All language subtitles for 2. Point-To-Point

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese Download
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,400 --> 00:00:06,890 It in a sexual way and take it to the point to point let's go ahead with that point of point. 2 00:00:06,890 --> 00:00:14,810 Poor call Point to Point porticos people he is a datalink clear communications protocols used to establish 3 00:00:14,870 --> 00:00:18,610 a direct connection between two notes. 4 00:00:18,620 --> 00:00:25,130 It connects to others directly without any host or any other networking device in between it's camp 5 00:00:25,130 --> 00:00:32,330 provides a connection authentication transmission encryption and cooperation optional optionally this 6 00:00:32,330 --> 00:00:39,700 particle is used over many types of physical networks including the serial cable phone line cellular 7 00:00:39,700 --> 00:00:42,920 telephone fiber optic links and etc.. 8 00:00:43,160 --> 00:00:48,370 PKP also supports authentication by PAP and Chapur recalls. 9 00:00:48,380 --> 00:00:55,190 And additionally can monitored the quality of the link by link quality management feature and takes 10 00:00:55,190 --> 00:00:55,870 the link down. 11 00:00:55,880 --> 00:01:10,660 If there is too much errors the main PBB components are see LCP and the NCP HDL C is used for encapsulating 12 00:01:10,750 --> 00:01:19,050 that grounds LCP refers to the control protocol and is used for setting up maintaining terminating the 13 00:01:19,050 --> 00:01:24,130 link between the Wes's and handling were writing limits on packet size. 14 00:01:24,160 --> 00:01:31,600 NCP refers to network control porticoes and is used for establishing and configuring different network 15 00:01:31,600 --> 00:01:37,960 clear protocols such as IPV for IP V-6 IPX and Etzler. 16 00:01:38,430 --> 00:01:42,180 Let's go ahead with the p p p frame in the PPV frame. 17 00:01:42,180 --> 00:01:50,760 Again we have some different fields and one byte of the Lakefield and one byte with the Edwards field. 18 00:01:50,820 --> 00:01:54,480 We have combed through all fields which consists of one byte. 19 00:01:54,480 --> 00:01:59,670 Again we poor local field that there may be one or two bytes. 20 00:01:59,810 --> 00:02:10,010 We are payload which is where I bowl and we have FCC Frenchy's sequences and the flag fills in our free 21 00:02:12,250 --> 00:02:21,490 to establish epeople P.S. We have some phrases and in the phrase one link establishment and configuration 22 00:02:21,490 --> 00:02:25,120 negotiation is met in this phase. 23 00:02:25,150 --> 00:02:34,090 LCP opens the connection and negotiates the configuration options and this phase finishes when the receiving 24 00:02:34,090 --> 00:02:42,390 rather Senza configuration acknowledgment for him back to the rudder initiating the connection interface 25 00:02:42,430 --> 00:02:51,300 to cool the off link is checked which is an optional step and in the step LCP test linked to that mine. 26 00:02:51,440 --> 00:02:59,770 Whether the link called it is sufficient to bring up network layer protocols and in the last phrase 27 00:02:59,800 --> 00:03:07,540 which is phrased to in here network where political configuration negotiation is made and after the 28 00:03:07,540 --> 00:03:16,000 LCP has finished doing quoted the termination phrase the appropriate NCP can separately configured the 29 00:03:15,990 --> 00:03:22,980 network protocols and brings them up and take them down at any time. 30 00:03:23,000 --> 00:03:30,240 Let's go ahead of the configuration of the point to point protocol to configure the point to point protocol 31 00:03:30,270 --> 00:03:38,780 we have some options that we can use and there are authentication compression error detection people 32 00:03:38,790 --> 00:03:41,660 be called back and the multa link. 33 00:03:41,700 --> 00:03:44,370 And let's take a look to these guys now. 34 00:03:45,730 --> 00:03:53,800 Authentication can be made by the PAP and the CHEP protocols for people be correct. 35 00:03:54,040 --> 00:04:00,370 Let's go ahead with Pepp authentication first which transmits on an encrypted Eski passwords over the 36 00:04:00,370 --> 00:04:09,100 network in here if you want support authentication would mean rather X and rather Y rather X sends its 37 00:04:09,190 --> 00:04:18,100 own parameters which is user rather X password strong pass or something like that rather x' permit those 38 00:04:18,100 --> 00:04:21,760 are checked on rather Weist local database. 39 00:04:21,910 --> 00:04:30,910 And if the parameters are matched communication is as stablished and rather white will accept or reject 40 00:04:30,910 --> 00:04:31,840 message too. 41 00:04:31,910 --> 00:04:40,780 Rather why let's go ahead with the Chapeltown get in the year Firstly rather why this time sends a challenge 42 00:04:40,780 --> 00:04:49,840 message and starts with the three way handshake this time rather X response with its own username and 43 00:04:49,840 --> 00:04:52,960 the passport again as you can see in here. 44 00:04:53,110 --> 00:05:01,690 Then run why compares the permit others on it's own local and accept or reject the communication as 45 00:05:01,690 --> 00:05:03,860 you can see. 46 00:05:03,880 --> 00:05:07,150 Let's go with the cooperation cooperation. 47 00:05:07,200 --> 00:05:15,040 It increases the effective throughput on people the connections by reducing the amount of data in Frane 48 00:05:15,430 --> 00:05:23,730 we can use this record or the predictor protocols for cooperation on point to point protocol. 49 00:05:24,840 --> 00:05:29,060 Error the direction identifies fault conditions. 50 00:05:29,280 --> 00:05:33,060 There are two options the call the and the magic number. 51 00:05:33,150 --> 00:05:37,920 Help ensure reliable loop free data link. 52 00:05:38,010 --> 00:05:45,420 The magic number field helps in detecting links that are in a loop spec condition and are generated 53 00:05:45,420 --> 00:05:49,290 randomly at each end of the connection. 54 00:05:49,290 --> 00:05:51,470 Let's go ahead with the code. 55 00:05:51,480 --> 00:05:59,280 Back security people came before to augment that with the use of people be called back people they called 56 00:05:59,290 --> 00:06:04,680 back is through X the access server to disconnect the incoming connection. 57 00:06:04,680 --> 00:06:14,460 After a successful authentication and reestablish the connection wire and outbound call and the last 58 00:06:14,460 --> 00:06:21,810 feature we are going to focus on is the multa link monitoring is used to take multiple people buildings 59 00:06:21,870 --> 00:06:28,890 and bomb them together making them act as a single people building and pro-ISIS load balancing as you 60 00:06:28,890 --> 00:06:38,880 can see in here we have two separate warnings in here and one mottling is doing actually is this is 61 00:06:38,880 --> 00:06:47,590 combining the two separate wings together and bonding them together as a single link. 62 00:06:47,590 --> 00:06:48,220 Let's go ahead. 63 00:06:48,220 --> 00:06:55,390 The point of point particle configuration and troubleshooting Let's go ahead with the how we can call 64 00:06:55,390 --> 00:07:05,050 for you to be forced to cover your pee pee pee guys all are rather what I'm going to do is just going 65 00:07:05,170 --> 00:07:12,610 under the interface more for us by typing the interface and the interface name. 66 00:07:12,610 --> 00:07:23,100 Basically then we're defining an encapsulation method and our encapsulation method will be p p p point 67 00:07:23,100 --> 00:07:30,690 to point particle then optionally we can define a compressed method or we can define the people pick 68 00:07:30,870 --> 00:07:37,360 Lenku multi-byte slapping the corporis predictor and Peepy Piccoli 80 69 00:07:39,960 --> 00:07:47,020 let's go ahead how we can Cuvier people Piramal killing as you can see that we have two separate things. 70 00:07:47,160 --> 00:07:54,930 And what we are doing here is just to combine them together for load balancing purposes to configure 71 00:07:54,930 --> 00:08:02,890 the people appear on our rather Again we're just getting into the interface more buzz by typing this 72 00:08:02,900 --> 00:08:12,420 on interface Malto link and the monthly number then we are defining our IP address. 73 00:08:12,540 --> 00:08:21,300 And the thing we are going to do this time is typing the BPP multilane and people multiplying group 74 00:08:21,330 --> 00:08:31,860 and the group number them we are getting into the serial interfaces by typing the serial 0 3 0 and serial 75 00:08:31,860 --> 00:08:33,290 3 0 1. 76 00:08:33,540 --> 00:08:37,190 There we are defining our encapsulation as. 77 00:08:37,620 --> 00:08:47,550 And we are no IP address TPP multilane and the PBT mottling group one for the both of our interfaces. 78 00:08:47,580 --> 00:08:55,170 This configuration should be made on rather too as well as you can see to refer to PBB configuration. 79 00:08:55,210 --> 00:09:04,850 We can turn the show interface and the interface name command and we can check the encapsulation meated 80 00:09:04,930 --> 00:09:10,020 and we can check if LCP is open or not. 81 00:09:11,380 --> 00:09:16,060 Let's go and how we can configure the authentication for druthers. 82 00:09:16,060 --> 00:09:22,010 The first thing we're going to focus on is configuring the pap to configure the PAP. 83 00:09:22,030 --> 00:09:29,330 What we are doing or rather X is to define the rather wise parameters. 84 00:09:29,800 --> 00:09:36,970 But surely there's something wrong in the figure the Celene step is not available for the purposes you 85 00:09:36,970 --> 00:09:37,800 know. 86 00:09:37,990 --> 00:09:39,950 So I'm cleaning this out. 87 00:09:39,970 --> 00:09:42,210 Sorry guys there's not challenge step 88 00:09:44,950 --> 00:09:45,890 OK. 89 00:09:46,760 --> 00:09:54,200 No response to just this guy will send the message and this guy the other guy will tell me they accept 90 00:09:54,200 --> 00:09:55,120 or reject. 91 00:09:55,130 --> 00:10:02,320 So what are we going to do on the rather Aksa is to define the rather wise leaders own rather Rake's 92 00:10:02,330 --> 00:10:05,930 we are attacking the user name rather why. 93 00:10:06,260 --> 00:10:15,120 And the passport as soon pass and and in the interface most people rather as we are defining the people 94 00:10:15,500 --> 00:10:26,390 or complication as Pap and we're also defining the own username and password of two other eggs by typing 95 00:10:26,390 --> 00:10:36,930 the p p p pap Sentier is her name rather X and passport with strong past this line in here means I'm 96 00:10:36,930 --> 00:10:45,970 going to send there rather X as user name but rather an answer I'm going to send a rather why as do 97 00:10:46,030 --> 00:10:51,220 other X as my username and the passport strong pass. 98 00:10:51,440 --> 00:10:58,310 So what I'm going to come for you or rather what this time is firstly is the parameters of the rather 99 00:10:58,730 --> 00:11:06,920 X-ers you can see in here inserting the username Roderick's password and the strong pass again then 100 00:11:06,980 --> 00:11:15,140 under the interface mode and defining the authentication protocol as pep then what then defining in 101 00:11:15,170 --> 00:11:27,260 here is the DPP Pepp sent username and rather why as the rather wise on username and password will be 102 00:11:27,500 --> 00:11:29,380 strong press again. 103 00:11:30,230 --> 00:11:37,510 And let's go back to covering the CHEP challenge handshake authentication protocol this term again and 104 00:11:37,520 --> 00:11:44,060 defining the rather words per meters or rather X and rather X as per meters on rather why and the difference 105 00:11:44,060 --> 00:11:54,350 is Peepy authentication Pugel will be just CHEP in here is as you can see this we have just two steps 106 00:11:54,380 --> 00:12:01,100 and we are defining our user names of the remote networks Lehman Brothers and we are defining the authentication 107 00:12:01,100 --> 00:12:11,600 protocol as CHEP to troubleshoot the PBT connection we are typing the debark BPP authentication which 108 00:12:11,600 --> 00:12:14,570 displays authentication Xchange sequence. 109 00:12:14,750 --> 00:12:22,400 We can't write the book peepin negotiation which displays packets during connection establishment. 110 00:12:22,400 --> 00:12:30,110 We didn't write the DBA BPP packets which displays the BBB packets being sent and received. 111 00:12:30,110 --> 00:12:37,310 We can tap the Dilbert BPP URL which displays poor local errors and the error statistics and we can 112 00:12:37,310 --> 00:12:42,830 use the debug PBB chip command to display the CHEP packet extranets. 13156

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.