Understanding Proxy Servers and Email Services

What is a Proxy Cache Server?

A proxy cache server centralizes and controls internet traffic between a local network and the internet. It acts as an intermediary, masking the IP addresses of devices on the local network. The proxy server has two network interfaces:

  • One connected to the LAN
  • Another connected to the internet

Functions of Proxy Cache Servers:

  • Allow web access to devices not directly connected to the internet
  • Control web access
  • Control traffic between the LAN and internet
  • Enhance network security
  • Control visited web content
  • Work as a web cache

Advantages of a Proxy Server:

  • Greater browsing speed
  • More efficient use of the internet connection
  • Can act as a firewall
  • Allows for filtering of permissions

How a Proxy Server Works:

  1. A client requests a web page from the proxy server.
  2. The proxy server checks its cache for the requested page.
  3. If the page is not cached, the proxy server requests it from the web server, stores it in its cache, and then sends it to the client.
  4. If the page is cached, the proxy server checks its validity with the web server. If valid, it sends the cached page to the client. If not, it requests the updated page, caches it, and sends it to the client.

Hardware Requirements for a Proxy Server:

A proxy server typically requires a large hard drive for storage and ample RAM to minimize disk accesses. A general guideline is 1 MB of RAM for every 100 MB of disk space.

Transparent Proxy

A transparent proxy operates without the user’s knowledge, using Network Address Translation (NAT) protocol.

Advantages of a Transparent Proxy:

  • Forces users to use the proxy without configuration
  • Eliminates the need for individual web browser configuration

Web Browser Configuration for Proxy Servers

Internet Explorer:

  1. Go to “Tools”
  2. Select “Internet Options”
  3. Click on the “Connections” tab
  4. Choose “LAN Settings”
  5. Enter the proxy server’s IP address and port number

Mozilla Firefox:

  1. Go to “Tools”
  2. Select “Options”
  3. Click on the “Advanced” tab
  4. Choose “Network”
  5. Select “Connection”
  6. Choose “Setup”
  7. Enter the proxy server’s IP address and port number

Autoconfiguration Files

System administrators use autoconfiguration files, often called proxy.pac files, to define proxy settings. This allows for centralized management of proxy configurations without requiring user intervention.

Monitoring Proxy Server Activity

Tools like SQUID generate activity reports from log files such as access.log and cache.log. These logs provide insights into service status, requests served, and cache performance.

Email Service

What is Email Service?

Email service enables the creation and transmission of messages between users on a network without requiring them to be online simultaneously.

Potential Drawbacks of Email:

  • No guarantee of message delivery
  • No guarantee of sender authenticity
  • No inherent mechanism to alert about transmission or reception failures

Email supports various attachments, including text, video, audio, and images. Users require an email account on a mail server to exchange messages.

Characteristics of Email:

  • Interpersonal messaging system
  • Interactive
  • Non-intrusive
  • Follows client/server architecture

MIME Types

MIME (Multipurpose Internet Mail Extensions) types are specifications that allow the exchange of various file types over the internet, transparent to the user. Examples include:

  • gif
  • jpeg
  • postscript

Elements of Email Service

An email service typically consists of:

  • MTA (Mail Transfer Agent): Responsible for transferring email messages between servers, routing, managing outgoing mail, and receiving incoming mail.
  • MDA (Mail Delivery Agent): Copies messages from the mail server to user mailboxes. Examples include POP and IMAP protocols.
  • MUA (Mail User Agent): The client application used to access and manage email, such as Outlook.

Structure of Emails

Emails consist of:

  • Header: Contains essential information for message transfer, including fields like sender (FROM), recipient (TO), carbon copy (CC), blind carbon copy (BCC), reply-to (REPLY-TO), date (DATE), and subject (SUBJECT).
  • Body: Contains the actual message content in ASCII characters.

Email Protocols

1. SMTP (Simple Mail Transfer Protocol)

SMTP is the standard protocol for sending outgoing mail. It manages the transfer of messages from the sender’s machine to the recipient’s mail server.

2. IMAP (Internet Message Access Protocol)

IMAP allows email clients to access messages stored on remote servers. Benefits include:

  • Access email from any internet-connected device
  • Remote mailbox management (delete, rename, create folders)
  • User mobility
  • Emails remain on the server until manually deleted

3. POP (Post Office Protocol)

POP allows email clients to download messages from the server to the local machine. POP3 is the current version and requires authentication.

Webmail

Webmail allows users to access and manage their email accounts through a web browser. Advantages include:

  • Accessibility from any internet-connected device
  • User-friendly interface
  • Attachment support
  • Folder organization
  • Customizable viewing preferences
  • Address book functionality
  • Automatic forwarding
  • Downloading emails from other accounts

Limitations may include limited mailbox storage and attachment size restrictions.

User Quotas


The quota is the maximum allowable size for the mailbox of each user. When the amount reaches a percentage the user receives a warning, if the user exceeds the quota, can not receive mail.
DLs Service
It is based on the use of email as a medium for exchange of information between users on a particular topic

FTP Service
What is the FTP service?
It is standard procedure for transfer of files from one system or another.
It is a service based on client / s

There is an FTP server on the network that is providing the service using two ports 20 for transferring the data on 21 to control the client requests the transfer of files using an FTP client. The server provides the requested information if the client has the appropriate permissions. Features of FTP servers
The connection of a remote user to the FTP server can be done as a user of the system as a generic user called anonymous access to the file system of an FTP server is limited depending on the user connecting Once the connection has been established to the FTP server the user has available a set of commands or functions to perform among which are: Upload and download files /> there are 2 types of users FTP users anonymous users are not server account have access to a limited part of the system The FTP service supports two modes of connection
Active mode is the default mode of the FTP connection, in this mode makes the first connection with the clint his transfer request and the second server starts
Passive mode

In this way the two connections are initiated by the client with this we avoid the control connection ea treated as foreign and the router or firewall that prevents access us

  • Binary

ASCII FTP client characteristics
An FTP client is an application that allows users from their local machine to connect to a remote FTP server to request or transfer files.
5 Using the browser as an FTP client
When the FTP server allows access to it via web browser can be used as an FTP client.