1.3 Describe the impact of infrastructure components in an enterprise network

1.3.a Firewalls Firewalls have some router line features – such as packet forwarding, packet filtering, NAT, PAT and redirection. Firewalls also behave similar to ACLs with a set of rules (and macros in more advanced software) to restrict traffic flow. Firewalls use the following rules to make decisions: router IP ACLs – matching source and …

1.2 Compare and contrast TCP and UDP protocols

Transmission Control Protocol and User Datagram Protocol are completely different protocols. TCP is connection oriented, supports windowing and has inbuilt error detection and recovery. UDP does not support any of these features and UDP packets are effectively thrown over the wall. UDP is useful in cases where either software take care of errors, or where …

1.1 Compare and contrast OSI and TCP/IP models

OSI was a rival to the TCP/IP model originally. But now the protocol is defunct and TCP/IP dominates the market. However the terminolgy used to describe OSI has survived and is still used to describe the networking and the TCP/IP model even though it doesn’t directly translate. The OSI layers are: Physical Data Link Network …