1 00:00:01,590 --> 00:00:10,980 In the last lecture we had seen point to point to the protocol that is BP now BTP is a protocol that 2 00:00:10,980 --> 00:00:16,770 allows secure access to a VPN to just make sure that you remember that for your interviews and other 3 00:00:16,770 --> 00:00:17,850 networking events. 4 00:00:18,570 --> 00:00:24,030 Well, in this lecture, we are going to talk about the generic routing encapsulation protocol. 5 00:00:24,030 --> 00:00:32,220 That is the grb protocol, very generic routing encapsulation protocol is a tunnelling protocol that 6 00:00:32,220 --> 00:00:36,810 can encapsulate many protocols inside the IP tunnels. 7 00:00:37,830 --> 00:00:45,060 Some examples would be routing protocols like eEye, grb and enhanced integer, gateway protocol, gateway 8 00:00:45,060 --> 00:00:51,360 routing protocol and the open source upo open source path first first protocol. 9 00:00:51,360 --> 00:01:00,010 That is the always protocol and IP protocol version six opensource, short, aspart first date. 10 00:01:00,660 --> 00:01:07,440 So now, uh, let me first tell you what, Jenna, regarding protocol is so basically generic routing 11 00:01:07,440 --> 00:01:13,500 protocol acts as a carrier protocol for many different protocols which want to, you know, go through 12 00:01:13,500 --> 00:01:23,100 the Internet, a tunnel interface, support a header for passenger protocol or encapsulated protocol 13 00:01:23,100 --> 00:01:28,830 like IP or IPV six, which is the protocol being encapsulated by Jeary. 14 00:01:29,730 --> 00:01:40,170 Now, Jeary Tunnels are basically they have a great header so that any third layer three, that is the 15 00:01:40,170 --> 00:01:47,610 network, clearly protocol can be used through the tunnel JRD a stateless and has no flow control. 16 00:01:48,210 --> 00:01:52,670 And most importantly, Jeary offers no security. 17 00:01:53,190 --> 00:01:58,410 It also creates additional overhead for tunnelled packets at least 24 bytes. 18 00:01:59,430 --> 00:02:01,550 So this is the VPN site here. 19 00:02:01,560 --> 00:02:02,900 Let me take my laser pointer. 20 00:02:02,910 --> 00:02:05,820 This is a VPN site and this is another VPN site. 21 00:02:06,450 --> 00:02:11,740 And here is this tunnel which acts as a carrier protocol through the IP network. 22 00:02:11,760 --> 00:02:19,110 It is the layer three of the assembled and this is the data packet which has the jihadi header right 23 00:02:19,110 --> 00:02:19,690 over here. 24 00:02:20,670 --> 00:02:22,740 So basically it creates a tunnel. 25 00:02:23,130 --> 00:02:26,940 They are the tunneling protocols, which we have already discussed. 26 00:02:27,690 --> 00:02:32,130 The PDP then details, protocols, all these are tendering protocols. 27 00:02:32,130 --> 00:02:36,060 They provide a path for other protocols to pass through them. 28 00:02:36,660 --> 00:02:43,230 In the next lecture, we will talk about the IP protocol, which is most important protocol when it 29 00:02:43,230 --> 00:02:45,870 comes to network security practices. 30 00:02:45,870 --> 00:02:50,550 So make sure that you are getting equipped yourself for the next lecture. 31 00:02:51,300 --> 00:02:57,500 Before moving ahead, I would like to request you to please review our courses and read our courses. 32 00:02:57,890 --> 00:03:03,750 Uh, my team has been dedicating around five to six months for this course and, uh, we could have 33 00:03:03,750 --> 00:03:08,310 easily, uh, you know, paid a huge amount from students. 34 00:03:08,310 --> 00:03:13,800 But we are offering this course at a very low price just for the sake that we really want to educate 35 00:03:13,800 --> 00:03:15,480 your people in return. 36 00:03:15,480 --> 00:03:18,120 You just have to write a nice, decent review. 37 00:03:18,120 --> 00:03:24,330 Or if you don't if you're not happy with Vitacost, just provide the honest feedback and waiting to 38 00:03:24,330 --> 00:03:28,110 see your, uh, personalized feedback in the review section. 39 00:03:28,500 --> 00:03:31,460 So let us get started with I.B. sic.