@msnews.microsoft .com...
S>
Hello Sharon,

Do u mean Reverse/Transparent proxy? coz I haven't heard abt "real"
one

proxy is a node used several cliens go to the server or smth else
like network to hide info about clients (transparent proxy).

Reverse one is vice versa proxy. It's used on the sever, thus calls
from ouside know nothing about your servers. It's like NLB (node
load balacing) component, that redirect calls from outside to your
internal servers (http://en.wikipedia.org/wiki/Reverse_proxy)

S> Hi all,
S> Can any one explain the relationship between real & transparent
S> proxy?
S> I couldn't fully understand it from the explanation at MSDN.
S> Thanks,
S> Sharon.
---
WBR,
Michael Nemtsev :: blog: http://spaces.msn.com/laflour
"At times one remains faithful to a cause only because its opponents
do not cease to be insipid." (c) Friedrich Nietzsche

---
WBR,
Michael Nemtsev :: blog: http://spaces.msn.com/laflour

"At times one remains faithful to a cause only because its opponents do not
cease to be insipid." (c) Friedrich Nietzsche
Mar 16 '06 #4
Thanks Michael.
This presentation really explains it well.
I was thinking, how can the transparent proxy present it self,
as the remote object?
And maybe, what pattern is used here?
Sharon.

"Michael Nemtsev" <ne*****@msn.com> wrote in message
news:9c**************************@msnews.microsoft .com...
Hello Sharon,

:)))

Ok, let start about remoting :) I recomend u to view this presentation
from wintillect where they explained these proxies
http://www.wiseowl.com/downloads/Remoting.ppt

S> Sorry Michael,
S> I should have mentioned that i'm asking about
S> the Proxy class, used in remoting.
S> Sharon.
S> "Michael Nemtsev" <ne*****@msn.com> wrote in message
S> news:9c**************************@msnews.microsoft .com...
S>
Hello Sharon,

Do u mean Reverse/Transparent proxy? coz I haven't heard abt "real"
one

proxy is a node used several cliens go to the server or smth else
like network to hide info about clients (transparent proxy).

Reverse one is vice versa proxy. It's used on the sever, thus calls
from ouside know nothing about your servers. It's like NLB (node
load balacing) component, that redirect calls from outside to your
internal servers (http://en.wikipedia.org/wiki/Reverse_proxy)

S> Hi all,
S> Can any one explain the relationship between real & transparent
S> proxy?
S> I couldn't fully understand it from the explanation at MSDN.
S> Thanks,
S> Sharon.
---
WBR,
Michael Nemtsev :: blog: http://spaces.msn.com/laflour
"At times one remains faithful to a cause only because its opponents
do not cease to be insipid." (c) Friedrich Nietzsche

---
WBR,
Michael Nemtsev :: blog: http://spaces.msn.com/laflour

"At times one remains faithful to a cause only because its opponents do
not cease to be insipid." (c) Friedrich Nietzsche

Mar 17 '06 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Chris Lyon | last post by:
I am running a medusa bases server, which spawns a copy process which reports back it's status using urllib as below try: f = urllib.urlopen("http://localhost:8088/root/copyresult" , params)...
0
by: Daylor | last post by:
hi. appdomain1 created CBmwCar Object. appdomain1 hold the CBmwCar object in ICar var. appdomain1 send this object to appdomain2. how appdomain2 can cast the ICar transparent proxy to...
0
by: Daylor | last post by:
hi. appdomain1 created CBmwCar Object. appdomain1 hold the CBmwCar object in ICar var. appdomain1 send this object to appdomain2. how appdomain2 can cast the ICar transparent proxy to...
3
by: Andreas Kammann | last post by:
hi there, iam still looking for a transparent picture box , that works also with 2 pictureboxes over each other or working over an panel. i don't find solution. or is there out another custom...
2
by: sck10 | last post by:
Hello, How do you set the website proxy using the XmlDataSource control? Thanks, sck10
1
by: Nitin AM | last post by:
hi All, I need to Installing & Configer proxy Server step by step.
1
by: DILA | last post by:
Hi, I have included an embedded Real Player and an embedded Quick Time Player for streaming videos, in my web pages. I'm interested in searching for a method or a script to disable the...
3
by: homec | last post by:
Hi, I have included an embedded Real Player and an embedded Quick Time Player for streaming videos, in my web pages. I'm interested in searching for a method or a script to disable the ...
2
devonknows
by: devonknows | last post by:
Ok ive been wracking my brains over this for absolutely ages and cant find a simple answer anywere not even on the php.net site so i was wondering if you could help me. I have designed a gif file...
0
by: DolphinDB | last post by:
Tired of spending countless mintues downsampling your data? Look no further! In this article, you’ll learn how to efficiently downsample 6.48 billion high-frequency records to 61 million...
0
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: Vimpel783 | last post by:
Hello! Guys, I found this code on the Internet, but I need to modify it a little. It works well, the problem is this: Data is sent from only one cell, in this case B5, but it is necessary that data...
0
by: jfyes | last post by:
As a hardware engineer, after seeing that CEIWEI recently released a new tool for Modbus RTU Over TCP/UDP filtering and monitoring, I actively went to its official website to take a look. It turned...
0
by: ArrayDB | last post by:
The error message I've encountered is; ERROR:root:Error generating model response: exception: access violation writing 0x0000000000005140, which seems to be indicative of an access violation...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
1
by: Shællîpôpï 09 | last post by:
If u are using a keypad phone, how do u turn on JavaScript, to access features like WhatsApp, Facebook, Instagram....
0
by: af34tf | last post by:
Hi Guys, I have a domain whose name is BytesLimited.com, and I want to sell it. Does anyone know about platforms that allow me to list my domain in auction for free. Thank you
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.