5 hours 49 minutes
Hello, everybody. And welcome to the I t security efforts at number nine.
Never wear in France for for tickles. My name is Alejandro Gonna in I'll be instructor for today's session.
Flirting adjectives for today's module. If you understand and be able to identify the man I A teen network and transport protocols,
we'll, uh we'll really discards the AP s particles which you know, A P ace stands for application presentation station, you know, top stuck off the *** model.
And then we go down to the transport on network protocols.
Well, before we jump into the transport and never particles are I would like to first talk about gateways.
You know, most of the message specification discussed so far in the a P s protocol section
required implementation off particle specific gate waits
or other devices to either re encapsulate the communication off Another protocol. For example, if it needs to become my p rideable or no.
Yeah, you TCP you're the P or performed particle translation.
So trump Transport Particle. This is what comes into play, you know, TCP on UDP with charred miles from of particles in this layer. For some, multicity is no particles of choice of today's were based communication. Uh, you know, it is because it is real, reliable,
reliable transfer protocol.
It meaning that you know it has to check whether the package was delivered or not.
So my tea products have been signed to operate, you anticipate? You know, for example, the devices that need
to know whether the patch was liver, not or repeated server or the subscriber or the device itself received the package or not like and Q t. T, for example, the advantage, by the way with thank you *** that you can also use T l s
to security communication.
So TCP is frequently unsuitable
for those constrain Edwards environment gets, you know, at the end you did. He has a better performance over the liability or off the cheesy particle.
You know, on the other hand, you teepee provides a lightweight transport mechanism for convention committee for connection Less communication.
Uh, you know, the opposite of TCP. Exactly.
Many highly constrained. I'd see sensors advices, support you defeat,
for example, that
that let's call the sister or brother of the acu ***, which is an cuties slash sm,
which is a tender Taylor version of the ANC. You *** protocol because M Q t t uses TCP and mutts slashes. Sam uses unity order protocols. As we discussed before, a PS section
such as Kuwait also used you to be, you know, equate.
It's just based initiative dp vase protocol. But he uses unity.
Uh, you know,
there's no evil alternative to use T l s, um,
protection protocol, which is DTL s, which is a data. Graham tell us. You know, this is intended for for the particle that uses you to be all the products that uses you to be
on that sit for transport. Let's jump it network. We have to common for locals here, which is I pee before and I have six. They both relate. Play a role at various points with the idea with the i. O. T. Systems. You know, Taylor protocols
like PT six over low prop, our wireless personal area network. It's a long name, but that that's that's today.
Uh, they think this portal supports the years off 96
protocol. But, you know, with the constraints of humanity device may have you know, my work and strains
met work based constrains performance from strains all those constraints are this Pirkle again? I will be six over love power, wireless personal fire networks. This is the problem you can use to this kind. Advice?
Um, this this miracle is built on top of that Well known
100 to that 15 duck four, which is low rate wireless, personal IRA, network sitcom, street of protocols.
Uh, these I triply it's specification is to create, you know, an adaptation of the layer that's forced. I peep six. You know,
uh, these I guess these are the most come protocols when it comes to transport network layers of the asthma. You know, when talking in the i o t context
in the verity will, why do we use get ways? Well, wait. We need to translate from the top three layers of the animal to the lower layers of the *** model these ways. Trunk, translate. A ring encapsulate data. Ah,
you know, in order to communicate from one device to another
or one device to deserve her or, you know, to this from the subscriber to to to to get away.
In either case, it works as a translator, if you will.
What's the advantage of therapy over TCP. Well, a u P. Ease has a better performance. That is connection lis oriented protocol. It means that he doesn't care if the package arrived at the other side of the of the connection,
for example, from from the device Tutut server attach is an advantage is and this is Max just right if you're interested,
uh, in knowing whether the package was delivered not, you know, you cannot use you to be
what holy is represented by the art triply
uh, 100 to that 15 that forced under,
uh, well, it is low rate wireless personal area network protocol.
In today's brief lecture with this custom, main gaiety, network and transport protocols,
I have the recommended go to this league and also check the official IEEE 100 to that 15 4 standard. It contains so much more than just the low rate wilds personal iron network
specification. You can things way more because you can you can go from that
publication to another. So you know this is a win for everybody.
Looking forward in the next video will cover the final layer off protocols are
now the father the final layer of the Asmat. A woman comes to IOC particles, which is the data link later particles.
Well, that's it for today. Thanks for watching and hope. Enjoy it. And I see. I will see you soon.