My Networking Learning Journey 3: Clients, Servers and Wireless Connectivity

Introduction

As I deepen my DevOps knowledge, networking fundamentals are proving to be one of the most essential building blocks. Whether it's about setting up infrastructure, managing cloud environments, or ensuring system reliability, having a solid grasp of how devices communicate over networks is critical. This post continues my journey through the basics — covering client-server architecture, key network components, ISP connectivity, and the various ways mobile and wireless devices stay connected.


Clients and Servers

Devices connected to a network are referred to as hosts. These hosts can both send and receive data. Depending on the installed software, a machine can act as a client, a server, or even both simultaneously.

Typically, in larger networks or enterprise environments, client and server applications run on separate machines. However, in smaller setups like home networks or small businesses, it’s common to have one device act as both a client and a server. This leads us to a concept known as peer-to-peer networking (P2P).

In a peer-to-peer network, hosts communicate directly with each other and share resources without relying on a centralized server. This setup is relatively easy to configure, inexpensive, and can be perfect for simple tasks like file sharing, sharing printers, or using common storage.

But there's a tradeoff: P2P networks generally lack centralized management, are harder to secure, and are not easily scalable. They can also become slow or unreliable when handling larger workloads. That’s why larger organizations rely on dedicated servers that can manage higher traffic, provide better performance, and enforce security policies.


Network Components

Network infrastructure—the backbone that supports any network—consists of various components, each represented by standard symbols in diagrams. These components fall into three primary categories:

  • End devices

  • Intermediate devices

  • Network media

These elements, especially hardware, form the visible part of a network platform. Examples include laptops, PCs, servers, switches, routers, wireless access points (APs), and the cabling that connects them. Some media, like wireless signals, are invisible but just as crucial.

End devices—also called hosts—are the interfaces between users and the underlying communication network. Examples of end devices include:

  • Desktop and laptop computers

  • Servers

  • Network printers

  • IP phones

  • Cameras

  • Mobile devices

These devices either initiate communication or are the destination for network traffic.

Intermediate devices, such as routers and switches, manage the flow of data within the network. They determine the best path for data to travel and help maintain an efficient, reliable network.

Network media refers to the actual pathways data travels through—cables, fiber optics, or wireless signals.


ISP Connectivity

An ISP, or Internet Service Provider, is a company that provides Internet access to individuals, homes, and businesses. ISPs may operate their own infrastructure (like fiber-optic networks or telephone lines), or they may lease bandwidth from other providers.

ISPs connect with each other in a vast, hierarchical structure designed to move data across the globe efficiently. This interconnected web forms the backbone of the Internet, a global system of high-speed fiber-optic cables, advanced routers, and powerful switches.

For home users, connecting to an ISP is usually straightforward. Most households use an integrated wireless router, which connects to the ISP and provides both wired and wireless access to end devices.

This home router typically combines:

  • A switch for wired device connections

  • A wireless access point (AP) for mobile and Wi-Fi-enabled devices

  • A built-in DHCP server for assigning IP addresses to local clients

  • Basic firewall and NAT functions for security

The most common methods of home connectivity are cable and DSL (Digital Subscriber Line). However, there are alternatives like mobile broadband (4G/5G), satellite connections, or even traditional dial-up (which is rare but still exists in some remote areas).


Wireless Networks

Mobile phones use radio waves to transmit voice signals to nearby cell towers. During a call, the signal is handed off between towers until it reaches the recipient’s phone. The same concept powers SMS messaging.

The most widespread mobile network standard is GSM, with its various evolutions — 3G, 4G, 4G LTE, and 5G — each offering improved data transfer speeds. Today, 4G still dominates in most regions, although 5G is quickly expanding.

But mobile phones don’t rely solely on GSM. They use multiple wireless technologies to stay connected:

Wi-Fi

Most smartphones have built-in Wi-Fi radios that allow them to connect to local wireless networks and the internet. While many networks are private, public Wi-Fi hotspots are also common — providing guest access in places like cafes, hotels, and libraries.

Bluetooth

Bluetooth is a low-power, short-range wireless protocol used to connect peripheral devices such as:

  • Wireless keyboards and mice

  • Headphones and speakers

  • Car infotainment systems

  • Smartwatches and fitness bands

Bluetooth is ideal for pairing multiple devices with minimal energy consumption.

NFC (Near Field Communication)

NFC is a very short-range wireless technology — typically operating within a few centimeters. It’s commonly used in:

  • Contactless payments (e.g., Apple Pay, Google Pay)

  • Access cards and transit passes

  • Device-to-device sharing


Mobile Device Connectivity and Security

Almost all mobile devices can connect to Wi-Fi.

The two most widely used mobile operating systems are Android and iOS. Devices are typically configured to prioritize Wi-Fi over cellular networks whenever possible — provided they can successfully connect and receive an IP address.

Bluetooth offers a convenient way to pair mobile devices with accessories. The pairing process involves one device searching for nearby devices, and the other being in discoverable mode. Once discovered, the device shares key metadata:

  • Device name

  • Bluetooth class

  • Supported services

  • Technical specs

In many cases, a PIN code is required to authenticate the pairing and establish trust between the devices.


Conclusion

Wireless technologies aren’t just convenient — they’re essential in today’s mobile, connected world. As I continue my networking journey, learning how different devices interact over Wi-Fi, Bluetooth, NFC, and cellular networks gives me a much stronger grasp of real-world systems. These foundational concepts not only clarify the "how" of connectivity but also prepare me for digging deeper into networking layers, protocols, and infrastructure design in future stages of my DevOps path.

0
Subscribe to my newsletter

Read articles from Przemysław Kozłowski directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Przemysław Kozłowski
Przemysław Kozłowski