C#final 1
C#final 1
a) Identify the function of each layer in the OSI seven-layer model with
graphical representation.
1. Physical Layer
Function:
The Physical layer is in charge of the actual transmission and reception of unstructured raw
data between a device and a physical transmission medium. It converts digital data into
electrical, optical, or radio signals suitable for the transmission medium and vice versa. It
focuses purely on the physical connection and signal transmission, without any awareness of
the data structure or meaning.
Key Responsibilities:
Function:
The Data Link layer ensures reliable transmission of data frames between two nodes
connected by a physical layer. It packages raw bits from the physical layer into structured
frames and handles error detection, correction, and flow control to ensure proper data
communication over a link.
Key Responsibilities:
3. Network Layer
Function:
The Network layer is responsible for the delivery of packets across networks by determining
the best logical path between the source and the destination. It manages logical addressing
and routing, ensuring that each packet takes the most efficient route through interconnected
networks.
Key Responsibilities:
4. Transport Layer
Function:
The Transport layer ensures reliable data transfer between devices or applications on different
hosts. It provides services such as connection setup, error recovery, data integrity, and flow
control, ensuring complete and accurate data delivery to the correct application processes.
Key Responsibilities:
5. Session Layer
Function:
The Session layer is responsible for establishing, managing, and terminating sessions
between applications. It provides mechanisms for managing and synchronizing
communication and dialogue between devices, ensuring a stable and continuous session is
maintained throughout the exchange.
Key Responsibilities:
6. Presentation Layer
Function:
The Presentation layer translates data between the application layer and the lower layers to
ensure that the data sent from one system can be properly understood by another. It handles
differences in data representation, encrypts data for secure transmission, and compresses data
for optimized performance.
Key Responsibilities:
Function:
The Application layer serves as the interface between the user and the network. It provides
services and protocols that directly support end-user applications, facilitating network access,
communication, and data exchange.
Key Responsibilities:
A socket is a software abstraction that acts as an endpoint for communication between two
devices over a network. It allows applications to send and receive data across network
connections using protocols like TCP and UDP. In simpler terms, a socket is like a "door"
that connects an application to the network.
Sockets are part of the Application Programming Interface (API) provided by the
operating system to support network communication. They enable developers to build
network applications like web browsers, chat applications, file transfer tools, and more.
Socket is as the point where a local application process attaches to the network. • The
interface defines operations for creating a socket, attaching the socket to the network,
sending/ receiving messages through the socket, and closing the socket.
1. Providing Abstraction:
Developers can interact with the network without dealing with low-level details like
packet construction or routing.
2. Facilitating Communication:
They allow processes to communicate over a network using standard APIs.
3. Supporting Multiple Protocols:
Sockets support both connection-oriented (TCP) and connectionless (UDP)
communication.
4. Flexibility:
Sockets can be used for client-server applications and peer-to-peer communication.
1. Creating a Socket
• domain: Specifies the protocol family (e.g., PF_INET for IPv4, PF_INET6 for IPv6).
o PF INET denotes the Internet family-
o PF UNIX denotes the Unix pipe facility-
o PF PACKET denotes direct access to the network interface
• type: Specifies the communication type (SOCK_STREAM for TCP, SOCK_DGRAM for
UDP).
• protocol: Specifies the protocol (usually 0, meaning the default protocol for the
domain and type).
• On a server machine, the application process performs a passive open—the server says that
it is prepared to accept connections, but it does not actually establish a connection.
• Associates the socket with a specific IP address and port number on the server.
• The bind operation, binds the newly created socket to the specified address.
• Puts the socket in a state where it can accept incoming connection requests.
• Accepts a connection from a client and creates a new socket for this connection.
Once a connection is established, the application processes invoke the following two
operations to send and receive data
int send(int socket, char *message, int msg_len, int flags);
int recv(int socket, char *buffer, int buf_len, int flags);
two common multiplexing methods: Time Division Multiplexing (TDM) and Frequency
Division Multiplexing (FDM).
Multiplexing
Multiplexing is a technique that allows multiple signals or data streams to share the same
physical medium (e.g., a wire, optical fiber) by dividing resources such as time or frequency.
This improves the efficiency of the communication channel.
• TDM divides the available time on a physical link into fixed intervals called time
slots.
• Each data flow is assigned a specific time slot during which it can transmit data.
• Time slots are repeated cyclically, allowing multiple flows to share the same link
sequentially.
• In TDM, the total time available in the channel is divided into several time slots, each
assigned to a different signal or user. These time slots are then transmitted in rapid
succession, one after another. Because the switching happens very quickly, it appears
as though all the signals are transmitted simultaneously.
Advantages:
1. Efficiency: Works best when flows have similar data transmission rates.
2. Simplicity: Straightforward slot scheduling makes implementation easy.
3. No Interference: No signal interference since each flow transmits only in its assigned
slot.
Disadvantages:
1. Fixed Allocation: If a flow doesn’t use its time slot, the slot remains wasted, reducing
efficiency.
2. Latency: Delays occur if a flow has to wait for its next slot, especially with many
flows.
3. Synchronization Required: Requires precise timing to ensure data is transmitted in
the correct slot.
Traditional digital telephone systems use TDM to combine multiple voice calls on the same
physical line. Each call is allocated a specific time slot to transmit its voice data sequentially.
Types of Time Division Multiplexing
1. Synchronous TDM:
• These time slots are pre-assigned and reserved exclusively for a particular sender.
This means even if a device has no data to transmit, its time slot goes unused, which
can lead to inefficiencies and wasted bandwidth
• Each input source is assigned a fixed time slot, even if it has no data to send.
• Time slots are pre-assigned and occur at regular intervals.
• If a device has no data, its slot remains empty, leading to inefficient bandwidth
usage.
• Simple and easy to implement.
• TDM, also known as statistical TDM, is a more flexible and efficient approach where
time slots are not fixed. Instead, they are dynamically assigned to devices based on
their demand for bandwidth. Only those devices that have data to transmit are
allocated a time slot. This leads to better utilization of the available bandwidth, as no
time is wasted on idle devices.
• Time slots are assigned dynamically based on demand.
• Only active devices are given time slots, which improves bandwidth efficiency.
• More complex due to the need for a mechanism to identify the data source.
• Reduces idle time and increases utilization.
Example: Modern digital communication systems that adjust to varying data rates.
Advantages of TDM:
Disadvantages of TDM:
1. Packet Loss
Impact on Reliability:
Packet loss refers to the failure of transmitted packets to reach their intended destination. This
often occurs in IP networks and can be caused by various issues like hardware faults, buffer
overflows in routers, network congestion, signal degradation, or faulty transmission lines. In
applications that require real-time data (like VoIP or live streaming), even a small amount of
packet loss can lead to noticeable glitches such as missing audio or video frames, while in
data-heavy transfers, it can result in incomplete files or corrupted data.
Solution:
2. Network Congestion
Impact on Reliability:
Congestion occurs when too many devices attempt to send data over a network with limited
bandwidth. This results in overloaded routers and switches dropping packets or increasing
delays. In severe cases, it can lead to timeout errors, data retransmissions, or broken
connections. Applications that require consistent throughput, such as cloud storage syncing
or online multiplayer games, are particularly sensitive to congestion.
Solution:
• Congestion Control Algorithms: TCP uses techniques like slow start, congestion
avoidance, and fast recovery to gradually increase the data flow and back off if
congestion is detected.
• Traffic Shaping and Bandwidth Allocation: Techniques like Rate Limiting and
Token Bucket Algorithms can be used to smooth traffic and avoid sudden bursts.
• Load Balancers: Distribute traffic evenly across multiple servers or network paths,
reducing the burden on any single link.
• Network Segmentation: Dividing the network into smaller segments (e.g., using
VLANs) helps localize traffic and reduce the chances of congestion.
3. Transmission Errors
Impact on Reliability:
These errors occur when the data is altered during transmission. The cause can be physical
problems like electrical interference, attenuation over long distances, noise in the
communication channel, or faulty connectors. Bit errors, even in small quantities, can lead to
corrupted files or malfunctioning applications.
Solution:
UDP is a connectionless protocol that does not guarantee the delivery, order, or integrity of
packets. It is lightweight and fast but not suitable for data that must arrive accurately and
completely, like emails, web page requests, or file transfers. In such cases, using UDP
without additional safeguards can lead to lost messages, duplicated data, or out-of-order
packet arrival, making the communication unreliable.
Solution:
• Use TCP when reliability is essential: TCP handles connection establishment, error
recovery, and data ordering, making it ideal for file transfers, emails, and HTTP.
• Application Layer Reliability in UDP:
o Custom ACK/NACK mechanism: Implementing acknowledgment and
retransmission logic at the application level.
o Sequencing: Numbering packets so that out-of-order delivery can be
corrected.
o Timeouts and retries: Re-sending data if no response is received within a set
time.
• Hybrid Protocols: Some protocols like QUIC (used by Google) are designed to
provide the speed of UDP with reliability features similar to TCP.
Module-2
Advantage: Sliding Window provides significantly better efficiency and throughput than
Stop-and-Wait.
• Stop-and-Wait: The sender remains idle while waiting for each ACK, causing
frequent gaps in transmission.
• Sliding Window: The sender can continue sending new frames up to the window
limit, without having to wait for ACKs for each one.
• Stop-and-Wait: Only one frame is handled at a time. If a frame arrives out of order
or is lost, there's no mechanism to handle it efficiently.
• Sliding Window: With a receive window size greater than 1, the receiver can buffer
out-of-order frames until the missing ones arrive.
Advantage: Provides better fault tolerance and supports flexible data handling in unreliable
networks.
• Stop-and-Wait: A lost ACK forces the sender to retransmit the same frame, possibly
leading to duplication and inefficiency.
• Sliding Window: Sequence numbers and cumulative or selective ACKs allow only
the lost or delayed frames to be retransmitted.
Advantage: Enables quicker detection and correction of errors, maintaining better flow and
performance.
Summary Comparison
Stop-and-
Feature Sliding Window Advantage
Wait
Frames in Transit 1 Multiple Higher throughput
More efficient
Idle Time High Low
transmission
Out-of-Order Frame Buffered (if RWS >
Not supported Greater flexibility
Handling 1)
Packet Loss Recovery Basic Intelligent Higher reliability
High-Speed Link
Not suitable Well suited Better scalability
Compatibility
It allows the sender to send multiple frames before needing an acknowledgment, improving
throughput and efficiency.
Components of Sliding Window Protocol
1. Sender Window:
o A buffer at the sender’s side that holds the frames that are sent but not yet
acknowledged.
o Defines how many frames the sender can send before stopping to wait for
ACKs.
2. Receiver Window:
o A buffer at the receiver’s side that defines how many frames it can accept and
process.
o Allows the receiver to accept a fixed number of frames even if they arrive out
of order (in Selective Repeat).
3. Acknowledgments (ACKs):
o Sent by the receiver to inform the sender about successful receipt of frames.
o Can be cumulative (e.g., ACK 3 implies frames 0 to 2 are received).
Key Concepts
• Each frame is assigned a sequence number.
• The window size determines the number of frames that can be sent without
acknowledgment.
• The window “slides” forward as acknowledgments are received, allowing new frames
to be sent.
Go-Back-N:
Selective Repeat:
Example:
• Sent: 0, 1, 2, 3, 4
• Frame 2 is lost.
• Receiver sends ACK 1.
• Sender resends 2, 3, 4.
2. Selective Repeat ARQ
Example:
• Sent: 0, 1, 2, 3
• Frame 2 is lost.
• Receiver sends ACKs for 0, 1, and 3; NACK for 2.
• Sender retransmits only frame 2.
Use Cases
• TCP (Transmission Control Protocol): Uses a version of the sliding window for
flow control and congestion control.
• Reliable file transfers: Ensures that all packets are delivered without duplication and
in order.
• Streaming services and real-time applications: Where efficient and timely delivery
is essential.
Advantages
• Allows efficient use of bandwidth by avoiding stop-and-wait behavior.
• Ensures reliable, ordered delivery.
• In Selective Repeat, reduces retransmissions compared to Go-Back-N.
Disadvantages
• Go-Back-N may lead to unnecessary retransmissions.
• Selective Repeat requires more buffer space and is more complex to implement.
• More complex error handling logic is required for managing sequence numbers and
ACKs.
b) Consider the information sequence: 11010111011 and polynomial(x)= x4 + 1.
a. Generate CRC
b. Find and justify if the information sequence has error in the third bit(left) how the
receiver is going to detect the error.
a) Convert bit 10111011 to signal using NRZ, NRZI, Manchester. compare the
disadvantages of NRZI over Manchester.
a) Line Encoding
1. NRZ (Non-Return-to-Zero)
• Logic:
o '1' → High voltage
o '0' → Low voltage
• Bitstream: 1 0 1 1 1 0 1 1
• Signal:
• So, voltage stays constant during bit duration based on the bit value.
• Logic:
o '1' → Toggle the voltage level
o '0' → Keep the previous level
• Initial level: Assume Low
• Bitstream: 1 0 1 1 1 0 1 1
• Signal (starting from Low):
o 1 → toggle → High
o 0 → same → High
o 1 → toggle → Low
o 1 → toggle → High
o 1 → toggle → Low
o 0 → same → Low
o 1 → toggle → High
o 1 → toggle → Low
• Voltage levels:
Low → High → High → Low → High → Low → Low → High → Low
3. Manchester Encoding
• Logic:
o Each bit has a transition in the middle of the bit duration.
o '1' → Low to High transition
o '0' → High to Low transition
• Bitstream: 1 0 1 1 1 0 1 1
• Signal transitions:
o 1 → Low to High
o 0 → High to Low
o 1 → Low to High
o 1 → Low to High
o 1 → Low to High
o 0 → High to Low
o 1 → Low to High
o 1 → Low to High
• Always has a mid-bit transition, which helps with synchronization.
b) Comparison: NRZI vs. Manchester
b) Identify and discuss any two byte oriented protocol with its header
format.
byte-oriented protocols treat the frame as a collection of bytes (or characters) rather than a stream
of individual bits. These protocols use specific control characters (also known as sentinels) to define
the start and end of a data frame, and are typically easier to implement in software that was
originally designed for character-based terminals. Two commonly discussed byte-oriented protocols
are BISYNC (Binary Synchronous Communication) and PPP (Point-to-Point Protocol).
Definition:
BISYNC uses special characters called "sentinels" to mark where a frame (block of data)
starts and ends. These special characters include:
• SYN – Synchronization
• SOH – Start of header
• STX – Start of text
• ETX – End of text
• DLE – Data Link Escape
Steps:
1. The frame begins with one or more SYN characters to synchronize the receiver.
2. A SOH character is used to start the header section (contains control info like
address).
3. Then comes STX, marking the beginning of actual data.
4. The data (also called Body) is then sent.
5. ETX marks the end of data.
6. A CRC (Cyclic Redundancy Check) is added at the end to detect errors.
Important: If ETX or DLE appears inside the data, they are escaped using the DLE character
(this is called character stuffing).
What it does:
Where it is used:
• SYN – Synchronization
• SOH – Start of header
• Header – Contains control info
• STX – Start of text
• Body – Actual message
• ETX – End of text
• CRC – Error detection field
Definition:
PPP is a byte-oriented protocol used to transmit data between two directly connected
computers (point-to-point). It is most commonly used to carry Internet traffic over dial-up
connections, DSL, and serial links.
How it works:
PPP also uses a sentinel-based framing method, where a special byte called Flag
(01111110) marks the start and end of each frame.
Steps:
If the Flag byte appears inside the data, it is escaped using a process called byte stuffing
(similar to BISYNC).
What it does:
Where it is used:
Summary
Module-3
b) List importance of routing? Provide the steps and protocol which follow in the Distance Vector
algorithm with examples.
b) Explain FIFO and Fair Queuing Disciplines with real world application.
Module-5
1. Principles of Ciphers
The ciphertext is unintelligible to any eavesdropper who does not know the decryption
function.
When an attacker obtains a piece of ciphertext, they may have more information than just the
ciphertext. There are several types of attacks:
• Known Plaintext Attack: Attacker knows both the ciphertext and some part of the
corresponding plaintext.
• Ciphertext-only Attack: Attacker only has access to ciphertext.
• Chosen Plaintext Attack: Attacker can encrypt plaintexts of their choice to study the
resulting ciphertexts.
3. Block Ciphers
A block cipher encrypts fixed-size blocks of plaintext using a key. One common mode of
operation is Cipher Block Chaining (CBC).
Plaintext Block 1 → P1
Plaintext Block 2 → P2
Plaintext Block 3 → P3
Encryption process:
Decryption process:
• In symmetric-key encryption, both sender and receiver share the same key.
• The same key is used for both encryption and decryption.
• The U.S. National Institute of Standards and Technology (NIST) has developed
several symmetric-key ciphers:
• The owner makes the encryption key public, so anyone can encrypt messages for
the owner.
o This key is called the public key.
• For the scheme to work, it must not be possible to deduce the private key from the
public key.
• Any participant can:
o Get the public key
o Send an encrypted message to the owner
o Only the owner has the private key necessary to decrypt it
• RSA (Rivest–Shamir–Adleman):
o Based on the computational difficulty of factoring large numbers.
• ElGamal:
o Based on the discrete logarithm problem.
o Requires keys of at least 1024 bits for security.
The concept of public-key cryptography was introduced in 1976 by Diffie and Hellman.
6. Authenticator
It is used to confirm that a message comes from a legitimate source and was not modified
during transmission.
Conclusion
Cryptographic building blocks like ciphers, encryption modes, keys, and authenticators
form the foundation of network security. They ensure that sensitive data remains
confidential, authentic, and untampered, even when transmitted over insecure channels.
Advantages:
Limitations:
• Stateless by default
• Not secure without HTTPS
• Can be slow for large or interactive applications (HTTP/1.1)
Use Cases:
• What it is: FTP is a protocol used to transfer files between a client and a server on a
computer network. It enables uploading, downloading, and managing files remotely.
• Why it is used: FTP is helpful for website developers, system administrators, and
users who need to transfer large or multiple files across networks reliably and
efficiently.
• How it works: FTP uses two separate channels:
o Control channel (Port 21): Handles the commands and responses between
client and server.
o Data channel (Port 20): Transfers the actual file content.
o It can operate in active or passive mode, depending on how connections are
established for data transfer.
o Users authenticate using a username and password, or it can be used in
anonymous mode.
• Other details:
o File operations supported include upload, download, rename, delete, etc.
o Not secure by default. For secure transfers, variants like FTPS (FTP Secure)
or SFTP (SSH File Transfer Protocol) are used.
Advantages:
Limitations:
Use Cases:
• Website deployment
• Backup systems
• File sharing between organizations
• What it is: SMTP is an email protocol used to send messages from an email client to
a mail server or between mail servers.
• Why it is used: It is the standard protocol for sending emails across the internet.
Without SMTP, email delivery from one person to another would not be possible.
• How it works: When a user sends an email, the SMTP client connects to the SMTP
server using port 25 or 587.
o The sender’s email client sends the email message to the server.
o The server then routes the email to the recipient’s server (using DNS to
resolve the domain).
o SMTP does not handle receiving or reading emails; for that, IMAP or
POP3 is used.
• Other details:
o Ports: 25 (default), 587 (submission), 465 (for SMTPS - secure).
o SMTP uses a push model, which means it actively sends data to the server.
o SMTP headers carry metadata like sender, recipient, subject, and date.
Advantages:
Limitations:
Use Cases:
• What it is: DNS is a protocol that translates human-readable domain names (like
www.google.com) into IP addresses (like 142.250.77.78) which computers use to
identify each other.
• Why it is used: Users find it easier to remember domain names than numerical IP
addresses. DNS makes internet usage more user-friendly and scalable.
• How it works:
o When a user types a URL in a browser, a DNS query is sent to a DNS
resolver.
o The resolver checks its cache or queries other DNS servers (root, TLD, and
authoritative servers) until it gets the IP address.
o The resolved IP is then returned to the browser to establish a connection to the
destination server.
o DNS can perform recursive or iterative queries depending on the type of
server interaction.
• Other details:
o Port: 53 (UDP for normal queries, TCP for large responses).
o DNS records include:
▪ A record (IPv4 address),
▪ AAAA record (IPv6 address),
▪ MX (mail exchange),
▪ CNAME (canonical name), etc.
▪ Security extension: DNSSEC adds integrity and authentication to
DNS
Advantages:
Limitations:
Use Cases:
• Web browsing
• Email delivery
• CDN redirection
• Load balancing
Key predistribution refers to the process of establishing and distributing cryptographic keys
to entities before secure communication can take place. This is a fundamental step in
enabling secure systems, especially in environments where secure key exchange over a
network is not initially possible.
In public key cryptography, each user generates a public/private key pair. The private key is
kept secret, and the public key is shared. However, simply making the public key available is
not enough—others must be confident that the key truly belongs to the claimed owner.
Key Concepts:
• Anyone can generate a public/private key pair, but proving the identity linked to
the key is difficult.
• A user can publish their public key on a website or send it over email, but this can be
intercepted or replaced in a man-in-the-middle attack.
• The solution is to use a Public Key Infrastructure (PKI), which allows users to
trust public keys by verifying them with Certificate Authorities (CAs).
Challenges:
• Authentication of public keys: An adversary can forge a key and claim it belongs to
someone else.
• Secure distribution: Public keys must be distributed in a verifiable way to avoid
impersonation attacks.
How It Works:
• The user sends their public key to a Certificate Authority (CA) along with identity
verification.
• The CA verifies the user’s identity and creates a digital certificate.
• The digital certificate contains:
o User’s identity (e.g., name, domain)
o Public key
o Name of the issuing CA
o Digital signature of the CA
o Algorithm used
o Expiration date
• The certificate is in X.509 format and is digitally signed by the CA.
• Anyone who trusts the CA can now trust the public key in the certificate.\
Models of Trust:
Certificate Revocation:
Symmetric key cryptography uses the same key for both encryption and decryption. The
challenge in this system is securely sharing the same key with the other party. This is
especially difficult when the number of users increases.
Challenges:
• Scalability: For N users, each pair requires a unique key → N(N-1)/2 keys.
• Confidentiality: Keys must be distributed securely and kept secret.
• Shares a unique secret key with each user (N-1 keys total).
• When Alice wants to communicate with Bob, the KDC:
o Authenticates both users
o Generates a temporary session key
o Sends the session key encrypted using the pre-shared keys
• Alice and Bob then communicate using the session key, without involving the KDC
further.
How It Works:
1. User A requests a session key from the KDC to communicate with User B.
2. KDC generates a session key and sends:
o The session key encrypted with A’s key.
o The same session key encrypted with B’s key (A forwards this to B).
3. A and B now both have the shared session key and can communicate securely.
Advantages:
• Reduces the number of stored keys from N(N-1)/2 to just N-1 (each user only needs a
single key with the KDC).
• Provides centralized control and better scalability.
Example:
Summary Comparison
Feature Public Key Predistribution Symmetric Key Predistribution
Symmetric (Same key for both
Key Type Asymmetric (Public/Private)
users)
Number of Keys for N
N N(N-1)/2
Users
KDC (Centralized key
Trust Establishment PKI (CA, Certificates)
distribution)
Scalability High (fewer keys) Low (many keys required)
Security Concerns Authenticating public keys Securing the key exchange
Revocation Through CRL, expiration Not directly revocable
SSL/TLS, HTTPS (X.509,
Real-world Systems Kerberos (KDC-based)
CA)
Infrastructure service protocols support the internal operation of the Internet. They are not typically
used directly by end-users, but other applications and administrators depend heavily on them for
tasks such as name resolution, device monitoring, and network troubleshooting. Two of the most
important infrastructure protocols are the Domain Name System (DNS) and the Simple Network
Management Protocol (SNMP).
The Domain Name System (DNS) is an essential infrastructure protocol that maps human-
readable domain names (such as www.google.com) to their corresponding IP addresses (such
as 142.250.182.132). This system allows users to access websites and services using easy-
to-remember names instead of numerical IP addresses required by computers.
How it Works
The DNS name resolution involves a series of queries passed from one server to another in a
hierarchical structure. Here’s the step-by-step process:
1. Initial Query:
The client first sends a query to its local DNS server. If it doesn’t have the answer
cached, the server begins querying other name servers.
2. Root Server:
The local DNS server sends the query to a root name server, which responds with a
referral to a Top-Level Domain (TLD) server (e.g., .edu for educational domains).
3. TLD Server:
The TLD server returns the address of the authoritative name server for the next
domain level (e.g., princeton.edu).
4. Authoritative Server:
This process continues down the hierarchy until the final authoritative name server for
the full domain (e.g., cs.princeton.edu) provides the IP address for
penguins.cs.princeton.edu.
5. Caching:
Intermediate responses are cached at each level (especially at the local DNS server),
improving efficiency for future queries.
Example
Key Features
Other Details
Simple Network Management Protocol (SNMP) is used to monitor, manage, and configure
network devices such as routers, switches, servers, firewalls, and printers. It provides a
standardized framework for collecting information and managing network performance
remotely.
How it Works
1. Each network device runs an SNMP Agent, which collects and stores management
data.
2. A central SNMP Manager sends requests to retrieve or modify data from agents.
3. The agent stores data in a database called the Management Information Base (MIB).
4. The manager can issue GET, SET, or WALK commands to communicate with the
agent.
5. Devices may also send unsolicited alerts (called Traps) to the manager when specific
events occur.
Example
Key Features
Other Details
Conclusion