Internet Packet eXchange Protocol (IPX) Network Documentation

Slides:



Advertisements
Similar presentations
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Advertisements

11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Operating Systems Concepts 1/e Ruth Watson Chapter 11 Chapter 11 Network Maintenance Ruth Watson.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
LAN Protocols and TCP/IP © N. Ganesan, Ph.D.. Module A Preview of Major LAN Protocols.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
Overview of Client Configuration By Nanda Ganesan, Ph.D. © Nanda Ganesan.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Computer Network protocols
Computer Networks IGCSE ICT Section 4.
Overview of Client Configuration By Nanda Ganesan, Ph.D. © Nanda Ganesan.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Introduction to Networks Networking Concepts IST-200 VWCC 1.
Test Review. What is the main advantage to using shadow copies?
Hands-on Networking Fundamentals
Guide to MCSE , Second Edition, Enhanced1 Windows XP Network Overview Most versatile Windows operating system Supports local area network (LAN) connections.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 9: Novell NetWare
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
SYSTEM ADMINISTRATION Chapter 16 Client Workstation Basics.
1 Understanding the TCP/IP Protocol Suite Industry standard Enables enterprise networking and connectivity.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Overview of Client Configuration By Nanda Ganesan, Ph.D. © Nanda Ganesan.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
COMP1321 Digital Infrastructure Richard Henson February 2014.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 2: Configuring Network Protocols.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Chapter 8: Virtual LAN (VLAN)
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Addressing Through the Layers  Data Link Layer Address  Network Layer Address.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Chapter Thirteen The Other Protocols. Objectives You’ll get a brief overview of – IPX/SPX – NetBEUI – Appletalk How each protocol handles addressing The.
Chapter Thirteen The Other Protocols. Objectives You’ll get a brief overview of –IPX/SPX –NetBEUI –Appletalk How each protocol handles addressing The.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
WEEK 11 – TOPOLOGIES, TCP/IP, SHARING & SECURITY IT1001- Personal Computer Hardware System & Operations.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
LANS A Overview (also a Review). NICS  Could be Ethernet, FDDI, Token Ring or Wireless.  Multiple Protocols can be bound to a NIC.  In WinDoze all.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 44 – Exploring Network Properties.
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
Chapter Objectives In this chapter, you will learn:
Chapter 7. Identifying Assets and Activities to Be Protected
Understand Wide Area Networks (WANs)
File System Implementation
Network Operating Systems Examples
Lec 2: Protocols.
Net 323: NETWORK Protocols
Unit 27: Network Operating Systems
An Introduction to Computer Networking
A Network Operating System Edited By Maysoon AlDuwais
Presentation transcript:

Internet Packet eXchange Protocol (IPX) Network Documentation

Internet Packet eXchange Protocol (IPX) Introduction Internetwork Packet Exchange (IPX) is the OSI-model Network layer protocol in the IPX/SPX protocol stack. The IPX/SPX protocol stack is supported by Novell's NetWare network operating system. Because of Netware's popularity through the late 1980s into the mid 1990s, IPX became a popular internetworking protocol. Novell derived IPX from Xerox Network Systems' IDP protocol. IPX usage is in general decrease as the boom of the Internet has made TCP/IP nearly universal. Computers and networks can run multiple network protocols, so almost all IPX sites will be running TCP/IP as well to allow for Internet connectivity. It is also now possible to run Novell products without IPX, as they have supported both IPX and TCP/IP since NetWare reached version 5 in late 1998.

IPX Addressing IPX Addressing IPX addressing defines the internetwork, a collection of LANs connected by routers, bridges, and so forth. IPX packet headers require both source and destination addresses. These designate the sender and the receiver of the packet respectively. IPX Internetwork Address Components: Address Byte Length Description s Network 4 bytes Identifies a specific network or LAN on an IPX internetwork Node 6 bytes Identifies individual nodes, or computers, on a network or LAN. Socket 2 bytes Identifies a process or function operating within a node. A socket is identified by a unique number

Service Advertising Protocol The Service Advertising Protocol (SAP) is included in the Internetwork Packet Exchange (IPX) protocol. SAP makes the process of adding and removing services on an IPX internetwork dynamic. SAP is maintained by Novell. As servers are booted up, they may advertise their services using SAP; when they are brought down, they use SAP to indicate that their services will no longer be available. IPX network servers may use SAP to identify themselves by name and service type. All entities that use SAP must broadcast a name and Service Type that (together) are unique throughout the entire IPX internetwork. This policy is enforced by system administrators and application developers.

Novell Routing There are three types of routers: Internal router: This exists within a file server and can have up to 4 NICs with each one having to have a unique network address as well as the router itself having a unique internal address. Dedicated external router: This can be a normal DOS PC and have up to 4 NICs each one having a unique network address, the PC can no longer be used as a workstation and there is no need for an internal network address. Non-dedicated external router: This is the same as above but must have a unique internal address, it can be used as a workstation.

Monitoring and Managing an IPX Network Managing an IPX Network is similar to managing a TCP/IP network. Many commands are used to check the status of your network adapters among other things. Refer to the handout for more in depth information.

Using the IPX Ping Command From a Cisco switch you can test an IPX ping. To check host reachability and network connectivity, use the ping privileged EXEC command: #ping [ipx] [network.node] To check host reachability and network connectivity, use the ping ipx user EXEC command. >ping ipx {host | address} ipx (Optional) Specifies the IPX protocol. network.node (Optional) Address of system to ping ipx Specifies the IPX protocol. host Host name of system to ping. address Address of system to ping.

Network Documentation Network Documentation is a very key thing to do when you’ve setup a network. You may know the network back to front in your own mind, you might know all the passwords, ports and particular setups. In the case that you leave the company or you aren’t supporting them anymore the client needs a copy of documentation that includes all current information on everything in the network, right down to all the client computers on the network. An example of network documentation being needed would be the scenario where the network administrator leaves the company and now no one can log into the server. If the server password was documented this issue would not have occurred at all. It also makes your job easier to keep track of all the vital details in a network.

Elements of Network Documentation Network topology—This is usually done in the form of a diagram that shows the major network nodes, such as routers, switches, firewalls, and servers, and how they are all interconnected. Normally, printers and workstations are not included. Server information—This is all of the information on servers that you will need to manage or administer them, such as name, functions, IP address, disk configuration, OS and service pack, date and place of purchase, warranty, and so forth. Router and switch port assignments—This includes detailed information on WAN configuration, VLANs, or even the assignment of a port to a network node via the patch panel. Configuration of network services—Network services, such as DNS, WINS, DHCP, and RAS, are critical to the operation of the network. You should describe in detail how they are structured. Although it would be possible to derive that information by inspecting the servers, the point is to save that time by having it documented in an easy-to-decipher format.

Elements of Network Documentation Continued Domain policies and profiles—You can restrict the capabilities of network users with the Policy Editor in Windows NT or with Group Policies in Windows 2000. You can also create roaming profiles that are stored on a server rather than on local machines. This kind of configuration, if used, should be documented. Mission-critical applications—You must document how these are maintained, as well as what typically goes wrong with them and how you resolve problems. Procedures—This in itself can be a major undertaking. Procedures are basically the means by which we carry out policies, and they can be quite extensive. For instance, a policy can state, “The network shall be secure against unauthorized users.” However, it takes a great deal of effort to implement that policy. There are procedures for the firewall, for network protocols, passwords, physical security, and so forth. You would probably also have procedures for dealing with problems that are reported by users and for routine maintenance of the servers.

Practical Setting up Server 2003 We will be setting up Server 2003, beginning from the setup of Server 2003 and ending with the configuration of core Server 2003 roles. Install Server 2003 as instructed. Setup a static IP. Setup Active Directory. Setup DNS. Setup DHCP. Connect Windows XP computer to the domain.