Computerz R Us Education Material
Training and reference content for networking, storage, security, Linux, hardware and CCTV – created and curated by Computerz R Us for technicians, students, and clients.
IPv4, IPv6 & Address Classes IP BASICS
IP addresses uniquely identify devices on a network. IPv4 is still the most common, while IPv6 was designed to solve address exhaustion and add better features for routing and security.
IPv4 Addressing 32-bit
- Format: 4 octets (e.g.,
192.168.1.10). - Size: ~4.3 billion addresses (232).
- Written: dotted-decimal notation.
- Network / Host split: controlled by subnet mask (e.g.,
/24).
Classful Legacy Ranges
| Class | Range | Default Mask | Typical Use |
|---|---|---|---|
| A | 1.0.0.0 – 126.255.255.255 | /8 (255.0.0.0) | Very large networks |
| B | 128.0.0.0 – 191.255.255.255 | /16 (255.255.0.0) | Medium networks |
| C | 192.0.0.0 – 223.255.255.255 | /24 (255.255.255.0) | Small networks |
Modern networks use CIDR (Classless Inter-Domain Routing) instead of strict A/B/C classes.
Private IPv4 Ranges
| Range | Size | Notes |
|---|---|---|
| 10.0.0.0/8 | ~16.7M hosts | Large orgs / ISPs |
| 172.16.0.0/12 | ~1M hosts | Enterprises |
| 192.168.0.0/16 | 65,536 hosts | Home & SMB LANs |
| 127.0.0.0/8 | Loopback | 127.0.0.1 = this device |
IPv6 Overview 128-bit
- Format: 8 groups of 4 hex digits (e.g.,
2001:0db8::1). - Size: 3.4 × 1038 addresses (basically unlimited).
- Shortening: leading zeros removed, one
::allowed. - Prefix length: e.g.,
/64for a typical subnet. - Types: Global unicast, link-local, unique local, multicast.
APIPA & Internet Connection Types CONNECTIVITY
When DHCP fails, Windows uses APIPA. On the WAN side, different technologies (DSL, cable, fiber, satellite, cellular) bring internet into the building.
APIPA (Automatic Private IP Addressing)
- Range: 169.254.0.0 – 169.254.255.255.
- Triggered when: Client cannot reach a DHCP server.
- Purpose: Allows limited local communication on same segment.
- No default gateway: No internet access with APIPA.
- Fix: Check DHCP, cabling, Wi-Fi, VLANs, IP conflicts.
If you see 169.254.x.x, think: “DHCP problem”.
Internet Access Types
- DSL: Uses phone lines, typically 5–100 Mbps down. Distance-sensitive.
- Cable: Coax via DOCSIS. 100–1200+ Mbps down, shared with neighbors.
- Fiber: Symmetric speeds, 100 Mbps – 10 Gbps+, low latency.
- Dial-Up: Legacy 56 kbps over analog phone lines. Very slow.
- Satellite: Wide coverage, high latency; weather sensitive.
- Cellular/Hotspot: 4G/5G using carriers (Verizon, T-Mobile, AT&T, etc.). Great backup/remote option.
Half vs Full Duplex & Ethernet Speeds LINK LAYER
Duplex describes how data flows on a link. Speed and duplex mismatches are a classic help desk issue.
Duplex Modes
- Half Duplex: Data flows one direction at a time (like a walkie-talkie).
- Full Duplex: Send and receive simultaneously (like a phone call).
- Collisions: Only an issue on half-duplex shared media (old hubs).
- Modern networks: Almost everything is full-duplex via switches.
Common Symptoms of Duplex Mismatch
- One end set to Auto, other hard-coded → half vs full mismatch.
- Slow file transfers despite good link speed.
- High CRC errors / late collisions on switch port.
Ethernet Speeds
| Standard | Speed | Duplex | Typical Cable |
|---|---|---|---|
| 10BASE-T | 10 Mbps | Half/Full* | Cat3 / Cat5 |
| 100BASE-TX | 100 Mbps | Full preferred | Cat5 / Cat5e |
| 1000BASE-T | 1 Gbps | Full | Cat5e / Cat6 |
| 2.5G / 5GBASE-T | 2.5 / 5 Gbps | Full | Cat5e / Cat6 (shorter runs) |
| 10GBASE-T | 10 Gbps | Full | Cat6a (up to 100m), Cat7/7a (shielded) |
| 25G / 40GBASE-T | 25 / 40 Gbps | Full | Cat8 (shielded, up to ~30m) |
Cat7/7a: shielded cable mainly for noisy or high-end environments (10G, some short higher-speed runs).
Cat8: heavily shielded, short-run (≈30m) data center cable for 25/40G links — not typically used in homes.
Which cable to pull?
• New home/small office: Cat6 or Cat6a (Cat6a if you want easy 10G later).
• Larger offices / new builds: Cat6a as the default standard.
• Specialty / noisy or shielded runs: Cat7/7a if the hardware actually supports it.
• Data center top-of-rack / super short high-speed copper: Cat8 or fiber.
Network Types: LAN, WAN, VPN & More TOPOLOGY
Networks are grouped by size and purpose—from your smartwatch talking to your phone, up to global ISP backbones.
LAN & WLAN
LAN – Local Area Network
- Connects devices in a small area: home, office, school.
- Uses Ethernet and/or Wi-Fi.
- High speed, low latency (1–10 Gbps typical).
- Managed locally; does not require internet to function.
WLAN – Wireless LAN
- Wi-Fi version of a LAN (2.4, 5, 6 GHz bands).
- Access points bridge wireless clients into the wired LAN.
- Same resources as LAN, just without cables.
MAN, WAN & CAN
MAN – Metropolitan Area Network
- Spans a city or metro area.
- Connects multiple LANs using fiber or wireless backhaul.
- Usually run by a carrier or municipality.
WAN – Wide Area Network
- Connects LANs/MANs across regions or countries.
- Uses leased lines, MPLS, VPN, or the public internet.
- The internet is the biggest WAN of all.
CAN – Campus Area Network
- Multiple LANs across a campus (university, corporate park).
- Often high-speed fiber links between buildings.
PAN, SAN & VPN
PAN – Personal Area Network
- Short-range devices (under ~10 m).
- Bluetooth, NFC, USB tethering.
SAN – Storage Area Network
- Dedicated network for storage arrays and servers.
- Uses Fibre Channel, iSCSI, or NVMe-oF.
VPN – Virtual Private Network
- Encrypted tunnel over untrusted networks.
- Site-to-site (branch to HQ) or remote-access (user to LAN).
Together, these network types form the backbone of modern communication.
Wi-Fi Standards, Bands & Security WIRELESS
Wireless lets laptops, phones, IoT, and cameras join the LAN without cables. The standard (802.11), band (2.4/5/6 GHz), and security (WPA2/WPA3) all affect speed, reliability, and safety.
Wi-Fi Standards & Bands
Bands & Channel Planning
- 2.4 GHz: Longer range, penetrates walls better, but only 3 non-overlapping channels (1, 6, 11) and lots of interference.
- 5 GHz: Shorter range, more channels, less interference; best for most laptops/phones in typical homes and offices.
- 6 GHz: Clean spectrum for Wi-Fi 6E/7; excellent in dense environments with modern devices.
- Channel width: 20/40/80/160 MHz:
- 20 MHz – most stable; best in dense neighborhoods and apartment buildings.
- 40/80 MHz – higher throughput, but more chance of overlap / interference.
- 160 MHz – only when spectrum is very clean and hardware supports it.
*Speeds shown are theoretical PHY rates. Real usable throughput is much lower and shared among all clients on that AP.
Wi-Fi Security & Best Practices
Security Modes
- Open: No password. Only for guest hotspots with isolation and captive portal; avoid for anything sensitive.
- WEP: Obsolete and broken. Do not use.
- WPA (TKIP): Older, weak by today’s standards. Avoid if possible.
- WPA2-Personal (PSK, AES): Minimum acceptable for most home/small business setups.
- WPA3-Personal (SAE): Stronger protection against password guessing; preferred when supported.
- WPA2/WPA3-Enterprise: Uses 802.1X + RADIUS; per-user credentials/certs for organizations.
Extra Considerations
- WPS (Wi-Fi Protected Setup): Push-button / PIN convenience, but can be exploited. Many admins disable it.
- Guest Networks:
- Use separate SSID/VLAN for guests.
- Isolate guests from LAN and each other.
- Optional captive portal for terms or vouchers.
- SSID & Password:
- Use strong passphrases (12+ chars, random or passphrase style).
- Avoid using company name + year as the password.
- Roaming & Coverage:
- Multiple APs with overlapping but not identical coverage.
- Same SSID/security across APs for smooth roaming.
- Use proper channel planning (don’t stack all APs on channel 6).
Simple rule: WPA2-AES at minimum, WPA3 where possible, guests on their own VLAN, WPS off unless truly needed.
- Target around -60 to -65 dBm or better where users sit/stand.
- Avoid hiding APs above metal ceilings, behind ductwork, or inside cabinets.
- Use 5 GHz / 6 GHz for performance SSIDs; keep 2.4 GHz for legacy/IoT.
- Overlap coverage cells about 15–20% for roaming, not 100% on top of each other.
- Start with 20 MHz channels in busy areas; widen only if spectrum is clean.
- Document SSIDs, VLANs, and which AP covers which area for future troubleshooting.
OSI Model (Layered Networking) 7 LAYERS
The OSI model is a conceptual way to think about how data moves through a network. Remember: All People Seem To Need Data Processing (Layers 7 → 1).
OSI Layers (Top to Bottom)
Common Mapping to Real Devices
- Firewalls: L3–L7 (routing, filtering, inspection).
- Routers: L3 (IP routing, VLAN routing).
- Switches: L2, some L3 (VLANs, inter-VLAN routing).
- Access Points (APs): L1–L2 (Wi-Fi radios & MAC handling).
- NICs: L1–L2 (physical link and MAC addressing).
When troubleshooting, ask “which layer is broken?” and move up/down systematically.
Common Admin Commands TROUBLESHOOTING
These CLI tools help test connectivity, name resolution, routing, and performance from end-user PCs or servers.
Tests basic IP reachability and round-trip time.
ping google.com
- Loss = packets dropped.
- High ms = latency issue.
Shows each hop between you and a remote destination.
traceroute google.com
- Watch where latency suddenly spikes.
- Good for ISP vs local network blame.
Shows IP configuration and adapters.
ifconfig
ip addr show
- Check IP, gateway, DNS, DHCP lease.
Tests DNS name resolution.
dig google.com
- Verify DNS server answers and records.
Lists active connections and listening ports.
netstat -tulpn (Linux)
- See which ports are in use and by which PID.
Map a shared drive to a letter.
- Check SMB ports (445) if mapping fails.
Modems, Routers, Switches, Firewalls & Shares DEVICES
Understanding what each device does in the path helps answer “where is it broken?”.
Modem
- Converts ISP signal (DSL, cable, fiber ONT) into Ethernet.
- Typically one public IP on the WAN side.
- Often managed by the ISP.
Think “ISP handoff” device.
Router
- Routes traffic between networks (WAN <-> LAN).
- Performs NAT/PAT so many private IPs share one public IP.
- Often includes basic firewall and Wi-Fi (home routers).
Default gateway for most clients.
Switch (L2 / L3)
- Layer 2: MAC address switching within a VLAN.
- Layer 3: Adds routing between VLANs (inter-VLAN).
- POE switches power APs, phones, cameras.
Connects devices inside the LAN.
Firewall
- Controls allowed/blocked traffic based on rules.
- May do IDS/IPS, content filtering, VPN, app control.
- Often sits between router and internal switches.
Security policy enforcement point.
Wireless Access Point (WAP)
- Provides Wi-Fi coverage for wireless clients.
- Bridges wireless into the wired LAN/VLAN.
- Must be placed for coverage & capacity (not just “somewhere”).
File Server & Shared Drives
- Stores shared folders (SMB/CIFS on Windows, NFS on Linux).
- Clients map drives (e.g.,
\\SERVER\Share). - Permissions controlled with NTFS / ACLs / groups.
Good documentation of shares & permissions saves help desk pain.
VoIP Basics & Protocols VOICE
Voice over IP turns phone calls into IP packets. It’s sensitive to latency, jitter, and packet loss.
SIP & RTP
- SIP (Session Initiation Protocol): Sets up, changes, and tears down calls.
- RTP (Real-time Transport Protocol): Carries the actual voice media.
- SDP: Negotiates codecs, ports, IPs inside SIP messages.
VoIP Network Considerations
- QoS: Prioritize voice VLAN or DSCP markings.
- Jitter / Latency: Keep round-trip < 150 ms for good quality.
- Codecs: G.711 (higher bandwidth, better quality), G.729/Opus (compressed).
- NAT Traversal: STUN, TURN, SBCs often required.
Common Ports & Email Protocols L4 PORTS
Ports identify specific services on a host. Many help desk tickets are just “this port is blocked”.
Common Network Ports
| Port | Protocol | Service |
|---|---|---|
| 20/21 | TCP | FTP (file transfer) |
| 22 | TCP | SSH (secure shell) |
| 23 | TCP | Telnet (insecure) |
| 53 | UDP/TCP | DNS |
| 67/68 | UDP | DHCP (server/client) |
| 80 | TCP | HTTP |
| 443 | TCP | HTTPS |
| 3389 | TCP | RDP (Remote Desktop) |
| 445 | TCP | SMB/CIFS (file shares) |
| 161/162 | UDP | SNMP (monitoring) |
| 123 | UDP | NTP (time sync) |
| 5060/5061 | UDP/TCP | SIP signaling |
Email Protocols & Ports
| Protocol | Port(s) | Use |
|---|---|---|
| SMTP | 25 | Mail transfer between servers (non-encrypted legacy) |
| SMTP Submission | 587 | Client to server with auth (modern standard) |
| SMTPS | 465 | Legacy SSL-wrapped SMTP (still seen) |
| POP3 | 110 | Downloads mail, usually removes from server |
| POP3S | 995 | POP3 over TLS/SSL |
| IMAP | 143 | Server-stored mail, folders & sync |
| IMAPS | 993 | IMAP over TLS/SSL |
Modern setups: IMAPS (993) for reading, SMTP submission (587) for sending.
RAID Levels & Parity STORAGE
RAID combines multiple disks for redundancy, performance, or both. It is not a backup, but it does reduce downtime from disk failures.
Common RAID Levels
| Level | Min Disks | Parity | Usable Capacity | Fault Tolerance | Good For |
|---|---|---|---|---|---|
| RAID 0 | 2+ | No | Sum of all disks | 0 disks | Speed only, scratch or temp data |
| RAID 1 | 2 | No (mirroring) | Size of one disk | 1 disk | OS drives and small critical workloads |
| RAID 5 | 3+ | Single parity | (N − 1) × disk size | 1 disk | General file servers (read-heavy) |
| RAID 6 | 4+ | Dual parity | (N − 2) × disk size | 2 disks | Larger arrays where rebuild time and risk are high |
| RAID 10 (1+0) | 4+ | No (striped mirrors) | (N / 2) × disk size | 1+ disks (varies by pair) | Databases, virtual machines, high-performance workloads |
Rule of thumb: RAID-10 for performance + resilience, RAID-6 for capacity + resilience, RAID-1 for simple mirroring.
Backup Strategies: Full, Incremental & Differential PROTECTION
RAID keeps you online during disk failures; backups protect you from deletion, ransomware, and disasters.
Backup Types
- Full Backup: Copies everything selected each time.
- Incremental: Copies only changes since the last any backup (full or incremental).
- Differential: Copies changes since the last full backup.
Incremental vs Differential
| Type | Daily Size | Restore Needs | Restore Speed | Good For |
|---|---|---|---|---|
| Full | Largest | Just that full | Fast | Weekly or monthly baseline images |
| Incremental | Smallest | Last full + all incrementals | Slowest (many restore steps) | Cloud and slow-links; bandwidth-limited sites |
| Differential | Medium (grows each day) | Last full + last differential | Faster than incremental | Balanced restore speed vs storage use |
Local vs Cloud Backups
Local Backups
- External drives, NAS, on-prem backup appliances.
- Fast restores for large amounts of data.
- But vulnerable to theft, fire, ransomware if always online.
Cloud Backups
- Data stored off-site in a provider’s data center.
- Good for disasters and off-site resilience.
- Restores limited by internet bandwidth and size.
MFA, 2FA & Passkeys AUTH
Strong authentication stops a lot of account takeovers. If a password gets phished or guessed, multi-factor authentication (MFA) adds a second gate: something you have or something you are.
Auth Factors & Options
- Something you know: Passwords, PINs, security questions.
- Something you have: Phone, hardware token, smart card, FIDO key.
- Something you are: Fingerprint, FaceID, biometrics.
Common MFA / 2FA Methods
- SMS Codes: One-time code sent by text. Better than nothing but vulnerable to SIM-swap and phishing.
- TOTP Apps: Time-based codes (Google Authenticator, Microsoft Authenticator, Authy). More secure than SMS.
- Push Approvals: “Approve / Deny” prompts on an app. Easy for users but watch for push fatigue.
- Hardware Tokens: FIDO2/U2F keys (YubiKey, etc.) or smart cards. Very strong, good for admins and high-risk accounts.
Passkeys & Best Practices
Passkeys (FIDO2/WebAuthn)
- Passwordless login using device-based cryptographic keys.
- Protected with biometrics or device PIN (phone, laptop, security key).
- Resistant to phishing — no code to type into a fake site.
Deployment Tips
- Enable MFA at least for:
- Admin accounts (AD, cloud, firewalls, routers).
- Email accounts (O365, Google Workspace, etc.).
- Remote access (VPN, RDP gateways, remote tools).
- Prefer app-based codes or passkeys over SMS when possible.
- Train users not to approve random push requests (MFA fatigue attacks).
- Store backup recovery codes securely (password manager, locked safe).
Quick order of strength (weakest → strongest): Password only < SMS code < Authenticator app < Hardware key / Passkey.
Fiber Types, Colors & Speeds OPTICS
Fiber provides high-speed, long-distance links. Jacket colors and labels quickly identify type.
Single-Mode vs Multi-Mode
Single-Mode (SMF)
- Very small core (~9µm), lasers as light source.
- Long distances: 10 km to 80+ km (WAN, long building runs).
- Jacket color often yellow.
Multi-Mode (MMF)
- Larger core (50/62.5µm), LEDs/VCSELs.
- Shorter distances: typically up to 300–400 m for 10G.
- Common data center and campus runs.
Fiber Types & Typical Use
| Type | Jacket | Speed/Distance (Typical) | Use |
|---|---|---|---|
| OS2 (SMF) | Yellow | 1G/10G up to 10–40 km+ | Long runs, ISP, metro links |
| OM1 | Orange | 1G up to 275–550 m | Legacy multimode |
| OM2 | Orange | 1G up to ~550 m | Older campuses |
| OM3 | Aqua | 10G up to 300 m | Modern data centers |
| OM4 | Aqua/Violet | 10G up to 400+ m | High-density DC |
| OM5 | Lime Green | WDM multimode, advanced DC | Future-oriented DC designs |
Connectors: LC is most common now; SC/ST seen in older gear.
Display Technologies: LCD, OLED & More MONITORS
Different panels trade off between color, speed, contrast, price, and lifetime.
LCD & LED
- LCD (Liquid Crystal Display): Uses a backlight shining through liquid crystals.
- LED (Backlit LCD): LCD using LED backlighting (edge-lit or full-array).
- Good for general office, low cost, no burn-in.
IPS, TN & VA Panels
- IPS (In-Plane Switching): Great color and viewing angles; ideal for design & office.
- TN (Twisted Nematic): Fast response, weaker color; budget and esports gaming.
- VA (Vertical Alignment): Deep blacks, high contrast; good for movies and curved screens.
OLED, QLED, Mini-LED, Micro-LED
- OLED: Self-emitting pixels, infinite contrast; can burn in with static content.
- QLED: Quantum dots + LED backlight; bright, vivid, no burn-in.
- Mini-LED: Thousands of tiny LEDs for precise local dimming, great HDR.
- Micro-LED: Self-emitting micro pixels; OLED-like contrast without burn-in (future tech, expensive).
Quick Comparison
| Tech | Contrast | Viewing Angle | Color | Burn-In Risk | Best For |
|---|---|---|---|---|---|
| IPS LCD | Medium | Wide | Excellent | None | Office, design |
| TN LCD | Low | Narrow | Poor-fair | None | Budget, esports |
| VA LCD | High | Moderate | Good | None | Movies, curved |
| OLED | Infinite | Wide | Excellent | Possible | High-end TVs, monitors |
| Mini-LED | Very High | Wide | Excellent | None | HDR, pro laptops |
| Micro-LED | Infinite | Wide | Excellent | None | Future premium displays |
Motherboard Chipset: Northbridge & Southbridge HARDWARE
Older PC architectures split the motherboard chipset into a Northbridge (high-speed CPU links) and Southbridge (I/O and legacy devices). Modern systems integrate most Northbridge functions into the CPU and use a single PCH (Platform Controller Hub), but the concepts are still useful for learning.
Northbridge (Memory / High-Speed Hub)
- Sits closest to the CPU on the motherboard.
- Handles high-speed communication between:
- CPU <-> RAM (memory controller).
- CPU <-> high-speed graphics (AGP / PCI Express x16).
- CPU <-> Southbridge (downstream link).
- Directly affects:
- Maximum supported RAM type and speed (DDR versions, timings).
- Number and speed of PCIe lanes for GPUs and high-speed cards.
- Front Side Bus (FSB) speed on older Intel platforms.
- Runs hotter and may need its own heatsink because of high-speed traffic.
Think of the Northbridge as the “fast lane” traffic controller for CPU, RAM, and GPU in classic PC designs.
Southbridge (I/O & Legacy Hub)
- Connects slower peripherals and legacy devices to the rest of the system.
- Traditionally handled:
- PCI and PCIe x1 slots (low-speed expansion cards).
- SATA / IDE controllers for hard drives and optical drives.
- USB ports, PS/2 keyboard/mouse ports.
- Onboard audio, network (LAN), and miscellaneous controllers.
- CMOS/BIOS, real-time clock, some power management.
- Connected upstream to the Northbridge via a chipset link (e.g., DMI, proprietary bus).
- Lower bandwidth than Northbridge but supports many more devices.
The Southbridge is the “I/O hub” that ties together storage, USB, and onboard devices.
Modern View: Integrated Memory Controller & PCH
- Modern CPUs (Intel & AMD) integrate:
- Memory controller (Northbridge function) into the CPU itself.
- PCIe lanes for GPU and NVMe directly off the CPU package.
- The traditional Southbridge roles are handled by a single chip:
- Intel calls it the PCH (Platform Controller Hub).
- AMD calls it the chipset (e.g., B550, X670).
- Even though physical Northbridge chips disappeared, exam questions and older docs still refer to “northbridge” and “southbridge” as logical roles.
In short: old design = CPU + Northbridge + Southbridge; new design = CPU (with “northbridge” inside) + PCH.
Linux Filesystem & File Types LINUX
Linux uses a single rooted tree (/). Everything is a file: devices, directories, sockets, and regular files.
Key Directories
- /bin – Essential user binaries (e.g.,
ls,cp,mv). - /sbin – System binaries (e.g.,
fsck,iptables). - /etc – System-wide configuration files.
- /home – User home directories.
- /opt – Optional or third-party software.
- /tmp – Temporary files, often cleared at reboot.
- /usr – User programs, libraries, documentation.
- /var – Variable data (logs, mail, spool, DBs).
- /dev – Device files (disks, terminals, etc.).
- /proc – Virtual filesystem exposing kernel & process info.
File Types
- Regular file (-): Text, binaries, media.
- Directory (d): Folder containing other files.
- Character device (c): Serial devices, keyboards.
- Block device (b): Disks, partitions.
- Symbolic link (l): Pointer to another path.
- Socket (s): For IPC and networking.
- FIFO/Named pipe (p): One-way inter-process communication.
# First character shows file type (-, d, l, b, c, s, p)
Help Desk Levels 1, 2 & 3 SUPPORT
Support teams are often layered so simple issues don’t clog the experts and complex issues get proper escalation.
Level 1 (L1) – Front Line
- First contact via phone, email, or ticket.
- Handle password resets, basic troubleshooting, how-to questions.
- Use scripts and knowledge base articles.
- Gather logs and details for more complex issues.
- Escalate when beyond scope or time limit.
Level 2 (L2) – Technical Specialists
- Deeper OS, network, and application troubleshooting.
- Work with servers, AD, group policies, VPN, printing, etc.
- Analyze logs and patterns, perform remote sessions.
- Implement non-standard fixes and changes.
Level 3 (L3) – Experts / Engineering
- Senior admins, network engineers, developers.
- Handle complex outages, design issues, and bugs.
- Work with vendors on escalated support cases.
- Design improvements, standards, and automations.
Security Camera Lens Angles & Distances CCTV
Lens focal length changes how much you see and how far. Wide lenses cover more area but less detail at distance; telephoto lenses see further but in a narrower slice.
Lens Types & Usage
- 2.8 mm (Wide): Very wide FOV (~100°). Great for doorways, porches, small yards.
- 4 mm (Medium): Balanced FOV (~80°). Good for driveways, small parking areas.
- 6–12 mm (Tele): Narrow FOV (~30–50°). Good for gates, far corners, license plates.
- Varifocal (e.g., 2.8–12 mm): Adjustable zoom to tune the scene after mounting.
Rule of thumb: wide at doors & entries, telephoto for long driveways & plates.