upgrade
upgrade

📢Communication Technologies

Components of Network Infrastructure

Study smarter with Fiveable

Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.

Get Started

Why This Matters

Network infrastructure is the backbone of every communication system you'll encounter on this exam—and in the real world. When you understand how routers direct traffic, how switches create efficient local connections, and how firewalls protect data, you're not just memorizing hardware names. You're learning the architecture of modern communication, from the physical cables carrying signals to the software managing millions of simultaneous connections.

The exam will test your ability to explain how data moves through a network, why certain components are chosen for specific tasks, and how the OSI model layers connect to real hardware. Don't just memorize what each device does—know which layer it operates on, what problem it solves, and how it compares to similar components. That's the difference between recognizing a term and actually understanding network design.


Traffic Direction and Routing

These components determine where data goes. They make decisions about paths, destinations, and how to get packets from point A to point B across potentially vast networks.

Routers

  • Directs data packets between different networks—the traffic cop of the internet, determining the best path for each packet to reach its destination
  • Connects local networks to the internet and manages traffic flow to prevent congestion across network boundaries
  • Operates at Layer 3 (Network Layer) and often includes built-in firewall protection and VPN support for added security

Gateways

  • Translates between networks using different protocols—acts as an interpreter when two incompatible network architectures need to communicate
  • Operates across multiple OSI layers depending on the translation required, from data formats to communication protocols
  • Provides protocol conversion that routers alone cannot handle, essential for connecting legacy systems to modern networks

Bridges

  • Connects two or more network segments into a single logical network, extending reach without creating entirely separate networks
  • Operates at Layer 2 (Data Link Layer) and filters traffic based on MAC addresses to reduce unnecessary data transmission
  • Reduces collisions by intelligently forwarding only relevant traffic between segments, improving overall network performance

Compare: Routers vs. Gateways—both connect different networks, but routers work with compatible protocols while gateways translate between incompatible ones. If an exam question mentions "different protocols" or "legacy systems," think gateway.


Local Network Connectivity

These devices handle communication within a single network. They're about connecting devices in the same location and managing how they share the network medium.

Switches

  • Connects devices within the same network and directs traffic only to the intended recipient using MAC addresses
  • Operates at Layer 2 (Data Link Layer), though Layer 3 switches can also perform routing functions
  • Creates separate collision domains for each port, dramatically improving efficiency over older hub technology

Hubs

  • Broadcasts all data to every connected device—a simple, "dumb" device that doesn't filter or direct traffic
  • Operates at Layer 1 (Physical Layer) with no intelligence about addressing or traffic management
  • Largely obsolete due to inefficiency; creates a single collision domain where all devices compete for bandwidth

Network Interface Cards (NICs)

  • Hardware that physically connects a device to the network—every networked computer, printer, or server needs one
  • Converts data into transmittable signals appropriate for the network medium (electrical for Ethernet, radio for Wi-Fi)
  • Contains a unique MAC address that identifies the device at Layer 2, enabling switches to direct traffic properly

Compare: Switches vs. Hubs—both connect local devices, but switches send data only to the intended recipient while hubs broadcast everything to everyone. Switches are intelligent (Layer 2); hubs are not (Layer 1). This is a classic exam distinction.


Signal Extension and Wireless Access

These components solve the problem of physical limitations—extending network range, converting between wired and wireless, and bridging different transmission media.

Wireless Access Points (WAPs)

  • Extends wired networks into wireless coverage—acts as a bridge between Ethernet infrastructure and Wi-Fi devices
  • Supports multiple simultaneous wireless connections and can provide coverage across large physical areas
  • Operates at Layer 2 and uses radio frequencies to communicate with wireless NICs in laptops, phones, and IoT devices

Repeaters

  • Regenerates and amplifies network signals to extend transmission distance beyond cable or wireless limitations
  • Operates at Layer 1 (Physical Layer) with no data interpretation—simply boosts the signal strength
  • Does not filter traffic or make routing decisions; purely extends physical reach of the network medium

Modems

  • Converts between digital and analog signalsmodulates digital data for transmission and demodulates incoming analog signals back to digital
  • Essential for internet connectivity over telephone lines, cable systems, or DSL infrastructure
  • Often integrated with routers in consumer devices, combining signal conversion with traffic management in one unit

Compare: WAPs vs. Repeaters—both extend network range, but WAPs bridge wired-to-wireless (Layer 2 intelligence) while repeaters simply amplify existing signals (Layer 1, no intelligence). Know which solves which problem.


Physical Transmission Media

The actual cables that carry data. Understanding their characteristics explains why networks are designed the way they are—speed, distance, and interference resistance all matter.

Ethernet Cables

  • Standard copper cabling for wired LANs—transmits data as electrical signals through twisted copper wire pairs
  • Categorized by performance: Cat5e supports up to 1 Gbps, Cat6 supports up to 10 Gbps at shorter distances
  • Limited by distance (typically 100 meters maximum) and susceptible to electromagnetic interference from nearby electrical sources

Fiber Optic Cables

  • Transmits data as light pulses through glass or plastic fibers, enabling extremely high-speed communication
  • Superior bandwidth and distance—can transmit data kilometers without signal degradation, far exceeding copper limitations
  • Immune to electromagnetic interference, making fiber ideal for high-security, high-performance, or electrically noisy environments

Compare: Ethernet vs. Fiber Optic—both carry network data, but Ethernet uses electrical signals (cheaper, shorter range, interference-prone) while fiber uses light (faster, longer range, interference-immune). Cost vs. performance is the key tradeoff.


Security and Access Control

These components protect networks from threats and control what traffic is allowed in or out. Security isn't optional—it's built into modern infrastructure.

Firewalls

  • Monitors and filters traffic based on security rules, blocking unauthorized access while permitting legitimate communication
  • Protects against cyber threats including unauthorized access attempts, malware, and suspicious traffic patterns
  • Available as hardware, software, or hybrid solutions—hardware firewalls protect entire networks; software firewalls protect individual devices

Performance and Resource Management

These components ensure networks can handle heavy loads efficiently, distributing work and providing centralized services to multiple users.

Servers

  • Centralized computers providing resources to clients—hosts applications, websites, databases, and shared files across the network
  • Higher specifications than standard computers with increased processing power, RAM, and storage to handle multiple simultaneous requests
  • Foundation of client-server architecture, the dominant model for networked applications and services

Load Balancers

  • Distributes traffic across multiple servers to prevent any single server from becoming overwhelmed during high demand
  • Operates at Layer 4 (Transport) or Layer 7 (Application) depending on how sophisticated the traffic distribution needs to be
  • Increases reliability and availability—if one server fails, traffic automatically routes to healthy servers

Compare: Servers vs. Load Balancers—servers provide the actual resources and processing power, while load balancers distribute requests across multiple servers. One does the work; the other manages the workload.


Network Operating Systems

Software that ties everything together, managing hardware resources and enabling network communication at scale.

Network Operating Systems

  • Software managing network resources and communication—coordinates file sharing, user authentication, and security protocols
  • Provides centralized administration for user accounts, permissions, and network policies across all connected devices
  • Major examples include Windows Server, Linux distributions, and legacy systems like Novell NetWare, each with distinct management approaches

Quick Reference Table

ConceptBest Examples
Traffic routing between networksRouter, Gateway, Bridge
Local device connectivitySwitch, Hub, NIC
Layer 1 (Physical) devicesHub, Repeater, NIC
Layer 2 (Data Link) devicesSwitch, Bridge, WAP
Layer 3+ devicesRouter, Gateway, Load Balancer
Signal/range extensionRepeater, WAP, Modem
Physical transmission mediaEthernet Cable, Fiber Optic Cable
Security componentsFirewall
Performance optimizationLoad Balancer, Server

Self-Check Questions

  1. Which two devices both operate at Layer 2 but serve different primary purposes—one for local connectivity and one for extending network segments?

  2. Compare and contrast hubs and switches: What OSI layer does each operate at, and why are switches considered more efficient?

  3. If a network needs to connect two systems using completely different communication protocols, which component would you choose—a router or a gateway? Explain why.

  4. A company needs to extend their wired office network to support employees with laptops moving between conference rooms. Which component solves this problem, and at what OSI layer does it operate?

  5. An FRQ asks you to design a high-traffic web application infrastructure. Which two components from this guide would you combine to ensure both resource availability and protection from unauthorized access? Explain how they work together.