{"id":34,"date":"2025-03-13T19:50:49","date_gmt":"2025-03-13T19:50:49","guid":{"rendered":"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/?page_id=34"},"modified":"2025-04-16T10:54:25","modified_gmt":"2025-04-16T10:54:25","slug":"3-klasse-2","status":"publish","type":"page","link":"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/?page_id=34","title":{"rendered":"3. Klasse"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-accent-2-color\"><em>Grundlagen der Netzwerktechnik<\/em><\/mark><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Modul<\/strong><\/h3>\n\n\n\n<p>In der 3. Klasse haben wir uns im Fach NTMA mit Netzwerken und Netzwerkmanagement besch\u00e4ftigt. Zu Beginn haben wir die Funktionen eines Netzwerks kennengelernt. Mit dem Programm Cisco Packet Tracer haben wir Netzwerke erstellt und verstanden, wie Computer \u00fcber Switches und Router miteinander verbunden werden. Ebenfalls lernten wir, wie Netzwerke strukturiert und organisiert werden. Also zu diesem Thema geh\u00f6ren Ger\u00e4te wie Router, Switches, Netzwerkkarten, Access Points und andere Ger\u00e4te. Wir haben gelernt, wie sie funktionieren und welche Rolle sie in einem Netzwerk spielen.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"555\" data-id=\"170\" src=\"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-234936-1024x555.png\" alt=\"\" class=\"wp-image-170\" srcset=\"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-234936-1024x555.png 1024w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-234936-300x162.png 300w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-234936-768x416.png 768w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-234936-421x228.png 421w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-234936.png 1130w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"977\" height=\"541\" data-id=\"171\" src=\"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235123.png\" alt=\"\" class=\"wp-image-171\" srcset=\"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235123.png 977w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235123-300x166.png 300w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235123-768x425.png 768w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235123-421x233.png 421w\" sizes=\"auto, (max-width: 977px) 100vw, 977px\" \/><\/figure>\n<\/figure>\n\n\n\n<p>Ein weiteres wichtiges Thema war die Adressierung in Netzwerken. Dabei haben wir gelernt, was IP-Adressen sind und wie sie helfen, Ger\u00e4te im Netzwerk zu identifizieren. Au\u00dferdem haben wir uns mit verschiedenen Netzwerkprotokollen wie WLAN, HTTP und FTP besch\u00e4ftigt, die den Datenaustausch im Internet steuern.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"985\" height=\"540\" data-id=\"172\" src=\"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235206.png\" alt=\"\" class=\"wp-image-172\" srcset=\"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235206.png 985w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235206-300x164.png 300w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235206-768x421.png 768w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235206-421x231.png 421w\" sizes=\"auto, (max-width: 985px) 100vw, 985px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"976\" height=\"513\" data-id=\"173\" src=\"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235241.png\" alt=\"\" class=\"wp-image-173\" srcset=\"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235241.png 976w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235241-300x158.png 300w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235241-768x404.png 768w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-18-235241-421x221.png 421w\" sizes=\"auto, (max-width: 976px) 100vw, 976px\" \/><\/figure>\n<\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><em><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-accent-2-color\">Netzwerke erstellen und verwalten<\/mark><\/em><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Modul<\/strong><\/h3>\n\n\n\n<p>Im vierten Modul haben wir angefangen, eigene Netzwerke zu erstellen. Daf\u00fcr haben wir mit dem Cisco Packet Tracer gearbeitet, einer Software, mit der man Netzwerke simulieren kann. Wir haben gelernt, wie man Router einrichtet, Netzwerke aufbaut und VLANs konfiguriert. Ein weiteres gro\u00dfes Thema war die Virtualisierung. Diese Technik wird oft genutzt, um Programme in einer sicheren Umgebung zu testen.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"570\" height=\"307\" src=\"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/image.png\" alt=\"This image has an empty alt attribute; its file name is Screenshot-2024-10-28-190116.png\" class=\"wp-image-169\" srcset=\"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/image.png 570w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/image-300x162.png 300w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/03\/image-421x227.png 421w\" sizes=\"auto, (max-width: 570px) 100vw, 570px\" \/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/04\/Ubung-1-1024x640.png\" alt=\"\" class=\"wp-image-364\" style=\"width:503px;height:auto\" srcset=\"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/04\/Ubung-1-1024x640.png 1024w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/04\/Ubung-1-300x188.png 300w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/04\/Ubung-1-768x480.png 768w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/04\/Ubung-1-1536x960.png 1536w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/04\/Ubung-1-480x300.png 480w, https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/wp-content\/uploads\/2025\/04\/Ubung-1.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Grundlagen der Netzwerktechnik 3. Modul In der 3. Klasse haben wir uns im Fach NTMA mit Netzwerken und Netzwerkmanagement besch\u00e4ftigt. Zu Beginn haben wir die Funktionen eines Netzwerks &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":48,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-34","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/index.php?rest_route=\/wp\/v2\/pages\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=34"}],"version-history":[{"count":5,"href":"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/index.php?rest_route=\/wp\/v2\/pages\/34\/revisions"}],"predecessor-version":[{"id":365,"href":"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/index.php?rest_route=\/wp\/v2\/pages\/34\/revisions\/365"}],"up":[{"embeddable":true,"href":"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/index.php?rest_route=\/wp\/v2\/pages\/48"}],"wp:attachment":[{"href":"https:\/\/Nadira.Kadusic.pages.hak-schwaz.at\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}