PC Hard Ware Notes
PC Hard Ware Notes
STUDY MATERIAL
Course objectives:
Text Book:
Reference Books:
1. PC Troubleshooting and Repair Stephen J. Bigelow Dream tech Press, New Delhi
2. “Data and Computer Communications”, Stallings, PHI,
3. “DataCommunication”, William Schewber, McGrawHill,1987
4. IT essential V7 companion guide – Cisco Networking Academy 2020
5. Upgrading and repairing PCs(22nd edition) – Scott Mueller – 2015 Que
Page 21 of 25
Unit-I
Introduction to Computer hardware
Computer: A computer is an electronic device which accepts data as input, process and produce
useful information as output.
Data: Data is a collection of facts, figures, digits and some special symbols.
Block diagram of computer: A computer block diagram provides a high-level overview of the
various components that make up a computer system and how they interact with each other. While
there can be different variations and complexities based on the type of computer (e.g., desktop,
laptop, server), I'll present a general block diagram of a modern computer. Keep in mind that this
is a simplified representation and not an exhaustive technical breakdown.
Let's explore the major components:
1. Input
2. CPU
3. Output
Input Unit: A Computer need to receive data and
instruction in order to solve any problem. Therefore, we
need to input the data and instructions into the computer.
The input unit consists of one or more input devices.
Keyboard is the one of the most commonly used input
device. Other commonly used input devices are the
Mouse, Scanner, Microphone etc. All the input devices
perform the following functions.
• Accept the data and instructions from the outside world.
• Convert it to a form that the computer can understand.
• Supply the converted data to the computer system for further processing.
Central Processing Unit:
The Control Unit (CU) , Memory Unit(MU) and Arithmetic Logic Unit (ALU) of the computer
are together known as the Central Processing Unit (CPU). The CPU is like brain performs the
following functions:
• It performs all calculations.
• It takes all decisions.
•It controls all units of the computer.
Control Unit:
It controls all other units in the computer. The control unit instructs the input unit, where to store
the data after receiving it from the user. It controls the flow of data and instructions from the
storage unit to ALU. It also controls the flow of results from the ALU to the storage unit. The
control unit is generally referred as the central nervous system of the computer that control and
synchronizes it’s working.
Arithmetic Logical Unit:
All calculations are performed in the Arithmetic Logic Unit (ALU) of the computer. It also does
comparison and takes decision. The ALU can perform basic operations such as addition,
subtraction, multiplication, division, etc., and does logic operations viz, >, <, =, ‘etc. Whenever
calculations are required, the control unit transfers the data from storage unit to ALU once the
computations are done, the results are transferred to the storage unit by the control unit and then it
is send to the output unit for displaying results.
Storage Unit:
The storage unit of the computer holds data and instructions that are entered through the
input Unit, before they are processed. It preserves the intermediate and final results before these
are sent to the output devices. It also saves the data for the later use. The various storage devices
of a computer system are divided into two categories.
a) Primary Storage: Stores and provides very fast. This memory is generally used to hold the
program being currently executed in the computer, the data being received from the input unit, the
intermediate and final results of the program. The primary memory is temporary in nature. The
data is lost, when the computer is switched off. In order to store the data permanently, the data has
to be transferred to the secondary memory. The cost of the primary storage is more compared to
the secondary storage. Therefore, most computers have limited primary storage capacity.
b) Secondary Storage:
Secondary storage is used like an archive. It stores several programs, documents, data bases etc.
The programs that you run on the computer are first transferred to the primary memory before it
is actually run. Whenever the results are saved, again they get stored in the secondary memory.
The secondary memory is slower and cheaper than the primary memory. Some of the commonly
used secondary memory devices are Hard disk, CD, etc.,
System Software
System software is software that directly operates the computer hardware and provides the basic
functionality to the users as well as to the other software to operate smoothly. Or in other words,
system software basically controls a computer’s internal functioning and also controls hardware
devices such as monitors, printers, and storage devices, etc. It is like an interface between
hardware and user applications, it helps them to communicate with each other because hardware
understands machine language(i.e. 1 or 0) whereas user applications are work in human-readable
languages like English, Hindi, German, etc. so system software converts the human-readable
language into machine language and vice versa.
Types of System Software
It has two subtypes which are:
1. Operating System: It is the main program of a computer system. When the computer
system ON it is the first software that loads into the computer’s memory. Basically, it
manages all the resources such as computer memory, CPU, printer, hard disk, etc., and
provides an interface to the user, which helps the user to interact with the computer
system. It also provides various services to other computer software. Examples of
operating systems are Linux, Apple macOS, Microsoft Windows, etc.
2. Language Processor: As we know that system software converts the human-readable
language into a machine language and vice versa. So, the conversion is done by the
language processor. It converts programs written in high-level programming
languages like Java, C, C++, Python, etc(known as source code), into sets of instructions
that are easily readable by machines(known as object code or machine code).
3. Device Driver: A device driver is a program or software that controls a device and helps
that device to perform its functions. Every device like a printer, mouse, modem, etc.
needs a driver to connect with the computer system eternally. So, when you connect a
new device with your computer system, first you need to install the driver of that device
so that your operating system knows how to control or manage that device.
Features of System Software
Let us discuss some of the features of System Software:
System Software is closer to the computer system.
System Software is written in a low-level language in general.
System software is difficult to design and understand.
System software is fast in speed(working speed).
System software is less interactive for the users in comparison to application software.
Application Software
Software that performs special functions or provides functions that are much more than the basic
operation of the computer is known as application software. Or in other words, application
software is designed to perform a specific task for end-users. It is a product or a program that is
designed only to fulfill end-users’ requirements. It includes word processors, spreadsheets,
database management, inventory, payroll programs, etc.
Types of Application Software
There are different types of application software and those are:
1. General Purpose Software: This type of application software is used for a variety of
tasks and it is not limited to performing a specific task only. For example, MS-Word,
MS-Excel, PowerPoint, etc.
2. Customized Software: This type of application software is used or designed to perform
specific tasks or functions or designed for specific organizations. For example, railway
reservation system, airline reservation system, invoice management system, etc.
3. Utility Software: This type of application software is used to support the computer
infrastructure. It is designed to analyze, configure, optimize and maintains the system,
and take care of its requirements as well. For example, antivirus, disk fragmented,
memory tester, disk repair, disk cleaners, registry cleaners, disk space analyzer, etc.
Features of Application Software
Let us discuss some of the features of Application Software:
An important feature of application software is it performs more specialized tasks like
word processing, spreadsheets, email, etc.
Mostly, the size of the software is big, so it requires more storage space.
Application software is more interactive for the users, so it is easy to use and design.
The application software is easy to design and understand.
Application software is written in a high-level language in general.
Difference between System Software and Application Software
Now, let us discuss some difference between system software and application software:
Less interactive for the users. More interactive for the users.
Computer Languages: A language is the main medium of communicating between the Computer
systems and the most common are the programming languages
. • As we know a Computer only understands binary numbers that is 0 and 1 to perform various
operations but the languages are developed for different types of work on a Computer.
• A language consists of all the instructions to make a request to the system for processing a task.
• From the first generation and now fourth generation of the Computers there were several
programming languages used to communicate with the Computer.
Language Translators:
Language translators allow computer programmers to write sets of instructions in specific
programming languages. These instructions are converted by the language translator into
machine code. The computer system then reads these machine code instructions and executes
them. Hence, a language translator is a program that translates from one computer language to
another.
There are mainly three types of translators that are used to translate different programming
languages into machine-equivalent code:
Assembler:
An assembler translates assembly language into machine code.Assembly language consists of
mnemonics for machine op-codes, so assemblers perform a 1:1 translation from mnemonic to
direct instruction. For example, LDA #4 converts to 0001001000100100.
Conversely, one instruction in a high-level language will translate to one or more instructions at
the machine level.
Compiler
A compiler is a computer program that translates code written in a high-level language into a
low-level language, machine code.The most common reason for translating source code is to
create an executable program (converting from high-level language into machine language).
Advantages of using a compiler
Source code is not included; therefore, compiled code is more secure than interpreted
code.
Tends to produce faster code and is better at interpreting source code.
Because the program generates an executable file, it can be run without the need for the
source code.
Disadvantages of using a compiler
Before a final executable file can be created, object code must be generated; this can be a
time-consuming process.
The source code must be 100% correct for the executable file to be produced.
Interpreter
An interpreter program executes other programs directly, running through the program code and
executing it line-by-line. As it analyses every line, an interpreter is slower than running compiled
code, but it can take less time to interpret program code than to compile and then run it. This is
very useful when prototyping and testing code.
Interpreters are written for multiple platforms; this means code written once can be immediately
run on different systems without having to recompile for each. Examples of this include flash-
based web programs that will run on your PC, Mac, gaming console, and mobile phone.
Advantages of using an interpreter
Easier to debug (check errors) than a compiler.
It is easier to create multi-platform code, as each different platform would have an
interpreter to run the same code.
Useful for prototyping software and testing basic program logic.
Disadvantages of using an interpreter
Source code is required for the program to be executed, and this source code can be read,
making it insecure.
Due to the on-line translation method, interpreters are generally slower than compiled
programs.
input and output devices of computer:
Input and output devices are essential components of a computer system that enable
communication between the user and the computer. Here are some common examples of input
and output devices:
Input Devices:
1. Keyboard: A standard keyboard allows users to input text and commands into the
computer by pressing keys.
2. Mouse: A mouse is a pointing device that allows users to interact with graphical user
interfaces by moving a cursor on the screen and clicking on icons or buttons.
3. Touchscreen: Touchscreens allow users to input data and interact with the computer by
directly touching the display screen.
4. Scanner: Scanners are used to convert physical documents or images into digital format,
allowing them to be stored or manipulated on a computer.
5. Digital Camera: Digital cameras capture still images and videos, which can be
transferred to a computer for editing or storage.
6. Microphone: Microphones capture audio input, allowing users to record sound, make
voice calls, or use voice recognition software.
7. Joystick: Joysticks are often used for gaming and simulation applications, allowing users
to control movement and actions in digital environments.
8. Webcam: Webcams capture video in real-time, allowing users to conduct video calls,
record videos, or stream content online.
9. Barcode Reader: Barcode readers scan barcodes on products or documents, providing a
quick and accurate way to input data into the computer.
Output Devices:
1. Monitor: A monitor, also known as a display or screen, visually presents information to
the user. It displays text, images, videos, and other graphical content generated by the
computer.
2. Printer: Printers produce hard copies of digital documents or images on paper. There are
various types of printers, including inkjet, laser, and dot matrix printers.
3. Speaker: Speakers output audio, allowing users to hear sound effects, music, and other
audio elements from the computer.
4. Headphones: Headphones provide audio output in a private manner, allowing users to
listen to audio without disturbing others.
5. Projector: Projectors display computer-generated images and presentations on large
screens or surfaces, making them useful for classrooms, boardrooms, and auditoriums.
6. Plotter: Plotters are specialized printers used for producing high-quality, large-scale
graphical output, often used in engineering and design applications.
These devices work together to enable users to interact with and receive information from the
computer system.
Computer Hardware:
The physical components of a computer is called Computer Hardware. The following are
various components of hardware:
1. Central Processing Unit (CPU):
The CPU is the brain of the computer. It performs most of the processing inside the computer
and carries out instructions of a computer program by performing basic arithmetic, logical,
control, and input/output (I/O) operations.
2. Motherboard:
The motherboard is the main circuit board of the computer. It houses the CPU, memory, and
other essential components. It provides connections between the CPU, memory, storage devices,
and other peripherals.
3. Memory (RAM):
Random Access Memory (RAM) is the computer's short-term memory. It stores data and
instructions that the CPU needs while it is actively working on tasks. RAM is volatile memory,
meaning it loses its content when the power is turned off.
4. Storage Devices:
Hard Disk Drive (HDD): HDDs are traditional storage devices that use magnetic storage
to store data. They provide large storage capacities but are relatively slower compared to
newer technologies.
Solid State Drive (SSD): SSDs use flash memory to store data. They are faster, more
durable, and energy-efficient compared to HDDs. SSDs are commonly used in modern
computers for faster performance.
Optical Drives: Devices like DVD drives and Blu-ray drives are used for reading and
writing optical discs.
5. Graphics Processing Unit (GPU):
The GPU is responsible for rendering images and videos. It's crucial for gaming, video editing,
and other graphics-intensive tasks. Some CPUs have integrated graphics, but for high-
performance tasks, dedicated GPUs are used.
6. Power Supply Unit (PSU):
The PSU converts electrical power from an outlet into usable power for the computer. It supplies
power to all components of the computer.
7. Input Devices:
Keyboard: Used for entering text and commands.
Mouse: Used for pointing, clicking, and selecting items on the screen.
Other Input Devices: Includes touchpads, stylus pens, and game controllers.
8. Output Devices:
Monitor: Displays visual output from the computer.
Printer: Produces hard copies of documents.
Speakers/Headphones: Output audio for listening.
9. Networking Components:
Network Interface Card (NIC): Enables the computer to connect to a network.
Modem: Converts digital data from a computer into analog signals for transmission over
telephone lines (mostly used for dial-up internet connections).
10. Cooling Systems:
Fans and Heat Sinks: Keep the CPU, GPU, and other components cool by dissipating
heat generated during operation.
These components work together to enable a computer to perform various tasks, from simple
word processing to complex 3D rendering and scientific calculations. Modern computers often
consist of a combination of these components to meet specific performance and functionality
requirements.
Switched-Mode Power Supply
In a personal computer, SMPS stands for Switched-Mode Power Supply. It is a type of power
supply unit (PSU) that converts the incoming AC (alternating current) voltage from the electrical
outlet into the DC (direct current) voltage required by the computer's internal components.
Here's how an SMPS works in a personal computer:
1. AC-to-DC Conversion: The SMPS takes the
AC voltage from the power outlet and converts
it into high-frequency AC. This AC voltage is
then rectified and filtered to produce a stable
DC voltage.
2. Switching Circuit: The SMPS utilizes a
switching circuit that rapidly switches the DC
voltage on and off at a high frequency. This
high-frequency switching allows for more
efficient power conversion compared to
traditional linear power supplies.
3. Voltage Regulation: The SMPS includes
voltage regulation circuitry to ensure that the output DC voltage remains stable even with
fluctuations in the input voltage or varying loads. This regulation is crucial to provide
consistent and reliable power to the computer's components.
4. Multiple Output Rails: Modern SMPS units typically provide multiple output rails with
different voltage levels to power various components of the computer. Common rails
include +3.3V, +5V, and +12V. Each rail is responsible for supplying power to specific
components like the motherboard, CPU, memory, storage devices, and expansion cards.
5. Cooling: SMPS units often incorporate cooling mechanisms such as fans or heat sinks to
dissipate heat generated during the power conversion process. Efficient cooling helps
6. Maintain the SMPS's temperature within safe limits and ensures reliable operation.
SMPS units are widely used in personal computers and other electronic devices due to their
compact size, high efficiency, and ability to handle a wide range of input voltages. They provide
the necessary power to all the components of a computer, ensuring stable and reliable operation.
An SMPS adjusts output voltage and current between different electrical configurations by
switching the basics of typically lossless storage such as capacitors and inductors. Ideal
switching concepts determined by transistors controlled outside of their active state that have no
resistance when ‘on’ and carry no current when ‘off.’ It is the idea why switches with an ideal
function will operate with 100 per cent output, that is, all input energy is provided to the load; no
power is wasted as dissipated heating. In fact, such ideal systems do not exist, which is why a
switching power source can not be 100 per cent proficient, but it is still a vital improvement in
effectiveness over a linear regulator.
Benefits of SMPS
The switch-mode power source is small in scale.
The SMPS is very lightweight.
SMPS power consumption is typically 60 to 70 per cent, which is ideal for use.
SMPS is strongly anti-interference.
The SMPS production range is large.
Limitations of SMPS
The complexity of SMPS is very large.
The production reflection is high and its control is weak in the case of SMPS.
Use of SMPS can only be a step-down regulator.
In SMPS, the voltage output is just one.
Here are some common types of SMPS:
Buck Converter: A buck converter, also known as a step-down converter, is one of the simplest
forms of SMPS. It steps down the input voltage to a lower output voltage. The switching element
(usually a transistor) is connected in series with the load, and energy is stored in an inductor
during the ON state of the transistor and released to the load during the OFF state.
Boost Converter: A boost converter, or step-up converter, is used to increase the input voltage
to a higher output voltage. It works opposite to a buck converter. The switching element is
connected in series with the input voltage source, and an inductor stores energy during the ON
state and releases it to the output during the OFF state.
Buck-Boost Converter: A buck-boost converter can step up or step down the input voltage,
depending on the desired output. It can provide a lower or higher voltage than the input voltage.
It combines the functionality of both buck and boost converters by using a combination of
inductors, capacitors, and switches.
These are some of the common types of SMPS used in various applications. Each type has its
advantages, disadvantages, and suitable applications depending on the voltage requirements,
power levels, efficiency, and other factors.
UPS
An Uninterruptible Power Supply (UPS) is an electrical device that provides backup power to
connected devices or systems during a power outage or when the main power source fails. It is
designed to ensure that critical equipment or sensitive electronic devices continue to operate
without interruption, allowing users to save their work, safely shut down systems, or continue
operations until the power is restored or an alternate power source is activated.
The primary function of a UPS is to provide temporary power when the main power supply
becomes unavailable or unstable. It acts as a bridge between the main power source (such as the
electrical grid or a generator) and the connected devices, offering protection against power
disturbances, voltage fluctuations, surges, sags, and complete power failures.
A typical UPS consists of several key components:
1. Battery: The UPS contains one or more rechargeable batteries that store electrical energy
when the main power supply is available. These batteries supply power to connected
devices when the main power source fails.
2. Inverter: The inverter converts the direct current (DC) power stored in the batteries into
alternating current (AC) power, which is the standard form of electrical power used by
most devices and systems.
3. Charger: The charger replenishes the battery's energy when the main power supply is
restored. It ensures that the batteries remain charged and ready to supply power during an
outage.
4. Automatic Voltage Regulator (AVR): The AVR feature of a UPS helps regulate and
stabilize the voltage provided to connected devices. It protects against voltage spikes,
drops, or fluctuations that can damage sensitive equipment.
5. Control and Monitoring: A UPS often includes a control panel or software interface for
users to configure settings, monitor battery status, view power load, and receive
notifications about power events.
UPS systems come in various sizes and capacities, ranging from small units designed for
personal computers to large-scale systems used to back up entire data centers or critical
infrastructure. The runtime of a UPS, i.e., the duration it can provide power to connected devices
during an outage, depends on factors such as the battery capacity and the power consumption of
the equipment.
Overall, the purpose of a UPS is to provide reliable and uninterrupted power to protect valuable
equipment, prevent data loss, and ensure the continuity of operations in various settings,
including homes, offices, medical facilities, telecommunications networks, and industrial
environments.
There are several types of UPS systems, each with its own working principle. Here's a brief
overview of the working principles of some common types of UPS:
1. Standby UPS (Offline UPS):
The standby UPS is the simplest and most economical type.
It remains in standby mode, allowing the connected devices to run directly from
the mains power.
When a power outage occurs or the voltage goes out of range, the UPS switches
to battery power.
The transfer time between mains power and battery power is usually a few
milliseconds, causing a brief interruption in power supply.
2. Line-Interactive UPS:
The line-interactive UPS incorporates an automatic voltage regulator (AVR) in
addition to the features of a standby UPS.
The AVR regulates the incoming voltage and compensates for under-voltage or
over-voltage conditions.
During normal operation, the UPS uses the mains power to supply the connected
devices while charging the battery.
In case of a power outage or voltage fluctuation, the UPS switches to battery
power or adjusts the voltage through the AVR to maintain a stable output.
3. Online UPS (Double Conversion UPS):
The online UPS provides the highest level of protection and is commonly used for
critical applications.
It continuously converts the incoming AC power to DC power, which charges the
battery and powers the connected devices.
The DC power is then converted back to AC power using an inverter to supply a
stable and clean output.
Since the load is always powered by the inverter, the online UPS offers a
seamless transition during power disruptions, eliminating any transfer time.
This provides the highest level of protection against power disturbances,
including voltage sags, surges, and frequency variations.
Unit-II
A wireless network adapter, also known as a Wi-Fi adapter or wireless NIC (Network Interface
Card), is a device that allows a computer or other device to connect to a wireless network. It
enables the device to communicate wirelessly with routers, access points, and other wireless
devices.
Wireless network adapters come in various forms, including USB adapters, PCIe (Peripheral
Component Interconnect Express) cards, and integrated adapters built into laptops or other
devices. They typically use Wi-Fi technology, such as 802.11ac or 802.11ax (Wi-Fi 5 or Wi-Fi
6), to establish a wireless connection.
USB wireless network adapters are convenient and easy to use. They can be plugged into a USB
port on a computer or laptop, providing wireless connectivity without the need for internal
hardware installation. USB adapters are often portable, making them useful for devices without
built-in Wi-Fi capabilities or for upgrading older devices to support newer Wi-Fi standards.
PCIe wireless network adapters are internal cards that are installed in the PCIe slots of a desktop
computer's motherboard. They offer higher performance and stability compared to USB adapters.
PCIe adapters typically have external antennas for better signal reception and can provide faster
data transfer rates, especially when using the latest Wi-Fi standards.
Integrated wireless network adapters are commonly found in laptops, tablets, smartphones, and
other devices. They are built-in components that are designed specifically for the device and
cannot be easily removed or upgraded. Integrated adapters vary in terms of performance and
capabilities depending on the device and its manufacturer.
When choosing a wireless network adapter, there are a few key factors to consider:
1. Compatibility: Ensure that the adapter is compatible with your device's operating system
and has the necessary drivers available.
2. Wireless Standards: Look for adapters that support the latest Wi-Fi standards (e.g.,
802.11ac or 802.11ax) to benefit from faster speeds and improved performance.
3. Data Transfer Speed: Consider the maximum data transfer speed offered by the adapter.
Higher speeds are desirable for activities such as online gaming, HD video streaming,
and large file transfers.
4. Antenna Configuration: Some adapters come with external antennas that can be
adjusted for better signal reception. This is especially useful if you have a weak wireless
signal in your area.
5. Security: Ensure that the adapter supports the latest security protocols, such as WPA3, to
protect your wireless connections.
6. Brand and Reviews: Consider reputable brands and read reviews to get an idea of the
adapter's reliability and performance.
3.9 Functions of LAN Tools: LAN tools are essential for managing and troubleshooting local
area networks (LANs). The following are the functionalities of different LAN tools:
3.9.1 Anti-Magnetic Mat:
Provides an insulated surface for working with sensitive electronic components.
Protects against static electricity, which can damage electronic devices.
Helps prevent the attraction of magnetic materials that could interfere with electronic
signals.
3.9.2 Anti-Magnetic Gloves:
Shield against static electricity and magnetic fields.
Protect the hands of technicians when handling sensitive electronic components.
Prevent the transfer of oils, dirt, or other contaminants to delicate equipment.
3.9.3 Crimping Tool:
Used to attach connectors to the ends of network cables.
Enables the crimping (squeezing) of connectors onto the cable wires securely.
Essential for creating reliable and properly terminated network cables.
3.9.4 Cable Tester:
Checks the continuity and integrity of network cables.
Identifies faulty cables, such as breaks, shorts, or miswires.
Verifies if cables are properly terminated and connected.
3.9.5 Cutter:
Used to cut network cables to the desired length.
Provides clean and precise cuts for proper cable installation.
Allows for easy cable management and organization.
3.9.6 Loopback Plug:
Used for testing and troubleshooting network connections.
Simulates the presence of a network device by creating a loopback.
Helps determine if a network port or connection is functioning correctly.
3.9.7 Toner Probe:
Used for tracing and identifying network cables.
Helps locate specific cables in a bundle or in a network infrastructure.
Consists of a tone generator and a probe to detect the generated tone.
3.9.8 Punch Down Tool:
Used to terminate network cables into patch panels, keystone jacks, or connectors.
Allows for secure and reliable connections by pushing the cable wires into the
appropriate slots.
Ensures proper seating and termination of the cable.
3.9.9 Protocol Analyzer:
Monitors and analyzes network traffic and protocols.
Helps diagnose and troubleshoot network issues.
Provides insights into network performance, packet loss, latency, and security
vulnerabilities.
3.9.10 Multi-meter:
Measures electrical properties such as voltage, current, and resistance.
Useful for troubleshooting network equipment and checking power supply levels.
Can assist in identifying electrical faults or irregularities in network devices.
These LAN tools are commonly used by network technicians and IT professionals to install,
maintain, and troubleshoot local area networks (LANs).
Network topologies refer to the arrangement or layout of the various devices and components in
a computer network. Different network topologies determine how nodes or devices are
connected and communicate with each other. Here are some common network topologies:
1. Mesh Topology: A mesh topology provides a direct connection between all devices in
the network. Each device is connected to every other device, creating a redundant and
fault-tolerant network. Mesh topologies are highly reliable but can be expensive and
complex to implement.
2. Star Topology: In a star topology, all devices are connected to a central hub or switch.
Each device has a dedicated point-to-point connection to the hub, enabling easy
management and fault isolation. If the hub fails, however, the connected devices lose
connectivity.
3. Bus Topology: In a bus topology, all devices are connected to a common communication
medium, known as a bus or backbone. Each device receives all the data transmitted on
the bus but only processes data intended for itself. It is a simple and inexpensive topology
but can be prone to congestion and single-point-of-failure issues.
4. Ring Topology: In a ring topology, devices are connected in a closed loop or ring, where
each device is connected to two other devices. Data travels around the ring in one
direction, and each device receives and forwards the data to the next device. Failure of
one device can disrupt the entire network.
Note: All diagrams refer in running notes.
Each network topology has its own advantages and disadvantages, and the choice of topology
depends on factors such as the network size, cost, scalability, reliability requirements, and the
type of communication needed within the network
Unit-IV
NETWORK ADDRESSING SUBNETTING
Introduction:
o Hosts in different subnet need a mechanism to locate each other. This task can be done by
DNS. DNS is a server which provides Layer-3 address of remote host mapped with its
domain name or FQDN. When a host acquires the Layer-3 Address (IP Address) of the
remote host, it forwards all its packet to its gateway. A gateway is a router equipped with
all the information which leads to route packets to the destination host.
Network address can be of one of the following:
o Unicast (destined to one host)
o Multicast (destined to group)
o Broadcast (destined to all)
IP Address:
IP address stands for “Internet Protocol address.” The Internet Protocol is a set of rules for
communication over the internet, such as sending mail, streaming video, or connecting to a
website. An IP address identifies a network or device on the internet. The internet protocols
manage the process of assigning each unique device its own IP address. (Internet protocols do
other things as well, such as routing internet traffic.) This way, it’s easy to see which devices on
the internet are sending, requesting, and receiving what information.
IP addresses are like telephone numbers, and they serve the same purpose. When you contact
someone, your phone number identifies who you are, and it assures the person who answers the
phone that you are who you say you are. IP addresses do the exact same thing when you’re
online — that’s why every single device that is connected to the internet has an IP address.
There are two types of IP addresses: IPv4 and IPv6. It’s easy to recognize the difference if you
count the numbers. IPv4 addresses contain a series of four numbers, ranging from 0 (except the
first one) to 255, each separated from the next by a period — such as 5.62.42.77.
IPv6 addresses are represented as eight groups of four hexadecimal digits, with the groups
separated by colons. A typical IPv6 address might look like this:
2620:0aba2:0d01:2042:0100:8c4d:d370:72b4.
An IP address has two parts: the network ID, comprising the first three numbers of the address,
and a host ID, the fourth number in the address. So on your home network — 192.168.1.1, for
example – 192.168.1 is the network ID, and the final number is the host ID.
The Network ID indicates which network the device is on. The Host ID refers to the specific device
on that network
You may not always want the outside world to know exactly which device and network you're
using. In this case, it’s possible to mask your IP address from the outside world through a Virtual
Private Network (VPN). When you use a VPN, it prevents your network from revealing your
address.
TCP/IP Addressing scheme
IP addresses are only one part of the internet’s architecture. After all, having a postal address for
your house is meaningless unless there’s a post office responsible for delivering the mail. In
internet terms, IP is one part of TCP/IP.
The Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of rules and procedures
for connecting devices across the internet. TCP/IP specifies how data is exchanged: Data is
broken down into packets and passed along a chain of routers from origin to
destination. This is the basis for all internet communication.
TCP defines how applications communicate across the network. It manages how a message is
broken down into a series of smaller packets, which are then transmitted over the internet and
reassembled in the right order at the destination address.
The IP portion of the protocol directs each packet to the right destination. Each gateway
computer on the network checks this IP address to determine where to forward the message.
Introduction of Classful IP Addressing
IP address is an address having information about how to reach a specific host, especially outside
the LAN. An IP address is a 32 bit unique address having an address space of 2 32.
Generally, there are two notations in which IP address is written, binary notation and dotted
decimal notation
Binary Notation:
Classful Addressing
The 32 bit IP address is divided into five sub-classes. These are:
Class A
Class B
Class C
Class D
Class E
Each of these classes has a valid range of IP addresses. Classes D and E are reserved for
multicast and experimental purposes respectively. The order of bits in the first octet determine
the classes of IP address.
IPv4 address is divided into two parts:
Network ID
Host ID
The class of IP address is used to determine the bits used for network ID and host ID and the
number of total networks and hosts possible in that particular class. Each ISP or network
administrator assigns IP address to each device that is connected to its network.
Class B:
IP address belonging to class B are assigned to the networks that ranges from medium-sized to
large-sized networks.
The network ID is 16 bits long.
The host ID is 16 bits long.
The higher order bits of the first octet of IP addresses of class B are always set to 10. The
remaining 14 bits are used to determine network ID. The 16 bits of host ID is used to
determine the host in any network. The default sub-net mask for class B is 255.255.x.x. Class
B has a total of:
2^14 = 16384 network address
2^16 – 2 = 65534 host address
IP addresses belonging to class B ranges from 128.0.x.x – 191.255.x.x.
Class C:
IP address belonging to class C are assigned to small-sized networks.
The network ID is 24 bits long.
The host ID is 8 bits long.
The higher order bits of the first octet of IP addresses of class C are always set to 110. The
remaining 21 bits are used to determine network ID. The 8 bits of host ID is used to determine
the host in any network. The default sub-net mask for class C is 255.255.255.x. Class C has a
total of:
2^21 = 2097152 network address
2^8 – 2 = 254 host address
IP addresses
belonging
to class C ranges
from 192.0.0.x
–
223.255.255.x.
Class D:
IP address belonging to class D are reserved for multi-casting. The higher order bits of the first
octet of IP addresses belonging to class D are always set to 1110. The remaining bits are for
the address that interested hosts recognize.
Class D does not posses any sub-net mask. IP addresses belonging to class D ranges from
224.0.0.0 – 239.255.255.255.
Class E:
IP addresses belonging to class E are reserved for experimental and research purposes. IP
addresses of class E ranges from 240.0.0.0 – 255.255.255.254. This class doesn’t have any
sub-net mask. The higher order bits of first octet of class E are always set to 1111.
The purpose of subnetting is to establish a computer network that is quick, efficient, and
robust. As networks grow in size and complexity, traffic must find more efficient pathways.
Bottlenecks and congestion would arise if all network traffic travelled across the system at the
same time, utilizing the same path, resulting in slow and wasteful backlogs. By creating a subnet,
you can limit the number of routers that network traffic must pass through. An engineer will
effectively establish smaller mini-routes within a larger network to allow traffic to go the shortest
distance possible.
We need a subnet mask to identify a subnet, which is created by substituting the number "1" for
each Network ID bit and the amount of bits we reserve for Host ID to create the subnet. A data
packet from the internet is intended to be forwarded to the specified subnet network using the
subnet mask.
A part of an address should be used as the Subnet ID is also specified by the subnet mask. In order
to apply the subnet mask to the whole network address, a binary AND operation is utilized. When
performing an AND operation, it is assumed that the result will be "true" if both inputs are. If not,
"false" is presented. This is only possible when both bits are 1.
The Subnet ID results from this. The Subnet ID is used by routers to choose the best route among
the sub - networks.
o The two components that make up an IP address are the Network Prefix (sometimes called
the Network ID) and the Host ID. Depending on whether the address is Class A, B, or C,
either the Network Prefix or the Host ID must be separated. A Class B IPv4 address,
172.16.37.5, is seen in the image below. The Network Prefix is 172.16.0.0, and the Host
ID is 37.5.
Internet protocols make communication on the internet possible. Every device connected to the
internet is assigned an IP address. This enables the identification and location of networked
computers on the internet.
Internet protocols also enable the transportation of data items on the internet. The data
items are transmitted in form of independent messages whose contents are not guaranteed.
There are two versions of internet protocol, i.e., internet protocol version 4 and internet protocol
version 6, used at the network layer of the OSI model.
Internet protocol version 4, just as its name suggests, was the fourth version of the IP suite
developed by the DARPA and released for use in 1982. It is a significant protocol of the standard
networking protocols on the internet and all the other packet switching networks.
IPv4 being a connectionless protocol, does not guarantee if data is delivered, neither does it
arrange the data packets properly. Some packets may also have duplicates, so the organization is
all addressed by the layer that handles transport, i.e., TCP or the UDP. IPv4 also has special and
multicast addresses for private networks with approximately eighteen million addresses.
IP Header
IPv4 address digits are separated with decimal points as shown below:
172.16.254.1
169.254.255.255
IPv4 addressing
Unicast addressing mode only allows for data to be sent to a specific host at a time. The address
of the data destination is a 32-bit IP address of the host device.
Broadcast addressing mode involves the transmission of a data packet to a network of hosts with
the address of the destination indicated as a special broadcast address. The packet sent can be
processed by any host on the network.
This involes the use of both Unicast addressing mode and Broadcast addressing mode. The
packet is not addressed to any specific host or any network of hosts and is processed by more
than one host device on the network.
Internet protocol version 6 is the newest version of the internet protocol suite as of now
developed to replace the fourth version, the IPv4.
IPv6 was brought into existence by the IETF because IPv4 had exhausted its addresses. IPv6 was
intended to replace IPv4. However, this has not been the case; IPv4 has continued to live on.
IP Header
IPv6 uses an address of 128 bits hence allowing 2^128 addresses. IPv6 is not designed to work
together with IPv4; thus, there can not be any communication.
In IPv6, addresses are represented in 8 groups with colons in between every four digits that are to
base 16, i.e., hexadecimal digits. The address is a long line of digits that can be shortened using a
shortening technique to not cause confusion.
Example
There are three methods of transition from IPv4 to IPv6, as stated below:
1. Dual stacking- This involves having both the IPv4 and IPv6 on the same device.
2. Tunneling- Involves communication of users with IPv6 to users with IPv4 to reach IPv6.
3. Network Addressing Translation- Involves communication of hosts with different IP versions.
Classful addressing divides the IPv4 address space (0.0.0.0-255.255.255.255) into 5 IP address
classes: A, B, C, D, and E. However, class A networks, along with class B networks and class C
networks, are used for network hosts. Class D networks, which cover the 224.0.0.0-
239.255.255.255 IP address range, are reserved for multicasting, and class E (240.0.0.0-
255.255.255.255) is reserved for “future use.”
The table below details the default network mask (subnet mask), IP address ranges, number of
networks, and number of addresses per network of each address class.
Number of
IPv4 address Network Number of
IPv4 addresses IPv4 address range
class Mask IPv4 Networks
per network
0.0.0.0 –
A 255.0.0.0 128 16,777,214
127.255.255.255
128.0.0.0 –
B 255.255.0.0 16,384 65,534
191.255.255.255
192.0.0.0 –
C 255.255.255.0 2,097,152 254
223.255.255.255
As we can see, Class A continues to use the first 8-bits of an address, and may be suitable for
very large networks. Class B is for networks much smaller than Class A, but still large in their
own right. Class C addresses are suitable for small networks.
As you can probably guess, the internet is hungry for IP addresses. While classful IP addressing
was much more efficient than the older “first 8-bits” method of chopping up the IPv4 address
space, it still wasn’t enough to keep up with growth.
As internet popularity continued to surge past 1981, it became clear that allocating blocks of
16,777,216, 65,536, or 256 addresses simply wasn’t sustainable. Addresses were being wasted in
too-large blocks, and it was clear there’d be a tipping point where we ran out of IP address space
altogether.
One of the best ways to understand why this was a problem is to consider an organization that
needed a network just slightly bigger than a Class C. For example, suppose our example
organization needs 500 IP addresses. Going up to a Class B network means wasting 65,034
addresses (65,534 usable Class B host addresses minus 500). Similarly, if it needed just 2 public
IP addresses, a Class C would waste 252 (254 usable addresses – 2).
Any way you look at it, IP addresses under the IPv4 protocol were running out, either through
waste or the upper limits of the system.
Did you know? There’s a calculated limit of 4,294,967,296 IPv4 addresses, and they were
exhausted on April 21, 2017.
classless addressing:
Using classless addressing and VLSM, addresses can be allocated much more efficiently. This is
because network admins get to pick network masks, and in turn, blocks of IP addresses that are
the right size for any purpose.
Going back to our example organization, if we need 500 IP addresses, using a subnet calculator
(we built one!) tells us a /23 block is much more efficient than a Class B allocation. /23 gives us
510 usable host addresses. That means by switching to classless addressing, we’ve avoided
wasting over 65,000 addresses. Similarly, if we need just the two hosts, a /30 saves 250
addresses.
Unit-V
The above figure shows the HTTP transaction between client and server. The client initiates a
transaction by sending a request message to the server. The server replies to the request message
by sending a response message.
Messages
HTTP messages are of two types: request and response. Both the message types follow the same
message format.
Request Message: The request message is sent by the client that consists of a request line,
headers, and sometimes a body.
Response Message: The response message is sent by the server to the client that consists of a
status line, headers, and sometimes a body.
o Method: The method is the protocol used to retrieve the document from a server. For
example, HTTP.
o Host: The host is the computer where the information is stored, and the computer is
given an alias name. Web pages are mainly stored in the computers and the computers are
given an alias name that begins with the characters "www". This field is not mandatory.
o Port: The URL can also contain the port number of the server, but it's an optional field. If
the port number is included, then it must come between the host and path and it should be
separated from the host by a colon.
o Path: Path is the pathname of the file where the information is stored. The path itself
contain slashes that separate the directories from the subdirectories and files.
File Transfer Protocol:
File Transfer Protocol (FTP) is a standard network protocol used for transferring files between a
client and a server on a computer network. It is a reliable and widely used protocol for file
transfers over the Internet.
FTP operates on the client-server model, where the client initiates a connection to the server and
requests to transfer files. The server, which is usually a dedicated FTP server software, listens for
incoming connections on TCP port 21. Once the connection is established, the client can
authenticate itself with the server using a username and password.
FTP supports two modes of operation: Active mode and Passive mode.
In active mode, the client specifies a port for the server to establish a data connection back to the
client. In passive mode, the client establishes both the control and data connections, and the
server listens for incoming data connections.
Once the connection is established, the client can perform various operations on the server's file
system, such as uploading (putting) files from the client to the server, downloading (getting) files
from the server to the client, renaming files, deleting files, creating directories, and listing the
contents of directories.
FTP can be used through command-line interfaces, dedicated FTP client software, or integrated
into web browsers. Many operating systems and software packages include built-in FTP clients
for basic file transfers.
It's worth noting that FTP is an unencrypted protocol, meaning that the data transferred between
the client and server is not protected from eavesdropping. However, there is an extension to FTP
called FTP Secure (FTPS) that adds SSL/TLS encryption to the FTP communication, providing a
secure channel for file transfers. Another secure alternative is SSH File Transfer Protocol
(SFTP), which runs over a secure shell (SSH) connection.
While FTP has been widely used in the past, its usage has decreased in recent years due to
security concerns and the availability of more secure file transfer protocols. Nonetheless, FTP
still remains in use in certain scenarios where security is not a critical requirement or in legacy
systems.
File Operations:
FTP provides various operations for managing files on the server. These operations include
uploading files from the client to the server (put), downloading files from the server to the client
(get), deleting files (delete), renaming files (rename), creating directories (mkdir), removing
directories (rmdir), changing directories (cd), and listing directory contents (ls).
Simple Mail Transfer Protocol (SMTP):
SMTP is a protocol used for sending and receiving email messages. It is responsible for the
transfer of email from a source to its destination across networks. SMTP operates on the
application layer of the TCP/IP protocol stack and uses TCP as its transport protocol. It typically
works in a client-server model, where the client initiates a connection with the server and sends
the email message. The server then relays the message to the intended recipient's email server.
SMTP uses port 25 for communication.
Components of SMTP
First, we will break the SMTP client and SMTP server into two components such as user agent
(UA) and mail transfer agent (MTA). The user agent (UA) prepares the message, creates the
envelope and then puts the message in the envelope. The mail transfer agent (MTA) transfers this
mail across the internet.
SMTP allows a more complex system by adding a relaying system. Instead of just having one
MTA at sending side and one at receiving side, more MTAs can be added, acting either as a
client or server to relay the email.
The relaying system without TCP/IP protocol can also be used to send the emails to users, and
this is achieved by the use of the mail gateway. The mail gateway is a relay MTA that can be
used to receive an email.
Working of SMTP
Composition of Mail: A user sends an e-mail by composing an electronic mail message using a
Mail User Agent (MUA). Mail User Agent is a program which is used to send and receive mail.
The message contains two parts: body and header. The body is the main part of the message
while the header includes information such as the sender and recipient address. The header also
includes descriptive information such as the subject of the message. In this case, the message
body is like a letter and header is like an envelope that contains the recipient's address.
Submission of Mail: After composing an email, the mail client then submits the completed e-
mail to the SMTP server by using SMTP on TCP port 25.
Delivery of Mail: E-mail addresses contain two parts: username of the recipient and domain
name. For example, [email protected], where "vivek" is the username of the recipient and
"gmail.com" is the domain name.
If the domain name of the recipient's email address is different from the sender's domain name,
then MSA will send the mail to the Mail Transfer Agent (MTA). To relay the email, the MTA
will find the target domain. It checks the MX record from Domain Name System to obtain the
target domain. The MX record contains the domain name and IP address of the recipient's
domain. Once the record is located, MTA connects to the exchange server to relay the message.
Receipt and Processing of Mail: Once the incoming message is received, the exchange server
delivers it to the incoming server (Mail Delivery Agent) which stores the e-mail where it waits
for the user to retrieve it.
Access and Retrieval of Mail: The stored email in MDA can be retrieved by using MUA (Mail
User Agent). MUA can be accessed by using login and password.
Address Resolution Protocol:
Address Resolution Protocol (ARP) is a protocol or procedure that connects an ever-changing
Internet Protocol (IP) address to a fixed physical machine address, also known as a media access
control (MAC) address, in a local-area network (LAN).
This mapping procedure is important because the lengths of the IP and MAC addresses differ,
and a translation is needed so that the systems can recognize one another. The most used IP
today is IP version 4 (IPv4). An IP address is 32 bits long. However, MAC addresses are 48 bits
long. ARP translates the 32-bit address to 48 and vice versa.
There is a networking model known as the Open Systems Interconnection (OSI) model. First
developed in the late 1970s, the OSI model uses layers to give IT teams a visualization of what is
going on with a particular networking system. This can be helpful in determining which layer
affects which application, device, or software installed on the network, and further, which IT or
engineering professional is responsible for managing that layer.
The MAC address is also known as the data link layer, which establishes and terminates a
connection between two physically connected devices so that data transfer can take place. The IP
address is also referred to as the network layer or the layer responsible for forwarding packets of
data through different routers. ARP works between these layers.
When a new computer joins a local area network (LAN), it will receive a unique IP address to
use for identification and communication. Packets of data arrive at a gateway, destined for a
particular host machine. The gateway, or the piece of hardware on a network that allows data to
flow from one network to another, asks the ARP program to find a MAC address that matches
the IP address. The ARP cache keeps a list of each IP address and its matching MAC address.
The ARP cache is dynamic, but users on a network can also configure a static ARP
table containing IP addresses and MAC addresses.
ARP caches are kept on all operating systems in an IPv4 Ethernet network. Every time a device
requests a MAC address to send data to another device connected to the LAN, the device verifies
its ARP cache to see if the IP-to-MAC-address connection has already been completed. If it
exists, then a new request is unnecessary. However, if the translation has not yet been carried
out, then the request for network addresses is sent, and ARP is performed.
An ARP cache size is limited by design, and addresses tend to stay in the cache for only a few
minutes. It is purged regularly to free up space. This design is also intended for privacy and
security to prevent IP addresses from being stolen or spoofed by cyber attackers. While MAC
addresses are fixed, IP addresses are constantly updated.
Country Domain
The format of country domain is same as a generic domain, but it uses two-character country
abbreviations (e.g., us for the United States) in place of three character organizational
abbreviations.
Inverse Domain
The inverse domain is used for mapping an address to a name. When the server has received a
request from the client, and the server contains the files of only authorized clients. To determine
whether the client is on the authorized list or not, it sends a query to the DNS server and ask for
mapping an address to the name.
Working of DNS
o DNS is a client/server network communication protocol. DNS clients send requests to the.
server while DNS servers send responses to the client.
o Client requests contain a name which is converted into an IP address known as a forward
DNS lookups while requests containing an IP address which is converted into a name
known as reverse DNS lookups.
o DNS implements a distributed database to store the name of all the hosts available on the
internet.
o If a client like a web browser sends a request containing a hostname, then a piece of
software such as DNS resolver sends a request to the DNS server to obtain the IP address
of a hostname. If DNS server does not contain the IP address associated with a hostname,
then it forwards the request to another DNS server. If IP address has arrived at the resolver,
which in turn completes the request over the internet protocol.
SNMP
o SNMP stands for Simple Network Management Protocol.
o Simple Network Management Protocol (SNMP) is an application-layer protocol for
monitoring and managing network devices on a local area network (LAN) or wide area
network (WAN).
o The purpose of SNMP is to provide network devices, such as routers, servers and printers,
with a common language for sharing information with a network management system
(NMS).
o SNMP has two components Manager and agent.
o The manager is a host that controls and monitors a set of agents such as routers.
o It is an application layer protocol in which a few manager stations can handle a set of
agents.
o The protocol designed at the application level can monitor the devices made by different
manufacturers and installed on different physical networks.
o It is used in a heterogeneous network made of different LANs and WANs connected by
routers or gateways.
Managers & Agents
o A manager is a host that runs the SNMP client program while the agent is a router that runs
the SNMP server program.
o Management of the internet is achieved through simple interaction between a manager and
agent.
o The agent is used to keep the information in a database while the manager is used to access
the values in the database. For example, a router can store the appropriate variables such
as a number of packets received and forwarded while the manager can compare these
variables to determine whether the router is congested or not.
o Agents can also contribute to the management process. A server program on the agent
checks the environment, if something goes wrong, the agent sends a warning message to
the manager.
Management with SNMP has three basic ideas:
o A manager checks the agent by requesting the information that reflects the behavior of the
agent.
o A manager also forces the agent to perform a certain function by resetting values in the
agent database.
o An agent also contributes to the management process by warning the manager regarding
an unusual condition.
Management Components
o Management is not achieved only through the SNMP protocol but also the use of other
protocols that can cooperate with the SNMP protocol. Management is achieved through
the use of the other two protocols: SMI (Structure of management information) and
MIB(management information base).
o Management is a combination of SMI, MIB, and SNMP. All these three protocols such as
abstract syntax notation 1 (ASN.1) and basic encoding rules (BER).
SMI
The SMI (Structure of management information) is a component used in network management. Its
main function is to define the type of data that can be stored in an object and to show how to
encode the data for the transmission over a network.
MIB
o The MIB (Management information base) is a second component for the network
management.
o Each agent has its own MIB, which is a collection of all the objects that the manager can
manage. MIB is categorized into eight groups: system, interface, address translation, ip,
icmp, tcp, udp, and egp. These groups are under the mib object.
SNMP defines five types of messages: GetRequest, GetNextRequest, SetRequest, GetResponse,
and Trap.
Network Management
Network management is the procedure of administering, managing and working a data network
using a network management system. Current network management systems use software and
hardware to constantly collect and analyze data and push out configuration changes for increasing
performance, reliability, and security.
It involves configuring monitoring and possibly reconfiguring components in a network with the
goal of providing optimal performance, minimum downtime, proper security, accountability and
flexibility.
Functions of Network Management:
Network Management involves monitoring and controlling a network system so that it can
operate properly without downtime. So, the function performed by a network management system
are categorized as follows –
Fault management:
Fault management is the procedure of technology used to manage the administrator who prevents
faults within a networked system so that the availability of downtime is reduced by identifying,
isolating and fixing any malfunctions that occur. It can support active and passive components to
discover fault.
Configuration management
It refers to the process of initially configuring a network and then adjusting it in response to
changing networks requirements. This function is important because improper configuration may
cause the network to work suboptimal or may not work at all. The configuration involves the
parameters at the network interface like IP address, DHCP, DNS, server address etc.
Network management:
Network management is the procedure of maintaining and organizing the active and passive
network elements. It will support the services to maintain network elements and network
performance monitoring and management. It recognizes the fault, Investigate, Troubleshoot,
Configuration Management and OS changes to fulfil all the user requirements. It allows computers
in a network to communicate with each other, control networks and allow troubleshooting or
performance enhancements.
Data logging and report
Data logs record all the records and interactions that pass through a specific point in a system,
between keyboard and display. If any system failure appears, the administrator can go to the log
and view what might have created it.
Accounting management of network resources
To keep a record of usage of network resources known as accounting management. Like to
examine and to determine how to better allocate resources. One might examine the type of traffic
or level of traffic at a particular port. It can also monitor activities of users about password & user
id and authentication for the usage of resources.
Performance Management
It involves monitoring network utilization, end to end response time & performance of resources
at various points in a network. For example, to keep track of switched interfaces in an Ethernet.
Network Security
It refers to the process of providing security on network and network resources. It involves
managing the security services on a resource by using access control, authentication,
confidentiality, integrity and non-repudiation.
Network Monitoring and Troubleshooting.
In today's world, the term network monitoring is widespread throughout the IT industry. Network
monitoring is a critical IT process where all networking components like routers, switches,
firewalls, servers, and VMs are monitored for fault and performance and evaluated continuously
to maintain and optimize their availability. One important aspect of network monitoring is that it
should be proactive. Finding performance issues and bottlenecks proactively helps in identifying
issues at the initial stage. Efficient proactive server monitoring can prevent network downtime or
failures.
How to perform network monitoring effectively
For an efficient network monitoring, need to cut-off the unnecessary load to the network monitor,
at every step possible by:
Monitoring only the essentials
Optimizing the monitoring interval
Choosing the right protocol
Setting thresholds
ROM Versions
There are two ROM Versions which are as follows −
RMON1 MIB
It has defined 10 MIB groups for basic network monitoring. It operates on the MAC layer and the
physical layer.
Statistics MIB Group − It contains a statistic measured by the probe for each monitored
interface on this device. It includes statistics on packets dropped, packets sent, bytes, sent,
broadcast packets, multicast packets, CRC errors, giants, packet fragments.
History − It records periodic statistical samples from a network and stores them for
retrieval. It contains the number of samples, items sampled in different periods.
Alarm − It periodically takes statistical samples and compares them with the threshold set
for events generation. It includes an alarm table & implementation of event group, Alarm
type, interval, starting threshold, stop threshold.
HOST − It contains statistics associated with each host discovered on the network.
Statistics contains Host address, packets & bytes that are received and transmitted,
broadcast packets, multicast packets, error packets.
HOST top N − It prepares tables that describe the top hosts. It contains statistics on hosts,
sample, and start and stop period, rate base duration.
Matrix − It stores and retrieves statistics for conversations between sets of two addresses.
Its elements are source & destination address pairs, their packets, bytes & errors for each
pair.
Filters − It enables packets to be matched by a filter equation for capturing packets or
events. Its elements are bit-filter type, filter expression, conditional expression to other
filters.
Packet Capture − It enables packets to be captured after they flow through a channel. Its
elements are the buffer size for captured packets, full status, and the number of captured
packets.
Events − It controls the generation and notification of events from a device. Its elements
are event type, description, last time event sent.
Token ring − It supports token rings.
RMON 2 MIB Group
It operates on the above protocol layers of the OSI model: application, presentation, session, and
transport & Network layer.
Protocol Delivery − It is a simple and interoperable way for an RMON 2 application to
establish which protocols a particular RMON 2 agent implements.
Protocol Distribution − It maps the data collected by a probe to the correct protocol name
displayed to the network manager.
Address Mapping − It helps address translation from the MAC layer to network layer
addresses that are easier to read. It also supports the SNMP management platform and will
lead to improved topology.
Network Layer host − It contains statistics for network layer traffic to or from each host.
Network Layer Matrix − It contains network layer traffic statistics for conversations
between pairs of hosts.
Application Layer Host − It contains statistics for application layer traffic to or from each
host.
Application Layer Matrix − It stores and retrieves application layer statistics for
conversation between sets of two addresses.
Probe Configuration − It provides a standard way to remotely configure probe parameters
such as trap destination and out-of-band management.
User History Collection − It contains periodic samples of user-specified variables.