Time
5 hours 49 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:01
Hello, everybody, and welcome to the island T exit number seven.
00:05
We'll be discussing I t common Craddock calls. My name is 100 I'll be your instructor for today's session.
00:16
The learned of it tips off this module is to understand and be able to identify all the main particles is in I A T and in which also layer they're located
00:28
in most evil. You know, deployments on anti device communicates I wouldn't get way that a in term communicates with a controller or a Web service or a server per se.
00:40
There are many gateways options, some simple as a model device. You no smartphone,
00:46
uh, with the i t and find and communicated over the particle such as Blue ***, for example, C b. I think this is Ah, well, no chronicle or WiFi.
00:57
Other might be more centrally located, and that centers to support any number of dedicated. Our proper attire get weighs a typical searches no and Q T T, which is, you know, stands for message queuing telemetry transport
01:15
are the arrest, which is stands for representational estate transfer. Communications
01:23
meant situations that enter in connectivity between the field
01:27
I. It's a device and the Web service and might be provider by a series of fields and clouds. Get weights and you know h aggregating large quantities of data from, you know, sprawl. Out Service is our devices.
01:42
Some companies decided to build specific more bands get with. For the advisors, there are some consumer *** use gate waits, also called hops, for example, available in the commercial market. You know your e commerce that supports Amar Home Communications. So
02:00
and, you know and
02:04
summary the devices can communicate how are centrally,
02:08
you know, and be like from jurors. My watch to your phone from her form Thio. Any smart home devices you may have, and they also know that they can also communicate, particularly which, you know, from from your
02:23
tomorrow watch. Did server that too done loud And I'm application, maybe or too ugly firm were, for example,
02:31
But, you know, let's die into the mid autumn groups of protocols that we use a PS protocols. I call it out that I call it like that because it involves the 1st 2 layers of the awesome model. Remember, Jazz model?
02:46
Um uh, do here's ah, fun trick you can use and you can save it for later. Um,
02:53
basically, you have to write
02:57
on
03:00
people.
03:01
Seems
03:05
to need
03:08
data,
03:12
crosses singing.
03:15
Ah, and you take the first letter or fifth official work and you know all
03:22
No
03:23
application
03:24
people presentation
03:28
it seems Session
03:30
Jew transferred.
03:32
Need network data, data league
03:38
processing physical. So if you remember this, you can clearly see that a PS protocols are basically application
03:49
presentation in station particles.
03:51
Uh, you know, these They are located at the top of the sea communication of stack
03:57
on their purple. That's poor. The chain former off messages between two important stability, you know, client server or client to climb. It depends on the charity infrastructure.
04:10
Um,
04:12
we have here particles such as arrest an mq TT, which again they stand for message queuing. Tell a metric transport which thank you *** for presents and the representational state transfer, which is rest.
04:28
And we have ah, some other particles which don't worry about it. We'll dive into each of these sections a more and more detail in the next
04:39
modules we have.
04:41
And then we have the transfer politicals again there. You know, we already cover
04:46
this. We now have to cover this like tp udp Remember, we discussed this. The different
04:55
between this parable we have will have chili t l s, which is. You know, this is a probable that sits on top off many other particles, for example, till s and actually be they create https.
05:12
Ah, f d P s. You know,
05:15
it's encryption protocol that sits on top of other protocols to act, you know, obviously encryption
05:23
to these protocols.
05:25
And then we have the network particles
05:29
get this part right here.
05:30
Uh, we have I pee before at six. You know, this again routed particles,
05:39
uh, you can you can actually use to again wrote your packages, for example, e p v six over low power wireless personal area networks. Another name Suns large. And it is large.
05:57
This is a tailor protocol that, you know, use you can use to you to transfer data for the A I ot And basically, it's like a version of that movie. Six. But you know,
06:08
it can't. It saves energy. It is. It is a good protocol to save energy because somehow you two devices, they don't have a good performance.
06:18
I don't want to say good performance, but they cannot perform high rated tasks or intensity of past us. Like, for example, they're not multi tread, and and, you know, they don't have as many cores computer may have. They don't have
06:36
definitely don't have so many cores. Assad graphical user into interface May half
06:43
and discard your in this cage, your video card like, for example, in the media any any number that you will like for the for your be your car. So, yeah, that's ah, Purple Deacon. Just to save power
06:58
and the data link and physical protocols, which is, you know, the final stack off the *** model.
07:04
They are examining communication protocols ability. We didn't i o t, um
07:11
you know,
07:12
these troubles plays a significant role in different Asian off other particles at the anchors. Remember, Day Ling is basically the translator between the network
07:25
and the physical
07:26
layer.
07:27
Is that the end? You know, computers understand ones and viewers, and they understand
07:32
electrical sings, singles, beams of light, you know, with optical wire.
07:39
Uh, so this is the little league. You control a data from that? So, you know, total calls are just, uh,
07:46
Mac, just meet him access control and be, uh, you know, wireless hard. And those all those protocols blew through WiFi,
07:57
um, 100 to family, which is in both blue food. Wireless. You know, let older for girls.
08:03
Those rows are actually in this in this section,
08:09
but don't worry about it. We'll discuss this morning that
08:13
Well, uh, what layer of the *** model? The Mississippi pickle up race. Well, praise at the transfer layer.
08:22
Mentioned to political. They're operating in the networld layer off the *** model. That's interesting.
08:28
I remember I was six, and I pity for those are two particles and their tail. Remember there, Taylor protocols for tea in this. In these later for temple I P v six over low power wireless personal area networks. Again. Big name.
08:46
But you know, big advantages of using this in the eye ot infrastructure.
08:50
Can I have two devices communicate horror centrally is so mentioned An example.
08:56
Well, yeah, they can communicate how are centrally from temple from your smart watch to your phone or from your phone to any smart home device, for example.
09:07
So yeah, they can communicate horizontal.
09:11
Well. In today's brief lecture, we discussed the communication protocols a hand. Can they be divided into categories asserting at the top of the mast module on ended up at the bottom of it.
09:26
Uh, you can business visit the stool wings. They contain a lot of information of the particles and a lot of details of them.
09:35
Ah, but in the next episodes and the next videos will be discussing, um,
09:41
in morning that off each of these sections. In this case, we'll start with the A. P s protocols.
09:48
Well, I helped him get his video and touch you soon.

Up Next

IoT Security

This IoT Security training is designed to help IT professionals strengthen their knowledge about the Internet of Things (IoT) and the security platforms related to it. You’ll also be able to identify the security, privacy and safety concerns related to the implementation of an IoT infrastructure.

Instructed By

Instructor Profile Image
Alejandro Guinea
CERT Regional Director
Instructor