Tunnel Http - What It Is And How It Works
HTTP tunneling is used mostly as a means of communicating between networks that have limited or restricted connectivity
. These most often include networks that exist behind NATs, firewalls or proxy servers. Tunnel HTTP combines with existing computer applications and software allowing them to be used even if networks are restricted from connecting to each other under normal circumstances. Restricted connectivity is the result of blocked IP ports, traffic initiated outside the network that has been blocked or the intentional blocking of nearly all network protocols as a lockdown method to secure a network from both internal and external risks placed against it.
A user that wants a particular application to communicate with a remote host begins a connection with a mediator server. The mediator is the middleman between the application and the remote host. The application conducts communication with the mediator through tunnel HTTP with the use of HTTP requests which encapsulate all the communications. In order for this whole process to function as it should, the mediator server cannot be located in a restricted connectivity location. That would defeat the whole purpose and not allow your efforts to conduct a tunnel HTTP to be possible. In this particular case, the application is playing the role of tunneling client while the remote host is the server eventually being communicated with through the mediator server.
Conducting tunnel HTTP when the network is behind a proxy server is completed with the "CONNECT" HTTP method. In this situation, you can have the proxy server forward the TCP connection to the destination of your choice. From here, the server continues on to solidify the connection on your behalf. Once the connection is complete, the proxy server continues to stream the TCP to you. Here, you should note that only the very first request to create the initial connection is HTTP. Following that, the server will be able to proxy the secured TCP connection.
There are many open-source tunnel HTTP client applications that serve to support communication to and from locations that have restricted connectivity. These sources are usually made available as a pair of corresponding applications. One fulfills the position of mediator server while the other performs the part of tunneling client. For these dual applications to function correctly, you must have access to your own server that you can run the mediator server on. This is most popularly used to bypass internet filters placed on school and work computers.
by: Troy Truman
Choosing A Chicken Coop Kit That Will Increase Your Egg Yield How Do You Know, What They Do Not Know? Plasma Vs Lcd Vs Led Tvs: What Are The Differences? Is Bacterial Vaginosis Contagious? - The Truth About Bacterial Vaginosis That "they" Won't Tell You What Is The Most Popular Stun Gun? The Ingredients Of A Pool Table What Does A Crappie Look Like? Make Them A Joint Venture Offer That They Can't Refuse Stone Temple Pilots Tickets - Almost Ready To Be Back Whats The Difference Between A Referral And A Reference? What Are Carbohydrates? What To Know About Single Ply Roofing Systems What To Know About Roofing Inspections
www.yloan.com
guest:
register
|
login
|
search
IP(3.142.219.252) /
Processed in 0.007876 second(s), 7 queries
,
Gzip enabled
, discuz 5.5 through PHP 8.3.9 ,
debug code: 8 , 2629, 12,