Misplaced Pages

NetworkManager

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

NetworkManager is a daemon that sits on top of libudev and other Linux kernel interfaces (and a couple of other daemons) and provides a high-level interface for the configuration of the network interfaces.

#274725

105-445: NetworkManager is a software utility that aims to simplify the use of computer networks . NetworkManager is available for Linux kernel -based and other Unix-like operating systems . To connect computers with each other, various communications protocols have been developed, e.g. IEEE 802.3 (Ethernet), IEEE 802.11 ("wireless"), IEEE 802.15.1 (Bluetooth), PPPoE , PPPoA , and many many more. Each participating computer must have

210-477: A Value Line report on Novell Data Systems as a whole during this period, their "revenue was minimal, but expenses were tremendous." Davis was fired from Novell Data Systems in November 1981. In order to compete on systems sales, Novell Data Systems planned a program to link more than one microcomputer to operate together. The current or former BYU students Drew Major , Dale Neibaur, and Kyle Powell, known as

315-589: A client–server model . File and print services ran on the NetWare Core Protocol (NCP) over IPX, as did Routing Information Protocol (RIP) and Service Advertising Protocol (SAP). Starting in 1987, Novell began selling its own Ethernet -based network adapter cards . These included the 8-bit NE1000 , and then in 1988, the 16-bit NE2000 . They priced them lower than cards from competitors such as 3Com , whose card Novell had previously been distributing. By 1989, Novell's cards were being sold at

420-756: A protocol stack , often constructed per the OSI model, communications functions are divided up into protocol layers, where each layer leverages the services of the layer below it until the lowest layer controls the hardware that sends information across the media. The use of protocol layering is ubiquitous across the field of computer networking. An important example of a protocol stack is HTTP (the World Wide Web protocol) running over TCP over IP (the Internet protocols) over IEEE 802.11 (the Wi-Fi protocol). This stack

525-444: A $ 1.5-billion stock swap that would have been the largest deal in the software industry to that time. But it collapsed the following month: when Lotus head Jim Manzi refused to give Novell an equal number of seats on the new board, Noorda pulled out shortly before the deal would have been completed. At its high point around 1993, NetWare had a roughly two-thirds share of the market for network operating systems; one analysis put

630-451: A blow-away-the-competition type product". Overall, NetWare 3 was the most significant rewrite that the product would ever get, and proved very successful. By 1990, Novell had an almost monopolistic position in NOS for any business requiring a network. There were competitor companies in the same space, such as Corvus Systems , Banyan Systems , and LANtastic , but none of them made much of

735-492: A branch of computer science , computer engineering , and telecommunications , since it relies on the theoretical and practical application of the related disciplines. Computer networking was influenced by a wide array of technological developments and historical milestones. Computer networks enhance how users communicate with each other by using various electronic methods like email, instant messaging, online chat, voice and video calls, and video conferencing. Networks also enable

840-557: A central manager for all the network configuration information becomes more essential. NetworkManager has two components: Both components are intended by the developers to be reasonably portable, and the applet is available to desktop environments which implement the Freedesktop.org System Tray Protocol, including GNOME, KDE Plasma Workspaces, Enlightenment (software) and Xfce . As the components communicate via D-Bus, applications can be written to be “ link -aware”, or to replace

945-401: A computer network can include personal computers , servers , networking hardware , or other specialized or general-purpose hosts . They are identified by network addresses and may have hostnames . Hostnames serve as memorable labels for the nodes and are rarely changed after initial assignment. Network addresses serve for locating and identifying the nodes by communication protocols such as

1050-548: A dent in Novell's business. Microsoft tried on two early occasions to take on Novell in networking, first with the MS-NET product and then with LAN Manager , but both failed badly. IBM similarly had limited success in this area. From 1988 to 1992, Novell's revenues rose almost three-fold, to $ 933 million a year, with about half of Novell's sales coming from North America and half from overseas. Earnings also rose to $ 249 million

1155-485: A direct challenge to Microsoft. Noorda was motivated in part by a realization that NetWare's technology was not suitable as the basis for a full-fledged operating system and application platform. There was also enmity between the two companies and the two CEOs, stemming in part from merger talks between Noorda and Microsoft head Bill Gates that had begun in 1989 and been on-and-off for the next couple of years before breaking down for good. Subsequently, Novell had played

SECTION 10

#1732798478275

1260-478: A discounted rate, as Novell "looked the other way"; this helped fund the salaries of Novell Field Support Technicians, who for the most part were employees who worked for the front line resellers as Novell CNE (Certified NetWare Engineers). Noorda commented that this strategy was one he learned as an executive at General Electric when competing against imported home appliances: allow the resellers to "make more money off your product than someone else's". Unusually for

1365-503: A diverse set of networking capabilities. The protocols have a flat addressing scheme. They operate mostly at layers 1 and 2 of the OSI model. For example, MAC bridging ( IEEE 802.1D ) deals with the routing of Ethernet packets using a Spanning Tree Protocol . IEEE 802.1Q describes VLANs , and IEEE 802.1X defines a port-based network access control protocol, which forms the basis for the authentication mechanisms used in VLANs (but it

1470-486: A former carpet warehouse located in an obscure industrial park down the road from the largely vacant Geneva Steel works. By November 1980, they were placing display ads in the classifieds pages of Utah Valley newspapers, seeking to hire hardware and software engineers and other staff. At first the company began to grow rapidly. By mid-1981 the company was selling two products, the Nexus Series microcomputer and

1575-450: A four-year span. By September 1993, BusinessWeek was writing, "Of the many rivalries in the personal-computer industry, for sheer nastiness it's hard to beat the one between Microsoft Corp. and Novell Inc." In November 1993, Noorda confirmed published reports that he had been suffering from some memory lapses and announced that he would be stepping down from the CEO position once a successor

1680-640: A high-ranking Novell executive, and played an influential strategic and managerial role with the company over the next several years. Excelan was based in San Jose, California , and they, along with a couple of prior Novell acquisitions, formed the basis for Novell's presence in Silicon Valley going forward. A key software introduction came in 1989 with the release of NetWare 386 , also known as NetWare 3.0 , which gave NetWare more modern architectural qualities, in conjunction with new capabilities in

1785-440: A large, congested network into an aggregation of smaller, more efficient networks. A router is an internetworking device that forwards packets between networks by processing the addressing or routing information included in the packet. The routing information is often processed in conjunction with the routing table . A router uses its routing table to determine where to forward packets and does not require broadcasting packets which

1890-399: A long period of decline. Eventually Novell acquired SUSE Linux and attempted to refocus its technology base. Despite building or acquiring several new kinds of products, Novell failed to find consistent success and never regained its past dominance. The company was an independent corporate entity until it was acquired as a wholly owned subsidiary by The Attachmate Group in 2011. Attachmate

1995-399: A looming challenge from Microsoft's upcoming Windows NT operating system, which, after a huge investment of resources from Microsoft, featured bundled networking and more advanced OS capabilities and looked to be that company's first offering that could seriously challenge Novell's local area networking franchise. Under Noorda, Novell made a series of acquisitions interpreted by many to be

2100-440: A multi-port bridge. Switches normally have numerous ports, facilitating a star topology for devices, and for cascading additional switches. Bridges and switches operate at the data link layer (layer 2) of the OSI model and bridge traffic between two or more network segments to form a single local network. Both are devices that forward frames of data between ports based on the destination MAC address in each frame. They learn

2205-432: A network, but the topology of interconnections of a network can significantly affect its throughput and reliability. With many technologies, such as bus or star networks, a single failure can cause the network to fail entirely. In general, the more interconnections there are, the more robust the network is; but the more expensive it is to install. Therefore, most network diagrams are arranged by their network topology which

SECTION 20

#1732798478275

2310-479: A possible legal response from Apple, so the company went directly to Apple starting Star Trek in February 1992, a project to run an x86-port of their Mac OS on top of a multitasking DR DOS. Novell had already abandoned Digital Research's Multiuser DOS in 1992. The three former Master Value Added Resellers (VARs) DataPac Australasia , Concurrent Controls and Intelligent Micro Software could license

2415-485: A proprietary solution in this sense was disadvantageous and looked instead to the IBM PC as an alternative platform. Now called NetWare, the network operating system was ported to run on an IBM PC XT with an Intel 8086 processor and supported centralized, multitasking file and print services. By March 1984, Novell was putting out announcements about third-party products that worked with Novell NetWare. NetWare came on

2520-549: A rate of 20,000 per month, aggressively expanding Novell's market presence. At that point, Novell transferred the NE1000/NE2000 business to Anthem Electronics, the firm that had actually been making them, but the cards remained branded as Novell products. As author James Causey would later write, "NetWare deserves the lion's share of the credit for elevating PC-based local area networks from being cute toys to providing powerful, reliable, and serious network services. NetWare

2625-457: A repeater hub assists with collision detection and fault isolation for the network. Hubs and repeaters in LANs have been largely obsoleted by modern network switches. Network bridges and network switches are distinct from a hub in that they only forward frames to the ports involved in the communication whereas a hub forwards to all ports. Bridges only have two ports but a switch can be thought of as

2730-774: A role in keeping the Federal Trade Commission investigation into Microsoft going. Between 1991 and 1994, the Noorda-led Novell made this series of major acquisitions: Digital Research Inc. , producer of DR-DOS , to compete with Microsoft's MS-DOS ; Unix System Laboratories , holder of Unix operating system technology, to improve Novell's technology base versus Windows NT; Serius Corp. , maker of an advanced application development tool; and WordPerfect Corporation and Quattro Pro from Borland to provide personal productivity and group collaboration products. In all, Noorda acquired ten companies within

2835-710: A share. The sale brought Safeguard more than $ 5 million in cash, and Safeguard's ownership in Novell went from 51 percent down to 24 percent. Novell, Inc. began trading as an over-the-counter stock . The first Novell product was a proprietary hardware server based on the Motorola 68000 processor and using a star topology . This, with the network operating system (NOS) on it, was known as Novell S-Net , or ShareNet, and it achieved some visibility; by April 1983, advertisements were seen in trade publications for third-party software products which stated they were compatible with Novell ShareNet. The company realized that making

2940-427: A significant benefit. NetWare 3 supported interactions with Apple's Macintosh computers as well as with Unix -based workstations, thus enabling NetWare to expand upon file and print sharing towards accessing business-critical data within companies. This allowed NetWare to work with database products from companies such as Oracle Corporation and Sybase . An analyst for Dataquest said that NetWare 386 "is truly

3045-408: A similar situation existed for IBM and their Token Ring cards. It was due to this kind of industry vision that Noorda would become known as the "Father of Network Computing". From the first years of the new Novell's success, Noorda was credited in the press with forging that path. The company reflected aspects of Noorda's personal background, such as his Mormon religion , which brought about what

3150-403: A standard voice telephone line. Modems are still commonly used for telephone lines, using a digital subscriber line technology and cable television systems using DOCSIS technology. A firewall is a network device or software for controlling network security and access rules. Firewalls are inserted in connections between secure internal networks and potentially insecure external networks such as

3255-877: A transmission medium. Power line communication uses a building's power cabling to transmit data. The following classes of wired technologies are used in computer networking. Network connections can be established wirelessly using radio or other electromagnetic means of communication. The last two cases have a large round-trip delay time , which gives slow two-way communication but does not prevent sending large amounts of information (they can have high throughput). Apart from any physical transmission media, networks are built from additional basic system building blocks, such as network interface controllers , repeaters , hubs , bridges , switches , routers , modems, and firewalls . Any particular piece of equipment will frequently contain multiple building blocks and so may perform multiple functions. A network interface controller (NIC)

NetworkManager - Misplaced Pages Continue

3360-495: A variety of different sources, primarily to support circuit-switched digital telephony . However, due to its protocol neutrality and transport-oriented features, SONET/SDH also was the obvious choice for transporting Asynchronous Transfer Mode (ATM) frames. Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing and encodes data into small, fixed-sized cells . This differs from other protocols such as

3465-657: A virtual system of links that run on top of the Internet . Overlay networks have been used since the early days of networking, back when computers were connected via telephone lines using modems, even before data networks were developed. The most striking example of an overlay network is the Internet itself. The Internet itself was initially built as an overlay on the telephone network . Even today, each Internet node can communicate with virtually any other through an underlying mesh of sub-networks of wildly different topologies and technologies. Address resolution and routing are

3570-709: A wonderful job of farming distribution out. They train people who go out and train other people, and every time somebody gets trained, they get another Netware bigot, and make another dollar. They are getting paid to have people go out and be evangelists." The partnering approach also worked well in overseas markets, such as in Japan where Novell set up a subsidiary that major Japanese electronics firms invested in, or in South America and Eastern Europe where Novell set up authorized distributors. Under Ray Noorda's leadership, Novell provided upgrades to resellers and customers in

3675-501: A year. From 1986 to 1991, Novell's stock price climbed twelve-fold. With this market leadership, Novell began to acquire and build services on top of its NetWare operating platform. These services extended NetWare's capabilities with such products as NetWare for SAA and Novell multi-protocol router. However, Novell was also diversifying, moving away from its smaller users to target large corporations and wide area networks . A marketing and development alliance with IBM announced in 1991

3780-522: Is computer hardware that connects the computer to the network media and has the ability to process low-level network information. For example, the NIC may have a connector for plugging in a cable, or an aerial for wireless transmission and reception, and the associated circuitry. In Ethernet networks, each NIC has a unique Media Access Control (MAC) address —usually stored in the controller's permanent memory. To avoid address conflicts between network devices,

3885-470: Is a formatted unit of data carried by a packet-switched network . Packets consist of two types of data: control information and user data (payload). The control information provides data the network needs to deliver the user data, for example, source and destination network addresses , error detection codes, and sequencing information. Typically, control information is found in packet headers and trailers , with payload data in between. With packets,

3990-427: Is a set of computers sharing resources located on or provided by network nodes . Computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are made up of telecommunication network technologies based on physically wired, optical , and wireless radio-frequency methods that may be arranged in a variety of network topologies . The nodes of

4095-422: Is a virtual network that is built on top of another network. Nodes in the overlay network are connected by virtual or logical links. Each link corresponds to a path, perhaps through many physical links, in the underlying network. The topology of the overlay network may (and often does) differ from that of the underlying one. For example, many peer-to-peer networks are overlay networks. They are organized as nodes of

4200-566: Is also found in WLANs ) – it is what the home user sees when the user has to enter a "wireless access key". Ethernet is a family of technologies used in wired LANs. It is described by a set of standards together called IEEE 802.3 published by the Institute of Electrical and Electronics Engineers. Wireless LAN based on the IEEE 802.11 standards, also widely known as WLAN or WiFi, is probably

4305-478: Is an electronic device that receives a network signal , cleans it of unnecessary noise and regenerates it. The signal is retransmitted at a higher power level, or to the other side of obstruction so that the signal can cover longer distances without degradation. In most twisted-pair Ethernet configurations, repeaters are required for cable that runs longer than 100 meters. With fiber optics, repeaters can be tens or even hundreds of kilometers apart. Repeaters work on

NetworkManager - Misplaced Pages Continue

4410-412: Is inefficient for very big networks. Modems (modulator-demodulator) are used to connect network nodes via wire not originally designed for digital network traffic, or for wireless. To do this one or more carrier signals are modulated by the digital signal to produce an analog signal that can be tailored to give the required properties for transmission. Early modems modulated audio signals sent over

4515-430: Is stored in /etc/network/interfaces for Debian Linux distributions and its derivatives or ifcfg files in /etc/sysconfig/network-scripts/ for Fedora and its derivatives, and DNS -servers in /etc/resolv.conf . /etc/network/interfaces or /etc/sysconfig/network-scripts/ifcfg-* can define a static IP-address or dhclient to be used, and all kinds of VPN can be configured here as well. In case

4620-578: Is the map of logical interconnections of network hosts. Common topologies are: The physical layout of the nodes in a network may not necessarily reflect the network topology. As an example, with FDDI , the network topology is a ring, but the physical topology is often a star, because all neighboring connections can be routed via a central physical location. Physical layout is not completely irrelevant, however, as common ducting and equipment locations can represent single points of failure due to issues like fires, power failures and flooding. An overlay network

4725-557: Is the process of selecting network paths to carry network traffic. Routing is performed for many kinds of networks, including circuit switching networks and packet switched networks. Novell Novell, Inc. ( / n oʊ ˈ v ɛ l / ) was an American software and services company headquartered in Provo , Utah , that existed from 1980 until 2014. Its most significant product was the multi-platform network operating system known as Novell NetWare . Novell technology contributed to

4830-459: Is used between the wireless router and the home user's personal computer when the user is surfing the web. There are many communication protocols, a few of which are described below. The Internet protocol suite , also called TCP/IP, is the foundation of all modern networking. It offers connection-less and connection-oriented services over an inherently unreliable network traversed by datagram transmission using Internet protocol (IP). At its core,

4935-462: The Institute of Electrical and Electronics Engineers (IEEE) maintains and administers MAC address uniqueness. The size of an Ethernet MAC address is six octets . The three most significant octets are reserved to identify NIC manufacturers. These manufacturers, using only their assigned prefixes, uniquely assign the three least-significant octets of every Ethernet interface they produce. A repeater

5040-453: The Intel 386 processor. All the while it maintained its character as a dedicated network operating system rather than containing network capabilities as part of a general-purpose operating system. The NetWare kernel's ability to dynamically load and unload drivers was greatly appreciated by users and the ability to write NetWare Loadable Modules (NLMs) in the C programming language was also

5145-736: The Internet Protocol . Computer networks may be classified by many criteria, including the transmission medium used to carry signals, bandwidth , communications protocols to organize network traffic , the network size, the topology, traffic control mechanisms, and organizational intent. Computer networks support many applications and services , such as access to the World Wide Web , digital video and audio , shared use of application and storage servers , printers and fax machines , and use of email and instant messaging applications. Computer networking may be considered

5250-548: The Quattro Pro division of Borland . These moves did not work out, due to new technologies not fitting well with Novell's existing user base or being too late to compete with equivalent Microsoft products. NetWare began losing market share once Microsoft bundled network services with the Windows NT operating system and its successors. Despite new products such as Novell Directory Services and GroupWise , Novell entered

5355-500: The SuperSet Software group, were hired to this task and began consulting for Novell during 1981. They developed a multiplayer video game , Snipes . During the first calendar quarter of 1982, heavy costs continued to be incurred at Novell Data Systems, which resulted in management shuffles, organizational consolidations, and a significant layoff . Canova was fired and Jack Messman, representing Safeguard Scientifics,

SECTION 50

#1732798478275

5460-416: The bandwidth of the transmission medium can be better shared among users than if the network were circuit switched . When one user is not sending packets, the link can be filled with packets from other users, and so the cost can be shared, with relatively little interference, provided the link is not overused. Often the route a packet needs to take through a network is not immediately available. In that case,

5565-415: The CEO of a high-tech, emerging computer company, Noorda was nearing 70 years of age by the early 1990s. Furthermore, he was known for alienating high-level executives who might someday be in position to run the company. Stock market analysts were expressing concern that Noorda, whose personality was the basis for much of the company's culture, had no succession plan in place. At the same time, Novell faced

5670-512: The French word is either the masculine nouveau or the feminine nouvelle ). While future Brigham Young University professor and Eyring Research Institute (ERI) figure Dennis Fairclough was not a founder of Novell Data Systems, he did work with the company from its early days. A funding proposal was brought to Pete Musser , chairman of the board of Safeguard Scientifics, Inc. , a Pennsylvania-based, technology-focused venture capital firm that

5775-579: The Image 800 dot matrix printer . Orders began shipping during the second half of 1981. The computer product was based on the Zilog Z80 microprocessor and the CP/M operating system. The company subsequently did not do well. The microcomputer produced by the company was late to an increasingly crowded market and was noncompetitive in terms of performance when it did arrive. According to one paraphrase of

5880-440: The Internet protocol suite or Ethernet that use variable-sized packets or frames . ATM has similarities with both circuit and packet switched networking. This makes it a good choice for a network that must handle both traditional high-throughput data traffic, and real-time, low-latency content such as voice and video. ATM uses a connection-oriented model in which a virtual circuit must be established between two endpoints before

5985-574: The Internet. Firewalls are typically configured to reject access requests from unrecognized sources while allowing actions from recognized ones. The vital role firewalls play in network security grows in parallel with the constant increase in cyber attacks . A communication protocol is a set of rules for exchanging information over a network. Communication protocols have various characteristics. They may be connection-oriented or connectionless , they may use circuit mode or packet switching, and they may use hierarchical addressing or flat addressing. In

6090-536: The NetworkManager project in 2004 with the goal of enabling Linux users to deal more easily with modern networking needs, particularly wireless networking . NetworkManager takes an opportunistic approach to network selection, attempting to use the best available connection as outages occur, or as the user roams between wireless networks. It prefers Ethernet connections over “known” wireless networks, which are preferred over wireless networks with SSIDs to which

6195-524: The Novell group saw the Unixes of the day as being too hardware intensive, too large, and charging too much in license fees. They became convinced that Linux offered the best possible answer for the operating system component, and started building code towards that purpose, including contributing work on IPX networking for NetWare and Wine compatibility layer for Windows. Digital Research's FlexOS had been licensed to IBM for their 4690 OS in 1993 and

6300-528: The SuperSet group had produced was drawing considerable interest and Novell Data Systems was describing themselves as a company that made not just stand-alone microcomputers but also products for local area networking (LAN). The dual emphasis on hardware and software products continued for several months but continued to have troubled results, and in July 1982 another round of layoffs took place which resulted in

6405-718: The WordPerfect and Quattro Pro acquisitions closed in June 1994, it was the largest such deal in the software industry to that time; it made Novell the third-largest software company in the world, trailing only Microsoft and Computer Associates . Noorda retired from the chairman position and left Novell completely in November 1994, although he was still the largest shareholder of the company. At that point in time, Frankenberg became chairman as well. Novell acquired Digital Research for US$ 80 million in June 1991. The move

SECTION 60

#1732798478275

6510-627: The actual data exchange begins. ATM still plays a role in the last mile , which is the connection between an Internet service provider and the home user. There are a number of different digital cellular standards, including: Global System for Mobile Communications (GSM), General Packet Radio Service (GPRS), cdmaOne , CDMA2000 , Evolution-Data Optimized (EV-DO), Enhanced Data Rates for GSM Evolution (EDGE), Universal Mobile Telecommunications System (UMTS), Digital Enhanced Cordless Telecommunications (DECT), Digital AMPS (IS-136/TDMA), and Integrated Digital Enhanced Network (iDEN). Routing

6615-468: The association of physical ports to MAC addresses by examining the source addresses of received frames and only forward the frame when necessary. If an unknown destination MAC is targeted, the device broadcasts the request to all ports except the source, and discovers the location from the reply. Bridges and switches divide the network's collision domain but maintain a single broadcast domain. Network segmentation through bridging and switching helps break down

6720-483: The board and continued to represent the interests of Safeguard Scientifics, which was still majority owner in the new Novell. The new Novell started with around 15 employees. Noorda emphasized that the file server product acquired from Novell Data Systems would be the heart of what the new Novell would be doing. Later that same year, the company introduced its most significant product, the multi- platform network operating system (NOS), Novell NetWare . Funding for

6825-400: The company's potential. On January 25, 1983, the company was incorporated under the shortened name of Novell, Inc. In April 1983, the appointment of Noorda as president and CEO of Novell, Inc. was publicly announced. Noorda was a veteran executive of General Electric and the past CEO of several other companies and had garnered a reputation as a turn-around expert. Messman was chairman of

6930-768: The computing scene just as the IBM PC was emerging as a market force and applications such as the VisiCalc spreadsheet for the Apple II were showing what microcomputers could do for businesses. There was an immediate demand for local area networking that could make files and printers available across many PCs. In addition, the advent of the PC caused organizational changes within companies and enterprises and allowed Novell to find entryways into individual departments or regional facilities rather than having to convince upper management of

7035-405: The configuration has to be changed, DHCP -protocol goes a long way to do so automatically, without the user even noticing. But as we've transitioned from physically large servers to more portable hosts that may be plugged and unplugged (or moved from WiFi hotspot to WiFi hotspot) at the user's discretion, dynamic configurations (i.e., not stored in a static configuration file but taken from outside

7140-503: The early 1990s there were over half a million NetWare-based networks installed worldwide encompassing more than 50 million users. Novell was the second-largest maker of software for personal computers, trailing only Microsoft Corporation , and became instrumental in making Utah Valley a focus for technology and software development. During the early to mid-1990s, Noorda attempted to compete directly with Microsoft by acquiring Digital Research , Unix System Laboratories , WordPerfect , and

7245-416: The emergence of local area networks , which displaced the dominant mainframe computing model and changed computing worldwide. Under the leadership of chief executive Ray Noorda , NetWare became the dominant form of personal computer networking during the second half of the 1980s and first half of the 1990s. At its high point, NetWare had a 63 percent share of the market for network operating systems and by

7350-463: The employee count being reduced from 50 people to 30. At that time Safeguard reported that it would be writing down $ 3.4 million in losses due to Novell Data Systems' switch from being a hardware company to a software company. Throughout 1982 there were further management shuffles with other people being named president of the company. Major, Neibaur, and Powell continued to support Novell through their SuperSet Software group. As Major later said, "It

7455-622: The end of 1993. Besides Utah, Novell continued to grow in San Jose, where many of the sales, marketing, product management, and executive functions were located. Equally important as technological factors to NetWare's growth was that Novell did not try to hire a large sales force to do direct sales of the product, but instead sold it through a broad channel of some 13,000 value-added resellers . Such resellers provided network education, installation, and subsequent maintenance, and included CompUSA and Egghead Software for very small businesses all

7560-499: The figure at 63 percent. There were over half a million NetWare-based networks installed worldwide and some 55 million NetWare users on those networks. And networking itself was the fastest-growing segment of the computer market, increasing by 30 percent a year and reaching a $ 10 billion figure by 1993. Novell was the second largest maker of software for personal computers, trailing only Microsoft. Novell's employee base, which had been around 15 when Noorda joined, had risen to 4,335 by

7665-462: The first building there while work on a second building was already underway. Eventually between 1986 and 1993 six buildings would be constructed for Novell's use there. We don't even have an industry; we have to build an industry. Ray Noorda, 1985, Under Noorda, Novell embraced the notion of " coopetition ", or cooperative competition. The central idea was that whatever was good for networking in general would be good for Novell and took

7770-432: The form of encouraging the growth of an ecosystem composed of hundreds of suppliers of hardware and software networking products, even if some of those suppliers had products that competed with Novell's. 3Com , who had been an early competitor of Novell's, sold more instances of their Ethernet networking cards for use in conjunction with NetWare than they did for use with their own 3+Share network operating systems, and

7875-467: The host, and potentially changing after boot) have become a more prevalent configuration. Bootp was an early protocol used for this, and to this day its descendant DHCP is still very common. Many Unix-like systems include a program called dhclient to handle this dynamic configuration. Given a relatively static or simple dynamic configuration, static configuration modified by dhclient works well. However, as networks and their topologies get more complex,

7980-668: The literature as the physical medium ) used to link devices to form a computer network include electrical cable , optical fiber , and free space. In the OSI model , the software to handle the media is defined at layers 1 and 2 — the physical layer and the data link layer. A widely adopted family that uses copper and fiber media in local area network (LAN) technology are collectively known as Ethernet. The media and protocol standards that enable communication between networked devices over Ethernet are defined by IEEE 802.3 . Wireless LAN standards use radio waves , others use infrared signals as

8085-665: The means that allow mapping of a fully connected IP overlay network to its underlying network. Another example of an overlay network is a distributed hash table , which maps keys to nodes in the network. In this case, the underlying network is an IP network, and the overlay network is a table (actually a map ) indexed by keys. Overlay networks have also been proposed as a way to improve Internet routing, such as through quality of service guarantees achieve higher-quality streaming media . Previous proposals such as IntServ , DiffServ , and IP multicast have not seen wide acceptance largely because they require modification of all routers in

8190-415: The most well-known member of the IEEE 802 protocol family for home users today. IEEE 802.11 shares many properties with wired Ethernet. Synchronous optical networking (SONET) and Synchronous Digital Hierarchy (SDH) are standardized multiplexing protocols that transfer multiple digital bit streams over optical fiber using lasers. They were originally designed to transport circuit mode communications from

8295-729: The network. On the other hand, an overlay network can be incrementally deployed on end-hosts running the overlay protocol software, without cooperation from Internet service providers . The overlay network has no control over how packets are routed in the underlying network between two overlay nodes, but it can control, for example, the sequence of overlay nodes that a message traverses before it reaches its destination . For example, Akamai Technologies manages an overlay network that provides reliable, efficient content delivery (a kind of multicast ). Academic research includes end system multicast, resilient routing and quality of service studies, among others. The transmission media (often referred to in

8400-570: The new company was still an issue, and Musser contacted two Safeguard investors and brokers, Barry Rubenstein and Fred Dolan, who were with the Cleveland brokerage house Prescott, Ball and Turben, in these efforts. Rubenstein and Dolan eventually came up with the idea of a rights offering to Safeguard shareholders. Accordingly, in January 1985, Safeguard Scientifics made an initial offering of shares in Novell, Inc. to its own shareholders, at $ 2.50

8505-444: The packet is queued and waits until a link is free. The physical link technologies of packet networks typically limit the size of packets to a certain maximum transmission unit (MTU). A longer message may be fragmented before it is transferred and once the packets arrive, they are reassembled to construct the original message. The physical or geographic locations of network nodes and links generally have relatively little effect on

8610-520: The physical layer of the OSI model but still require a small amount of time to regenerate the signal. This can cause a propagation delay that affects network performance and may affect proper function. As a result, many network architectures limit the number of repeaters used in a network, e.g., the Ethernet 5-4-3 rule . An Ethernet repeater with multiple ports is known as an Ethernet hub . In addition to reconditioning and distributing network signals,

8715-736: The properties of a general-purpose operating system , NetWare was known for being very fast in operation. This trend continued into 1987 with the Advanced NetWare/286 release, which was well received within the industry. NetWare also excelled with respect to computer security considerations, supporting user- and group-based roles and volume- and file-level access restrictions, thus making it attractive to systems administrators. Novell based its network protocol on Xerox Network Systems (XNS), and created its own standards which it named Internetwork Packet Exchange (IPX) and Sequenced Packet Exchange (SPX). These protocols were based on

8820-456: The protocol suite defines the addressing, identification, and routing specifications for Internet Protocol Version 4 (IPv4) and for IPv6 , the next generation of the protocol with a much enlarged addressing capability. The Internet protocol suite is the defining set of protocols for the Internet. IEEE 802 is a family of IEEE standards dealing with local area networks and metropolitan area networks. The complete IEEE 802 protocol suite provides

8925-480: The provided applet entirely. One example is KNetworkManager, a KDE frontend to NetworkManager developed by Novell for SUSE Linux . Antti Kaijanmäki announced the development of a mobile broadband configuration assistant for NetworkManager in April 2008; it became available in NetworkManager version 0.7.0. Together with the package mobile-broadband-provider-info the connection is easily configured. Red Hat initiated

9030-458: The same packaging as a newly purchased copy of NetWare, but at one third the cost, which created a gray market that allowed NetWare resellers to sell upgrades as newly purchased NetWare versions at full price periodically, which Novell intentionally did not track. Noorda commented to several analysts that he devised this strategy to allow front line resellers to "punch through" the distributors like Tech Data and Ingram and acquire NetWare versions at

9135-482: The sharing of computing resources. For example, a user can print a document on a shared printer or use shared storage devices. Additionally, networks allow for the sharing of files and information, giving authorized users access to data stored on other computers. Distributed computing leverages resources from multiple computers across a network to perform tasks collaboratively. Most modern computer networks use protocols based on packet-mode transmission. A network packet

9240-446: The source code to take over and continue independent development of their derivations in 1994. By 1994, Corsair was a project run by Novell's advanced technology group that sought to put together a desktop metaphor with Internet connectivity and toward that end conducted research on how to better and more easily integrate and manage network access for users. At the time, the Internet was dominated by Unix-based operating systems, but

9345-502: The suitable hardware, e.g. network card or wireless network card and this hardware must be configured accordingly to be able to establish a connection. In case of a monolithic kernel all the device drivers are part of it. The hardware is accessed (and also configured) through its device driver by the configuration utility to configure the hardware, and programs like the web browser / SSH / NTP -client/etc. to send and receive network packets. On Linux and all Unix-like operating systems,

9450-482: The user has never connected. The user is prompted for WEP or WPA keys as needed. The NetworkManager project was among the first major Linux desktop components to utilize D-Bus and HAL extensively. Since June 2009, however, NetworkManager no longer depends on HAL, and since 0.9.10 (ca. 2014), neither does it require the D-Bus daemon to be running for root operation. Computer network A computer network

9555-618: The utilities ifconfig and the newer ip (from the iproute2 -bundle) are used to configure IEEE 802.3 and IEEE 802.11 hardware. These utilities configure the kernel directly and the configuration is applied immediately. After boot-up, the user is required to configure them again. To apply the same static configuration after each boot-up, the PID1-programs are used: System V init executes shell scripts and binary programs, systemd parses its own conf-files (and executes programs). The boot-up configuration for network interfaces

9660-494: The value of networking. Thus, Novell's timing was spot on. As the New York Times subsequently wrote, "Novell, in one of those instances of serendipity and visionary thinking that are the stuff of personal computer legend, found itself in the right place at the right time." Partly in consequence of its design of running at kernel level ring 0 without regard for separate or protected address spaces, and thus not having

9765-539: The way up to sophisticated systems integrators like Andersen Consulting and Electronic Data Systems for enterprise-level projects. In this way Novell constructed a local area network franchise in literal terms, as Novell Authorized Education Centers were set up on a franchising basis. Credentialization programs were in place, such that becoming a Certified NetWare Engineer was an important step, one that could be furthered with levels such as Master Certified NetWare Engineer . As one industry analyst said, "They've done

9870-500: The world." Nonetheless, in 1986 The Salt Lake Tribune was hailing Novell as another Utah success story in technology, likely to follow in the footsteps of Evans & Sutherland and Iomega . Novell was quickly outgrowing its original site in Orem, with some employees forced to work in trailers. A new, much larger site for the company was found in nearby Provo, Utah and construction was begun; by late 1986, employees were moving into

9975-417: Was also utilized for the in-house development of Novell's Embedded Systems Technology (NEST), but was sold off to Integrated Systems, Inc. (ISI) for US$ 3 million in July 1994. The deal comprised a direct payment of half this sum as well as shares representing 2% of the company. NEST however held importance for Frankenberg's vision of "pervasive computing", wherein Novell software would be connecting

10080-506: Was an offshoot of the older Safeguard Business Systems. Safeguard Scientifics believed that a new computer systems company could help the Business Systems company automate their accounting systems. Accordingly, Safeguard Scientifics provided over $ 2 million in seed funding, and they became the majority owner of Novell Data Systems. Canova also owned a significant portion of the new company. Novell Data Systems set up offices in

10185-529: Was co-founded by George Canova and Jack Davis, two experienced computer industry executives. While some later sources place the creation of Novell Data Systems as having happened in 1979, more contemporaneous sources are in accordance with it happening in August 1980. Canova became president of the new company and Davis was in charge of sales and marketing. The suggestion for the company's name came from Canova's wife, who thought it meant "new" in French (in fact

10290-579: Was found. In April 1994, former HP executive Robert Frankenberg was announced as the new CEO of Novell, with Noorda remaining as chairman of the board of directors. By then the USL acquisition was already showing difficulties, while the WordPerfect acquisition was questioned even more. Nonetheless, Frankenberg said he was enthusiastic about it: "For me, it was a pivotal item in my decision to join Novell because it makes possible an entirely new category of networked applications which no one else can provide." When

10395-509: Was great that our hardware was so lousy because that gave us the idea that hardware wasn't really where the value was." Two other important NDSI employees were strategist Craig Burton and communications specialist Judith Clarke. Despite its struggles, Novell Data Systems had a presence at the COMDEX show in Las Vegas in November 1982; a man named Ray Noorda saw it and become interested in

10500-408: Was named president. Seeing Snipes being played on three different types of personal computers persuaded Messman that SuperSet's networking technology was valuable. The poor performance of Novell Data Systems resulted in losses being announced in April 1982 for the publicly-held Safeguard Scientifics and put pressure on that company's stock price. However, by this point the computer-linking work that

10605-525: Was part of this initiative. The company did later attempt to refocus with NetWare for Small Business. It reduced investment in research and was slow to improve the product administration tools, although it was helped by the fact its products typically needed little "tweaking" – they just ran. By early 1985, Novell was rapidly expanding, but many people were still unaware of either it or the role that local area networks could play, and consequently Noorda referred to Novell as "the most misunderstood company in

10710-477: Was seen as a way for Novell to supply software for server-focused PCs in alternative to Microsoft. NetWare used DR DOS as a boot loader and maintenance platform, and Novell intended to extend its desktop presence by integrating networking into DR DOS and providing an alternative to Microsoft's Windows. At first, the idea was to provide a graphical environment based on Digital Research's GEM , but Novell's legal department rejected this due to apprehension of

10815-478: Was subsequently acquired in 2014 by Micro Focus International which was acquired in turn by OpenText in 2023. Novell products and technologies are now integrated within various OpenText divisions. The company began as Novell Data Systems Inc. ( NDSI ), a computer systems company located in Orem, Utah that intended to manufacture and market small business computers, computer terminals, and other peripherals. It

10920-665: Was termed "the Mormon work ethic" at Novell. As one account later put it, Novell was "reputedly staffed with lots of hard-selling but soft-drinking Mormons." Noorda himself was famous for his frugal ways and for working from a plain, small office. In 1989 senior executives Craig Burton and Judith Clarke, whom many credited for much of Novell's past success, left Novell. Burton had been seen as Noorda's most likely successor while Judith Clarke had been instrumental in marketing and positioning Novell. In April 1990, Novell and Lotus Development Corporation announced merger of equals based on

11025-518: Was the first Intel-based network operating system to provide a serious alternative to mainframe-based server networks, providing critical reliability and security features needed in the modern enterprise." Novell acquired Kanwal Rekhi 's company Excelan in 1989; Excelan manufactured smart Ethernet cards and commercialized the Internet protocol TCP/IP , solidifying Novell's presence in these areas. The acquisition combined Novell's $ 281 million in annual revenue with Excelan's $ 66 million. Rekhi became

#274725