SlideShare a Scribd company logo
Novell Netware Protocol suite
Omar Adnan Isaid
Novell Netware Protocol suite
• Novel Netware suite is a hierarchical model
• We Will explain it with OSI reference
Network Access Layer
• Support multiple LAN and WAN
encapsulations standards
• PPP,IEEE 802.3 , Token Ring 802.5,FDDI
,ARCnet
Network Layer
• Mainly implemented of IPX protocol.We will
talk about :
1.IPX (internetwork packet exchange)protocol
2.RIP IPX protocol
3.SPX (sequenced packet exchange)protocol
4.Watchdog protocol
IPX (internetwork packet exchanged)
• Developed from IDP (internet datagram
protocol) in the previously developed XNS
• Get the RIP IPX support to provide routing
service
• IPX address
1.32 bits long(8 hexadecimal digits)
2.IPX is a unique address
3.Assigned by the network administrator
IPX addressing
• Logical networks are assigned a unique 32-bit
hexadecimal address in the range of 0x1 - 0xFFFFFFFE.
• Hosts have a 48-bit node address which by default is
set to the network interface card's MAC address. The
node address is appended to the network address to
create a unique identifier for the host on the network.
• Network number 00:00:00:00 means current network
• Broadcast address is FF:FF:FF:FF
IPX & different encapsulation’s types
RIP IPX OR RIPX
• Routing protocol
• Dynamic distance vector or Link-state protocol
• Best-path routing desicion according to route’s
tick
• Each tick is 1/18 second
• Tie of having same tick for two routes is solved by
the least hop count
• RIPX sends its routing updates each 60 seconds
RIPX
• Discover neighbors ,that speaking RIPX
• Collect routes
• Choose best-path route , according to
compromising , between ticks
Service procedure exchange (SPX) protocol
• Completely produced by Novell corporation
• Netware 3.11 and earlier networks uses this
protocol to built SPX tables in their routers
• Servers uses SPX to publish their identifiers ,
called SPX identifiers
• SPX publishes SPX identifiers every 60 seconds
HOW can WORKSTATIONS can get
their demands of SPX identifiers ?
1. Local routers publish SPX tables every 60
seconds
2. End-station can solicit SPX identifiers
1. Local routers publish SPX tables every 60 seconds
1. SPX servers publish SPX tables routers every
60 seconds
2. Routers at Netware networks , receive them
and build SPX tables
3. the routers in turn publish SPX table every
60 seconds to their stub networks
2. End-station can solicit SPX identifiers
1. Simply the end-user (OMAR-PC for example)
sends Query about specific SPX identifier(s)
to local router
2. Local router process the Query and return
the request
Watchdog protocol
• Diagnostic protocol helps to identify the active
hosts , from their fail down
• This protocol useful for gateways and
management systems
• Diagnostic done periodically using
handshaking methodology
Upper-layer protocols (session,
presentation and application layers)
• We will talk about :
1.Netware shell
2.NetWare RPC protocol
Netware shell protocol
• Netware application services produces trap
due to I/O operation , that handled by this
protocol
• This protocol can pass the I/O to lower layers
if network access is needed, else request
passed to local I/O resources
• This protocol can modify operating system
vector table to handle the different traps
concerns with the SPX/IPX suite services on
application level
NetWare RPC protocol
• Do the same as Netware shell Protocol
• Different when that redirect mechanism can
support in end-to-end communication is RPC
Netware application layer services
• Netware MHS (Message handling service)
• NDS (Netware directory service)
Netware MHS
• Have to do with e-mail transport
NDS (Netware directory service)
• Service provide distributed database
• E-Directory has been trusted for its scalability,
compatibility, reliability, manageability and
security
• NDS can be consulted to get SPX identifiers in
Netware 4.0 and following versions
• SPX still needed to locate NDS when client
boot up
IPv4 & IPX (Formats of their
datagrams)
IPX format IPV4 format

More Related Content

What's hot

Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013
Travis Leong Ping
 
Site to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql dbSite to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql db
Chanaka Lasantha
 
Share File easily between computers using sftp
Share File easily between computers using sftpShare File easily between computers using sftp
Share File easily between computers using sftp
Tushar B Kute
 
TCP/IP Introduction
TCP/IP Introduction TCP/IP Introduction
TCP/IP Introduction
LJ PROJECTS
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
Himanshu Pathak
 
Chapter 1 Networking
Chapter 1 NetworkingChapter 1 Networking
Chapter 1 Networking
mlrbrown
 
What is TCP/IP
What is TCP/IPWhat is TCP/IP
What is TCP/IP
farhan516
 
TCPIP
TCPIPTCPIP
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
mlrbrown
 
IP Routing
IP RoutingIP Routing
IP Routing
Peter R. Egli
 
CISSP Week 5
CISSP Week 5CISSP Week 5
CISSP Week 5
jemtallon
 
Tcp
TcpTcp
Tcp
giaolvq
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
Rubal Sagwal
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
cclay3
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
sanjoysanyal
 
Basic networking course
Basic networking courseBasic networking course
Basic networking course
LuxoftTraining
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
suddenven
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
Roman Brovko
 
Tcp ip tutorial
Tcp ip tutorialTcp ip tutorial
Tcp ip tutorial
PRINCE KUMAR
 
MVA slides lesson 4
MVA slides lesson 4MVA slides lesson 4

What's hot (20)

Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013
 
Site to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql dbSite to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql db
 
Share File easily between computers using sftp
Share File easily between computers using sftpShare File easily between computers using sftp
Share File easily between computers using sftp
 
TCP/IP Introduction
TCP/IP Introduction TCP/IP Introduction
TCP/IP Introduction
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Chapter 1 Networking
Chapter 1 NetworkingChapter 1 Networking
Chapter 1 Networking
 
What is TCP/IP
What is TCP/IPWhat is TCP/IP
What is TCP/IP
 
TCPIP
TCPIPTCPIP
TCPIP
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
 
IP Routing
IP RoutingIP Routing
IP Routing
 
CISSP Week 5
CISSP Week 5CISSP Week 5
CISSP Week 5
 
Tcp
TcpTcp
Tcp
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Basic networking course
Basic networking courseBasic networking course
Basic networking course
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
 
Tcp ip tutorial
Tcp ip tutorialTcp ip tutorial
Tcp ip tutorial
 
MVA slides lesson 4
MVA slides lesson 4MVA slides lesson 4
MVA slides lesson 4
 

Viewers also liked

Novell Netware
Novell NetwareNovell Netware
Novell Netware
ShevaniaMeidika
 
4.protocolos unix, netware, macintosh y microsoft
4.protocolos unix, netware, macintosh y microsoft 4.protocolos unix, netware, macintosh y microsoft
4.protocolos unix, netware, macintosh y microsoft
Elvis Raza
 
Protocolos de red
Protocolos de redProtocolos de red
Protocolos de red
Gerardo Navarrete
 
Protocolos
ProtocolosProtocolos
Protocolos
Miguel1696
 
Computer network
Computer networkComputer network
Computer network
samiksha padgilwar
 
Protocolos unix-netware
Protocolos unix-netwareProtocolos unix-netware
Protocolos unix-netware
Luis Asencio
 
Inferno
InfernoInferno
Inferno
vasiliswp84
 
Novell
NovellNovell
Consumer behaviour
Consumer behaviourConsumer behaviour
Consumer behaviour
Siddhant Agarwal
 
Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...
Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...
Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...
Schneider Electric
 
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Novell
 
Advantages and disadvantages solaris
Advantages and disadvantages solarisAdvantages and disadvantages solaris
Advantages and disadvantages solaris
Nur Shukri
 
Recurrences
RecurrencesRecurrences
Recurrences
Ala' Mohammad
 
Computer networks
Computer networksComputer networks
Computer networks
Nabendu Maji
 
Open solaris (final)
Open solaris (final)Open solaris (final)
Open solaris (final)
liannemonique vergara
 
Solving recurrences
Solving recurrencesSolving recurrences
Solving recurrences
Waqas Akram
 
Solaris
SolarisSolaris
Protocolo apple talk
Protocolo  apple talkProtocolo  apple talk
Protocolo apple talk
Stefany Amaya
 
Network operating system
Network operating systemNetwork operating system
Network operating system
John Carlo Catacutan
 
Solaris basics
Solaris basicsSolaris basics
Solaris basics
Ashwin Pawar
 

Viewers also liked (20)

Novell Netware
Novell NetwareNovell Netware
Novell Netware
 
4.protocolos unix, netware, macintosh y microsoft
4.protocolos unix, netware, macintosh y microsoft 4.protocolos unix, netware, macintosh y microsoft
4.protocolos unix, netware, macintosh y microsoft
 
Protocolos de red
Protocolos de redProtocolos de red
Protocolos de red
 
Protocolos
ProtocolosProtocolos
Protocolos
 
Computer network
Computer networkComputer network
Computer network
 
Protocolos unix-netware
Protocolos unix-netwareProtocolos unix-netware
Protocolos unix-netware
 
Inferno
InfernoInferno
Inferno
 
Novell
NovellNovell
Novell
 
Consumer behaviour
Consumer behaviourConsumer behaviour
Consumer behaviour
 
Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...
Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...
Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...
 
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
 
Advantages and disadvantages solaris
Advantages and disadvantages solarisAdvantages and disadvantages solaris
Advantages and disadvantages solaris
 
Recurrences
RecurrencesRecurrences
Recurrences
 
Computer networks
Computer networksComputer networks
Computer networks
 
Open solaris (final)
Open solaris (final)Open solaris (final)
Open solaris (final)
 
Solving recurrences
Solving recurrencesSolving recurrences
Solving recurrences
 
Solaris
SolarisSolaris
Solaris
 
Protocolo apple talk
Protocolo  apple talkProtocolo  apple talk
Protocolo apple talk
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
Solaris basics
Solaris basicsSolaris basics
Solaris basics
 

Similar to Novell Netware Protocol suite

Ipx protocol slide share
Ipx protocol slide shareIpx protocol slide share
Ipx protocol slide share
MUHAMMED SIDIBEH
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
KushalSrivastava23
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
Wajahat Rajab
 
Routed Protocol
Routed ProtocolRouted Protocol
Routed Protocol
Netwax Lab
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
hiya123jes
 
Network protocol
Network protocolNetwork protocol
Network protocol
Online
 
Network Protocol
Network ProtocolNetwork Protocol
Network Protocol
Ketan Nayak
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
Piero Fraternali
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 
AMBA 5 COHERENT HUB INTERFACE.pptx
AMBA 5 COHERENT HUB INTERFACE.pptxAMBA 5 COHERENT HUB INTERFACE.pptx
AMBA 5 COHERENT HUB INTERFACE.pptx
Sairam Chebrolu
 
Unit04
Unit04Unit04
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
IPv6 Transition & Deployment, including IPv6-only in cellular and broadband
IPv6 Transition & Deployment, including IPv6-only in cellular and broadbandIPv6 Transition & Deployment, including IPv6-only in cellular and broadband
IPv6 Transition & Deployment, including IPv6-only in cellular and broadband
APNIC
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
Gayathri Kesavan
 
pps Matters
pps Matterspps Matters
IPv6 transition and coexistance - Jordi Palet
IPv6 transition and coexistance - Jordi PaletIPv6 transition and coexistance - Jordi Palet
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
Israel Marcus
 
CCN CEP.pptx
CCN CEP.pptxCCN CEP.pptx
CCN CEP.pptx
NOOR69810
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
Bassam Kanber
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
Techvilla
 

Similar to Novell Netware Protocol suite (20)

Ipx protocol slide share
Ipx protocol slide shareIpx protocol slide share
Ipx protocol slide share
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
Routed Protocol
Routed ProtocolRouted Protocol
Routed Protocol
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network Protocol
Network ProtocolNetwork Protocol
Network Protocol
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
AMBA 5 COHERENT HUB INTERFACE.pptx
AMBA 5 COHERENT HUB INTERFACE.pptxAMBA 5 COHERENT HUB INTERFACE.pptx
AMBA 5 COHERENT HUB INTERFACE.pptx
 
Unit04
Unit04Unit04
Unit04
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
IPv6 Transition & Deployment, including IPv6-only in cellular and broadband
IPv6 Transition & Deployment, including IPv6-only in cellular and broadbandIPv6 Transition & Deployment, including IPv6-only in cellular and broadband
IPv6 Transition & Deployment, including IPv6-only in cellular and broadband
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
pps Matters
pps Matterspps Matters
pps Matters
 
IPv6 transition and coexistance - Jordi Palet
IPv6 transition and coexistance - Jordi PaletIPv6 transition and coexistance - Jordi Palet
IPv6 transition and coexistance - Jordi Palet
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
CCN CEP.pptx
CCN CEP.pptxCCN CEP.pptx
CCN CEP.pptx
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
 

Recently uploaded

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

Novell Netware Protocol suite

  • 1. Novell Netware Protocol suite Omar Adnan Isaid
  • 2. Novell Netware Protocol suite • Novel Netware suite is a hierarchical model • We Will explain it with OSI reference
  • 3. Network Access Layer • Support multiple LAN and WAN encapsulations standards • PPP,IEEE 802.3 , Token Ring 802.5,FDDI ,ARCnet
  • 4. Network Layer • Mainly implemented of IPX protocol.We will talk about : 1.IPX (internetwork packet exchange)protocol 2.RIP IPX protocol 3.SPX (sequenced packet exchange)protocol 4.Watchdog protocol
  • 5. IPX (internetwork packet exchanged) • Developed from IDP (internet datagram protocol) in the previously developed XNS • Get the RIP IPX support to provide routing service • IPX address 1.32 bits long(8 hexadecimal digits) 2.IPX is a unique address 3.Assigned by the network administrator
  • 6. IPX addressing • Logical networks are assigned a unique 32-bit hexadecimal address in the range of 0x1 - 0xFFFFFFFE. • Hosts have a 48-bit node address which by default is set to the network interface card's MAC address. The node address is appended to the network address to create a unique identifier for the host on the network. • Network number 00:00:00:00 means current network • Broadcast address is FF:FF:FF:FF
  • 7. IPX & different encapsulation’s types
  • 8. RIP IPX OR RIPX • Routing protocol • Dynamic distance vector or Link-state protocol • Best-path routing desicion according to route’s tick • Each tick is 1/18 second • Tie of having same tick for two routes is solved by the least hop count • RIPX sends its routing updates each 60 seconds
  • 9. RIPX • Discover neighbors ,that speaking RIPX • Collect routes • Choose best-path route , according to compromising , between ticks
  • 10. Service procedure exchange (SPX) protocol • Completely produced by Novell corporation • Netware 3.11 and earlier networks uses this protocol to built SPX tables in their routers • Servers uses SPX to publish their identifiers , called SPX identifiers • SPX publishes SPX identifiers every 60 seconds
  • 11. HOW can WORKSTATIONS can get their demands of SPX identifiers ? 1. Local routers publish SPX tables every 60 seconds 2. End-station can solicit SPX identifiers
  • 12. 1. Local routers publish SPX tables every 60 seconds 1. SPX servers publish SPX tables routers every 60 seconds 2. Routers at Netware networks , receive them and build SPX tables 3. the routers in turn publish SPX table every 60 seconds to their stub networks
  • 13. 2. End-station can solicit SPX identifiers 1. Simply the end-user (OMAR-PC for example) sends Query about specific SPX identifier(s) to local router 2. Local router process the Query and return the request
  • 14. Watchdog protocol • Diagnostic protocol helps to identify the active hosts , from their fail down • This protocol useful for gateways and management systems • Diagnostic done periodically using handshaking methodology
  • 15. Upper-layer protocols (session, presentation and application layers) • We will talk about : 1.Netware shell 2.NetWare RPC protocol
  • 16. Netware shell protocol • Netware application services produces trap due to I/O operation , that handled by this protocol • This protocol can pass the I/O to lower layers if network access is needed, else request passed to local I/O resources • This protocol can modify operating system vector table to handle the different traps concerns with the SPX/IPX suite services on application level
  • 17. NetWare RPC protocol • Do the same as Netware shell Protocol • Different when that redirect mechanism can support in end-to-end communication is RPC
  • 18. Netware application layer services • Netware MHS (Message handling service) • NDS (Netware directory service)
  • 19. Netware MHS • Have to do with e-mail transport
  • 20. NDS (Netware directory service) • Service provide distributed database • E-Directory has been trusted for its scalability, compatibility, reliability, manageability and security • NDS can be consulted to get SPX identifiers in Netware 4.0 and following versions • SPX still needed to locate NDS when client boot up
  • 21. IPv4 & IPX (Formats of their datagrams) IPX format IPV4 format