Time
5 hours 49 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:01
Hello, everybody. And welcome to the island to security Episode number
00:05
10.
00:06
Uh, they're linked particles. My name is Sam Handler again. And I'll be your instructor for the day session.
00:14
The running operatives for deeds module is to understand and be able to identify the main u T. They'll run probables.
00:23
So, as you know, we already discussed the AP s protocols, the transport particles and the network purple. So it's time from
00:31
the data link. Portables.
00:34
Well, ah, we already Because they're 100 tube that within the Ford, um, IEEE specification. But, you know, let's dive into it. Other bed. It's a science. She operated Asian, you know, either point point or sometimes star or mass smashed. Apologies
00:53
on. You know it's a deal for using allow power in love speed environments because at the end, it's, uh,
01:00
resource friendly. You will, uh, that busy that operate within this particles. They go from 150 megahertz. Uh uh. 2.4 year hurts, so it's really, uh,
01:18
white at range where they all prayed, You know, white range frequency,
01:23
uh, where they prey. Base support data rate. It's better rates up to 250 kilobits. per second.
01:33
Um, and communication range in range is, uh, roughly
01:38
50 meters. Are, you know,
01:41
somehow tent between 10 and 15 meters.
01:45
Um,
01:46
you know, as us embracing the data link, it has, like, two parts
01:51
off this purple. The physical layer is responsible for managing the right rate of frequencies. You know, network access
02:00
while the mark layer, which is, ah, media access control layer responsible for managing the transmission on you. No receipt off receiving frames into the the data link connecting to the network transport layers.
02:19
So this is how basically, how your praise at this program operates. We can then go to different specification from different particles. But all of them might be just a variant of this, this main horrible.
02:34
Like, for example, Z wave.
02:36
Do you waive supports the transmission of three friends types on the number, which is, you know, the well known unique cast most castles broadcast. Um, what makes Z wave? Especially guesses, uh, that the networks is in controllers and slate. Some kind of
02:54
client serpents, apology,
02:57
uh, you know, but, uh,
02:59
in India, t real. That's kind of hard to have to to find cause
03:05
the most of the of the architectural depend on get ways and, you know, subscribers and devices and sensors. This Zewe architecture is based on to some kind of client server apology
03:20
on. Then we have aah PLC, which is stands for polar land communication.
03:27
Uh, you know, uh, this kind of technologists, you know, operate at the link on the physical. You know, data link
03:37
of the communication of stack plz enabled devices, you know, not to be confused with problem, uncle. Larger controller. It stands for power line communications.
03:49
Uh, they can support both home and industrial uses.
03:53
Uh, you know, like, would you have your smart fridge or smart often, you know,
03:59
um,
04:00
smart locks, for example.
04:02
They cannot write whether industrial our home based
04:06
applications on Then we have the five G, which, you know, not horrible, limited to their own team world, because we use it in different case scenarios. But, you know, it's worth mentioned that, you know, as we move towards five, g communications
04:26
will have significant impact on the IittIe sister design.
04:30
Now, when finally we finally have riel five because sometimes someone, some benders claim that they're they're they're providing five g communication. That's you know, I But you know, one way we really get riel finding, um,
04:48
with the higher truth boots,
04:50
Andi related support more, more in many connections will be, you know, begin to see an increase movement for connectivity between devices on the cloud.
05:02
I mean, you will be able to control anything from any part of the world, even if it is a small. You know, uh, let's see. You know, the becoming temple right now today is you're you're smart watch friends. This is the worry off time. And, you know, it's not us.
05:23
He doesn't have the same performance that has your phone,
05:26
and it might be still dependent on you on your phone connectivity. But, you know, not so far in the future, maybe you will be able to control everything right from your wrist or, you know, or something in their smaller. So it's worth mentioning that, you know, we move to work,
05:43
I need technologists and new connections. At five G,
05:46
it will be a huge bust boost
05:48
um
05:49
into, uh,
05:51
the connection between deputy devices and you know, the server or before the authority device at the other side of the world.
06:01
What Miracle support unit Cast multi cuss in broadcast,
06:06
huh?
06:08
It's Z Wave. You know, it's important Transmission this three type of frames.
06:14
Um and, you know, be consists of again controllers and slaves.
06:18
Uh, what those bills he is done for when talking about t? Well,
06:25
Inamed programmable logic controller as we speak before it is stands for power, like communications.
06:32
What? Protocol up. Raise between 115 megahertz and 2.4 gigahertz frequency ranges.
06:41
It's see no one. Okay. Is that triply? I have 100 to that 15 04
06:48
Uh, you know, which is low wireless personal ira network. Um, this operates in this range of fragrances.
06:59
Well, in today's brief lecture, we discussed the main anti tailing protocols.
07:06
I highly recommend you to go to these two winks. It contains more to mourn much more information that this for ah, uh, protocols. Because it contains on specifications this pace that it can support
07:19
on. Some other particles are being used. Remember, we're focusing on the main particles. There's ton of time of particles that are being used today. Um, you know, and they might get,
07:34
you know, better, different use cases, you know, waking never tell. But as for right now, I believe deserve the four main protocols. But you can go to this league's action and check all of them. You know that there will be a lot, so be prepared.
07:53
In the next video, we'll cover the IittIe common device Architecture.
07:58
Well, that's it for today. I hope in your day video. Uh, and I'll see you soon.

Up Next

IoT Security

This IoT Security training is designed to help IT professionals strengthen their knowledge about the Internet of Things (IoT) and the security platforms related to it. You’ll also be able to identify the security, privacy and safety concerns related to the implementation of an IoT infrastructure.

Instructed By

Instructor Profile Image
Alejandro Guinea
CERT Regional Director
Instructor