After completing these activities, you should be able to:
As we've learned so far about the TCP/IP Stack, data primarily originate from the user through an application, thus starting at the top of the stack.
The Physical layer governs the physical transmission and reception of signals across various media.
It deals with electrical, mechanical, and procedural aspects of interfacing with physical media, ensuring the reliable transmission and receipt of data between devices. This includes:
Wireless Technologies: Short-range (Bluetooth, Wi-Fi, etc.), mid-range (mobile phone LTE, 5G, etc.), and long-range (microwave, satellite communications (SATCOM), and HF and lower-band military data communications, etc.) wireless communication technologies expand network accessibility without the constraints of physical cables, enabling mobility and flexibility in connectivity.
Signal Encoding and Multiplexing: Methods like Non-Return to Zero (NRZ) and Time-Division, Frequency-Division, and Code-Division Multiplexing (TDM, FDM, and CDM) optimize data transmission efficiency, crucial for both wired and wireless communications.
data, as of Sept 2023. Courtesy of Telegeography.
The first lab in this class introduced you to Computer Architecture, disassembling and reassembling a computer. This lab intended to expose you to the physical components of a computer system to make the connection with the observable properties, materials, and components that are not often associated when primarily working within the logical layer of the cyberspace model. This class intends to reveal the physical infrastructure required to support data networks but to also gain an appreciation for the physical aspects required for interconnecting billions of people and systems globally.
Encoding methods used to translate signaling, such as Non-Return to Zero (NRZ), where voltage is used for representing logical 1's or 0's as depicted in the diagram on the right. In addition, multiple access techniques rely on timing as a crucial component to be able to leverage efficient use of resources while allowing multiple systems to transmit and receive. Military communications systems, such as Link-16, uses Time-Division Multiple Access (TDMA) to allow platforms to simultaneously communicate at the same time by allocating time slots to systems.
Wires. One of the obvious signs of physical connectivity consists of the wires and cables used to transport data. Many organizations have to maintain and organize tens of thousands of cables, if not more, that feed data centers. Those cables likely originate from a desktop computer, plugged into a wall that goes to a data closet containing several network devices. The data closet, often referred to as an Intermediate Distribution Feed (IDF), may then go into a room within the building that is a central location that connects multiple floors and feeds into a data center somewhere on campus that connects multiple buildings. While most of the cables are likely copper, fiber can be used to increase bandwidth between buildings that require larger throughput. Before twisted-pair cable became popular (decades ago), you would find Ethernet primarily on coaxial cable in a bus topology. In the United States, cable television connects into homes typically using coaxial cables; some newer installations use fiber optic cables.
Signals in wired communications can take one of two forms. If in a conductive medium, like copper wires, the Physical layer encodes 0s and 1s as varying voltages. If in a fiber optic medium, the Physical Layer encodes 0s and 1s as variations in the wavelength, amplitude, and/or frequency of the light (usually visible or ultraviolet) waves. In both cases, attenuation (loss of signal strength as it travels through a medium) can be a concern for reliably receiving the transmitted signal.
Specifications for the use of Ethernet identify wiring diagrams and use of the four-pair when terminating RJ-45 standard connections as part of the Physical Layer. Over time, standards have improved data rates from original Ethernet (10Mbps) to Fast Ethernet (100Mbps) and more recently with advancements in Gigabit Ethernet (GbE) (1Gbps) up to speeds as fast as 100 GbE. This is possible through improvements and standards using copper cabling from Category (Cat) 4 types that supported Fast Ethernet to Cat8 that can go up to 40Gbps. The Content Addressable Memory (CAM) tables stored within network devices and communications using MAC addresses use Ethernet Framing standards for IP and Address Resolution Protocol (ARP) when interacting with the Networking Layer.
Wireless.
Standards that identify short range wireless communications may be some of the familiar everyday technologies that are used, such as cellular, Near Field Communications (NFCs), Bluetooth, Wireless Fidelity (Wi-Fi), and Radio Frequency Identity (RFID) with other not-so-common ones like Z-Wave, ZigBee, Ultra Wide Band (UWB), and IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). The Institute of Electrical and Electronics Engineers (IEEE) outlines standards for the development and specifications for manufactures to adhere to, publishing Wireless Personal Area Networks (WPANs) under the 802 series like Bluetooth (802.15.1), Wi-Fi (802.11), and ZigBee (802.15.4), while 6LoWPAN is published under the Internet Engineering Task Force (IETF) Request for Comment (RFC) 8025. You can thank the IEEE for the Bluetooth enabled headphones and speakers you're working out to in the gym or the track! Characteristics of short range wireless communications include low power output, use of Industrial, Scientific, and Medical (ISM) non-licensed frequency ranges, and compact components that are low cost and convenient for applications across household, commercial, and industrial use.
Traditional Long range wireless communication technologies consist of RF, microwave, and laser-based communications but the forefront of implementing a truly interconnected world is dependent on deploying end-to-end solutions to the masses. Long-Term Evolution (LTE) Machine (LTE-M) Type Communications, Narrowband Internet of Things (NB-IoT), Fifth Generation (5G) mobile network technology, and the Low Power, Wide Area (LPWA) networking protocols will enable endpoint nodes that will build and interconnect smart cities, connected health, smart metering, automotive transportation, vending monitoring, and environmental remote sensing applications at cost and scale.
Although many of the newly established standards for enabling Internet of Things (IoT) and mesh networks are important, the older infrastructure still provides vital services, such as the Global Positioning System (GPS) for timing, weather satellites for identifying and tracking natural disasters, Search and Rescue (SAR) communications, and other on-orbit sensors that provide for national security and defense. Threats in the space domain have been heightened with increased access to commercial and privatization of space launch capabilities, which is a great benefit for reducing cost and providing advancements in technological opportunities but has also created intentional and unintentional conflicts throughout the international community. The RF communications space systems are dependent on are increasingly vulnerable to interference and disruption, impacting availability to services leveraged by global economies.
Some of the most basic physical layer devices include repeaters, transceivers, media converters, and hubs.
Repeaters reconstruct, amplify, and rebroadcast electrical signals, which can attenuate (e.g., lose signal strength and fidelity) as they travel across long distances.
Transceivers are physical devices capable of receiving and transmitting a signal.
Media converters convert raw data between physical mediums, such as converting fiber optic communications (a light signal) into electrical signals.
Hubs are physical layer devices with multiple ports, and will redistribute a signal from one port to all other ports. While they have practical uses, by blindly retransmitting signals to all other ports, hubs have no confidentiality and are inefficient, reducing availability.
The Internet backbone consists of many devices that enable the reliable transmission of signals across physical territory. Signal loss and degradation due to environmental conditions, attenuation, thermal conditions generated from energy, and network distribution all contribute to impacts to the physical layer.
Devices that reconstruct an electrical signal due to attenuation may include wired and wireless repeaters.
For example, many consumer household products are available to extend WiFi signals throughout the home. For commercial use, 100 meters is the maximum distance for copper wiring and repeaters are necessary to extend signals.
Termination points within data closets may have to convert one medium to another using media converters and transceivers. Fiber optic cables allow long-distance communications, eliminating the need for repeaters because signal attenuation is not as impacted when using lasers or Light Emitting Diodes (LEDs); however, computer systems containing Integrated Circuits are made of metals and not fiber optics, therefore, transceivers need to convert a light signal to an electrical signal at the termination point. Transceivers are also used in wireless communications, containing both transmitter and receiver in a single device.
Expanding network connections can be possible with the use of hubs, which are physical layer devices that distribute signals across all other ports. Hubs will have a limited number of ports because of increased likelihood of collisions, which occur when two devices try to transmit at the same time on the same shared medium. For example, five devices connected through a five-port hub must take turns transmitting because they all share the same medium. There is no confidentiality, like a switch would provide, and network efficiency is bad compared to a switch that separates these collision domains.
Cybersecurity physical requirements extend beyond the physical components that allow devices to operate and intercommunicate with other systems. This includes protection from the physical elements of the external environment, such as weather effects, natural disasters, and Ultra-Violet (UV) degradation from the sun's rays. Fencing, gates, vehicle barriers, and controls for people and wildlife need to be taken into consideration. To defend against many of the external elements, hardening of external structures is just as important when considering internal structures. Keeping the natural elements out requires the proper control of the environment inside, from Heating, Ventilation, and Air Conditioning (HVAC), to fire suppression, grounding, and more.
Everything we've covered so far in the Gmail scenario occurs inside devices. We've covered the how the Application Layer provides services, the Transport Layer connects these services end-to-end, the Network Layer provides connectivity from one network device to another across multiple network hops, and the Data Link layer connects devices within a local-area network (LAN). Now, we take one step deeper into the TCP/IP Stack by exploring how the Physical Layer conveys data.
Unlike the previous descriptions that have described each step at each layer in moderate detail, we take a different approach for the Physical Layer. First, know that encoding the 0s and 1s onto each of physical links in the diagram follow the conventions described above. Because we do not know the exact physical characteristics (and they may change occasionally) of the many devices in the paths shown, we can abstract and generalize them. (Remember, this is a benefit of the TCP/IP Stack, that each layer has some independence from the other layers.) Second, we follow the physical paths of the application-layer data rather than accounting for what happens at each step. Because our diagram is relatively wide, you may need to scroll to see its right end.
Note that we've gotten to the point at which the Gmail web server has received our first HTTPS request. Now, it's the Gmail web server's turn to respond to your laptop's HTTPS request. Can you figure out how the HTTPS response gets from the Gmail web server's application layer to your laptop's application layer?
As you learned when building your own web sites, your browser will need to send an additional HTTPS request for each additional element, and for each of those additional elements that are not at mail.google.com, your laptop will need to send another DNS query to resolve each other server's IP address. Amazingly, all this happens in a fraction of a second!