Skip to content

Connecting to the Internet

TechnologyMediumSpeedStill Used?
Dial-upPhone line (PSTN)Up to 56 KbpsRare - only in very rural areas
DSLPhone line (copper)1-100 MbpsYes, declining
CableCoaxial cable10-1000 MbpsYes, very common
Fiber (FTTP)Fiber optic100 Mbps - 10 GbpsYes, growing rapidly
T1 / T3Dedicated copper1.5 / 45 MbpsLegacy business lines
SatelliteRadio waves10-100 MbpsRural / remote areas
Cellular (4G/5G)Radio waves10 Mbps - 1+ GbpsYes, everywhere

The first home internet connections used the Public Switched Telephone Network (PSTN) - the same lines used for phone calls. A modem (modulator/demodulator) converted digital data into audible tones for transmission over voice lines.

  • Baud rate = bits per second over the phone line
  • Maxed out at 56 Kbps (1990s standard)
  • Tied up the phone line during use - no simultaneous calls
  • Usenet (1979, Duke University) was one of the first services to use dial-up networking

DSL also uses phone lines but operates at higher frequencies that don’t interfere with voice calls - so you can talk and browse simultaneously.

TypeUpload / DownloadMax SpeedUse Case
ADSL (Asymmetric)Upload slower than download~24 Mbps down / 3.5 Mbps upHome users (browsing, streaming)
SDSL (Symmetric)Equal upload and download~1.5 Mbps each wayBusinesses (hosting, VoIP)
VDSL (Very High Bitrate)Asymmetric, much faster~52 Mbps down / 16 Mbps upCloser to DSLAM required
  • DSLAM (Digital Subscriber Line Access Multiplexer) = the ISP-side equipment that aggregates DSL connections
  • Speed degrades with distance from the DSLAM

Cable internet piggybacks on the coaxial cable infrastructure originally built for cable TV. It uses frequency bands that don’t interfere with TV signals.

  • Shared bandwidth model - you share cable bandwidth with neighbors until the signal reaches the ISP’s CMTS (Cable Modem Termination System)
  • Speeds can slow during peak usage hours
  • DOCSIS (Data Over Cable Service Interface Specification) is the standard that defines cable internet speeds - DOCSIS 3.1 supports up to 10 Gbps downstream

Fiber uses light pulses through glass strands. It’s the fastest, most reliable consumer technology available.

Fiber

TypeFiber reaches…Last mileSpeed
FTTN (Fiber to the Neighborhood)Street cabinetCopper to homes25-100 Mbps
FTTB (Fiber to the Building)Building basementCopper inside building100-500 Mbps
FTTH / FTTP (Fiber to the Home/Premises)Your homeAll fiber1-10 Gbps
  • ONT (Optical Network Terminator) is the demarcation point - converts fiber protocols to Ethernet for your LAN
  • Fiber doesn’t degrade over distance like copper and is immune to electromagnetic interference

LineCapacitySpeedHow
T124 channels x 64 Kbps1.544 MbpsTwisted pair copper, dedicated
T3 (DS3)28 multiplexed T1s44.736 MbpsDedicated, expensive

Originally designed by AT&T to carry multiple phone calls over a single cable. Later repurposed for data. Mostly replaced by fiber and cable, but still found in some legacy business installations.


A WAN (Wide Area Network) connects geographically separated LANs. When a business has offices in different cities, a WAN links them together.

Office A (LAN) Office B (LAN)
│ │
[WAN Router] [WAN Router]
│ │
─── Local Loop ───┐ ┌─── Local Loop ───
│ │
┌─────┴────┴─────┐
│ ISP Core │
│ Network │
└────────────────┘
  • Demarcation point = where your network ends and the ISP’s begins
  • Local loop = the connection between your demarcation point and the ISP’s core network
  • WAN router (also called edge/border router) = sits at the boundary, has both a WAN interface (modem) and a LAN interface (Ethernet)

WAN Protocols

ProtocolLayerHow it worksStatus
PPP (Point-to-Point)Data LinkByte-oriented protocol for direct device-to-device links. Supports authentication (PAP/CHAP), compression, error detection.Still used (DSL)
PPPoE (PPP over Ethernet)Data LinkPPP frames encapsulated in Ethernet frames. Common for DSL connections.Common
Frame RelayData Link / PhysicalPacket switching over PVCs (permanent) or SVCs (temporary). Low overhead.Legacy
ATMData LinkFixed-size 53-byte cells. Good for real-time traffic.Legacy
MPLSBetween L2/L3Label-based switching - short labels instead of full IP lookups. Fast path forwarding.Widely used by ISPs
TechniqueWhat it does
CompressionReduce data size before transmission
DeduplicationStore one copy of repeated files, use pointers
Traffic shapingPrioritize important traffic (bandwidth throttling, rate limiting, QoS classification)
Local cachingStore frequently accessed files locally
Protocol optimizationTune protocols for high-bandwidth, low-latency needs

SD-WAN vs Traditional WAN

Software-Defined WAN (SD-WAN) is a software overlay that simplifies WAN management:

AspectTraditional WANSD-WAN
CostExpensive dedicated linesUses cheaper internet links
ManagementHardware-centric, manual configSoftware-defined, centralized
FlexibilityRigid topologyDynamic path selection
Cloud accessBackhauled through data centerDirect cloud on-ramp

Wi-Fi operates on radio waves in specific frequency bands. The IEEE 802.11 standards define how devices communicate wirelessly.

StandardWi-Fi NameYearFrequencyMax SpeedKey Feature
802.11bWi-Fi 119992.4 GHz11 MbpsFirst widely adopted
802.11aWi-Fi 219995 GHz54 MbpsHigher speed, shorter range
802.11gWi-Fi 320032.4 GHz54 MbpsBackward compatible with b
802.11nWi-Fi 420092.4 / 5 GHz600 MbpsMIMO, channel bonding
802.11acWi-Fi 520145 GHz6.9 GbpsMU-MIMO, 160 MHz channels
802.11axWi-Fi 620192.4 / 5 GHz9.6 GbpsOFDMA, TWT, WPA3 required
802.11axWi-Fi 6E20202.4 / 5 / 6 GHz9.6 GbpsNew 6 GHz band, more channels

2.4 GHz vs 5 GHz vs 6 GHz

BandRange (indoor)ChannelsPenetrationIssues
2.4 GHz~45m (150 ft)11-14 (only 3 non-overlapping: 1, 6, 11)Best - passes through wallsCrowded, interference from Bluetooth/microwaves
5 GHz~12m (50 ft)25+ non-overlappingModerateLess interference, shorter range
6 GHz~12m (50 ft)59 channels (14 x 80MHz, 7 x 160MHz)LowerWi-Fi 6E only, very clean spectrum

Wi-Fi 6 Key Technologies

TechnologyWhat it does
OFDMASplits channels to serve multiple devices simultaneously (vs one at a time)
MU-MIMOMultiple antennas serve multiple clients in parallel (8x8 streams)
TWT (Target Wake Time)Devices sleep when not transmitting - saves battery for IoT
1024-QAMMore data per transmission symbol (25% throughput increase)
BSS ColoringReduces interference from neighboring networks

802.11 Frame Structure

An 802.11 wireless frame has more address fields than Ethernet because wireless communication involves access points as intermediaries:

FieldSizePurpose
Frame Control2 bytesFrame type, version, flags
Duration2 bytesHow long the channel will be reserved
Address 1 (Destination)6 bytesDestination MAC
Address 2 (Source)6 bytesSource MAC
Address 3 (Receiver)6 bytesAccess point MAC (for infrastructure mode)
Address 4 (Transmitter)6 bytesUsed in mesh/WDS mode
Sequence Control2 bytesFragment and sequence numbers
Data Payload0-2304 bytesActual data
FCS4 bytesCRC checksum

TypeDescriptionUse Case
InfrastructureDevices connect through access points (most common)Offices, homes
Ad-hocDevices connect directly peer-to-peer, no AP neededQuick file sharing, disaster relief
MeshDevices relay for each other, self-healing if a node failsLarge coverage areas, smart home

Channels are specific frequency slices within a band. Overlapping channels cause interference.

2.4 GHz Band - 14 channels, only 3 non-overlapping:
Ch 1 Ch 6 Ch 11
├──────┤ ├──────┤ ├──────┤
2412 MHz 2437 MHz 2462 MHz
Use channels 1, 6, and 11 for multi-AP deployments
to avoid co-channel interference
Terminal window
# Scan available wireless networks and their channels
sudo iwlist wlan0 scan | grep -E "ESSID|Channel|Signal"
# Check your Wi-Fi interface details
iw dev wlan0 info
# See which channel you're on
iwconfig wlan0
# On macOS
/System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport -s

Wireless signals broadcast through the air - anyone in range can potentially intercept them. Encryption is essential.

Wireless Security

ProtocolYearEncryptionKey SizeStatus
WEP1997RC440/104 bitBroken - crackable in minutes. Never use.
WPA2003TKIP (RC4-based)128 bitDeprecated - vulnerabilities found
WPA22004AES-CCMP128/256 bitStandard - still widely used
WPA32018AES-GCMP-256192/256 bitLatest - recommended for new deployments

WPA3-Personal:

  • SAE (Simultaneous Authentication of Equals) replaces the PSK 4-way handshake - resistant to dictionary attacks and KRACKs
  • Forward secrecy - even if your password is later compromised, previously captured traffic can’t be decrypted
  • More resistant to offline brute-force attacks

WPA3-Enterprise:

  • GCMP-256 encryption (stronger than WPA2’s 128-bit AES-CCMP)
  • OWE (Opportunistic Wireless Encryption) - encrypts open network traffic (coffee shop Wi-Fi)
  • DPP (Device Provisioning Protocol) - QR code / NFC-based setup replaces WPS
  • 384-bit HMAC-SHA for message integrity
  • ECDHE/ECDSA for faster, more secure key exchange
  • MAC filtering - whitelist specific MAC addresses on the access point. Adds a layer but is easily spoofed.
  • SSID hiding - stops broadcasting the network name. Security through obscurity - doesn’t stop determined attackers.
  • 802.1X / RADIUS - enterprise authentication where each user has unique credentials (not a shared password)
Terminal window
# Check your wireless security protocol
iw dev wlan0 info
# type: managed
# channel: 36 (5180 MHz)
# See connected network security details
nmcli device wifi show-password
# Scan for nearby networks and their security
nmcli device wifi list
# SSID SECURITY CHAN SIGNAL
# MyNetwork WPA2 6 85
# CoffeeShop -- 1 72 <-- OPEN! Avoid or use VPN

Cellular networks divide geographic areas into cells, each served by a cell tower that broadcasts and receives radio signals.

GenerationSpeedKey Feature
2G (GSM)Up to 50 KbpsFirst digital voice + SMS
3GUp to 2 MbpsMobile internet, video calls
4G LTEUp to 100 MbpsStreaming, modern mobile apps
5GUp to 10+ GbpsUltra-low latency, IoT, AR/VR
  • Adjacent cells use non-overlapping frequency bands to avoid interference (same concept as Wi-Fi channels 1, 6, 11)
  • Cell towers are like wireless access points but with much larger range (kilometers vs meters)
  • Beyond phones: tablets, laptops, cars, IoT sensors, and industrial equipment use cellular connections

Path of a Packet