← Back to all articles
// The Architecture DeepDive, Issue #02

The Internet & Networks
Architecture

A complete technical deep-dive into how the internet actually works, from physical signals on a wire to encrypted HTTPS packets crossing continents. Firewalls, DNS, IP addressing, network adapters, security protocols, and everything in between.

⏱ Read time: ~18 min
🎯 Level: Intermediate → Advanced
📡 Topic: Networking & Security
📅 Published: March 2026
✍️ Author: Barnabas Waweru
// 00, The Big Picture

When you type https://google.com and press Enter, roughly 47 distinct technical systems fire in sequence before a single pixel renders. Most developers interact with the internet every day but have never traced that full journey. This deep-dive maps it completely.

The internet is not one thing. It is a layered stack of protocols, hardware, and agreements , an emergent global system where no single entity owns or controls the whole. Understanding its architecture means understanding each layer independently, then seeing how they compose.

🧅

Layered Architecture

The OSI model decomposes networking into 7 abstraction layers. Each layer serves the one above it and is served by the one below. Separation of concerns at planetary scale.

📦

Packet Switching

Data is broken into discrete packets, each routed independently. Packets from one request may travel different physical paths and arrive out of order, TCP reassembles them.

🌍

Distributed Control

No central authority routes traffic. BGP (Border Gateway Protocol) lets thousands of autonomous networks negotiate paths cooperatively, the internet's routing brain.

🔒

Defense in Depth

Security is not a single layer, it's woven through every level. TLS encrypts transport, firewalls filter at network/application layers, DNS has DNSSEC, and more.

🏷️

Addressing

Every device needs an address. IPv4 offers ~4.3 billion. IPv6 offers 340 undecillion. MAC addresses identify hardware. Ports identify services within a host.

Speed of Light Limits

Latency has a physical floor. Light travels 200,000 km/s through fiber. New York to London is ~70ms minimum round-trip, no optimization can beat physics.

// 01, The OSI Model: 7 Layers of Abstraction

The Open Systems Interconnection (OSI) model is the conceptual framework for how network communication is structured. Published in 1984 by ISO, it partitions the communication system into seven abstraction layers. Real implementations (TCP/IP) collapse some of these, but understanding OSI is essential for diagnosing, designing, and reasoning about networks.

Remember the mnemonic: All People Seem To Need Data Processing (Application → Physical, top-down) or Please Do Not Throw Sausage Pizza Away (bottom-up).

7
Application
HTTP · HTTPS · FTP · SMTP · DNS · SSH · WebSocket
The interface between network and application software. This is where user-facing protocols live. HTTP requests, DNS queries, email, all begin here. Your browser speaks HTTP at this layer.
6
Presentation
TLS/SSL · JPEG · MPEG · ASCII · UTF-8
Data translation, encryption, and compression. TLS lives here, it transforms raw bytes into encrypted ciphertext before handing to Transport. Also handles data format negotiation (JSON, XML).
5
Session
NetBIOS · RPC · PPTP · SQL Sessions
Manages sessions between applications, opening, maintaining, and closing connections. Handles authentication checkpoints. Rarely implemented as a distinct layer in modern TCP/IP stacks.
4
Transport
TCP · UDP · QUIC · SCTP
End-to-end communication, error recovery, and flow control. TCP guarantees delivery and ordering. UDP sacrifices guarantees for speed. QUIC (HTTP/3) combines UDP with reliability at the app layer. Ports live at this layer, 443 for HTTPS, 22 for SSH.
3
Network
IP · ICMP · IPSec · BGP · OSPF
Logical addressing and routing. IP addresses live here. Routers operate at this layer, forwarding packets toward their destination. BGP determines inter-AS routing. ICMP enables ping/traceroute.
2
Data Link
Ethernet · WiFi (802.11) · ARP · PPP · VLANs
Node-to-node transfer on a physical link. MAC addresses live here (hardware addresses). Ethernet frames wrap IP packets. ARP maps IP → MAC. Switches operate at this layer.
1
Physical
Copper · Fiber · Radio · USB · Bluetooth
Raw bits over a physical medium. Electrical signals, light pulses, radio waves. Network cards, cables, antennas, repeaters. Voltage levels, timing, encoding schemes, the atomic foundation.
⚡ Key Insight

When data travels from your app to the network, each layer encapsulates the data from the layer above, wrapping it with its own header. On arrival, each layer de-encapsulates (strips its header) before passing the payload up. This is why a network engineer can capture and analyze traffic at any layer independently.

TCP/IP vs OSI: The Real Stack

In practice, the internet runs on the TCP/IP model, which collapses OSI's 7 layers into 4:

TCP/IP LayerOSI EquivalentProtocolsFunction
Application Layers 5, 6, 7 HTTP, DNS, SMTP, SSH, TLS All user-facing protocols, encoding, sessions
Transport Layer 4 TCP, UDP, QUIC Port-based delivery, reliability, flow control
Internet Layer 3 IPv4, IPv6, ICMP, BGP Logical addressing, routing between networks
Network Access Layers 1, 2 Ethernet, WiFi, ARP Physical transmission, local link addressing
// 02, IP Addressing: The Internet's Address System

Every device connected to the internet needs an address. The Internet Protocol (IP) defines how addresses are structured, assigned, and routed. Understanding IP addressing means understanding the difference between public and private, static and dynamic, IPv4 and IPv6, and how subnetting carves address space into manageable chunks.

IPv4: Structure and Anatomy

IPv4 addresses are 32-bit integers expressed as four 8-bit octets separated by dots. Each octet ranges from 0–255.

192 . 168 . 1 . 42
192
11000000
Network
168
10101000
Network
1
00000001
Subnet
42
00101010
Host

Subnet mask /24 (255.255.255.0) → Network: 192.168.1.0 | Hosts: 192.168.1.1–254 | Broadcast: 192.168.1.255

RangeClassPurposeSize
10.0.0.0/8Class A PrivateLarge private networks (AWS VPCs, enterprise)16.7M addresses
172.16.0.0/12Class B PrivateMedium private networks1.05M addresses
192.168.0.0/16Class C PrivateHome/small office networks (your router)65,536 addresses
127.0.0.0/8LoopbackLocalhost, traffic never leaves the machine16.7M (all map to self)
169.254.0.0/16Link-LocalAPIPA, assigned when DHCP fails65,536 addresses
0.0.0.0/0Default Route"All traffic" catch-all in routing tablesFull IPv4 space

CIDR Notation & Subnetting

CIDR (Classless Inter-Domain Routing) notation expresses a network as address/prefix_length. The prefix length indicates how many bits are the network portion. The remaining bits are available for hosts.

// CIDR Cheat Sheet
# /prefix  | hosts available | typical use
/321 host        (single IP, firewall rule, loopback)
/312 hosts       (point-to-point links)
/302 usable      (small p2p with network + broadcast)
/296 usable      (tiny subnet)
/2814 usable     (very small network)
/24254 hosts     (typical home/small office, 192.168.1.0/24)
/1665,534 hosts  (large enterprise or VPC)
/816.7M hosts   (massive networks, entire Class A)

# Formula: usable hosts = 2^(32-prefix) minus 2
# Subtract 2: network address + broadcast address

IPv6: The Future (That's Already Here)

IPv4's ~4.3 billion addresses ran out (IANA exhausted its pool in 2011). IPv6 uses 128-bit addresses, expressed as 8 groups of 4 hex digits. The address space: 340,282,366,920,938,463,463,374,607,431,768,211,456 addresses , enough to assign trillions to every atom on Earth.

// IPv6 Address Anatomy
# Full IPv6
2001:0db8:85a3:0000:0000:8a2e:0370:7334

# Leading zeros suppressed
2001:db8:85a3:0:0:8a2e:370:7334

# Consecutive zero groups compressed with ::
2001:db8:85a3::8a2e:370:7334

# Special addresses
::1          → Loopback (equivalent to 127.0.0.1)
fe80::/10    → Link-local (auto-configured, not routable)
fc00::/7     → Unique local (private, like 192.168.x.x)
2000::/3     → Global unicast (public internet)

NAT: The IPv4 Lifeline

Network Address Translation (NAT) is how billions of devices share a handful of public IPs. Your router has one public IP. Every device behind it gets a private IP. When you make a request, the router rewrites the source IP/port and maintains a translation table to route responses back. It's an elegant hack that extended IPv4's life by decades, at the cost of breaking true end-to-end connectivity.

// 03, DNS: The Internet's Phone Book

The Domain Name System (DNS) translates human-readable names (google.com) into IP addresses (142.250.185.46). Without DNS, you'd memorize IPs. DNS is a globally distributed, hierarchically organized database, one of the internet's most critical and most attacked systems.

⚡ Scale Fact

DNS handles over 1 trillion queries per day globally. The root servers alone (13 logical servers, actually hundreds of physical machines via anycast) answer billions of queries without a single central database.

The DNS Hierarchy

// DNS Namespace Hierarchy
Root Servers (.)
13 logical servers (A–M) · Hundreds of anycast instances · Managed by ICANN, IANA, ISC, etc.
.com TLD
Verisign manages
.org TLD
PIR manages
.net TLD
Verisign manages
.io TLD
Afilias manages
Authoritative Nameservers
Your registrar/host (Cloudflare, Route53, GoDaddy), holds actual DNS records

DNS Resolution: Step by Step

When you type api.github.com, here's the exact resolution path, assuming nothing is cached:

Your Browser
Checks local browser cache. Not found. Asks OS resolver.
api.github.com?
OS Resolver
Checks /etc/hosts, then OS DNS cache. Not found. Queries configured DNS server (Recursive Resolver).
→ 8.8.8.8
Recursive Resolver
Cache miss. Queries Root servers: "Who handles .com?"
→ Root Servers (.)
Root Server
Returns: "I don't know github.com, but here are the .com TLD nameservers."
NS: a.gtld-servers.net
Recursive Resolver
Queries .com TLD servers: "Who handles github.com?"
→ .com TLD
.com TLD Server
Returns: "Here are GitHub's authoritative nameservers."
NS: ns1.p16.dynect.net
Recursive Resolver
Queries GitHub's nameserver: "What is the A record for api.github.com?"
→ GitHub NS
GitHub Nameserver
Returns the A record with IP address and TTL. Answer is authoritative.
140.82.113.6 TTL:60
Your Browser
Receives IP, caches for TTL duration. Initiates TCP connection to 140.82.113.6:443.
✓ Connected

DNS Record Types

RecordFull NamePurposeExample
AAddressDomain → IPv4github.com → 140.82.113.4
AAAAIPv6 AddressDomain → IPv6github.com → 2606:50c0::6814:71
CNAMECanonical NameAlias for another domainwww.github.com → github.com
MXMail ExchangeEmail routinggithub.com → aspmx.l.google.com
TXTTextArbitrary text (SPF, DKIM, verification)v=spf1 include:github.com
NSNameserverAuthoritative servers for zonegithub.com → ns1.p16.dynect.net
PTRPointerReverse DNS: IP → domain140.82.113.4 → github.com
SOAStart of AuthorityZone metadata, primary NS, serialPrimary NS, refresh intervals
SRVServiceLocate specific services_https._tcp.example.com
CAACA AuthorizationWhich CAs can issue certs for domain0 issue "letsencrypt.org"
⚠️ Security Note

Standard DNS is completely unencrypted and unauthenticated. Anyone between you and your resolver can see (and forge) DNS queries. DNS over HTTPS (DoH) and DNS over TLS (DoT) encrypt DNS traffic. DNSSEC adds cryptographic signatures to DNS records, preventing spoofing, but not encrypting content.

// 04, HTTPS & TLS: The Encrypted Web

HTTPS is HTTP running over TLS (Transport Layer Security). TLS provides three guarantees: confidentiality (nobody can read your data), integrity (nobody can tamper with it), and authentication (you're talking to who you think you are). Every HTTPS connection begins with a TLS handshake.

TLS 1.3 Handshake (Modern)

TLS 1.3 (2018) reduced the handshake from 2 round-trips to 1, cutting latency significantly. Here's the choreography:

🖥️ Client (Browser)
ClientHello
Supported cipher suites · TLS version · random nonce · key share (DH public key)
 
Finished
Verify server Finished MAC · Connection encrypted
Application Data
GET /index.html (encrypted)
🌐 Server
 
ServerHello + Certificate + Finished
Chosen cipher · server key share · certificate chain · encrypted extensions · MAC
 
Application Data
200 OK + HTML (encrypted)

What Happens Inside TLS

🔑

Key Exchange (ECDHE)

Elliptic Curve Diffie-Hellman Ephemeral, both parties generate key pairs, exchange public keys, compute a shared secret without ever transmitting it. Forward secrecy: each session has unique keys. Past sessions can't be decrypted even if server's private key is later compromised.

📜

Certificates & PKI

X.509 certificates bind a public key to a domain name, signed by a trusted Certificate Authority (CA). Your browser trusts ~150 root CAs. The CA hierarchy: Root CA → Intermediate CA → End-Entity cert. Let's Encrypt issues free DV certs automatically via ACME protocol.

🔐

Symmetric Encryption

Once keys are exchanged, data is encrypted with AES-GCM or ChaCha20-Poly1305 (symmetric). Asymmetric crypto only for key exchange, it's too slow for bulk data. AES-256-GCM is authenticated encryption: confidentiality + integrity in one pass.

✍️

MACs & Integrity

HMAC (Hash-based MAC) appended to every record. If a single bit changes in transit, MAC verification fails, connection drops. AES-GCM integrates authentication, making tampering cryptographically impossible without the session key.

Certificate Validation Chain

🌐
Server Cert
github.com cert signed by intermediate CA
🔗
Intermediate CA
DigiCert TLS CA signed by Root CA
🏛️
Root CA
DigiCert Global Root, self-signed, trusted by OS
💻
Browser Trust Store
Root cert pre-installed by OS/browser vendor
Valid!
Chain verified, padlock shown, connection encrypted
// 05, Network Adapters: Hardware Meets Protocol

A Network Interface Card (NIC) is the hardware that physically connects a device to a network. Every NIC has a MAC address, a 48-bit hardware identifier burned into the card at manufacture. Modern systems often have multiple NICs: ethernet, WiFi, virtual adapters for VMs/containers, loopback.

📦
Application / OS
Socket API. Your app calls send(). Kernel queues the data. Manages buffers, flow control.
🔧
NIC Driver
Kernel module that translates OS socket calls into NIC-specific hardware commands. Ring buffers.
💾
NIC Hardware
Onboard processor. DMA engine copies packets directly to/from RAM without CPU involvement. Offload engines for TCP checksum, segmentation (TSO/GRO).
Physical Medium
Ethernet PHY layer. Encodes bits as electrical signals (copper) or light pulses (fiber). 1G/10G/25G/100G speeds.

MAC Addresses: Hardware Identity

A MAC address is a 48-bit (6-byte) identifier, expressed as 6 hex pairs. The first 3 bytes are the OUI (Organizationally Unique Identifier), assigned to manufacturers. The last 3 bytes are device-specific.

// MAC Address Anatomy
# Example: AC:DE:48:00:11:22

AC:DE:48   → OUI, Apple Inc. (registered with IEEE)
00:11:22   → Device-specific serial number

# Special bit flags in first octet:
Bit 0 = 0  → Unicast   (specific device)
Bit 0 = 1  → Multicast (group of devices)
Bit 1 = 0  → Globally Unique (burned-in address)
Bit 1 = 1  → Locally Administered (random/virtual)

# MAC randomization (modern WiFi):
# iOS, Android, Linux now randomize MAC per-network
# to prevent location tracking across APs

ARP: Bridging Layer 3 → Layer 2

IP addresses (Layer 3) must be resolved to MAC addresses (Layer 2) for local delivery. ARP (Address Resolution Protocol) does this resolution on local networks.

💻
Send to 192.168.1.5
Need MAC. Check ARP cache.
📢
ARP Broadcast
"Who has 192.168.1.5? Tell 192.168.1.1"
📬
ARP Reply
"192.168.1.5 is at AA:BB:CC:DD:EE:FF"
💾
Cache Entry
Store IP→MAC mapping for TTL duration
📦
Send Frame
Ethernet frame with dest MAC set
⚠️ ARP Poisoning

ARP has no authentication. An attacker can broadcast fake ARP replies, poisoning the ARP cache of victims, redirecting their traffic through the attacker's machine (Man-in-the-Middle). Dynamic ARP Inspection (DAI) on managed switches mitigates this on enterprise networks.

// 06, Firewalls: Gatekeepers of the Network

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls operate at different OSI layers, with higher-layer firewalls offering more context, and more processing overhead.

Internet
🌍 Untrusted Zone, All external traffic
🛡️ FIREWALL, Stateful Inspection · Rules Engine · NAT
DMZ
🌐 Semi-Trusted Zone, Web servers, APIs, load balancers
🛡️ INTERNAL FIREWALL, Stricter rules · App-layer filtering
Internal LAN
🏠 Trusted Zone, Databases, internal systems, workstations

Firewall Generations

GenerationOSI LayerInspectsStrengthsWeaknesses
Packet Filter Layer 3–4 IP, port, protocol Fast, simple, stateless No connection context, spoofable
Stateful Inspection Layer 3–4 Connection state table Tracks sessions, blocks spoofed responses No application-layer visibility
Application Layer (L7) Layer 7 Payload, HTTP headers, DNS queries Deep inspection, block specific apps Slower, SSL inspection complexity
Next-Gen (NGFW) All layers Identity, threats, IPS, App-ID Full visibility, threat prevention Expensive, complex, latency
WAF (Web App) Layer 7 (HTTP) SQL injection, XSS, OWASP Top 10 App-specific protection HTTP/HTTPS only, bypass possible

iptables: Linux Firewall Rules

// Common iptables rules (Linux netfilter)
# View all rules
iptables -L -n -v --line-numbers

# Allow established/related connections
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT

# Allow SSH from specific IP only
iptables -A INPUT -p tcp --dport 22 -s 10.0.0.5 -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP

# Allow HTTPS in
iptables -A INPUT -p tcp --dport 443 -j ACCEPT

# Rate limit: prevent brute force
iptables -A INPUT -p tcp --dport 22 -m limit --limit 3/min -j ACCEPT

# Log and drop everything else
iptables -A INPUT -j LOG --log-prefix "DROPPED: "
iptables -A INPUT -j DROP

# Modern systems: nftables replaces iptables

Stateful Connection Tracking

Modern firewalls maintain a connection state table. When a TCP connection is established (SYN → SYN-ACK → ACK), the firewall records it. Subsequent packets matching an established connection bypass rule evaluation, only new connections get full inspection. This enables "allow out, allow related back in" policies without explicitly permitting inbound on every ephemeral port.

// 07, Routing & BGP: How Packets Cross the World

The internet is a network of networks, tens of thousands of Autonomous Systems (ASes), each operated by ISPs, cloud providers, universities, and enterprises. BGP (Border Gateway Protocol) is the protocol that ties them together, the "routing protocol of the internet."

🗺️

Interior Routing (IGP)

OSPF and IS-IS route traffic within an AS. They build a complete topology map and compute shortest paths. OSPF uses Dijkstra's algorithm. Scale: hundreds to thousands of routers.

🌍

Exterior Routing (BGP)

BGP routes between ASes. It's a path-vector protocol, routers advertise which AS paths they can reach. Routing decisions consider AS path length, local preference, MED, community attributes, not just shortest path.

📡

Internet Exchange Points

IXPs are physical locations where networks interconnect and exchange traffic directly (peering) instead of through transit providers. DE-CIX Frankfurt exchanges 12+ Tbps. Massive latency and cost savings.

Anycast Routing

The same IP address announced from multiple locations. BGP routes you to the nearest instance. Used by DNS root servers, CDNs (Cloudflare announces 1.1.1.1 from 285+ cities). Automatic failover and geographic load balancing.

How Routers Make Decisions

// Simplified routing table (ip route show)
# Destination      Gateway          Interface  Metric
default           via 10.0.0.1   eth0       100     # 0.0.0.0/0, send unknown traffic to gateway
10.0.0.0/24       directly         eth0       0       # local subnet, deliver directly
172.16.0.0/12     via 10.0.0.254  eth0       10      # route to another network via router
192.168.100.0/24  via 10.0.0.10   eth1       5       # specific /24 wins over broader routes

# Longest prefix match wins:
# Packet to 192.168.100.55 matches /24 (more specific) over default /0
# This is the fundamental routing rule.
⚡ BGP Security Crisis

BGP has no built-in authentication. Any AS can announce any prefix, intentionally or accidentally. BGP hijacks have redirected internet traffic through hostile nations. RPKI (Resource Public Key Infrastructure) adds cryptographic validation to route origins, gradually hardening BGP against prefix hijacking.

// 08, Network Security: Attack Surfaces & Defenses

Every layer of the network stack is a potential attack surface. Understanding network security means knowing the attack patterns at each layer and the defenses that counter them.

🔴 Critical

BGP Hijacking

Malicious AS announces legitimate IP prefixes, redirecting global traffic. 2008: Pakistan Telecom took YouTube offline for 2 hours by accident.

🔴 Critical

DNS Cache Poisoning

Injecting forged DNS responses into resolver caches. Redirects users to attacker-controlled IPs. Mitigated by DNSSEC, randomized ports (Kaminsky fix).

🟠 High

DDoS Amplification

Abusing DNS/NTP/memcached to amplify bandwidth. Spoofed source IP targets victim. DNS amplification achieves 50x traffic multiplication. Mitigate with BCP38 (ingress filtering).

🟠 High

TLS Downgrade

MITM forces negotiation to weak cipher suites or older TLS versions. Mitigated by HSTS (HTTP Strict Transport Security) and disabling TLS 1.0/1.1.

🟠 High

ARP Spoofing / MITM

Poison ARP tables on local network to intercept traffic. Classic LAN attack. Mitigated by Dynamic ARP Inspection, 802.1X port auth, VPNs.

🟡 Medium

TCP SYN Flood

Attacker sends SYN packets with spoofed source IPs, exhausting server's half-open connection table. Mitigated by SYN cookies, rate limiting, DDoS scrubbing.

🟡 Medium

Rogue DHCP

Attacker's DHCP server hands out malicious gateway/DNS configs to network clients. Mitigated by DHCP snooping on managed switches.

🟢 Lower Risk

Port Scanning

Discovery phase attack (nmap). Reveals open services for further exploitation. Mitigated by firewalls, IDS/IPS, minimal exposed surface area.

Security Protocols by Layer

ProtocolLayerPurposeReplaces
TLS 1.3L5-6Transport encryption, auth, integritySSL, TLS 1.0/1.1/1.2
IPSecL3IP-layer encryption tunnel (VPN)Cleartext IP
WireGuardL3Modern VPN, minimal codebase (~4000 lines)OpenVPN, IPSec
DNSSECL7Cryptographic signatures on DNS recordsUnsigned DNS
DoH/DoTL7Encrypted DNS queriesPlaintext DNS (port 53)
802.1XL2Port-based network access controlOpen switch ports
RPKIRoutingCryptographic BGP route origin validationUnsigned BGP announcements
HSTSL7Force HTTPS, prevent downgradeOptional HTTPS redirect
// 09, The Complete Packet Journey

Let's trace a single HTTP request from start to finish, your browser requesting https://api.example.com/data. This is everything that happens, in order, from keystroke to response.

⌨️
URL Entered
Browser parses URL, extracts scheme, host, path
📋
DNS Lookup
Resolve api.example.com → IP (recursive query)
🤝
TCP Handshake
SYN → SYN-ACK → ACK to port 443
🔐
TLS Handshake
1-RTT key exchange, cert validation, session keys
📤
HTTP Request
GET /data encrypted, sent as TLS records
🛣️
Routing
BGP routes packets across ASes to destination
🛡️
Firewall
Stateful inspection allows established connection
📥
Response
Server sends 200 OK + data, encrypted, same path

Packet Structure at Each Layer

Each layer wraps the payload from above with its own header, this is encapsulation. Here's what a single HTTPS packet looks like at every layer:

Ethernet Frame
Dest MAC
6B
Src MAC
6B
EtherType
2B
IP Packet (payload)
FCS
4B
IP Packet
Ver+IHL
1B
DSCP
1B
Total Len
2B
TTL
1B
Proto
1B
Src IP
4B
Dst IP
4B
TCP Segment (payload)
TCP Segment
Src Port
2B
Dst Port
2B
Seq Num
4B
Ack Num
4B
Flags
2B
Checksum
2B
TLS Record (Application Data)
TLS Record
Type
1B
Version
2B
Length
2B
🔐 Encrypted HTTP Data (AES-256-GCM) + Auth Tag

Key Port Numbers to Know

PortProtocolServiceNotes
20/21TCPFTPFile transfer (unencrypted, use SFTP instead)
22TCPSSH / SFTP / SCPEncrypted shell access and file transfer
25TCPSMTPEmail submission (often blocked by ISPs)
53TCP/UDPDNSUDP for queries, TCP for zone transfers
80TCPHTTPUnencrypted web, should redirect to 443
123UDPNTPNetwork time sync (used in amplification attacks)
143 / 993TCPIMAP / IMAPSEmail retrieval (plain / SSL)
443TCPHTTPSEncrypted web, TLS 1.3
465 / 587TCPSMTPS / SubmissionEncrypted email sending
853TCPDNS over TLSEncrypted DNS queries
3306TCPMySQLShould NEVER be publicly exposed
5432TCPPostgreSQLSame, internal use only
6443TCPKubernetes APIK8s control plane
51820UDPWireGuard VPNModern VPN protocol
🔭 Final Insight

The internet's resilience comes from its design philosophy: no single point of control, no single point of failure. Packets route around damage. DNS distributes across thousands of servers. BGP self-heals. But this same decentralization makes security hard, there's no central authority to enforce rules. Every layer's security must be independently justified, layered, and maintained. Defense in depth is not a strategy; it's a necessity.

About the Author
🏗️
Publishing
// Author
Barnabas Waweru
Systems Architect · Founder of The Deep Family

Barnabas is a systems thinker and technical writer obsessed with understanding how things work at the architectural level, not just what to use, but why it's built the way it is and what trade-offs were made along the way.

He created The Architecture DeepDive to document the technical explorations that most documentation skips, tracing execution paths, mapping system boundaries, and exposing the design decisions hidden beneath every abstraction. Beyond the articles, he is building The Deep Family, 16 interconnected technical content brands, each exploring a distinct dimension of building reliable, scalable systems.

Systems Architecture Networking Distributed Systems Security Protocols Technical Writing
16
Deep Brands
2+
Deep Dives
Layers to Explore
0→
Building in Public
📡 The Architecture DeepDive 🌐 The Deep Family 𝕏 Twitter / X
About the Author
🏗️
// Author
Barnabas Waweru
Systems Architect · Founder of The Deep Family

Deep technical explorations of software architecture, AI systems, networking protocols, and the engineering decisions that power the systems we depend on every day.

All Articles Contact
// Comments
0 comments
// Leave a comment
Your email is never published. Comments are moderated.
💬
No comments yet. Be the first to start the conversation.