SlideShare a Scribd company logo
1 of 16
Network Protocol
TOPIC : INTERNETWORK PACKET EXCHANGE
(IPX)
BY
Muhammed Sidibeh
BRIEF OVERVIEW
• NetWare is a network operating system (NOS) that provides
transparent remote file access .
• NetWare was developed by Novell, Inc., from the Xerox*
Network System Datagram protocol and was introduced in
the early 1980s and based on a client server architecture.
• For connecting clients to its Network operating systems a
protocol was developed which is know as IPX.
• IPX was developed by Novell based on a research center
(PARC). Its core components are Internetwork packet
exchange (IPX) , Sequenced Packet exchange), Service
Advertising Protocol (SAP) etc..
WHAT IS INTERNETWORK PACKET
EXCHANGE (IPX)?
IPX (Internetwork Packet Exchange) is a
networking protocol from Novell that
interconnects network that use Novell’s
Netware Clients and servers. IPX is a
datagram or packet protocol.
Where does it Operate in the
OSI Model?
• IPX works at the Network layer.
• Connectionless Datagram Protocol.
Fig 1: The NetWare Protocol Suite Maps to All OSI layers
HIGHER
LEVEL
PROTOCOLS
(NETBIOS,SAP
,NCP,SPX,NSL
P and SPX
R
E
L
I
E
S
MAC
PROTOCOLS
and IPX
IPX Packet Structure
The IPX packet is similar to the XNS IDP packet
and comprises two parts:
1.A 30 bytes IPX header, which includes the
network, node, and socket addresses for both
destination and source.
2.Data section, which often includes the header of
a higher level protocol, such as SPX.
Structure of an IPX packet
Note: The IPX header is placed after the header and before the data.
PACKET TYPES
IPX Addressing
• For intranetwork addressing, IPX uses the physical
address assigned to the network interface board.
• IPX network address uniquely identifies an IPX server on
an IPX network and individual processes within the
server.
1. A 4-byte network number (server)
2. A 6-byte node number (server)
3. A 2-byte socket number (server process)
Communication
1. Client-Server
• Every Netware server builds a service
advertisement table comprising all the
network resource that it is aware of.
• Client use Get Nearest Server (GNS)
request to locate servers.
2. Server-Server
• Servers use SAP and RIP
Client Requesting Resources from Server Via (SAP)
How the Performance of IPX exceed that of
TCP/IP in LAN
• IPX addresses are formed using Ethernet
MAC and 32-bit network ID.
• Highly optimized for LAN- IPX/SPX uses
per packet nacks instead of per octet acks
in TCP.
• Clients that misses a packet can be re-
read from the disk/cache and re-sent.
LIMITATIONS OF IPX
• Not suitable for WAN.
• Packet reordering on WAN is
omnipresent causing a lot of spurious
NAKs.
• IPX addresses are not hierarchical.
SUMMARY
• IPX is a networking protocol originally used by
Novell Netware Operating System.
• IPX is connectionless.
• Also referred to as a datagram protocol-
meaning each packet is treated as a single
entity.
• IPX is very easy to configure and has a small
memory footprint.
REFERENCES
• https://en.wikipedia.org/wiki/Internetwork_Packet_Exchange#Description
• http://searchnetworking.techtarget.com/answer/TCP-IP-vs-IPX-SPX
• http://www.powershow.com/view/3bdf3d-
M2U0M/IPX_SPX_powerpoint_ppt_presentation
• http://www.powershow.com/view/3bdf3d-
M2U0M/IPX_SPX_powerpoint_ppt_presentation
THE
END

More Related Content

What's hot (20)

IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Signaling system 7 (ss7)
Signaling system 7 (ss7)Signaling system 7 (ss7)
Signaling system 7 (ss7)
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
OSPF
OSPF OSPF
OSPF
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
IMS ENUM and DNS Mechanism
IMS ENUM and DNS MechanismIMS ENUM and DNS Mechanism
IMS ENUM and DNS Mechanism
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
 
IPv4
IPv4IPv4
IPv4
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
Socket programming
Socket programmingSocket programming
Socket programming
 
Dhcp
DhcpDhcp
Dhcp
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchange
 
Transport layer
Transport layer Transport layer
Transport layer
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
IMS Naming Identity
IMS Naming IdentityIMS Naming Identity
IMS Naming Identity
 
IPv6
IPv6IPv6
IPv6
 
ipv6 ppt
ipv6 pptipv6 ppt
ipv6 ppt
 

Similar to IPX Protocol Overview

Novell Netware Protocol suite
Novell Netware Protocol suiteNovell Netware Protocol suite
Novell Netware Protocol suiteOmar Isaid
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Routed Protocol
Routed ProtocolRouted Protocol
Routed ProtocolNetwax Lab
 
CCN CEP.pptx
CCN CEP.pptxCCN CEP.pptx
CCN CEP.pptxNOOR69810
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptxKushalSrivastava23
 
Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Travis Leong Ping
 
Network protocol
Network protocolNetwork protocol
Network protocolOnline
 
Da for dummies techdays 2012
Da for dummies techdays 2012Da for dummies techdays 2012
Da for dummies techdays 2012Alex de Jong
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2srmanjuskp
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersĐồng Quốc Vương
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocolGLIM Digital
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersĐồng Quốc Vương
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2githe26200
 

Similar to IPX Protocol Overview (20)

Novell Netware Protocol suite
Novell Netware Protocol suiteNovell Netware Protocol suite
Novell Netware Protocol suite
 
Unit04
Unit04Unit04
Unit04
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Routed Protocol
Routed ProtocolRouted Protocol
Routed Protocol
 
CCN CEP.pptx
CCN CEP.pptxCCN CEP.pptx
CCN CEP.pptx
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Tale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIXTale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIX
 
Ip v4 & ip v6
Ip v4 & ip v6Ip v4 & ip v6
Ip v4 & ip v6
 
Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Da for dummies techdays 2012
Da for dummies techdays 2012Da for dummies techdays 2012
Da for dummies techdays 2012
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2
 
pps Matters
pps Matterspps Matters
pps Matters
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answers
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

IPX Protocol Overview

  • 1. Network Protocol TOPIC : INTERNETWORK PACKET EXCHANGE (IPX) BY Muhammed Sidibeh
  • 2. BRIEF OVERVIEW • NetWare is a network operating system (NOS) that provides transparent remote file access . • NetWare was developed by Novell, Inc., from the Xerox* Network System Datagram protocol and was introduced in the early 1980s and based on a client server architecture. • For connecting clients to its Network operating systems a protocol was developed which is know as IPX. • IPX was developed by Novell based on a research center (PARC). Its core components are Internetwork packet exchange (IPX) , Sequenced Packet exchange), Service Advertising Protocol (SAP) etc..
  • 3. WHAT IS INTERNETWORK PACKET EXCHANGE (IPX)? IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects network that use Novell’s Netware Clients and servers. IPX is a datagram or packet protocol.
  • 4. Where does it Operate in the OSI Model? • IPX works at the Network layer. • Connectionless Datagram Protocol.
  • 5. Fig 1: The NetWare Protocol Suite Maps to All OSI layers HIGHER LEVEL PROTOCOLS (NETBIOS,SAP ,NCP,SPX,NSL P and SPX R E L I E S MAC PROTOCOLS and IPX
  • 6. IPX Packet Structure The IPX packet is similar to the XNS IDP packet and comprises two parts: 1.A 30 bytes IPX header, which includes the network, node, and socket addresses for both destination and source. 2.Data section, which often includes the header of a higher level protocol, such as SPX.
  • 7. Structure of an IPX packet Note: The IPX header is placed after the header and before the data.
  • 9. IPX Addressing • For intranetwork addressing, IPX uses the physical address assigned to the network interface board. • IPX network address uniquely identifies an IPX server on an IPX network and individual processes within the server. 1. A 4-byte network number (server) 2. A 6-byte node number (server) 3. A 2-byte socket number (server process)
  • 10. Communication 1. Client-Server • Every Netware server builds a service advertisement table comprising all the network resource that it is aware of. • Client use Get Nearest Server (GNS) request to locate servers. 2. Server-Server • Servers use SAP and RIP
  • 11. Client Requesting Resources from Server Via (SAP)
  • 12. How the Performance of IPX exceed that of TCP/IP in LAN • IPX addresses are formed using Ethernet MAC and 32-bit network ID. • Highly optimized for LAN- IPX/SPX uses per packet nacks instead of per octet acks in TCP. • Clients that misses a packet can be re- read from the disk/cache and re-sent.
  • 13. LIMITATIONS OF IPX • Not suitable for WAN. • Packet reordering on WAN is omnipresent causing a lot of spurious NAKs. • IPX addresses are not hierarchical.
  • 14. SUMMARY • IPX is a networking protocol originally used by Novell Netware Operating System. • IPX is connectionless. • Also referred to as a datagram protocol- meaning each packet is treated as a single entity. • IPX is very easy to configure and has a small memory footprint.
  • 15. REFERENCES • https://en.wikipedia.org/wiki/Internetwork_Packet_Exchange#Description • http://searchnetworking.techtarget.com/answer/TCP-IP-vs-IPX-SPX • http://www.powershow.com/view/3bdf3d- M2U0M/IPX_SPX_powerpoint_ppt_presentation • http://www.powershow.com/view/3bdf3d- M2U0M/IPX_SPX_powerpoint_ppt_presentation