Igor Korotach
Head of FinTech at Quantum
Written by: Igor Korotach
Domain name servers (DNS) are key components of the internet that translate human-readable domain names (such as “google.com”) into numerical IP addresses that computers use to interact with one another.
When a user enters a domain name or clicks a hyperlink, the browser sends a request to a DNS server to resolve the domain name to an IP address. The DNS server searches its database for the domain name and delivers the appropriate IP address to the browser. The IP address is then used by the browser to connect to the server that hosts the website or service associated with the domain name
Consider a web application that’s hosted on a network of web servers. The domain name “www.example.com” can be connected with the web application. Multiple A records for “www.example.com” can be set on the DNS server, each of which resolves the domain name to a distinct IP address inside the cluster. When a client requests “www.example.com,” the DNS server looks for the domain name and delivers one of the cluster’s IP addresses to the client. The client then connects to the web server at that IP address and sends the request.
The schema for google DNS resolution is as follows:
Caching is a crucial factor for the success of any application. It’s the cornerstone of high performance and low latency. With caching in place, an application is able to intercept requests before they reach the database, and respond in a timely manner. This results in faster and more efficient operations. In comparison, an application without caching won’t perform as well because it will have to access the database for each request, leading to slower response times.
Answers the question 'Who are you?'
An example of authentication is when a user enters their username and password to access a website or an application. The system verifies the entered credentials against the stored data to confirm the user’s identity before allowing them to proceed.
Answers the question 'What can you do?'
For example, within a company’s internal software system, certain employees might have authorization to view and edit specific data, while others might only have permission to view it.
Encryption is the process of encrypting data in order to prevent unauthorized access or tampering with it. Encryption can be used to protect data while it’s in transit, such as while it’s transmitted over a network, or while it’s at rest, such as when it’s saved on a disc or in a database.
By Igor Korotach