A network that is effective today networking enterprise is very critical. Down time as well as performance that is degraded can have a serious impact that can bring operations to a halt. With the importance of networks rising in today’s technology, threats also rise with them as well. Having the ability to keep a network up and running to its maximum ability is not only a job, it’s a business that has responsibility. Having infrastructure security is vital in order to ensure the integrity and stability of the network for Layer 1. Infrastructure Physical Media
Layer 1 is the physical layer of a network according to the OSI model. Electricity in this layer is the most fundamental because all of the networking equipment, devices, and open network equipment is dependent on electricity to deliver power to those devices. This layer represents the physical media that is used to transfer the binary data across the different networks. The physical layer uses all sorts of physical media to transfer the data, here are a few examples: Twisted Pair copper * Category 4 copper- A unshielded twisted pair copper that is uses four pairs for which is used in telecommunications along with some networks used for computers that provides 20 megahertz of bandwidth with a data transfer rate of 16 megabytes per second. * Category 5 copper – This type of cabling also uses four pairs and is used more extensively in terms of Ethernet connections, telephony, and local area networking systems. Punch-down and modular connections are the primary ways of installation and conforms to the standards of TIA/EIA-568 communications standards * Category 6 copper- Twisted pair copper that is specifically used for gigabit Ethernet-based computer networks. In 2002, Category 6 was introduced, and joined the Electronics Industry Association and Telecommunications Industry Association. This type of twisted copper consists of 4 strands and provides up to 250 megahertz
References: Kay, R. (2005, April 4). Biometric Authentication. Retrieved from Computerworld: http://www.computerworld.com/s/article/100772/Biometric_Authentication?taxonomyId=17&pageNumber=2 Mitchell, B. (n.d.). Network Topologies. Retrieved from About.com: http://compnetworking.about.com/od/networkdesign/a/topologies.htm Reed, D. (2003, November 21). Applying the OSI Seven Layer Network Model to Information Network Security. Retrieved from http://www.sans.org/reading_room/whitepapers/protocols/applying-osi-layer-network-model-information-security_1309