Computerz R Us Education Material

Training and reference content for networking, storage, security, Linux, hardware and CCTV – created and curated by Computerz R Us for technicians, students, and clients.

IPv4, IPv6 & Address Classes

IP addresses uniquely identify devices on a network. IPv4 is still the most common, while IPv6 was designed to solve address exhaustion and add better features for routing and security.

IPv4 Addressing 32-bit

  • Format: 4 octets (e.g., 192.168.1.10).
  • Size: ~4.3 billion addresses (232).
  • Written: dotted-decimal notation.
  • Network / Host split: controlled by subnet mask (e.g., /24).

Classful Legacy Ranges

Class Range Default Mask Typical Use
A 1.0.0.0 – 126.255.255.255 /8 (255.0.0.0) Very large networks
B 128.0.0.0 – 191.255.255.255 /16 (255.255.0.0) Medium networks
C 192.0.0.0 – 223.255.255.255 /24 (255.255.255.0) Small networks

Modern networks use CIDR (Classless Inter-Domain Routing) instead of strict A/B/C classes.

Private IPv4 Ranges

Range Size Notes
10.0.0.0/8 ~16.7M hosts Large orgs / ISPs
172.16.0.0/12 ~1M hosts Enterprises
192.168.0.0/16 65,536 hosts Home & SMB LANs
127.0.0.0/8 Loopback 127.0.0.1 = this device

IPv6 Overview 128-bit

  • Format: 8 groups of 4 hex digits (e.g., 2001:0db8::1).
  • Size: 3.4 × 1038 addresses (basically unlimited).
  • Shortening: leading zeros removed, one :: allowed.
  • Prefix length: e.g., /64 for a typical subnet.
  • Types: Global unicast, link-local, unique local, multicast.

APIPA & Internet Connection Types

When DHCP fails, Windows uses APIPA. On the WAN side, different technologies (DSL, cable, fiber, satellite, cellular) bring internet into the building.

APIPA (Automatic Private IP Addressing)

  • Range: 169.254.0.0 – 169.254.255.255.
  • Triggered when: Client cannot reach a DHCP server.
  • Purpose: Allows limited local communication on same segment.
  • No default gateway: No internet access with APIPA.
  • Fix: Check DHCP, cabling, Wi-Fi, VLANs, IP conflicts.

If you see 169.254.x.x, think: “DHCP problem”.

Internet Access Types

  • DSL: Uses phone lines, typically 5–100 Mbps down. Distance-sensitive.
  • Cable: Coax via DOCSIS. 100–1200+ Mbps down, shared with neighbors.
  • Fiber: Symmetric speeds, 100 Mbps – 10 Gbps+, low latency.
  • Dial-Up: Legacy 56 kbps over analog phone lines. Very slow.
  • Satellite: Wide coverage, high latency; weather sensitive.
  • Cellular/Hotspot: 4G/5G using carriers (Verizon, T-Mobile, AT&T, etc.). Great backup/remote option.
Primary: Fiber > Cable > DSL Backup: Cellular hotspot Remote: Satellite / LTE

Half vs Full Duplex & Ethernet Speeds

Duplex describes how data flows on a link. Speed and duplex mismatches are a classic help desk issue.

Duplex Modes

  • Half Duplex: Data flows one direction at a time (like a walkie-talkie).
  • Full Duplex: Send and receive simultaneously (like a phone call).
  • Collisions: Only an issue on half-duplex shared media (old hubs).
  • Modern networks: Almost everything is full-duplex via switches.

Common Symptoms of Duplex Mismatch

  • One end set to Auto, other hard-coded → half vs full mismatch.
  • Slow file transfers despite good link speed.
  • High CRC errors / late collisions on switch port.

Ethernet Speeds

Standard Speed Duplex Typical Cable
10BASE-T 10 Mbps Half/Full* Cat3 / Cat5
100BASE-TX 100 Mbps Full preferred Cat5 / Cat5e
1000BASE-T 1 Gbps Full Cat5e / Cat6
2.5G / 5GBASE-T 2.5 / 5 Gbps Full Cat5e / Cat6 (shorter runs)
10GBASE-T 10 Gbps Full Cat6a (up to 100m), Cat7/7a (shielded)
25G / 40GBASE-T 25 / 40 Gbps Full Cat8 (shielded, up to ~30m)

Cat7/7a: shielded cable mainly for noisy or high-end environments (10G, some short higher-speed runs).
Cat8: heavily shielded, short-run (≈30m) data center cable for 25/40G links — not typically used in homes.

Which cable to pull?
• New home/small office: Cat6 or Cat6a (Cat6a if you want easy 10G later).
• Larger offices / new builds: Cat6a as the default standard.
• Specialty / noisy or shielded runs: Cat7/7a if the hardware actually supports it.
• Data center top-of-rack / super short high-speed copper: Cat8 or fiber.

Network Types: LAN, WAN, VPN & More

Networks are grouped by size and purpose—from your smartwatch talking to your phone, up to global ISP backbones.

LAN & WLAN

LAN – Local Area Network

  • Connects devices in a small area: home, office, school.
  • Uses Ethernet and/or Wi-Fi.
  • High speed, low latency (1–10 Gbps typical).
  • Managed locally; does not require internet to function.

WLAN – Wireless LAN

  • Wi-Fi version of a LAN (2.4, 5, 6 GHz bands).
  • Access points bridge wireless clients into the wired LAN.
  • Same resources as LAN, just without cables.

MAN, WAN & CAN

MAN – Metropolitan Area Network

  • Spans a city or metro area.
  • Connects multiple LANs using fiber or wireless backhaul.
  • Usually run by a carrier or municipality.

WAN – Wide Area Network

  • Connects LANs/MANs across regions or countries.
  • Uses leased lines, MPLS, VPN, or the public internet.
  • The internet is the biggest WAN of all.

CAN – Campus Area Network

  • Multiple LANs across a campus (university, corporate park).
  • Often high-speed fiber links between buildings.

PAN, SAN & VPN

PAN – Personal Area Network

  • Short-range devices (under ~10 m).
  • Bluetooth, NFC, USB tethering.

SAN – Storage Area Network

  • Dedicated network for storage arrays and servers.
  • Uses Fibre Channel, iSCSI, or NVMe-oF.

VPN – Virtual Private Network

  • Encrypted tunnel over untrusted networks.
  • Site-to-site (branch to HQ) or remote-access (user to LAN).

Together, these network types form the backbone of modern communication.

Wi-Fi Standards, Bands & Security

Wireless lets laptops, phones, IoT, and cameras join the LAN without cables. The standard (802.11), band (2.4/5/6 GHz), and security (WPA2/WPA3) all affect speed, reliability, and safety.

Wi-Fi Standards & Bands

802.11b – 2.4 GHz – up to 11 Mbps
Very old and slow; only 2.4 GHz, heavily interfered. Avoid in modern networks.
802.11a – 5 GHz – up to 54 Mbps
Early 5 GHz standard, mostly obsolete now.
802.11g – 2.4 GHz – up to 54 Mbps
Legacy 2.4 GHz; still seen on old home routers, often mixed with newer modes.
802.11n (Wi-Fi 4) – 2.4 & 5 GHz – up to ~600 Mbps*
Introduced MIMO; still common on older APs and many ISP gateways.
802.11ac (Wi-Fi 5) – 5 GHz – > 1 Gbps*
Most current mid-range gear; supports 80/160 MHz channels, good for homes/offices.
802.11ax (Wi-Fi 6 / 6E) – 2.4, 5 & 6 GHz – up to 9.6 Gbps*
More efficient in crowded areas (OFDMA, better scheduling). 6E uses the new 6 GHz band.
802.11be (Wi-Fi 7) – 2.4, 5 & 6 GHz – multi-Gbps*
Next-generation; very wide channels, multi-link operation. Early adoption in high-end gear.

Bands & Channel Planning

  • 2.4 GHz: Longer range, penetrates walls better, but only 3 non-overlapping channels (1, 6, 11) and lots of interference.
  • 5 GHz: Shorter range, more channels, less interference; best for most laptops/phones in typical homes and offices.
  • 6 GHz: Clean spectrum for Wi-Fi 6E/7; excellent in dense environments with modern devices.
  • Channel width: 20/40/80/160 MHz:
    • 20 MHz – most stable; best in dense neighborhoods and apartment buildings.
    • 40/80 MHz – higher throughput, but more chance of overlap / interference.
    • 160 MHz – only when spectrum is very clean and hardware supports it.

*Speeds shown are theoretical PHY rates. Real usable throughput is much lower and shared among all clients on that AP.

Wi-Fi Security & Best Practices

Security Modes

  • Open: No password. Only for guest hotspots with isolation and captive portal; avoid for anything sensitive.
  • WEP: Obsolete and broken. Do not use.
  • WPA (TKIP): Older, weak by today’s standards. Avoid if possible.
  • WPA2-Personal (PSK, AES): Minimum acceptable for most home/small business setups.
  • WPA3-Personal (SAE): Stronger protection against password guessing; preferred when supported.
  • WPA2/WPA3-Enterprise: Uses 802.1X + RADIUS; per-user credentials/certs for organizations.

Extra Considerations

  • WPS (Wi-Fi Protected Setup): Push-button / PIN convenience, but can be exploited. Many admins disable it.
  • Guest Networks:
    • Use separate SSID/VLAN for guests.
    • Isolate guests from LAN and each other.
    • Optional captive portal for terms or vouchers.
  • SSID & Password:
    • Use strong passphrases (12+ chars, random or passphrase style).
    • Avoid using company name + year as the password.
  • Roaming & Coverage:
    • Multiple APs with overlapping but not identical coverage.
    • Same SSID/security across APs for smooth roaming.
    • Use proper channel planning (don’t stack all APs on channel 6).

Simple rule: WPA2-AES at minimum, WPA3 where possible, guests on their own VLAN, WPS off unless truly needed.

Wi-Fi Design Tips (Quick)
  • Target around -60 to -65 dBm or better where users sit/stand.
  • Avoid hiding APs above metal ceilings, behind ductwork, or inside cabinets.
  • Use 5 GHz / 6 GHz for performance SSIDs; keep 2.4 GHz for legacy/IoT.
  • Overlap coverage cells about 15–20% for roaming, not 100% on top of each other.
  • Start with 20 MHz channels in busy areas; widen only if spectrum is clean.
  • Document SSIDs, VLANs, and which AP covers which area for future troubleshooting.

OSI Model (Layered Networking)

The OSI model is a conceptual way to think about how data moves through a network. Remember: All People Seem To Need Data Processing (Layers 7 → 1).

OSI Layers (Top to Bottom)

Layer 7 – Application L7
User-facing protocols: HTTP, HTTPS, FTP, SMTP, IMAP, DNS clients.
Layer 6 – Presentation L6
Data format, encryption, compression (TLS, SSL, JPEG, MPEG, JSON).
Layer 5 – Session L5
Manages sessions: start, maintain, end (NetBIOS, RPC).
Layer 4 – Transport L4
TCP/UDP, port numbers, segmentation, reliability and flow control.
Layer 3 – Network L3
IP addressing, routing, logical paths (IPv4, IPv6, routers).
Layer 2 – Data Link L2
MAC addresses, Ethernet frames, switches, VLANs.
Layer 1 – Physical L1
Cables, fiber, radio waves, hubs, electrical/optical signaling.

Common Mapping to Real Devices

  • Firewalls: L3–L7 (routing, filtering, inspection).
  • Routers: L3 (IP routing, VLAN routing).
  • Switches: L2, some L3 (VLANs, inter-VLAN routing).
  • Access Points (APs): L1–L2 (Wi-Fi radios & MAC handling).
  • NICs: L1–L2 (physical link and MAC addressing).

When troubleshooting, ask “which layer is broken?” and move up/down systematically.

Common Admin Commands

These CLI tools help test connectivity, name resolution, routing, and performance from end-user PCs or servers.

PING
Windows / Linux / macOS

Tests basic IP reachability and round-trip time.

ping 8.8.8.8
ping google.com
  • Loss = packets dropped.
  • High ms = latency issue.
TRACERT / TRACEROUTE
Windows (tracert) / Linux (traceroute)

Shows each hop between you and a remote destination.

tracert google.com
traceroute google.com
  • Watch where latency suddenly spikes.
  • Good for ISP vs local network blame.
IPCONFIG / IFCONFIG / IP
Windows / Linux / macOS

Shows IP configuration and adapters.

ipconfig /all
ifconfig
ip addr show
  • Check IP, gateway, DNS, DHCP lease.
NSLOOKUP / DIG
Windows / Linux / macOS

Tests DNS name resolution.

nslookup google.com
dig google.com
  • Verify DNS server answers and records.
NETSTAT
Windows / Linux / macOS

Lists active connections and listening ports.

netstat -ano (Windows)
netstat -tulpn (Linux)
  • See which ports are in use and by which PID.
SHARE / MAPPING
Windows clients

Map a shared drive to a letter.

net use Z: \\SERVER\Share /persistent:yes
  • Check SMB ports (445) if mapping fails.

Modems, Routers, Switches, Firewalls & Shares

Understanding what each device does in the path helps answer “where is it broken?”.

Modem

  • Converts ISP signal (DSL, cable, fiber ONT) into Ethernet.
  • Typically one public IP on the WAN side.
  • Often managed by the ISP.

Think “ISP handoff” device.

Router

  • Routes traffic between networks (WAN <-> LAN).
  • Performs NAT/PAT so many private IPs share one public IP.
  • Often includes basic firewall and Wi-Fi (home routers).

Default gateway for most clients.

Switch (L2 / L3)

  • Layer 2: MAC address switching within a VLAN.
  • Layer 3: Adds routing between VLANs (inter-VLAN).
  • POE switches power APs, phones, cameras.

Connects devices inside the LAN.

Firewall

  • Controls allowed/blocked traffic based on rules.
  • May do IDS/IPS, content filtering, VPN, app control.
  • Often sits between router and internal switches.

Security policy enforcement point.

Wireless Access Point (WAP)

  • Provides Wi-Fi coverage for wireless clients.
  • Bridges wireless into the wired LAN/VLAN.
  • Must be placed for coverage & capacity (not just “somewhere”).

File Server & Shared Drives

  • Stores shared folders (SMB/CIFS on Windows, NFS on Linux).
  • Clients map drives (e.g., \\SERVER\Share).
  • Permissions controlled with NTFS / ACLs / groups.

Good documentation of shares & permissions saves help desk pain.

VoIP Basics & Protocols

Voice over IP turns phone calls into IP packets. It’s sensitive to latency, jitter, and packet loss.

SIP & RTP

  • SIP (Session Initiation Protocol): Sets up, changes, and tears down calls.
  • RTP (Real-time Transport Protocol): Carries the actual voice media.
  • SDP: Negotiates codecs, ports, IPs inside SIP messages.
Signaling: SIP (port 5060/5061) Media: RTP (dynamic ports)

VoIP Network Considerations

  • QoS: Prioritize voice VLAN or DSCP markings.
  • Jitter / Latency: Keep round-trip < 150 ms for good quality.
  • Codecs: G.711 (higher bandwidth, better quality), G.729/Opus (compressed).
  • NAT Traversal: STUN, TURN, SBCs often required.

Common Ports & Email Protocols

Ports identify specific services on a host. Many help desk tickets are just “this port is blocked”.

Common Network Ports

Port Protocol Service
20/21 TCP FTP (file transfer)
22 TCP SSH (secure shell)
23 TCP Telnet (insecure)
53 UDP/TCP DNS
67/68 UDP DHCP (server/client)
80 TCP HTTP
443 TCP HTTPS
3389 TCP RDP (Remote Desktop)
445 TCP SMB/CIFS (file shares)
161/162 UDP SNMP (monitoring)
123 UDP NTP (time sync)
5060/5061 UDP/TCP SIP signaling

Email Protocols & Ports

Protocol Port(s) Use
SMTP 25 Mail transfer between servers (non-encrypted legacy)
SMTP Submission 587 Client to server with auth (modern standard)
SMTPS 465 Legacy SSL-wrapped SMTP (still seen)
POP3 110 Downloads mail, usually removes from server
POP3S 995 POP3 over TLS/SSL
IMAP 143 Server-stored mail, folders & sync
IMAPS 993 IMAP over TLS/SSL

Modern setups: IMAPS (993) for reading, SMTP submission (587) for sending.

RAID Levels & Parity

RAID combines multiple disks for redundancy, performance, or both. It is not a backup, but it does reduce downtime from disk failures.

Common RAID Levels

Level Min Disks Parity Usable Capacity Fault Tolerance Good For
RAID 0 2+ No Sum of all disks 0 disks Speed only, scratch or temp data
RAID 1 2 No (mirroring) Size of one disk 1 disk OS drives and small critical workloads
RAID 5 3+ Single parity (N − 1) × disk size 1 disk General file servers (read-heavy)
RAID 6 4+ Dual parity (N − 2) × disk size 2 disks Larger arrays where rebuild time and risk are high
RAID 10 (1+0) 4+ No (striped mirrors) (N / 2) × disk size 1+ disks (varies by pair) Databases, virtual machines, high-performance workloads

Rule of thumb: RAID-10 for performance + resilience, RAID-6 for capacity + resilience, RAID-1 for simple mirroring.

Backup Strategies: Full, Incremental & Differential

RAID keeps you online during disk failures; backups protect you from deletion, ransomware, and disasters.

Backup Types

  • Full Backup: Copies everything selected each time.
  • Incremental: Copies only changes since the last any backup (full or incremental).
  • Differential: Copies changes since the last full backup.

Incremental vs Differential

Type Daily Size Restore Needs Restore Speed Good For
Full Largest Just that full Fast Weekly or monthly baseline images
Incremental Smallest Last full + all incrementals Slowest (many restore steps) Cloud and slow-links; bandwidth-limited sites
Differential Medium (grows each day) Last full + last differential Faster than incremental Balanced restore speed vs storage use

Local vs Cloud Backups

Local Backups

  • External drives, NAS, on-prem backup appliances.
  • Fast restores for large amounts of data.
  • But vulnerable to theft, fire, ransomware if always online.

Cloud Backups

  • Data stored off-site in a provider’s data center.
  • Good for disasters and off-site resilience.
  • Restores limited by internet bandwidth and size.
3-2-1 Rule 3 copies of data 2 different media 1 off-site copy

MFA, 2FA & Passkeys

Strong authentication stops a lot of account takeovers. If a password gets phished or guessed, multi-factor authentication (MFA) adds a second gate: something you have or something you are.

Auth Factors & Options

  • Something you know: Passwords, PINs, security questions.
  • Something you have: Phone, hardware token, smart card, FIDO key.
  • Something you are: Fingerprint, FaceID, biometrics.

Common MFA / 2FA Methods

  • SMS Codes: One-time code sent by text. Better than nothing but vulnerable to SIM-swap and phishing.
  • TOTP Apps: Time-based codes (Google Authenticator, Microsoft Authenticator, Authy). More secure than SMS.
  • Push Approvals: “Approve / Deny” prompts on an app. Easy for users but watch for push fatigue.
  • Hardware Tokens: FIDO2/U2F keys (YubiKey, etc.) or smart cards. Very strong, good for admins and high-risk accounts.

Passkeys & Best Practices

Passkeys (FIDO2/WebAuthn)

  • Passwordless login using device-based cryptographic keys.
  • Protected with biometrics or device PIN (phone, laptop, security key).
  • Resistant to phishing — no code to type into a fake site.

Deployment Tips

  • Enable MFA at least for:
    • Admin accounts (AD, cloud, firewalls, routers).
    • Email accounts (O365, Google Workspace, etc.).
    • Remote access (VPN, RDP gateways, remote tools).
  • Prefer app-based codes or passkeys over SMS when possible.
  • Train users not to approve random push requests (MFA fatigue attacks).
  • Store backup recovery codes securely (password manager, locked safe).

Quick order of strength (weakest → strongest): Password only < SMS code < Authenticator app < Hardware key / Passkey.

Fiber Types, Colors & Speeds

Fiber provides high-speed, long-distance links. Jacket colors and labels quickly identify type.

Single-Mode vs Multi-Mode

Single-Mode (SMF)

  • Very small core (~9µm), lasers as light source.
  • Long distances: 10 km to 80+ km (WAN, long building runs).
  • Jacket color often yellow.

Multi-Mode (MMF)

  • Larger core (50/62.5µm), LEDs/VCSELs.
  • Shorter distances: typically up to 300–400 m for 10G.
  • Common data center and campus runs.
Single-Mode (OS1/OS2) OM3 (Aqua MMF) OM4/OM5 (Violet/Lime MMF)

Fiber Types & Typical Use

Type Jacket Speed/Distance (Typical) Use
OS2 (SMF) Yellow 1G/10G up to 10–40 km+ Long runs, ISP, metro links
OM1 Orange 1G up to 275–550 m Legacy multimode
OM2 Orange 1G up to ~550 m Older campuses
OM3 Aqua 10G up to 300 m Modern data centers
OM4 Aqua/Violet 10G up to 400+ m High-density DC
OM5 Lime Green WDM multimode, advanced DC Future-oriented DC designs

Connectors: LC is most common now; SC/ST seen in older gear.

Display Technologies: LCD, OLED & More

Different panels trade off between color, speed, contrast, price, and lifetime.

LCD & LED

  • LCD (Liquid Crystal Display): Uses a backlight shining through liquid crystals.
  • LED (Backlit LCD): LCD using LED backlighting (edge-lit or full-array).
  • Good for general office, low cost, no burn-in.

IPS, TN & VA Panels

  • IPS (In-Plane Switching): Great color and viewing angles; ideal for design & office.
  • TN (Twisted Nematic): Fast response, weaker color; budget and esports gaming.
  • VA (Vertical Alignment): Deep blacks, high contrast; good for movies and curved screens.

OLED, QLED, Mini-LED, Micro-LED

  • OLED: Self-emitting pixels, infinite contrast; can burn in with static content.
  • QLED: Quantum dots + LED backlight; bright, vivid, no burn-in.
  • Mini-LED: Thousands of tiny LEDs for precise local dimming, great HDR.
  • Micro-LED: Self-emitting micro pixels; OLED-like contrast without burn-in (future tech, expensive).

Quick Comparison

Tech Contrast Viewing Angle Color Burn-In Risk Best For
IPS LCD Medium Wide Excellent None Office, design
TN LCD Low Narrow Poor-fair None Budget, esports
VA LCD High Moderate Good None Movies, curved
OLED Infinite Wide Excellent Possible High-end TVs, monitors
Mini-LED Very High Wide Excellent None HDR, pro laptops
Micro-LED Infinite Wide Excellent None Future premium displays

Motherboard Chipset: Northbridge & Southbridge

Older PC architectures split the motherboard chipset into a Northbridge (high-speed CPU links) and Southbridge (I/O and legacy devices). Modern systems integrate most Northbridge functions into the CPU and use a single PCH (Platform Controller Hub), but the concepts are still useful for learning.

Northbridge (Memory / High-Speed Hub)

  • Sits closest to the CPU on the motherboard.
  • Handles high-speed communication between:
    • CPU <-> RAM (memory controller).
    • CPU <-> high-speed graphics (AGP / PCI Express x16).
    • CPU <-> Southbridge (downstream link).
  • Directly affects:
    • Maximum supported RAM type and speed (DDR versions, timings).
    • Number and speed of PCIe lanes for GPUs and high-speed cards.
    • Front Side Bus (FSB) speed on older Intel platforms.
  • Runs hotter and may need its own heatsink because of high-speed traffic.

Think of the Northbridge as the “fast lane” traffic controller for CPU, RAM, and GPU in classic PC designs.

Southbridge (I/O & Legacy Hub)

  • Connects slower peripherals and legacy devices to the rest of the system.
  • Traditionally handled:
    • PCI and PCIe x1 slots (low-speed expansion cards).
    • SATA / IDE controllers for hard drives and optical drives.
    • USB ports, PS/2 keyboard/mouse ports.
    • Onboard audio, network (LAN), and miscellaneous controllers.
    • CMOS/BIOS, real-time clock, some power management.
  • Connected upstream to the Northbridge via a chipset link (e.g., DMI, proprietary bus).
  • Lower bandwidth than Northbridge but supports many more devices.

The Southbridge is the “I/O hub” that ties together storage, USB, and onboard devices.

Modern View: Integrated Memory Controller & PCH

  • Modern CPUs (Intel & AMD) integrate:
    • Memory controller (Northbridge function) into the CPU itself.
    • PCIe lanes for GPU and NVMe directly off the CPU package.
  • The traditional Southbridge roles are handled by a single chip:
    • Intel calls it the PCH (Platform Controller Hub).
    • AMD calls it the chipset (e.g., B550, X670).
  • Even though physical Northbridge chips disappeared, exam questions and older docs still refer to “northbridge” and “southbridge” as logical roles.

In short: old design = CPU + Northbridge + Southbridge; new design = CPU (with “northbridge” inside) + PCH.

Linux Filesystem & File Types

Linux uses a single rooted tree (/). Everything is a file: devices, directories, sockets, and regular files.

Key Directories

  • /bin – Essential user binaries (e.g., ls, cp, mv).
  • /sbin – System binaries (e.g., fsck, iptables).
  • /etc – System-wide configuration files.
  • /home – User home directories.
  • /opt – Optional or third-party software.
  • /tmp – Temporary files, often cleared at reboot.
  • /usr – User programs, libraries, documentation.
  • /var – Variable data (logs, mail, spool, DBs).
  • /dev – Device files (disks, terminals, etc.).
  • /proc – Virtual filesystem exposing kernel & process info.

File Types

  • Regular file (-): Text, binaries, media.
  • Directory (d): Folder containing other files.
  • Character device (c): Serial devices, keyboards.
  • Block device (b): Disks, partitions.
  • Symbolic link (l): Pointer to another path.
  • Socket (s): For IPC and networking.
  • FIFO/Named pipe (p): One-way inter-process communication.
ls -l
# First character shows file type (-, d, l, b, c, s, p)

Help Desk Levels 1, 2 & 3

Support teams are often layered so simple issues don’t clog the experts and complex issues get proper escalation.

Level 1 (L1) – Front Line

  • First contact via phone, email, or ticket.
  • Handle password resets, basic troubleshooting, how-to questions.
  • Use scripts and knowledge base articles.
  • Gather logs and details for more complex issues.
  • Escalate when beyond scope or time limit.
Customer service Ticket triage

Level 2 (L2) – Technical Specialists

  • Deeper OS, network, and application troubleshooting.
  • Work with servers, AD, group policies, VPN, printing, etc.
  • Analyze logs and patterns, perform remote sessions.
  • Implement non-standard fixes and changes.
Root cause analysis System admin basics

Level 3 (L3) – Experts / Engineering

  • Senior admins, network engineers, developers.
  • Handle complex outages, design issues, and bugs.
  • Work with vendors on escalated support cases.
  • Design improvements, standards, and automations.
Architecture Complex incidents

Security Camera Lens Angles & Distances

Lens focal length changes how much you see and how far. Wide lenses cover more area but less detail at distance; telephoto lenses see further but in a narrower slice.

Lens Types & Usage

  • 2.8 mm (Wide): Very wide FOV (~100°). Great for doorways, porches, small yards.
  • 4 mm (Medium): Balanced FOV (~80°). Good for driveways, small parking areas.
  • 6–12 mm (Tele): Narrow FOV (~30–50°). Good for gates, far corners, license plates.
  • Varifocal (e.g., 2.8–12 mm): Adjustable zoom to tune the scene after mounting.

Rule of thumb: wide at doors & entries, telephoto for long driveways & plates.

Field of View Diagram

10m 20m 30m 40m 2.8mm wide area 4mm mid-range 12mm zoomed-in
Wide (~2.8mm) – up-close coverage
Medium (~4mm) – driveway/yard
Tele (~6–12mm) – gates/plates
As focal length increases, the angle narrows and useful detail moves farther from the camera.