PL-100 Microsoft Power Platform App Maker – Configure Dataverse security and Secure a solution

46. Configure security roles Hello. And in this section we’re going to have a look at security. And we’re going to start with security roles. So let’s have a look at security. So in the powerups portal, I will click on the gear at the top right and go to advanced settings. And then from there I’ll go to system security. So this allows me to work with users, security roles, teams and business units. Let’s start off with the security roles. So, here are a list of mostly built…

PL-100 Microsoft Power Platform App Maker – Business logic using flows Part 2

3. 47. Create Dataverse business process flows – Flows and Classic Flows In the previous video, we had to look at business process flaws and we saw you can have stages that can contain things like data steps and you can have conditions that allow you to branch and when you want to branch back, use a connector. Let’s just see what else we can do with business process flaws. Well, we can cut, copy and paste and delete items. We can add new items like we saw right at…

PL-100 Microsoft Power Platform App Maker – Business logic using flows

Create Dataverse classic workflows Hello. And in this section we’re going to have a look at business logic. Now we’ve already had a lot of business logic so far. We’ve seen how these triggers and actions in Power Automated can help with business logic. We’ve had a look at Canvas app formulas and events and we’ve had a look at business rules. Well, we’ve had a look at flaws. So flaws being triggers and actions. However, there was classic way to do flaws as well. And that’s what we’re going…

CWNP CWNA – WLAN Topologies Part 2

ESS Part1 Now, an extended service set is where you have two or more basic service sets connected by what they call a distribution system medium. That’s just a nice way to say that your company has two or more access points that are connected to your wired network. And that wired network would be the distribution system medium or the DSM. Now, usually an extended service set is really just two two or more access points and their associated client stations all united by that same DSM. The most…

CWNP CWNA – WLAN Topologies

WLAN Topologies Now, in this module, we’re going to take a look at some of the different types of topologies we can have with the wireless local area network. So that means we’ll look at those topologies and talk about some of the eight or 211 options that we have and the 800 and 211 configuration modes that we have both for clients and for an access point. Wireless Networking Topologies So when we talk about wireless networking topologies so far, we’ve really only talked about what we would call…

CWNP CWNA – WLAN Deployment Part 2

Wireless ISP: Last-Mile Data Delivery One of the terms you might hear often from any service provider, whether it’s for your internet service provider or your wide area network, which is a private line. It’s a term called last mile. And what that is, it’s a term called by the phone company. And by the way, yes, most of our wide area networks started with phone companies or cable companies. And so from their edge of the their network, that wire to your building was called the last mile. And…

CWNP CWNA – WLAN Deployment

WLAN Deployment This module is going to be about the wireless lan deployment. So we’re going to take a look at some of the common considerations that we should look at for the types of different wireless lan networks. And one of the big things we always have to ask in network engineering is what applications are we trying to support? So we’re going to talk about the different applications, the different devices, talk about data access, voice access, network extension to remote areas, which might include building to building…

CWNP CWNA – WLAN Architecture Part 2

WLAN Controller Part1 So the heart of centralized wireless lan architecture is that wireless lan controller. And as I said, it’s just basically that central point for data aggregation. All the people that are connecting, it looks like I broke that laptop. Everybody is connecting their data is going to go to that wireless lan controller and then come out on that wired network and the encryption is handled there everything. It just really offloads the work that the access point has to do. So the access point can just…

CWNP CWNA – WLAN Architecture

WLAN Architecture In this module, we’re going to take a look at the wireless lan architecture. So that means we’re going to take a look at client devices, the different ways we can connect them, talk about things like the wireless lan controller when it gets into some of those specialty wireless lan infrastructure designs that we can make. Management, Control, and Data Planes So in the world of networking in general, not just even telecommunication, we have three logical planes of operation. The first is the management plane. Okay?…

CWNP CWNA – Wi -Fi Access Part 2

SIFS/DIFS Part2 So when a client transmits a unicast frame, the duration ID field is going to have a value from zero to 32 767. And that really represents the amount of time in microseconds that’s going to be required to transmit an active frame exchange process. And doing that, the other radios are not going to try to interrupt. And again, remember, everybody’s hearing this because, you know it’s a WiFi medium and they all hear your radio signal. Carrier Sense Part1 Now, Carrier Sense, a part of the…

img