Dissecting Components of Network Spiking Activity