3.3 APS Protocols

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
5 hours 49 minutes
Difficulty
Intermediate
CEU/CPE
6
Video Transcription
00:00
Hello, everybody. And welcome to the IOC Security episode Number eight
00:05
will be discussing the AP s particles
00:09
for it in this module on in harm's way again. And I'll be your instructor for today's session
00:17
on learning about the tips of these modules to understand and be able to identify the main I. T. A. P s protocols.
00:25
I remember that they're called a P s because they lay into the top three layers of the acid model, which were application presentation in session. So to go further in into this particles,
00:42
you know, they're located at the top of the I T communications tuck, um, where they support and exchange of formula messages data between june points, you know, typically claiming server, um, full. The main protocols are in Q t t
01:00
uh, just, you know, some kind of
01:03
published subscribe model.
01:06
Ah, what? The clients subscribe to the topics and maintain, um, you know, um, out of explanations, participate connections, that is, take on all the time between you know, the client and server and claims in this case from the broker to this describe for, um, you know, as new message are sent to the broker
01:26
they include the topic with the message allowing the rocker too. That's remind which clients
01:30
she received. The message, you know, message are pushed
01:34
to declines through the, you know, the connections that you know, as we say. This tastes on all the time.
01:42
Ah, well, it holds a really, really simple architecture. If you can say that, you know, you have here in the middle,
01:52
you know, you have on him
01:55
cube t t get with
02:01
on, and then you can, you know, go to the sensors, you know, which are part of the A t buys that. Say they're right here. I o t
02:13
the bis
02:16
with the sensor. Of course. Um
02:20
and, you know, over here
02:23
there are the subscribers.
02:30
So as we discussed, uh, describes, can, you know,
02:36
subscribe to the content and the country will be pushed into these devices.
02:42
Um, you know, nearly
02:44
all the duties by support this portable, you know, for example, since, uh,
02:51
and cue *** pull measures are centers publisher data to a broker and the broker passage at them to this describing systems to have you know that they are they have an interest on this data
03:05
and on the other hand, we have the cool ape,
03:08
uh, protocol. This has no some differences between and key. Tha t you know, for example, quip,
03:16
it's another. You know, I messenger protocol, but this one is beautifui based on the other side and purity Huestis ipi based
03:28
so that this cocoa ape protocol now assistant is intended to be used in resource constraint
03:37
devices. Maybe you know not, You know, some, uh, smart watchers some around smart bowls
03:47
for the homes or some you know, anything that is a resource constrained. He doesn't have Ah, great
03:57
processor that maybe another things may have.
04:01
Now it consists of a set of messages which is basically interested to be the usual. The usual messages that these particle uses are get post put and delete. You know, he has a basic our protector is not that fancy. Um, here
04:19
it's the H t t p server.
04:26
Ah, and then it The server controls all the devices over here,
04:33
which are locator over here.
04:36
And, you know, the devices scented server
04:40
that gets
04:43
who
04:44
do it
04:46
message that we just discussed.
04:48
So this is two main particles in the final one that I would like to discuss his DDS. DDS is a day of bus use for integrating intelligent machines like and Q T T else's uses, publish and described model, And readers can actually subscribe to this. But I will say that it's
05:09
some kind of combinations between
05:12
ah, in
05:14
Q t T
05:15
and the other particle would just discuss which is
05:18
okay,
05:20
So, uh,
05:24
DDS
05:27
I say that it's some kind of combination between these two protocols, you know that he has the last allows communication to happen in, you know, on an animal's way.
05:36
Um,
05:39
this gives do some kind of advantage. If you're looking for performance, offer security. This might be your particle because it allows you to use an itemized connections. And you know that data transfer which, you know,
05:55
you take away that the control access parts of this gives you a little bit of room
05:59
when it comes to performance.
06:00
But, you know, no relationship between endpoints is required, so that's kind of a stretch for me. If you're looking for you know, Thio, hardening your IittIe infrastructure, you might want to include you will need to include access control, so you know that's up to you
06:20
uh, what this has, as I said, because it uses it doesn't use authentication.
06:28
Um,
06:29
it has a good quality of service, which is cure s because because he has built this curious mechanisms into into the particle itself. So he's designed, you know, I will say its primary design is to be used
06:46
in a device to device communication like, for example,
06:48
from new device to from from your watch to your phone from your phone to your I don't know. Um, you're smart home appliance. I don't know, but it's not intending to be use from like in a client server authentication way.
07:06
So you know these. I believe these are the three most used of particles on the top layers of the Aussie models.
07:20
What troubles is useful when your devices limited with power and processing starch? Well, you can use the D S as it doesn't contain any authentication, but you can also use crow A See it is you did pay udp based. So it means that now it doesn't
07:40
control the packages.
07:42
It doesn't provide some much of a quality of service, but he has a great performance, and it's in the case of COIT is based on edge too deeply. So you know the connection will be will be fast. There is a M Q T T version, which is in Q t t. Um,
08:00
it's last s m
08:01
uh, just you know,
08:05
it has great power, consumption of capabilities.
08:09
It means that he doesn't consume so much flowers. As as you know, that the playing and Q t t Well, that's something you will have to ever Lewit.
08:18
We're probably Suzuki people. I just gave away the answer which is Kuwait create this utopia base as mentioned before And you know, it's, well, silly when you're trying Thio,
08:30
you know you're interested in performance over security
08:35
and what horrible has cures being quality of service integrated into it. Well, DDS has qs integrated into obscure video s I'm sorry
08:46
doesn't use authentication, So this gives you a little room to include some some quality of service capabilities built into the protocol.
08:58
Well, in today's brief lecture, we discussed the man I o t a p s again obligation presentations, session particles. How can they interact between their two device and server or get away?
09:13
Well, you can beat these lengths. They have a really useful information on salary. I highly recommend you to do so, and you will find a lot of more information about this trip. Particles and other particles are are, you know, emerging in this new I T era.
09:33
And the next section will cover the coyote network and focal on there Never and transfer protocols. Um, which, you know, there are two different layers on the *** model, but they this protocols that will see they, like,
09:48
run kind of in the same way, so that that's why we're
09:52
we'll cover them together. Well, that's it for today. And thanks for watching. I have enjoyed and see you soon.
Up Next