Reviewer
Reviewer
ETHNOMEDICINE THEATER
is one of the oldest tradition arts in the Philippines. has a long history and is a central art form of directing,
Traditions and related items are practiced by medical artisans performance, stage, design, lighting and sound design,
and shamans. (e.g., Albularyo and Babaylan). and scriptwriting. It is of Austonesian character, evidenced
by ritualistic and imitative dances. Spanish culture has
FOLK ARCHITECTURE indluenced Filipino plays and theathrical performance. (e.g.
It varies by ethnicity and is made of materials such as Tulauk and Carrillo).
bamboo, wood, rock, coral, rattan, and grass.
(e.g., Bahay Kubo and Darul Jambangan). VISUAL ARTS
Include painting, sculptures, printmaking, photography,
MARITIME TRANSPORT installation art, mixed media works, illustration, graphic arts,
It includes boathouse, boat building and maritime traditions. performance art and imaging. (e.g., Camarin de la Virgen and
These structures are traditionally made of wood selected Mactan Shrine in Lapu-Lapu).
by elders and craftsmen and connected the islands.
(e.g., Balangay and Karakoa). LITERATURE
poetry, novels, essays, and literary and artistic criticism are
WEAVING usually influenced by folk literature with a focus on epics, folk
It is an ancient art form, and each ethnic group has its myths, and related stories and traditions. Calligraphy on
own weaving technique. Woven fabrics include basket various mediums was used to create literary works.
weaving, back strap weaving, headgear weaving, and fishnet (e.g., Doctrina Christiana).
weaving. (e.g., Cloth & Mat Weaving and Bakya).
FILM AND BROADCASTING
CARVING Focuses on directing, scriptwriting, production, design,
Sculpture includes woodcarving and folk sculpture cinematography, editing, animation, performance, and new
production. (e.g., Buraq and Rock Carving). media, Filipino cinema began with his 1897 introduction of
moving pictures to manila. (e.g., Country Maiden and Oro,
FOLK PERFORMING ARTS Plata, Mata).
Folk dances, dramas, and plays are performed. Each
ethnic group has its traditions, and Spain and America also ARCHITECTURE AND ALLIED ARTS
influence Filipino folk arts. Some dances are related to those focuses on non-folk architecture and related arts such as
of neighboring Austronesia and other Asia countries. interior design, landscape architecture, and urban design
(e.g., Binasuan and Tinikling). (e.g., Manila Cathedral and The Manila Hotel)
JOVITA FUENTES
One of the most extraordinary Filipino vocal talents, she
was also the first Filipino international star in the world of
opera.
MANLILIKHA NG BAYAN
On the other hand, the Gawad Manlilikha ng Bayan
(GAMAΒΑ), translated officially in English as the National
Living Treasures Award, is given to artists in recognition
of their contributions to our "cultural heritage." The
Award, unlike the former, is not instituted as an order, yet
said to be an equivalent to the Order of the National Artists. A
simple contrast between the two would be that the National
Artist Award is given to masters of the fine arts and the
like, while the GAMABA is given to the artists of
indigenous and ethnic art.
GINAW BILOG
a Filipino poet who was recognized as a National Living
Treasure by the Philippine government. Bilog was a
Hanunuo Mangyan who was a native of Mansalay, Oriental
Mindoro. He was known for his efforts in preserving the
Mangyan poetry tradition of ambahan.
LANG DULAY
A Filipino traditional weaver who was a recipient of the
National Living Treasures Award. She is credited with
preserving her people's tradition of weaving T'nalak, a dyed
fabric made from refined abaca fiber.
1. HARDWARE
• Servers, desktops, laptops, and other computing devices
• Storage systems
• Networking equipment (switches, routers, firewalls, etc.)
• Peripheral devices
2. SOFTWARE
• Operating systems
• Middleware
• Databases
• Application software
TECHNOLOGY DRIVERS OF INFRASTRUCTURE
3. NETWORKING
• Local Area Networks (LANs) 1. Moore’s Law and Microprocessing power
• Wide Area Networks (WANs) - Computing power doubles every 2 years
• Wireless networks - Nanotechnology
• Internet connectivity
• Communication protocols 2. Law of Mass Digital Storage
- The amount of data being stored each year doubles.
EVOLUTION OF IT INFRASTRUCTURE
3. Metcalfe’s Law and Network Economies
1. Tabulating Machine - Value or power of a network grows exponentially as a
- an electromechanical machine designed to assist in function of the number of network members.
summarizing information stored on punched cards.
- Invented by Herman Hollerith, the machine was 4. Koomey’s Law
developed to help process data for the 1890 U.S. Census. 5. Swanson’s Law
Later models were widely used for business applications such
as accounting and inventory control.
2. Mainframe
- The introduction of the IBM 1401 and 7090 transistorized
machines in 1959 marked the beginning of widespread
commercial use of mainframe computers. In 1965, the
mainframe computer truly came into its own with the
introduction of the IBM 360 series. Mainframe computers
became powerful enough to support thousands of online
remote terminals connected to the centralized mainframe
using proprietary communication protocols and proprietary
data lines. COMPUTER HARDWARE PLATFORMS
- refers to the underlying computer architecture,
3. Personal Computers components, and infrastructure that support the
- Proliferation of PCs in the 1980s and early 1990s operation of a system, device, or technology. It typically
launched a spate of personal desktop productivity includes elements such as the central processing unit (CPU),
software tools—word processors, spreadsheets, electronic memory, storage, and input/output devices.
presentation software, and small data management - consists of a hardware device and an operating system
programs—that were very valuable to both home and that an application, program or process runs upon.
corporate users. These PCs were stand-alone systems until
PC operating system software in the 1990s made it possible There are several common hardware platforms used in
to link them into networks. modern computing, including: (types)
1. Desktop/Workstation Platforms:
4. Client - Server - Traditional desktop computers with a tower case, monitor,
- In client/server computing, desktop or laptop computers keyboard, and mouse.
called clients are networked to powerful server - Workstations designed for professional applications like
computers that provide the client computers with a engineering, 3D modeling, video editing, etc.
variety of services and capabilities. Computer processing
work is split between these two types of machines. The client 2. Laptop/Notebook Platforms:
is the user point of entry, whereas the server typically - Portable computers with an integrated display, keyboard,
processes and stores shared data, serves up Web pages, or and touchpad/track pad.
manages network activities. The term “server” refers to - Offer mobility and battery-powered operation.
both the software application and the physical computer
on which the network software runs. 3. Server Platforms:
- Specialized computers designed for hosting, data
5. Enterprise Computing processing, and providing services to client devices.
- In the early 1990s, firms turned to networking standards - May feature enterprise-grade components, high-
and software tools that could integrate disparate networks performance processors, and redundant power supplies.
and applications throughout the firm into an enterprise-
wide infrastructure. As the Internet developed into a trusted 4. Mobile Platforms:
communications environment after 1995, business firms - Smartphones and tablets with touchscreen interfaces and
began seriously using the Transmission Control compact, portable designs.
Protocol/Internet Protocol (TCP/IP) networking standard to tie - Often powered by mobile-optimized system-on-a-chip (SoC)
their disparate networks together. processors.
5. Embedded Platforms: Market Impact: Windows' dominance in the market has
- Specialized hardware designed for specific applications, influenced software development, with most applications
such as industrial control systems, IoT devices, and single- being designed to be compatible with it.
board computers (e.g., Raspberry Pi). The operating system is widely used in business,
- Typically have limited resources but are optimized for their education, and gaming, making it a critical part of the global
intended use cases. IT infrastructure.
ONLINE PLATFORMS
NETWORK SERVICES
SOCIAL MEDIA PLATFORMS File Sharing
includes the Facebook, YouTube andother Social Media - Allows users to access shared files and directories across
which allow us to create not only our personal accounts but the network
also pages and groups where you can share content.
Print sharing
BLOGGING PLATFORMS - Enables multiple users to send print jobs to shared printers.
are broadcast style communication systems that enable
authors to publish articles, opinions, or product reviewswhich
can be delivered to standalone websites, emails, feed User Administration
systems and social networks. - Administrators can create or remove user accounts as
needed.
TYPES OF NETWORK DEVICES - Customizes user profiles, including settings and
preferences.
1. REPEATER operates at the physical layers.
- Implements authentication mechanisms (e.g., passwords,
2. HUB is a basically multi-port repeater. biometrics) to verify users.
- Assigns permissions based on roles, ensuring users only
Hub has three types: access resources they need.
Active hub - Its serves both as a repeater as well as a wiring - Organizes users into groups for easier permission
center. management.
Passive hub - These are the hubs that collect wiring from - Applies specific policies and configurations to groups rather
nodes and power supply from the active hub.
than individual users.
Intelligent hub - Its works like an active hub and includes
remote management capabilities.
Data Back up
3. BRIDGE operates at the data link layer. - Configures regular backups (daily, weekly) to ensure data is
consistently saved.
Bridges has two types: - Allows manual backups when needed, especially before
Transparent Bridges - These bridges make use of two significant changes.
processes i.e. bridge forwarding and bridge learning.
Source Routing Bridges - Routing operation is performed - Makes a complete copy of all data, providing a
by the source station and frame specifies which route to comprehensive restore point.
follow. - Backs up only the data that has changed since the last
backup, saving time and storage.
4. SWITCH is a multiport bridge with a buffer and a design - Backs up all changes made since the last full backup.
that can boost its efficiency (a large number of ports imply - Saves backups on local devices or servers for quick access.
less traffic) and performance.
- Utilizes off-site or cloud-based storage solutions for added
5. ROUTERS is a device like a switch that routes data security and disaster recovery.
packets based on their IP Addresses. - Provides clear methods for restoring data from backups
quickly and efficiently.
6. GATEWAY is a passage to connect two networks that may - Regularly tests backup restore procedures to ensure data
work upon different networking models. can be recovered successfully.
2. Number of users - The number of faculty members and 7. Testing and Certification
students attending universities and colleges frequently • Cable Testing: After installation, cables should be tested
increases, which raises the need for network capacity. using appropriate tools to ensure they meet performance
standards (e.g., continuity tests, attenuation, and crosstalk).
3. Security - Large student populations and open access • Certification: For professional installations, certification of
make it more difficult to regulate who connects to the the cabling system may be required to ensure compliance
network, which can result in security problems. It is crucial to with standards.
protect sensitive data, including financial information, 8. Grounding and Bonding
academic research, and student records. • Ensure that all network components, including racks and
cabinets, are properly grounded and bonded to prevent
4. Internet - Congestion and slower speeds might result from electrical hazards and to reduce noise.
using the network simultaneously.
DIFFERENT NETWORK CABLING SUBSYSTEMS
NETWORK CABLING RULES
1. Entrance Facilities (EF)
1. Cable Types and Categories - is defined as the point where the local service provider or
• Twisted Pair Cables (e.g., Cat5e, Cat6, Cat6a, Cat7): private network brings the outside connection to the building.
Commonly used in Ethernet networks. The higher the
category, the better the performance and higher data rates. Components: Includes cables, network interface devices,
• Fiber Optic Cables: Used for long-distance and high-speed primary protectors, and possibly transition hardware if
connections. They are immune to electromagnetic different cable types are used.
interference (EMI) and offer higher bandwidth than twisted
pair cables. 2. Equipment Room (ER)
- is defined as the area where the entrance cabling connects
2. Distance Limitations to the building’s internal wiring infrastructure.
• Twisted Pair Cables: Typically, Cat5e and Cat6 cables
have a maximum recommended length of 100 meters (328 Components: Contains patch panels, network switches,
feet) for a single run. Beyond this, signal degradation can routers, and servers. It may also include power supply
occur. systems like UPS (Uninterruptible Power Supply) and cooling
• Fiber Optic Cables: Distances can vary widely based on systems.
the type of fiber (single-mode or multi-mode) and the
transmission equipment used. Single-mode can reach 3. Backbone Cabling (Vertical Cabling)
distances up to several kilometers. - The cabling that interconnects the equipment rooms,
telecommunications rooms, and entrance facilities within a
3. Installation Practices building or across a campus. It often runs vertically within a
• Avoid Sharp Bends: Cables should not be bent beyond building.
their minimum bend radius, as this can damage the cable and
impair performance. Components: Includes cables (typically fiber optic or high-
• Maintain Separation from Power Cables: Network cables performance copper), patch panels, and connectors.
should be kept away from power cables to avoid Backbone cabling supports the interconnection of different
electromagnetic interference (EMI). subsystems.
• Proper Labeling: All cables should be properly labeled at
both ends for easy identification. 4. Telecommunications Room (TR) or
• Secure Cables Properly: Use cable ties or other fasteners Telecommunications Closet (TC)
to secure cables, but avoid over-tightening, as this can - A room or closet that houses the telecommunications
damage the cables. equipment and the terminations of the horizontal cabling
system. It serves as the connection point between the
4. Cable Management backbone and horizontal cabling.
• Structured Cabling: Follow structured cabling principles to
ensure a clean and organized installation. This includes using Components: Includes patch panels, network switches, cross-
patch panels, racks, and cable management systems. connects, and sometimes active network equipment.
• Pathways: Use cable trays, conduits, or raceways to
organize and protect cables. 5. Horizontal Cabling
- The cabling that runs from the telecommunications room to
5. Environmental Considerations the individual workstations, devices, or equipment within a
• Temperature and Humidity: Install cables in environments floor of a building. It is often installed in a star topology.
where temperature and humidity are controlled to prevent
degradation. Components: Includes cables (e.g., Cat5e, Cat6, Cat6a),
• Plenum Spaces: In spaces where air circulates for HVAC patch panels, jacks, connectors, and sometimes
purposes (plenum spaces), use plenum-rated cables that are consolidation points or MUTOAs (Multi- User
fire-resistant. Telecommunications Outlet Assemblies).
6. Work Area (WA) PATCH CABLE
- The area where end-user devices are located, such as • Grey: standard network connections
offices or cubicles. It includes the network outlets and the • Black: used as a generic, default color
cabling connecting end- user devices to the network. • Purple: non-Ethernet digital connections
• Blue: terminal server connections
Components: Includes the network outlet, patch cords, and • Green: crossover connection
the end-user devices such as computers, phones, and • Yellow: POE connection
printers. The work area subsystem facilitates the final • Orange: non-Ethernet, analog connections
connection between the network and the user's equipment. • Pink: additional color option for any function
• Red: IP cameras
DIFFERENT STANDARDS AND CODES • White: additional color option for any function
1. TIA/EIA Standards: Telecommunications Industry
Association/Electronic Industries Alliance standards for ETHERNET CABLE COLOR CODING
cabling (e.g., TIA-568).
EIA/TIA 568A EIA/TIA 568B
White - Green White - Orange
The ANSI/TIA/EIA-568 standard was built and has
Green Orange
evolved over the years into its current form for many
White - Orange White - Green
simple reasons:
Blue Blue
White - Blue White - Blue
• To build a network cabling specification that would support
Orange Green
more than one vendor application.
White - Brown White - Brown
• To give direction of the design of all the telecommunications
Brown Brown
equipment and cabling items that are intended to serve
commercial companies.
• To specify a structured cabling system generic enough to DIFFERENT TYPES OF TOOLS AND EQUIPMENT’S
support both voice & data. 1. Cable Testers: is a specialized tool that network
• To establish technical & performance guidelines and give technicians rely on to assess the functionality and integrity of
some basic guidelines for the planning and installation of network cabling. Its primary purpose is to verify the physical
structured cabling systems technology. connections and wiring within a network infrastructure,
ensuring proper installation for optimal data transmission.
The ANSI/TIA-568-C standard addresses the following
things: 2. Crimping Tools: is a device that is used to make cold
• Subsystems of the structured cabling system. weld joints between wires and a connector through deforming
• Minimum requirements for the telecommunications cabling. one or both of them to hold the other. A special connector is
• Installation methods and networking practices. used to join metals together.
• Connector & pin assignments.
• The life span of a telecommunications cabling system 3. Fiber Optic Tools: are used to install, maintain, and test
technology (which should exceed 10 years) fiber optic cables, connectors, and networks. Fiber optic tools
• Media types & performance specifications for the latest are essential for ensuring that fiber optic networks are
horizontal and backbone cabling. installed and maintained correctly, so that they can provide
• Connecting the hardware performance specifications reliable and high-speed data transmission.
• Recommended topology & distances.
4. Punch Down Tools: It is used for inserting wire into
2. ISO/IEC 11801 insulation-displacement connectors on punch down blocks,
• The ISO/EIC is the international standard followed patch panels, keystone modules, and surface mount boxes.
worldwide for information technology systems. As its name
suggests, it standardizes and regulates structured cabling 5. Ethernet Cables: are used to provide an internet
systems within an IT network. connection, and connect devices to a local network. They
• The ISO standards are strictly reviewed every five years, plug into Ethernet ports on a variety of devices. The most
with the last major review & revision taking place in the year common use for an Ethernet cable is connecting a WiFi
2017. router or modem to the internet entry port or telephone line.
• Section 11801 deals with all the general standards for
network cabling in any commercial building. The section 6. RJ45 cables: are essential accessories for networking
covers data, voice & video services for cabling, along with devices in Ethernet connections.
some specifications for both copper cabling & fiber-optic
cabling. 7. Switches and Routers:
- A switch connects multiple devices to create a network,
STANDARD FOR CABLES COLORS - A router connects multiple switches, and their respective
- Cable colors are not universally accepted due to variations networks, to form an even larger network.
in release dates, industries, and countries. Technical - These networks may be in a single location or across
associations like Telecommunications Industry Association, multiple locations. When building a small business network,
Department of Defense, and IEEE aim to establish a you will need one or more routers.
universally accepted standard. Cable Wholesale offers
alternatives for cord consistency until a universally accepted 8. Patch Panels: is a piece of networking hardware that
standard is established. contains multiple ports to connect different Ethernet cables.
Patch panels allow you to label individual ports and organize
your cables in a central location, making it easier to manage.
2013: WINDOWS SERVER 2012 R2 High-Quality Software: Apple’s native applications, such as
Microsoft updated Windows Server 2012 R2, introducing new Final Cut Pro and Logic Pro, are optimized for macOS and
features like Desired State Configuration, Storage tiring, and provide powerful tools for creative professionals.
Work Folders. These changes improve virtualization, storage,
networking, information security, and web services, ensuring Optimized Hardware and Software Synergy: Since Apple
consistency and performance. designs both the hardware and software, macOS runs
efficiently on Apple computers, maximizing performance.
2016: WINDOWS SERVER 2016
Microsoft introduces new features for workload migrations, User-Friendly Interface: macOS offers an intuitive and clean
including Docker containers, software-defined networking, interface that is easy to navigate, making it appealing for
Nano Server, Hyper-V shielded VM, and Network Controller, users who prioritize simplicity.
with Windows Server 2016 available in Standard and
Datacenter editions. DISADVANTAGES
Limited Compatibility with Non-Apple Hardware: macOS
2017: SEMI-ANNUAL CHANNEL AND LONG-TERM is primarily designed to run on Apple devices. It doesn’t work
SERVICING CHANNEL RELEASES well with custom-built or third-party systems, limiting
Microsoft split Windows Server into two channels: the Semi- hardware flexibility.
Annual Channel (SAC) and the Long-Term Servicing Channel
(LTSC). SAC caters to DevOps frameworks with a shorter Higher Cost: Apple devices tend to be more expensive than
release cycle, with releases every six months. LTSC offers a PCs running other operating systems, which may be a
more traditional release cycle, with five years of mainstream disadvantage for budget-conscious users.
support followed by five years of extended support. Microsoft
plans to add most enhancements from SAC releases into Limited Customization: macOS offers less customization in
LTSC releases. The first SAC release, Windows Server comparison to Windows, where users have more control over
version 1709, was released in October 2017. system settings, configurations, and appearance.
2012: WINDOWS SERVER 2019 Software Limitations for Gamers and Developers: While
Windows Server 2019 is Microsoft's thirteenth version of macOS is great for creative professionals, it lacks support for
the Windows Server operating system, released on October many games and specialized developer tools that are more
2, 2018, and succeeded by Windows Server 2022 on readily available on Windows.
August 18, 2021. Mainstream support ended on January 9,
2024, and extended support will end on January 9, 2029. FEATURES OF Mac OS
1. User Interface: macOS is known for its polished graphical
WINDOWS SERVER 2022 interface, including the Dock for application shortcuts, Finder
Windows Server 2022 is Microsoft's fourteenth major long- for file management, and top menu bar for system and
term servicing channels (LTSC) release, based on the "Iron" application controls.
codebase. Released on August 18, 2021, it is similar to
Windows 10 version 21H2, requires x64 processors, and is 2. Software Ecosystem: macOS supports a wide range of
incompatible with Windows 10 updates. It will be succeeded professional-grade software for tasks like graphic design,
by Windows Server 2025. video editing, music production, and software, and software
development. It also includes native apps like Safari (web
MACINTOSH OS browser), iCloud integration, and productivity apps (Pages,
MacOS, originally Mac OS X, is the primary operating Keynote, Numbers).
system for Apple's Mac computers and is the second most
widely used desktop OS after Microsoft Windows. It 3. Continuity and Handoff: macOS works seamlessly with
succeeded classic Mac OS, the primary Macintosh operating other Apple devices, allowing users to answer phone calls,
system from 1984 to 2001. MacOS was first released in send text messages, or copy-paste content between their
2001 and has since been a part of Apple's other operating Iphone, Ipad, and Mac.
systems, iOS, iPadOS, watchOS, tvOS, and audioOS. The
name was changed to "macOS" in 2016 to align with iOS, 4. Security and Privacy: macOS is designed with designed
watchOS, and tvOS branding. MacOS supports three major with built-in privacy controls, encryption,and regular security
processor architectures: PowerPC-based Macs, Intel updates, Features like Gatekeeper, File Vault, and system
architecture, and Apple silicon transition. integrity protection help keep the system secure.
5. Updates: macOS receives yearly updates that introduce consolidation and optimizing their hardware resources.
new features, enhance performance, and improve security. Hyper-V in Windows Server 2008 supports 64-bit computing,
multi-processor environments, and provides tools for effective
Some of the recent versions include macOS Monterey,
virtual machine management.
macOS, Big Sur, macOS Ventura.
3. Windows PowerShell
TIMELINE OF RELEASE Windows PowerShell is a powerful command-line shell and
1997 - Rhapsody Developer Release scripting language designed for system administrators. It
1999 - Mac OS X Server 1.0 (March 16, 1999) automates tasks and simplifies configuration management
2000 - Mac OS X Public Beta Kodiak (September 13, 2000) across large networks. Windows Server 2008 introduced
2001 - Mac OS X 10.1 Puma (September 25, 2001) PowerShell 1.0, which provides improved administrative
2002 - Mac OS X 10.2 Jaguar (August 24, 2002) control and automation capabilities.
2003 - Mac OS X 10.3 Panther (October 24, 2003)
2005 - Mac OS X 10.4 Tiger (April 25, 2005) 4. Network Access Protection (NAP)
2007 - Mac OS X 10.5 Leopard (October 26, 2007) Network Access Protection is a feature designed to enforce
2009 - Mac OS X 10.6 Snow Leopard (August 28, 2009) compliance with network health policies. It verifies the health
2011 - OS X 10.7 Lion (July 20, 2011) status of computers accessing the network, ensuring they
2012 - OS X 10.8 Mountain Lion (July 25, 2012) meet security standards, such as having up-to-date antivirus
2013 - OS X 10.9 Mavericks (October 22, 2013) software and the latest patches installed. If a computer fails to
2014 - OS X 10.10 Yosemite (October 22, 2014) meet these requirements, NAP restricts its access to the
2015 - OS X 10.11 El Capitan (September 30, 2015) network.
2016 - macOS 10.12 Sierra (September 20, 2016)
2017 - macOS 10.13 High Sierra (September 25, 2017) 5. Enhanced Security Features
2018 - macOS 10.14 Mojave (September 24, 2018) Windows Server 2008 provides a range of security features,
2019 - macOS 10.15 Catalina (October 07, 2019) including BitLocker Drive Encryption to protect sensitive data
2020 - macOS 11 Big Sur (November 12, 2020) and the Windows Firewall with advanced security settings for
2021 - macOS 12 Monterey (October 25, 2021) controlling network traffic. Additionally, the operating system
2022 - macOS 13 Ventura (October 24, 2022) improves role- based access control, making it easier for
2023 - macOS 14 Sonoma (September 26, 2003) administrators to define specific permissions based on roles
within the organization.
MICROSOFT WINDOWS SERVER 2008
is an enterprise-level operating system designed to provide a 6. Improved Active Directory
solid platform for networking, applications, and web services. Active Directory (AD) in Windows Server 2008 saw significant
Released on February 27, 2008, it is part of the Windows improvements. One key feature is Read-Only Domain
NT family and was built to succeed Windows Server Controllers (RODC), which enhances security in branch office
2003. Windows Server 2008 introduces various environments by preventing changes from being made
enhancements in terms of functionality, security, and locally. RODC provides an additional layer of protection,
manageability, making it a suitable choice for businesses that especially in distributed environments where physical security
require a robust server environment. may not be as tight.
ADVANTAGES OF LUNIX: 1990: Dynamic Block Reallocation The system places small
1. Open Source: Free to use, modify, and distribute, file blocks in small areas of free space within the storage,
fostering a large community of contributors and users. then it gets reallocated to an area with bigger spacae as the
2. Flexibility: Highly customizable with numerous file grows in size.
distributions tailored to different needs (e.g., Ubuntu, Fedora,
CentOS). 1996: Soft Updates
3. Wide Hardware Support: Supports a broad range of In Ganger and Patt [4], an alternative approach called soft
hardware, from servers to desktops and embedded systems. updates was proposed and evaluated in the context of a
4. Strong Community and Support: Extensive online research prototype. Following a successful evaluation, a
resources, forums, and commercial support options. production version of soft updates was written for BSD in
5. Security: Regular updates and a strong community 1996.
contribute to robust security practices.
1999: Snapshots
DISADVANTAGES OF LINUX: In 1999, the file system added the ability to take snapshots. A
1. Fragmentation: Many distributions and versions can lead filesystem snapshot is a frozen image of a file system at a
to fragmentation and compatibility issues. given instant in time.
2. Software Compatibility: Some proprietary software is not
available or is less well-supported on Linux. 2001: Raising the Blocksize,Again
3. Learning Curve: Advanced features and configurations
may be challenging for beginners. 2002: Background Fsck
After soft updates, there is value in having a version of fsck
WELL KNOWN LINUX DISTROS FOR NETWORKING (file system consistency check) that can run in the
background on an active file system to find and recover any
1. Debian lost blocks and adjust inodes with overly high link counts.
• Released in 1993 by Ian Murdock
2003: Multi-Terabyte Support
2. Kali A new file system WAS BUILT, one that would use 64-bit
• Released in 2013 by Offense Security block pointers.
UNIX
Robust and mature, used in many high, performance
environments with varied network configurations.
LINUX
Highly flexible and widely used, supports a broad range of
networking features and configurations with strong
community support.
BSD
Known for advanced networking features and security, with
different variants suited for specific needs.
NOVEL NETWARE
Was a leading solution for file and print services in the 80s
and 90s, but now largely obsolete.
WHAT IS SWITCH?
- Switches facilitate the sharing of resources by connecting
together all the devices, including computers, printers, and
servers, in a small business network.
WHAT IS ROUTER?
- A router works as a dispatcher, directing traffic and
choosing the most efficient route for information, in the form
of data packets, to travel across a network.
- A router connects your business to the world, protects
information from security threats, and even decides which
devices have priority over others.
BUS TOPOLOGY
- Every node in the network is connected along a linear path.
- This simple topology is used most often for small networks.
STAR TOPOLOGY
- A central node connects to all other nodes in the network.
- This is a common and stable topology that’s often used for
local area networks (LANs).
RING TOPOLOGY
- Nodes are connected in a loop, and traffic may flow in one
direction or in both directions.
- Ring networks tend to be cost-effective, but not as scalable
or stable as other network topologies.
MESH TOPOLOGY
- Nodes are linked in such a way that multiple paths between
nodes are possible.
- This type of network topology increases the resiliency of the
network, but also increases cost.
- A network may be fully meshed (all nodes connecting to all
other nodes) or partially meshed (only some nodes having
multiple connections to other nodes).
TREE TOPOLOGY
- Multiple star topologies are connected together in a larger
star configuration.