INSTRUCTOR GUIDE
Education
This document should only be used by a Novell-certified instructor.
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
The Novell Guide to Network + (Volume 1)
COURSE 1400
The Novell
®
Guide to Network
+
TM
Volume 1
100-004484-001
Revision 1.0
Proprietary Statement
Copyright © Novell, Inc. 1999. All rights reserved.
No part of this publication may be reproduced, photocopied, stored on a retrieval
system, or transmitted without the express prior consent of the publisher. This
manual, and any portion thereof, may not be copied without the express written
permission of Novell, Inc.
Novell, Inc.
1555 North Technology Way
Orem, Utah 84097-2399
Disclaimer
Novell, Inc. makes no representations or warranties with respect to the contents or
use of this manual, and specifically disclaims any express or implied warranties of
merchantability or fitness for any particular purpose.
Further, Novell, Inc. reserves the right to revise this publication and to make changes
in its content at any time, without obligation to notify any person or entity of such
revisions or changes.
Further, Novell, Inc. makes no representations or warranties with respect to any
NetWare software, and specifically disclaims any express or implied warranties of
merchantability or fitness for any particular purpose.
Further, Novell, Inc. reserves the right to make changes to any and all parts of
NetWare software at any time, without obligation to notify any person or entity of
such changes.
This Novell Training Manual is published solely to instruct students in the use of
Novell networking software. Although third-party application software packages are
used in Novell training courses, this is for demonstration purposes only and shall not
constitute an endorsement of any of these software applications.
Further, Novell, Inc. does not represent itself as having any particular expertise in
these application software packages and any use by students of the same shall be
done at the students’ own risk.
Software Piracy
Throughout the world, unauthorized duplication of software is subject to both criminal
and civil penalties.
If you know of illegal copying of software, contact your local Software Antipiracy
Hotline.
For the Hotline number for your area, access Novell’s World Wide Web page at
and look for the piracy page under “Programs.”
Or, contact Novell’s anti-piracy headquarters in the U.S. at 800-PIRATES (747-2837)
or 801-861-7101.
Trademarks
Novell, Inc. has attempted to supply trademark information about company names,
products, and services mentioned in this manual. The following list of trademarks
was derived from various sources.
Novell, Inc.
NetWare, the N-Design, and Novell are registered trademarks of Novell, Inc. in the
United States and other countries. The NetWare Logotype (teeth logo) is a
trademark of Novell, Inc.
Application Launcher is a trademark of Novell, Inc.
AppNotes is a trademark of Novell, Inc.
BorderManager is a trademark of Novell, Inc.
Certified Novell Administrator, Certified Novell Engineer, and CNA are service marks
of Novell, Inc.
Client 32 is a trademark of Novell, Inc.
CNA (Certified Novell Administrator) and CNI (Certified Novell Instructor) are service
marks of Novell, Inc. CNE is a registered service mark of Novell, Inc. in the United
States and other countries. Master CNE is a trademark of Novell, Inc.
ConsoleOne is a trademark of Novell, Inc.
GroupWise is a registered trademark of Novell, Inc. in the United States and other
countries.
Hot Fix is a trademark of Novell, Inc.
Internetwork Packet Exchange and IPX are trademarks of Novell, Inc.
intraNetWare Client is a trademark of Novell, Inc.
IntranetWare Client is a trademark of Novell, Inc.
IPX and IPX/SPX are trademarks of Novell, Inc.
LANalyzer is a registered trademark of Novell, Inc. in the United States and other
countries. LANalyzer Agent is a trademark of Novell, Inc.
Link Support Layer and LSL are trademarks of Novell, Inc.
ManageWise is a registered trademark of Novell, Inc. in the United States.
Multiple-Link Interface Driver and MLID are trademarks of Novell, Inc.
NDPS is a registered trademark of Novell, Inc. in the United States and other
countries. Novell Distributed Print Services is a trademark of Novell, Inc.
NE1000 and NE2000 are trademarks of Novell, Inc.
NEAP (Novell Education Academic Partner) is a service mark of Novell, Inc.
NetSync is a trademark of Novell, Inc.
NetWare 2, NetWare 3, NetWare 3.12, NetWare 4, NetWare 5, and NetWare/IP are
trademarks of Novell, Inc.
NetWare Application Manager is a trademark of Novell, Inc.
NetWare Core Protocol and NCP are trademarks of Novell, Inc.
NetWare DOS Requester is a trademark of Novell, Inc.
NetWare Expert is a trademark of Novell, Inc.
NetWare Link Services Protocol and NLSP are trademarks of Novell, Inc.
NetWare Loadable Module and NLM are trademarks of Novell, Inc.
NetWare Management Agent is a trademark of Novell, Inc.
NetWare Management Map is a trademark of Novell, Inc.
NetWare MultiProtocol Router (MPR) is a trademark of Novell, Inc.
NetWare Name Service is a trademark of Novell, Inc.
NetWare Peripheral Architecture is a trademark of Novell, Inc.
NetWire is a registered service mark of Novell, Inc.
Novell Application Launcher is a trademark of Novell, Inc.
Novell Authorized Education Center and NAEC are service marks of Novell, Inc.
Novell Client is a trademark of Novell, Inc.
Novell Directory Services is a registered trademark of Novell, Inc. NDS is a
trademark of Novell, Inc.
Novell Labs is a trademark of Novell, Inc.
Novell Network Registry is a service mark of Novell, Inc.
Novell Press is a trademark of Novell, Inc. in the United States.
Novell Storage Services is a trademark of Novell, Inc.
Novell Support Connection is a trademark of Novell, Inc.
Novell Technical Services is a service mark of Novell, Inc.
Novell Technical Support is a service mark of Novell, Inc.
Open Data-Link Interface and ODI are trademarks of Novell, Inc.
Packet Burst is a trademark of Novell, Inc.
Remote Console is a trademark of Novell, Inc.
RX-Net and RX-Net/2 are trademarks of Novell, Inc.
Sequenced Packet Exchange and SPX are trademarks of Novell, Inc.
SFT III is a trademark of Novell, Inc.
snAppShot is a trademark of Novell, Inc.
Storage Management Services and SMS are trademarks of Novell, Inc.
Transaction Tracking System is a trademark of Novell, Inc.
Virtual Loadable Module (VLM) is a trademark of Novell, Inc.
VLM is a trademark of Novell, Inc.
Z.E.N.works is a trademark of Novell, Inc.
Other Trademarks
286, 386, and 486 are trademarks of Intel Corporation.
386Max is a registered trademark of Qualitas Corporation.
3Com is a registered trademark of 3Com Corporation.
3M is a registered trademark of Minnesota Mining and Manufacturing Company.
Acrobat and Adobe are registered trademarks of Adobe Systems Incorporated.
Adaptec is a registered trademark of Adaptec, Inc.
Advanced Peer-to-Peer Networking is a registered trademark of International
Business Machines Corporation.
AltaVista is a trademark of Digital Equipment Corporation.
America Online is a registered service mark of America Online, Inc.
AMP is a registered trademark of AMP, Inc.
Apple, AppleShare, AppleTalk, EtherTalk, LocalTalk, and TokenTalk are registered
trademarks of Apple Computer, Inc.
ARCnet is a registered trademark of Datapoint Corporation.
AT is a registered trademark of International Business Machines Corporation.
AT&T is a registered trademark of AT&T Corporation.
ATM is a registered trademark of Adobe Systems Incorporated.
AUSTPAC is a registered trademark of Telstra Corporation.
AutoCAD is a registered trademark of AutoDESK, Inc.
Castelle is a registered trademark of Silicon Valley Bank.
CheckIT is a registered trademark of Touchstone Software Corporation.
Compaq is a registered trademark of Compaq Computer Corporation.
CompuServe is a registered trademark of CompuServe Incorporated.
Corporate Systems Center is a trademark of Computer Performance, Inc.
Datapac is a registered trademark of BCE, Inc.
DATASHOW is a registered trademark of Sayett Technology, Inc.
DEC, DECnet, and LAT are trademarks of Digital Equipment Corporation.
Digital Equipment Corporation is a registered trademark of Digital Equipment
Corporation.
DR DOS is a registered trademark of Caldera, Inc. in the United States and other
countries.
DynaText is a registered trademark of Electronic Book Technologies, Inc.
EtherExpress is a trademark of Intel Corporation.
EtherLink II is a registered trademark of 3Com Corporation.
GTE is a registered trademark of GTE Corporation.
Hewlett Packard and HP are registered trademarks of Hewlett-Packard Company.
IBM and IBM-AT are registered trademarks of International Business Machines
Corporation. XT is a trademark of International Business Machines Corporation.
IBM is a registered trademark of International Business Machines Corporation.
Infinite Technologies is a registered trademark of Infinite Technologies, Inc.
Intel is a registered trademark of Intel Corporation. Intel386 and Intel486 are
trademarks of Intel Corporation.
Java is a registered trademark of Sun Microsystems, Inc. in the United States and
other countries.
JavaSoft is a registered trademark of Sun Microsystmes, Inc.
JetDirect and LaserJet are registered trademarks of Hewlett-Packard Company
JetPress and LANPress are registered trademarks of Silicon Valley Bank.
JetXPrint is a registered trademark of Digital Products, Inc.
KDD is a registered trademark of KDD Network Systems Co., Ltd.
LANdecoder is a trademark of Infoseek Corporation.
LANDesk is a registered trademark of Intel Corporation.
LANSchool is a registered trademark of Lan Fan Technologies.
LaserJet is a registered trademark of Hewlett-Packard Company.
Macintosh is a registered trademark of Apple Computer, Inc.
Micro Channel is a registered trademark of International Business Machines
Corporation.
Micro House Technical Library is a trademark of Micro House International, Inc.
Microdyne is a trademark of Microdyne Corporation.
Micropolis is a registered trademark of Micropolis Corporation.
Microsoft and MS-DOS are registered trademarks of Microsoft Corporation.
NEC is a registered trademark of NEC Corporation.
NetBasic is a registered trademark of High Technology SoftWare Corporation
NetDirector is a registered trademark of UB Networks.
NetLens is a trademark of Telecommunications Techniques Corporation.
NetPort is a registered trademark of Intel Corporation.
NETPrint is a registered trademark of Digital Products, Inc.
Netscape and Netscape Navigator are registered trademarks of Netscape
Communications Corporation. Netscape Communicator and Netscape FastTrack
are trademarks of Netscape Communications Corporation.
NetView is a registered trademark of International Business Machines Corporation.
Network Driver Interface Specification and NDIS are trademarks of PC Plus
Communications LP.
NTT is a registered trademark of Nippon Telegraph and Telephone Corporation.
Ontrack Data Recovery is a trademark of Ontrack Data International, Inc.
OpenView is a registered trademark of Hewlett-Packard Company.
OS/2 is a registered trademark of International Business Machines Corporation.
Pentium is a registered trademark of Intel Corporation.
Persuasion is a registered trademark of Adobe Systems Incorporated.
PhoneNet is a registered trademark of Farallon Computing, Inc.
PostScript is a registered trademark of Adobe Systems Incorporated.
PowerPC is a trademark of International Business Machines Corporation.
PS/2 is a registered trademark of International Business Machines Corporation.
PSS is a registered trademark of British Telecom.
QEMM is a registered trademark and QEMM386 is a trademark of Quarterdeck
Office Systems.
Quantum is a registered trademark of Quantum Corporation.
SCSI Express is a registered trademark of Security Control Systems, Inc.
Seagate is a registered trademark of Seagate Technology, Inc.
SideKick is a registered trademark of Borland International, Inc.
SMC is a registered trademark of Standard Microsystems Corporation.
Sniffer is a trademark of Network General Corporation.
Software Shopper is a registered trademark of Falsoft, Inc.
SprintNet is a restered trademark of Sprint Communications Company L.P.
Stacker is a registered trademark of Stac Electronics.
Sun Microsystems is a registered trademark of Sun Microsystems, Inc.
SunNet Manager is a trademark of Sun Microsystems, Inc.
Support Group is a trademark of Support Group, Inc.
System 7 is a trademark of Apple Computer, Inc.
Total Recall is a registered trademark of Total Recall, Inc.
Transpac is a registered trademark of France Telecom Transpac.
TrueType is a registered trademark of Apple Computer, Inc.
Tymnet is a registered trademark of MCI Telecommunications Corporation.
UNIX is a registered trademark in the United States and other countries, licensed
exclusively through X/Open Company, Ltd.
UnixWare is a registered trademark of The Santa Cruz Operation, Inc. in the US and
other countries.
Windows and Windows NT are registered trademarks of Microsoft
Corporation.Windows 95 and Windows 98 are trademarks of Microsoft Corporation.
WordPerfect is a registered trademark of Corel Corporation Limited in the US and
other countries.
Xerox is a registered trademark of Xerox Corporation.
Yahoo! is a trademark of Yahoo!, Inc.
All other products not listed are the property of their respective owners.
Revision 1.0 This document should only be used by a Novell-certified instructor. IG TOC-ix
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Contents
Contents
Preparation and Setup
Agenda ....................................................................................... IG Prep-1
Classroom Requirements ........................................................... IG Prep-3
Classroom Setup ........................................................................ IG Prep-4
Setting Up the NetWare Server............................................. IG Prep-4
Set up Basic Novell Internet Access Services (NIAS)........... IG Prep-5
Set Up NIAS Remote Access Password Security ................. IG Prep-7
Setting Up the Lab Workstations........................................... IG Prep-7
Creating the Student Boot Diskettes ..................................... IG Prep-8
Using the Course Animations ..................................................... IG Prep-9
Using Presentation Graphics...................................................... IG Prep-9
Displaying the Graphics ...................................................... IG Prep-10
Printing the Graphics........................................................... IG Prep-10
Introduction
Introduction..................................................................................IG Intro-3
Prerequisites and Audience.........................................................IG Intro-3
Certification Test..........................................................................IG Intro-3
Course Overview .........................................................................IG Intro-3
Exercises .....................................................................................IG Intro-5
Using the Course Animations ......................................................IG Intro-5
System Requirements ...........................................................IG Intro-7
Viewing the Animations .........................................................IG Intro-7
Section 1 Basic Networking Knowledge
Basic Networking Knowledge ........................................................... IG 1-3
Objectives......................................................................................... IG 1-3
Exercise 1-1: Pre-Test...................................................................... IG 1-5
Define Computer Networking ........................................................... IG 1-9
Contrast the Features of the Computing Models.............................. IG 1-9
Computing Models and Network Development ........................... IG 1-9
What Would You Do?................................................................ IG 1-15
IG TOC-x This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
The Novell Guide to Network + (Volume 1)
Compare Local Area Network (LAN) and Wide Area Network
(WAN)............................................................................................. IG 1-17
Local Area Networks ................................................................. IG 1-19
Wide Area Networks.................................................................. IG 1-19
Identify Basic Networking Elements and Describe the Roles of
Clients, Servers, Peers, Transmission Media, and Protocols......... IG 1-23
Required Network Elements...................................................... IG 1-23
What Would You Do?................................................................ IG 1-31
Exercise 1-2: Computer Networking Review .................................. IG 1-33
Identify the Functions and Features of the Five Basic Network
Services.......................................................................................... IG 1-35
Common Network Services....................................................... IG 1-35
Describe Network File Services...................................................... IG 1-39
File Transfer .............................................................................. IG 1-39
File Storage and Data Migration................................................ IG 1-41
File Update Synchronization ..................................................... IG 1-43
Exercise 1-3: File Services Review ................................................ IG 1-47
Describe Network File Services...................................................... IG 1-49
Providing Multiple Access from Limited Interfaces.................... IG 1-51
Handling Simultaneous Requests (Queuing) ............................ IG 1-53
Distributed Print Services .......................................................... IG 1-55
Sharing Specialized Equipment ................................................ IG 1-55
Exercise 1-4: Print Services Review............................................... IG 1-57
Describe Network Message Services............................................. IG 1-59
Electronic Mail ........................................................................... IG 1-61
Integrated Mail Services............................................................ IG 1-61
Workgroup Applications ............................................................ IG 1-61
Exercise 1-5: Message Services Review ....................................... IG 1-63
Describe Network Application Services.......................................... IG 1-65
Specialization of Servers........................................................... IG 1-65
Scalability and Growth............................................................... IG 1-67
Exercise 1-6: Application Services Review .................................... IG 1-69
Describe Network Database Services ............................................ IG 1-71
Distributed Data......................................................................... IG 1-71
Replication................................................................................. IG 1-73
What Would You Do?................................................................ IG 1-77
Exercise 1-7: Database Services Review....................................... IG 1-81
Revision 1.0 This document should only be used by a Novell-certified instructor. IG TOC-xi
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Contents
Identify the Difference Between Centralized and Distributed
Network Architectures .................................................................... IG 1-83
Centralized versus Distributed Network Services...................... IG 1-83
What Would You Do?................................................................ IG 1-87
Exercise 1-8: Designing Network Services..................................... IG 1-89
Define the Term Transmission Media as it Relates to Computer
Networks......................................................................................... IG 1-93
Identify the Appropriate Transmission Media to Meet a Stated
Business Need ............................................................................... IG 1-97
Common Computer Network Transmission Media.................... IG 1-97
Cable Media ............................................................................ IG 1-101
Cable Transmission Media Comparison ................................. IG 1-141
Exercise 1-9: Implementing Cable Media..................................... IG 1-143
Wireless Media ............................................................................. IG 1-147
Radio Wave............................................................................. IG 1-149
Microwave ............................................................................... IG 1-167
Infrared Light ........................................................................... IG 1-175
Wireless Media Comparison ................................................... IG 1-183
Exercise 1-10: Implementing Wireless Media .............................. IG 1-185
What Would You Do? ................................................................... IG 1-189
Exercise 1-11: Transmission Media Review................................. IG 1-191
Identify Network Connectivity Devices and Their Functions......... IG 1-195
Transmission Media Connectors............................................. IG 1-197
Network Interface Boards........................................................ IG 1-199
Modems................................................................................... IG 1-205
Repeaters................................................................................ IG 1-209
Hubs ........................................................................................ IG 1-211
Bridges .................................................................................... IG 1-217
Multiplexers ............................................................................. IG 1-221
What Would You Do?.............................................................. IG 1-223
Identify Internetwork Connectivity Devices and Their
Functions ...................................................................................... IG 1-223
Internetwork Connectivity Devices .......................................... IG 1-223
What Would You Do?.............................................................. IG 1-231
Exercise 1-12: Connectivity Device Review ................................. IG 1-233
Exercise 1-13: Post-Test .............................................................. IG 1-239
Summary ...................................................................................... IG 1-249
IG TOC-xii This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
The Novell Guide to Network + (Volume 1)
Section 2 The Physical Layer
The Physical Layer ........................................................................... IG 2-3
Objectives......................................................................................... IG 2-3
Exercise 2-1: Pre-Test...................................................................... IG 2-5
Identify Why Rules Are Needed in Computer Networks................... IG 2-7
Identify the Seven Layers of the OSI Reference Model and How
the Layers Interact............................................................................ IG 2-9
Layers.......................................................................................... IG 2-9
Layer Interaction within the Same Stack ................................... IG 2-13
Layer Interaction between Different Stacks............................... IG 2-15
Layer Data Links ....................................................................... IG 2-17
Identify the Relationship between the OSI Reference Model and
Computer Network Protocols.......................................................... IG 2-19
Exercise 2-2: Network Protocols and Models Review .................... IG 2-23
Identify the Basic Purpose of the OSI Physical Layer .................... IG 2-25
List the Characteristics of the Two Common Connection Types
Used in Computer Networks........................................................... IG 2-29
Point-to-Point Connections........................................................ IG 2-31
Multipoint Connections .............................................................. IG 2-33
Describe the Five Common Physical Topologies Used in
Computer Networks........................................................................ IG 2-35
Bus Topology ............................................................................ IG 2-39
Ring Topology ........................................................................... IG 2-45
Star Topology ............................................................................ IG 2-49
Mesh Topology.......................................................................... IG 2-53
Cellular Topology ...................................................................... IG 2-59
Identify the Difference between Digital and Analog Signals ........... IG 2-65
Signal Encoding ........................................................................ IG 2-65
List the Ways a Digital Signal Can Be Manipulated to Represent
Data ................................................................................................ IG 2-69
Measuring a Digital Signal......................................................... IG 2-71
List the Ways an Analog Signal Can Be Manipulated to
Represent Data .............................................................................. IG 2-73
Amplitude .................................................................................. IG 2-75
Frequency ................................................................................. IG 2-75
Phase ........................................................................................ IG 2-77
Current State Analog Encoding................................................. IG 2-79
State Transition Analog Encoding ............................................. IG 2-81
Revision 1.0 This document should only be used by a Novell-certified instructor. IG TOC-xiii
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Contents
Identify the Ways That Bit Synchronization Can Be
Achieved......................................................................................... IG 2-83
Asynchronous............................................................................ IG 2-85
Synchronous ............................................................................. IG 2-85
Identify the Two Bandwidth Use Methods and Explain How
Multiplexing Can Be Used in Each ................................................. IG 2-89
Baseband .................................................................................. IG 2-91
Broadband................................................................................. IG 2-91
Multiplexing ............................................................................... IG 2-93
Exercise 2-3: OSI Physical Layer Review .................................... IG 2-103
Exercise 2-4: Post-Test ................................................................ IG 2-105
Summary ...................................................................................... IG 2-113
Section 3 The OSI Data Link Layer
The OSI Data Link Layer .................................................................. IG 3-3
Objectives......................................................................................... IG 3-3
Exercise 3-1: Pre-Test...................................................................... IG 3-5
Identify the Basic Purpose of the OSI Data Link Layer .................... IG 3-9
Identify the Characteristics of the Two Logical Topologies ............ IG 3-15
Identify the Characteristics of the Three Media Access
Methods.......................................................................................... IG 3-19
Contention Systems .................................................................. IG 3-23
Token-Passing Systems............................................................ IG 3-27
Polling Systems......................................................................... IG 3-31
Describe How Addresses are Defined and Managed at the
Data Link Layer .............................................................................. IG 3-35
Describe the Transmission Synchronization Techniques used
at the Data Link Layer .................................................................... IG 3-39
Asynchronous Transmission ..................................................... IG 3-41
Synchronous Transmission ....................................................... IG 3-45
Isochronous Transmission ........................................................ IG 3-47
Describe the Connection Services Implemented at the Data
Link Layer ....................................................................................... IG 3-49
LLC-Level Flow Control............................................................. IG 3-53
Error Control.............................................................................. IG 3-57
Exercise 3-2: OSI Data Link Layer Review .................................... IG 3-59
IG TOC-xiv This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
The Novell Guide to Network + (Volume 1)
Describe the IEEE 802.x Series Standards.................................... IG 3-61
Mapping the IEEE 802.x Protocols to the OSI Reference
Model......................................................................................... IG 3-61
The IEEE 802.x Protocols ......................................................... IG 3-63
Describe the IEEE 802.3 Standard and Ethernet ........................... IG 3-67
IEEE 802.3 and Ethernet Physical Layer Standards................. IG 3-69
IEEE 802.3 Media Access......................................................... IG 3-69
Ethernet Network Design .......................................................... IG 3-73
Describe the IEEE 802.3u Fast Ethernet Standard ........................ IG 3-83
Physical and Logical Topologies ............................................... IG 3-85
Media Independent Interface (MII) ............................................ IG 3-85
Auto Negotiation........................................................................ IG 3-85
Media Access Control (MAC) Specification............................... IG 3-87
Fast Ethernet Network Design .................................................. IG 3-87
Fast Ethernet Repeaters ........................................................... IG 3-89
Describe the IEEE 802.5 and Token Ring Standard ...................... IG 3-91
IEEE 802.5 Network Design...................................................... IG 3-91
IEEE 802.5 Token Ring Media Access ..................................... IG 3-95
Describe the Fiber Distributed Data Interface (FDDI)
Standard ......................................................................................... IG 3-99
FDDI and IEEE 802.5.............................................................. IG 3-101
FDDI Network Design.............................................................. IG 3-101
FDDI Media Access................................................................. IG 3-107
Exercise 3-3: Lower Layer Protocols Review ............................... IG 3-109
Describe Commonly Used WAN Protocols .................................. IG 3-111
The Serial Line IP Protocols (SLIP) and
Point-to-Point (PPP) ................................................................ IG 3-111
The Point-to-Point Tunneling Protocol (PPTP)........................ IG 3-115
Recommendation X.25............................................................ IG 3-117
Frame Relay............................................................................ IG 3-119
ISDN and B-ISDN.................................................................... IG 3-123
ATM......................................................................................... IG 3-125
Exercise 3-4: Post-Test ................................................................ IG 3-131
Summary ...................................................................................... IG 3-141
Section 4 The OSI Network Layer
The OSI Network Layer .................................................................... IG 4-3
Objectives......................................................................................... IG 4-3
Revision 1.0 This document should only be used by a Novell-certified instructor. IG TOC-xv
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Contents
Exercise 4-1: Pre-Test...................................................................... IG 4-5
Identify the Basic Purpose of the OSI Network Layer .................... IG 4-11
Network Layer Processes and Methods.................................... IG 4-13
Identify the Uses of the Addresses Defined at the Network
Layer............................................................................................... IG 4-17
Logical Network Address........................................................... IG 4-19
Service Address ........................................................................ IG 4-19
Identify the Characteristics of the Three Switching Methods.......... IG 4-23
Circuit Switching........................................................................ IG 4-25
Message Switching ................................................................... IG 4-27
Packet Switching ....................................................................... IG 4-31
Identify the Characteristics of the Two Route Discovery
Methods.......................................................................................... IG 4-37
Distance Vector Method ............................................................ IG 4-39
Link-State Method ..................................................................... IG 4-41
Identify the Characteristics of the Two Route Selection
Methods.......................................................................................... IG 4-43
Dynamic Route Selection .......................................................... IG 4-45
Static Route Selection ............................................................... IG 4-45
Identify the Characteristics of Network Layer Connection
Services.......................................................................................... IG 4-47
Network Layer Flow Control ...................................................... IG 4-49
Network Layer Error Control...................................................... IG 4-51
Network Layer Packet Sequence Control ................................. IG 4-53
Identify the Basic Purpose of Gateway Services............................ IG 4-55
Exercise 4-2: Network Layer Review.............................................. IG 4-59
Describe Why Connectivity Devices are Needed on
Networks......................................................................................... IG 4-61
Describe the Function of Ethernet and Token Ring
Repeaters ....................................................................................... IG 4-65
Describe the Function of Bridges ................................................... IG 4-67
The 80/20 Rule.......................................................................... IG 4-71
Three Types of Bridges ............................................................. IG 4-73
IG TOC-xvi This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
The Novell Guide to Network + (Volume 1)
Explain How a Transparent Bridge Works...................................... IG 4-73
Filtering Database ..................................................................... IG 4-75
Bridge Port States ..................................................................... IG 4-77
Relay Entity ............................................................................... IG 4-79
Building the Filtering Database, Step 1 ..................................... IG 4-83
Building the Filtering Database, Step 2 ..................................... IG 4-85
Building the Filtering Database, Step 3 ..................................... IG 4-87
Bridging Loops .......................................................................... IG 4-89
Explain How a Source Routing Bridge Works ................................ IG 4-95
Route Determination ................................................................. IG 4-97
Explain How Switching Hubs Work ................................................ IG 4-99
Classifying Switches................................................................ IG 4-103
Virtual LANs ............................................................................ IG 4-107
Describe How Token Ring Switches Work ................................... IG 4-111
Benefits of Token Ring Switches............................................. IG 4-113
Disadvantage of Token Ring Switches.................................... IG 4-115
Exercise 4-3: Reviewing Bridges and Switches ........................... IG 4-117
Describe Routing Protocols .......................................................... IG 4-119
Routing Example ..................................................................... IG 4-121
Building the Routing Database................................................ IG 4-127
Routing Protocols and Algorithms ........................................... IG 4-129
Distance Vector Routing.......................................................... IG 4-131
Link State Routing ................................................................... IG 4-137
Load Balancing........................................................................ IG 4-139
Describe Combination Devices .................................................... IG 4-143
Brouters................................................................................... IG 4-143
Combination Switching Hub and Router ................................. IG 4-143
Identify Nonroutable Protocols and How to Deal With Them ....... IG 4-145
Comparing Bridges, Switches, and Routers................................. IG 4-149
Advantages of Routers Over Bridges and Switches ............... IG 4-151
Advantages of Bridges and Switches Over Routers ............... IG 4-153
Determining Which Technology to Implement......................... IG 4-155
Exercise 4-4: Comparing Bridges, Switches, and Routers........... IG 4-157
Exercise 4-5: Selecting Connectivity Devices for a Network ........ IG 4-159
Exercise 4-6: Post-Test ................................................................ IG 4-161
Summary ...................................................................................... IG 4-171
Revision 1.0 This document should only be used by a Novell-certified instructor. IG TOC-xvii
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Contents
Section 5 OSI Transport Layer
OSI Transport Layer ......................................................................... IG 5-3
Objectives......................................................................................... IG 5-3
Exercise 5-1 Pre-Test....................................................................... IG 5-5
Identify the Purpose of the OSI Transport Layer .............................. IG 5-7
Identify Address/Name Resolution Methods Used at the
Transport Layer .............................................................................. IG 5-11
Identify the Addresses Used at the Transport Layer ...................... IG 5-15
Identify the Primary Functions of Segment Development .............. IG 5-19
Identify the Connection Services Used at the Transport
Layer............................................................................................... IG 5-23
End-to-End Flow Control ........................................................... IG 5-25
End-to-End Error Control........................................................... IG 5-25
Segment Sequencing ................................................................ IG 5-27
Exercise 5-2: Post-Test .................................................................. IG 5-29
Summary ........................................................................................ IG 5-33
Section 6 Upper Layers of the OSI Model
Upper Layers of the OSI Model ........................................................ IG 6-3
Objectives......................................................................................... IG 6-3
Exercise 6-1: Pre-Test...................................................................... IG 6-5
Identify the Purpose of the OSI Session Layer................................. IG 6-7
Identify the Characteristics of the Three Dialog Control
Methods.......................................................................................... IG 6-11
Simplex Dialog .......................................................................... IG 6-13
Half-Duplex Dialog .................................................................... IG 6-15
Full-Duplex Dialog ..................................................................... IG 6-17
Identify the Elements of Session Administration ............................ IG 6-19
Connection Establishment......................................................... IG 6-21
Data Transfer ............................................................................ IG 6-21
Connection Release .................................................................. IG 6-21
Exercise 6-2: OSI Session Layer.................................................... IG 6-23
Identify the Purpose of the OSI Presentation Layer ....................... IG 6-25
IG TOC-xviii This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
The Novell Guide to Network + (Volume 1)
Identify the Characteristics of the Translation Methods
Implemented at the Presentation Layer.......................................... IG 6-29
Bit Order Translation ................................................................. IG 6-31
Byte Order Translation .............................................................. IG 6-33
Character Code Translation ...................................................... IG 6-33
File Syntax Translation.............................................................. IG 6-37
Exercise 6-3: OSI Presentation Layer Review ............................... IG 6-39
Identify the Purpose of the OSI Application Layer.......................... IG 6-41
Identify the Characteristics of the Two Service Advertisement
Methods Used at the Application Layer.......................................... IG 6-43
Identify the Characteristics of the Service Use Methods Used
at the Application Layer .................................................................. IG 6-47
OS Call Interception .................................................................. IG 6-49
Remote Operation ..................................................................... IG 6-49
Collaborative Computing ........................................................... IG 6-49
Exercise 6-4: OSI Application Layer Review .................................. IG 6-51
Exercise 6-5: Post-Test .................................................................. IG 6-53
Summary ........................................................................................ IG 6-59
Revision 1.0 This document should only be used by a Novell-certified instructor. IG Prep-1
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Preparation and Setup
Preparation and Setup
Use this section to help you prepare for and set up the course.
Prerequisites
Students should have the following prerequisite knowledge:
■
Experience with DOS
■
Working knowledge of Windows 95
or Windows NT
■
Working knowledge personal computer hardware
Audience
This course is for students interested in gaining the Network+
certification sponsored by CompTIA.
Agenda
This is a five-day course.
Day 1
Day 2
Activity Duration
Course Introduction 00:15
Section 1: Basic Networking
Knowledge
04:00
Section 2: Physical Layer 03:00
Activity Duration
Section 3: Data Link Layer 03:30
Section 4: Network Layer 04:00
IG Prep-2 This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
The Novell Guide to Network + (Volume 1)
Day 3
Day 4
Day 5
Activity Duration
Section 5: Transport Layer 00:45
Section 6: The Upper OSI Layers 01:30
Section 7: TCP/IP Fundamentals 03:00
Section 8: The TCP/IP Protocol
Suite and Utilities
02:00
Activity Duration
Section 9: Implementing the
Network
07:00
Activity Duration
Section 10: Network Security 01:00
Section 11: Implementing Remote
Connectivity
02:30
Section 12: Maintaining the
Network
01:00
Section 13: Troubleshooting the
Network
01:30
Revision 1.0 This document should only be used by a Novell-certified instructor. IG Prep-3
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Preparation and Setup
Classroom
Requirements
The following table identifies the basic hardware and software needs for
this course. Instructions for classroom setup follow.
Setup Requirements
Classroom Level 2 Novell classroom (see http://
education.novell.com/chaninfo/
classreq.evy)
NetWare 5
Server 1 server
Hardware A Pentium
computer, with 64 MB RAM, a
2 GB hard disk, a modem, and CD drive
Software NetWare 5
Workstations 1 workstation for the instructor
Hardware Pentium computer with 64 MB RAM, a
2 GB hard disk, a CD drive, a modem, and
a connection to a large-screen monitor at
the front of the classroom
Software Windows 98 and Novell Client
Lab Workstations 7 lab workstations: 1 for instructor, 6 for
students
Hardware Pentium computers, each with
■
32 MB RAM
■
1 GB SCSI hard disk
■
1 GB EIDE hard disk
■
Network interface board (not integrated
with the PC system board)
■
CD drive (optional)
■
Modem
Software DOS 6.22, Novell COMCHECK, Windows
98, and Novell Client
Other Hardware For the labs in Section 10:
■
1 8-port Ethernet hub
■
1 spool of Category 5 network cable
■
14 RJ-45 connectors
■
1 RJ-45 crimping tool (2 or more
recommended)
■
6 analog telephone lines
Table Prep-1: Classroom Requirements
IG Prep-4 This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
The Novell Guide to Network + (Volume 1)
Classroom Setup
Network setup can take several hours. Be sure to allow adequate time
not only to set up the hardware and software, but also to test the setup.
As part of your testing, perform the hands-on exercises to ensure that the
structure you have created will allow students to successfully complete
the exercises.
Be sure to test your workstation display software (such as LANSchool)
with all NetWare programs that you plan to demonstrate. Some display
software is not compatible with some NetWare programs, particularly
NLMs such as INSTALL or NWCONFIG.
To set up the classroom, you
■
Set up the NetWare server
■
Set up basic Novell Internet Access SErvices (NIAS)
■
Set up NIAS remote access password security
■
Set up the lab workstations
■
Create student boot diskettes
Setting Up the NetWare Server
1. Install the NetWare 5 operating system, using the following:
❍
Server name:
FS1
❍
Tree name:
EMA_TREE
2. During installation, create and mount the following volumes:
❍
SYS
(at least 750 MB)
❍
DATA
(at least 250 MB)
❍
MAIL
(at least 250 MB)
3. Configure the server for IPX and IP.
4. Create the following objects:
❍
An organization object named
EMA
.
❍
In EMA, an organizational unit object named
NYC
.
❍
In NYC, an organizational unit object named
CORP
.
5. Place the server object and all volume objects in
CORP.NYC.EMA
.
6. Place an
Admin
object having the password of
novell
in the
CORP.NYC.EMA
context.
Revision 1.0 This document should only be used by a Novell-certified instructor. IG Prep-5
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Preparation and Setup
7. Install the following options:
❍
Storage Management Services
❍
Novell Internet Access Services
8. When server installation is complete, create a user object for each
student in the CORP.NYC.EMA container.
Set up Basic Novell Internet
Access Services (NIAS)
After server installation is complete, set up Novell Internet Access
Services by completing the following at the server console.
1. Load
NIASCFG.NLM
.
2. Transfer driver commands by pressing
Enter.
3. Select
Yes
.
4. Press
Enter.
5. Bring down the server.
6. Restart the server at the DOS prompt by entering
SERVER
.
7. Load NIASCFG.NLM.
8. Select
Configure NIAS
.
9. Select
Remote Access
.
10. Authenticate to EMA_TREE.
11. When prompted “Do You Want Instructions,” select
Yes
.
12. Read the instructions, which provide an overview of the configuration
process, and press
Esc
when complete.
13. Select
Yes
to confirm exit.
14. Press
Enter
to begin the setup process.
15. When prompted “Do You Have Any Synchronous Adaptors,” select
No
.
You will configure an asynchronous modem for remote client access.
16. Press
Enter
to load and define an AIO port.
17. Scroll down to the Serial Port (COMx) entry and press
Enter.
18. When the console reports that the driver was loaded successfully,
press
Enter
.
19. When prompted “Do you need to load more AIO drivers,” select
No
.
If you had additional modems on other ports you might say yes.
20. Ensure your modem is connected to the server’s COM port and that
the modem is turned on.
IG Prep-6 This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
The Novell Guide to Network + (Volume 1)
21. When you are ready for NIAS to look for your modem, press
Enter
.
22. Ensure that NIAS found a modem on a licensed port; if not, select
Try
Modem Discovery Again
to repeat this process.
23. Press
Enter
to continue the exercise.
24. If prompted, select
Yes
to auto-detect modem types.
Due to the number of modem models and types, auto-detection does
not always succeed. If NIAS succeeded, proceed to the next step.
Otherwise, complete the following
❍
Press
Enter
to continue if NIAS reports it cannot determine the
modem type.
❍
Press
Enter
again to display a list of modem types.
❍
Scroll and select your modem.
25. Select
PPPRNS
.
26. Select
IP
.
27. Enter a valid
IP address
.
28. Ensure the subnet mask is set to the proper value.
29. Enable Header Compression by selecting
Yes
.
30. If your design specified using dynamic IP address assignment, select
Yes
to specify a client range.
31. Enter a range of valid IP addresses on the same network as specified
in the Local IP Address field.
32. Press
Esc
and select
Yes
to save changes; do not enter a secondary
client address range.
33. Select
IPX
.
34. Enter a unique
IPX address
.
35. Press
Enter
to activate the changes.
36. Press
Esc
and select
Yes
to save changes.
37. Press
Esc
and
Yes
to save current settings to a file.
38. Read the message stating that the current configuration will be
activated.
Any active connections will be lost.
39. Press
Enter
to continue; wait for reinitialization to complete.
40. Press
Alt + Esc
to return to the Remote Access Configuration screen.
41. When prompted “Do You Want to Start This Service Now,” select
Yes
.
This will start PPPRNS.
42. Press
Esc
to complete the basic NIAS Remote Access configuration;
then read the security note that states that all users can access all
ports and services at all times.
Revision 1.0 This document should only be used by a Novell-certified instructor. IG Prep-7
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.
Preparation and Setup
Set Up NIAS Remote Access
Password Security
1. Press
Enter
to continue.
2. Select
Configure Security
.
3. Select
Set Remote Client Password Restrictions
.
4. Set parameters to ensure secure access to your organization.
5. Select
Enable Long Password
.
This setting allows passwords of up to 16 bytes instead of 8 bytes.
Legacy NetWare Connect servers do not support long passwords.
6. Set Maximum Invalid Login Attempts to no more than 3.
A value of -1 allows unlimited attempts.
7. Press
Esc
and select
Yes
to save changes
8. Select
Set User Remote Client Password
.
9. Select a
user
or group from the tree.
10. Enter a password and confirm the password.
If you do not set up a password, users must use their password set
up in NDS.
11. Press Esc.
12. Inspect all other choices available and if necessary set parameters to
support special security needs for your organization.
13. Press Esc.
Your server can now accept modem calls from remote clients.
Setting Up the Lab
Workstations
In Section 9, students build workstations and connect them to a
classroom network. Course requirements call for 7 lab workstations.
Students will work in pairs to build 6 workstations. The remaining lab
workstation is used by the instructor for demonstrations.
Complete the following:
1. Remove all partitions on hard disk drives.
2. Remove all hard disks from the lab workstations.
3. Remove the network boards from the lab workstations.