Network Protocol Basics

Windows 95 network protocols are implemented as 32-bit, protected-mode VxDs that offer high performance and use no conventional memory. Windows 95 can support multiple protocols simultaneously, and protocol stacks can be shared among the installed network clients. For example, the IPX/SPX-compatible protocol can support both Client for NetWare Networks and Client for Microsoft Networks. The following protocols are included with Windows 95.

Microsoft IPX/SPX-compatible protocol.

This protocol is compatible with the Novell NetWare Internetwork Packet Exchange/Sequential Packet Exchange (IPX/SPX) implementation. Windows 95 includes both 32-bit, protected-mode and real-mode support for this protocol. This protected-mode protocol provides the following benefits:

Microsoft TCP/IP.

This is a complete implementation of the standard, routable Transmission Control Protocol/Internet Protocol (TCP/IP) protocol. Windows 95 includes only protected-mode support for this protocol. Microsoft TCP/IP provides the following benefits:

Microsoft NetBEUI.

This protocol is compatible with existing networks that use NetBIOS extended user interface (NetBEUI), including Windows for Workgroups peer networks, Windows NT Server, LAN Manager, and other networks, and includes support for a NetBIOS programming interface. Windows 95 provides both protected-mode and real-mode support for this protocol.

NetBEUI was first introduced by IBM in 1985, when it was assumed that LANs would be segmented into workgroups of 20 to 200 computers and that gateways would be used to connect one LAN segment to other LAN segments or to a mainframe. NetBEUI is optimized for high performance when used in departmental LANs or LAN segments. Microsoft NetBEUI under Windows 95 is completely self-tuning and provides much better performance over slow links than did earlier versions of NetBEUI.

All three protocols are Plug and Play-compliant, so they can be loaded and unloaded automatically. For example, if a PCMCIA network adapter is removed from the computer so that the network is no longer available, the protocols are unloaded automatically after any dependent applications have been notified.