0% found this document useful (0 votes)
68 views7 pages

Physical Network Layer of The Cyber Domain

The document discusses the physical network layer of the cyber domain, detailing how home devices like smartphones, laptops, and smart appliances connect to larger networks via ISPs or cellular providers. It identifies three main threats to these connected devices: physical threats, 5G-based swarm attacks, and computer viruses. Additionally, it highlights the significance of physical borders in cyberspace, emphasizing how different countries manage their data and cyberspace laws, which can create virtual borders affecting information flow.

Uploaded by

mansoorsyed241
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views7 pages

Physical Network Layer of The Cyber Domain

The document discusses the physical network layer of the cyber domain, detailing how home devices like smartphones, laptops, and smart appliances connect to larger networks via ISPs or cellular providers. It identifies three main threats to these connected devices: physical threats, 5G-based swarm attacks, and computer viruses. Additionally, it highlights the significance of physical borders in cyberspace, emphasizing how different countries manage their data and cyberspace laws, which can create virtual borders affecting information flow.

Uploaded by

mansoorsyed241
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Illustrate how you are connected to the physical network layer of the cyber domain.

 Identify the devices in your home that are connected to a network, such as your
phone, computers, or other networked devices.
 Briefly explain how those devices are connected to a larger network, such as a
cellular provider or ISP.
 Research and list at least 3 threats to you and your connected networks.

Answer and explanations

Physical Network Layer

 The physical network comprises the cables such as twisted pairs, fibre optic, coaxial
cable, and telephone lines.
 The cables link the network's various components, as well as the adapters used on
networked computers that are hosts, and any repeaters, routers, concentrators, or
bridges.
 The physical network layer describes the physical features of the network's
hardware.
 Example: The physical network layer provides the physical properties of the
communications channel. TCP/IP physical layer covers hardware specifications
like IEEE 802.3, which specifies RS-232, and Ethernet network media, which
specifies standard pin connections.

Step-by-step explanation

Physical-Network Layer of The Cyber Domain

 The cyber domain can be said as a network architecture comprised of both physical
and networks components.
 These physical and networks components are connected to the system or computer.
 In simple words, with the help of users, software and devices will make up the cyber
domain.
 The physical-network layer is nothing but the channel. From one node to the next
node, data packets are sent out.
 In the present technological era, data packets are transmitted with the help of
information sharing.
 As a result, the physical-network layer is made up of geographical and physical
network components, resulting in the formation of cyberspace.

Devices in Home that are Connected to A Network

 In day-to-day life, there are various types of electronic devices used by people for
their purpose.
 Most of these devices are nowadays connected to a network.
 A few examples of such devices present in the home can be stated as smartphones,
laptops, washing machines, AC's, personal computers, smartwatches, and TV.
o Smartphones:
 These are the most common devices used by people worldwide acting
as useful assistance for the completion of various purposes like
calling, internet browsing, gaming, live streaming, messaging.
 All these features are accessible because of the connection of
smartphones with the network.
o Personal Computers
 Personal computers or PCs are also one of the most commonly used
digital devices used for both personal and professional uses by users.
 Because of their connection with the network, these devices are
capable of performing operations like mailing, surfing, downloading,
uploading, live streaming, playing kinds of music or videos.
o Laptops
 Personal computers are nowadays replaced by portable digital devices
known as laptops.
 All features supported by computers can be easily completed with a
laptop as well.
 Because of network connectivity, they are capable of remote working
as well.
o TVs
 One of the entertainment devices available at home is televisions or
TVs.
 In the modern era, these TVs are connected with networks and hence
capable of performing other actions as screen mirroring with
smartphones, android connectivity, Youtube videos, browsing as well.
o ACs
 Air-conditioners are also nowadays can be connected with
smartphones in the network.
 Hence AC can be controlled at home by smartphones even user is at
a remote place.
o Smartwatches:
 The new version of traditional wristwatches is nothing but
Smartwatches.
 By connecting these with the network, they are capable of providing
features like calling, Bluetooth connectivity, camera, and music
controls, finding the lost phone, health tracking parameters with the
smartphones.

Connectivity of Devices in the home to a larger network:

 Nowadays, devices are getting connected with each other physically or wirelessly via
the internet.
 Such devices can be listed as personal computers, laptops, smartphones,
smartwatches that are mentioned above.
 In the current technological era, this list is getting added day by day and includes
other objects like various household appliances, vehicles, heating, and cooling
systems, environmental sensors, and likewise.

How?

 The mentioned devices are nowadays commonly got embedded with the latest
technological advancement and use components like microprocessors or processing
chips, newer software and codes, and sensors as well.
 These household devices collect the user data and, it gets shared with other
devices and systems for their personal uses.
 Hence it became possible nowadays for users to monitor and control these
household devices even at remote locations.
 These devices are connected with the internet with the help of cellular providers or
internet service providers because of chips (sim cards in the case of
smartphones) that are integrated within them.
 Connection of these devices can be possible made with the wired mode or in
wireless mode.
 This wired or wireless connection in the network is made possible because of
various protocols like WiFi, Bluetooth, NFC, and networks like 3G, 4G, and 5G as
well.

3 threats to users and connected network devices:


There can be possibly various types of threats to users and the connected devices in the
network like physical layer threats, network threats.

1. Physical threats:
o For the devices that are connected with the network with the help of wires,
there is a possibility of physical damage in the network.
o The physical threat can be occurred because of the interruption of the
electrical signals through wires.
o This interruption can happen between network nodes. The causes of such
interruption would be physical cutting of cables, insertion of waters causing
short-circuits.
2. 5G-based swarm attacks:
o High-speed transfers and downloading, uploading large amounts of data is
made possible nowadays because of 5G technology.
o But in this 5G technology, one more face of cybercrime is evolving known as
5G-based swarm attacks.
o In this type of attack, there is the involvement of multiple devices getting
infected at the same time that are connected in the same network, and a bot-
coordinated attack is carried out further.
o This attack also involves Artificial Intelligence to discover new victims in the
network.
3. Computer virus:
o As we know, Computer viruses are the most common network threats in the
field of cybersecurity.
o Computer viruses are nothing but software that is specifically designed to get
spread from one computer to another and henceforth to the entire network.
o Viruses are designed so as to send it as spam, causing it to disable the user's
security settings, and possibly to corrupt and steal data from the user's
computer.
o personal information can include passwords, contacts, and it is capable of
deleting everything on the user's hard drive.
The answer to this strenuous debate is: Yes, there are borders in the cyberspace. ... A
relationship between the cyberspace and the physical world needs to be established.
The simplest method to define the cyber border is to apply the land border concept. The
place where data transmission cables cross the physical national borders would constitute
a border crossing.

To the globalists' dismay, recent years have seen the strengthening of national borders.
State sovereignty rages on with each vehicle returned and each visa revoked.
But in case you thought the divisions were just physical, virtual borders have also been
subtly dividing the world. You land in Country A with every hope for a romantic getaway,
only to find that the dating app you had just used at the airport now no longer works on your
phone. That's fine. But minutes before your big business meeting in Country C, you fall into
a total panic when the cloud drive on which you'd stored all your files in Country B somehow
won't open on your laptop. This is bad.
The state's power to disrupt and exclude goes far beyond the flow of people, goods and
money. In erecting virtual borders, states are asserting an even more formidable type of
power through controlling the flow of information on the internet. Unlike physical borders,
virtual borders are at once everywhere and nowhere, and one may never even know for
certain whether they exist
Step-by-step explanation
The physical layer of cyberspace is comprised of physical elements, from fiber optic
cables to cell towers, to computers and servers. Of chief importance are the fiber optic
cables that traverse the globe, overland and undersea, and transmit data packages from
one location to another.

When Geographic Boundaries for Law Make Sense


Physical borders are not, of course, simply arbitrary creations. Although they may be based
on historical accident, geographic borders for law make sense in the real world. Their
relationship to the development and enforcement of legal rules is logically based on a
number of related considerations.
Power.
Control over physical space, and the people and things located in that space, is a defining
attribute of sovereignty and statehood [6]. Law-making requires some mechanism for law
enforcement, which in turn depends (to a large extent) on the ability to exercise physical
control over, and to impose coercive sanctions on, law-violators. For example, the U.S.
government does not impose its trademark law on a Brazilian business operating in Brazil,
at least in part because imposing sanctions on the Brazilian business would require
assertion of physical control over those responsible for the operation of that business. Such
an assertion of control would conflict with the Brazilian government's recognized monopoly
on the use of force over its citizens [7].
Effects.
The correspondence between physical boundaries and boundaries in "law space" also
reflects a deeply rooted relationship between physical proximity and the effects of any
particular behavior. That is, Brazilian trademark law governs the use of marks in Brazil
because that use has a more direct impact on persons and assets located within that
geographic territory than anywhere else. For example, the existence of a large sign over
"Jones' Restaurant" in Rio de Janeiro is unlikely to have an impact on the operation of
"Jones' Restaurant" in Oslo, Norway, for we may assume that there is no substantial
overlap between the customers, or competitors, of these two entities. Protection of the
former's trademark does not--and probably should not--affect the protection afforded the
latter's.
Legitimacy.
We generally accept the notion that the persons within a geographically defined border are
the ultimate source of law-making authority for activities within that border [8]. The "consent
of the governed" implies that those subject to a set of laws must have a role in their
formulation. By virtue of the preceding considerations, the category of persons subject to a
sovereign's laws, and most deeply affected by those laws, will consist primarily of
individuals who are located in particular physical spaces. Similarly, allocation of
responsibility among levels of government proceeds on the assumption that, for many legal
problems, physical proximity between the responsible authority and those most directly
affected by the law will improve the quality of decision making, and that it is easier to
determine the will of those individuals in physical proximity to one another.
Notice.
Physical boundaries are also appropriate for the delineation of "law space" in the physical
world because they can give notice that the rules change when the boundaries are crossed.
Proper boundaries have signposts that provide warning that we will be required, after
crossing, to abide by different rules, and physical boundaries -- lines on the geographical
map -- are generally well-equipped to serve this signpost function
In the virtual domain, the physical border has ramifications. Physical borders
play an important part in the virtual domain since various countries have
created physical borders, but we can always rely on the virtual space for
maintenance and database support.
Physical borders are important in defining virtual borders because different
countries control their data in different ways. For example, if you visit China,
their cyberspace is different due to their government, whereas other countries,
such as the United States and India, have different laws for their cyberspace,
resulting in a border that is defined by physical borders.
Creating a border space is always an issue from time to time it reduces the
communication and handshake between the parties also it can be use in various
countries to keep the privacy secure as a result the physical space is bounded
by this and different countries have different physical network layer which is not
ideal for standard point of view.

You might also like