Logo

dev-resources.site

for different kinds of informations.

what happens when you type https://www.google.com in your browser

Published at
5/12/2024
Categories
dns
firewall
loadbalancer
https
Author
audrybarimbane
Categories
4 categories in total
dns
open
firewall
open
loadbalancer
open
https
open
Author
14 person written this
audrybarimbane
open
what happens when you type https://www.google.com in your browser

DNS Request:

A browser sends a DNS request to a DNS server to resolve the domain name "www.google.com" into an IP address.
TCP/IP Communication:

Once the DNS server responds with the IP address, the browser establishes a TCP connection with the server at that IP address.
Firewall:

The firewall checks the incoming connection request to ensure it's safe and allowed based on configured rules.
HTTPS/SSL:

HTTPS(Hypertext Transfer Protocol Secure) is used, an SSL(Secure Sockets Layer) handshake occurs between the browser and the server to establish a secure, encrypted connection.
Load Balancer:

In a large-scale setup like Google's, incoming requests often go through a load balancer. This device distributes incoming network traffic across multiple servers to ensure efficient use of resources and improved performance.
Web Server:

The load balancer directs your request to one of Google's web servers. The web server processes the HTTP request, retrieves the requested webpage (in this case, the Google homepage), and generates an HTTP response.
Application Server:

For dynamic content or specific functionalities (like search queries on Google), the web server may interact with an application server. The application server runs the necessary scripts or processes to generate dynamic content.
Database:

If the request requires data from a database (e.g., search results from Google's index), the application server communicates with the database server to fetch the required information.
Overall, this sequence of events involves multiple layers of technology working together to deliver the requested webpage securely and efficiently.

firewall Article's
30 articles in total
Favicon
Configuring network access with Cisco ASA via minicom utility
Favicon
Configuring Cisco firewall in Linux machine with Minicom
Favicon
How to Bypass Sophos Firewall?
Favicon
How Next-Generation Firewalls Are Revolutionizing Cybersecurity🔥🛡️
Favicon
Firewall Testing 101: How to Secure Your Network and Block Cyber Threats
Favicon
Managing traffic using iptables firewall
Favicon
Homemade application firewall for Linux
Favicon
How to Become a Firewall Administrator: A Comprehensive Guide
Favicon
Debian 12 … is amazing! How to: Create your custom codehouse #4 [Security mechanisms against Network-Based attacks]
Favicon
PHP + ip2location = PHPFirewall
Favicon
How to recover and update Proxmox 8 firewall configuration in SQLite when you locked yourself out
Favicon
Setup firewall on Alpine with nftables
Favicon
Open Text Shield (OTS)
Favicon
Linux Firewall: Blocking a lot with a little
Favicon
Fortify Your Network with Optimal IPTables Rules for Cybersecurity
Favicon
Firewalls in Zero-Trust Security: Fortifying Modern Cyber Defenses
Favicon
Proxmox Network Storage: Firewall Rules
Favicon
Why SafeLine is better than traditional WAF?
Favicon
Why Choose SafeLine? Discover the Secrets of a Top Web Application Firewall
Favicon
A User-Friendly Web Security WAF Product - Safeline
Favicon
Firewalls 101: Understanding Types, Functions, and Configurations
Favicon
what happens when you type https://www.google.com in your browser
Favicon
pfSense basic firewall setup
Favicon
UFW - Quickstart
Favicon
Understanding Linux Firewalld
Favicon
Understanding Firewalls: A Comprehensive Guide
Favicon
Create new firewall rules for Azure SQL databases
Favicon
How to use efficiently IPSET with CSF Firewall
Favicon
Azure Firewall
Favicon
Understanding Firewalls: Your First Line of Cyber Defense

Featured ones: