Investigación

Method of auto-configuration for corporate proxies

Vol. 13 No. 21 (2017)
Published: 01-01-2017
Andrés Abelardo Villarroel Acosta
Universidad Distrital Francisco José de Caldas
Carlos Enrique Montenegro Marín
Universidad Distrital Francisco José de Caldas
Paulo Alonso Gaona García
Universidad Distrital Francisco José de Caldas
Yuri Vanessa Nieto Acevedo
Universidad Distrital Francisco José de Caldas

Introduction: The proxy servers offer many advantages in business and academia. One of their main uses is to protect both the network and its users, offering a secure and fast connection to multiple users who require a service such as Internet. However, manual proxy settings require time and expertise by the end user, which leads to the network being less user friendly. The article was written in 2016 in the faculty of Engineering of the Universidad Distrital Francisco José de Caldas, Bogotá, Colombia.

Methology: The paper has been elaborated at Colombia using a Cascade Model. Results: The article presents an introduction to proxy auto configuration and proxy servers, as well as a detailed explanation of the configuration methods.

Conclusions: The study demonstrates methods and times that can lead to the reduction in standard connection time through manual configuration vs. automatic proxy configuration. This was implemented as a real case study in a company.

Keywords: dynamic host configuration protocol ( dhcp), proxy auto-configuration ( pac ), standard time, web proxy auto-discovery protocol ( wpad )

How to Cite

[1]
A. A. Villarroel Acosta, C. E. Montenegro Marín, P. A. Gaona García, and Y. V. Nieto Acevedo, “Method of auto-configuration for corporate proxies”, ing. Solidar, vol. 13, no. 21, pp. 9–18, Jan. 2017, doi: 10.16925/in.v13i21.1723.

C. Jackson, “Method and apparatus for creating proxy auto-configuration file.” Google Patents, January 8

th, 2004.

M.Sysel, & O. Dolež, “An Educational HTTP Proxy Server”, Procedia Engineering, vol. 69, pp. 128-132,

doi:10.1016/j.proeng.2014.02.212

L. L. C. Books & G. B. LLC, Proxy Servers: Proxy Server, Wingate, Tor, Proxomitron, Proxy Auto-Config, Java Anon Proxy, Sun Java System Web Proxy Server, Web Cache. Memphis, Tennessee: General Books LLC, 2010.

S. Shiwani, S. Kumar, V. Chandra & S. Bansal, “Performance Measurements: Proxy Server For Various

Operating Systems”, en 2014 International Conference on Contemporary Computing and Informatics

(IC3I), Mysore, India, Nov. 27-29, 2014, pp. 98-102.

Internet Protocol, Defense Advanced Research Projects Agency, Darpa Standard 791, 1981. Available:

https://tools.ietf.org/html/rfc791

Transmission Control Protocol, Defense Advanced Research Projects Agency, Darpa Standard 793,

Available: https://www.ietf.org/rfc/rfc793.txt

P. Hayes. (2007). Guiding principle behind Find ProxyForURL, Find and proxy for URL iniciative

[Online]. Available: http://findproxyforurl.com/

A. Tucker, Computer science hand book, 2nd ed. Boca Ratón, Florida: crc Press, 2004, p. 2752.

Colciencias. (2004, March, 19). Resolución 00285. Por la cual se establecen los criterios para la asignación de puntajes por productividad académica en producción de software, para los docentes de entidades públicas o estatales. Available: https://www.uniatlantico.edu.co/uatlantico/sites/default/files/

docencia/pdf/Resolucion%20285%20Reglamenta

I. Sommerville, Software Engineering. 9th ed. United States: Pearson Education, 2011, p. 773.cion%20Software.pdf

M. P. Groover, Work Systems and the Methods, Measurement, and Management of Work. United States:

Pearson Prentice Hall, 2007, p. 792.

A. Freivalds & B. Niebel. (2013). Niebel’s Methods, Standards, & Work Design. 13th ed.United States: Mc Graw Hill, p. 752

MÉTRICAS
ARTICLE VIEWS: 903
PDF VIEWS: 535