Features Of NOVELL NETWARE

 

Developed by Ray Noarda.

* It is 16 bit O/S.

* Min processor requirement is 80286.

* Designed around IPX protocol.

* Built in TCP/IP.

* It supports System Fault Tolerance.

* It supports N/w Loadable Module.

 

Netware Server Installation

Steps :

 

 

1) Reboot the system from A drive with the DOS version compatible

     with Netware(DOS Version 3.0).

2) Create partition for Netware with FDISK.

    A:\> FDISK

    With this following options are available to user :

     i)   Create partition

     ii)  Change Active partition

     iii) Delete partition

     iv)  Partition information

    Select (i) from menu. When it is selected it will ask for size of partition.  

    Assign minimum 3Mb.

    Then select (ii) option

3) Insert Netware Installation disk 1 in Drive A & type

    A:\> SERVER

   With this it will ask for name of Server & IPX No. Type name of Server. It  

   should consist of 8 characters where 8th char must be hyphen. Then type 

   IPX no. It should be alphanumeric. Max length is 8 digits.

4) When IPX No is assigned to Server it will automatically configure whole  

     Network nothing but addresses assigned to the w/ss connected to the

     Server in specific order.

5) Insert disk 2 & type

    A:\> ISA/EISA/PCI

    Depending on NIC mounted on specific slot. It will ask for I/O memory 

    based address. For this 2 options are given; configure & default. Select 

   default option, as user is not aware of address, which is in hex form.

 

6) Insert disk 3 in drive A with which installation menu will appear on screen.

 

                  MENU

                 -------------------

                 Disk Option

                 Volume Option

                 System Option

                 Product Option

                 -------------------

              Cancel       Exit

                ------         ----

     Disk option is used for loading Netware core files on Netware partition.

     Volume option is used to create volume for Netware.

     System option used for overall configuration of system.

     Product option is for special component of system.

7) When disk option is selected it gives :

    i)   Partition Information Table

    ii)  Disk Mirroring

    iii) Surface Test

    iv) Disk Duplexing

    v) Format

    Select first option. Partition info table consist of following :

    i) Hot Fix

    ii) Netware Active Partition

    iii) Delete Partition

    iv) Exit

    Select each option one by one.

    First option gives Hot Fix area Netware.

    Second option will make 3Mb partition as Active Partition for Netware  

    where all Netware core files will be stored.

    Third option will delete other active partition available on disk &     

     installation menu appear on screen with last option & Exit

8) Prompt appear on screen type A:\>DOWN & reboot system. With this  

    Server goes down & system reboot through F Drive (It is logical for n/w by 

    default).

 

Netware Workstation Installation

Non-Dedicated w/s :

It is w/s same as stand-alone machine. This w/s consist of its own HDD & it is partially depend on Server

Procedure :

1)     Reboot the system from A drive. Min DOS version must be compatible with Netware with this command.com is loaded by w/s.

2)     Insert w/s installation disk in drive & type A:\> IPX.COM. When IPX is loaded it will configure address for the w/s.

3)     Type A:\>NETX.COM  with which latest version of Netware is loaded by w/s with the server if version at Netware w/s matches with the server it displays F prompt.

Dedicated Workstation :

These are diskless w/s, which are totally dependant on server for booting process.

Procedure :

1)     Insert Boot ROM Chip into the NIC of w/s.

2)     Switch on w/s with this NET$DOS.SYS file gets executed from w/s. It also called as Netware Shell. It acts as interface between DOS & Netware. Nothing but it intersects DOS with Netware. Whenever commands are related with DOS then these commands are executed from w/s & if commands are related with Netware, it executed under Netware Environment. This file is basically used to distinguish between DOS & Netware e.g. Setpass executed from w/s & Attached directed to the Server.

 

Netware Printer Installation

Procedure :

1)     Log in as N/w Administrator.

2)     Select PCONSOLE utility from options & run it. It gives following options :   Change Current Server

                       Print Queue Information

                       Print Server Information

3)     Select second option with this following information is available to      

     user i.e. Queue ID, Queue Operator, Queue Status. Assign Queue to    

     printer ascending/descending depending upon Queue ID.

4)     Select third option. It gives following to user : Name of File Server to 

     which printer is connected. Selection of printer (Dot Matrix / Line). 

     Information about print queue or spooling (Spooling is the process of  

     assigning priorities to the jobs). Name of printer manufacturer.

5) Exit from PCONSOLE.

6) Type LOAD PRINTSERVER at F prompt.

 

Netware Commands (Server Based)

1) BIND : TO LINK NIC WITH PROTOCOL

     BIND 10BASE2 IPX

     IPX :- INTRANET PACKET EXCHANGE

 

2) BROADCAST : USED BY ADMIN TO SENDS MESSAGES TO THE             

     USER

     BROADCAST  ["SHUTDOWN"]

 

3) MOUNT : TO MAKE VOLUMES AVAILABLE TO USER

     "   <SERVER NAME/ VOLUME NAME>

 

4) DISAMOUNT : TO MAKE VOLUMES UNAVAILABLE TO USER

 

5) GRANT : UTILITY TO ADMIN TO GRANT PERMISSIONS

     "   [RIGHTS] [FOR/IN DIR NAME] TO [GROUP]

 

6) REVOKE : REVOKE [R W] [FOR ORACLE] FROM [SAMEER]

 

7) TLIST : LIST OF TRUSTEE RIGHTS

     DIR | RIGTHS | GROUPNAME

 

8) SET : SET N/W PARAMETERS; ADMIN TO CHECK H/W

 

9) MONITER : TO MONITER N/W OPERATIONS

 

Netware Commands (Workstation Based)

 

1) Login : Access to the specific user

    Syntax :

    LOGIN Sever name/Username

 

2) LOGOUT : Exit from the Server.

    Syntax :

    LOGOUT

 

3) SETPASS : To change the Passsword.

     Syntax :

     SETPASS Oldpassword/Newpassword.

 

4) CHKVOL : To check the volume or Diskspace (Free space available to the  

user in bytes).

     Syntax :

     CHKVOL Servername/volumename no.

 

5) NCOPY : Copy data from 1 logical drive to another logical drive.

     Syntax :

     NCOPY  <*.*>   <Source path>   <Destination Path>

 

6) NPRINT : To print the files from n/w printer, redirecting the files from  

local to n/w printer.

     Syntax :

     NPRINT <Filename>

 

7) RENDIR : Rename of directory

     Syntax :

     RENDIR <Dirname>

 

8) PURGE : To delete the files from n/w dir.

    Syntax :

    PURGE <filename.ext>

 

9) SALVAGE : Recover the File, which was deleted from purge.

     Syntax :

     SALVAGE <Filename>

 

10) PSTAT : To check status of printer (n/w printer).

      Syntax :

      PSTAT

 

11) QUEUE : To assign queue to the printer.

       Syntax :

       QUEUE

 

12) SPOOLER : Assigning the priorities to the printer.

      Syntax :

      SPOOLER <prioritywise>

 

13) RPRINTER : Selection of n/w printer. Printing jobs of another printer.

       Syntax :

       RPRINTER <Address of n/w printer>

 

 

 

14) RCONSOLE : Remote console, display.

       Syntax :

       RCONSOLE

 

15) SEND : To send the message from 1 user to another.

       Syntax :

       SEND ["Messsage"] UserID

 

16) FLAG : Assign file access permissions to the specific file(User related          

       Flags)

       R : Open/Read

       W : Write

       C : Create

       E : Erase

       M : Modify

       F : File scan

       A : Access constant

       Syntax :

       FLAG Filename [+/- flag]

 

17) FLAGDIR : To assign Dir with attributes.

       H : Hidden

       N : Normal

       P : Printer

       S : system

       Syntax :

       FLAGDIR Dirname [flag]

 

18) LISTDIR : Dir alongwith sub-dir information ,max right mask.

      Syntax :

      LISTDIR

 

19) USERLIST : User information about current user logged on the n/w.

       No of user | Connection No

       Syntax :

       USERLIST

 

20) SLIST : List of Servers

       Syntax :

       SLIST

IPX Protocol

Features :

1)     Easy to install.

2)     It can configure its own address.

3)     Addresses are assigned in alphanumeric Form.

4)     Active protocol among all types of protocols.

 

IPX Reference Model :

Layers                                     Protocols

--------                                      -----------

Application               SAP(Sys advt  protocol)/ FTP (File Server)

Transport                   NCP(n/w core protocol)/ SPX

Network                     IPX

Datalink                     IEEE 802.3/802.4/802.5

Physical                     Ethernet / Archnet / Token Ring

 

Difference :

NCP                                                      SPX

------                                                   -----------

Connection oriented                      Connection less

Slower                                            Faster

More Reliable                                Less Reliable

Data in form of text                        Audio, picture

 

Physical Layer : It is related to the selection of n/w (LAN) depending on components of n/w. It selects Ethernet/Arch net/Token Ring for installation.

 

Datalink Layer : Depending on the type of NIC selected at Physical Layer. Datalink selects IEEE frame format i.e. for Ethernet it selects IEEE 802.3.

Datalink Layer combines with Physical Layer in order to form Host to n/w layer

 

Network Layer : It is based on only IPX Protocol.

 

Transport Layer : Like TCP/IP this layer is based on 2 end to end Protocols NCP & SPX.

 

Application Layer : It is related to the end users such as SAP users & File Server Users. SAP users selects SPX  for data trans because it is mainly used for multimedia applications. File Server users selects NCP for data trans as it is related to File Transfer Protocol (FTP).

 

IPX Frame Format / IPX Packet Format

 

1        |        2         |           3         |          4        |         5        |       6        |        7

 2                2                     1                   1                 12               12             55

 

1 : Checksum

2 : Length of Packet

3 : Packet Control

4 : Packet Type

5 : Destination Address

6 : Source Address

7 : Data Field

 

1)     Checksum : It is 2 bytes long & it is many times ignored by IPX.

2)     Length of Packet : It is 2 bytes long, which gives idea about no. of bytes available in a particular Packet.

3)     Packet Control : It is 1 byte long & gives idea about no. of  n/w that are traveled by Packet.

4)     Packet Type : This field is used to distinguish between Control Packet & Data Packet. If first bit of Packet is 0 then it represents Control Packet & if it is 1 then it represents Data Packet. Control Packets are generated for maintenance of n/w.

5)     Destination Address : It is 12 Bytes long. Out of 96 bits first 32 bytes are n/w no, next 48 Bits represents Machine No. & last 16 bits represents Port / Socket Port i.e. local address of the Machine.

6)     Source Address : It is also 12 Bytes long as Destination Address.

7)     Data Field : It can store unlimited data bytes for actual transmission.

 

MODEM

* It is Modulator Demodulator Circuit.

Types Of Modem :

Internal                                                                              External

In Built                                                                    Connected Externally

Less expensive                                                         More Expensive

Not Portable                                                             Portable

Slower                                                                      Faster

More Maintenance                                                   Less Maintenance

MODEM (Discuss signal transmission method)

It is used for long distance transmission. It is a connectivity device, which support connectivity with the Internet.

Modulation :- It is a process with which original signal is transmitted over a  carrier wave with the fixed amplitude or frequency. Carrier wave is a signal, which is used for trans of audio or video. Mainly these signals are trans over telephone lines. Two basic operations are performed by the Modem :

1)     Conversion of data from digital to analog form

2)     Conversion of data from analog to digital form

Modulation is classified into :

1)     Amplitude : In this technique, amplitude of the carrier wave is constant from source to destination to avoid attenuation of a signal. Amplitude is  voltage between 2 consecutive peaks. It is peak-to-peak voltage.

2)     Frequency : In this, frequency of the carrier wave is constant from source to destination in order to maintain speed of trans. It is no of cycles per second. It is calculated in terms of wavelength (lamda). Wavelength is the distance between 2 consecutive peaks. Frequency & wavelength are inversely  promotional to wavelength.

3)     Phase modulation : In this technique amplitude as well as frequency of carrier wave is constant from source to destination. Phase Modulation is also called as Shift Key.

 

Components Of Modem :

1)     PC Interface : It is interface between PC & Modulator circuit, which connects PC & modem together. It trans signals from PC to Modem & vice versa. It also performs conversion of data from analog to digital & vice versa.

2)     Modulator Demodulator Circuit : It performs modulation of signals. Mainly it is based on frequency modulation in order to achieve max trans rate.

3)     Line Interface : It is interface between modulation circuit & telephone line. It connects telephone with modem with the help of twisted pair cables. It transmits modulated signals over telephone lines.

 

Network Loadable Modules [NLM]

These are the programs which are used to improve performance of the n/w. These modules are loaded at the time of installation of Netware O/S. NLM are classified into following :

1)     LAN Driver : It is NIC & related proxy for installation of NIC. It makes communication between w/s & other peripherals available on the n/w. e.g. Ethernet, Arch net, Token Ring

2)     Disk Driver : It controls communication between HDD (File Server or Database Server) & other peripherals of the n/w.

3)     Management Utilities & System Application Program : Utilities are the program which are executed whenever particular Netware Command is not applicable. These utilities are Syscon, Session, Filler, Pconsole.

4)     Name Spacing Module : These are the program which allow the user to assign different names for files & folders under Non-DOS environment.

5)     Netware Command Files : These are 2 Netware commands files which play an important role during execution of Netware. These files are autoexec.ncf & startup.ncf. Autoexec.ncf is used for configuration of the n/w. Startup.ncf is used for checking connectivity with the IPX. These files are used as batch files i.e. autoexec is executes first & then startup.

NETWORK DIRECTORY STRUCTURE

                                    SYSTEM

                                       |

----------------------------------------------------------------------------------------

 |                            |                 |                       |                        |              |

SYSTEM        Public           Login              Email             ETC Deleted/Saved

--------      ------           -----              -----                ---         -------------

Sys files     Utilities      Log files           Message             Overall      Re-Cycle Bin

diagnostic        |          & user files        in the form       configuration   All Del FIles

Program       Syscon                             of text files     of n/w &

              Session                                              components

              Filler                                               of n/w

              PConsole

              FConsole

              Monitor

------------------------------------------------------------------------------------------------

 

Server types

* File

* Print

* Application

* Message

* DataBase

      * Proxy

 

System Fault Tolerance

Level I :

i)                    Directory Duplicate structure

ii)                  Read After Write Verification

iii)                Hot Fix

 

Level II :

i)                    Transaction Tracking System

ii)                  Disk Mirroring

iii)                Disk Duplexing

 

Level III :

i)                    Server Link Model

 

SFT features of Netware :

SFT is a basic feature of Netware with which if one component of the n/w goes bad, then Netware replaces the same component without disturbing normal operation. It is classified into 3 levels.

 

Level I : This level id further divided into :

1)     Directory Duplicating Structure : This fault is related with the track of the disk drive. Care is taken by Netware at the time of storing the file on the respective track i.e. at the time of storing, the same file is copied on the another sector of the disk in compressed form & this information available in FAT.  While retrieving the file from the original track is corrupted then the same file is retrieved from the other plotter of the disk where it was stored in compressed form.

2)     Read After Write Verification : Netware performs read operations for each write operation by default. It is for confirmation at the file whether it is completely stored or not.

3)     Hot Fix : It is the area available on the disk which is not directly accessible to the user. This area created at the time of installation of Netware & is of 25% of the total disk capacity. At the time of storing the file , if related track goes bad, then the file is diverted to the Hot Fix area & the same file is retrieved from it.

 

Level II :

1)     transaction Tracking System [TTS] : It is mainly related to the loading of files from the DataBase. While loading , if power failure occurs then the some files are loaded on the disk & other files are not stored from the Database. When TTS is applicable, either all files are loaded on the disk with the UPS back up or not a single is loaded from the Database without TTS

2)     Disk Mirroring : In this 2 HD are connected to the single IDE in Master or Slave fashion i.e. terminator of the flat cable is connected to the Master HDD & second connector of the flat cable is connected to the Slave HDD. For this connectivity, it needs jumper setting i.e. Pin No 1 & 2 is connected with the jumper for the Master drive and plug 3 & 4  is connected for the Slave drive. Suppose Master drive goes down, then control will be governed by Slave drive which stored mirror image of all the files from Master drive.

3)     Disk Duplixing : For duplexing 2 separate IDE connectors are used which are linked with 2HDD in PNP fashion i.e. IDE1 is connected to HDD1 & 2 is connected to Second HDD. Out of these 2 controllers, if 1 goes bad then the data is retrieved from other HDD as another controller which taken charge of the controller which goes bad. For PNP connectivity extra h/w setup is not required.

4)     UPS Monitoring : UPS back up play important role during TTS i.e. while loading the files from the Database. If power goes off then the supply is given with the UPS in order to load, removing files from the Database.

 

Level III : It is related to the failure of a Server. For this minimum 2 Servers are linked for a n/w. If 1 Server  goes down, then the second Server takes control over the n/w without disturbing normal operations of the n/w.

 

Filler

Filler is used to view info about the dir & files.

Following options are available with it :

1) Current Directory information : It gives info about current dir i.e. home dir

to the user. Following info is avilable :

   i) Name of Dir

   ii) Date of creation

   iii) Name of the Owner

   iv) Size of the Dir

   v) Attributes

   vi) Effective Rights

   vii) Date of Archieving

 

2) Change Current Dir : User can view info about different with this option.

It also gives following permissions to the user to perform file operations

such as :

   i) File copy

   ii)File delete

For this first of all file is selected from the dir. File related info is given

to the user by seletcting the perticular file.From the window select file operation

E.g. In case of file copy; from operation select copy the window, with which it

will ask for destination path, where the file is to be copied, type the path in the window

& press enter. With which file copy operation is preformed.

 

3) File : This option is used for confirmation of files related oeration performed

in the  previous option.Under this following info is avilable :

   i)  Confirmation of file copy operation[Yes/No]

   ii)     "        "   "   deletion operation [Yes/No]

   iii)------- " -------- overwritting [Yes/No]

 

Set dir attributes  : H,S,N,P

Set effectice rights : R,W,M,C,A,F etc.

 

Volume information : Show info about the volume related to the current dir.

   i)  Name of Volume

   ii) Size "   "   [in Kb]

   iii)Free space available on the volume

   iv) No. of directories shown on the volume

 

Network Drives

 

These are classified into 3 types :

1)     Physical Drive : These are physically present on n/w i.e. HDD, FDD, CD

2)     Logical Drive : These are the drives which are logically access by partitioning HDD into no. of segments. Each segment represents specific logical drive. These are represented from F to Z. These are total 21 logical drive on the n/w.

3)     Search Drives : These are represented in the reverse manner of logical drives i.e. Z to K. Z = Z1, Y = Z2, X = Z3 …… & so on (upto Z16). These drives are used for locating particular directory or which is store or logical drive.