Sys Admin Notes
Sys Admin Notes
LINUX
UNIX
WINDOWS
DEVOPS
AWS
PEN TESTING
Session: 29
Trinitech will
help you get a
job
3
Web Browser • Eg. Google chrome(better that others), mozilla firefox, safari, microsoft edge.
• You type the url in the address bar of the browser
Attendance
TeamViewer Home
Mentorship
Meetings work
Multi-Platform Sys-Admin
Internet
Unix System Automation
Devops
Summary of your skill set: I can build Linux (red hat), Unix (Solaris) and
Windows(windows10) systems from scratch, configure them to talk together by
5
Computer Specs:
• Windows 10 (Microsoft)
• MacOS (MacIntosh operating system),
• IOS (internet operating system runs on apple devices, iPad and iPhone),
• Android OS (runs on Samsung mobile devices)
Platform: This is a computer with a program running on it
Other Names for Computer: System | Machine | Unit | Box
➢ Server: is referred to as a supercomputer
SERVER
• It is a supercomputer that comes with extra processing power
such as; multiple RAM, multiple CPU, multiple power supply
units, more storage capacity. A server computer comes with a
hardware and software(server OS:Unix,Linux,Windows,Vmware)
• Servers are used to create processes and manage information.
Information can be used to :
• Make money
• Govern
• for learning. Admin is responsible for building and configuring
the server(Unix,Linux,Windows)
• Vmware: is used to build virtual systems
7
MONITOR
RAM
WIN.10
MS OFFICE OS
CPU
CHROME
CHROME
OS + OTHER SOFTWARES
How Data Is Processed: When the power button is pressed, the first POWER BUTTON
thing you see is the O.S. When you click on google chrome app. with
the mouse on the desktop, a signal is sent to the CPU (the brain of
the computer), the CPU then sends a signal to the hard drive where
OS, Apps are stored permanently to load it to the RAM which is then
displayed on the monitor.
RAM To Hard Drive: The flow of data from RAM to the hard drive is
called – Write
Hard Drive TO RAM: The flow of data from the hard drive to RAM is
called – Read
8
Devops: This is a group of applications that are used for automation. Examples are:
Ansible, Docker, Jenkins, Git, Kubernetes, Splunk.
✓ Applications must be installed on an OS
✓ AWS – Cloud: No UNIX in the cloud
✓ Pen Testing: is used for security
✓ VMware: is used to build virtual systems
SOLARIS AIX
UNIX-KERNEL
MacOS HP-UX
9
NETWORK
Network: This is a group of systems or computers connected together and sharing
information(data).
A SIMPLE NETWORK
Smart
Phone
Laptop
Server
Wireless
Access Point
Network
Printer
HOME LAN
Laptop Router/Switch
Internet
TRINITECH WAN
Internet
LAN LAN
Example of MAN
DC
LAN
VA
LAN
LAN
MD
13
HTML
LAN LAN LAN LAN
LANs
INTERNET
PC TECHS:
➢ Desktop Support: They fix issues related to the hardware and software of a PC.
➢ Certification: CompTIA A+ Certification.
➢ Salary: $30k-60k/Yr.
NETWORK TECHS:
➢ They can perform the job of desktop and network support.
➢ Certification: CompTIA Network+
➢ Salary: $50k-80k/Yr.
NETWORK ADMINISTRATOR:
➢ They can perform the task of a pc tech, network tech and expert in a server OS.
➢ Certification:
✓ Windows: MCSE (Microsoft Certified System Engineer)
✓ Linux: CompTIA Linux+, RHCA (Red Hat Certified Associates)
✓ UNIX: OCA (Oracle Certified Associate) – Solaris 11
➢ Salary: $80k-120k/Yr.
SYSTEMS ENGINEER:
➢ They can perform the task of:
o PC Tech
o Network Tech
o Network Admin
o Sys Admin
o Design and build network from ground up.
➢ Salary: $150k-Infinity.
They usually end up as consultants. Example: Trinitech Consulting Inc.
HARD DRIVE
MEMORY(RAM)
SWITCH
LAYER 3 SWITCH
15
LAYER 3 SWITCH
ISP INTERNET
LAN WAN
PC1 PC2
BANDWIDTH: It is the maximum amount of data that can flow through a medium every
second.
How to test your bandwidth:
▪ Open your browser from your system.
▪ Type speedtest.net in the address bar.
Note: using cable to connect your system gives you better speed than connecting via Wi-Fi
BYTE:
is used to measure the size of static data. it is also used to measure the flow of
data within(between) storage devices. Any information in your hard drive is
measured in byte and not in bit.
BIT:
Windows:
We will learn the following.
✓ Windows Desktop Support – Windows 10 OS
✓ Windows Domain Administration – Windows Server 2008+Windows Server 2019
✓ Active Directory Administration - Windows Server 2008+Windows Server 2019
DevOps: is used for the automation of processes. These are some of DevOps tools we
will use in this program: Git, Ansible, Docker, Kubernetes, Jenkins, Splunk, Nagios.
Cloud Terminology
Types of Hypervisor:
1. Hosted Hypervisor: it is an application version of hypervisor that must be hosted or
installed on an OS. Hosted hypervisor is usually used for testing. Example is Oracle
Virtual Box
2. Bare Metal Hypervisor: it is an OS version of a hypervisor that must be installed on
a physical system or bare metal system (hardware without OS on it). Bare metal
hypervisor is used by organization for production. Example is a VMware Exsi.
➢ Production System: It is a system connected to the network and it is used for actual
work.
➢ Non-Production Systems: It is a system that is not used for actual work.
18
Physical System
Physical System
Solaris Solaris
OS. Win 10
RHEL 7 RHEL 7
RHEL 8 VMware Application RHEL 8 VMware OS
Win 10 Win 10
Physical System
Physical System
Solaris Solaris
OS. Win 10
RHEL 7 RHEL 7
RHEL 8 Hosted Hypervisor RHEL 8 Bare Metal Hypervisor
Win 10 Win 10
COMPUTERS
Computer: It is an electronic device that receives input, processes the information, and
releases an output.
➢ Input Devices: Examples are: mouse, keyboard, microphone, flash drive
➢ Output Devices: Examples are: monitor, speaker, printer, flash drive
Types Of Computers
Desktop Computer: It is a type of computer designed for a desk that comes
with separate components
Laptop Computer: It is a type of computer designed for the lap that comes
with component attached to each other.
Mobile Computer: Examples are: smart phones, tablets. Smart watches, smart
TVs
MONITOR
POST POST
MOUSE
ROM RAM
KEYBOARD
NIC M
21
Standard User Account: It has restricted access to the system. Example, it cannot
install applications, it cannot make changes to the configuration of the OS
• User Profile: it is the environmental setup of a user account
• A user account must be associated with one user profile
• A user account cannot have more than one profile.
• A user profile for a newly created account is only created when the user logs in
for the very first time
• User profile can be replaced
• User profiles are stored in the user’s folder in the C: Drive (hard drive)
When you log into the system, you are place in your profile. The Admin Account has unrestricted
access to the system. That is why as an admin, a background check will most likely be run on you
when you apply for a job.
Regular Background (Criminal) Check: If you have anything on your record, just do not give
up, speak, and explain to the recruiter. Start now working on cleaning up your social
media account.
22
Public Trust Background Check: There are several jobs that do not require background
checks.
C:\Users: This is the Path to the user profile directory. The Path to a file shows how
to get to the file.
Example: This path is interpreted as follows: C:\users\Trinitech\download: the
download folder is in the Trinitech folder, the Trinitech folder is in the Users folder and
finally, the Users folder is in the C:\ Drive (hard drive)
COMPONENTS OF A DESKTOP
How To Attach An Icon To The Taskbar: Right click on the icon and select pin to taskbar
Control Panel: It contains tools used to modify the configuration of the OS
➢ Default Or Proprietary Applications: These are applications that came with the
OS or installed by the vendor. Any application that came with your system is
called default or proprietary application
➢ 3rd Party Application or Custom Application: It is an application that was not
installed by the vendor or did not come with the system
CENTOS
• IPTABLES
• FIREWALLD
MALWARE
A Malware is a malicious software that is designed to destroy software or spy on a user.
It can also generate false advertisement. Payload(malware) is called a hack in
cybersecurity. Phishing attacks are the most popular attacks.
Uses of Malware:
- Destroy: It is used to destroy software
- Spy: It is used to spy on a user
- Deceive: It is used to deceive users so as to trick them into getting vital
information from them. Note: in IT, ware refers to hardware or software
Types of Malware:
1. Virus/Trojan/Ransomware:
• Ransomware: It can deceive you to think its legit in order to take over your
system; that is why it is called a ransomware
• Virus: It is designed to destroy software
2. Spyware: It is designed to steal your personal information.
3. Adware: It is designed to generate false advertisement in order to penetrate
your system and slow down your system
Never download free flashlight app from the app store.
PUTTY
This is a tool called a terminal emulator; It enables an admin to login to a remote Unix or
Linux system
Local System: This is a system that is in a user’s environment
Remote System: This is a system that is not in a user’s environment
IP ADDRESS
Internet Protocol (IP) Address: It is a unique number assigned to a networked system
used to communicate with other systems in the LAN. A system without an IP becomes a
standalone system. The IP is assigned to a networked system by the DHCP server
Broadcast: This is the signal sent to every system in the LAN
DHCP (Dynamic Host Configuration Protocol): It is a server or system that gives out
dynamic IP addresses to the networked systems in the LAN
How to display the IP address of a windows system
- Open up the command prompt and type, ipconfig or ipconfig /all
Note ipconfig is (internet protocol configuration)
The NIC also called ethernet; connects the system to the LAN. IP addresses are
assigned to NICs. Your laptop has a Wi-Fi NIC.
✓ : This is a temporary IP address assigned to a networked
system by a DHCP server
✓ : This is a permanent IP address assigned to a networked
system by an admin
For example: write an SOP for creating an Admin account in windows. When writing an
SOP at work, you will have to be as explicit as possible.
NAT (Network Address Translation): It translates network traffic from one system to
another system.
NIC (Network interface card): IP are assigned to the NIC of a system. Systems from two
different LANs cannot talk to each other directly.
Bridging: This allows virtual systems to communicate with the LAN directly.
NIC bridging
Laptop NIC
192.168.2.10
192.168.2.12
192.168.2.11
PC1
26
Class Task
Putty into remote school server located in Germantown, MD from your local system
using the following specs:
Host Name: This is the label assigned to a computer by an admin
➢ Remote server host name: schoolserver.trinitechglobal.com
➢ Username: class29
➢ Password: school1
Linux Commands
✓ Display your current location in the Linux filesystem
$ pwd (present working directory)
✓ Display the content of your pwd
$ ls (list)
✓ Create a file called your name in your pwd
$ touch Israel
$ ls to verify
✓ Clear the CLI
$ clear
✓ Display the date and time of the server
$ date
✓ Display the calendar of the month
$ cal
$ cal 01 1990 displays the calendar of Jan 1990
TeamViewer: This is used to host virtual online meetings. It can also be used to
connect to a remote system. Can host only 5 members meeting
PORT Forwarding
PUTTY
Firewall PC3
You; the user(admin) is always talking to the OS. You talk to the OS and the OS talk
to the hardware. You do not talk to the hardware directly.
Hardware Device Driver: It is a software that allows the OS to communicate with a
system’s hardware devices.
Each hardware has their respective driver. E.g., mouse driver, hard drive driver, NIC
driver, etc.
Hackers use malware to wipe out hardware device drivers. You can reinstall drivers
getting it from the vendor’s website.
✓ Right click on the windows start button and select device manager
AMD CPU: better for editing videos
Anti-Malware Suite: This provides better protection than just singular anti malware
software
Recommended Anti-Malware: MALWAREBYTES
Sonic Wall is a type of firewall device.
Updating your hardware device drivers: If your system’s driver is corrupt, you can go
to the vendor’ website to update or install the most updated driver.
MOTHER-BOARD
The MOTHERBOARD is the main hardware platform in a computer that is used to connect
every other hardware devices together. It enables those devices to talk to each other
PORTS
Ports can also be called either of the following: connectors, controllers, adapters. It is
used to connect external devices to the system.
THE USB PORTS
USB (Universal Serial Bus) Port:
▪ It is used to connect external devices to the system. Example: external storage
devices and external input devices.
▪ It is used to transfer data into and out of the system.
▪ It is used to power small electronic devices.
USB
USB HUB
Female Port
Male Port
USB Ethernet Adapter is a substitute if you do not have the ethernet port on your system
35
ETHERNET TERMINOLOGY
TYPES OF CABLES
The shield on the STP cables prevents electromagnetic cross talk, and it transmits data at a faster rate(speed). UTP cable
transmits data at a slower speed.
There are a whole bunch of servers in the server room. At work, things are going to
be set this way as shown below. Admins always operate on multiple screens. You will
hardly go to the server room; you will usually work from your cozy office.
Note: you will be required to go to the server room when your system cannot access
the server.
Server Room
Office
Windows
RDP
Switch Linux
Win 10 NOS
PUTTY
PUTTY
Solaris
37
RDP (Remote Desktop Protocol): It allows you to remote into a Windows 10Pro (NOS)
Firewall
Win 10 NOS
RDP PORT:3389 REMOTE SYSTEM
NIC 192.168.2.150
RDP
LAPTOP
NIC SWITCH ROUTER INTERNET
LOCAL SYSTEM
192.168.2.150
The NOS comes with a firewall, we have to configure the firewall to allow Remote
Desktop Access(RDP) access. RDP uses port 3389
Note: You have to be in the same network with the remote system to be able to RDP into the system
Note: Windows are always updating; your settings might change from time to time.
38
Note: you cannot delete an account that you are currently using. Windows servers are setup already for
RDP by default
39
Ethernet can also be called a NIC and the NIC connector is RJ-45, Cat cable is used to connect to the
NIC. If you do not have the RJ-45, then your system is using the wireless NIC(WLAN)
WLAN: This is used to Connect the System to a LAN using Radio Waves
WLAN TECHNOLOGY
2.4GHZ Trinitech
SSID
5.0GHZ Consulting
Today, ISPs build both frequencies into the router. The router auto switch between both
frequencies(2.4GHz and 5.GHz) depending on your distance from the router.
LOCAL IP: This is a static IP, and it is manually set. It is also called the default gateway. It
connects your system to the LAN
PUBLIC IP: This is assigned by the ISP DHCP system(server). It connects your system(LAN) to
the internet
42
LAYER-3 SWITCH
LOCAL NIC
192.168.2.1
DHCP
ISP INTERNET
DEFAULT GATEWAY
STATIC IP
PUBLIC NIC
PC SWITCH LAPTOP 108.56.241.212
PUBLIC IP
DYNAMIC IP
WIFI SECURITY:
1. WEP (Wired Equivalent Privacy): This is vulnerable; so, it is not recommended
2. WPA (Wi-Fi Protected Access): This is an upgraded WEP
3. WPA2 (Wi-Fi PROTECTED ACCESS V2)
4. WPA3 (Wi-Fi PROTECTED ACCESS V3): This type is difficult to hack into
Building a computer from scratch: This simply means you are building an unexisting
system from the iso image to a full functioning system.
43
FIBER OPTICS
Fiber Optics: Fiber technology is usually used to connect LANs
together and also for backups. It is mostly used at work and not at
home.
Companies will use the fiber technology for their backup infrastructure.
Companies use the faster route to back up data. Regular LAN for regular job
but the fiber network for backups. Fiber technology has its own repeaters
REGULAR LAN
SOLARIS 10
The heat from the CPU is absorbed by the cooling fins and blown away by the CPU fan
45
Task Manager: The task manager depicts the health status of the system. To access
the task manager, right click on the windows start button and select “Task Manager”
❖ INTEL | AMD
MEMORY
Types Of Memory
1. ROM (Read Only Memory): It is a non-volatile memory, and it is a chip hard wired
on the motherboard of the system.
➢ Other Names of ROM
✓ BIOS: Basic Input/Output System
✓ CMOS: Complimentary Metallic Oxide Semi-Conductor
The ROM is powered by the CMOS battery. If you forget your BIOS password,
you will not be able to get into the system anymore. Be careful.
How to determine the maximum amount of memory your system can have:
Check the website of your system’s vendor. The table shown below shows that the
system can take a maximum memory of 64GB
The type of memory in your system is found on your vendor’s website
The VGA port is 15pin analog port. The resolution is below 720pixels
TYPE SIGNAL
DVI-A (Analog) Analog Signals Only
HDMI: This transmits audio and video signals all at the same time while VGA and
DVI transmit video signals ONLY.
The Display Port displays digital signals. It transmits audio and video signals. It is
mostly used by gamers.
Note: The only program that is not stored on the hard drive(hard disk) is the POST
program
FIREWIRE PORT
▪ FIREWIRE 800
Maximum Speed: 800Mbps
It is usually a 9pin port
55
SERIAL PORT
This is a 9pin port and it is used to connect peripheral devices to the systems. Examples:
modem(a modem is primitive router), keyboard, mouse, and gaming devices.
PARALLEL PORT
This is either a 36pin or 25pin port used to connect peripheral devices to the system. Example:
parallel printer.
56
THUNDERBOLT PORT
NETWORK
This is a group of systems connected together, sharing information(resources).
NETWORK CATEGORIES
➢ P2P (PEER TO PEER) NETWORK: This is a group of systems connected together
sharing data without a central server.
N:
Mapped Drive SWITCH
Resource
PC1 M:
Mapped Drive
Resource
PC2
57
N: Resource Server
Mapped Drive
PC1
SWITCH
N:
Mapped Drive
PC2
PC1 PC3
SWITCH
PC2 PC4
Workgroup-1 Workgroup-2
PC4
58
DOMAIN
Types of Domains:
<name>.local
extension
Note: The name will usually be given to you by your boss.
IP: 192.168.2.10
DG: 192.168.2.1
Default Gateway
192.168.2.1
SWITCH
PC2 DHCP Server ROUTER
SWITCH
PC3 SWITCH
Procedure:
60
Type:
copy d:\windows\system32\utilman.exe d:\
Type The Following Commands To Reset The Password For The User Account And Restart The System
63
CLIENT SERVER
NOS/WORKSTATION/WIN10PRO SERVER2008/SERVER2019
IP ADDRESS
DNS: This is a system that translate or resolve hostnames to IP addresses or vice-versa in a LAN.
Without DNS, you will not be able to browse the internet
LAPTOP
SWITCH ROUTER
31.13.66.35
1.13.66.35 INTERNET
Default gateway
www.facebook.com
www.face 1.13.66.35
book.com 1.13.66.35 www.face
www.facebook.co book.com
m
DNS SERVER 19 31.13.66.35
Facebook
✓ If the DNS is down, you can ONLY access the internet using IP addresses and not
domain names.
✓ Your DNS is in the business of always doing translation(resolution)
✓ DNS maps host names to IP addresses
FORWARD LOOKUP ZONE: A-Records are stored in the forward lookup zone in the DNS
database
FQDN ( Fully Qualified Domain Name): This is the combination of Hostname + Domain name
FQDN = Hostname + Domain Name
Hostname
Example: winser2019.domain29.local
Domain name
SENDING RECEIVING
INTERNET
SYSTEM SYSTEM
1.13.66.35
Ping 8.8.8.8 www.face IP Address: 8.8.8.8
book.com
70
Note: If you get ALTEAST ONE positive ping, it means the receiving system is “Alive”.
TTL (Time to Live): (life span) It is the maximum time in milliseconds allowed for the
receiving system to respond to a ping request before it is dropped by the sending
system.
71
ICMP (Internet Connection Messaging Protocol): This is used to transmit ping traffic
Note: The IP Address to MAC address mapping is stored in the arp table of the system
ARP table display:
arp -a
Note:
✓ When systems talk, they register IP and MAC addresses of other systems they talk
to in the ARP table
✓ The ARP table registers information about systems ONLY in your LAN
72
TCP/IP ADDRESSING
IP Packet
Data
TCP
Example: 192.168.2.10
Subnet Mask: It is used to separate the network address or LAN address portion from the
host address portion
✓ IP Address: 192.168.2.10
✓ Subnet Mask: 255.255.255.0
▪ The network portion of an IP address is static, while the host portion is dynamic.
▪ The network address portion defines a LAN and only systems within the same
network(LAN) address can communicate with each other.
IP: 192.168.2.4
SM: 255.255.255.0
ROUTER
SWITCH
IP: 192.168.2.1 INTERNET
SM: 255.255.255.0
PC2
IP: 192.168.2.5
SM: 255.255.255.0
Used for
CLASS D N/A 224 - 239 broadcasting and
Multi-casting
CLASS E N/A 240 - 255 Used for Research
Note: Computers will mostly have either class A, B, or C address and not class D or E
LAYER-3 SWITCH
LOCAL NIC
192.168.2.1
ISP INTERNET
DEFAULT GATEWAY DHCP
STATIC IP
PUBLIC NIC
PC SWITCH LAPTOP 108.56.241.212
PUBLIC IP
DYNAMIC IP
It was a nightmare for systems from different vendors to talk to each before the
advent of the OSI model. Systems used to use different protocols to talk to each
other. Today, all network systems use a common protocol for communication which is
the TCP/IP
data from the sender flows from the application layer down to the physical layer
PDU(Protocol Data Unit): This is the form of data in the OSI model
DNS/DHCP:
When systems get their network configuration informant from the DHCP
server, they contact the DNS server to register their information in the DNS
A-Record in the Forward Lookup Zone. i.e., The DNS server has A-Record
for every system in the LAN.
Note: If the DNS server is down, the systems will not be able to talk to each
other using the host names and also, they will not be able to connect to the
internet.
Backup DNS Server: In other to switch from the main DNS server
when it is down to the backup DNS server, you will have to enter the
backup DNS IP Address in the DHCP server so that the LAN systems can
81
now obtain a new DNS IP Address from the DHCP server after which they
have been restarted.
PC LAN
ipconfig /release: This will drop the network settings of the NIC from RAM
ipconfig /renew: This will request for a new network setting from the DHCP
server
Question: how would you reset the IP address of the windows system
Answer: ipconfig /release and ipconfig /renew
Tracert Command: This command is used to trace the route of traffic flow
from sending system to receiving system
▪ tracert: Windows
▪ trace: Linux/UNIX
▪ traceroute: Cisco
83
Categories of Switches
1. Unmanaged Switch: it is designed for consumers and it comes with
no OS. Example: Linksys 5Port Switch
2. Managed Switch: It is designed for commercial use and it comes
with an OS. Example: Cisco Switches
SWITCHES HUBS
A switch is a smart hub A hub is a primitive switch
84
In troubleshooting network related issues, ensure that all the network systems’
configurations are ok before leaving, by doing so you might find potential
problems that need to be fixed.
Local DNS Servers: These will resolve both local hostnames and public
hostnames
Public DNS Servers: These will resolve public hostnames only.
Free Google Public DNS Servers:
✓ 8.8.8.8
✓ 8.8.4.4
putty
Command Terminal
# Command Prompt
UNIX Shell
Kernel
Kernel:
▪ It is the core of the UNIX OS
▪ It receives and executes commands from the shell
▪ It is that part of the OS that communicates with system’s hardware
and software
▪ It is the part of the OS that is first loaded into RAM at bootup
UNIX OS
✓ Path to the Bash shell executable: This is the location of the program that
runs the Bash shell
/usr/bin/bash | /bin/bash | /sbin/bash
root - #
su exit
student - $
su su
root student jbiden
exit exit
92
note: you cannot putty into the root account in Solaris, but it is different in
Linux
Primary group of
component’s owner
Component’s size
Component type
- : file
d : directory
T
93
aws CLOUD
CLOUD SERVICES
We will be:
• Spinning EC2 Instances
• Accessing EC2 Instances
On-Premise AWS-Cloud
95
Command Mode: This is the default mode of vi. In this mode, you can.
✓ add contents
✓ append to the next character or line
96
Vi Commands
vi Opens up a file in vi
i Switch from command mode to insert mode
esc Switch from insert mode to command mode
x Deletes text in command mode
dd Deletes an entire line in command mode
r Replaces highlighted text in command mode
a To append to the next character in command mode
o To append to the next line in command mode
G To append to the bottom of the file in command mode
:q! To quit without saving
:wq! To save and quit in command mode
To scroll around in command mode
Your Path
Verify:
#which wget
98
Output:/usr/sbin/wget
3. Add the command’s path to your path
#PATH=$PATH:/usr/sfw/bin
OR
#PATH=/usr/sbin:/usr/bin:/usr/sfw/bin
#scp <file>
#scp -r <directory>
SERVER MANAGEMENT
Solaris Server
- Hostname
- Default Gateway
RHEL 7
- DNS
-Static IP
Solaris 10
Internet Address
Bring up the NIC
The Subnetmask
Prefix
NIC Label
192.168.2.10/24 ->class C
128.4.5.6/16 ->class B
10.2.4.8/8 ->class A
10.0.0.4/24 ->CIDR: Classless Interdomain Routing
101