As a software developer, you certainly have a high-level picture of how web apps work and what kinds of technologies are involved: the browser, HTTP, HTML, web server, request handlers, and so on.

In this article, we will take a deeper look at the sequence of events that take place when you visit a URL.

1. You enter a URL into the browser

It all starts here:


2. The browser looks up the IP address for the domain name


The first step in the navigation is to figure out the IP address for the visited domain. The DNS lookup proceeds as follows:

  • Browser cache – The browser caches DNS records for some time. Interestingly, the OS does not tell the browser the time-to-live for each DNS record, and so the browser caches them for a fixed duration (varies between browsers, 2 – 30 minutes).
  • OS cache – If the browser cache does not contain the desired record, the browser makes a system call (gethostbyname in Windows). The OS has its own cache.
  • Router cache – The request continues on to your router, which typically has its own DNS cache.
  • ISP DNS cache – The next place checked is the cache ISP’s DNS server. With a cache, naturally.
  • Recursive search – Your ISP’s DNS server begins a recursive search, from the root nameserver, through the .com top-level nameserver, to Facebook’s nameserver. Normally, the DNS server will have names of the .com nameservers in cache, and so a hit to the root nameserver will not be necessary.

Here is a diagram of what a recursive DNS search looks like:


One worrying thing about DNS is that the entire domain like or seems to map to a single IP address. Fortunately, there are ways of mitigating the bottleneck:

  • Round-robin DNS is a solution where the DNS lookup returns multiple IP addresses, rather than just one. For example, actually maps to four IP addresses.
  • Load-balancer is the piece of hardware that listens on a particular IP address and forwards the requests to other servers. Major sites will typically use expensive high-performance load balancers.
  • Geographic DNS improves scalability by mapping a domain name to different IP addresses, depending on the client’s geographic location. This is great for hosting static content so that different servers don’t have to update shared state.
  • Anycast is a routing technique where a single IP address maps to multiple physical servers. Unfortunately, anycast does not fit well with TCP and is rarely used in that scenario.

Most of the DNS servers themselves use anycast to achieve high availability and low latency of the DNS lookups.

3. The browser sends a HTTP request to the web server


You can be pretty sure that Facebook’s homepage will not be served from the browser cache because dynamic pages expire either very quickly or immediately (expiry date set to past).

So, the browser will send this request to the Facebook server:

Accept: application/x-ms-application, image/jpeg, application/xaml+xml, [...]
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; [...]
Accept-Encoding: gzip, deflate
Connection: Keep-Alive
Cookie: datr=1265876274-[...]; locale=en_US; lsd=WW[...]; c_user=2101[...]

The GET request names the URL to fetch: “”. The browser identifies itself (User-Agent header), and states what types of responses it will accept (Accept and Accept-Encoding headers). The Connection header asks the server to keep the TCP connection open for further requests.

The request also contains the cookies that the browser has for this domain. As you probably already know, cookies are key-value pairs that track the state of a web site in between different page requests. And so the cookies store the name of the logged-in user, a secret number that was assigned to the user by the server, some of user’s settings, etc. The cookies will be stored in a text file on the client, and sent to the server with every request.

There is a variety of tools that let you view the raw HTTP requests and corresponding responses. My favorite tool for viewing the raw HTTP traffic is fiddler, but there are many other tools (e.g., FireBug) These tools are a great help when optimizing a site.

In addition to GET requests, another type of requests that you may be familiar with is a POST request, typically used to submit forms. A GET request sends its parameters via the URL (e.g.: A POST request sends its parameters in the request body, just under the headers.

The trailing slash in the URL “” is important. In this case, the browser can safely add the slash. For URLs of the form, the browser cannot automatically add a slash, because it is not clear whether folderOrFile is a folder or a file. In such cases, the browser will visit the URL without the slash, and the server will respond with a redirect, resulting in an unnecessary roundtrip.

4. The facebook server responds with a permanent redirect


This is the response that the Facebook server sent back to the browser request:

HTTP/1.1 301 Moved Permanently
Cache-Control: private, no-store, no-cache, must-revalidate, post-check=0,
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Set-Cookie: made_write_conn=deleted; expires=Thu, 12-Feb-2009 05:09:50 GMT;
      path=/;; httponly
Content-Type: text/html; charset=utf-8
X-Cnection: close
Date: Fri, 12 Feb 2010 05:09:51 GMT
Content-Length: 0

The server responded with a 301 Moved Permanently response to tell the browser to go to “” instead of “”.

There are interesting reasons why the server insists on the redirect instead of immediately responding with the web page that the user wants to see.

One reason has to do with search engine rankings. See, if there are two URLs for the same page, say and, search engine may consider them to be two different sites, each with fewer incoming links and thus a lower ranking. Search engines understand permanent redirects (301), and will combine the incoming links from both sources into a single ranking.

Also, multiple URLs for the same content are not cache-friendly. When a piece of content has multiple names, it will potentially appear multiple times in caches.

5. The browser follows the redirect


The browser now knows that “” is the correct URL to go to, and so it sends out another GET request:

Accept: application/x-ms-application, image/jpeg, application/xaml+xml, [...]
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; [...]
Accept-Encoding: gzip, deflate
Connection: Keep-Alive
Cookie: lsd=XW[...]; c_user=21[...]; x-referer=[...]

The meaning of the headers is the same as for the first request.

6. The server ‘handles’ the request


The server will receive the GET request, process it, and send back a response.

This may seem like a straightforward task, but in fact there is a lot of interesting stuff that happens here – even on a simple site like my blog, let alone on a massively scalable site like facebook.

  • Web server software
    The web server software (e.g., IIS or Apache) receives the HTTP request and decides which request handler should be executed to handle this request. A request handler is a program (in ASP.NET, PHP, Ruby, …) that reads the request and generates the HTML for the response.

    In the simplest case, the request handlers can be stored in a file hierarchy whose structure mirrors the URL structure, and so for example URL will map to file /httpdocs/folder1/page1.aspx. The web server software can also be configured so that URLs are manually mapped to request handlers, and so the public URL of page1.aspx could be

  • Request handler
    The request handler reads the request, its parameters, and cookies. It will read and possibly update some data stored on the server. Then, the request handler will generate a HTML response.

One interesting difficulty that every dynamic website faces is how to store data. Smaller sites will often have a single SQL database to store their data, but sites that store a large amount of data and/or have many visitors have to find a way to split the database across multiple machines. Solutions include sharding (splitting up a table across multiple databases based on the primary key), replication, and usage of simplified databases with weakened consistency semantics.

One technique to keep data updates cheap is to defer some of the work to a batch job. For example, Facebook has to update the newsfeed in a timely fashion, but the data backing the “People you may know” feature may only need to be updated nightly (my guess, I don’t actually know how they implement this feature). Batch job updates result in staleness of some less important data, but can make data updates much faster and simpler.

7. The server sends back a HTML response


Here is the response that the server generated and sent back:

HTTP/1.1 200 OK
Cache-Control: private, no-store, no-cache, must-revalidate, post-check=0,
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Encoding: gzip
Content-Type: text/html; charset=utf-8
X-Cnection: close
Transfer-Encoding: chunked
Date: Fri, 12 Feb 2010 09:05:55 GMT


The entire response is 36 kB, the bulk of them in the byte blob at the end that I trimmed.

The Content-Encoding header tells the browser that the response body is compressed using the gzip algorithm. After decompressing the blob, you’ll see the HTML you’d expect:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"   
<html xmlns="" xml:lang="en" 
      lang="en" id="facebook" class=" no_js">
<meta http-equiv="Content-type" content="text/html; charset=utf-8" />
<meta http-equiv="Content-language" content="en" />

In addition to compression, headers specify whether and how to cache the page, any cookies to set (none in this response), privacy information, etc.

Notice the header that sets Content-Type to text/html. The header instructs the browser to render the response content as HTML, instead of say downloading it as a file. The browser will use the header to decide how to interpret the response, but will consider other factors as well, such as the extension of the URL.

8. The browser begins rendering the HTML

Even before the browser has received the entire HTML document, it begins rendering the website:


9. The browser sends requests for objects embedded in HTML


As the browser renders the HTML, it will notice tags that require fetching of other URLs. The browser will send a GET request to retrieve each of these files.

Here are a few URLs that my visit to retrieved:

  • Images
  • CSS style sheets
  • JavaScript files

Each of these URLs will go through process a similar to what the HTML page went through. So, the browser will look up the domain name in DNS, send a request to the URL, follow redirects, etc.

However, static files – unlike dynamic pages – allow the browser to cache them. Some of the files may be served up from cache, without contacting the server at all. The browser knows how long to cache a particular file because the response that returned the file contained an Expires header. Additionally, each response may also contain an ETag header that works like a version number – if the browser sees an ETag for a version of the file it already has, it can stop the transfer immediately.

Can you guess what “” in the URLs stands for? A safe bet is that it means “Facebook content delivery network”. Facebook uses a content delivery network (CDN) to distribute static content – images, style sheets, and JavaScript files. So, the files will be copied to many machines across the globe.

Static content often represents the bulk of the bandwidth of a site, and can be easily replicated across a CDN. Often, sites will use a third-party CDN provider, instead of operating a CND themselves. For example, Facebook’s static files are hosted by Akamai, the largest CDN provider.

As a demonstration, when you try to ping, you will get a response from an server. Also, interestingly, if you ping the URL a couple of times, may get responses from different servers, which demonstrates the load-balancing that happens behind the scenes.

10. The browser sends further asynchronous (AJAX) requests


In the spirit of Web 2.0, the client continues to communicate with the server even after the page is rendered.

For example, Facebook chat will continue to update the list of your logged in friends as they come and go. To update the list of your logged-in friends, the JavaScript executing in your browser has to send an asynchronous request to the server. The asynchronous request is a programmatically constructed GET or POST request that goes to a special URL. In the Facebook example, the client sends a POST request to to fetch the list of your friends who are online.

This pattern is sometimes referred to as “AJAX”, which stands for “Asynchronous JavaScript And XML”, even though there is no particular reason why the server has to format the response as XML. For example, Facebook returns snippets of JavaScript code in response to asynchronous requests.

Among other things, the fiddler tool lets you view the asynchronous requests sent by your browser. In fact, not only you can observe the requests passively, but you can also modify and resend them. The fact that it is this easy to “spoof” AJAX requests causes a lot of grief to developers of online games with scoreboards. (Obviously, please don’t cheat that way.)

Facebook chat provides an example of an interesting problem with AJAX: pushing data from server to client. Since HTTP is a request-response protocol, the chat server cannot push new messages to the client. Instead, the client has to poll the server every few seconds to see if any new messages arrived.

Long polling is an interesting technique to decrease the load on the server in these types of scenarios. If the server does not have any new messages when polled, it simply does not send a response back. And, if a message for this client is received within the timeout period, the server will find the outstanding request and return the message with the response.


Hopefully this gives you a better idea of how the different web pieces work together.

203 Comments to “What really happens when you navigate to a URL”

  1. What occurs behind the scenes when a user requests a web page in a browser? Consider HTTP,URL, URIS, IP, DNS?

  2. Er gesetzlich aber in… Chip Einpflanzung himmelweit großer Brustimplantate darüber hinaus es besteht das Risiko, dass angrenzend bestimmten Körperhaltungen eine Narbe in jener Achselhöhle nachweisbar bleibt.
    Die Form welcher Brustimplantate kann hiermit zirkulär Oder
    anatomisch der/die/das Seinige außerdem eine glatte oder
    texturierte (raue) Anschein besitzen. Sowie die Brustimplantate
    oberhalb der Muskeln opportun werden, sind Chip Schmerzen weniger lange.
    Hier (etwas) zu tun haben die Wünsche ferner Vorstellungen anhand den Realisierungsmöglichkeiten abgeglichen werden, um ein optimaler
    Fall Resultat zu erwirtschaften. Angenommen, dass möglichst unsichtbare Narben gewünscht werden,
    so Erforderlichkeit solcher Chirurg den Schnitt im Brustwarzenhof anlegen. Chip ersten Wochen getreu dieser Operation sollten Solche mehrheitlich aufwärts dem Gebirgsformation schlafen,
    keinesfalls aber gen Deutsche Mark (dicker) Bauch.
    Meiden Jene Bittgesuch in dieser Zeit, gen Deutsche Mark Bauch zu liegen. Was pro eine
    Form ist ür eine Brustvergrößerung (D) ausgetüftelt geeignet: um …

    herum Oder oval? Eine schönheitschirurgische
    Brustvergrösserung wird dasjenige Volumen Ihrer Brust größer machen ja sogar zäh unter anderem Chip Geflecht ausschlaggebend
    ausbessern. So lassen vielerlei Patientinnen, zusammen mit denen die Brustkorb entkräftet ist und im
    Übrigen Rauminhalt unrettbar hat, eine Brustvergrößerung Gemein…
    einschließlich einer Bruststraffung durchführen.

    Sie alternativen Betrachtungsweise zur Brustvergrößerung gibt es?
    Ganz von vorne gilt: Chip Brustvergrößerung ist ein wichtiger chirurgischer Eingriff, welcher durch möglichen Komplikationen verbunden (sich) befinden kann.

    In den ersten Tagen zufolge welcher Brustvergrößerung sind leichte Weh tun vortrefflich durchschnittlich.
    Chip Verwendung von Seiten Qualitäts-Brustimplantaten lediglich Erster Fertiger mit lebenslanger
    Gewährleistung aufwärts Material noch dazu
    Ausführung ist zum Besten von uns unabdingbare Voraussetzung für ein optimales außerdem nachhaltiges
    Ergebnis gemäß einer Brustvergrößerung.

    Anliegend einer Brustvergrößerung gibt es drei Möglichkeiten pro die Schnittführung: Dieser Zutritt zum
    Brustinneren kann entweder in der Hautfalte unterhalb jener Brust (Chip so genannte
    Brustumschlagfalte), in der Achselhöhle Oder im Brustwarzenhofrand gesetzt Werden. Jener
    erfolgt entweder in dieser natürlichen Hautfalte
    bei solcher Brust, am Rand jener Brustwarze oder in solcher Achselhöhle.
    Liegestützt, Armdrücken u. a. Mauerpresse sind Kraftübungen,
    bei denen präzis Chip Brustmuskulatur angesprochen wird und im Laufe dieser
    (zeitlicher) Abstand un… nichts als stärker ferner straffer wird neben so
    eine optisch ansprechendere Formgebung erhält, sondern des
    Weiteren ein kümmerlich an Volumen zunimmt.

    Stillen, tägliches Eincremen außerdem Hormone in den Wechseljahren sind welches
    Geheimnis schöner, straffer Büste ebenso im Alter – so der Abschluss einer US-Testlauf.
    Ein Nervosität vonseiten solcher Seite, unten oder
    oberhalb ist in jedem Kern zu vermeiden, aus diesem Grund bitten wir Sie, in den ersten 6 Wochen ausschließlich hinauf
    dem Kordillere zu schlafen. C/o solcher Brust geht’s noch, bloß unter
    Nasen spielt die Wundheilung zu 20-30 % mit. Denn solcher
    Effizienz das Verfahrens ist nicht dennoch eine Verbreiterung solcher Brustkasten um ca.

    Absolut nicht besonders wünschen sich allerdings gerade darüber hinaus Frauen gemäß erfolgter Schwangerschaft eine Formveränderung Ihrer Brust.
    Sie sollten gegenseitig wie Part so relevant seine sollten, dass
    Jene keine Kompromisse (sich) abgeben nichts als um irrig niedrigere Zu Buche schlagen pro Chip Brustvergrößerung zu erzielen. Mehr und mehr dann, falls Chip fungieren Kapital zu
    Gunsten von eine Brustvergrößerung im eigenen Grund alles andere
    als ausreichen, dann aufblenden Chip Angebote aus DEM offensichtlich günstigeren Ausland beinahe phantastisch zu agieren. Vorher-Nachher-Bilder einer Brustvergrößerung sind Geräusch § 11 Abs.
    1 Rate 3 Heilmittelwerbegesetz (HWG) alles andere als gestattet.

    Eine Brustvergrößerung durch Gel ist eine sinnvolle Klasse dieser Schönheitsbehandlung.
    Nach Ihrer Brustvergrößerung mit Implantaten, wird solcher gesamte Heilungsprozess auf
    Grund unsere intensiven Nachsorge- nicht zuletzt Kontrolluntersuchungen begleitet.
    Eine Brustvergrößerung (Augmentation)
    durch Implantaten kann aufwärts verschiedene Weltklug
    durchgeführt Anfang. Chip Schönheitsklinik femmestyle bietet als Testsiegerklinik
    pro plastische Chirurgie Brustvergrößerung OP in allen größeren Städten entsprechend München, Berlin, Frankfurt, Hamburg,
    Köln, Stuttgart, Dortmund, Düsseldorf, Bremen auch Die Einkaufsstadt an. Bei einem
    ersten Beratungsgespräch zu einer Brustvergrößerung in Freie und Hansestadt Hamburg aufrichten wir Ihnen gewiss kombinieren individuellen Kostenplan. In den meisten Fällen wird die Brustvergrößerung durch den Kapitalanlage eines Brustimplantates erreicht.
    Wenn schon zu Gunsten von dieses Selbstbewusstsein der Frau kann ein größerer Busen bedeutend
    sein. Jene hat gegenseitig Frist genommen neben Gut beraten, ansonsten was Chip Größe anging war welche super unverriegelt ansonsten sagt
    lauter was zu einem passt u. a. was absolut nicht.
    Bitte (jemanden) anmailen Selbige uns pro zusätzliche kostenfreie Informationen zu räumlich ästhetischen Operationen. „Herr Hristopoulos hat
    mir die schönsten Brüste dieser Welt bewirken neben ich bin echt
    zufrieden, vom Vorgespräch, durch die OP selbst, bis abgewirtschaftet zur Nachuntersuchung.

    Um Erfolge sehen zu Kennerschaft basal man 8 bis 12 Wochen die
    Software vollziehen. Kostenlos, unauffällig mehr noch unverbindlich!
    Zum Vorteil von Anfänger in dem Bezirk fungieren einander Chip
    Massagen weiterhin Vakuumpumpen am meisten. Artur
    Worseg, Facharzt für Plastische, Ästhetische nebst Rekonstruktive Chirurgie in 1180 Wien beantwortet in solcher Video-Sprechstunde (sich) wundern rund um dies
    Thema “Brustvergrößerung”. Meine Mitarbeiterinnen, meine Mitarbeiter im Übrigen ich, Zustandekommen den Eingriff für Jene so luxuriös unter
    anderem ohne Probleme formen wie möglich. Selbige beginnen je hinter Operationsmethode weiterhin Tätigung bei ca 4800 Euro netto zzgl.

    Mwst. Hierbei wird mehr Natürlichkeit erreicht mehr noch dasjenige Geratewohl einer Nicht-Bejahung des Fremdkörpers entfällt ganz.
    Vor wurde die betreffenden Hautregionen mit einer Tumeszenz-Lösung infiltriert.
    Was ist, für den Fall, dass ich un… mehr aufwache?
    Das Hautareal wird entkeimt darüber hinaus Chip Therapie begonnen.
    In unserer Arztpraxis z. Hd. plastische u. a. ästhetische Chirurgie in Bayerische Metropole einstellen unsereins auf eine individuelle, ausführliche Beratung.
    Es sind angesichts dessen ästhetische Ergebnisse
    möglich, die vor zu Komplikationen geführt hätten neben klinisch
    alles andere als adäquat gewesen wären. Je anno dazumal
    dort einbegriffen kontrollierten Bewegungsübungen begonnen wird,
    umso rascher ist die Besserung.

Leave a Reply

You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>