Time
7 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
12

Video Transcription

00:02
Hey, guys. Welcome to another episode of the S S C P Exam Prep series. I'm your host, Peter. Simple it.
00:09
This is going to be the fifth lesson in the six to me.
00:13
So far in this domain, we've taken a look at the O. S. I and T c p i p Miles, which best describe how networking behaves. We've taken a look at I p networking specifically how Internet travels across the network. We've taken a look at different network apologies and how
00:32
they can be
00:34
beneficial or not beneficial to your organization. We've taken a look at D. N S and L DAP, which is forgetting to Web pages and acquiring information. For the first time, we've looked at commonly used ports and protocols. And now, finally, in this lesson,
00:52
we're gonna take a look at Tel communications
00:54
Technology won't take a look at things such as, like voiceover i ke cellular networks and obviously attacks and countermeasures.
01:02
Let's get started.
01:04
I p convergence is the bringing together off different types of information that transitive network things such as voice, data, music and video and sending them all over Internet protocol. This is known as
01:19
I p convergence, and there's actually a whole lot of benefits of I P conversions.
01:25
Excellent support from multimedia devices can be run and inventive ways. It's easy to manage because all the different types of information are all using the same ikey protocol instead of their own things. There's fewer components again, since they're all using the same protocol. And obviously it's simple thigh security management
01:45
and have it. Instead of having
01:47
many different things to worry about, you can simply manage your focus on fewer things.
01:53
There's a couple of really important enabling technologies, which on which make I P conversions possible. So the first is ice scuzzy. This is the small Internet small computer system interface. This facilitates data transfers over networks and manages storage over long distances.
02:12
So what this protocol does is
02:15
there's a I scuzzy commands on either side, and I, scuzzy, more or less assembles the packets that are going to be sent over some sort of medium to a storage area, and it makes sure that they all get aligned to correctly and they all consented over.
02:35
And then from there, it helps ah dis dissemble
02:38
the packet so they could be stored properly
02:40
multi protocol label switching this the networking protocol used for helping route packets from source to destination. So normally, when a packet reaches around ER, the router looks at the destination and then looks at its routing table to determine
02:59
where the package should go to get to the next
03:01
spy, when how it determines how to get it to D destination well with multi protocol label switching the packet when it reaches the first rounder, the first rounder looks up the destination and from there calculates the root of where the package should go to get to the destination.
03:22
Their first rounder, then just slapped on a label, had to get to the destination and sends the packet on its way. The other rounders just have to follow the label instead off looking at the routing table to determine where the package should go. This saves a lot on network Resource is
03:42
this also gives the ability to control when and where and how traffic is rounded on the network.
03:49
It gives the ability to deliver data transport service is,
03:53
and it really improves network resiliency.
03:59
Voice over i p. This technology that allows you to make voice calls over the Internet instead of a phone line. So this is great for videoconferencing. Something's just Skype. Um, you know, went Web conferencing meetings. Things like WebEx any meeting Zoom.
04:16
All of these allow you to have conversations
04:19
based over the Internet instead of phone lines. Now voice over I. P is based on session initiation protocol, which is simply responsible for maintaining a steady connection from start to finish. So when a kiddie connection needs to happen, session initiation protocol
04:39
sets up the connection,
04:41
maintains the connection and then would have done it takes tears down the connection, manages multimedia connections. And it also supports encryption and integrity
04:51
force over I p quality problems. Remember UDP that best effort protocol will UDP is used in voice of right p with voice of right key that it doesn't matter if every single packet gets there, not as long as
05:09
the most of his long as most of them get there. So
05:13
voice of right, he really doesn't need all this air handling and packet tracking and all that is long moves from Get there. It's okay now. Force over I P does have some quality problems sometimes, and these could be attributed to
05:29
packet will also the worst. The sound quality is the more packets that are being lost.
05:34
A gender, which is a variation of packet delays as packets are being lost. Usually the voice over I p n Points tried to compensate by increasing the size of the packet buffers, and that will cause more delays in the conversation
05:53
and sequence. There's packets are received out of order can cause significant declaration to call quality simply because packets might not come in the same way. Every time you tube network congestion or anything like that, packets can travel different paths
06:13
cross the network,
06:14
and they, you know, white B might come in at all different times.
06:19
Bone system communications There is pots, plain old telephone service. This is just a bidirectional analog phone designed to carry the sound off the human voice.
06:32
You have the private branch exchange, which is a phone system typically used in businesses or large organizations to limit the number of phone lines coming into an organization. There is an internal switching networks so that when a call comes in,
06:51
it could be switched over to
06:54
and extension or a smaller line with then carry that call
06:59
to whoever is supposed to go to. It's not necessary for every single user in an organization to have its own telephone, one coming in
07:10
and cellular network over land areas served by a cell site. This is being able to access never when you're not attached. A WiFi on your cell phone on the cell site is that tower, and I'm sure you've seen that sends out the network signals
07:26
with your Internet service provider, and from there, people can connect to them.
07:30
In today's lecture, we discussed telecommunications technologies
07:35
this time.
07:36
What is the primary job of sit?
07:40
Send voice data over the Internet
07:43
and labels. The packets are faster rounding,
07:45
manages multimedia connections
07:47
and attempts to fix the jitters during Packet Billy.
07:54
If you said see manages multimedia connections, then you are correct. Remember, Special Initiation Protocol is responsible for setting up a connection maintained in the connection and then tearing down the connection at the end.
08:09
Thanks for watching guys avoid hope. You learned a lot in this video, and I'll see you next time

Up Next

Systems Security Certified Professional (SSCP)

Obtaining your SSCP certification signifies that you possess the ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and more.

Instructed By

Instructor Profile Image
Pete Cipolone
Cyber Security Analyst and Programmer
Instructor