NetWare is a network operating system (NOS) and related support services environment created by Novell.
|
It was introduced to the market in the early 1980s.
|
NetWare's networking technology was derived from Xerox Networks Systems (XNS), a networking system developed by the Xerox Corporation in the late 1970s.
|
Today, NetWare is used worldwide.
|
As internetwork connections increase, NetWare and its supporting protocols often operate on the same physical channel as other popular protocols such as

 TCP/IP
|
 DECnet
|
 AppleTalk
|
As a NOS environment, NetWare provides support for

 file sharing
|
 printer sharing
|
 electronic mail transfer
|
 database access
|
NetWare is based on a client-server architecture.
|
Clients or workstations request services such as file and printer access from servers.
|
NetWare clients and servers can be represented by virtually any kind of computer system, from PCs to mainframes.
|
In the client-server system remote network access is transparent to the user.
|
This is accomplished through remote procedure calls.
|
A server receives a procedure call from a local computer program running on a client or workstation.
|
The server then executes the remote procedure call and returns the requested information to the local computer client.
@@
Novell's Internetwork Packet Exchange (IPX) is a proprietary protocol derived from the Xerox Network Systems (XNS) protocol.
|
Novell Internetwork Packet Exchange (IPX) - functioning at the heart of the NetWare protocol suite - is the original network layer protocol used to route packets through an internetwork.
|
IPX is a connectionless datagram-based network protocol and as such is similar to the Internet Protocol (IP) found in Transmission Control Protocols (TCP/IP) networks.
|
The Novell/IPX protocol stack corresponds loosely to the OSI model but does not map exactly onto it.
|
NetWare protocol designers wanted to provide a high level of functionality rather than adhering strictly to existing standards.
|
As a NOS environment, NetWare specifies the upper five layers of the OSI reference model.
|
The Novell/NetWare protocols can be grouped as shown.
|
The NetWare Core Protocol (NCP) corresponds roughly to the OSI application, presentation, and session layers.
|
The Network Basic Input/Output System (NetBIOS) emulator corresponds roughly to the session and transport layers, although it is usually known as a session layer interface specification.
|
Servers and routers use the Service Advertisement Protocol (SAP) to advertise their services and network addresses.
|
So SAP corresponds to the OSI transport and network layers as well as the upper layers.
|
Sequenced Packet Exchange (SPX) is a transport layer protocol.
|
Internet Packet Exchange (IPX), Routing Information Protocol (RIP) and Novell Link Services Protocol (NLSP) are network layer protocols.
|
At the lower layer are the media access control (MAC) protocols on which Novell IPX can run.
|
These are

 Ethernet/IEEE 802.3
|
 Token Ring/IEEE 802.5
|
 Fiber Distributed Data
  Interface (FDDI)
|
 ARCnet
|
 Point-to-Point protocol (PPP)
|
The higher level protocols such as NetBIOS, SAP, NCP, SPX, NLSP, and RIP rely on the MAC protocols and IPX to handle lower level communications, for example, node addressing.
@@
Novell IPX is a network layer/Transport layer protocol.
|
It defines internetwork and internode addresses, and routes packets in an IPX internetwork.
|
To communicate with devices on different networks, IPX routes the information through intermediate networks.
|
IPX uses the physical device address of the underlying hardware and its socket, that is, a service address, to address the packet to its final node destination.
|
Novell IPX is also a datagram connectionless protocol.
|
A datagram is a logical grouping of information sent as a network layer unit over a transmission medium without prior establishment of a virtual circuit.
|
So when processes running on two separate nodes use IPX to communicate, no connection is established between the nodes before data is transmitted.
|
Because it is a connectionless protocol, IPX does not require an acknowledgment for each packet sent.
|
IPX uses the services of the dynamic distance vector routing protocol, Routing Information Protocol (RIP), or the link state routing protocol, NetWare Link Services Protocol (NLSP).
|
RIP is used by Novell IPX to route packets in an internetwork.
|
RIP uses IPX and the Media Access Control (MAC) protocols for its transport.
|
The IPX RIP metrics used for making decisions on the optimal path are

 ticks (a time measure)
|
 hop count
|
The tick metric, in principle is the delay expected when using a particular path length.
|
One tick is 1/18th of a second.
|
In the case of two paths with an equal tick count, IPX RIP uses the hop count, the passage of a packet through a router, as the tie breaker.
|
Routing updates are sent at 60-second intervals.
|
The high frequency of updates can cause excessive overhead traffic on some internetworks.
|
For more on IPX RIP and NLSP see the CBT Systems course ^RImplementing IPX RIP and NLSP on Cisco Routers^r.
|
Novell IPX uses the proprietary Service Advertisement Protocol (SAP) to advertise network services.
|
SAP allows nodes such as file servers or print servers to advertise both their addresses and the services they provide.
|
Servers running SAP identify themselves and advertise their services by broadcasting a service identification packet.
|
Advertisements are sent via SAP every 60 seconds.
|
Services are identified by a hexadecimal number which is called a SAP identifier, for example 4=file server and 7=printer server.
|
Routers gather this information and share it with other routers.
|
Workstations on the network can utilize SAP to determine which services are available on the network.
|
This information is obtained by using a service query packet.
|
Workstations can reference information in the IPX header to find a service address with which to initiate a session.
|
Novell has introduced a link-state protocol called Novell Link Services Protocol (NLSP) intended to replace RIP and SAP.
|
NLSP was derived from ISO's Intermediate System-to-Intermediate System (IS-IS) protocol.
|
NLSP routers exchange information to maintain a logical map of the internetwork.
|
This information includes

 connectivity states
|
 path costs
|
 maximum transmission unit size
|
 media types
@@
The Sequenced Packet Exchange (SPX) is a reliable connection-oriented protocol that supplements the datagram service provided by IPX, NetWare's network layer protocol.
|
Under a connection-oriented protocol, data transfer must occur over a virtual circuit.
|
So SPX supplements the datagram service provided by network layer protocols and provides the packet verification lacking in IPX routing.
@@
The upper layer NetWare Core Protocol (NCP) is used by IPX to provide client-to-server connections and applications.
|
Services provided by NCP include

 file access
|
 printer access
|
 name management
|
 accounting
|
 security
|
 file synchronization
|
As well as having its own protocol suite, Novell IPX supports a number of other upper layer protocols and applications.
|
For example Novell IPX supports the Network Basic Input/Output System (NetBIOS) session-layer interface specification from IBM and Microsoft.
|
Novell's NetBIOS emulation software allows programs written to the industry-standard NetBIOS interface to run within the NetWare system.
@@
Novell IPX can run on any of the following lower layer media access control (MAC) protocols

 Ethernet/IEEE 802.3
|
 Token Ring/IEEE 802.5
|
 Fiber Distributed Data
  Interface (FDDI)
|
 ARCnet
|
 Point-to-Point Protocol (PPP)
|
Ethernet and IEEE 802.3 specify similar technologies.
|
They are both carrier-sense multiple access/collision detection (CSMA/CD) LANs.
|
CSMA/CD stations are those that can detect transmission collisions occurring when two stations simultaneously transmit over a network.

So CSMA/CD stations know when data should be retransmitted.
|
Today the term Ethernet is applied to all CSMA/CD LANs, including IEEE 802.3, that generally conform to Ethernet specifications.
|
Ethernet itself provides services which correspond to the physical and data-link layers of the OSI model.
|
The data-link layer in the OSI model corresponds to two sublayers, logical link control (LLC) and media access control (MAC), in IEEE architecture.
|
IEEE 802.3 specifies the physical layer and the media-access portion of the OSI data-link layer.
|
However it does not define a logical link control protocol.
|
So there are very slight differences between Ethernet and IEEE 802.3 in relation to the OSI model as modified by IEEE.
|
The term Token Ring is generally used to refer to IBM's Token Ring network and IEEE 802.5 networks.
|
The associated protocols use the token passing media access method.
|
A small frame called a token is moved around the network.
|
Token Ring specifies the physical layer and the MAC, but not the LLC section of the data link layer.
|
FDDI is similar to Token Ring/IEEE 802.5 as it also uses the token passing media access method.
|
It is based on the structure of two rings, one to move data and one to perform backup and other services.
|
The FDDI ANSI standard consists of four parts.
|
The Physical Media Dependent (PMD) and the Physical layer (PHY) correspond to the physical layer of the OSI model.
|
The Media Access Control (MAC) corresponds to the lower half of the OSI data-link layer.
|
The fourth part is Station Management which fixes faults on the ring, gets data on and off the ring, and generates data.
|
Attached Resource Computer Network (ARCnet) is a simple network system that supports twisted pair, coaxial, and fiber-optic cable types.
|
It combines the token-passing element of Token Ring with the bus and star topologies.
|
ARCnet functions map evenly to the physical and data-link layers of the OSI model.
|
The Point-to-Point Protocol (PPP) also maps exactly to the data-link and physical layers of the OSI model.
|
PPP provides router-to-router and host-to-host connections.
|
At the data link layer it uses the Logical Link Control protocol to manage point-to-point connections.
|
It also uses the High Level Data Link (HLDL) protocol as the basis of encapsulating datagrams over point-to-point links.
