Network Configration
Network Configration
There are two parts to the method by which computers connect with each other over cabling. The
first part is the data communication protocol, which specifies how workstations within a network
operating system (NOS) communicate. Each protocol is generally associated with a specific
These protocols divide data to be sent to another computer into small pieces, called Packets and
add a header and trailer that contain information about the sender, intended recipient, and so on.
This process is carried out by the networking software. The second part is the physical layer
protocol, such as Ethernet, token ring, ARCnet, or FDDI. These protocols add further
information in a header and trailer that determines which machine gets the packet next. This
The physical layer protocol surrounds the data communication protocol, which surrounds the
data. If a packet is sent from one protocol to another, the surrounding information must be
translated. Since the data communication protocols are inside the physical protocol converting
IPX/SPX
The IPX (Internetwork Packet Exchange) and SPX (Sequenced Packet Exchange) protocols are
Novell's native protocols. A node address is a hexadecimal number, up to eight digits long. This
number must be unique for each server and workstation. Each LAN also has an address called a
network address. With the implementation of the worldwide IPX internet, IPX addresses will be
assigned in much the same manner as TCP/IP addresses are for the UNIX-based internet.
TCP/IP
TCP/IP (Transmission Control Protocol/Internet protocol) is the standard Protocol in the UNIX
world. It was developed by the Department of Defense and is also the basis of the Internet,
Internet addresses are assigned by the InterNIC. If your TCP/IP network is not connected to the
internet and never will be, you can use any valid range of addresses.
Open System Interconnect (OSI). OSI is supposed to resolve the problems existing protocols
have with large WANs and high-traffic loads. However, implementation has been slow; existing
protocols are deeply entrenched, and most businesses are waiting until the OSI standard catches
on before they implement it, which won't happen until more businesses implement the Standard.
The OSI model describes standards for communication between network nodes at seven (7) level
layers.
7. Application Layer
6. Presentation Layer
5. Session Layer
4. Transport Layer
3. Network Layer
2. Datalink Layer
1. Physical Layer
This is the last layer of the OSI model but is the most important to understand. The application
layer identifies communication partners and the quality of service. It also handles user
authentication and privacy issues. Every function used in this layer is tailored to a specific
Different computers have different visual representations of data, and those differing visuals
need to be reconciled somehow. The presentation layer translates information from a device to a
format that can be read by the network and then to something that can be read by another
receiving device. All encryption happens on this level, which means it has the double purpose of
translating data and keeping it secure from machines that should not have access to the
Every application needs a protocol that connects it to other programs that are running at the same
time. The session layer handles all of these program interactions. You can think of it as a sort of
task manager for your network' handling all the communication and exchanges between different
programs.
The transport Layer
When information gets sent from one program or computer to another, the transport layer makes
sure that the data flow does not get interrupted. If an error does occur and data is disrupted, this
layer exists to properly report that error, recover the lost data, and re-establish the connection.
The network layer is the routing site for most network activity. This layer routes data and
transmits it from point to point along your network. It creates logical paths for information to
follow. These paths are also known as virtual circuits. This layer also handles network addresses,
This layer represents the starting point for most data that gets routed through the network. The
data link layer takes all data packets and encodes or decodes them into a language that the
network can understand and use. This layer has two sub-layers you should be aware of. The
Media Access Control, or MAC, sub-layer controls how a network gains permission to transmit
data. The Logical Link Control, or LLC, sub-layer manages frame synchronization, flow control,
Physical Layer
No matter how your information is transmitted, it always goes through physical hardware. The
physical layer manages the conversion from hardware to software, targeting the adaptation of
information into data. This layer includes all the electronics and mechanical parts of a network,
particularly routers and server controls. All information begins at the physical layers and then
passes through each of the layers listed above as it gets transmitted from place to place on your
network.