Dynofin
  • Home
  • Finance
    • All
    • Cryptocurrency
    • Forex
    • Markets
    The Future of Money

    The Future of Money

    Forex Explained

    Forex Explained

    Harnessing The Power of The Markets

    Harnessing The Power of The Markets

  • Business
    • All
    • Bizvocabulary
    • Company Forensics
    • Industry
    • Innovation
    Industries Make The World Go Round

    Industries Make The World Go Round

    The Untapped Gold Mine Of COMPANY FORENSICS

    The Untapped Gold Mine Of COMPANY FORENSICS

    The ABCs of Business Terminology

    The ABCs of Business Terminology

    Things Are Changing Nicely

    Things Are Changing Nicely

  • News
    Latest in Financial and Business Technology Trends

    Latest in Financial and Business Technology Trends

  • Money
    • All
    • How To
    • Investing
    • Personal Finance
    • Work Life
    Cracking the Code of Adulting in Personal Finance

    Cracking the Code of Adulting in Personal Finance

    Blurring the Line Between Work and Personal Life

    Blurring the Line Between Work and Personal Life

    Cutting through the Maze of Investing

    Cutting through the Maze of Investing

    Working With Financial Metrics

    Working With Financial Metrics

  • Psyche
    Economics Of The Mind

    Economics Of The Mind

  • Technologize
    • All
    • AI
    • Coding
    The Future is Now, and AI is Leading the Charge!

    The Future is Now, and AI is Leading the Charge!

    What happens when you type google.com

    What happens when you type google.com

  • About
  • Contact Us
  • Login
  • Register
No Result
View All Result
  • Home
  • Finance
    • All
    • Cryptocurrency
    • Forex
    • Markets
    The Future of Money

    The Future of Money

    Forex Explained

    Forex Explained

    Harnessing The Power of The Markets

    Harnessing The Power of The Markets

  • Business
    • All
    • Bizvocabulary
    • Company Forensics
    • Industry
    • Innovation
    Industries Make The World Go Round

    Industries Make The World Go Round

    The Untapped Gold Mine Of COMPANY FORENSICS

    The Untapped Gold Mine Of COMPANY FORENSICS

    The ABCs of Business Terminology

    The ABCs of Business Terminology

    Things Are Changing Nicely

    Things Are Changing Nicely

  • News
    Latest in Financial and Business Technology Trends

    Latest in Financial and Business Technology Trends

  • Money
    • All
    • How To
    • Investing
    • Personal Finance
    • Work Life
    Cracking the Code of Adulting in Personal Finance

    Cracking the Code of Adulting in Personal Finance

    Blurring the Line Between Work and Personal Life

    Blurring the Line Between Work and Personal Life

    Cutting through the Maze of Investing

    Cutting through the Maze of Investing

    Working With Financial Metrics

    Working With Financial Metrics

  • Psyche
    Economics Of The Mind

    Economics Of The Mind

  • Technologize
    • All
    • AI
    • Coding
    The Future is Now, and AI is Leading the Charge!

    The Future is Now, and AI is Leading the Charge!

    What happens when you type google.com

    What happens when you type google.com

  • Login
  • Register
No Result
View All Result
Dynofin
No Result
View All Result
Home Technologize Coding
What happens when you type google.com

What happens when you type google.com

Dynofin by Dynofin
22nd Jul, 2024
in Coding
0
A A
0
Share on TwitterLinkedinFBWhatsappPinterest

Written by Dean Otsyeno for Dynofin #ALXSE – Project 0x11

  • DNS request
  • TCP/IP
  • Firewall
  • HTTPS/SSL
  • Load-balancer
  • Web server
  • Application server
  • Database

The URL

From the moment you type a URL eg “google.com,” the security procedures begin. Google has taken measures to secure closely related domains like “googl.com” and “gogle.com” to prevent users from falling victim to typosquatting attacks. After you press the enter key, the browser adds the “https://” protocol to the URL for a secure link.

The browser initiates a DNS (Domain Name System) query to find the IP address of the web server host. In this process Frequently visited sites may be cached in the user’s browser, operating system, or router for quicker access. If not found in these caches, a recursive lookup is initiated, eventually reaching an authoritative Name Server. Google operates its own authoritative Name Server, ensuring a speedy and reliable resolution of the URL.

Once the ip that corresponds to the domain name is found, the browser can begin the communication to the web server responsible for handling the request. This connection is made possible by the worldwide interconnection of computers. In this process, the request is sent from the client’s browser, to the ISP and from the ISP to the internet exchange point where it joins the global traffic. However, this being a request to Google, things are slightly different due to their expansive network.

The Connection

Internet Service Provider (ISP)

The ISP is responsible for routing the request to the appropriate destination using proxy servers. It does this by forwarding the request to the regional IX (Internet Exchange) point where traffic is exchanged. An IX is a pivotal network infrastructure component where multiple internet service providers interconnect to exchange data. A Point of Presence (PoP), typically a strategically located data center, serves as an intermediary link between the ISP and the broader internet infrastructure, including the global network maintained by a company like Google. At the PoP, the user’s request is interconnected with a larger network of internet traffic. The PoP essentially functions as a junction where various ISPs and network providers meet to exchange data efficiently. This interconnection helps streamline the flow of data and reduces latency by making content available closer to end-users.
Static content that’s very popular with the local host’s user base, including YouTube and Google, can also be temporarily cached on edge nodes(Google Global Cache) within the ISP’s servers and thus can be rapidly accessed without leaving the ISP network.

Google’s Network

Google’s Edge Node servers, strategically distributed across the globe, serve as the initial point of contact for users. These servers are integral to Google’s Content Delivery Network (CDN) and play a crucial role in optimizing the user experience. At the edge, Google employs advanced security measures, including firewalls, to ensure data security and protect against various online threats such as DDoS attacks. These security mechanisms are a critical part of Google’s commitment to safeguarding its network and users’ data. Additionally, Google’s Edge Node servers utilize advanced load balancing techniques to efficiently distribute incoming user requests among a network of backend servers. This approach ensures that resources are allocated optimally and that user requests are processed with minimal latency, even during high-demand periods. As a result, users benefit from fast and reliable access to Google services, with a focus on reducing latency and maintaining uninterrupted service availability, all based on publicly available information and industry best practices.

The Load Balancer

Google handles an astonishing 8.5 billion daily searches on its website, demanding a high-performance, low-latency infrastructure. To meet this colossal demand, Google employs a custom-distributed packet-level load balancer known as Maglev.

Maglev differs from other traditional hardware load balancers in a few key ways:

  • It effectively spreads all packets directed to a specific backend server IP address across a pool of Maglev machines using Equal-Cost Multi-Path (ECMP) forwarding. This design allows Google to enhance Maglev’s capacity by simply adding more servers to the pool. Even more importantly, this uniform packet distribution improves redundancy modeling, with Maglev’s N + 1 approach, boosting system availability and reliability compared to conventional load balancing systems that typically rely on active/passive pairs for 1 + 1 redundancy.
  • Maglev is a uniquely Google-developed solution, offering full end-to-end control. This control empowers Google to experiment and iterate rapidly, ensuring the system adapts to their evolving requirements seamlessly.
  • In Google’s data centers, Maglev operates on commodity hardware, simplifying deployment and making it an economical choice for their massive infrastructure.

Traffic is directed to the Load Balancers using the Anycast network addressing and routing methodology. This technique allows data packets from a single sender to be routed to the nearest node within a group of potential receivers, all identified by the same destination IP address through the use of Virtual IPs. Every Google service depends on one or more Virtual IP addresses (VIPs), which differ from physical IPs as they aren’t tied to specific network interfaces but instead are served by multiple service endpoints within Google’s load-balancing system. Sometimes, Maglev may need to process a packet destined for an anycast VIP for a client located closer to another front-end site. In such cases, Maglev forwards the packet to another Maglev on a machine situated at the nearest front-end site for efficient delivery.

The Destination: HTTP Daemon

HTTPd, short for HTTP daemon or HTTP server, is a software application designed to manage incoming HTTP requests from clients, typically web browsers. It serves web pages, files, and various resources in response to these requests. In simpler terms, it’s the software responsible for hosting and delivering websites and web applications on the internet.

In the realm of HTTP servers, there are several options to choose from. Some of the most popular ones include Apache HTTP Server (Apache), Nginx, Microsoft Internet Information Services (IIS), and Google’s customized web server, known as Google Web Service (GWS). Google has developed GWS to meet its unique scale and performance requirements, allowing them to fine-tune the server for efficiency, scalability, and seamless integration with their services. This customization also enables Google to implement features tailored to their specific applications, offering capabilities that may not be available in off-the-shelf web servers. Additionally, developing in-house solutions grants Google greater control over security and the ability to implement proprietary optimizations for enhanced service performance.

The Response

Once the response is prepared, it’s encapsulated into an IP packet, with the source address set as the VIP and the destination address as the user’s IP. A technique called Direct Server Return (DSR) streamlines the return traffic from load-balanced servers, allowing it to bypass the load balancer and go directly to the router. This optimizes the handling of returning packets and avoids unnecessary traffic through the load balancer.

Subsequently, the user’s web browser takes over, rendering the web page using the information from the response, thereby completing the communication cycle. Additionally, cookies and tokens are often included in the response header to facilitate session tracking and management.

Tweet1ShareShare1SendPin

These Might Also Pick Your Interest

The Future is Now, and AI is Leading the Charge!
AI

The Future is Now, and AI is Leading the Charge!

6th Feb, 2025
Economics Of The Mind
Psyche

Economics Of The Mind

11th Aug, 2024
Cracking the Code of Adulting in Personal Finance
Personal Finance

Cracking the Code of Adulting in Personal Finance

11th Aug, 2024
The Future of Money
Cryptocurrency

The Future of Money

11th Aug, 2024
Next Post
Industries Make The World Go Round

Industries Make The World Go Round

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Log In To Enjoy More

The Like and Bookmark feature on posts works only for logged-in users

  • Trending
  • Comments
  • Latest
Harnessing The Power of The Markets

Harnessing The Power of The Markets

9th Sep, 2022
The ABCs of Business Terminology

The ABCs of Business Terminology

11th Sep, 2022
Latest in Financial and Business Technology Trends

Latest in Financial and Business Technology Trends

10th Sep, 2022
The Untapped Gold Mine Of COMPANY FORENSICS

The Untapped Gold Mine Of COMPANY FORENSICS

12th Sep, 2022
Harnessing The Power of The Markets

Harnessing The Power of The Markets

0
Latest in Financial and Business Technology Trends

Latest in Financial and Business Technology Trends

0
Things Are Changing Nicely

Things Are Changing Nicely

0
The ABCs of Business Terminology

The ABCs of Business Terminology

0
The Future is Now, and AI is Leading the Charge!

The Future is Now, and AI is Leading the Charge!

6th Feb, 2025
Economics Of The Mind

Economics Of The Mind

11th Aug, 2024
Cracking the Code of Adulting in Personal Finance

Cracking the Code of Adulting in Personal Finance

11th Aug, 2024
The Future of Money

The Future of Money

11th Aug, 2024
Dynofin

We aim to be the AI at the centre of your Heart, Pumping Information and Knowledge throughout your Financial Circulatory System, giving you a revolutionary outlook on How Money Works in the Finance, Business and Fintech Industry.

Dynofin

  • About
  • Privacy Policy
  • DISCLAIMER
  • Terms and Conditions

© 2022 Dynofin. All rights Reserved. The Fintech Dynamite of Explosive Information on How Money Works.

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
  • Login
  • Sign Up
  • Home
  • Finance
    • Markets
    • Cryptocurrency
    • Forex
  • Business
    • Company Forensics
    • Innovation
    • Industry
    • Bizvocabulary
  • News
  • Money
    • How To
    • Personal Finance
    • Investing
    • Work Life
  • Psyche
  • About
  • Contact Us

© 2022 Dynofin. All rights Reserved. The Fintech Dynamite of Explosive Information on How Money Works.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.