GPU Mining

rig

What is Cryptocurrency and How does it work?

Cryptocurrency is digital money you can send, receive, or hold online without needing a bank. It’s powered by blockchain, a secure, public ledger that tracks transactions using nodes (computers) around the world that help verify each transaction. Unlike regular money, cryptocurrencies like Bitcoin and Ethereum are decentralized, managed by this network of nodes instead of a central authority.

Cryptocurrency mining, using a Computer Hardware to solve complex problems, runs on proof of work census model(POW). Miners earn rewards for validating transactions and creating new blocks in the blockchain—yielding cryptocurrency that can be converted into fiat money (traditional currency). However, these yield rewards fluctuate based on factors like network transaction fees, the difficulty level of mining, and sender’s bids to prioritize their transactions. Mining pools help balance these rewards by allowing participants to pool resources and share earnings proportionally, making it easier to earn consistent returns compared to solo mining. Some networks are also shifting to Proof of Stake (PoS), which involves staking coins rather than computational power, aiming for a more energy-efficient way to secure the network. Also I was using Wireshark to track mining activity out of curiosity.

Example: Sending 1 ETH from Alice to Bob

Total Fee Calculation:

Total Fee = gwei * (gas + tip(optional/priority))

Numbers Used: Note: 1 gwei = 0.000000001 ETH

100 gwei * 21,000 gas = 2.1 million gwei

Converting gwei to ETH: 2.1 million gwei = 0.0021 ETH

Total Cost:

Alice needs to send 1.0021 ETH in total for Bob to receive exactly 1 ETH.

In Dollars (assuming ETH is $2000):

0.0021 ETH * $2000 = $4.20 fee

Summary:

Hardware/Software Requirements:

Note:

When estimating the power supply needed for a mining rig, a good rule of thumb is to take the GPU's power consumption (available on sites like whattomine.com) and add about 150W for other components (CPU, motherboard, fans, etc.).

GPUs can be overclocked to lower power consumption. It’s better to calculate the full TDP of the GPU to account for any potential spikes in power usage. This ensures the software can adjust the overclock safely.

If the GPU is modded properly, it may consume only about 90–100W per GPU instead of the standard 120W. While this results in minor energy savings, it’s best practice to calculate based on the maximum TDP. Additionally, note that each algorithm varies in power intensity, with some being more demanding than others, which can also affect the GPU's lifespan.

For example, a rig with six 1660 Ti GPUs (TDP = 120W each) requires approximately 720W. To ensure sufficient capacity, aim for a 1000W PSU.

Since your PSU will ideally run 24/7, follow the 80% rule: avoid using more than 80% of the PSU’s capacity for better efficiency and longevity. Choose a PSU rated Gold or higher (Gold, Platinum, or Titanium) for greater energy efficiency and reliability. Additionally, ensure it has multiple VGA ports for powering GPUs.

Many miners consider EVGA G2 PSUs a solid standard. For larger rigs, using multiple smaller PSUs linked together can offer more flexibility and reliability.

If noise is not an issue, you might consider a server PSU instead of a standard computer PSU. Server PSUs are designed for continuous 24/7 operation and are often more cost-effective. Keep in mind that the power output of a server PSU can vary depending on whether it’s connected to a 120V or 240V outlet.

Ensure the breakout board includes enough PCIe connectors for powering GPUs. Note that VGA ports (video output) are not typically part of breakout boards. Trusted vendors like Parallel Miner offer options such as:

Select a breakout board that matches your rig’s power requirements to ensure smooth operation.

connection

Step by Step:

Troubleshooting Tips for Mining:

System Check: Run the rig for at least 20 minutes before leaving it unattended to ensure smooth operation. Confirm that power consumption of the rig is within the 80% capacity rule and that wall outlets are in good condition.

For Windows Users (Not Recommended):

While Windows can be used, it requires additional setup to run smoothly 24/7. HiveOS or SimpleMining are more efficient for scaling operations despite a small fee, offering advanced mining features not found in Windows.

Maintenance:

Deployment:

deployment deployment1 deployment2 deployment2

Mining pool:

Pick the closest region to avoid latency and reliability

Servers

Echo packets to the destination:

tracert

Finding out IP address through DNS:

nslookup

asia-erg.2miners.com = 162.125.32.5

The fees and the network of in different pools:

1 2

Use case Diagram:

3 4

Network traffic:

These are the protocols detected. Communication happening between the pool and the computer. 141.95.124.98 is one of the pool’s ipv4 addresses and 192.168.1.132 is the computer’s ip.

Network traffic Network traffic

Capture file properties:

On this screencap, it provides a full breakdown of what exactly was used, down to the version of Wireshark, and a log of our hardware and OS used. The link type and packet size are shown, but the amount of dropped packets remain unknown. 100% of the packets were captured and displayed and nothing was shown to be marked.

Capture file properties

Protocol hierarchy:

Protocol hierarchy

Conversations:

Conversations
  • IPv6 percent packets are relatively small, with DHCPv6 being shown, we know that there is at least assigned configuration data. These packets are being transmitted and routed upstream or downstream a server to an IPv6 related address. In short, it’s a method to assign IPv6 addresses automatically to network clients.
  • IPv4 is the protocol network that is being utilized the most and we can see that UDP and TCP are split
  • UDP is streaming, TCP is not and traffic is not streaming because of the additional time required/slow speeds when sending/receiving acknowledgement packets.
  • The User Datagram Protocol assists with communication and helps provide low latency and packet loss connections between applications and the internet. UDP communication protocol is important for speeding up time-dependent transmission’s like DNS lookups. This would help when distributing workload and connecting to mining pools as a client or connecting in a peer to peer network. UDP is faster than TCP but can also be less reliable as it skips over the handshake process when two computers are first establishing a connection.
  • Endpoints:

    An end point in Wireshark is one of the two devices engaged in a network communication. The IP address and port number assigned to each end point uniquely identify the device on the network. When examining a conversation in Wireshark, the end points are shown at the top of the packet list, along with protocol details and the number of packets exchanged. This is useful for monitoring network traffic since it allows you to rapidly identify the devices engaged in a discussion and observe how they communicate with one another.

    Endpoints

    Evidence of security:

    Evidence Evidence

    Scenario:

    As we can see the communication between the miner and the pool is encrypted.

    Pool

    Summary:

    In conclusion, this experience taught me far more than traditional learning from an instruction book. I had to search various resources, like Bitcointalk, Reddit, YouTube, and Discord, to solve issues I encountered over the years.

    This was my first project scaling up from a single rig to six rigs at its peak in my garage, which eventually required a dedicated space for the mining setup. I hadn’t anticipated needing to do additional hands-on work, like building a rig frame from wood, installing an exhaust fan in the garage, setting up multiple electrical outlets, and modifying the garage door to improve airflow by bringing in outside air. I also had to learn the basics of data center HVAC principles to manage temperature and airflow effectively in this unconventional environment.

    Also curious how it runs around the network through the mining pools and the blockchain. I was able to identify the network communication happening throughout the capture with the use of Wireshark. With the help of Wireshark, we were to find the protocols, conversation, endpoints, and lastly the security aspect making sure the communication is encrypted or unencrypted must be identified.

    Resources and Tools:

  • NiceHash - Rent or buy hash power for mining. (Not recommended)
  • WhatToMine - Tool for calculating mining profitability.
  • Power Supply Calculator - Estimate PSU requirements. (follow the 80% rule)