NetWare Protocols. Background CHAPTER

Similar documents
NetWare Protocols. Background. Technology Basics CHAPTER

Troubleshooting Novell IPX

Chapter 7. Local Area Network Communications Protocols

AppleTalk. Chapter Goals. Introduction CHAPTER

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

Vanguard Managed Solutions

OSI and TCP/IP Models

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

Configuring Novell IPX

Novell. NetWare 6. FILTER CONFIGURATION

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Data Communication and Network. Introducing Networks

IP Protocols. ALTTC/Oct

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02

Network Protocols. Terms you ll need to understand: Techniques you ll need to master:

DECnet. Background. Digital Network Architecture (DNA) CHAPTER

EE 610 Part 2: Encapsulation and network utilities

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

Network Architecture Models

Chapter 20 Network Layer: Internet Protocol 20.1

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

ITEC 3800 Data Communication and Network. Introducing Networks

Online Documentation: To access the online documentation for this and other Novell products, and to get updates, see

DECnet. Background CHAPTER

AIX Version 4.3 Novell Network Transport Services 4.1 for AIX SC

NetWare Link-Services Protocol

Novell. NetWare 6. TCP/IP ADMINISTRATION GUIDE

XNS Commands. Not all Cisco access servers support XNS. For more information, refer to the release notes for the release you are running. Note.

Review of Important Networking Concepts

Chapter 6: Network Communications and Protocols

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

TCP/IP THE TCP/IP ARCHITECTURE

Networking interview questions

HP MSR Router Series. IPX Configuration Guide(V5) Part number: Software version: CMW520-R2513 Document version: 6PW

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

1: Review Of Semester Provide an overview of encapsulation.

DECnet. Chapter Goals. Introduction CHAPTER

Configuring Banyan VINES

CCNA MCQS with Answers Set-1

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Mixed-Media Bridging

SEMESTER 1 Chapter 5 OSI Network Layer V What services does the network layer provide?

Chapter 5 OSI Network Layer

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.

Lab - Using Wireshark to Examine a UDP DNS Capture

Defining Networks with the OSI Model. Module 2

Lab - Using Wireshark to Examine a UDP DNS Capture

Table of Contents. Cisco TCP/IP

Network Review TEJ4M. SBrace

Introduction to Protocol Analysis

TCP/IP and the OSI Model

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

Contents. Introduction to Networking. Preface...i. Introduction... xix

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model

Vorlesung Kommunikationsnetze

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Online Documentation: To access the online documentation for this and other Novell products, and to get updates, see

Introduction to LAN Protocols

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

Bridging and Switching Basics

Internet Control Message Protocol (ICMP)

ACL Rule Configuration on the WAP371

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Introduction to Internetworking

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

TSIN02 - Internetworking

Internet Protocol (IP)

ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI

ICS 351: Networking Protocols

Open Shortest Path First (OSPF)

Chapter 09 Network Protocols

Question 7: What are Asynchronous links?

OSI Network Layer. Chapter 5

Copyleft 2005, Binnur Kurt. Objectives

Protocol Characteristics Overview

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols

Lecture (02) Network Protocols and Standards

Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices

CSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

copyright 2002 by Black Box Corporation

TCP/IP Protocol Suite and IP Addressing

Chapter 12 Network Protocols

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

vines access-group vines access-group access-list-number no vines access-group access-list-number Syntax Description

Cisco Cisco Certified Network Associate (CCNA)

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

Module 7 Internet And Internet Protocol Suite

CS 457 Networking and the Internet. Problems. Mechanisms 9/21/16. Fall 2016 Indrajit Ray

System Programming. Introduction to computer networks

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

Transcription:

CHAPTER 31 NetWare Protocols Background NetWare is a network operating system (NOS) that provides transparent remote file access and numerous other distributed network services, including printer sharing and support for various applications such as electronic mail transfer and database access. NetWare specifies the upper five layers of the OSI reference model and as such, runs on virtually any media-access protocol (Layer 2). Additionally, NetWare runs on virtually any kind of computer system, from PCs to mainframes. This chapter summarizes the principal communications protocols that support NetWare. NetWare was developed by Novell, Inc., and introduced in the early 1980swas It was derived from Xerox Network Systems (XNS), which was created by Xerox Corporation in the late 1970s, and is based on a client-server architecture. Clients (sometimes called workstations) request services, such as file and printer access, from servers. NetWare s client-server architecture supports remote access that is transparent to users through remote procedure calls. A remote procedure call begins when the local computer program running on the client sends a procedure call to the remote server. The server then executes the remote procedure call and returns the requested information to the local client. Figure 31-1 illustrates the NetWare protocol suite, the media-access protocols on which NetWare runs, and the relationship between the NetWare protocols and the OSI reference model. This chapter addresses the elements and operations of these protocol components. NetWare Protocols 31-1

NetWare Media Access Figure 31-1 The NetWare protocol suite maps to all OSI layers. OSI reference model NetWare 7 6 5 Application Presentation Session Applications NetBIOS emulator NetWare shell (client) NetWare Core Protocol (NCP) RPCbased application RPC LU 6.2 support 4 Transport SPX 3 Network 2 1 Link Physical Ethernet/ IEEE 802.3 Token Ring/ IEEE 802.5 FDDI ARCnet PPP S1346a NetWare Media Access The NetWare suite of protocols supports several media-access (Layer 2) protocols, including Ethernet/IEEE 802.3, Token Ring/IEEE 802.5, Fiber Distributed Data Interface (FDDI), and Point-to-Point Protocol (PPP). Figure 31-2 highlights NetWare s breadth of media-access support. Figure 31-2 NetWare supports most common media-access protocols. NetWare Nodes NetWare Nodes NetWare Nodes Ethernet Token Ring FDDI 24149 Internetwork Packet Exchange () Overview Internetwork Packet Exchange () is the original NetWare network-layer (Layer 3) protocol used to route packets through an internetwork. is a connectionless datagram-based network protocol and, as such, is similar to the Internet Protocol found in TCP/IP networks. 31-2 Internetworking Technology Overview, June 1999

Encapsulation Types uses the services of a dynamic distance vector-routing protocol (Routing Information Protocol [RIP]) or a link-state routing protocol (NetWare Link-State Protocol [NLSP]). RIP sends routing updates every 60 seconds. To make best-path routing decisions, RIP uses a tick as the metric, which in principle is the delay expected when using a particular length. One tick is 1/18th of a second. In the case of two paths with an equal tick count, RIP uses the hop count as a tie breaker. (A hop is the passage of a packet through a router.) s RIP is not compatible with RIP implementations used in other networking environments. As with other network addresses, Novell network addresses must be unique. These addresses are represented in hexadecimal format and consist of two parts: a network number and a node number. The network number, which is assigned by the network administrator, is 32 bits long. The node number, which usually is the Media Access Control (MAC) address for one of the system s network interface cards (NICs), is 48 bits long. s use of a MAC address for the node number enables the system to send nodes to predict what MAC address to use on a data link. (In contrast, because the host portion of an IP network address has no correlation to the MAC address, IP nodes must use the Address-Resolution Protocol [ARP] to determine the destination MAC address.) Encapsulation Types Novell NetWare supports multiple encapsulation schemes on a single router interface, provided that multiple network numbers are assigned. Encapsulation is the process of packaging upper-layer protocol information and data into a frame. NetWare supports the following four encapsulation schemes: Novell Proprietary Also called 802.3 raw or Novell Ethernet_802.3, Novell proprietary serves as the initial encapsulation scheme Novell uses. It includes an Institute of Electrical and Electronic Engineers (IEEE) 802.3 Length field but not an IEEE 802.2 (LLC) header. The header immediately follows the 802.3 Length field. 802.3 Also called Novell_802.2, 802.3 is the standard IEEE 802.3 frame format. Ethernet Version 2 Also called Ethernet-II or ARPA, Ethernet Version 2 includes the standard Ethernet Version 2 header, which consists of Destination and Source Address fields followed by an EtherType field. SNAP Also called Ethernet_SNAP, SNAP extends the IEEE 802.2 header by providing a type code similar to that defined in the Ethernet Version 2 specification. Figure 31-3 illustrates these encapsulation types. NetWare Protocols 31-3

Service Advertisement Protocol (SAP) Figure 31-3 Four encapsulation types exist. Ethernet_802.3 802.3 Ethernet_802.2 802.3 802.2 LLC Ethernet_II Ethernet Ethernet_SNAP 802.3 802.2 LLC SNAP 24150 Service Advertisement Protocol (SAP) The Service Advertisement Protocol (SAP) is an protocol through which network resources, such as file servers and print servers, advertise their addresses and the services they provide. Advertisements are sent via SAP every 60 seconds. Services are identified by a hexadecimal number, which is called a SAP identifier (for example, 4 = file server, and 7 = print server). A SAP operation begins when routers listen to SAPs and build a table of all known services along with their network address. Routers then send their SAP table every 60 seconds. Novell clients can send a query requesting a particular file, printer, or gateway service. The local router responds to the query with the network address of the requested service, and the client then can contact the service directly. SAP is pervasive in current networks based on NetWare 3.11 and earlier but is utilized less frequently in NetWare 4.0 networks because workstations can locate services by consulting a NetWare Directory Services (NDS) Server. SAP, however, still is required in NetWare 4.0 networks for workstations when they boot up to locate an NDS server. SAP Filters Using the SAP identifier, SAP advertisements can be filtered on a router s input or output port, or from a specific router. SAP filters conserve network bandwidth and are especially useful in large Novell installations where hundreds of SAP services exist. 31-4 Internetworking Technology Overview, June 1999

NetWare Transport Layer In general, the use of SAP filters is recommended for services that are not required for a particular network. Remote sites, for example, probably do not need to receive SAP advertising print services located at a central site. A SAP output filter at the central site (preferred) or a SAP input filter that uses the SAP identifier for a print server at the remote site prevents the router from including print services in SAP updates. NetWare Transport Layer The Sequenced Packet Exchange (SPX) protocol is the most common NetWare transport protocol at Layer 4 of the OSI model. SPX resides atop in the NetWare Protocol Suite. SPX is a reliable, connection-oriented protocol that supplements the datagram service provided by the, NetWare s network-layer (Layer 3) protocol. SPX was derived from the Xerox Networking Systems (XNS) Sequenced Packet Protocol (SPP). Novell also offers Internet Protocol support in the form of the User Datagram Protocol (UDP). datagrams are encapsulated inside UDP/IP headers for transport across an IP-based internetwork. NetWare Upper-Layer Protocols and Services NetWare supports a wide variety of upper-layer protocols, including NetWare Shell, NetWare Remote Procedure Call, NetWare Core Protocol, and Network Basic Input/Output System. The NetWare shell runs clients (often called workstations in the NetWare community) and intercepts application input/output (I/O) calls to determine whether they require network access for completion. If the application request requires network access, the NetWare shell packages the request and sends it to lower-layer software for processing and network transmission. If the application request does not require network access, the request is passed to the local I/O resources. Client applications are unaware of any network access required for completion of application calls. NetWare Remote Procedure Call (NetWare RPC) is another more general redirection mechanism similar in concept to the NetWare shell supported by Novell. NetWare Core Protocol (NCP) is a series of server routines designed to satisfy application requests coming from, for example, the NetWare shell. The services provided by NCP include file access, printer access, name management, accounting, security, and file synchronization. NetWare also supports the Network Basic Input/Output System (NetBIOS) session-layer interface specification from IBM and Microsoft. NetWare s NetBIOS emulation software allows programs written to the industry-standard NetBIOS interface to run within NetWare system. NetWare Application-Layer Services NetWare application-layer services include NetWare message-handling service (NetWare MHS), Btrieve, NetWare loadable modules (NLMs), and IBM Logical Unit (LU) 6.2 network-addressable units (NAUs). NetWare MHS is a message-delivery system that provides electronic mail transport. Btrieve is Novell s implementation of the binary tree (btree) database-access mechanism. NLMs are add-on modules that attach into a NetWare system. NLMs currently available from Novell and third parties include alternate protocol stacks, communication services, and database services. In terms of IBM LU 6.2 NAU support, NetWare allows peer-to-peer connectivity and information exchange across IBM networks. NetWare packets are encapsulated within LU 6.2 packets for transit across an IBM network. NetWare Protocols 31-5

Packet Format Packet Format The packet is the basic unit of Novell NetWare internetworking. Figure 31-4 illustrates the format of a NetWare packet. Figure 31-4 A NetWare packet consists of eleven fields. Checksum Packet length Transport control Packet type Destination network Destination node Destination socket Source network Source node Source socket Upper-layer data S1347 The following descriptions summarize the packet fields illustrated in Figure 31-4: Checksum Indicates that the checksum is not used when this 16-bit field is set to 1s (FFFF). Packet Length Specifies the length, in bytes, of a complete datagram. packets can be any length, up to the maximum media transmission unit (MTU) size (no packet fragmentation allowed). Transport Control Indicates the number of routers through which the packet has passed. When this value reaches 16, the packet is discarded under the assumption that a routing loop might be occurring. Packet Type Specifies which upper-layer protocol should receive the packet s information. It has two common values: 5: Specifies Sequenced Packet-Exchange (SPX) 17: Specifies NetWare Core Protocol (NCP) Destination Network, Destination Node, and Destination Socket Specify destination information. Source Network, Source Node, and Source Socket Specify source information. Upper-Layer Data Contains information for upper-layer processes. 31-6 Internetworking Technology Overview, June 1999