All Architectures

Network communication architectures organized by category

๐ŸŒ DNS / Domain

๐ŸŒ

How Does DNS Domain Configuration Propagate?

What actually happens when you configure a domain on sites like onamae.com

DNS (Domain Name System) is the internet's phone book that translates domain names (e.g., example.com) to IP addresses (e.g., 93.184.216.34). When you configure a domain on a registrar like onamae.com, it propagates hierarchically through root servers โ†’ TLD servers โ†’ authoritative nameservers to become accessible worldwide

โณ

Why Does Nameserver Change Take 24-72 Hours?

The real reason NS changes propagate slowly and the caching structure at each level

Unlike simple DNS record changes, nameserver changes require cache updates at the TLD (.com/.net) level. Since TLD NS records typically have a 48-hour TTL and ISP resolvers cache them, it takes 24-72 hours for changes to propagate worldwide

๐Ÿ”’

How Does DNS-PERSIST-01 Work?

Eliminating Repeated Validation with Let's Encrypt's Persistent DNS Auth Records

Solves the DNS-01 limitation of changing DNS TXT records for every Let's Encrypt certificate issuance. Set CA account info in _validation-persist. TXT record once, then reuse for subsequent issuance/renewal

๐Ÿข

What Does It Take to Become a DNS Provider Like onamae.com?

From ICANN Accreditation to Anycast Infrastructure โ€” Behind the Scenes of a Domain Registrar

Becoming a DNS provider (registrar) like onamae.com requires ICANN accreditation, Anycast DNS networks, EPP protocol implementation, WHOIS/RDAP databases, DDoS protection, and large-scale infrastructure with regulatory compliance

๐Ÿ›’

Domain Purchase Flow

From TLD Selection to Renewal Management โ€” Every Step of Buying a Domain

Domain purchase follows TLD selection, WHOIS availability check, registrar choice, registration (contact info + WHOIS Privacy), initial DNS setup, and renewal management. Comprehensive guide covering domain lifecycle, premium domain market, and domain theft prevention

๐Ÿ”

How Free HTTPS Services Work

How Let's Encrypt, Cloudflare, and ACM provide free certificates

Dissecting the core principles behind free HTTPS services: ACME protocol, domain validation, CA trust chain, and TLS handshake

๐Ÿšจ

Notable DNS Outage Incidents

Major DNS failures that broke the internet and lessons learned

Analyzing major DNS-related incidents including Dyn DDoS, Facebook BGP outage, and Fastly failure, with practical lessons for preventing single points of failure

๐Ÿ” How It Works

๐Ÿš‡

How Does ngrok Work?

Exposing Local Servers to the Internet via Reverse Tunnel

ngrok is a tunneling service that exposes local development servers via public URLs. The ngrok client on your PC opens an outbound connection to ngrok cloud, and external traffic is forwarded to your local server through that tunnel

๐Ÿ’ฌ

How Does Slack Socket Mode Work?

Receiving Events via Outbound WebSocket Without Webhooks

A method for Slack Bots to receive events without a public URL. The Bot server opens a WebSocket connection to Slack first, then Slack pushes events through that connection. Works behind firewalls

๐Ÿค–

How Does ChatGPT Streaming Work?

Real-time Token-by-Token Response Delivery via SSE

The secret behind ChatGPT displaying answers character by character. The OpenAI API streams generated tokens instantly via SSE (Server-Sent Events), and the client receives them one by one to render on screen

๐Ÿ™

How Do GitHub Webhooks Work?

git push โ†’ HTTP POST โ†’ CI/CD Trigger

When events like code push or PR creation occur on GitHub, an HTTP POST is sent to a pre-registered URL to automatically trigger external systems (CI/CD, Slack notifications, etc.)

โš™๏ธ

How Does Sidekiq Work?

Redis-based Background Job Queue System

A system for offloading heavy tasks (email sending, image processing, etc.) to the background in Rails. The web process enqueues jobs to a Redis queue, and Sidekiq worker processes dequeue and process them asynchronously

๐Ÿ“น

How Does WebRTC Work?

Direct Video/Audio/Data Transfer Between Browsers

Technology for video calls, screen sharing, and file transfer between browsers without a central server. After exchanging connection info via signaling server, P2P direct connection is established through NAT using STUN/TURN

๐Ÿ”Œ

How Does MCP Work?

An Open Protocol Connecting AI Models with External Tools in a Standardized Way

MCP (Model Context Protocol) is an open protocol that connects AI models (LLMs) with external tools and data sources in a standardized way. When a Host (Claude, etc.) connects to an MCP Server via a Client, the Server exposes external systems like DB, files, and APIs to the AI

๐Ÿ”€

MCP Transport: stdio vs Streamable HTTP

The Difference Between Local Development and Cloud SaaS Deployment

MCP supports two official transports: stdio (local) and Streamable HTTP (remote/SaaS). Streamable HTTP, introduced in March 2025, enables SaaS vendors to deploy MCP servers to the cloud with access for multiple clients

๐Ÿ–ฅ๏ธ

How Does tmux Work?

Session Persistence & Splitting with a Terminal Multiplexer

tmux is a terminal multiplexer that manages multiple sessions in a single terminal. With a server-client architecture, sessions persist even when SSH connections drop, and you can reattach later

๐Ÿ”€

How Does Vercel Subdirectory Reverse Proxy Work?

Consolidating External Server Content Under a Next.js Domain Subdirectory for SEO Authority

Reverse proxy from negabaro.com (Vercel/Next.js) routing /blog/* paths to external servers like Rails (DigitalOcean) or Jekyll (GitHub Pages). Users see a single domain while content is rendered on separate servers. SEO authority is consolidated to the main domain via canonical/robots.txt/absolute asset URLs regardless of backend tech stack

๐Ÿณ

How Docker Containers Work

From Linux namespaces to macOS support and GPU โ€” a decade of technical evolution

Docker, launched in 2013, isolates processes without VMs using Linux namespaces. Behind the CLI lies decades of systems research, and it adopted a library VMM architecture for macOS/Windows support.

๐Ÿ›

Keploy โ€” How eBPF Intercepts Traffic to Auto-Generate API Tests

The transparent proxy pattern where eBPF silently rewrites connect() destinations at kernel level

Wrap your app with keploy record, and eBPF redirects all outbound connection destinations to a local proxy at kernel level. The app is unaware. The proxy parses traffic per protocol and extracts test cases + mocks as YAML.

๐Ÿค– Agentic AI

๐Ÿค–

Agentic AI โ€” Anatomy of Autonomous Agents

How LLMs use tools, make decisions, and iterate

Agentic AI goes beyond LLMs simply generating text โ€” it's a system where LLMs plan, call tools, and iteratively execute toward goals. The difference between a "chatbot" and an "agent" is autonomy. Chatbots answer questions; agents take actions toward goals on their own.

๐Ÿ”

Agent Loop โ€” Anatomy of the Execution Loop

A single while loop is all an agent is

The essence of an agent is "running an LLM in a loop." Not a single call, but a cycle: get tool results, pass back to LLM, LLM decides next action. How you design this loop determines agent quality.

๐Ÿ”ง

Tool Use Pattern โ€” Giving LLMs Hands and Feet

How LLMs interact with the outside world through function calls

LLMs can only generate text. To read files, call APIs, or query databases, they need "tools." Tool Use tells the LLM what functions are available and lets it call them when needed.

๐Ÿ˜…

Ralph Wiggum Loop โ€” When Agents Repeat the Same Mistake

"I'm in danger" โ€” causes and fixes for agents stuck in loops

When an agent repeats the same fix for the same error, burning tokens with zero progress. Named after the Simpsons meme where Ralph Wiggum sits blankly saying "I'm in danger." The most common and costly anti-pattern in AI agent development.

๐Ÿค

Human-in-the-Loop โ€” When Humans Should Intervene

Full autonomy vs appropriate intervention โ€” finding the balance

Full automation is convenient, but irreversible actions (data deletion, production deploy, payments) need human confirmation. Human-in-the-Loop is the pattern for designing "when to ask a human."

๐Ÿ”ง Harness Engineering

๐Ÿ”ง

What is a Harness?

From test runners to AI agents โ€” the system that wraps and controls a target

Harness is not an AI-specific concept. It originally comes from Test Harness in software engineering โ€” the entire execution environment that wraps and controls a target. Whether it's an AI harness or a test harness, the principle is the same: the system wrapping the target matters more than the target itself.

โš–๏ธ

Harness Engineering vs Prompt Engineering

Writing good prompts and building good execution environments are different things

Prompt Engineering is about telling the model "what to do" well. Harness Engineering is about designing "the environment the model runs in." Same prompt, different harness โ€” completely different results.

๐Ÿ›ก๏ธ

Guardrails Design โ€” Stopping Models Before They Go Wrong

Building safe harnesses with input filters, output validation, and action limits

Models output probabilistically. Right 9 out of 10 times, wrong once. Guardrails prevent that one time from exploding in production. Guardrails go at input, execution, and output stages.

๐Ÿ“Š

Eval Pipeline โ€” How to Measure Harness Quality

Gut feeling loses โ€” automated evaluation systems are essential

Changing the harness is meaningless if you don't know whether it improved or degraded. An eval pipeline quantitatively measures the effect of harness changes. Benchmarks like SWE-bench and HumanEval are just types of eval pipelines.

๐Ÿง 

Context Window Management โ€” Strategy for Finite Memory

Even with 1M tokens, how you fill it matters

The context window is the model's "working memory." Even as it grows, it's not infinite โ€” performance varies by what goes in and in what order. One of the harness's core roles is efficiently managing this limited space.

๐ŸŽผ

Orchestration Patterns โ€” How to Compose Model Calls

When one call isn't enough, how do you chain multiple calls?

Complex tasks don't finish with one model call. Orchestration is deciding in what order and under what conditions to execute multiple model calls. Agent loops in Agentic AI, RAG, code generation pipelines โ€” all orchestration patterns.

๐Ÿญ

gstack Anatomy โ€” Harness Engineering in Practice

The structure that let Garry Tan ship 600K lines with Claude Code in 60 days

gstack is a Claude Code skill pack released by Y Combinator CEO Garry Tan. 23 slash commands split one model into a team of role-based specialists. Same Claude, different harness. That's the power of harness engineering.

๐Ÿ”€ Git

๐Ÿ—‚๏ธ

How Does Git Work Internally?

Blob, Tree, Commit โ€” The Three Git Objects

Git is a content-addressable filesystem. Every file, directory, and commit is stored as an object identified by a SHA-1 hash. Three object types โ€” blob (file), tree (directory), commit (snapshot) โ€” explain most of how Git works.

๐Ÿ”€

rebase vs merge: When to Use Which

The Trade-off Between Preserving and Linearizing History

merge combines two branches with a merge commit. rebase replays commits on top of a different base. merge preserves history as-is; rebase linearizes it. Rule of thumb: merge on shared branches, rebase on personal ones.

โ†ฉ๏ธ

reset vs revert: Which One, When

Rewriting History vs Adding an Inverse Commit

reset moves the branch pointer back to a past commit. revert adds a new commit that undoes the target. Use reset on local-only work; use revert on commits you have already pushed.

๐Ÿ“ฆ

Using git stash Properly

When You Need to Switch Branches Mid-Work

stash pushes uncommitted changes onto a temporary stack and cleans your working tree. Used for switching branches, cherry-picking, or responding to urgent bugfixes. Using stash instead of `checkout -- .` or `reset --hard` prevents accidentally losing changes.

๐ŸŒฒ

Checking Out Multiple Branches Simultaneously with worktree

No Need to Clone the Repo Multiple Times

git worktree lets you check out the same repository into multiple directories on different branches. No need to clone multiple times, and since the .git directory is shared, disk usage stays low. It shines when you want to keep working on another branch while a long build runs.