Time
5 hours 49 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:00
Hello, everybody. And welcome to the I t security efforts at number nine.
00:05
Never wear in France for for tickles. My name is Alejandro Gonna in I'll be instructor for today's session.
00:14
Flirting adjectives for today's module. If you understand and be able to identify the man I A teen network and transport protocols,
00:25
we'll, uh we'll really discards the AP s particles which you know, A P ace stands for application presentation station, you know, top stuck off the *** model.
00:37
And then we go down to the transport on network protocols.
00:43
Well, before we jump into the transport and never particles are I would like to first talk about gateways.
00:50
You know, most of the message specification discussed so far in the a P s protocol section
00:57
required implementation off particle specific gate waits
01:02
or other devices to either re encapsulate the communication off Another protocol. For example, if it needs to become my p rideable or no.
01:14
Yeah, you TCP you're the P or performed particle translation.
01:19
So trump Transport Particle. This is what comes into play, you know, TCP on UDP with charred miles from of particles in this layer. For some, multicity is no particles of choice of today's were based communication. Uh, you know, it is because it is real, reliable,
01:38
reliable transfer protocol.
01:41
It meaning that you know it has to check whether the package was delivered or not.
01:47
So my tea products have been signed to operate, you anticipate? You know, for example, the devices that need
01:57
to know whether the patch was liver, not or repeated server or the subscriber or the device itself received the package or not like and Q t. T, for example, the advantage, by the way with thank you *** that you can also use T l s
02:14
to security communication.
02:16
So TCP is frequently unsuitable
02:20
for those constrain Edwards environment gets, you know, at the end you did. He has a better performance over the liability or off the cheesy particle.
02:32
You know, on the other hand, you teepee provides a lightweight transport mechanism for convention committee for connection Less communication.
02:40
Uh, you know, the opposite of TCP. Exactly.
02:44
Many highly constrained. I'd see sensors advices, support you defeat,
02:49
for example, that
02:51
that let's call the sister or brother of the acu ***, which is an cuties slash sm,
02:57
which is a tender Taylor version of the ANC. You *** protocol because M Q t t uses TCP and mutts slashes. Sam uses unity order protocols. As we discussed before, a PS section
03:13
such as Kuwait also used you to be, you know, equate.
03:19
It's just based initiative dp vase protocol. But he uses unity.
03:23
Uh, you know,
03:25
there's no evil alternative to use T l s, um,
03:30
protection protocol, which is DTL s, which is a data. Graham tell us. You know, this is intended for for the particle that uses you to be all the products that uses you to be
03:44
on that sit for transport. Let's jump it network. We have to common for locals here, which is I pee before and I have six. They both relate. Play a role at various points with the idea with the i. O. T. Systems. You know, Taylor protocols
04:01
like PT six over low prop, our wireless personal area network. It's a long name, but that that's that's today.
04:12
Uh, they think this portal supports the years off 96
04:16
protocol. But, you know, with the constraints of humanity device may have you know, my work and strains
04:25
met work based constrains performance from strains all those constraints are this Pirkle again? I will be six over love power, wireless personal fire networks. This is the problem you can use to this kind. Advice?
04:41
Um, this this miracle is built on top of that Well known
04:45
100 to that 15 duck four, which is low rate wireless, personal IRA, network sitcom, street of protocols.
04:55
Uh, these I triply it's specification is to create, you know, an adaptation of the layer that's forced. I peep six. You know,
05:04
uh, these I guess these are the most come protocols when it comes to transport network layers of the asthma. You know, when talking in the i o t context
05:17
in the verity will, why do we use get ways? Well, wait. We need to translate from the top three layers of the animal to the lower layers of the *** model these ways. Trunk, translate. A ring encapsulate data. Ah,
05:36
you know, in order to communicate from one device to another
05:41
or one device to deserve her or, you know, to this from the subscriber to to to to get away.
05:46
In either case, it works as a translator, if you will.
05:51
What's the advantage of therapy over TCP. Well, a u P. Ease has a better performance. That is connection lis oriented protocol. It means that he doesn't care if the package arrived at the other side of the of the connection,
06:09
for example, from from the device Tutut server attach is an advantage is and this is Max just right if you're interested,
06:18
uh, in knowing whether the package was delivered not, you know, you cannot use you to be
06:25
what holy is represented by the art triply
06:29
uh, 100 to that 15 that forced under,
06:33
uh, well, it is low rate wireless personal area network protocol.
06:42
In today's brief lecture with this custom, main gaiety, network and transport protocols,
06:50
I have the recommended go to this league and also check the official IEEE 100 to that 15 4 standard. It contains so much more than just the low rate wilds personal iron network
07:03
specification. You can things way more because you can you can go from that
07:10
publication to another. So you know this is a win for everybody.
07:17
Looking forward in the next video will cover the final layer off protocols are
07:24
now the father the final layer of the Asmat. A woman comes to IOC particles, which is the data link later particles.
07:31
Well, that's it for today. Thanks for watching and hope. Enjoy it. And I see. I will see you soon.

Up Next

IoT Security

The IoT Security training course is designed to help IT professionals strengthen their knowledge about the Internet of Things (IoT) and the security platforms related to it. You’ll also be able to identify the security, privacy and safety concerns related to the implementation of an IoT infrastructure.

Instructed By

Instructor Profile Image
Alejandro Guinea
CERT Regional Director
Instructor