Rohith Perumalla | 4/2/17 Download Post
This past week I began learning about Access lists in routers and had the opportunity to , compete at the Spring Semester Battle of the Brains. Router handle packets that come in from , different interfaces and send them out to their destination out another interface. Routers , implement Access Lists, sequential list of permit or deny statements that apply to addresses or , upper layer protocols. Access Lists are used to limit the traffic to increase network performance, , provide traffic control, provide basic level of security, and minimize routing processes to ensure , maximum performance. In Access Lists there are a series of Access Control Entries that check , each packet to ensure that the packet is valid or approved for processing. Access Control Entries , are composed of a “permit” or “deny” tag for each address with a wildcard mask. Access Lists , used for inbound packets is the most effective. It is also important to remember that Access Lists , have an implicit deny at the end of the list. In theory, Access Lists increase router processing , efficiency, and provide some form of basic security for routers and networks. Also this past week , I had the opportunity to compete at the Spring Battle of the Brains contest hosted by UTD. At , the event I participated with my team to attempt to solve as many of the given problems in 3 , hours in java. Overall, the competition was extremely competitive and a great learning , experience not only about code but also about working with a team to create a solution.