The Relationship of the Protocol Stack to the Operating System Last Update 2009.06.29 1.4.0 Copyright 2000-2009 Kenneth M. Chipps Ph.D. www.chipps.com.

Slides:



Advertisements
Similar presentations
CISCO NETWORKING ACADEMY Chabot College ELEC Address Resolution Protocol.
Advertisements

 As defined in RFC 826 ARP consists of the following messages ■ ARP Request ■ ARP Reply.
Copyright 2008 Kenneth M. Chipps Ph.D. Cisco CCNA Exploration CCNA 2 Routing Protocols and Concepts Chapter 4 Distance Vector Routing Protocols.
Copyright 2009 Kenneth M. Chipps Ph.D. Host Addressing Last Update
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 8 Address Resolution Protocol.
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
Lesson 15 – INSTALL AND SET UP NETWARE 5.1. Understanding NetWare 5.1 Preparing for installation Installing NetWare 5.1 Configuring NetWare 5.1 client.
Novell IPX Semester 3, Chapter 7 Allan Johnson. Novell IPX Overview Novell IPX is a proprietary suite of protocols that includes the following: A connectionless.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
Static Routing Last Update Copyright Kenneth M. Chipps Ph.D.
Troubleshooting methods. Module contents  Avaya Wireless tools  Avaya Wireless Client Manager  Avaya Wireless AP Manager  Hardware indicators  Non.
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
CISCO NETWORKING ACADEMY Chabot College ELEC ping & traceroute.
The OSI and TCP/IP Models Last Update Copyright 2009 Kenneth M. Chipps Ph.D.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Computer Communication and Networks Muhammad Waseem Iqbal Lecture # 07.
Connecting LANs, Backbone Networks, and Virtual LANs
How to Build a CAN Last Update Copyright Kenneth M. Chipps PhD 1.
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
Internet Setup in Microsoft Windows Windows Layering Bindings Adding Adapters, Protocols, and Clients TCP/IP Configuration.
Module 1: Reviewing the Suite of TCP/IP Protocols.
1 Computer Networks and Internets Spring 2005 Assistant Professor JainShing Liu.
Slow Web Site Problem Analysis Last Update Copyright 2013 Kenneth M. Chipps Ph.D. 1.
Network Layer – Subnetting and Control Protocols Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing,
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Unit 4, Lesson 11 How Data Travels the Internet
ICMP : Internet Control Message Protocol. Introduction ICMP is often considered part of the IP layer. It communicates error messages and other conditions.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
Frames Seen On Local Area Networks Last Update Copyright 2012 Kenneth M. Chipps Ph.D.
Copyright Kenneth M. Chipps Ph.D. PPP Last Update
Basic LAN techniques IN common with all other computer based systems networks require both HARDWARE and SOFTWARE to function. Networks are often explained.
CCNA 2 Week 8 TCP/IP Suite Error Control Messages.
Network Layer Last Update Copyright Kenneth M. Chipps Ph.D.
What Are Protocols Last Update Copyright Kenneth M. Chipps Ph.D.
Application Layer Last Update Copyright Kenneth M. Chipps Ph.D.
11 NETWORK CONNECTION HARDWARE Chapter 3. Chapter 3: NETWORK CONNECTION HARDWARE2 NETWORK INTERFACE ADAPTER  Provides the link between a computer and.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Addressing Through the Layers  Data Link Layer Address  Network Layer Address.
Voice Design Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
The Routing Table Last Update Copyright Kenneth M. Chipps Ph.D.
Route Redistribution Last Update Copyright 2012 Kenneth M. Chipps Ph.D.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Copyright 2008 Kenneth M. Chipps Ph.D. Controlling Flow Last Update
IP Telephone Lab 1 Connectivity Test IP Telephone Lab 2 Outline Ping & ICMP Fast Ping (fping) & AutoStatus One-Way Ping.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 8 Address Resolution Protocol.
MPLS Label Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Copyright Kenneth M. Chipps Ph.D. Ethernet Frame Format Last Update
Cisco 2 - Routers Perrine. J Page 112/19/2015 Chapter 8 TCP/IP Error Message Some of the conditions that must be met in order for host to host communication.
© 2002 Global Knowledge Network, Inc. All rights reserved. Windows Server 2003 MCSA and MCSE Upgrade Clustering Servers.
VLANs Last Update Copyright Kenneth M. Chipps Ph.D.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Copyright 2009 Kenneth M. Chipps Ph.D. Addressing in Networks Last Update
Module 16: Distributed System Structures Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 4, 2005 Distributed.
FDDI Last Update Copyright Kenneth M. Chipps Ph.D. 1.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Introduction to Ethernet In 1985, the Institute of Electrical and Electronics Engineers (IEEE) published standards for LANs. These standards start with.
CHAPTER -II NETWORKING COMPONENTS CPIS 371 Computer Network 1 (Updated on 3/11/2013)
Packet Over SONET Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
Some Network Commands n Some useful network commands –ping –finger –nslookup –tracert –ipconfig.
Lecture#6:Connectivity Verification
Semester 3, Chapter 7 Allan Johnson
Connectivity Verification
ICMP ICMP = Internet Control Message Protocol Layer 3
Hubs Bridges Switches Last Update
Lecture#7:Connectivity Verification
Chapter 5 Network and Transport Layers
Lecture#6:Connectivity Verification
Requirements Definition
Internet Control Message Protocol
Presentation transcript:

The Relationship of the Protocol Stack to the Operating System Last Update Copyright Kenneth M. Chipps Ph.D. 1

DOS v Windows What is an operating system It is the way the hardware talks to the human Some things are built into the OS Some things are not Things built-in include –Keyboard driver –Mouse driver Copyright Kenneth M. Chipps Ph.D. 2

DOS v Windows Things not built-in include –Network services You see deep underneath Windows is the original Microsoft operating system called DOS – Disk Operating System As such it does not understand network related commands Copyright Kenneth M. Chipps Ph.D. 3

In the Old Days In the old days you purchased a protocol stack It was not included with the OS It was not part of the OS Each one was slightly different Commonly one vendor’s version would not talk to another vendor’s version Copyright Kenneth M. Chipps Ph.D. 4

In the Old Days For example, to talk to the WAN where I worked at that time I had to use a version of TCP/IP called “LAN Workplace for DOS” from Novell To talk to some Token Ring hubs I had to use a version of TCP/IP called Chameleon from another company Each time I needed to talk to one or the other, I had to reboot Copyright Kenneth M. Chipps Ph.D. 5

In the Old Days This is why we love standards Standardization came along with Version 2 of the TCP/IP protocol stack for PCs The following is an example of how this was once done Copyright Kenneth M. Chipps Ph.D. 6

Load the OS C:\> Copyright Kenneth M. Chipps Ph.D. 7

Issue a TCP/IP Command C:\>ping Bad command or file name C:\> Note that nothing happens The OS does not know what to do The request for network services falls into the bit bucket Copyright Kenneth M. Chipps Ph.D. 8

DOS by Itself Copyright Kenneth M. Chipps Ph.D. 9

Surround DOS with a Redirector Copyright Kenneth M. Chipps Ph.D. 10

Surround DOS with a Redirector The redirector software surrounds DOS Any command issued to DOS is intercepted Those for DOS alone are passed onto DOS Those for network services are redirected to a device driver that can deal with such a command Copyright Kenneth M. Chipps Ph.D. 11

Load the Redirector C:\>lsl NetWare Link Support Layer v2.12 (940922) (C) Copyright Novell, Inc. All Rights Reserved. BUFFERS MEMPOOL 4096 The configuration file used was “C:\NET.CFG”. Max Boards 4, Max Stacks 6 Buffers 4, Buffer size 4176, Memory pool 4096 bytes. Copyright Kenneth M. Chipps Ph.D. 12

Issue a TCP/IP Command C:\>ping Bad command or file name C:\> Why does nothing happen now The redirector is loaded But there is nothing to pass the command to, yet Copyright Kenneth M. Chipps Ph.D. 13

Load the NIC driver C:\>ne2000 Novell NE2000 Ethernet MLID v1.54 (931123) (C) Copyright Novell, Inc. All Rights Reserved. Int 5, Port 300 Node Address B55 L Max Frame 1514 bytes Line Speed 10 Mbps Board 1, Frame ETHERNET_802.2, LSL mode Board 2, Frame ETHERNET_802.3, LSL mode Board 3, Frame ETHERNET_II, LSL mode Copyright Kenneth M. Chipps Ph.D. 14

Issue a TCP/IP Command C:\>ping Bad command or file name C:\> Why does nothing happen now The redirector is loaded The NIC driver is loaded But there is still nothing to pass the command to, yet Copyright Kenneth M. Chipps Ph.D. 15

Load TCPIP.EXE C:\>tcpip Novell TCP/IP Transport v5.0 ( ) (C) Copyright Novell, Inc. All Rights Reserved. Network Name: IP_NET Bind: NE2000 IP Address: Board Number: 3 Subnet Mask: Board Instance: 1 Default Router: FRAME: Ethernet_II Copyright Kenneth M. Chipps Ph.D. 16

Issue a TCP/IP Command C:\>ping Bad command or file name C:\> Everything is there Why doesn’t it work I forgot Now you have to go out and buy ping But DOS is ready Copyright Kenneth M. Chipps Ph.D. 17

TCP/IP with Windows TCP/IP is not built into the base OS, but added in For example Copyright Kenneth M. Chipps Ph.D. 18

TCP/IP in Windows Vista Copyright Kenneth M. Chipps Ph.D. 19

TCP/IP with Windows However at last ping is built in to the stack that’s loaded C:\>ping Pinging with 32 bytes of data: Reply from : bytes=32 time<10ms TTL=32 Ping statistics for : Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms C:\> Copyright Kenneth M. Chipps Ph.D. 20