26.11.2012 Views

Download PDF - IBM Redbooks

Download PDF - IBM Redbooks

Download PDF - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Technical Side of Being an<br />

Internet Service Provider<br />

October 1997<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

SG24-2133-00


<strong>IBM</strong>L<br />

International Technical Support Organization<br />

The Technical Side of Being an<br />

Internet Service Provider<br />

October 1997<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

SG24-2133-00


Take Note!<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Before using this information and the product it supports, be sure to read the general information in<br />

Appendix C, “Special Notices” on page 357.<br />

First Edition (October 1997)<br />

This edition applies to the concept of an Internet Service Provider and it is not attached to any <strong>IBM</strong> product in<br />

specific.<br />

Comments may be addressed to:<br />

<strong>IBM</strong> Corporation, International Technical Support Organization<br />

Dept. HZ8 Building 678<br />

P.O. Box 12195<br />

Research Triangle Park, NC 27709-2195<br />

When you send information to <strong>IBM</strong>, you grant <strong>IBM</strong> a non-exclusive right to use or distribute the information in any<br />

way it believes appropriate without incurring any obligation to you.<br />

© Copyright International Business Machines Corporation 1997. All rights reserved.<br />

Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is<br />

subject to restrictions set forth in GSA ADP Schedule Contract with <strong>IBM</strong> Corp.


This soft copy for use by <strong>IBM</strong> employees only.<br />

Contents<br />

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix<br />

The Team That Wrote This Redbook . . . . . . . . . . . . . . . . . . . . . . . . . ix<br />

Comments Welcome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x<br />

Chapter 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br />

1.1 Sample Network Design for an ISP . . . . . . . . . . . . . . . . . . . . . . . 1<br />

Chapter 2. Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5<br />

2.1 Internet Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5<br />

2.2 Internet Backbone Connection . . . . . . . . . . . . . . . . . . . . . . . . . . 6<br />

2.2.1 Upstream Provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7<br />

2.2.2 Access Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9<br />

2.2.3 Networking Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17<br />

2.2.4 Domain and IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . 44<br />

2.2.5 <strong>IBM</strong> As a Service Provider . . . . . . . . . . . . . . . . . . . . . . . . . 49<br />

2.3 Downstream Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54<br />

2.3.1 Types of Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54<br />

2.3.2 Access Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55<br />

2.3.3 ISP Networking Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . 61<br />

2.3.4 Customer Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 100<br />

Chapter 3. Server Hardware Platforms . . . . . . . . . . . . . . . . . . . . . . 107<br />

3.1 <strong>IBM</strong> Server′s Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108<br />

3.1.1 <strong>IBM</strong> Server Business . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108<br />

3.1.2 Servers in the Age of the Internet . . . . . . . . . . . . . . . . . . . . 109<br />

3.1.3 The Open <strong>IBM</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110<br />

3.1.4 Summary of <strong>IBM</strong>′s Server Strategy . . . . . . . . . . . . . . . . . . . 111<br />

3.1.5 Prospects for the Future . . . . . . . . . . . . . . . . . . . . . . . . . . 112<br />

3.2 <strong>IBM</strong> PC Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113<br />

3.2.1 The New PC Server Strategy . . . . . . . . . . . . . . . . . . . . . . . 114<br />

3.2.2 <strong>IBM</strong> PC Server Family Overview . . . . . . . . . . . . . . . . . . . . . 115<br />

3.3 <strong>IBM</strong> RS/6000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117<br />

3.3.1 RS/6000 As a Platform for ISPs . . . . . . . . . . . . . . . . . . . . . . 120<br />

3.4 AS/400 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123<br />

3.4.1 Advanced Series . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123<br />

3.4.2 Future Direction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125<br />

3.4.3 Where AS/400 Systems Fit . . . . . . . . . . . . . . . . . . . . . . . . . 126<br />

3.5 <strong>IBM</strong> System/390 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127<br />

3.5.1 Mainframes Morph into Microframes . . . . . . . . . . . . . . . . . . 128<br />

3.5.2 OS/390 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129<br />

3.5.3 <strong>IBM</strong> System/390 within Internet Environment . . . . . . . . . . . . . . 130<br />

3.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131<br />

Chapter 4. Internet Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133<br />

4.1 Domain Name Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133<br />

4.1.1 Berkeley Internet Name Daemon . . . . . . . . . . . . . . . . . . . . . 133<br />

4.2 Mail Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133<br />

4.2.1 POP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134<br />

4.2.2 SMTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134<br />

4.2.3 <strong>IBM</strong> Messaging Solutions for ISPs . . . . . . . . . . . . . . . . . . . . 134<br />

4.3 Web Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135<br />

© Copyright <strong>IBM</strong> Corp. 1997 iii


This soft copy for use by <strong>IBM</strong> employees only.<br />

4.4 FTP Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135<br />

4.5 Chat Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135<br />

4.5.1 Internet Relay Chat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135<br />

4.6 News Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135<br />

4.6.1 USENET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137<br />

4.6.2 Netscape News Server . . . . . . . . . . . . . . . . . . . . . . . . . . . 138<br />

Chapter 5. Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139<br />

5.1 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139<br />

5.1.1 Challenge Handshake Authentication Protocol/Password<br />

Authentication Protocol (CHAP/PAP) . . . . . . . . . . . . . . . . . . . . . 140<br />

5.1.2 Kerberos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142<br />

5.1.3 Remote Authentication Dial-In User Service (RADIUS) . . . . . . . . 142<br />

5.1.4 Terminal Access Controller Access System (TACACS) . . . . . . . . 143<br />

5.2 Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146<br />

5.3 Network Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149<br />

5.3.1 Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149<br />

5.3.2 Structure and Identification of Management Information (SMI) . . . 151<br />

5.3.3 Management Information Base (MIB) . . . . . . . . . . . . . . . . . . 151<br />

5.3.4 Simple Network Management Protocol (SNMP) . . . . . . . . . . . . 151<br />

5.3.5 Common Management Information Protocol over TCP/IP (CMOT) . 152<br />

5.3.6 Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153<br />

5.4 Usage Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154<br />

Chapter 6. Electronic Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . 159<br />

6.1 Electronic Money (E-Money) . . . . . . . . . . . . . . . . . . . . . . . . . . 159<br />

6.1.1 Types of E-Money . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159<br />

6.1.2 The Double-Spending Problem . . . . . . . . . . . . . . . . . . . . . . 160<br />

6.2 Electronic Checks (E-Check) . . . . . . . . . . . . . . . . . . . . . . . . . . 162<br />

6.3 Secure Electronic Payment Protocol . . . . . . . . . . . . . . . . . . . . . 162<br />

6.4 <strong>IBM</strong> Corporation iKP (Internet Keyed Payment Protocols) . . . . . . . . 163<br />

6.4.1 Security Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . 164<br />

6.5 Secure Electronic Transactions (SET) . . . . . . . . . . . . . . . . . . . . . 165<br />

6.6 Net.Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166<br />

6.6.1 Store Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167<br />

6.6.2 The Store Creator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167<br />

6.6.3 The Store Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . 168<br />

6.6.4 The Template Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168<br />

6.6.5 The Net.Commerce Director . . . . . . . . . . . . . . . . . . . . . . . . 168<br />

6.6.6 The Net.Commerce Daemon . . . . . . . . . . . . . . . . . . . . . . . 168<br />

6.6.7 The Lotus Payment Switch . . . . . . . . . . . . . . . . . . . . . . . . 169<br />

6.6.8 The Olympic Ticket Sales - An Example of Net.Commerce . . . . . 169<br />

6.7 Example Electronic Commerce Solution . . . . . . . . . . . . . . . . . . . 174<br />

Chapter 7. Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179<br />

7.1 Multimedia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179<br />

7.1.1 Image Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179<br />

7.1.2 Audio File Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183<br />

7.1.3 Musical Instruments Digital Interface (MIDI) . . . . . . . . . . . . . . 184<br />

7.1.4 Digital Movie Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . 186<br />

7.1.5 Multimedia Applications on the Internet . . . . . . . . . . . . . . . . . 188<br />

7.2 Java . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191<br />

7.2.1 Applets and Applications . . . . . . . . . . . . . . . . . . . . . . . . . 192<br />

Chapter 8. Internet Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193<br />

iv The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.1 The Costs of Security Breaches . . . . . . . . . . . . . . . . . . . . . . . . 193<br />

8.2 The Internet and Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194<br />

8.2.1 Orange Book Security Classes . . . . . . . . . . . . . . . . . . . . . . 194<br />

8.2.2 Red Book Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196<br />

8.2.3 C2 and Your Security Requirements . . . . . . . . . . . . . . . . . . . 196<br />

8.3 Defining Security Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196<br />

8.3.1 Internal Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196<br />

8.3.2 External Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197<br />

8.3.3 Intruders Are People . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197<br />

8.3.4 Securing Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197<br />

8.3.5 Securing Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197<br />

8.3.6 Securing Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198<br />

8.3.7 The Threat from Viruses . . . . . . . . . . . . . . . . . . . . . . . . . . 198<br />

8.4 How Intruders Break In To Your System . . . . . . . . . . . . . . . . . . . 198<br />

8.4.1 Sendmail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198<br />

8.4.2 Checking CGI Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198<br />

8.4.3 FTP Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199<br />

8.4.4 Telnet Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199<br />

8.4.5 E-Mail Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200<br />

8.4.6 Keystroke Grabbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200<br />

8.4.7 Password Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201<br />

8.4.8 Spoofing Your System . . . . . . . . . . . . . . . . . . . . . . . . . . . 201<br />

8.4.9 Sniffers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201<br />

8.4.10 Closing a Back Door on Your System . . . . . . . . . . . . . . . . . 202<br />

8.5 How to Control the Risk? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202<br />

8.6 What Should You Secure? . . . . . . . . . . . . . . . . . . . . . . . . . . . 202<br />

8.6.1 Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203<br />

8.6.2 Application Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203<br />

8.6.3 Transaction Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203<br />

8.6.4 System Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203<br />

8.6.5 The Security Checklists . . . . . . . . . . . . . . . . . . . . . . . . . . 204<br />

8.7 Establishing a Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . 206<br />

8.7.1 Who Makes the Policy? . . . . . . . . . . . . . . . . . . . . . . . . . . . 206<br />

8.7.2 Who Is Involved? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206<br />

8.7.3 Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206<br />

8.7.4 Risk Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207<br />

8.7.5 Defining Security Goals . . . . . . . . . . . . . . . . . . . . . . . . . . 207<br />

8.7.6 Establishing Security Measures . . . . . . . . . . . . . . . . . . . . . 208<br />

8.7.7 Know Your Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209<br />

8.7.8 Locking In or Out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209<br />

8.7.9 Policy Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210<br />

8.7.10 General Internet Security Principles . . . . . . . . . . . . . . . . . . 213<br />

8.8 Establishing Procedures to Prevent Security Problems . . . . . . . . . . 214<br />

8.8.1 Steps to Implement Secure Internet Applications . . . . . . . . . . . 214<br />

8.8.2 Identifying Possible Problems . . . . . . . . . . . . . . . . . . . . . . . 215<br />

8.8.3 Controls to Protect Assets in a Cost-Effective Way . . . . . . . . . . 216<br />

8.9 Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217<br />

8.9.1 Procedures to Recognize Unauthorized Activity . . . . . . . . . . . . 217<br />

8.9.2 Tools for Monitoring the System . . . . . . . . . . . . . . . . . . . . . 217<br />

8.9.3 Vary the Monitoring Schedule . . . . . . . . . . . . . . . . . . . . . . . 218<br />

8.9.4 Communicating Security Policy . . . . . . . . . . . . . . . . . . . . . . 219<br />

8.10 Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221<br />

8.10.1 Why Are Firewalls Needed? . . . . . . . . . . . . . . . . . . . . . . . 222<br />

8.10.2 Firewall Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223<br />

8.10.3 Firewall Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223<br />

Contents v


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.10.4 Glossary of the Most Common Firewall-Related Terms . . . . . . . 228<br />

8.11 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229<br />

8.11.1 Layers - Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 230<br />

8.11.2 Layers - Detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231<br />

8.11.3 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240<br />

8.12 Router Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240<br />

8.12.1 Introduction to PPP Authentication Protocols . . . . . . . . . . . . . 240<br />

8.12.2 Challenge-Handshake Authentication Protocol (CHAP) . . . . . . . 241<br />

8.12.3 Password Authentication Protocol (PAP) . . . . . . . . . . . . . . . 241<br />

8.12.4 Scenario: PPP with Bridging between Two <strong>IBM</strong> 2210s . . . . . . . 241<br />

8.13 Remote Access Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242<br />

8.13.1 <strong>IBM</strong> 8235 Security Features . . . . . . . . . . . . . . . . . . . . . . . 243<br />

8.14 Secure Web Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255<br />

8.14.1 Secure Hypertext Transfer Protocol (S-HTTP) . . . . . . . . . . . . . 256<br />

8.14.2 Secure Socks Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257<br />

8.14.3 Control Access Products to Web Sites and Home Pages . . . . . . 259<br />

8.15 Security Mailing Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264<br />

Chapter 9. Capacity Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267<br />

9.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267<br />

9.2 Content Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267<br />

9.2.1 Internet Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268<br />

9.2.2 Electronic Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269<br />

9.3 Number of Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269<br />

9.4 Bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270<br />

9.4.1 Formulas for Bandwidth Use . . . . . . . . . . . . . . . . . . . . . . . 270<br />

9.4.2 Internal and External Connections . . . . . . . . . . . . . . . . . . . . 272<br />

9.5 Telephone Lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273<br />

9.6 Networking Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274<br />

9.6.1 Upstream Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275<br />

9.6.2 Downstream Connection . . . . . . . . . . . . . . . . . . . . . . . . . . 276<br />

9.6.3 Choosing the Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . 277<br />

9.7 Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279<br />

9.7.1 Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 279<br />

9.7.2 Growth and Scalability . . . . . . . . . . . . . . . . . . . . . . . . . . . 282<br />

9.8 Domain and IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . 283<br />

9.8.1 Design Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 284<br />

9.8.2 DNS Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284<br />

9.8.3 A Word of Caution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284<br />

9.9 Staff Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285<br />

9.9.1 Project Leader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285<br />

9.9.2 Rest of Team . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286<br />

9.9.3 Using Consultants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287<br />

9.9.4 Outside Partners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287<br />

9.9.5 Dream Team . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287<br />

9.10 CGI Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288<br />

9.10.1 Selecting Your Programming Language . . . . . . . . . . . . . . . . 288<br />

9.10.2 Programming Languages . . . . . . . . . . . . . . . . . . . . . . . . . 289<br />

9.11 How to Estimate Costs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290<br />

9.11.1 Telephone Costs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290<br />

9.11.2 Internet Service Provider Costs . . . . . . . . . . . . . . . . . . . . . 290<br />

9.11.3 Hardware Costs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291<br />

9.11.4 Software Costs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291<br />

9.12 Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291<br />

9.13 Planning for Future Expansion . . . . . . . . . . . . . . . . . . . . . . . . 293<br />

vi The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

9.14 Final Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293<br />

9.14.1 Questions about Your ISP . . . . . . . . . . . . . . . . . . . . . . . . 295<br />

Appendix A. Availability Services . . . . . . . . . . . . . . . . . . . . . . . . . 297<br />

A.1 <strong>IBM</strong> Business Protection Model . . . . . . . . . . . . . . . . . . . . . . . . 297<br />

A.1.1 Risk Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297<br />

A.1.2 Recovery Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298<br />

A.1.3 Recovery Capability . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299<br />

A.1.4 Recovery Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301<br />

A.1.5 Business Continuity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302<br />

A.2 BRS - Worldwide Locations . . . . . . . . . . . . . . . . . . . . . . . . . . 303<br />

A.3 BRS - Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303<br />

A.3.1 e-Business Recovery Services . . . . . . . . . . . . . . . . . . . . . . 304<br />

A.3.2 Internet Emergency Response Service (IERS) . . . . . . . . . . . . . 307<br />

A.3.3 Final Considerations about Availability Services . . . . . . . . . . . 311<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs . . . . . . . . . . . . . . . . . . . . . . . . 317<br />

B.1 <strong>IBM</strong>: Preparing ISPs for the Second Wave . . . . . . . . . . . . . . . . . . 317<br />

B.2 Introducing <strong>IBM</strong> Solutions for ISPs . . . . . . . . . . . . . . . . . . . . . . 318<br />

B.2.1 Operations, Administration, Maintenance and Provisioning . . . . . 319<br />

B.3 <strong>IBM</strong>: Professional Services . . . . . . . . . . . . . . . . . . . . . . . . . . . 319<br />

B.4 Explore the Possibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319<br />

B.5 <strong>IBM</strong>: The Source for ISP Solutions . . . . . . . . . . . . . . . . . . . . . . 320<br />

B.6 What Are the <strong>IBM</strong> Solutions for ISPs . . . . . . . . . . . . . . . . . . . . . 320<br />

B.6.1 The <strong>IBM</strong> Solutions for ISPs Family . . . . . . . . . . . . . . . . . . . . 320<br />

B.7 RS/6000 As a Platform for Internet Service Providers . . . . . . . . . . . 321<br />

B.8 <strong>IBM</strong> Messaging Solution for ISPs . . . . . . . . . . . . . . . . . . . . . . . 323<br />

B.8.1 Solution Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324<br />

B.8.2 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324<br />

B.8.3 Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328<br />

B.8.4 Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329<br />

B.8.5 Summary and Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . 330<br />

B.9 Lotus GO Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330<br />

B.9.1 HACMP and Network Dispatcher . . . . . . . . . . . . . . . . . . . . . 331<br />

B.9.2 Scalability and Network Dispatcher . . . . . . . . . . . . . . . . . . . 331<br />

B.9.3 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332<br />

B.9.4 Hardware and Software Requirements . . . . . . . . . . . . . . . . . 332<br />

B.10 Lotus Domino RS/6000 POWERsolution . . . . . . . . . . . . . . . . . . . 332<br />

B.10.1 Packaging and Installation . . . . . . . . . . . . . . . . . . . . . . . . 333<br />

B.10.2 Lotus Domino on the RS/6000 Reference Configurations . . . . . . 335<br />

B.10.3 Lotus Domino on the RS/6000 in the Enterprise . . . . . . . . . . . 336<br />

B.10.4 HACMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336<br />

B.10.5 Network Dispatcher . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337<br />

B.10.6 Scalability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338<br />

B.11 Net.Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338<br />

B.11.1 High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339<br />

B.11.2 Network Dispatcher . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339<br />

B.11.3 Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339<br />

B.11.4 Scalability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339<br />

B.11.5 Billing Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340<br />

B.12 <strong>IBM</strong> Interactive Network Dispatcher . . . . . . . . . . . . . . . . . . . . . 340<br />

B.12.1 Challenge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340<br />

B.12.2 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341<br />

B.12.3 Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342<br />

B.12.4 Internet Service Provider Applications . . . . . . . . . . . . . . . . . 342<br />

Contents vii


This soft copy for use by <strong>IBM</strong> employees only.<br />

B.12.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343<br />

B.13 <strong>IBM</strong> Firewall 3.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343<br />

B.13.1 HACMP and Scalability . . . . . . . . . . . . . . . . . . . . . . . . . . 344<br />

B.13.2 Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344<br />

B.13.3 Packaging and Installation . . . . . . . . . . . . . . . . . . . . . . . . 345<br />

B.13.4 Hardware and Software Requirements . . . . . . . . . . . . . . . . 346<br />

B.14 <strong>IBM</strong> Solutions Available to ISPs . . . . . . . . . . . . . . . . . . . . . . . 347<br />

B.14.1 Tivoli . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347<br />

B.14.2 VideoCharger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348<br />

B.14.3 Electronic Yellow Pages . . . . . . . . . . . . . . . . . . . . . . . . . 348<br />

B.14.4 Electronic White Pages . . . . . . . . . . . . . . . . . . . . . . . . . . 349<br />

B.14.5 Other Solutions for ISPs . . . . . . . . . . . . . . . . . . . . . . . . . 349<br />

B.15 Lotus Press Release . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350<br />

Appendix C. Special Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357<br />

Appendix D. Related Publications . . . . . . . . . . . . . . . . . . . . . . . . . 359<br />

D.1 International Technical Support Organization Publications . . . . . . . . 359<br />

D.2 <strong>Redbooks</strong> on CD-ROMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359<br />

D.3 Other Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359<br />

How to Get ITSO <strong>Redbooks</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361<br />

How <strong>IBM</strong> Employees Can Get ITSO <strong>Redbooks</strong> . . . . . . . . . . . . . . . . . . 361<br />

How Customers Can Get ITSO <strong>Redbooks</strong> . . . . . . . . . . . . . . . . . . . . . 362<br />

<strong>IBM</strong> Redbook Order Form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363<br />

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365<br />

ITSO Redbook Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367<br />

viii The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Preface<br />

This redbook provides information about building Internet Service Provider (ISP)<br />

functionality. It focuses on the technical areas that a business should be aware<br />

of when considering providing ISP services. The redbook includes information<br />

on the services and procedures needed to connect to the Internet backbone and<br />

the hardware choices not only on the connection point but also acting as several<br />

function servers on the network. Management concepts and procedures are<br />

included in areas line security, accounting and network management.<br />

When providing a service on an ISP it is also important to know the technical<br />

support needed for some Internet applications. This redbook gives information<br />

on how to support these applications, which include electronic commerce,<br />

E-mail, multimedia objects manipulation and server hosting, such as HTTP, FTP<br />

and CHAT servers.<br />

When building an ISP it is very important to know the security threats and how to<br />

avoid them in different Internet applications. The redbook outlines those threats<br />

and describes a security policy needed to prevent them, including firewall,<br />

physical security, cryptography, connection security and server security.<br />

The redbook also details capacity planning procedures in different ISP services<br />

and resources, with descriptions on bandwidth allocation and the hardware size<br />

needed, telephone lines provisioning, server sizes and considerations on future<br />

planning and staffing.<br />

The appendix gives a detailed technical description of the <strong>IBM</strong> solution for the<br />

ISPs, including not only the hardware and software needed but also a full set of<br />

services available through <strong>IBM</strong>.<br />

This redbook will be helpful for anyone considering building, designing or<br />

implementing ISP services. It will help readers to make an informed decision<br />

about establishing an ISP. The information presented here is primarily technical<br />

in nature and does not cover the financial or legal aspects of running an ISP. It<br />

identifies <strong>IBM</strong> solutions where available and, in some cases, solutions available<br />

from other sources. General knowledge of the Internet and networking is<br />

assumed.<br />

The Team That Wrote This Redbook<br />

This redbook was produced by a team of specialists from around the world<br />

working at the Systems Management and Networking ITSO Center, Raleigh.<br />

Ricardo Haragutchi is a Senior ITSO Specialist for Networking, Internet and<br />

Multimedia at the Systems Management and Networking ITSO Center, Raleigh.<br />

He holds a Bachelors of Science degree in Electrical Engineering from Escola<br />

Politecnica in Sao Paulo University. He writes extensively and teaches <strong>IBM</strong><br />

classes worldwide on such areas as routing, remote access, and Internet<br />

environment. Before joining the ITSO two years ago, Ricardo worked in the Field<br />

Systems Center (FSC) in <strong>IBM</strong> Brazil as a Senior System Engineer.<br />

Cristina Canto is an Assessor System Specialist in Brazil. She has worked for<br />

<strong>IBM</strong> Brazil for five years. She holds a degree in Computer Science from the<br />

© Copyright <strong>IBM</strong> Corp. 1997 ix


Comments Welcome<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Pontifícia Universidade Católica de Santos - São Paulo. Her areas of expertise<br />

include RISC/6000, LAN environment and network solutions design.<br />

Edmund Wilhelm is a Systems Analyst in Germany. He has 18 years of<br />

experience in the Telecommunications field. He has worked at <strong>IBM</strong> for ten<br />

years. His areas of expertise include S/390 Operating System VSE/ESA, in<br />

particular VSAM, Workstations and the Internet.<br />

Jefferson da Silva is an Assessor Segment Specialist in Brazil. He has seven<br />

years of experience in the Networking and Support field. He holds a degree in<br />

Systems Analysis from PUCC - Pontifícia Universidade Católica de Campinas.<br />

His areas of expertise include LAN/WAN environment, technical solutions design,<br />

and business recovery services. He has written extensively on networking,<br />

routers and gateways.<br />

Thanks to the following people for their invaluable contributions to this project:<br />

Linda Robinson, Mike Haley, and Paul Braun of the ITSO Center, Raleigh<br />

Allen Beebe<br />

Casey Cannon<br />

David Watts<br />

Earl Mathis<br />

Ed Merenda<br />

Jay Beck<br />

Lynda Linney<br />

Frank V. Tutone<br />

Martin Murhammer<br />

Marty Slatnick<br />

Roberto Morizi Oku<br />

Sandy Blyth<br />

The Appendix: Availability Services was contributed by Luis R. Hernandez and<br />

Michael S. Solter, from <strong>IBM</strong> Business Recovery Services Center in Sterling<br />

Forest, New York.<br />

The Appendix: <strong>IBM</strong> Solutions for ISPs was contributed by Niel A. Katz and the<br />

RS/6000 Division Network Computing Solutions Team.<br />

Your comments are important to us!<br />

We want our redbooks to be as helpful as possible. Please send us your<br />

comments about this or other redbooks in one of the following ways:<br />

• Fax the evaluation form found in “ITSO Redbook Evaluation” on page 367 to<br />

the fax number shown on the form.<br />

• Use the electronic evaluation form found on the <strong>Redbooks</strong> Web sites:<br />

For Internet users http://www.redbooks.ibm.com<br />

For <strong>IBM</strong> Intranet users http://w3.itso.ibm.com<br />

• Send us a note at the following address:<br />

redbook@vnet.ibm.com<br />

x The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Chapter 1. Introduction<br />

An Internet Service Provider (ISP) is a company that has access to the Internet<br />

and sells this ability to connect to the Internet to members of the general public.<br />

There are various ways that a provider can be connected to the Internet;<br />

normally a provider will be connected with some type of telecommunication line<br />

that provides a much higher throughput than any one individual would need or<br />

could afford. This throughput and cost are then “shared” by all subscribers.<br />

An Internet Service Provider is not the same as an Information Service. At one<br />

time it was easy to distinguish between an Internet Service Provider and an<br />

information service, such as Compuserve or America On-Line (AOL). These<br />

services provided access to their own network, and sometimes even allowed<br />

e-mail to be sent to other networks. However, these types of information<br />

services are becoming more and more entwined with the Internet and also<br />

almost all now provide the ability to directly access the Internet. They advertise<br />

as being Internet Service Providers and provide services such as News, WWW<br />

and even Chat. These information services have seen the increased<br />

opportunities available in being an Internet Service Provider.<br />

The first and most popular service provided by Internet Service Providers is<br />

e-mail. Initially it was considered sufficient to just provide e-mail access.<br />

Nowadays, e-mail is considered to be the absolute minimum service that an ISP<br />

should provide. The services that are now available range from basic e-mail to<br />

a full-fledged company presence on the Internet including a home page, product<br />

catalogs and secure online ordering, as well as customer support with real-time<br />

audio and video.<br />

As the Internet was beginning to become popular relatively few people had the<br />

necessary hardware to access these services. To access the services properly<br />

you need a Transmission Control Protocol/Internet Protocol (TCP/IP) network<br />

connection. Initially this type of connection was only available on platforms<br />

running UNIX. In the meantime, however, this type of connection is available on<br />

almost all major operating systems, from Microsoft Windows to <strong>IBM</strong>′s OS390.<br />

1.1 Sample Network Design for an ISP<br />

Figure 1 on page 2 shows an example of a network design for an Internet<br />

Service Provider (ISP). Basically this design consists of servers running<br />

software that provide various services. It also includes routers that provide<br />

connectivity to the Internet and dial-in access for remote users.<br />

© Copyright <strong>IBM</strong> Corp. 1997 1


Figure 1. Example Network Design for an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Implementing a network such as this for an ISP requires many decisions among<br />

the various platforms, hardware, software and connectivity options. This<br />

redbook is intended to assist in this decision making process. It does not<br />

provide all the information that you need in every instance, but addresses all<br />

important topics and provides assistance in obtaining further information.<br />

Choosing server hardware is discussed in Chapter 3, “Server Hardware<br />

Platforms” on page 107. Various services that can be provided by an ISP are<br />

discussed in Chapter 4, “Internet Services” on page 133. Selecting the<br />

connection to the Internet and the hardware to implement it is discussed in<br />

Chapter 2, “Connectivity” on page 5.<br />

A decision to establish an ISP is usually a financial decision; either it is seen as<br />

an opportunity to make money or to save money that is currently being paid to<br />

another ISP. To protect your investment and ensure that an ISP continues to<br />

meet its financial expectations it must be properly managed. Management of the<br />

ISP is discussed in Chapter 5, “Management” on page 139 and various means<br />

to earn money and perform financial transactions on the Internet is discussed in<br />

Chapter 6, “Electronic Commerce” on page 159. Various tools that are<br />

2 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

available to assist in providing services on the Internet are discussed in<br />

Chapter 7, “Tools” on page 179.<br />

Finally, to complete the items that need to be considered when establishing an<br />

ISP, security is discussed in Chapter 8, “Internet Security” on page 193 and<br />

capacity planning is discussed in Chapter 9, “Capacity Planning” on page 267.<br />

Although each of these topics is addressed in its own chapter, these topics are<br />

highly interrelated. We recommend that you initially read this redbook in its<br />

entirety. After an initial reading, chapters can be referred to for specific<br />

information.<br />

Chapter 1. Introduction 3


4 The Technical Side of Being an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.


This soft copy for use by <strong>IBM</strong> employees only.<br />

Chapter 2. Connectivity<br />

2.1 Internet Topology<br />

This chapter describes the networking connections an ISP needs in order to<br />

provide Internet access services to its customers. It contains information related<br />

to both the Internet backbone and client connections.<br />

We begin by examining the Internet topology to show the way an ISP is located<br />

within this network.<br />

The Internet consists of high-speed circuits connecting routers that transmit data<br />

through Transmission Control Protocol/Internet Protocol (TCP/IP). It doesn′t<br />

belong to only one group, company or country. All the different parts belong to<br />

several organizations, but the Net itself doesn′t belong to anyone.<br />

The circuits are maintained by large telecommunications companies in each<br />

country such as MCI, Sprint, Worldcomm in the USA and Embratel in Brazil. The<br />

national ISPs, such as IGN, lease high-speed circuits from the<br />

telecommunications companies to be connected in their Points Of Presence<br />

(POPs - not to be confused with the POP mail protocol) through routers. In this<br />

way they have access to the Network Access Points (NAPs) where they can<br />

exchange routes and traffic, shuffling information from one machine to another.<br />

The largest NAPs are connected by very high-speed data circuits, often between<br />

45 and 144 Mbps.<br />

Regional and local ISPs purchase connections from these national ISPs or, in<br />

some cases, directly from the large telecommunications companies.<br />

Consequently they can offer Internet access and services to their customers.<br />

Therefore, as the Internet backbone is really made up of several complex<br />

backbones that are joined at the various NAPs, you won′ t be able to be<br />

connected directly to the Internet. This is not the way it works.<br />

You will need a TCP/IP network connection to another Internet provider that is<br />

already connected to the Internet. It can be a national ISP or another ISP. The<br />

ISPs who offer this type of service are usually called Internet backbone providers<br />

or upstream providers.<br />

This upstream connection gives the ISP and its customers access to the Internet<br />

backbone. The customers links to the ISP, however, are called downstream<br />

connections.<br />

The terms upstream and downstream are used when discussing connections<br />

from an ISP to other sites, where upstream circuits route data closer to the<br />

Internet core while downstream connections refer to those that route information<br />

further away from it. Another way of looking at it is that an ISP pays for<br />

upstream links and charges for downstream links.<br />

Figure 2 on page 6 shows a sample network design with ISP connections to the<br />

Internet backbone and to its customers.<br />

© Copyright <strong>IBM</strong> Corp. 1997 5


Figure 2. Example of Upstream/Downstream Internet Connections for an ISP<br />

2.2 Internet Backbone Connection<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Connecting an ISP to the Internet backbone requires several steps, including<br />

identifying the organization that is going to provide the Internet access, choosing<br />

the technology and network hardware that will be used in the connection, and<br />

getting the domain and IP address.<br />

6 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

2.2.1 Upstream Provider<br />

Choosing an upstream provider is one of your most critical decisions. You have<br />

to choose circuits that are going to connect you and your customers to the<br />

Internet. The capability, performance and reliability of these circuits are<br />

important. However, as they represent a major expense, they must be chosen<br />

carefully.<br />

Buying an Internet connection is a lot like buying a computer. Just as when you<br />

are buying a computer, your choice of an Internet service provider should be<br />

driven by your intended use. If you are looking for minimum cost, you might<br />

seek out the lowest-priced system in the back of a magazine or even assemble<br />

something yourself from parts bought at a flea market. There are some low-cost<br />

IP service suppliers who claim to be just as good as the others, but may not be<br />

in business next year to prove it. Since you are buying something your business<br />

will depend on, this is not the wisest choice. If you make the arrangements with<br />

a backbone provider whose connections are small or bad, your customer base<br />

will know it. They will feel it when using your service.<br />

It also doesn′t mean that buying the most expensive solution is going to be the<br />

best choice, supporting the theory that you get what you pay for. You should<br />

analyze the options you have carefully, paying attention to the different services,<br />

price structures, peak bandwidth limitations, personal service quality and<br />

geographical constraints.<br />

Some topics you need to think about when evaluating upstream providers are:<br />

• Network Topology<br />

This is one of the most important criteria to consider when choosing a<br />

provider. Looking at the network topology can help you understand how<br />

vulnerable the network is to outages, how much capacity is available when<br />

the network is loaded more heavily than usual, and the most important, how<br />

well the provider understands network engineering.<br />

• Network Link Speeds<br />

It is important to look closely at the speeds of the backbone links. To be<br />

able to do that, you should consider what kind of link services you are going<br />

to provide to your customers in order to size your needs. Do you intend to<br />

be an upstream provider to other ISPs or to just have dial-up customers?<br />

Another point to understand is that your network connection can only be as<br />

fast as the slowest link in the path. It doesn′t matter if the node you will be<br />

connected to is a T3 if the link between you and it will be only 56 kbps. The<br />

limit will be the 56 kbps link, not how much capacity the T3 node has.<br />

On the other hand, if the provider only has 256 kbps to its upstream<br />

connection, there is no sense buying a T1 from it.<br />

Don′t forget to ask if the topology you are being shown is operational now.<br />

Some providers like to show links that are not operational as part of their<br />

backbone infrastructure. It is also important not to be confused between the<br />

press release about a new high-speed network link and that link actually<br />

being operational.<br />

• External Network Links<br />

Take a look at the external links of each provider′s backbone. Do they have<br />

a single connection to the rest of the world? This is a potential single point<br />

of failure. Look for multiple, direct connections to other network providers.<br />

Chapter 2. Connectivity 7


This soft copy for use by <strong>IBM</strong> employees only.<br />

The more of these connections, the better. This shows that the provider is<br />

concerned about external connectivity and does not want to be dependent on<br />

some third party for interconnection. If they have a single connection to the<br />

outside world, ask them how often it fails and how long they usually are<br />

isolated. If they can′t give you these statistics, are they managing their own<br />

network well enough to manage yours?<br />

One extremely important point is how far it is from the high-speed data<br />

circuits. The performance and throughput for your customers will be related<br />

to how close you are to the major NAP circuits.<br />

Upgrades can also be difficult if you are far from the backbone circuits. Even<br />

if you start small, you′ll eventually want to increase your bandwidth. And<br />

changing your provider incurs considerable costs, both in changing IP<br />

addresses (in most cases) and the work time to complete the task.<br />

• Location<br />

You must consider if you can connect to high-speed backbones for a<br />

reasonable cost. The POPs locations the upstream provider offers to you are<br />

extremely relevant. The distance from your office location to the nearest<br />

POP can make or break your business, due to the varying level of circuit<br />

availability and bandwidth costs.<br />

In the former, there are some areas where there are very long lead times for<br />

a new specific circuit.<br />

In the latter, the provider requires that you buy the local loop segment that is<br />

going to make the connection between your company office to its closest<br />

POP. You will have to buy this directly or indirectly from one of the<br />

telephone companies serving your local area. The local loop charges are<br />

often the highest costs in the communications chain. So pay attention to the<br />

whole solution cost, which must include the local loop and the service<br />

provider fee.<br />

• Technology<br />

The technology being used to operate the network is also critically important.<br />

Today, there is a great deal of commercial quality router, switch and modem<br />

technology available from companies whose business it is to make that<br />

equipment.<br />

Sometimes a provider can have a bad case of the not invented here<br />

syndrome. This is a sure sign of long-term problems. Any provider still<br />

relying on their own internally developed equipment is doing you a<br />

disservice. You deserve the benefits of leading-edge production technology,<br />

not aging hardware that has been contorted into a use never intended by its<br />

designers.<br />

Remember, you are buying a service. The provider of this service should be<br />

using the best available technology to deliver this service.<br />

• Technical Staff<br />

8 The Technical Side of Being an Internet Service Provider<br />

Another aspect to consider when choosing a provider is the quality of its<br />

technical staff. They are the ones who will get your connection running to<br />

begin with and then keep it and the network running in the future. They have<br />

to be experienced in TCP/IP data networking.<br />

Make sure the provider has adequate staffing to cover the usual situations.<br />

If they send people to trade shows for a week, how many people are back at<br />

the office running things and how skilled are they? Find out what their


This soft copy for use by <strong>IBM</strong> employees only.<br />

technical staff turnover is. If people are leaving, find out why and who is left<br />

to keep your connection operational. Many suppliers of service have single<br />

points of failure in their staff capacity as well.<br />

• Help Desk Infrastructure<br />

Check out their help desk infrastructure. It should be 24x7 (24 hours a day<br />

and 7 days a week) staffed by at least one person, including nights,<br />

weekends and holidays. Make sure that they will have someone capable of<br />

dealing with your problem and not someone who will just answer the phone<br />

all the time.<br />

• Organization<br />

2.2.2 Access Technologies<br />

Find out how long the company has been in the IP business. Try to<br />

determine if they are going to be in business for the long run. Quality<br />

networks are not built on a small budget. The pricing may look attractive<br />

now, but the passage of time often reveals hidden costs and price increases,<br />

the greatest of which can be having to switch providers.<br />

Another way of getting good information is by talking to other ISPs. You can<br />

try looking up their information in some Internet forums. If you don′t find<br />

anything about whose backbone providers to use, at least you will find<br />

whose you should not.<br />

• Full Range of Services<br />

Does your provider have a full range of services or is it just filling a niche? If<br />

you need to increase or decrease your service level, will you need to switch<br />

providers?<br />

There is a wide variety of data circuit technology choices to connect an ISP to an<br />

upstream provider. They vary from dial-up to leased lines, ISDN, frame relay,<br />

ATM, satellite and cable modem as well many others.<br />

Because there are so many options, we describe the access technologies most<br />

commonly used.<br />

Most ISPs use two types of available circuits: point-to-point and shared physical<br />

networks.<br />

In the point-to-point connection we can find two distinct physical terminations for<br />

the link, meaning its physically connected through wires. The most often used<br />

links are leased lines, from 56 kbps to T3 circuits.<br />

In the shared network, the connection is divided among several customers and<br />

the circuit disappears into a cloud. In this topic we discuss the frame relay<br />

technology.<br />

Important<br />

Whatever technology you use, both you and your upstream provider must<br />

have the same network strategy. This means that the methods of exchanging<br />

data must be compatible on both sides.<br />

Chapter 2. Connectivity 9


This soft copy for use by <strong>IBM</strong> employees only.<br />

2.2.2.1 Leased Lines<br />

Leased lines (also called dedicated lines) are the most common way to connect<br />

an ISP environment to the upstream provider. Here you have a private network<br />

between you and your provider, available through twisted-pair copper wires<br />

between the two points.<br />

Dedicated lines are stable and reliable, and in some countries you can get very<br />

cheap high-speed channels. However, as the connection is always open and<br />

available for you, you will have to pay the full utilization of the circuit. The cost<br />

of the connection depends on the distance between the two linked points as well.<br />

Although this may not make much difference when the connection stays in the<br />

same city, large increases can occur if your connection travels through other<br />

exchanges. Despite the differences between the providers, the nearer the POP,<br />

the better.<br />

The bandwidth rates vary with the type of connection you will need, from<br />

low-speed to high-speed circuits.<br />

Although there are many different kinds of leased connections and they can vary<br />

depending on the country, the most popular speed and standards are as follows:<br />

• 56 kbps<br />

This is an entry point for dedicated circuits and is called Dataphone Digital<br />

Service (DDS). It is a digital phone-line connection capable of carrying<br />

56,000 bps.<br />

At this speed, a megabyte will take about three minutes to transfer. This is<br />

3.7 times as fast as a 14,400 bps modem.<br />

• 64 kbps<br />

This is also a digital phone-line connection capable of carrying 64,000 bps.<br />

At this basic speed rate a megabyte will take about two minutes to transfer.<br />

This is 4.4 times as fast as a 14,400 bps modem.<br />

It is also called DS0 (that means Data Speed 0, Digital Service 0 or Digital<br />

Signal 0, depending on the reference book).<br />

• Fractional T1<br />

10 The Technical Side of Being an Internet Service Provider<br />

A fractional T1 (FT1 or FracT1) is a subchannel of a full T1 channel, which is<br />

a percentage use of the available data channel.<br />

A full 1.5 Mbps T1 circuit contains 24 fractional T1 lines, each with a<br />

bandwidth of 56 or 64 kbps. The purchase of the circuit can be one or more<br />

fractional lines. For example, a 256-kbps link can be accomplished with four<br />

of the above channels. For 512 kbps, we will need eight channels, and so<br />

on. Upgrades can also be done just by adding the extra fractional T1 lines<br />

needed to the current leased channel.<br />

Although you don′t need to purchase a complete T1 line, you may be<br />

surprised with the cost of the lower-speed connections. This is because<br />

fractional T1 and full T1 services are not functions of the physical connection<br />

speed, but have to do with choices programmed into the data<br />

communications equipment. In this way, although FracT1 uses only some of<br />

the available channels, you will need to purchase a full T1 circuit anyway.<br />

For this reason the money you pay for an initial 256-kbps connection is not<br />

equally proportional to an upgrade to a 512 kbps or a full T1.


This soft copy for use by <strong>IBM</strong> employees only.<br />

• T1<br />

T1, also called DS1, is a leased-line connection at 1.5 Mbps, that is 1,544,000<br />

bps. This term is used in the USA, Australia and in some other countries.<br />

A T1 circuit has 24 channels that provide a total bandwidth of 1.536 Mbps or<br />

1.344 Mbps and depending on the line encoding channel, 64 kbps or 56 kbps.<br />

At maximum theoretical capacity, a T1 line could move a megabyte in less<br />

than 10 seconds.<br />

• E1<br />

Similar to a T1 link, this standard is used in Europe, South America and in<br />

other parts of the world.<br />

In an E1, each circuit is composed of 32 64-kbps channels that provide a total<br />

bandwidth of 2,048,000 bps. It is also called a 2-Mbps link.<br />

• E3<br />

In an E3 line there are 480 channels for a total bandwidth of 34,368,000 bps.<br />

Also used in Europe and other countries.<br />

• T3<br />

A T3 circuit, also known as DS3, is a high-speed leased-line connection<br />

capable of providing 44,736,000 bps. It is equivalent to 28 T1 circuits.<br />

As a T1 circuit is constructed from lower bandwidth slices, a T3 link carries<br />

672 channels of 64 kbps. It is usually available over high-speed fiber-optic<br />

cable, generally in large Internet backbones.<br />

Fractional T3 lines are also available in the same way as in T1.<br />

The previous circuits are the most often used by ISPs. However, there are two<br />

other T-carrier services standards: T2 and T4.<br />

T2 provides up to 4 T1 channels, but is not available commercially. T4 carries<br />

168 T1 channels for a total bandwidth of 274.176 bps.<br />

Note<br />

Table 1 (Page 1 of 2). Line Options<br />

The T-carrier service is available through several layers:<br />

• DS0 is equivalent to a 64-kbps circuit.<br />

• DS1 is equivalent to a T1.<br />

• DS2 comprises 4 DS1.<br />

• DS3 comprises 7 DS2.<br />

• DS4 comprises 6 DS3.<br />

For your reference, Table 1 shows a summary of the leased lines options<br />

available.<br />

Category Service Grade Circuit Speed<br />

Low-speed DS0 56/64 kbps<br />

Fractional T1 56/64 kbps up to 1.544 Mbps<br />

Chapter 2. Connectivity 11


Table 1 (Page 2 of 2). Line Options<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Category Service Grade Circuit Speed<br />

Medium-speed T1 (DS1) 1.544 Mbps<br />

E1 2.048 Mbps<br />

High-speed E3 34.368 Mbps<br />

T3 (DS3) 44.736 Mbps<br />

For information about how to measure the capacity lines and connection types,<br />

refer to 9.4, “Bandwidth” on page 270.<br />

2.2.2.2 Frame Relay<br />

Frame relay is a data communication interface originating from ISDN, designed<br />

to provide high-speed frame or packet transmission with minimum delay and<br />

efficient use of bandwidth. It is a variation on the X.25 interface and a form of<br />

fast packet switching.<br />

It derives its name from using the data link or frame OSI layer 2 to route or relay<br />

a packet directly to its destination instead of terminating the packet at each<br />

switching node. This eliminates processing overheads and increases throughput<br />

speed. It′s based on the ITU-TS Lap-D standard and uses variable-length<br />

packets.<br />

Like Ethernet or token-ring, frame relay assumes that connections are reliable.<br />

It does not have error detection and error control within the network, which<br />

helps to speed up the protocol. When errors occur, frame relay relies on higher<br />

level protocols for error control.<br />

We can also think of frame relay as a point-to-point connection, but in this case<br />

we are referring to the virtual connection between two sites. They appear to<br />

have a dedicated connection but they are actually sharing networking hardware<br />

with many others, as you can see in Figure 3 on page 13.<br />

12 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 3. Example of Frame Relay Physical and Virtual Connections<br />

Frame relay is offered by most large telecommunications companies and<br />

Regional Bell Operating Companies (RBOC) with a bandwidth range from 56<br />

kbps to 2 Mbps. Although possible voice transport over frame relay is possible,<br />

it′s considered to be restricted to data transport because of the constant<br />

transmission required.<br />

Chapter 2. Connectivity 13


This soft copy for use by <strong>IBM</strong> employees only.<br />

Using frame relay you will probably get a lower cost connection service. This is<br />

because it works with a common cloud, where its total bandwidth is divided<br />

among all the other customers. However, there′s a standard - Committed<br />

Information Rate (CIR) - that guarantees some amount of bandwidth. For<br />

example, you can purchase a 512-kbps link from a frame relay provider and set<br />

the CIR to 128 kbps. In this way, you can not always have 512 kbps, but you will<br />

have at least 128 kbps guaranteed. But when the traffic on the frame relay cloud<br />

is low, you can have up to the full 512 kbps. You pay for the CIR you choose, of<br />

course.<br />

For more information about frame relay, refer to the <strong>IBM</strong> Frame Relay Guide,<br />

GG24-4463.<br />

2.2.2.3 ATM<br />

Asynchronous Transfer Mode (ATM) is a relatively new, very high digital data<br />

transmission circuit capable of data transfer rates up to 2.488 Gbps under<br />

experimental circumstances. However, initial implementations are around 155<br />

Mbps or 622 Mbps.<br />

ATM is a cell-based data transfer technique in which channel demand<br />

determines packet allocation. It offers fast packet technology, real time,<br />

demand-led switching for efficient use of network resources. It can deal with all<br />

kinds of traffic: data, voice and video.<br />

All information is transported through the network in very short blocks called<br />

cells. In contrast to frame relay, which allows variable frame sizes, each cell is<br />

always 53 bytes long - 48 bytes of data plus 5 bytes of header. Information flow<br />

is along paths (called virtual channels) set up as a series of pointers through the<br />

network. The cell header contains an identifier that links the cell to the correct<br />

path to take towards its destination.<br />

Cells on a particular virtual channel always flow on the same path through the<br />

network and are delivered to the destination in the same order in which they<br />

were received.<br />

ATM is designed so that simple hardware-based logic elements may be<br />

employed at each node to perform the switching. For example, on a link of 1<br />

Gbps, a new cell arrives and a cell is transmitted every .43μsec. There is not a<br />

lot of time to decide what to do with an arriving packet.<br />

ATM can be used in two distinct environments: carrier, provided as a service to<br />

the end user, and private network, where a large organization purchases lines<br />

from a carrier (or installs them itself) and builds a private ATM network.<br />

Although ATM will be the high-bandwidth networking standard of the decade, it<br />

is a technology that is maturing slowly in wide area networks. One of the major<br />

problem is government regulation. In most countries, governments regulate the<br />

detailed technical characteristics of everything that connects to a public<br />

communications network. This is often called homologation, and part of its<br />

process requires protocol testing, which is an extremely expensive and very<br />

slow task.<br />

At the moment, ATM is starting to appear only at the NAP level or in connections<br />

between the NAPs. It′s a very expensive option, but something that could be<br />

considered in cases where T-carrier is not enough anymore.<br />

14 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

For further information about ATM technology, refer to:<br />

• ATM Technical Overview, SG24-4625<br />

• http://www.atmforum.com<br />

2.2.2.4 Other Technologies<br />

There are some other trends to obtain bandwidth into the Internet network. We<br />

discuss three of them.<br />

Optical Cabling: In the most commonly used method of connection, through the<br />

leased lines, the communications infrastructure is almost completely based on<br />

copper lines, which increases the local loop charges.<br />

As optical cabling becomes cheaper to install and maintain than traditional<br />

copper wires, the telephone and cable companies are replacing aging<br />

infrastructures with this type of cabling. With this upgraded infrastructure, the<br />

ability to transmit data in the local loop will be increased, and bandwidth cost<br />

will tend to climb.<br />

Some research results show that this physical link, about the size of a human<br />

hair, is able to deliver 1000 billion bps - roughly 2000 times faster than the<br />

theoretical maximum of twisted pair.<br />

Cable TV and Satellite: Other growing options for Internet access are the use of<br />

cable TV and satellite. Cable Internet access has been tested in some countries,<br />

while some satellite companies have been using solutions in the ″Direct TV″<br />

style dishes. Although there are still many restrictions for an ISP upstream<br />

connection, these emerging technologies may be used on a large scale in future.<br />

But before explaining the restrictions, you need to understand some concepts:<br />

cable technology, one-way and two-way communications methods of cable<br />

system.<br />

The cable system technology has a starting point in each community that is<br />

responsible for the origin of the community′s signals and the reception of signals<br />

that come from satellites through the air. From this point, the signals are carried<br />

in a coaxial cable throughout the community.<br />

The transmission method called Frequency Division Multiplexing (FDM) allocates<br />

6 MHz of bandwidth on the coaxial cable for each signal, which allows multiple<br />

channels to be carried over the same coaxial cable.<br />

In order to cover all the community, the cable is split and the entire signal is<br />

reproduced on each cable after each split. This results in a tree topology.<br />

In some ways, the cable architecture is similar to Ethernet LANs, which send all<br />

the information to all hosts on the network, but only the correct host gets all of<br />

the Ethernet packages addressed to it.<br />

Although the cable system has been used by the cable companies for many<br />

years, it has been modified due to the advances in fiber-optic transmission<br />

technology. They are changing this tree topology to a new hybrid<br />

fiber-and-coaxial (HFC) system. In this system fiber is used in the neighborhoods<br />

and coaxial cable is used for the connection to each door. This technology can<br />

transmit more information than coaxial cable because it has more frequency<br />

Chapter 2. Connectivity 15


This soft copy for use by <strong>IBM</strong> employees only.<br />

ranges. Also, as it uses light instead of electricity, it can carry the signal for<br />

longer distances without amplification.<br />

Despite all these improvements, the cost of optic fiber prevents the telephone<br />

companies from installing it. So there′s a new configuration called<br />

Fiber-to-Fiber-Neighborhood (FTTN) that takes optic fiber into a group of houses.<br />

As a consequence, many coaxial cables are replaced by fiber while small<br />

connections remain coaxial. In addition, the signal quality is improved, the<br />

number of amplifiers is reduced.<br />

This FTTN infrastructure permits the use of two-way communications, but it<br />

depends on the geographical implementation. To bypass this situation, there′s a<br />

temporary solution called one-way communication.<br />

In the one-way concept, the cable company only provides the path responsible<br />

for receiving data, which is called downstream bandwidth (not to be confused<br />

with a downstream connection related to ISP customers). An example of this<br />

downstream bandwidth usage is the Web page requested information that comes<br />

into a Web browser.<br />

The path that sends data the other way is called upstream bandwidth. It is used,<br />

for example, when you request a site page within the Web browser field. This<br />

path has to be provided by other different connections (such as a dial-up line)<br />

with an ISP. As a result, the upstream connection is slower than the<br />

downstream one.<br />

In two-way connection, we can have both paths on the same link, but it requires<br />

HFC technology. Also it will need some changes.<br />

First of all, adequate spectrum has to be allocated for the upstream data,<br />

followed by the replacement of the amplifiers to divide upstream and<br />

downstream data into the correct frequency. Finally, the cable company must<br />

implement a method to multiplex all the upstream data from multiple users onto<br />

the coaxial cable.<br />

The satellite technology for Internet access is very similar to cable connectivity.<br />

In one-way satellite communication another link is needed to perform the<br />

upstream transmission (that is zero). This method has only been available<br />

recently.<br />

On the other hand, two-way transmission is well established, but only very few<br />

ISPs offer this type of connection.<br />

As you can see, the use of cable or satellite technologies to connect an ISP to its<br />

upstream provider has a lot of limitations. In one-way solutions, there is no<br />

upstream bandwidth and it is necessary a to have a complementary upstream<br />

link. Two-way cable technology depends on the cable company offerings, and in<br />

two-way satellite communication there are very few ISP providers.<br />

You should consider satellite link if you are in a remote area, where stretching a<br />

T1 circuit across several hundred miles can be very expensive, or if you want to<br />

transmit a very large amount of data.<br />

If you need more information about satellites, see the International<br />

Telecommunications Satellite Organization Web site at:<br />

16 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

http://www.intelsat.int<br />

2.2.3 Networking Hardware<br />

In this section we explain the networking hardware needed to connect an ISP to<br />

its upstream provider in the two most common methods: leased lines and frame<br />

relay. We also include some <strong>IBM</strong> products that can be used in this connection:<br />

the 2210/2216 routers and the 8224/8237 hubs. We begin by explaining the<br />

different functions of the networking hardware components.<br />

2.2.3.1 Hardware Components<br />

The basic networking hardware components for an upstream connection are<br />

discussed in the following sections.<br />

Router: This is the crucial equipment required in an Internet upstream<br />

connection. It′s responsible for the IP datagrams flow between the ISP and the<br />

Internet core in both directions.<br />

As the principal function is to examine the IP headers and decide where they<br />

should be sent, it can be accomplished by a UNIX machine or a stand-alone<br />

router. However, as this simple-seeming function has to be done at extremely<br />

high speeds (or the consequences of errors can be disastrous), the stand-alone<br />

router is recommended because it has considerably faster routing than the UNIX<br />

machine.<br />

For an initial ISP, the router must have at least two interfaces: one for the<br />

backbone provider and the other to the ISP local network. However, depending<br />

on the type of bandwidth coming to the ISP, the router may support other<br />

interfaces, one for each dedicated data circuit.<br />

Some important characteristics that you should observe in a router are:<br />

• Performance: A router has performance characteristics measured in packets<br />

per second. Consequently, the more connections and bandwidth, the more<br />

pps is required from the router.<br />

• Management: The management tools should indicate what is happening and<br />

allow easy adjustment and restoration of parameters.<br />

• Routing protocols: The router protocol must be compatible with the one used<br />

on the other end of the data circuit. The most common routing protocols<br />

used on the Internet are RIP, OSPF and BGP-4.<br />

• Filters: The router should include the basic filters capabilities in order to<br />

permit or not a specific packet flow, if you need basic firewall capabilities in<br />

the future.<br />

CSU/DSU: This equipment provides the interface between the telephone<br />

company′s network and the ISP network. Although it′s often referred to as one<br />

equipment, it has two distinct functions.<br />

The Channel Service Unit (CSU) is a simple device that interfaces with the<br />

telecommunication network. The Data Service Unit (DSU) is the data unit that<br />

″speaks″ to the data terminal equipment (the router) and is responsible for<br />

filtering the digital signal, synchronizing the signal with the network clock and<br />

providing networking control codes; it is similar to an analog modem. This<br />

CSU/DSU device depends on the connection speed. In general, it′s a V.35<br />

interface and is already provided in the routers with DSU functionality.<br />

Chapter 2. Connectivity 17


This soft copy for use by <strong>IBM</strong> employees only.<br />

Hub: This equipment, although not directly related to the upstream connection,<br />

will be present in the ISP network. It connects the equipment in the network,<br />

such as routers and servers, in a star cabling topology. This helps in<br />

management due to the fact that a defect is isolated in its segment. The hubs<br />

can support several LAN types such as Ethernet, 100Base-T, token-ring, FDDI<br />

and ATM. The most commonly used hubs are Ethernet with RJ45 connectors.<br />

2.2.3.2 Upstream Hardware Connections<br />

A DDS or T1 connection will need the following prerequisites:<br />

• A communication line<br />

• A CSU/DSU<br />

• A router<br />

The router will be connected both in the ISP LAN (through a hub) and in the<br />

CSU/DSU (if not already integrated in the router). From the CSU/DSU device, the<br />

telephone line will connect to the telephone company′s network termination unit<br />

(NTU), and then to the upstream provider.<br />

Normally, it is the ISP′s responsibility to get the equipment from the NTU up to<br />

its network, but depending on the arrangement, the line can also be rented from<br />

the upstream provider or from the telephone company.<br />

An example of this connection can be seen in Figure 4 on page 19.<br />

18 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 4. Example of DDS/T1 Network Connection<br />

In a T3 link, the connection will depend on the media purchased. If it is<br />

delivered on two coaxial cables, you will connect them directly onto the DSU. (A<br />

CSU is not required.) But if it comes in optic fiber or microwave, you will<br />

connect them in a terminal first. The link between the DSU and the router can<br />

be V.35, High-Speed Serial Interface (HSSI) or SCSI.<br />

A typical frame relay connection has similar prerequisites than a T1, but the<br />

equipment must be able to use frame relay to send data to the WAN.<br />

Usually the ISP is connected to the nearest frame relay POP through normal<br />

wire. The POP is responsible for the physical connection into the cloud.<br />

Figure 5 on page 20 shows this implementation.<br />

Chapter 2. Connectivity 19


Figure 5. Example of Wire Connection with Frame Relay<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

2.2.3.3 <strong>IBM</strong> 2210<br />

This section gives an overview of the <strong>IBM</strong> 2210 router. This equipment can be<br />

used either in an ISP or even in the upstream provider itself, in its connection<br />

with its ISP customers. It includes a brief description of the hardware and<br />

software package options.<br />

Further information can be found in:<br />

• <strong>IBM</strong> 2210 Nways Multiprotocol Router Maintenance Information, SY27-0345<br />

• <strong>IBM</strong> 2210 Nways Multiprotocol Router Planning and Setup Guide, GA27-4068<br />

• <strong>IBM</strong> Models 1Sx and 1Ux Installation Guide, GC30-3867<br />

• <strong>IBM</strong> 2210 Nways Multiprotocol Router Description and Configuration<br />

Scenarios, SG24-4446<br />

• http://www.raleigh.ibm.com/220/220prod.html<br />

Overview: The <strong>IBM</strong> 2210 Nways Multiprotocol Routers provide an extensive<br />

range of connectivity, protocols and price granularity to enable you to cost<br />

effectively implement network computing across a broad range of remote<br />

locations, branch offices and regional sites. New entry models of the 2210 offer<br />

one Ethernet port and either one serial WAN port or one ISDN BRI port to<br />

provide the most economical 2210 solution for the smallest offices in your<br />

enterprise. The mid-range models of the 2210 offer one LAN port (Ethernet or<br />

token-ring) and two serial WAN ports for larger branch offices. Some mid-range<br />

models also provide a single ISDN BRI port. The high-end models of the 2210<br />

double the connectivity and performance of the other models with up to two LAN<br />

20 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

ports and four serial WAN ports to support large branch offices and regional<br />

locations. In addition, the high-end models of the 2210 include an open adapter<br />

slot that supports any one of the following adapters: ISDN BRI, ISDN PRI,<br />

25-Mbps ATM, four-port and eight-port WAN concentrations.<br />

Models of 2210: The <strong>IBM</strong> 2210 is available in several models to accommodate<br />

the types of networks you want to support. Keep in mind that there are two<br />

memory choices that you must evaluate before deciding on which model best<br />

meets your needs. Each type of memory has a specific purpose and should be<br />

considered separately:<br />

1. Flash memory. Flash memory is used to store a compressed version of the<br />

executable program product, <strong>IBM</strong> Nways Multiprotocol Routing Services<br />

(MRS, product number 5765-B86 V1R1), as well as one or more configuration<br />

images. Customers often want to store more than one release of the code<br />

and multiple configuration images in flash as part of their management<br />

strategy.<br />

The chart below shows the amount of flash memory consumed by each MRS<br />

V1R1 software code load.<br />

Please note that only the x4x models have expandable flash memory. All the<br />

other models have a fixed amount of flash memory (either 2 MB or 4 MB,<br />

depending on the model).<br />

Table 2. Flash Memory Consumption - Models 1X4, 1X8<br />

Model<br />

Amount of<br />

flash<br />

Total<br />

number of<br />

banks<br />

Number of banks consumed by one code load<br />

Software preload feature code number<br />

5121 5122 5123 5124<br />

1s4 2MB 32 20 22 24 N/A<br />

1u4 2MB 32 20 22 24 N/A<br />

1s8 4MB 64 20 22 24 27<br />

1u8 4MB 64 20 22 24 27<br />

Note: Each configuration takes one bank.<br />

Table 3. Flash Memory Consumption - Models 12T, 12E<br />

Model<br />

Amount<br />

of flash<br />

Total<br />

number<br />

of banks<br />

Number of banks consumed by one code load<br />

Software preload feature code number<br />

5002 5003 5005 5007 5008<br />

12T 4MB 64 20 22 25 42 48<br />

12E 4MB 64 20 22 25 42 48<br />

Note: Each configuration takes one bank.<br />

Table 4. Flash Memory Consumption - Models 127, 128<br />

Model<br />

Amount of<br />

flash<br />

Total<br />

number of<br />

banks<br />

Number of banks consumed by one code load<br />

Software preload feature code number<br />

5023 5024 5026 5027<br />

127 4MB 64 24 27 44 50<br />

128 4MB 64 24 27 44 50<br />

Note: Each configuration takes one bank.<br />

Chapter 2. Connectivity 21


This soft copy for use by <strong>IBM</strong> employees only.<br />

Table 5. Flash Memory Consumption - Models X4X without Adapter or with WAN<br />

Concentration Adapter<br />

Model<br />

Amount of<br />

flash<br />

Total<br />

number of<br />

banks<br />

Number of banks consumed by one code load<br />

Software preload feature code number<br />

5043 5044 5046 5047<br />

14T 4 MB * 14 * 6 7 11 13<br />

24T 4 MB * 14 * 6 7 11 13<br />

24E 4 MB * 14 * 6 7 11 13<br />

24M 4 MB * 14 * 6 7 11 13<br />

Note: * Double for 8-MB calculations. Each configuration takes one bank.<br />

Table 6. Flash Memory Consumption - Models X4X with ISDN BRI Adapter<br />

Model<br />

Amount of<br />

flash<br />

Total<br />

number of<br />

banks<br />

Number of banks consumed by one code load<br />

Software preload feature code number<br />

5063 5064 5066 5067<br />

14T 4 MB * 14 * 7 7 11 13<br />

24T 4 MB * 14 * 7 7 11 13<br />

24E 4 MB * 14 * 7 7 11 13<br />

24M 4 MB * 14 * 7 7 11 13<br />

Note: * Double for 8-MB calculations. Each configuration takes one bank.<br />

Table 7. Flash Memory Consumption - Models X4X with ISDN PRI Adapter<br />

Model<br />

Amount of<br />

flash<br />

Total<br />

number of<br />

banks<br />

Number of banks consumed by one code load<br />

Software preload feature code number<br />

5083 5084 5086 5087<br />

14T 4 MB * 14 * 7 7 12 13<br />

24T 4 MB * 14 * 7 7 12 13<br />

24E 4 MB * 14 * 7 7 12 13<br />

24M 4 MB * 14 * 7 7 12 13<br />

Note: * Double for 8-MB calculations. Each configuration takes one bank.<br />

Table 8. Flash Memory Consumption - Models X4X with ATM Adapter<br />

Model<br />

Amount of<br />

flash<br />

Total<br />

number of<br />

banks<br />

Number of banks consumed by one code load<br />

Software preload feature code number<br />

5103 5104 5106 5107<br />

14T 4 MB * 14 * 8 9 13 14<br />

24T 4 MB * 14 * 8 9 13 14<br />

24E 4 MB * 14 * 8 9 13 14<br />

24M 4 MB * 14 * 8 9 13 14<br />

Note: * Double for 8-MB calculations. Each configuration takes one bank.<br />

2. DRAM. Dynamic random access memory (DRAM) provides the working<br />

memory for the 2210. The router code and router tables both run from<br />

DRAM. The amount of DRAM in a given 2210 will determine the size and<br />

complexity of the network it can support. There are three sizes of DRAM<br />

available for the x2x models: 4 MB, 8 MB, and 16 MB. There are four sizes<br />

of DRAM available for the x4x models: 4 MB, 8 MB, 16 MB, and 32 MB. Four<br />

megabytes (4 MB) of DRAM is the default for all models. The other DRAM<br />

sizes are available by the addition of the respective memory expansion<br />

feature. These memory expansion features are available as both factory- or<br />

22 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

field-installed features. Field-installed memory expansion features on the<br />

x2x models must be installed by trained service personnel. Field-installed<br />

memory expansion features on x4x models are customer-installable features.<br />

DRAM on models 1Sx and 1Ux is not upgradeable.<br />

Use of the 2210STOR EXEC is recommended prior to each machine order to<br />

ensure the correct configuration is ordered. The following chart is provided<br />

as a guideline.<br />

Table 9. DRAM Requirement Estimates per Software Load<br />

Models Software Description Minimum DRAM<br />

Required<br />

1x4 IP+ISDN BRI 4 5121<br />

IP+IPX+ISDN BRI 4 5122<br />

1x8 IP+DLSw+ISDN BRI 8 5123<br />

IP+IPX+DLSw+ISDN BRI 8 5124<br />

12T IP+IPX 4 5002<br />

12E IP+IPX 4 5003<br />

IP+IPX+DLSw 8 5005<br />

IP+DLSw+APPN 16 5007<br />

All Protocol+APPN 16 5008<br />

127 IP+DLSw+ISDN BRI 8 5023<br />

128 IP+IPX+DLSw+ISDN BRI 8 5024<br />

x4x Empty or<br />

with WAN<br />

Connection<br />

Adapter<br />

x4x with ISDN<br />

BRI Adapter<br />

x4x with ISDN<br />

PRI Adapter<br />

x4x with ATM<br />

Adapter<br />

IP+DLSw+APPN+ISDN BRI 16 5026<br />

All Protocol+APPN+ISDN BRI 16 5027<br />

IP+DLSw 8 5043<br />

IP+IPX+DLSw 8 5044<br />

IP+DLSw+APPN 16 5046<br />

All Protocol+APPN 16 5047<br />

IP+DLSw+ISDN BRI 8 5063<br />

IP+IPX+DLSw+ISDN BRI 8 5064<br />

IP+DLSw+APPN+ISDN BRI 16 5066<br />

All Protocol+APPN+ISDN BRI 16 5067<br />

IP+DLSw+ISDN PRI 8 5083<br />

IP+IPX+DLSw+ISDN PRI 8 5084<br />

IP+DLSw+APPN+ISDN PRI 16 5086<br />

All Protocol+APPN+ISDN PRI 16 5087<br />

IP+DLSw+ATM 8 5103<br />

IP+IPX+DLSw+ATM 8 5104<br />

IP+DLSw+APPN+ATM 16 5106<br />

All Protocol+APPN+ATM 16 5107<br />

Note: All Protocol includes DLSw and LNM.<br />

Preload Feature<br />

Code Number<br />

Table 10 on page 24 shows the different models and the offerings of the <strong>IBM</strong><br />

Nways Multiprotocol Routing Services that are available.<br />

Note: Certain models of the <strong>IBM</strong> 2210 support ISDN. You cannot use one of the<br />

standard WAN ports for ISDN. Software support for ISDN must be ordered<br />

separately.<br />

Chapter 2. Connectivity 23


Table 10. <strong>IBM</strong> 2210 Models<br />

Model<br />

Replaced by<br />

model<br />

LAN<br />

No. of WANs<br />

(See Note)<br />

ISDN BRI Port<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Flash Memory<br />

(base/max)<br />

DRAM<br />

(base/max)<br />

Adapter Slot<br />

▐1▌<br />

1S4 - Ethernet 1 ▐2▌ 1 ▐2▌ 2 MB/2 MB 4 MB/4 MB No<br />

1S8 - Ethernet 1 ▐2▌ 1 ▐2▌ 4 MB/4 MB 8 MB/8 MB No<br />

1U4 - Ethernet 1 ▐2▌ 1 ▐2▌ 2 MB/2 MB 4 MB/4 MB No<br />

1U8 - Ethernet 1 ▐2▌ 1 ▐2▌ 4 MB/4 MB 8 MB/8 MB No<br />

12T - Token-Ring 2 0 4 MB/4 MB 4 MB/16 MB No<br />

12E - Ethernet 2 0 4 MB/4 MB 4 MB/16 MB No<br />

127 - Token-Ring 2 1 4 MB/4 MB 4 MB/16 MB No<br />

128 - Ethernet 2 1 4 MB/4 MB 4 MB/16 MB No<br />

14T - Token-Ring 4 opt 4 MB/12 MB 4 MB/32 MB Yes<br />

24T -<br />

24E -<br />

24M -<br />

2 (two)<br />

Token-Ring<br />

2 (two)<br />

Ethernet<br />

1 (one)<br />

Token-Ring, 1<br />

(one) Ethernet<br />

4 opt 4 MB/12 MB 4 MB/32 MB Yes<br />

4 opt 4 MB/12 MB 4 MB/32 MB Yes<br />

4 opt 4 MB/12 MB 4 MB/32 MB Yes<br />

▐1▌ Support for ISDN BRI, ISDN PRI, ATM, four and eight serial port adapters.<br />

▐2▌ Only one of the two ports (either WAN or ISDN BRI) can be configured/used<br />

at any given time on these models.<br />

Note: The standard WAN ports on the <strong>IBM</strong> 2210 will support any of these<br />

physical interfaces:<br />

• EIA RS 232-D/V.24<br />

• V.35<br />

• V.36<br />

• X.21<br />

The ISDN BRI port on the 1Sx models provides a four-wire twisted pair S/T<br />

interface with an RJ-45 connector. The ISDN BRI port will support the same<br />

signaling specifications as the other 2210 models, namely EuroISDN in Europe,<br />

INS-64 in Japan, National ISDN-1 and -2, AT&T 5ESS and Nortel DMS-100 in North<br />

America, and TS 013 in Australia.<br />

The 1Ux models include a fully integrated NT-1, incorporating the U interface.<br />

This support is provided at no additional cost compared with the S/T interface<br />

models. This saves customers the expense and inconvenience of having to<br />

purchase and configure a stand-alone NT-1.<br />

24 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Table 11. Features Supported by Model<br />

8MB<br />

DRAM<br />

Memory<br />

FC<br />

#4108<br />

8-port<br />

WAN<br />

conc<br />

Adapter<br />

FC<br />

#3121<br />

4-port<br />

WAN<br />

conc<br />

Adapter<br />

FC<br />

#3120<br />

25<br />

Mbps<br />

ATM<br />

Adapter<br />

FC<br />

#3901<br />

ISDN<br />

PRI-E1<br />

Adapter<br />

FC<br />

#3108<br />

ISDN<br />

PRI-T1/J1<br />

Adapter<br />

FC<br />

#3107<br />

ISDN<br />

BRI<br />

Adapter<br />

FC<br />

#3101<br />

16MB<br />

DRAM<br />

FC<br />

#4056/577<br />

8MB<br />

DRAM<br />

Memory<br />

FC<br />

#4048/49<br />

4MB<br />

Flash<br />

Memory<br />

FC<br />

#4104<br />

32 M B<br />

DRAM<br />

Memory<br />

FC<br />

#4032<br />

16 M B<br />

DRAM<br />

Memory<br />

FC<br />

#4016<br />

8MB<br />

DRAM<br />

Memory<br />

FC<br />

#4008<br />

Adapter<br />

Enable<br />

Feature<br />

FC#3001/2<br />

Second<br />

Service<br />

Port FC<br />

#2832<br />

Integrated<br />

Modem<br />

Feature<br />

FC<br />

#2814<br />

Model<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

yes<br />

yes<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

yes<br />

yes<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

yes<br />

yes<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

no<br />

yes<br />

yes<br />

no<br />

no<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

no<br />

no<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

no<br />

no<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

no<br />

no<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

no<br />

no<br />

yes<br />

yes<br />

1S4<br />

no<br />

no<br />

no<br />

no<br />

no<br />

1S8<br />

no<br />

no<br />

no<br />

no<br />

no<br />

1U4<br />

no<br />

no<br />

no<br />

no<br />

no<br />

1U8<br />

no<br />

no<br />

no<br />

no<br />

no<br />

12T<br />

no<br />

no<br />

no<br />

no<br />

no<br />

12E<br />

no<br />

no<br />

no<br />

no<br />

no<br />

127<br />

no<br />

no<br />

no<br />

no<br />

no<br />

128<br />

no<br />

no<br />

no<br />

no<br />

no<br />

14T<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

24T<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

24E<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

24M<br />

yes<br />

yes<br />

yes<br />

yes<br />

yes<br />

Note: Serial/LAN cables and power cords are common across all models.<br />

Chapter 2. Connectivity 25


Figure 6. Model 12T<br />

Figure 7. Model 12E<br />

Figure 8. Model 127<br />

Figure 9. Model 128<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

The ports of the different models are shown in Figure 6 on page 26 through<br />

Figure 13 on page 28.<br />

26 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 10. Model 14T<br />

Figure 11. Model 24T<br />

Figure 12. Model 24E<br />

Chapter 2. Connectivity 27


Figure 13. Model 24M<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

The double-density models support an additional service port and an adapter slot that can support<br />

ISDN basic rate, ISDN primary rate and ATM. The availability of these adapter cards is defined in the<br />

announcement letter.<br />

Figure 14. Model 24M with the ISDN Adapter<br />

Figure 15. Model 1Sx and 1Ux<br />

Networks Supported by the <strong>IBM</strong> 2210: The <strong>IBM</strong> 2210 supports the following LAN<br />

connections:<br />

• Token-ring (IEEE 802.5) with STP or UTP connection<br />

• Ethernet (IEEE 802.3) with AUI or 10Base-T connection<br />

Every <strong>IBM</strong> 2210 supports the following serial connections:<br />

• EIA 232D/V.24<br />

28 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

• V.35<br />

• V.36<br />

• X.21<br />

Note: RS449 is also supported, using the V.36 cable available for the <strong>IBM</strong> 2210.<br />

In addition to these serial connections, you can order optional support for ISDN.<br />

Software Package: All models of the 2210 use a common set of software<br />

functions called <strong>IBM</strong> Nways Multiprotocol Routing Services (Nways MRS).<br />

Nways MRS is a member of <strong>IBM</strong>′s family of multiprotocol services products that<br />

includes the Nways Multiprotocol Access Services (Nways MAS) for the <strong>IBM</strong> 2216<br />

Nways Multiaccess Connector and the Nways Multiprotocol Switched Services<br />

(Nways MSS) for the <strong>IBM</strong> 8210 Nways MSS Server and the <strong>IBM</strong> 8260 Nways MSS<br />

Module. Together, <strong>IBM</strong>′s multiprotocol services products provide the benefits of<br />

switching, distributed routing, bridging and virtual LANs and enable the<br />

implementation of switched virtual networking (SVN). It is <strong>IBM</strong>′s comprehensive,<br />

high-performance framework to implement enterprise-wide network computing.<br />

Nways Multiprotocol Routing Services (MRS, product number 5765-B86 V1R1)<br />

comes as a base suite package, plus four separately orderable packages. It<br />

extends the function of <strong>IBM</strong> 2210 Nways Multiprotocol Routing Network Services<br />

(MRNS) Release 3 Enhanced.<br />

In addition to current MRNS Release 3, the new MRS provide:<br />

• APPN NN/HPR/DLUR support<br />

• ISDN BRI and PRI adapter and worldwide ISDN switch support<br />

• ATM support including LAN emulation client and Classical IP<br />

• Broad range of LAN, WAN and ATM network connectivity options<br />

• Compatibility between products supported by the multiprotocol service<br />

software<br />

• Many protocol enhancements<br />

• Easy configuration, installation, and maintenance<br />

MRS Base Suite versus Additional Routing Suite Contents<br />

The base suite contains the following functional capabilities from a<br />

price/packaging perspective:<br />

• TCP/IP, including OSPF<br />

• Bridging (SR, TB, SRT and SR-TB)<br />

• MAC filtering<br />

• Data link controls (PPP, FR, X.25 and SDLC)<br />

• AIW Version 1 DLSw(RFC 1795), including NetBIOS<br />

• NetBIOS name caching/filtering<br />

• SDLC primary and secondary support<br />

• SDLC relay<br />

• APPN/HPR/DLUR<br />

• V.25bis<br />

• Bandwidth reservation system<br />

• EasyStart (with MRS)<br />

• WAN reroute<br />

• Specific device drivers where appropriate, that is, to support ISDN BRI or PRI<br />

and ATM<br />

Chapter 2. Connectivity 29


This soft copy for use by <strong>IBM</strong> employees only.<br />

The Base + Additional Routing Suite includes the following additional protocols<br />

available in specific package options noted below. IPX is included in several<br />

package options; the other protocols listed are contained only where All Protocol<br />

is noted.<br />

• IPX<br />

• AppleTalk Phase 2<br />

• Banyan VINES<br />

• DECnet IV<br />

• DECnet V/OSI<br />

• BGP-4<br />

Note: Backup media diskettes will no longer be shipped with basic license<br />

orders. Only the configuration program diskettes and CD-ROM containing the<br />

documentation files will be provided. Hard copy of software documents may be<br />

selected as optional deliverable.<br />

In addition, a letter is included with instructions on how to retrieve the specific<br />

code option from the pre-loaded 2210 itself or from the appropriate 2210<br />

Internet-accessible server. The <strong>IBM</strong> 2210 home page can be accessed at:<br />

http://www.raleigh.ibm.com/220/220prod.html<br />

2.2.3.4 <strong>IBM</strong> 2216<br />

This section provides an introduction to the <strong>IBM</strong> 2216, a piece of equipment that<br />

can be utilized in the backbone provider′s upstream connection that requires<br />

more powerful resources.<br />

Further information can be found in:<br />

• <strong>IBM</strong> 2216 Maintenance Information, GA27-4105<br />

• <strong>IBM</strong> 2216 Planning and Setup Guide, GA27-4106<br />

• Nways 2216 Multiaccess Connector Description and Configuration, SG24-4957<br />

• http://www.networking.ibm.com/216/216prod.html<br />

Overview: The <strong>IBM</strong> 2216 Nways Multiaccess Connector can be used as a<br />

concentrator or high-capacity access point. The 2216 plays a vital role by<br />

interconnecting sites to exploit network computing. It provides WAN access,<br />

network optimization, device attachment and concentration. The 2216 fits<br />

naturally between <strong>IBM</strong>′s workgroup and campus routers and switches.<br />

The 2216 uses the same routing, bridging and SNA capabilities proven in the<br />

popular, award-winning <strong>IBM</strong> 8210 Nways MSS Server and 2210 Nways Router.<br />

These functions, called Multiprotocol Access Services (MAS), include<br />

standards-based, interoperable support for routing and bridging, with security<br />

and re-routing, on leased and switched networks.<br />

Hardware of the 2216: The <strong>IBM</strong> 2216 is available in Model 400, according to the<br />

types of networks you want to support. It has eight adapter slots and a system<br />

card with a PowerPC 604 processor. Figure 16 on page 31 illustrates the <strong>IBM</strong><br />

2216 hardware.<br />

30 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 16. <strong>IBM</strong> 2216 Hardware Overview<br />

The base <strong>IBM</strong> 2216 hardware consists of the following:<br />

1. A 19-inch cabinet, which may be placed either on a tabletop or installed in a<br />

rack.<br />

2. One power supply (with redundant power option)<br />

3. A cooling fan tray assembly<br />

4. A system backplane<br />

5. A system card containing:<br />

• 604 133-Mhz PowerPC Microprocessor<br />

• 512 KB L2 Cache<br />

• 512 KB Boot Flash<br />

• 64 MB DRAM<br />

• 1.08 GB Hard Drive<br />

DRAM: Dynamic random access memory (DRAM) provides the working memory<br />

for the 2216. The router code and router tables both run from DRAM. Currently,<br />

the size of DRAM available for the Model 400 is 64 MB.<br />

Note: We recommend you use the 2216STOR EXEC file prior to ordering the<br />

machine to ensure the correct configuration is ordered. This file is in the<br />

MKTTOOLS and is a REXX program. If you issue the EXEC 2216STOR command<br />

on the VM, some question menus will appear. When you answer these<br />

questions, the required memory space is made as the output.<br />

Chapter 2. Connectivity 31


This soft copy for use by <strong>IBM</strong> employees only.<br />

Boot Flash: The boot flash contains the power-on self-test (POST) code and<br />

initiates the IPL process. Support for the POST PCMCIA modem and an external<br />

modem is provided so there is a remote interface into the box in the absence of<br />

the operating system code. Some of the main components that reside in the<br />

boot flash are listed below:<br />

• POST code<br />

• Boot code<br />

• MAS operational system (open kernel)<br />

• PCMCIA modem device driver<br />

• External modem device driver<br />

• SLIP, BootP, TFTP, and TCP/IP code<br />

• EIDE hard drive device driver<br />

Hard Drive: The <strong>IBM</strong> 2216 contains a 1.08 GB EIDE hard drive that is mounted<br />

on the system card. The hard drive is used to store the compressed <strong>IBM</strong> Nways<br />

Multiprotocol Access Services (Nways MAS V1R1, product number 5765-B87)<br />

operational code (=Load Image File), configuration file, trace and dump logs.<br />

On the 2216, there is a fixed preservation area for image file and configuration<br />

files. There are two areas for image files and eight areas for configuration files.<br />

Interfaces Supported by the <strong>IBM</strong> 2216: Adapters can be inserted and removed<br />

while the <strong>IBM</strong> 2216 is operational. Failed adapters can be replaced without<br />

taking the system down or rebooting the software. The replaced adapter<br />

assumes the configuration of the failed adapter. New adapters can be added<br />

without powering the system down and activated at a convenient time by<br />

rebooting.<br />

• The LANs supported by the <strong>IBM</strong> 2216 are:<br />

− Token-ring (IEEE 802.5) with STP or UTP connection<br />

− Ethernet or IEEE 802.3 with 10Base2 or 10Base-T connection<br />

• The WAN interfaces supported by the <strong>IBM</strong> 2216 are:<br />

− EIA 232D/V.24<br />

− V.35<br />

− V.36<br />

− X.21<br />

− ISDN - Primary (T1/J1)<br />

− ISDN - Primary (E1)<br />

• The ATM interfaces supported by the <strong>IBM</strong> 2216 are:<br />

− ATM 155 Mbps multimode fiber<br />

− ATM 155 Mbps single-mode fiber<br />

• ESCON channel interface<br />

Adapters: The following adapters are available for the <strong>IBM</strong> 2216:<br />

• 2-Port Token-Ring (FC 2280)<br />

32 The Technical Side of Being an Internet Service Provider<br />

This adapter can continually process frames of data to and from system


This soft copy for use by <strong>IBM</strong> employees only.<br />

memory and the token-ring at a speed of either 4 Mbps or 16 Mbps. The<br />

physical shape of the token-ring interface is RJ-45 only.<br />

• 2-Port Ethernet (FC 2281)<br />

This adapter has an RJ-45 jack (10Base-T) and a BNC (10Base2) connector.<br />

There is no AUI interface.<br />

• 8-Port V.24/EIA-232E (FC 2282)<br />

Provides eight attachments to ITU-T V.24/EIA-232E WANs. Each attachment<br />

provides:<br />

− Support for receiving clock (modem attached) at a line speed from 9.6<br />

kbps to 64 kbps<br />

− Support for providing clock (directly attached) from 9.6 kbps to 64 kbps<br />

− A 100-pin D-shell female connector<br />

− Support for cable FC 2701<br />

• 6-Port V.35/V.36 (FC 2290)<br />

Provides six attachments to ITU-T V.35 or V.36 WANs. Each attachment<br />

provides:<br />

− Support for receiving clock (modem attached) at a line speed from 9.6<br />

kbps to 2.048 Mbps<br />

− Support for providing clock (directly attached) from 9.6 kbps to 460.8 kbps<br />

as well as 1.544 Mbps and 2.048 Mbps<br />

− A 100-pin D-shell female connector<br />

− Support for cable FC 2702 and FC 2703<br />

• 8-Port X.21 (FC 2291)<br />

Provides eight attachments to ITU-T X.21 WANs. Each attachment provides:<br />

− Support for receiving clock (modem attached) at a line speed from 9.6<br />

kbps to 2.048 Mbps<br />

− Support for providing clock (directly attached) from 9.6 kbps to 460.8 kbps<br />

as well as 1.544 Mbps and 2.048 Mbps<br />

− A 100-pin D-shell female connector<br />

− Support for cable FC 2704<br />

• 1-Port ISDN PRI for T1/J1 (FC 2283)<br />

Provides one attachment to an ISDN primary rate service at T1/J1 speed.<br />

This attachment provides:<br />

− Support for T1/J1 line speed of 1.544 Mbps<br />

− Twenty-three 64-kbps B-channels for data and one 64-kbps D-channel for<br />

signaling<br />

− Selectable framing to D4 (SF), D5 (ESF), or SLC-96R formats<br />

− DB-26 (26-pin D-shell) female connector<br />

− Support for cables FC 2714 and FC 2716<br />

• 1-Port ISDN PRI for E1 (FC 2292)<br />

Provides one attachment to an ISDN primary rate service at E1 speed. This<br />

attachment provides:<br />

Chapter 2. Connectivity 33


− Support for E1 line speed of 2.048 Mbps<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

− Thirty 64-kbps B-channels for data and two 64-kbps D-channels for<br />

signaling<br />

− Selectable framing to FAS, CAS, and CRC4 formats<br />

− DB-26 (26-pin D-shell) female connector<br />

− Support for cables FC 2715<br />

• 1-Port 155-Mbps Multimode Fiber ATM (FC 2284)<br />

Provides one attachment to an ATM switch over a multimode fiber optic<br />

cable. This attachment provides:<br />

− 8 MB of packet memory and 2 MB of control memory for<br />

high-performance support<br />

− A specialized ATM support chip to perform the segmentation and<br />

reassembly function (SAR) for ATM adaptation layer 5 (AAL-5)<br />

− SONET OC3c framing<br />

− Support for a 62.5/125 um(micron) multimode fiber<br />

− A multimode duplex SC connector<br />

Note: A cable is not provided for this adapter.<br />

• 1-Port 155-Mbps Single-Mode Fiber ATM (FC 2293)<br />

Provides one attachment to an ATM switch over a multimode fiber optic<br />

cable. This attachment provides:<br />

− 8 MB of packet memory and 2 MB of control memory for<br />

high-performance support<br />

− A specialized ATM support chip to perform the segmentation and<br />

reassembly function (SAR) for ATM Adaptation Layer 5 (AAL-5)<br />

− SONET OC3c framing<br />

− Support for a 9/125 um(micron) single-mode fiber<br />

− Transceiver support for a maximum cable length of 20 km<br />

− A multimode polarized duplex SC connector<br />

Note: A cable is not provided with <strong>IBM</strong> 2216 for this adapter.<br />

• 1-Port ESCON Channel (FC 2287)<br />

34 The Technical Side of Being an Internet Service Provider<br />

Provides one ESCON channel attachment and the ability to attach directly to<br />

the mainframe ESCON channel or to an ESCON Director.<br />

− Serial link data rate of 200 Mbps and data transfer rate of 17 Mbps.<br />

− Maximum cable length of 3 km. Longer distances can be supported via<br />

an ESCON Director with an ESCON Extended Distance interface (up to 23<br />

km total) or two cascaded ESCON Directors with ESCON Extended<br />

Distance interface (up to 43 km total).<br />

− Support for a 62.5/125 um(micron) multimode fiber.<br />

− Cable group #3797 available for this adapter via separate order.


This soft copy for use by <strong>IBM</strong> employees only.<br />

Cables: The following adapters are available for the <strong>IBM</strong> 2216:<br />

• EIA-232E/V.24 Fanout Cable (#2701)<br />

• V.35 Fanout Cable (#2702)<br />

• V.36 Fanout Cable (#2703)<br />

• X.21 Fanout Cable (#2704)<br />

• EIA-232E/V.24 Serial Interface Cable (#2705)<br />

• EIA-232E/V.24 Direct Attach Cable (#2706)<br />

• V.35 Serial Interface Cable (#2707)<br />

• V.35 Direct Attach Cable (#2708)<br />

• V.36 Direct Attach Cable (#2709)<br />

• V.36 Serial Interface Cable (#2710)<br />

• X.21 Serial Interface Cable (#2711)<br />

• X.21 Direct Attach Cable (#2712)<br />

• Multipurpose RJ-45 adapter Cable (#2713)<br />

Supports token-ring, Ethernet 10Base-T<br />

• RJ-48 T1 ISDN PRI Cable (#2714)<br />

• ISDN PRI (E1) Cable (#2715)<br />

• RJ-48 J1 ISDN PRI Cable (#2716)<br />

The Attachment Cable for V.35 DCE (#2799) - 0.3 meters is also available in<br />

France.<br />

The following cables are not provided as options for the <strong>IBM</strong> 2216 and must be<br />

obtained by the customer as required:<br />

• Token-ring STP network adapter cable<br />

• Ethernet 10Base2 cable<br />

• ATM multimode fiber adapter cable<br />

• ATM single-mode fiber adapter cable<br />

Physical Interface Connectivity: <strong>IBM</strong> 2216 consists of a rack-mountable or<br />

free-standing mechanical package that houses the power and cooling<br />

subsystems, system card, and eight feature adapter card slots.<br />

The front view of the box is shown in Figure 17 on page 36.<br />

Chapter 2. Connectivity 35


Figure 17. Card Position<br />

Note<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

The <strong>IBM</strong> 2216 has a few plugging restrictions. The current restriction is that<br />

only one PCI adapter (token-ring, or Ethernet) can be installed in slots 3 and<br />

4. Once a PCI adapter is installed in slot 3 then slot 4 is unusable, and vice<br />

versa. The same restriction also applies to slots 7 and 8. On the 2216:<br />

• Slots 3 and 4 share common PCI-Bus Request/Grant lines. If a token-ring<br />

or an Ethernet card is present and enabled in one of these slots, then the<br />

other slot may not contain an enabled the adapter card of any type.<br />

• Slots 7 and 8 share common PCI-Bus Request/Grant lines. If a token-ring<br />

or an Ethernet card is present and enabled in one of these slots, then the<br />

other slot may not contain an enabled the adapter card of any type.<br />

The following table shows the maximum number of each adapter card and port.<br />

Table 12. Maximum Number of an <strong>IBM</strong> 2216 Physical Interface<br />

Max. # of<br />

Adapter<br />

Cards<br />

Max. # of<br />

Ports<br />

Token-Ring<br />

(2280)<br />

Ethernet<br />

(2281)<br />

V.24/EIA232<br />

(2282)<br />

V.35/V.36<br />

(2290)<br />

X.21<br />

(2291)<br />

ISDN PRI<br />

(2283/2292)<br />

ATM<br />

155M<br />

(2284/2293)<br />

6 6 8 8 8 4 2 1<br />

12 12 64 48 64 4 2 4<br />

36 The Technical Side of Being an Internet Service Provider<br />

ESCON<br />

(2287)


This soft copy for use by <strong>IBM</strong> employees only.<br />

MAS Supporting Protocols: For MAS, all routing protocols in the following table<br />

are included in a single package with the option to choose a code load with or<br />

without the APPN/HPR/DLUR support.<br />

Table 13. Protocols or Functions Supported on Data Link Controls (DLCs)<br />

PPP FR X.25 SDLC TR Eth ATM/1483 ATM/LEC<br />

TCP/IP Yes Yes Yes No Yes Yes Yes Yes<br />

IPX Yes Yes Yes No Yes Yes Yes Yes<br />

AppleTalk<br />

2<br />

Yes Yes No No Yes Yes No Yes<br />

DECnet 4 Yes Yes Yes No Yes Yes No Yes<br />

DECnet<br />

5/OSI<br />

Banyan<br />

VINES<br />

Bandwidth<br />

reservation<br />

(BRS)<br />

FR BAN<br />

SNA end<br />

system<br />

DLSw<br />

SNA end<br />

system<br />

DLSw<br />

NetBIOS<br />

end<br />

system<br />

APPN<br />

ISR<br />

APPN<br />

HPR<br />

APPN<br />

DLUR<br />

Yes Yes No No Yes Yes No Yes<br />

Yes Yes Yes No Yes Yes No Yes<br />

Yes Yes No No No No No No<br />

Yes Yes No Yes Yes Yes No Yes<br />

Yes Yes No Yes Yes Yes No Yes<br />

Yes Yes No No Yes Yes No Yes<br />

Yes Yes No Yes Yes Yes No Yes<br />

Yes Yes No No Yes Yes No Yes<br />

No Yes No Yes Yes Yes No Yes<br />

Bridging Yes Yes No No Yes Yes No Yes<br />

WAN<br />

restoral<br />

WAN<br />

reroute<br />

Yes No No No No No No No<br />

Yes Yes No No No No No No<br />

Dial-on-demandYes Yes No No No No No No<br />

Note: MAS (2216) does not support ISDN BRI or EasyStart client function.<br />

2.2.3.5 <strong>IBM</strong> 8224<br />

Here we provide an overview of the <strong>IBM</strong> 8224, a suitable hub for an initial ISP<br />

environment.<br />

The 8224 provides a flexible and comprehensive Ethernet network connectivity<br />

and management tool for a wide range of environments. Each 8224 provides up<br />

to 17 ports of Ethernet connectivity: sixteen 10Base-T ports and one optional<br />

media expansion port for connecting to an existing 10Base2, 10Base5, or fiber<br />

Ethernet network.<br />

The 8224 is available in two models; Model 001 and 002. Model 001 is an<br />

unmanaged unit that can be managed by an 8224 Model 002 in a stack. Model<br />

Chapter 2. Connectivity 37


This soft copy for use by <strong>IBM</strong> employees only.<br />

002 is an SNMP management unit that can manage up to nine Model 001s in a<br />

stack. Up to ten 8224s can be stacked together, for a total port count of 170.<br />

Stacked units can be separated by a distance of up to 250 feet.<br />

In addition to the stackable function, the 8224 does the following:<br />

• Supports segmentation. The 8224 stack can be divided into several<br />

segments (collision domains). Stacked 8224s can be segmented while<br />

maintaining management capability through a single management unit<br />

(Model 002). The minimum segment size is one hub as a single hub cannot<br />

be segmented.<br />

• Supports cascading through its media expansion ports or 10Base-T ports.<br />

• Provides centralized management of remote sites and branch offices through<br />

its out-of-band management support via the SLIP protocol. IS managers can<br />

dial up a remote site or branch office and receive the management<br />

information from the 8224 at that site.<br />

• Supports MIB-II (RFC 1213), the hub repeater MIB (RFC 1516), and the Novell<br />

Repeater MIB through the SNMP agent. These MIBs are open and can be<br />

managed by most DOS or AIX network management applications, including<br />

NetView for AIX.<br />

• Supports SNMP over IP and IPX. The 8224 can be managed by an SNMP<br />

network management station running in a TCP/IP network or via Novell′s<br />

NetWare Management Station.<br />

• Provides for redundant links between 10Base-T port pairs via the <strong>IBM</strong> MIB<br />

extensions.<br />

• Provides for redundant management units (Model 002s) in the stack.<br />

Technical Description: This section provides a technical overview of the 8224<br />

Ethernet Stackable Hub.<br />

Figure 18 on page 39 shows the front panel of both 8224 models. The hardware<br />

features include an operator panel indicating the following:<br />

• Sixteen 10Base-T Ports<br />

• Media Expansion Port<br />

• Communications Port<br />

• Hub Expansion Port<br />

• Port and Machine status LEDs<br />

• Uplink Switch<br />

• Power On/Off Switch<br />

38 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 18. <strong>IBM</strong> 8224 Model 001 and 002 Front Panel<br />

Connectivity Features: Below is a description of the 8224′s connectivity<br />

features:<br />

• Media Expansion Port (MEP)<br />

This port can be used as the 17th port or for cascading to another Ethernet<br />

network. The available pluggable expansion port module options are:<br />

− <strong>IBM</strong> 8224 AUI Media Expansion Port Module (f/c 9730) provides a<br />

standard DB-15 connector for an AUI cable or transceiver.<br />

− <strong>IBM</strong> 8224 10Base2 Media Expansion Port Module (f/c 9731) provides a<br />

standard BNC connector for coax (ThinNet).<br />

− <strong>IBM</strong> 8224 Optical Fiber Media Expansion Port Module (f/c 9732) provides<br />

standard ST connectors to support both FOIRL and 10Base-FL over fiber<br />

media (50/125μm, 62.5/125μm, 100/140μm).<br />

Figure 19. Front Views of 8224 Media Expansion Port Modules<br />

• 10Base-T Ports<br />

Sixteen ports with shielded RJ-45 connectors are standard per unit.<br />

Category 3, 4, 5 UTP or STP cable is supported. The 16th port has selectable<br />

pair reversal for easy cascading without the need for crossover cables.<br />

• Uplink switch<br />

When set to the equals symbol (=), this switch reverses the internal<br />

crossover of the receive and transmit signal pairs in port 16 of every hub,<br />

allowing standard, straight-through, 10Base-T cables to be used for<br />

cascading through those ports.<br />

Chapter 2. Connectivity 39


• Communications Port<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

This is a standard DB-9 connector for an EIA 232-C interface. The following<br />

functions are provided:<br />

− Out-of-Band Management (SNMP over SLIP)<br />

− Configuration (via XMODEM)<br />

− Microcode Upgrade (via XMODEM or via TFTP over SLIP)<br />

• Hub Expansion Port (HEP)<br />

This port connects individual units into a stack that acts as a single repeater.<br />

It contains an Ethernet bus and bidirectional serial control bus and uses<br />

standard 4-pair UTP cable (category 3 minimum) with RJ-45 connectors. The<br />

hub expansion port allows up to 76.2 meters (250 feet) end-to-end distance<br />

between units in the stack.<br />

Display Features: The <strong>IBM</strong> 8224 provides LED indicators for comprehensive<br />

machine and port status. These are detailed below.<br />

• 10Base-T Port LED indications:<br />

− Link OK<br />

− Activity<br />

− Auto-Partitioned<br />

− Management Disabled<br />

• Media Expansion Port LED indications:<br />

− Link OK (Fiber Only)<br />

− Activity<br />

− Auto-Partitioned<br />

− Management Disabled<br />

• Unit Status indications:<br />

− Power On, Diagnostics Complete<br />

− Management Agent Present<br />

− Collision<br />

Inter-8224 Communications in Managed Stacks: In a stack with one or more<br />

8224 Model 002s, an inter-hub control bus is activated inside the hub expansion<br />

cables in addition to the Ethernet bus. The control bus is used to pass stack<br />

control information from 8224 to 8224. Figure 20 on page 41 gives a logical view<br />

of the inside of the hub expansion cable for a managed stack.<br />

40 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 20. A Managed Stack of 8224s<br />

Using an SNMP-based management application, you can get the following<br />

information about all 8224s in a stack while attached to any 8224 in a stack:<br />

• Model number and media expansion port module type<br />

• MAC address<br />

• IP address<br />

• IP subnet mask<br />

• IP default gateway<br />

• Whether the 8224 is segmented from the external Ethernet bus<br />

Using an SNMP-based network manager, you can perform any of the following<br />

actions on any 8224 in a stack while attached to any 8224 in a stack:<br />

• Set the IP address<br />

• Set the IP subnet mask<br />

• Set the IP default gateway<br />

• Segment the 8224 from the external Ethernet bus or rejoin the 8224 to the<br />

bus<br />

• Set the write community name<br />

• Enable or disable write protect<br />

• Reset the 8224 to make the new settings take effect<br />

Even if 8224s have been segmented from the Ethernet bus, the inter-hub control<br />

bus allows you to set IP information and segment 8224s from a stack.<br />

Why Segment 8224s from a Stack?: Three major uses of segmentation are to<br />

improve performance, to troubleshoot, and to isolate groups of users. This<br />

section details those uses.<br />

1. Improving Performance<br />

An unsegmented stack is a single collision domain. All devices attached<br />

anywhere to an unsegmented stack see all the Ethernet frames generated<br />

anywhere else in the stack.<br />

Chapter 2. Connectivity 41


This soft copy for use by <strong>IBM</strong> employees only.<br />

As network traffic increases, excessive collisions can cause network<br />

performance to slow. You can improve performance by segmenting any<br />

number of 8224s from the other 8224s in a managed stack. Each segmented<br />

8224 is in its own collision domain as long as it is not linked to any other<br />

8224s.<br />

To enable segmented 8224s to communicate with the rest of the stack, you<br />

can interconnect them using a bridge, router, or Ethernet switch.<br />

2. Troubleshooting<br />

Segmentation can help you isolate areas of your network that are<br />

experiencing problems. You can segment 8224s one at a time from the rest<br />

of the stack while monitoring stack performance. This technique can help<br />

you localize a problem area to the devices attached to one 8224.<br />

3. Isolating User Groups<br />

You may have users in your network who have no need for connectivity<br />

outside their department or workgroup. By connecting their workstations to<br />

one or more segmented 8224s, you can limit their network access while<br />

keeping control of the 8224s.<br />

Configuration: Refer to Chapter 2 of the 8224 Ethernet Stackable Hub Installation<br />

and User′s Guide, GA27-4024, for step-by-step instructions for installing the 8224<br />

and the optional media expansion port modules.<br />

2.2.3.6 <strong>IBM</strong> 8237<br />

The <strong>IBM</strong> 8237 is a hub eligible not only for small Ethernet ISP networks, that<br />

need only a minimal number of ports with or without management, but also for<br />

larger networks that require large number of ports with sophisticated<br />

management and high-performance switching connectivity with other Ethernet<br />

LANs, switches, and routers.<br />

Overview: The <strong>IBM</strong> 8237 Stackable Ethernet Hub-10Base-T is a<br />

high-performance, cost-effective 10Base-T repeater platform that supersedes the<br />

8224 Ethernet Hub. It connects high-performance workstations to Ethernet local<br />

area networks (LANs) and provides high-performance inter-LAN connectivity<br />

using switching technology. The 8237 offers cost-effective solutions for both<br />

large and small LAN environments by providing many security and connectivity<br />

features, and three backbone LAN/hub segmentation.<br />

The 8237 is available in three models that provide multiple choices of network<br />

management:<br />

• Model 001 is a stackable 16-port 10Base-T Ethernet repeater plus a network<br />

expansion/inter-LAN connectivity port. It is a manageable unit that can be<br />

managed by Model 002 and Model 003.<br />

• Model 002 contains the same flexible port features of the Model 001 along<br />

with an SNMP management agent that provides extensive in-band and<br />

out-of-band management for itself or a full 10-unit 8237 stack.<br />

• Model 003 contains both an SNMP agent and an RMON agent. The RMON<br />

agent is capable of performing all nine groups of RMON on one of the three<br />

backplane segments of an 8237 stack. In addition, the Model 003 contains<br />

the same flexible port features of the Model 001 and the SNMP management<br />

agent that is provided in the Model 002.<br />

42 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Up to ten 8237s can be stacked together, for a total port count of 170. In addition<br />

to the stackable function, the 8237 does the following:<br />

• Provides centralized management of remote sites and branch offices through<br />

its out-of-band management support via the SLIP protocol. IS managers can<br />

dial up a remote site or branch office and receive the management<br />

information from the 8237 at that site. It′s also possible to remotely<br />

download software upgrades, using a dial-up or in-band connection.<br />

• Supports MIB-II (RFC 1213), the hub repeater MIB (RFC 1516), Ethernet MIB<br />

(RFC 1643) and the Novell Hub MIB (RFC 1289). These MIBs can be<br />

managed by most network management applications, including <strong>IBM</strong> Nways<br />

Manager. Model 002 can manage up to nine Model 001s in a stack. A<br />

user-installed field upgrade allows the Model 002 to incorporate the same<br />

RMON management capability as the Model 003.<br />

• The Model 003 Advanced Management Unit contains, in addition to the<br />

SNMP management features of the Model 002, a remote monitoring agent<br />

that supports all nine groups of the RMON MIB. This agent employs a<br />

dedicated 386 processor with 4-MB RAM standard (20 MB maximum).<br />

• Provides three separate internal Ethernet backplanes (segments).<br />

• Provides up to 18 pairs of redundant links that can be configured to connect<br />

the 8237 system to other devices. One link of the pair is active and the other<br />

serves as a backup link for improved availability of the mission-critical<br />

devices.<br />

• Provides for redundant management units (Model 002s and 003s) in the<br />

stack. If the primary management unit must be taken out of service, the<br />

backup management unit automatically takes over with no loss of<br />

management function or management data.<br />

• All models of the 8237 are hot-pluggable. They can be replaced individually<br />

without disrupting the other hubs in the stack.<br />

• Configuration data is stored in non-volatile memory and is automatically<br />

restored after power disruption.<br />

• Provides excessive collision protection. The 8237 will partition (disable) any<br />

of the 10Base-T ports when more than 32 consecutive collision-causing<br />

frames are transmitted from that port. While the port is disabled,<br />

transmissions from the network to that device are maintained. The port is<br />

automatically reenabled when the condition clears.<br />

• Provides jabber protection, that makes the 8237 partition a port when a node<br />

transmits continuously for 6.5 milliseconds. The port is automatically<br />

reenabled when transmission from that port stops for 9.6 microseconds.<br />

Connectivity Features: Each stand-alone 8237 provides workstation ports with<br />

shielded RJ-45. The maximum number of 8237 in a stack is 10, for a total of 170<br />

ports. The 8237 provides optional inter-LAN connectivity via field-installable<br />

expansion modules:<br />

• Media Expansion Ports:<br />

− AUI/10Base-2 (BNC)<br />

− 10Base-FL/FOIRL (Fiber)<br />

• Fast Expansion Modules:<br />

− 10Base-T/100Base-TX (two-pair Category-5 wiring)<br />

Chapter 2. Connectivity 43


− 100Base-FX (fiber)<br />

Networks Supported by the <strong>IBM</strong> 8237<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

The <strong>IBM</strong> 8237 Stackable Ethernet Hub-10B-T is interoperable with other repeaters<br />

that conform to the IEEE802.3 10B-T and IEE802.3U international standards. The<br />

<strong>IBM</strong> 8237 provides inter-LAN connectivity with the following networks:<br />

• 10Base-T<br />

• 10Base-FL/FOIRL<br />

• 10Base2<br />

• 100BASE-TX<br />

• 100BASE-FX<br />

2.2.4 Domain and IP Address<br />

If you need more information, refer to 8237 Ethernet Stackable Hub Installation<br />

and Planning Guide, GA27-4186.<br />

Finally, we see the essential requisites for an ISP′s Internet backbone<br />

connection: the domain and IP addresses.<br />

All equipment on the Internet needs an IP address. It has to be a globally<br />

routable IP address that is allocated to you by someone and is routed by your<br />

upstream provider to the rest of the Internet. But how do people get IP<br />

addresses and domains? Before answering this question, we have an overview<br />

of Internet domains and IP addresses, and also the organizations responsible for<br />

them.<br />

2.2.4.1 Internet Domains<br />

We usually refer to the equipment on the Internet by symbolic names, which are<br />

associated with IP addresses. This mapping between IP addresses and host<br />

names is made through a group of servers called Domain Name System (DNS).<br />

The DNS is a distributed database, because no single site on the Internet knows<br />

all the information.<br />

The domain allocation in the Internet has the objective to avoid using the same<br />

name in more than one system and to decentralize the registration. Therefore,<br />

the Internet was divided in distinct administrative domains in which equipment or<br />

subdomains can′t have duplicate names. Recursively, we guarantee that there<br />

is only one name for each Internet equipment.<br />

This name space is built as a hierarchical tree structure with a root on top.<br />

44 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 21. The Tree Structure of the Domain Name Space<br />

Therefore, the symbolic name of Internet equipment is made up of a local name<br />

and its domain hierarchy, called Fully Qualified Domain Name (FQDN). This<br />

name is separated by dots and is read from left to right, from the most specific<br />

name to the highest hierarchical level.<br />

The Internet domains can be either institutional or geographical types. In the<br />

USA, the institutional domains are most often used. They are in the Table 14:<br />

Table 14. Institutional Domains<br />

For example, we could have:<br />

www.raleigh.ibm.com<br />

www.nasa.gov<br />

The other countries adopted a geographical domain in the top-level domain<br />

(TLD) by using the two-letter country code taken from the ISO standard 3166.<br />

The second-level structure varies from country to country, but often also takes<br />

the form of co or com for commercial companies, re for research groups, etc. In<br />

some countries, such as Canada and France, the organizations are even put<br />

directly below the country TLD.<br />

Here are some examples:<br />

www.whitchurch.cardiff.sch.uk<br />

www.dtag.de<br />

www.embratel.net.br<br />

Domain Institution Type<br />

mil Military<br />

edu Educational<br />

com Commercial<br />

gov Government<br />

org Non-profit<br />

net Backbone Providers<br />

int International<br />

However, it should be noticed that some of the TLDs are international and can<br />

be used in other countries without including the country code, for example, com,<br />

org, net.<br />

Chapter 2. Connectivity 45


This soft copy for use by <strong>IBM</strong> employees only.<br />

2.2.4.2 The Registries<br />

The Internet Assigned Numbers Authority (IANA) is responsible for the overall<br />

coordination and management of the Internet Domain Name System. It is the<br />

central coordinator for the assignment of unique parameter values for Internet<br />

protocols and especially the delegation of portions of TLDs, most of them the<br />

two-letter country codes. The IANA is chartered by the Internet Society (ISOC)<br />

and the Federal Network Council (FNC).<br />

Furthermore, a central Internet Registry (IR) has been selected and designated<br />

to handle most of the day-to-day administration of the DNS. Applications for new<br />

top-level domains are handled by the IR with consultation with the IANA. The<br />

current IR is InterNIC 1 .<br />

However, the Internet activity growth has led to a further delegation of authority<br />

for the domain name space to some other regional/national registries. The<br />

InterNIC takes care of registry for the Americas that includes (but is not limited<br />

to) North America, South America, South Africa and the Caribbean. Other<br />

registration requests should be directed to the appropriate regional/national<br />

registry.<br />

Table 15 shows a list of some of them.<br />

Table 15. Regional Registries<br />

Organization Area URL for Information E-mail<br />

Internic US and<br />

Americas<br />

www.internic.net hostmaster@internic.net<br />

RIPE Europe www.ripe.net ncc@ripe.net<br />

APNIC Asian<br />

Pacific<br />

www.apnic.net admin@apnic.net.<br />

NIC-Mexico Mexico www.nic.mx webmaster@nic.mx<br />

RNP Brazil www.cg.org.br registro@fapesp.br<br />

2.2.4.3 IP Address<br />

Each computer needs to have an IP address. The routing decisions made by the<br />

routers on the Internet rely on addressing alone.<br />

An ISP needs to allocate a set of addresses accordingly to its dedicated<br />

business customers, dial-in users, remote POPs, ISP-related servers and<br />

networking equipment.<br />

The technique used to allocate addresses is called subnetting. The routers on<br />

the Internet deal with the subnetwork part of the address; their tables are<br />

updated to determine in which data circuit the packet should be forward to. The<br />

challenge to the Internet is to keep the routing tables as small as possible on the<br />

very high-speed backbones and NAPs, and allow the routers in the ISPs to<br />

handle the routing to individual business and dial-in users.<br />

1 At the time of writing, IANA has proposed the InterNIC to be split in two to separate the DNS and Internet Number Registration<br />

activities. The new organization would administer IP registration and is called American Registry for Internet Numbers<br />

(ARIN). See http://www.arin.net.<br />

46 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Theoretically, an ISP could get one of the three IP address classes (A, B or C)<br />

that fits its needs. However, as there are no class A addresses anymore, and<br />

few class B, most ISP networks are assigned multiple class C address blocks. A<br />

class C network block uses the network mask of 255.255.255.0, meaning that<br />

there are 255 addresses available. An ISP may assign an entire class C block of<br />

addresses to a business or may further subnet the block of addresses to service<br />

multiple businesses. For example, if the network mask is changed to<br />

255.255.255.248, then eight addresses are available to that particular customer.<br />

From the Internet point of view, any class C address that is within the ISP′s<br />

range gets routed to the ISP.<br />

2.2.4.4 Classless Inter-Domain Routing<br />

To talk about IP allocations today, it′s also necessary to understand the modern<br />

terminology used to talk about blocks of IP addresses.<br />

As it was mentioned, the IP address space was allocated in class A, B or Class<br />

C. Class A networks have almost 17 million addresses, class B networks have<br />

65,536 addresses and class C networks have 256 addresses. Actually, those<br />

numbers are high, since a certain percentage of the numbers in any network<br />

have special meaning and aren′t available for hosts.<br />

Those IP ranges are called classful networks because of the class X<br />

nomenclature. Currently, address are allocated in Classless Inter-Domain<br />

Routing (CIDR) notation.<br />

However, in the early 1990s there was some worry about the end of address<br />

space. This was because of inefficient utilization of giving out all of these class<br />

Bs, but the real problem was that the routers of the Internet were about to<br />

explode and would be unable to continue making the Internet work primarily<br />

because the number of routes on the Internet was growing exponentially.<br />

So the members of the Internet Engineering Task Force (IETF 2 ) developed a new<br />

methodology. It consisted of extending the subnet idea to the entire 32 bits of<br />

address space, where subnets are subsections of a classful network. They are<br />

specified using the subnet masks that you′ve probably all seen. For example,<br />

255.255.255.192 represents a 64-IP subnet of a class C-sized chunk and<br />

255.255.192.0 represents a 64 class-C-sized chunk of address space.<br />

Therefore, instead of allocating networks in chunks on byte boundaries, they<br />

allocate networks sized any power of 2 from 1 to 32 bits. They called this plan<br />

CIDR.<br />

CIDR notation names a network by simply specifying how many bits, out of 32<br />

possible bits, that the network has. So a class C in CIDR notation is a /24, a<br />

class B is a /16, and a class A is a /8.<br />

2 IETF is a large open international community of network designers, operators, vendors and researches concerned with the<br />

evolution of the Internet architecture and smooth operation. They are who make the RFCs.<br />

Chapter 2. Connectivity 47


This soft copy for use by <strong>IBM</strong> employees only.<br />

2.2.4.5 How to Get IP Addresses<br />

You can get your IP address range directly from your upstream provider or<br />

through the regional register. However, the best (and easiest) way of getting<br />

your IP address space is by getting it from the upstream provider, who also got<br />

its address space from its upstream provider or directly from a registry.<br />

The provider will give you IP addresses that come from the IP address space<br />

allocated to its backbone. It can use subnetting or CIDR techniques.<br />

These globally unique addresses owned by the upstream provider are called<br />

Provider Access (PA) IP addresses. When a customer terminates the contract<br />

with the provider, any assigned PA addresses must be relinquished. The<br />

advantage is that these addresses can minimize the network routing tables,<br />

resulting in better performance. This is the policy the IANA recommends to be<br />

adopted.<br />

If you do not want to get the IP range from a service provider you must apply<br />

directly to the regional registry responsible for your country.<br />

You will receive Provider Independent (PI) IP addresses. They are also globally<br />

unique addresses, but are owned by the customers and can be transferred from<br />

one provider to another. Its use is mandatory you have upstream connections<br />

with different providers.<br />

Unlike PA addresses, the routing of PI addresses through the Internet is not<br />

guaranteed; if the size of the network routing tables gets too large, ISPs may<br />

remove PI addresses from their tables. For this reason, the use of PI addresses<br />

is not recommended, and the use of PA addresses encouraged.<br />

Finally, as the address allocation is very important for the ISP (from what is<br />

actually being used to what is available) the ISP should carefully map out the<br />

addressing strategy before getting it. In fact, when an ISP contacts any provider<br />

to get an IP subnet, it will require a network topology diagram and engineering<br />

plans. And to require more than one you will probably have to prove this need<br />

and guarantee that most of the addresses will be used immediately.<br />

2.2.4.6 How to Obtain a Domain Name<br />

As discussed before, to use domain names we need to resolve host names into<br />

their corresponding IP addresses. These functions rely on machines called<br />

name servers. In a typical Internet dial-up connection, the name server is<br />

located in the provider. That′s because the customer uses his or her provider′s<br />

domain name, and normally only for e-mail.<br />

However, as you will be the provider, you will probably want to have your own<br />

domain name server so you can have more flexibility to provide services to your<br />

customers. For example, if you have Web hosting services for a set of<br />

businesses, each one will want a unique home page for their customers. To do<br />

that, you need a primary DNS that also refers to other alternate addresses and<br />

aliases.<br />

Finally, for a domain name registration it′s necessary to contact the regional<br />

registry. This task can be accomplished directly (by you) or indirectly (by your<br />

provider).<br />

If you need or want to get your domain name directly, these are the general<br />

steps for a registration:<br />

48 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

1. Find out if the domain name that you want is available. You can do this by<br />

querying the Whois database of a registry.<br />

2. Configure the DNS server. Without DNS, the registry will not process your<br />

registration.<br />

3. Fill out the Domain Name Registration Agreement. This form is used to<br />

gather the information needed to process your registration and add your<br />

domain to the Whois database. It is usually downloaded from the registry<br />

site through an ftp command.<br />

4. Send e-mail agreement to the registry.<br />

5. The request is automatically processed and assigned a tracking number.<br />

You should immediately make a note of this number to check on the status<br />

of the registration.<br />

6. The agreement is automatically checked for errors.<br />

7. The agreement is processed and sends an e-mail back to you.<br />

8. Information for the new domain is added to the registry′s Whois database.<br />

Normally these procedures takes from days to weeks and you also have to pay a<br />

fee.<br />

For additional information about getting an IP address and domain, refer to:<br />

• http://www.internic.net<br />

• http://www.ripe.net<br />

• http://www.apnic.net<br />

• http://www.iahc.org<br />

2.2.5 <strong>IBM</strong> As a Service Provider<br />

<strong>IBM</strong> Global Services (IGS), with more than $22.9 billion in revenues and<br />

operations in 164 countries, is the world′s leading provider of product,<br />

professional and network services. Its managed network services for content,<br />

collaboration and electronic commerce as well as network outsourcing services<br />

are provided over the <strong>IBM</strong> Global Network (IGN) which serves more than 30,000<br />

customer enterprises in 860 cities and 100 countries.<br />

To provide international support for users wishing to access the Internet, <strong>IBM</strong><br />

sets up networks and communication connections to service providers all around<br />

the world. These service provider connections have been combined with <strong>IBM</strong>′s<br />

vast network resources to form the <strong>IBM</strong> Global Network.<br />

IGN operates the world′s largest high-speed network for telecommunications<br />

services and network-centric computing. It brings together <strong>IBM</strong>′s capabilities to<br />

provide seamless, value-added network services globally through wholly-owned<br />

subsidiaries and joint ventures around the world.<br />

The network services and applications provided by <strong>IBM</strong> are:<br />

• Internet dial-up access (a local call) in more than 800 cities in nearly 50<br />

countries<br />

• Worldwide high-speed multiprotocol network supporting SNA/SDLC, X.25,<br />

APPN, ASYNCH, BISYNCH, NETBIOS, Novell IPX and TCP/IP<br />

• Leased-line connections<br />

Chapter 2. Connectivity 49


• Wireless communications<br />

• LAN Internetworking and multiprotocol solutions<br />

• Electronic Data Interchange<br />

• Electronic mail services<br />

• <strong>IBM</strong> InterConnect for Lotus Notes<br />

• Content services<br />

• Information service<br />

• Network outsourcing<br />

In the next section we show the leased-line services.<br />

For information about <strong>IBM</strong> Global Services, please see:<br />

http://www.ibm.com/services/globalservices.html<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

For additional information about <strong>IBM</strong> Network Services, refer to:<br />

http://www.ibm.com/globalnetwork<br />

2.2.5.1 <strong>IBM</strong> Leased Line Internet Connection Services<br />

The <strong>IBM</strong> Global Network offers a secure, reliable and flexible set of high-speed,<br />

leased-line Internet access solutions that can include network connectivity<br />

resources, and security options designed, installed and managed by the <strong>IBM</strong><br />

Global Network. Customers can establish high-speed leased-line access to the<br />

Internet, without having to install and manage their own network hardware,<br />

software and telecommunications links.<br />

The Leased Line Internet Connection Services is part of the range of Internet<br />

services provided by the <strong>IBM</strong> Global Network. It offers a high-speed permanent<br />

and fully managed access link to the resources of the Internet. This service is a<br />

custom offering that is ordered, scheduled and priced based on specific<br />

customer access, transport and application requirements.<br />

IGN provides leased line access to the Internet at speeds equivalent to corporate<br />

data networks. The services also expand the capabilities of IGN Internetworking<br />

and multiprotocol solutions by allowing secure Internet access from their existing<br />

corporate networks.<br />

Capabilities include:<br />

• Access for full TCP/IP connectivity to the Internet.<br />

• Managed dedicated leased line access to the Internet at high-speed data<br />

rates of 19.2, 56, 64, 128, 256, 512 kbps, 1.544 Mbps and 45 Mbps access on a<br />

special bid basis.<br />

• Assignment of IP address ranges for the customer network.<br />

• Assistance with registration of the customer private domain name with the<br />

responsible naming authority.<br />

• Fixed-price connections based on site connectivity requirements.<br />

50 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

2.2.5.2 Features<br />

<strong>IBM</strong> provides the planning, design, network components, installation,<br />

maintenance and operation required to attach customers′ systems to <strong>IBM</strong> Global<br />

Network′s Internet network.<br />

The Leased Line Internet Connection Service includes:<br />

• Backbone network, facilities and network connectivity to the Internet through<br />

the <strong>IBM</strong> Global Network′s Internet network.<br />

• Customer premise router and backbone router(s).<br />

• If required, an <strong>IBM</strong> 2210 Nways Multiprotocol Router for use as the customer<br />

site router (CSR), including an asynchronous modem for remote<br />

support/problem determination.<br />

• Installation, maintenance and support of <strong>IBM</strong>-provided solution components.<br />

• Data service units (DSUs)/customer service units (CSUs).<br />

• LAN interface.<br />

• Physical link (56 kbps-T1)n<br />

• If required, an IP address range for use in the customer′s network will be<br />

assigned by <strong>IBM</strong>.<br />

• Domain Name Services (DNS), where IGN will act as the external primary<br />

and/or secondary name server on behalf of a customer′s network. IGN will<br />

negotiate with the Internet Network Information Center (NIC) to acquire<br />

network numbers as well as provide proper registration of IP addresses with<br />

the NIC on behalf of the customer and will assist in connecting the<br />

customer′s DNS to the global DNS infrastructure. This support is available<br />

immediately as part of the leased line Internet Connection capabilities.<br />

• Network Management:<br />

− 24-hour, seven-day-a-week network monitoring<br />

− Problem determination and management<br />

− Performance monitoring<br />

− Capacity planning and management of the IGN backbone network<br />

− Capacity monitoring of the CSR and circuit to the customer premise<br />

− Notification to the customer if an upgrade of the customer circuit is<br />

required<br />

• Customer support<br />

− 24-hour, seven-day-a-week customer assistance<br />

2.2.5.3 Physical Attachment Design<br />

LAN Internetworking Version 1.1 offers firewall security protection via the <strong>IBM</strong><br />

Global Network′s product, TCPGATE2. It allows users with TCP/IP and/or SNA<br />

platforms to access limited Internet protocols. The supported features are<br />

Domain Name Server service, FTP, WWW browsing (via a SOCKS gateway for<br />

TCP/IP users), Gopher, and Telnet. E-mail and Newsgroups support will be<br />

available in the future. Figure 22 on page 52 shows all network access paths to<br />

the <strong>IBM</strong> Global Network.<br />

Chapter 2. Connectivity 51


Figure 22. LAN Internetworking/Direct Leased Line via <strong>IBM</strong> Global Network<br />

52 The Technical Side of Being an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.


This soft copy for use by <strong>IBM</strong> employees only.<br />

The Leased Line Internet Connection Service (ICS) provides a permanent<br />

(non-switched) high-speed direct attachment to the <strong>IBM</strong> Global Network for<br />

customer′s IP-based LANs, as shown in Figure 23 on page 53.<br />

Figure 23. Direct Leased Line Internet Access Physical Attachment<br />

The customer′s LAN is attached, using a network interface card, to a customer<br />

site router (CSR). The CSR is then connected, via a leased line, to another router<br />

(the entry node router), which is directly connected to the <strong>IBM</strong> Global Network′s<br />

Internet backbone (OpenNet). The CSR is also equipped with an analog dial-up<br />

port and a high-speed modem to allow <strong>IBM</strong> support personnel to access the CSR<br />

over the public switched telephone network (PSTN) to perform remote<br />

configuration, maintenance, and support.<br />

2.2.5.4 Hardware and Software Requirements<br />

<strong>IBM</strong> supplies and installs, if they are necessary, the following equipment at the<br />

customer site:<br />

• A CSR with an appropriate network interface card to connect to the<br />

customer′s LAN<br />

• A PSTN modem and cables for use with the CSR′s dial-up facility<br />

Customers must provide:<br />

• A TCP/IP-enabled host and LAN, using the appropriate IP addresses.<br />

• The appropriate cabling and connectors required to connect the customer′s<br />

LAN to the network interface card on the CSR. The supported network types<br />

are:<br />

− Ethernet (10 Mbps)<br />

− Token-ring (4 Mbps and 16 Mbps)<br />

• An analog PSTN circuit for use by the dial-up modem.<br />

Note: Customers planning to switch this circuit through a digital private<br />

automatic branch exchange (PABX), must ensure that the PABX is configured<br />

to provide an analog connection for the circuit. Customers with PABXs that<br />

Chapter 2. Connectivity 53


2.3 Downstream Connections<br />

2.3.1 Types of Users<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

do not support analog connections must ask the local PTT provider to supply<br />

a direct analog circuit for use by the dial-up modem.<br />

• The leased line circuit from the customer site to the allocated <strong>IBM</strong> Global<br />

Network entry node. Where permitted by local legal and PTT regulations,<br />

<strong>IBM</strong> will order the appropriate leased line circuit on behalf of customers.<br />

• The primary name server and its administration and support for names<br />

within the LAN. The primary name server should also be configured for<br />

inverse name address resolution.<br />

If required, <strong>IBM</strong> can supply the primary name server facilities for customers.<br />

However, a maximum of three network devices and two mail hosts only will<br />

be supported per customer.<br />

• Security facilities, such as a firewall, to protect their network as required.<br />

For additional information about Leased Line Internet Connection Service, refer<br />

to:<br />

• http://www.ibm.com/globalnetwork/leasedbr.htm<br />

• Leased Line Internet Connection Service - E/ME/A Attachment Guide,<br />

UH01-1003-00<br />

The principal objective of an ISP is to offer services to users so that they are<br />

able to access the Internet and its resources. That′s where the ISP earns<br />

money.<br />

Therefore, the downstream connections are the second fundamental item of<br />

Internet connectivity. In this subject, we see the types of users, the access<br />

issues for both the ISP and the customers, and the <strong>IBM</strong> 8235.<br />

The following are the different types of customers an ISP could have:<br />

• Home Users<br />

These are the individual users, commonly called small office/home office<br />

(SOHO) users. They usually get connected to the Internet to access Web<br />

pages and e-mail services. As a rule, this kind of user accesses the Internet<br />

during non-working hours and weekends. These are the most typical<br />

customers of an ISP.<br />

• Corporate Users<br />

These are business customers who connect their networks to the Internet.<br />

Typically they use the Internet to provide a Web site, to communicate with<br />

their other locations and customers, and to provide Internet access to their<br />

employees. Their heaviest traffic is during business hours.<br />

• ISP Customers<br />

54 The Technical Side of Being an Internet Service Provider<br />

These are other ISPs that will also resell Internet access and services to<br />

their customers. This a smaller market, so you will need to have enough<br />

resources to be able to offer these services.


This soft copy for use by <strong>IBM</strong> employees only.<br />

2.3.2 Access Issues<br />

Here we focus on the SOHO and corporate users. The issues for the ISP<br />

customers can be seen in section 2.2, “Internet Backbone Connection” on<br />

page 6, where we explain the ISP and its provider connection.<br />

For customers to be able to access the Internet and its resources, they will need<br />

to access their ISP LAN servers first. There are two ways of providing this<br />

remote connection: through dial-up or dedicated circuits, depending on the<br />

customer type and needs. They are available through SLIP or PPP protocols.<br />

In this section we focus on these items.<br />

2.3.2.1 Dial-Up Connection<br />

This is the simplest kind of connection, commonly made available through the<br />

conventional telephone lines and modems in which the connection speed may<br />

vary from 9.600 bps to 33.600 bps. These physical devices are used with enlace<br />

protocols that make the users′ equipment available to run TCP/IP applications.<br />

The analog modem is most typical, but digital systems (ISDN) have also been<br />

used. The digital system connection speed carries 128 kbps.<br />

This is the most common access type used by SOHO or even by business<br />

employees whose companies don′t have a network connection. Normally, these<br />

users have access to the following ISP services (see Chapter 4, “Internet<br />

Services” on page 133 for detailed information):<br />

• TPC/IP tools such as WWW, ftp and telnet<br />

• E-mail server<br />

• News<br />

• Their own Web home pages<br />

For related information about these topics, see also:<br />

• 2.3.2.4, “SLIP and PPP” on page 58<br />

• 2.3.3, “ISP Networking Hardware” on page 61<br />

2.3.2.2 Dedicated Connection<br />

Here there′s a permanent link available, usually through private line, where both<br />

the ISP and the customers LANs are connected through routers. Switched<br />

packet networks, such as frame relay, can also be used.<br />

The corporate and the ISP customers are the ones who utilize this kind of link.<br />

Despite the issues for an ISP customer, the typical services offered in this<br />

category are:<br />

• IP and DNS negotiation with the responsible registry (see 2.2.4.5, “How to<br />

Get IP Addresses” on page 48 and 2.2.4.6, “How to Obtain a Domain Name”<br />

on page 48)<br />

• Secondary DNS server<br />

• Primary DNS server (optional)<br />

• News feed<br />

• Web hosting<br />

Chapter 2. Connectivity 55


Note<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

There are also two other kinds of connection. The first is UUCP, which was<br />

widely used for the Bulletin Board Systems (BBS) but offers only e-mail and<br />

news access. The second one is a shell account which only has terminal<br />

emulation.<br />

They are not included here because nowadays the customers usually want<br />

the whole range of Internet services.<br />

2.3.2.3 Integrated Services Digital Network (ISDN)<br />

ISDN is an acronym for Integrated Services Digital Network, in which it is<br />

possible to gain the benefits of digital speeds or connectivity without using<br />

dedicated lines. From voice and data to complex images, full-color video and<br />

stereo quality sound, all are transmitted with digital speed and accuracy through<br />

what is now a totally digital network. ISDN replaces today′s slow modem<br />

technology with speeds of up to 128 kbps (kilobits per second) before<br />

compression. With compression, users in many applications today can achieve<br />

throughput speeds from 256 kbps to more than 1,024 kbps, more than a megabit<br />

per second.<br />

Digital lines are almost totally error free, which means that the slowdowns and<br />

errors typically encountered in today′s modern transmissions are no longer a<br />

problem. A single ISDN line can serve as many as eight devices: digital<br />

telephones, facsimiles, desktop computers, video units and much more.<br />

Each device, in turn, can be assigned its own telephone number, so that<br />

incoming calls can be routed directly to the appropriate device. Any two of<br />

these devices can be in use at the same time for voice for data transmissions,<br />

and the lines can also be combined for higher data speeds. In addition, an<br />

almost unlimited number of lower-speed data transmissions (for e-mail, credit<br />

card authorization, etc.) can go on at the same time. In most cases, the same<br />

copper wires used today for what is typically called plain old telephone service<br />

can be used successfully for ISDN. This means most homes and offices are<br />

ISDN-ready today.<br />

That are three types of ISDN services:<br />

• Basic Rate ISDN (BRI)<br />

The BRI service has three data channels: two 64-kbps 3 B (bearer) channels<br />

and one 16-kbps D (delta) channel. The B channels carry voice and data,<br />

and the D channel is responsible for the control or signaling information. It′s<br />

also possible to use both B channels together and get 128 kbps.<br />

The BRI interface uses two twisted pairs of copper wires.<br />

3 In some areas it may be 56 kbps due to phone system limitation.<br />

56 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 24. Basic Rate ISDN (BRI) Interface<br />

• Primary Rate ISDN (PRI)<br />

Figure 25. Primary Rate ISDN (PRI) Interface<br />

In the PRI service there are 23 64-kbps B channels and 1 64-kbps D channel,<br />

that provides a total bandwidth of 1.544 Mbps. In some countries the number<br />

of B channel are 30 or 31, which gives a bandwidth of 2.048 Mbps. The B<br />

channels are combined to be used according to the needs: data<br />

transmission, phone lines, etc.<br />

This service is utilized in the ISP side to connect the BRI customers.<br />

• Broadband-ISDN (B-ISDN)<br />

This is a the proposed advanced version of ISDN for providing speeds of<br />

155.52 Mbps and higher. However, the standards and switching technology<br />

that will work this fast are under development. The B-ISDN promises<br />

universal coverage based on ATM/SDH technologies and optical fiber.<br />

Although ISDN has been available for many years, it has just beginning to<br />

become popular with users. In some countries it may not even be supported.<br />

Chapter 2. Connectivity 57


This soft copy for use by <strong>IBM</strong> employees only.<br />

2.3.2.4 SLIP and PPP<br />

Serial Line Internet Protocol (SLIP) and Point-to-Point Protocol (PPP) are always<br />

associated with dial-up connections protocols. Although they are actually widely<br />

used in part-time Internet connections over analog modems, they can be used<br />

for full-time connections as well.<br />

However, these protocols are solutions that have two requirements: the<br />

connection point number must be two and the link must be full-duplex. Then<br />

they are used in dial-up connections over analog modems, in leased-line<br />

connections with routers and even with ISDN. Frame relay and X.25 are also<br />

possible.<br />

The SLIP is just a very simple protocol designed quite a long time ago and is<br />

merely a packet framing protocol. It defines a sequence of characters that frame<br />

IP packets on a serial line, and nothing more. SLIP has been replaced by PPP<br />

because of the drawbacks:<br />

• It cannot support multiple protocols across a single link; all packets must be<br />

IP datagrams.<br />

• It does no form of frame error detection which forces retransmission by<br />

higher level protocols in the case of errors on noisy lines.<br />

• It provides no mechanism for compressing frequently used IP header fields.<br />

Many applications over slow serial links tend to be single-user interactive<br />

TCP traffic such as TELNET. This frequently involves small packet sizes and<br />

therefore a relatively large overhead in TCP and IP headers which do not<br />

change much between datagrams, but which can have a noticeably<br />

detrimental effect on interactive response times. However, many SLIP<br />

implementations now use Van Jacobsen Header Compression. This is used<br />

to reduce the size of the combined IP and TCP headers from 40 bytes to 8<br />

bytes by recording the states of a set of TCP connections at each end of the<br />

link and replacing the full headers with encoded updates for the normal case<br />

where many of the fields are unchanged or are incremented by small<br />

amounts between successive IP datagrams for a session. This compression<br />

is described in RFC 1144.<br />

PPP addresses these problems. It has three main components:<br />

1. A method for encapsulating datagrams over serial links.<br />

2. A Link Control Protocol (LCP) for establishing, configuring, and testing the<br />

data link connection.<br />

3. A family of Network Control Protocols (NCPs) for establishing and configuring<br />

different network layer protocols. PPP is designed to allow the simultaneous<br />

use of multiple network layer protocols such as IP, OSI, IPX, etc.<br />

Before a link is considered to be ready for use by network layer protocols, a<br />

specific sequence of events must happen. The LCP provides a method of<br />

establishing, configuring, maintaining and terminating the connection. LCP goes<br />

through the following phases:<br />

1. Link establishment and configuration negotiation: In this phase, link control<br />

packets are exchanged and link configuration options are negotiated. Once<br />

options are agreed upon, the link is open, but not necessarily ready for<br />

network layer protocols to be started.<br />

58 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

2. Link quality determination: This phase is optional. PPP does not specify the<br />

policy for determining quality, but does provide low-level tools, such as echo<br />

request and reply.<br />

3. Authentication: This phase is optional. Each end of the link authenticates<br />

itself with the remote end using authentication methods agreed to during<br />

phase 1.<br />

4. Network layer protocol configuration negotiation: Once LCP has finished the<br />

previous phase, network layer protocols may be separately configured by the<br />

appropriate NCP.<br />

5. Link termination: LCP may terminate the link at any time. This will usually<br />

be done at the request of a human user, but may happen because of a<br />

physical event.<br />

The IP Control Protocol (IPCP) is the NCP for IP and is responsible for<br />

configuring, enabling and disabling the IP protocol on both ends of the<br />

point-to-point link. The IPCP options negotiation sequence is the same as for<br />

LCP, thus allowing the possibility of reusing the code.<br />

One important option used with IPCP is Van Jacobsen Header Compression<br />

which is used to reduce the size of the combined IP and TCP headers from 40<br />

bytes to approximately 4 by recording the states of a set of TCP connections at<br />

each end of the link and replacing the full headers with encoded updates for the<br />

normal case where many of the fields are unchanged or are incremented by<br />

small amounts between successive IP datagrams for a session. This<br />

compression is described in RFC 1144.<br />

2.3.2.5 Other Technologies<br />

There are new technologies that have just been started to be used by SOHO<br />

users. We discuss some of them: wireless, cable and satellite.<br />

Wireless When we talk about wireless access, there′s always a confusion<br />

between wireless WANs and wireless LANs. The wireless LANs are local area<br />

networks that allow devices with radios to connect to local servers. These<br />

radios use the direct sequence spread spectrum technology. The wireless link is<br />

between a PC and an access point wired to a wired LAN connected to a server.<br />

The user with a PC or terminal with one of these radios must be in the local<br />

vicinity of a wireless access point for his wireless LAN adapter to work.<br />

The WAN radios required to connect to servers that are located far distances<br />

away from where the user machine actually is are very different than the LAN<br />

radios described previously. The WAN radios act the same as wired modems<br />

that you may be familiar with. When you use a WAN radio, you connect to a<br />

service provider (not an ISP but one that provides wireless connectivity to its<br />

customers) such as AT&T, RAM Mobitex or ARDIS. These providers offer their<br />

customers the ability to use a radio that wirelessly connects to their services<br />

from which they can connect to the existing worldwide telephone service. For<br />

example, a thinkpad with a wireless WAN radio would ″dial″ out on a special<br />

number and get connected to its ISP via a TCP/IP link, the same as if it plugged<br />

in a modem to a phone line. The main difference is that its ″phone line″ is<br />

actually a wireless connection to a wireless service provider.<br />

The key components in wireless WANs are PCMCIA adapters that represent the<br />

latest in wireless communication. Currently, <strong>IBM</strong> offers systems with integrated<br />

Chapter 2. Connectivity 59


This soft copy for use by <strong>IBM</strong> employees only.<br />

WAN modems for CDPD, ARDIS (U.S. and Canada only) and Mobitex (not yet<br />

offered in EMEA). Each modem has a different business application.<br />

Cellular Digital Packet Data (CDPD 4 ) is unique to the Advanced Mobile Phone<br />

Service (AMPS) cellular network, the largest in the United States. <strong>IBM</strong>′s 2489<br />

Rugged Notebook Computer Model 600 with the optional wireless modem for<br />

CDPD includes an internal PCMCIA radio modem and radio antenna.<br />

Advanced Radio Data Information Service (ARDIS 5 ) provides interactive,<br />

real-time data communications throughout the U.S. and Canada. The <strong>IBM</strong><br />

2489-600 with integrated Wireless Modem for ARDIS supports automatic<br />

nationwide roaming, which means users can move seamlessly from one city to<br />

another and still communicate. The use of this radio modem requires the<br />

purchase of ARDIS services from a service provider.<br />

Mobitex runs on the RAM Mobile Data 6 network that serves some European<br />

countries and about 8,000 cities across the United States with fax, e-mail,<br />

two-way messaging and server applications. The <strong>IBM</strong> 2489-600 with integrated<br />

Wireless Modem for Mobitex consists of an integrated PCMCIA adapter (not yet<br />

available in EMEA) with an integrated antenna.<br />

Due to distinct country differences in communications standards, it is currently<br />

impossible to say one network provides wireless WAN services in EMEA. In most<br />

cases, analog data is transmitted using a cellular-enabled modem with a<br />

handheld phone. GSM/DCS 1800 data wireless networks are further made up of<br />

GSM, the digital equivalent of AMPS, and DCS 1800, an 1800MHz system with<br />

similar protocols to GSM and a data adapter. CT2 (Cellular Telephone) is a<br />

short-range campus and public network. It requires an integrated<br />

adapter/transceiver connected to a local base station for campus work that is<br />

connected to a PSTN for WAN communications.<br />

<strong>IBM</strong> Global Services has recently announced a set of services that offers<br />

end-to-end solution for customers operating in a mobile computing environment<br />

and/or wireless distributed network. Further information can be found in:<br />

http://www.as.ibm.com/asus/mobilepr.html<br />

For more information about the system units, please refer to the <strong>IBM</strong> Mobile and<br />

Wireless Systems Web site at:<br />

http://www.networking.ibm.com/wireless<br />

Cable and Satellite Although not suitable for ISP upstream connections, the<br />

one-way cable and satellite technologies (see 2.2.2.4, “Other Technologies” on<br />

page 15) can be suitable for downstream SOHO users. Despite that, these<br />

services are not widely provided.<br />

4 CPDP is a technology that is being deployed by a number of cellular companies, including Bell Atlantic, Ameritech, GTE, and<br />

AT&T.<br />

5 ARDIS was originally created and jointly owned by Motorola and <strong>IBM</strong> to serve <strong>IBM</strong>′s field technicians.<br />

acquired 100% ownership of it.<br />

In 1995, Motorola<br />

6 RAM Mobile Data is a business venture between RAM Broadcasting Corporation (RBC) and BellSouth and is based on<br />

Ericsson′s Mobitex technology.<br />

60 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

2.3.3 ISP Networking Hardware<br />

In this section we include the networking hardware that must be available in the<br />

ISP for downstream connections and one <strong>IBM</strong> product that is typical for this<br />

environment: the 8235. The new RLAN function of the 2210 is also included.<br />

We begin by explaining the functions of the networking hardware components.<br />

2.3.3.1 Downstream Hardware Components<br />

The basic networking hardware used in the connections between the ISP and its<br />

customers are:<br />

• Remote Access Server<br />

The Remote Access Server (RAS) is the device used to connect the remote<br />

PCs of the users through dial-in connections. It is also called terminal server<br />

because historically it was used to connect character-based terminals to<br />

interactive hosts. Usually its contains one LAN interface that is attached to<br />

the hub, and many serial ports where the modems are connected.<br />

The first function of an RAS is to capture the authentication information from<br />

the client and then ask the authentication server for approval. Once the<br />

authorization is approved, the protocol switches to PPP, and the RAS gives<br />

an IP address to the client. The IP address given is based on a user name,<br />

port or a pool of addresses. In this way, the client is ″in″ the ISP LAN and<br />

therefore can have its IP packets forward to the Internet.<br />

The RAS are available in two different kinds of solutions: in a server with<br />

multiserial adapters or in a distinct hardware, that can be integrated or not<br />

within a router. The server-based solution has the advantage of being<br />

cheaper. However, the second one has some important features. It′s not<br />

connected to the server. As in a LAN there′s usually more than one RAS. In<br />

case of failure only one RAS goes down and the other users still have<br />

access to the LAN while in the server everybody looses contact. It is also<br />

highly scalable and manageable. Another point is that it alleviates the<br />

server load.<br />

• Modem<br />

This device is used between the RAS and the telephone lines. Its function is<br />

to modulate an outgoing binary bit stream to an analog carrier, and<br />

demodulate an incoming binary bit stream from an analog carrier.<br />

The standards defined by the International Telecommunications Union (ITU)<br />

are:<br />

− V.32<br />

Up to 9.600 bps for use over dial-up or leased lines.<br />

− V.32 bis<br />

Up to 14.400 bps for use over dial-up or leased lines.<br />

− V.42<br />

It′s not for modem, but for error control procedures.<br />

− V.42 bis<br />

Data compression technique for use with V.42.<br />

− V.34<br />

Chapter 2. Connectivity 61


This soft copy for use by <strong>IBM</strong> employees only.<br />

28.800 bps for use over dial-up line V.42. With the addition of V.42 bis<br />

compression, in theory it can reach up to 115.200 bps.<br />

− V.34-1996<br />

It provides two additional, optional data transmission speeds of 31.2 and<br />

33.6 kbps. Further enhancements to supporting protocols allow devices<br />

implementing V.34-1996 to deliver more robust and more frequent 26.4<br />

and 28.8 kbps connections. With additional, optional speeds of 31.2 and<br />

33.6 kbps, modems implementing the V.34-1996 standard can<br />

communicate at speeds up to 16.6 percent faster than existing V.34<br />

modems.<br />

Although several different names were used to describe this new<br />

revision of the V.34 standard (for example, Rockwell suggested V.34+ or<br />

V.34 Plus and Lucent Technologies ″extended rate V.34″), in October<br />

1996, Study Group 14 of the ITU-T standards committee finalized the<br />

naming of the new standard as V.34-1996.<br />

There are four areas of improvement that distinguish devices<br />

implementing V.34-1996 from those using the initial version of the<br />

standard:<br />

- Higher Data Rates<br />

The potential for increased communication speed and faster data<br />

throughput always attracts the most excitement in a new or revised<br />

standard. In many instances, using modems that support the<br />

optional connection speeds of 31.2 and 33.6 kbps in the V.34-1996<br />

standard should provide attractive performance gains in real-world<br />

operation. Faster file downloads and reduced online connection<br />

charges are key potential benefits to the end user.<br />

- More Frequent High-Speed Connections<br />

Testing by Xircom and its modem ASIC partners indicates that on<br />

about 60 percent of networks currently supporting 26.4-kbps data<br />

transmission, the enhancements in V.34-1996 offer 2.4 to 4.8 kbps<br />

improvement in connection speeds.<br />

- V.8bis<br />

62 The Technical Side of Being an Internet Service Provider<br />

The original V.34 standard includes a component protocol known as<br />

V.8. This protocol specifies the negotiation startup or handshaking<br />

procedures used between modems before a data exchange. The<br />

V.34-1996 proposal includes an updated startup protocol, V.8bis,<br />

providing quicker connection initialization. Additionally, while certain<br />

types of echo canceling equipment previously caused V.8 to fall back<br />

to V.32bis automode negotiation (limiting speed to a 14.4 kbps<br />

maximum), V.8bis delivers a true V.34-protocol connection. V.8bis<br />

also improves faxing, reduces connection delays and provides more<br />

reliable support when switching between fax and telephone<br />

operation.<br />

- Signaling System 5 Problem Resolved<br />

Most modern telephone networks in the United States use Signaling<br />

System 7 (SS7) protocols to manage data transmission between<br />

central office (CO) switches. However, some older COs still use an<br />

earlier version known as Signaling System 5 (SS5). Two<br />

first-generation V.34 modems communicating between COs using<br />

SS5 occasionally experience connection failures. In V.34-1996, the


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 26. Traditional Analog Modems Connection<br />

startup algorithms are modified allowing successful operation on<br />

older networks using SS5.<br />

The ISP must be concerned about the quality of the modems. As some have<br />

more reliable quality calls than others, it can avoid having unanswered calls,<br />

downgrade to a lower speed, disconnection in the middle of the call and<br />

unability to reset after disconnection.<br />

At the moment there′s a new 56 kbps modem technology that has been<br />

revolutionary in Internet communications. It′s an asymmetrical modem<br />

modulation scheme that provides data transmissions speeds up to 56 kbps<br />

downstream over the Public Switched Telephone Network (PSTN). It takes<br />

advantage of today′s Internet access where a customer′s analog modem<br />

connects to a site that is linked to a digital telephone network.<br />

In a connection between two analog V.34 modems, the telephone network<br />

converts the analog signal transmitted from the first point modem to a digital<br />

signal. It is then transmitted to the the second point, where it′s converted<br />

back to an analog signal.<br />

Chapter 2. Connectivity 63


This soft copy for use by <strong>IBM</strong> employees only.<br />

The analog information must be transformed to binary digits in order to be<br />

sent over the PSTN. The incoming analog waveform is sampled 8,000 times<br />

per second, and each time its amplitude is recorded as a pulse code<br />

modulation (PCM) code. The sampling system uses 256 discrete 8-bit PCM<br />

codes. Because analog waveforms are continuous and binary numbers are<br />

discrete, the digits that are sent across the PSTN and reconstructed at the<br />

other end approximate the original analog waveform. The difference<br />

between the original waveform and the reconstructed quantized waveform in<br />

this analog-to-digital conversion is called quantization noise, that limits the<br />

communications channel to about 35 kbps (determined by Shannon′s Law).<br />

However, the quantization noise affects only analog-to-digital conversion, not<br />

digital-to-analog. This is the fundamental point of this technology: taking<br />

advantage of having direct access to the digital telephone network at one<br />

side of the connection instead of the analog loop. In this way, in a<br />

communication between a home user and an ISP with a digital link to the<br />

PSTN, there′s no analog-to-digital conversions in the server-to-client path<br />

data transmission. This eliminates the quantization noise and makes<br />

possible a higher transmission rate.<br />

The upstream direction data flow remains slower because the<br />

analog-to-digital conversion must still be made at the client side.<br />

Figure 27. A 56-kbps Connection between a Home User and an ISP<br />

64 The Technical Side of Being an Internet Service Provider<br />

This technique is specially indicated for the Internet access. The<br />

requirement of having digital access to the PSTN to one side is satisfied,


This soft copy for use by <strong>IBM</strong> employees only.<br />

since most ISPs have one T1, for example. And the other end connects<br />

through an analog line, that is typically the case of the ISP′s customers. The<br />

Internet access is also the best application. Nowadays the customer<br />

downloads files, graphics and games (that always require more and more<br />

bandwidth) and send usually only mouse clicks in the upstream<br />

transmission.<br />

To take advantage of this technology, it′s necessary to have a pair of<br />

equipments: a server modem at the ISP and a modem at the customer′s<br />

house. No special lines are required, but both modems equipments must be<br />

of the same supplier. This is because the basic concepts are similar, but the<br />

protocols are not the same. More importantly, the 56-kbps technology is not<br />

a standard. In October 1996, the ITU-T formed an initial working group to<br />

begin the lengthy standardization process. It is expected that this process<br />

will take at least 18 months and likely longer. Additionally, several<br />

companies have received patents on proprietary algorithms that are core to<br />

the 56-kbps technologies. For example, we have the 56flex (from Rockwell<br />

and used by Motorola) and the x2 (from 3Com and used by USRobotics). It is<br />

likely that an extended period of licensing battles will need to be resolved<br />

before the widespread acceptance of 56 kbps is a reality.<br />

For information about 56-kbps technologies, see:<br />

• http://www.56kflex.com<br />

• http://x2.usr.com<br />

Remember<br />

The router and hub components were discussed previously. Please refer to<br />

2.2.3.1, “Hardware Components” on page 17.<br />

2.3.3.2 Downstream Hardware Connections<br />

Finally, we have the typical networking environments for the ISP downstream<br />

connections.<br />

In the most often offered connection, analog dial-up with modems, the ISP will<br />

need:<br />

• RAS<br />

• Modems<br />

• Telephone Lines<br />

The RAS will be connected in the ISP LAN hub and in the modems through its<br />

serial ports. Depending on the RAS ports number, it will be necessary to have<br />

more than one to attend the whole number of users.<br />

The customers will then make a call to the ISP′s telephone numbers to get their<br />

connections into the LAN. They will need a PC and a modem (integrated or not)<br />

and PPP or SLIP to be able to do that. Figure 28 on page 66 shows an example<br />

of this kind of connection:<br />

Chapter 2. Connectivity 65


Figure 28. Example of Analog Dial-Up Connections<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

On the other hand, if the connections will be made by ISDN, the RAS must have<br />

PRI support, and the modems will be replaced by CDU/DSUs.<br />

The ISDN service will connect from the telephone company switch to the home<br />

user through a two-wire cable. Then it will connect to a Terminal Adapter (TA),<br />

a kind of ISDN modem, that can be either a stand-alone unit or an interface card<br />

within the PC. If in North America, a Network Termination 1 (NT1) will be<br />

required between the telephone company and the TA.<br />

If the customer has a LAN, it will be necessary to include an NT 2, which is<br />

usually a router or bridge with a LAN adapter.<br />

For the corporate customers that require dedicated connections, the usual way<br />

of establishing these links is through routers in both sides. The RAS is not used<br />

in this case.<br />

66 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

2.3.3.3 <strong>IBM</strong> 8235<br />

This section gives an overview of the the <strong>IBM</strong> 8235 Remote Access to LAN<br />

Server.<br />

The <strong>IBM</strong> 8235 is now in its fourth major release. It has proved the potential of its<br />

approach by adding features, by increasing the number of supported platforms,<br />

and by enhancing the flexibility of its hardware introducing modularity, thus<br />

increasing the range of supported physical interfaces.<br />

Further information can be found in:<br />

• <strong>IBM</strong> 8235 Dial-in Access to LANs Server Concepts and Implementation,<br />

SG24-4816<br />

• http://www.networking.ibm.com/82s/82sprod.html<br />

Overview: The <strong>IBM</strong> 8235 Dial-In Access to LAN (DIAL) server for token-ring and<br />

Ethernet is a dedicated multiport, multiprotocol remote access hardware server.<br />

This server supports remote personal computer (PC) users dialing in to<br />

applications the same way users access applications from workstations directly<br />

attached to a token-ring or Ethernet local area network. With routing and<br />

bridging support for the following multiple protocols, a user can remotely access<br />

a variety of applications:<br />

• NetBIOS for LAN servers<br />

• IPX for NetWare<br />

• 802.2 LLC for 3270 and SNA<br />

• IP for TCP/IP applications<br />

• AppleTalk Apple Remote Access (ARA) 2.0 (Ethernet Only)<br />

Using standard dial networks, users (with PCs and modems) who are remote<br />

from the LAN can access LAN resources and work with applications as if they<br />

were working at locally attached LAN workstations.<br />

Users in the field, such as agents, sales representatives, and employees who<br />

travel or work at home, have the ability to access their applications from any<br />

location that has dial-up telephone service. This extends the productivity of the<br />

workstation to the remote workplace. Using standard analog modems and<br />

dial-up telephone lines, the <strong>IBM</strong> 8235 and the <strong>IBM</strong> DIALs Client for OS/2, DOS,<br />

and Windows operating in the remote PC allow easy access to resources that<br />

users normally access from a workstation connected to a LAN. With support for<br />

multiple protocols and with high-performance filtering and compression<br />

techniques, excellent performance can be achieved when addressing a variety of<br />

applications remotely.<br />

8235 System Components: The 8235 remote access system is made up of three<br />

basic components:<br />

1. The Dial-in Access to LAN Client<br />

A software application that runs on the remote PC providing the dial-in<br />

function. The DIALs Client supports DOS, Windows, and OS/2.<br />

2. The 8235 Management Facility<br />

A Windows application that allows the 8235 to be configured and managed<br />

from any LAN-attached workstation running IPX and Windows.<br />

Chapter 2. Connectivity 67


3. The 8235<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

A stand-alone hardware device that attaches to either a token-ring or<br />

Ethernet LAN and the public switched telephone network. The function of the<br />

8235 hardware and its associated software is to:<br />

• Provide physical attachment to the LAN and to eight modems.<br />

• Forward data from the LAN to the remote PCs and from the remote PCs<br />

to the LAN using any of the following protocols: IPX, IP, NetBEUI,<br />

AppleTalk ARA 2.0 and LLC.<br />

• Filter and compress data so as to minimize the amount of unnecessary<br />

traffic between the LAN and the remote PC.<br />

• Prevent unauthorized access to the LAN.<br />

Dial-In Access to LAN Servers (DIALs) Client Software: DIALs Client is <strong>IBM</strong>′s<br />

multiprotocol dial-in software for workstations. It allows your modem to fully<br />

access resources of remote networks. The DOS and DOS/WINDOWS client<br />

requires approximately 850 KB disk and 19 KB RAM.<br />

Note<br />

The DIALs Client is shipped with the 8235 with an unlimited right to copy.<br />

DIALs Client contains the following software:<br />

• OS/2 Drivers (NDIS and ODI)<br />

These provide support for OS/2-based communication programs. ODI can be<br />

provided with LAN adapter and protocol support (LAPS).<br />

• DOS Drivers (NDIS and ODI)<br />

These provide support for your DOS-based or Windows-based<br />

communications programs.<br />

• Connect Application<br />

This allows you to create, store, and use connection files to dial in to remote<br />

networks from the OS/2, DOS and windows environments. The connect<br />

program:<br />

− Provides traffic-flow statistics<br />

− Displays error information<br />

− Displays the modem status<br />

− Displays the modem configuration<br />

<strong>IBM</strong> 8235 New Features: This section describes the new features provided by<br />

DIALs Release 4.0.<br />

1. Dial-In<br />

• Multiprotocol support: Simultaneous multiprotocol dial-in over PPP: IPX<br />

(VLMs and NETX supported) TCP/IP, NetBEUI, 802.2/LLC.<br />

• VxD Windows Client feature summary:<br />

enable support for:<br />

Client has been redesigned to<br />

− Windows Virtual Device Driver VxD that only uses 2 KB of client<br />

conventional DOS memory (versus 34 KB)<br />

− Multilink PPP protocol (MLP)<br />

68 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

− Channel aggregation (2B)<br />

− STAC 4.0 compression<br />

− Port driver for internal ISDN adapters<br />

− Native driver support for <strong>IBM</strong> WaveRunner digital modem<br />

− New port driver programming interface (API)<br />

− Virtual connections<br />

− New intelligent setup facility<br />

− Easy client installation scripting<br />

− Client event logging application<br />

• Virtual connections: This is the ability to automatically suspend and<br />

resume a physical connection while spoofing network protocols, routing<br />

and applications. The physical connection is only brought up<br />

on-demand.<br />

• Spoofing: This is the ability for a device to determine what is not<br />

meaningful traffic when a virtual connection is suspended. Rather than<br />

establishing the connection, the device responds to the source of the<br />

traffic with the response that would have been generated by the intended<br />

destination device.<br />

• Dial-in channel aggregation: This is the ability to use more than one<br />

communications channel per connection. By aggregating both 64-kbps<br />

ISDN B-channels, users can take advantage of 128-kbps dial-in<br />

connections. Fast 128-kbps data transfer rates reduce file transfer times.<br />

• <strong>IBM</strong> WaveRunner Digital Modem (Internal ISDN terminal adapter):<br />

Provides support for the MCA, ISA and PCMCIA versions of the <strong>IBM</strong><br />

WaveRunner digital modem. The three supported modes are Async V.32<br />

bis modem, ISDN V.120, and Sync Clear Channel.<br />

• Easy client setup:<br />

− An intelligent client setup program that includes a Connection File<br />

Wizard that walks the user through the installation and modifications<br />

to client software.<br />

− The ability to automatically detect attached communications<br />

adapters.<br />

− Powerful file copy mastering capability.<br />

− The client event logging application provides extensive<br />

troubleshooting information. Log information can be displayed to the<br />

screen or to a file.<br />

• Power switching: Allows users to switch back and forth between<br />

communications adapters. Perfect for employees who use one type of<br />

communications adapter when working at home (ISDN) and another<br />

adapter (V.34 modem) when traveling.<br />

• Express installation: A new client installation scripting utility that enables<br />

network managers to establish defined defaults that make client<br />

installation and deployment easier.<br />

• Third-party client support: Dial-in access from Windows 95 and Windows<br />

NT 3.5, Apple′s ARA, and <strong>IBM</strong>′s OS/2 DIALS.<br />

Chapter 2. Connectivity 69


This soft copy for use by <strong>IBM</strong> employees only.<br />

Customers using Windows 95, Windows NT, MAC OS or OS/2 can<br />

seamlessly use an <strong>IBM</strong> 8235 as their dial-in server.<br />

• Client event logging application: Events can be displayed on the screen<br />

and/or saved in a text file. The logged events include:<br />

− Buffer allocation/management<br />

− PPP events and state transitions<br />

− PPP negotiation options<br />

− All frames transmitted and received<br />

− Multilink (MLP)<br />

− Compression<br />

− Network protocol decoding (basic IPX, IP and NetBEUI frames)<br />

• New port driver: The new port driver provides support for internal client<br />

ISDN terminal adapters such as the <strong>IBM</strong> WaveRunner.<br />

• Internal ISDN adapters eliminate the async-to-sync conversion overhead<br />

required by external terminal adapters.<br />

2. New Application Programming Interface (API): The <strong>IBM</strong> DIALs 4.0 port driver<br />

API enables third parties to independently develop <strong>IBM</strong> DIALs drivers for<br />

their hardware. Many internal ISDN terminal adapters do not present a<br />

standard PC 8250/16450/16550 UART interface.<br />

3. Enhanced Stac 4.0 Compression: <strong>IBM</strong> upgraded the Stac compression<br />

algorithm from 3.0 to 4.0. Stac 4.0 is faster and more memory efficient. For<br />

digital terminal adapters where there is no compression done by the ISDN<br />

TA or X.25 PAD, it is essential that the compression algorithm used on the<br />

client be as lean and fast as possible.<br />

4. LAN-to-LAN Features:<br />

70 The Technical Side of Being an Internet Service Provider<br />

• Virtual connections (VCs): This is the ability to automatically suspend<br />

and resume a physical connection while spoofing network protocols,<br />

routing and applications. The physical connection is only brought up<br />

on-demand.<br />

• Spoofing: This is the ability for a device to determine what is not<br />

meaningful traffic when a virtual connection is suspended. Rather than<br />

establishing the connection, the device responds to the source of the<br />

traffic with the response that would have been generated by the intended<br />

destination device. Spoofing is done for file server connections (NetWare<br />

drive mapping), routing tables (IP RIP and IPX RIP), SAP tables, TCP<br />

connections, and SPX connections.<br />

• Floating virtual connections (FVC): This is the ability to resume a<br />

suspended virtual connection on a port other than the port on which the<br />

original virtual connection was established. It can reduce the need to<br />

dedicate ports to specific users.<br />

• Juggling virtual connections (JVC): This is the ability to have more<br />

suspended virtual connections than there are ports on the <strong>IBM</strong> 8235.<br />

Customers can have many more suspended users than they have ports.<br />

JVC maximizes the utilization of server communications ports.<br />

• Persistent connections (PC): An <strong>IBM</strong> 8235 configuration option that<br />

allows the server to reestablish the connection in the event of an<br />

unexpected line drop.


This soft copy for use by <strong>IBM</strong> employees only.<br />

• Timed LAN-to-LAN connections (TLC): This is the ability for network<br />

managers to schedule LAN-to-LAN connections. (For example, establish<br />

a LAN-to-LAN connection at 10 a.m. and terminate the connection at 1<br />

p.m.)<br />

• Piggybacking updates: This is a virtual connection synchronizing<br />

mechanism where routing update messages are sent across the link only<br />

when the link is open for real data traffic.<br />

• Timed updates: This is the virtual connection synchronizing mechanism<br />

where at a specified interval the suspended virtual connection is<br />

resumed to enable routing update messages to be sent across the link.<br />

• Triggered updates:<br />

− This is a virtual connection synchronizing mechanism where routing<br />

update messages are sent across the link only when there is a RIP<br />

or SAP database change.<br />

− Triggered update setup options include additions only, deletions only,<br />

or additions and deletions.<br />

• Channel aggregation (multilink PPP, MLP): This is the ability to use more<br />

than one communication channel per connection. LAN-to-LAN<br />

connections can aggregate all <strong>IBM</strong> 8235 channels (analog or digital) up<br />

to the number of ports on the server.<br />

• Packet fragmentation: This is the ability to configure a default packet<br />

size over which packets will be fragmented for more efficient distribution<br />

over aggregated communications links.<br />

• Lan Connect applets: LanConnect applets for both PC and MAC allow for<br />

scripting of on-demand LAN-to-LAN connections.<br />

• Delta technology: Specialized remote adaptive routing protocols for<br />

optimizing bandwidth. It prevents unnecessary traffic from being sent<br />

over slow WAN connections by only sending the changes (deltas).<br />

5. Management and Security Features<br />

• PC and MAC server management: Protocols and features can be<br />

managed by MAC or Windows versions of <strong>IBM</strong> NetManager (MAC<br />

AppleTalk, PC/Windows IPX and IP).<br />

• IP download: <strong>IBM</strong> MF will be able to download new code images and<br />

configurations when running over either IP or IPX protocol stack.<br />

• SNMP management: MIB II and others.<br />

• Security: Provides support for agent software from Security Dynamics &<br />

Digital Pathways. Centralized authentication via <strong>IBM</strong> user list, NetWare<br />

Bindery, TACACS and most third-party hardware security solutions are<br />

supported.<br />

Virtual Connection: A virtual connection is a standard LAN-to-LAN or PC<br />

single-user dial-in connection that is enhanced to detect when no meaningful<br />

traffic has been sent over the connection for a period of time; at this time, the<br />

physical connection is suspended while network protocols (IPX and TCP/IP) are<br />

spoofed by devices at either end of the connection. Subsequently, when<br />

meaningful traffic has to be transmited by the client, the physical connection is<br />

automatically resumed and the data is forwarded over the communications link.<br />

Virtual connections minimize connect-time costs by physically disconnecting the<br />

circuit when there is no meaningful traffic.<br />

Chapter 2. Connectivity 71


Figure 29. 8235 Management Facility Window<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Another benefit of a virtual connection is ease-of-use and management. Once<br />

the original connection is established, no user or system administrator<br />

intervention is required. The physical link is automatically suspended and<br />

resumed on-demand.<br />

Channel Aggregation: New high-performance channel aggregation technology<br />

enables dial-in and LAN-to-LAN users to establish more than one<br />

communications channel per connection. <strong>IBM</strong> channel aggregation technology<br />

utilizes the industry-standard protocol known as Multilink PPP for maximum<br />

client/server device interoperability and investment protection. Packet<br />

fragmentation is also available for maximum performance.<br />

Management Facility: The Management Facility program is a Windows<br />

application that enables you to configure and manage the 8235s on your network,<br />

create user lists, and manage the security of your 8235s. This program is<br />

provided with your 8235. The <strong>IBM</strong> 8235 Management Facility requires a<br />

workstation with Windows 3.1 or later, initially attached to the network. All 8235<br />

models operate with the same 8235 Management Facility. You also need to load<br />

IPX or IP on the machine running the Management Facility to communicate with<br />

the 8235.<br />

In Figure 29 you can see the Management Facility window.<br />

8235 Hardware: Figure 30 on page 73 shows the front panel for all models of<br />

the 8235.<br />

72 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 30. 8235 Front View<br />

The front panel contains LEDs that indicate:<br />

• Power status<br />

• Network status<br />

• Serial port status<br />

Table 16 shows the meanings of the status indicator LEDs on the front panel of<br />

the 8235 in various operating modes, and Table 17 shows the meaning of the<br />

power LED.<br />

Table 16. Meanings of 8235 Network Status and Port Status LEDs<br />

Status Network Status LED Port Status LEDs<br />

OFF No power or no network<br />

connection<br />

Green Connected to network but<br />

idle<br />

Green flashing<br />

(consistent)<br />

Green flashing<br />

(inconsistent)<br />

Green and Orange<br />

flashing<br />

Orange flashing<br />

(consistent)<br />

Orange flashing<br />

(inconsistent)<br />

Not in use<br />

User connected<br />

<strong>Download</strong>ing microcode <strong>Download</strong> mode<br />

Connected to the network<br />

and transmitting<br />

Connected to the network<br />

and transmitting with<br />

errors<br />

User connected and<br />

transmitting data<br />

Power on self-test <strong>Download</strong> mode<br />

Connected and<br />

transmitting with errors<br />

-<br />

Connected to the modem<br />

and transmitting with<br />

transmit or receive<br />

errors<br />

Orange (solid) 8235 hardware failure Port or 8235 hardware<br />

failure<br />

Table 17. Meaning of 8235 Power Status LED<br />

Status Meaning<br />

ON Indicates that the 8235 is powered on<br />

Chapter 2. Connectivity 73


Figure 31. 8235 Model 021 Rear Panel<br />

Figure 32. 8235 Model 031 Rear Panel<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

LAN Connection: The 8235 comes with one LAN connection, a token-ring or an<br />

Ethernet port.<br />

The 8235 is also available as a module for the 8250 multiprotocol hub in<br />

token-ring and Ethernet models.<br />

Figure 31 shows the rear view of the token-ring Model 8235-021.<br />

Figure 32 shows the rear panel of the token-ring Model 8235-031.<br />

You make all connections on the 8235 rear panel, so the token-ring model<br />

includes one token-ring connector (DB-9) and a ring data rate switch to select<br />

the data rate of 4 or 16 Mbps.<br />

74 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Note<br />

Figure 33. 8235 Model 022 Rear Panel<br />

Figure 34. 8235 Model 032 Rear Panel<br />

The data rate you set must match the data rate of the token-ring network. Be<br />

sure to set the power switch to Off (O) before you set the data rate.<br />

Figure 33 shows the rear panel of the 8235 Ethernet Model 022.<br />

Figure 34 shows the rear panel of the 8235 Ethernet Model 032.<br />

The 8235 Ethernet models provide three connectors for Ethernet: AUI (Thick<br />

Ethernet), BNC (Thin Ethernet) and UTP as shown in Figure 33. You must select<br />

the Ethernet connector that you want to use with the switch that is at the back of<br />

the 8235.<br />

Three Ethernet wiring schemes are supported:<br />

Chapter 2. Connectivity 75


• Thin (10Base2)<br />

• Thick (10Base5)<br />

• UTP (10Base-T)<br />

Figure 35. 8235 Model 052 Rear Panel<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

When twisted-pair is selected, the LED next to the twisted-pair port on the rear<br />

panel of the 8235 Ethernet models indicates the network status. Table 18<br />

summarizes what the various flashing patterns mean and what actions, if any,<br />

you should take.<br />

Table 18. 8235 LED Error Code Flashing Patterns<br />

LED Pattern Meaning Action to Take<br />

On Normal link is established. None; normal operation.<br />

Off 10Base-T is not selected. Set the Ethernet connector<br />

switch to the 10Base-T (far left)<br />

position.<br />

One flash Link to 10Base-T is down. Check that the hardware<br />

connections are secure.<br />

Reestablish the link.<br />

Two flashes Jabber error (possibly<br />

transient). The 10Base-T<br />

transceiver has detected a<br />

continuous frame transmission<br />

of 131 milliseconds or greater<br />

by the LAN controller in the<br />

8235 Ethernet models.<br />

Transmission on the network is<br />

inhibited.<br />

Wait a few seconds to see<br />

whether the problem goes<br />

away. If not, restart the 8235<br />

Ethernet models, or contact<br />

<strong>IBM</strong> Product Support.<br />

Two new low-entry models are now available in the 8235 family. Figure 35<br />

shows you the rear panel of the 8235 Model 052.<br />

76 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Two new models are available, Model 052 with Ethernet port and Model 051 with<br />

token-ring port. These 2-port models address the needs of the small and remote<br />

offices for remote LAN access supporting the same features as the other models.<br />

8235 Code Structure: The software that runs in the 8235 server can be<br />

separated into three pieces:<br />

• Boot PROM<br />

The Boot PROM resides in ROM and performs the function of downloading a<br />

software image if there is no valid image in the VROM. Otherwise, the<br />

VROM performs software downloads. The Boot PROM accomplishes<br />

software downloads via Boot Protocol (BOOTP) and trivial file transfer<br />

protocol (TFTP) or via SPX. In addition to software downloads, the Boot<br />

PROM performs power-on self-test (POST) and switches the device to<br />

diagnostic mode if the POST fails.<br />

• VROM<br />

The VROM serves to isolate the mainline programs from the hardware by<br />

providing the following:<br />

− Device drivers for LAN and serial port I/O<br />

− Buffer and memory management<br />

− Management of non-volatile storage<br />

− LED manipulation<br />

− Message logging<br />

− Acquiring VROM maintained data<br />

− Acquiring hardware configuration information<br />

The VROM also contains a bootstrap application that is capable of acquiring<br />

a new download by unattended BOOTP and TFTP or a NetWare SPX<br />

download from the Management Facility. The 8235 downloads new images<br />

through the LAN port (token-ring or Ethernet).<br />

• Main Software Image<br />

The bulk of the run-time function in the 8235 is contained in the main<br />

software image. This image consists of the software kernel, frame<br />

forwarding support, management, and security.<br />

Updating Microcode: The system structure for the 8235 makes it an excellent<br />

platform for future enhancements that can be obtained via software updates.<br />

• <strong>Download</strong>ing Modes<br />

The 8235 can be put into several different boot-up sequences under the<br />

control of one of the following:<br />

− Management Facility<br />

− Command shell<br />

− Physical interruption (power on and off, pin reset)<br />

The different modes are described in the following paragraphs.<br />

• Warm Boot<br />

Under normal circumstances, the 8235 will contain a software image and<br />

configuration that has been stored in battery-backed RAM. When the system<br />

is rebooted (powered on or restarted due to a configuration change), it goes<br />

through a normal cycle. During this cycle, it will temporarily appear to the<br />

Management Facility to be in download mode. The device list window will<br />

indicate that the device is in DL mode. This condition should last for only a<br />

Chapter 2. Connectivity 77


This soft copy for use by <strong>IBM</strong> employees only.<br />

few seconds. If for some reason the 8235 has lost its code image or has<br />

been pin reset, it will remain in download mode until a management entity<br />

has loaded new code.<br />

• <strong>Download</strong> Code Only<br />

The 8235 can be instructed to download a new code image only by issuing a<br />

download command from the Management Facility. This means that it will<br />

load a new code image, but will maintain its configuration data.<br />

• Clear and <strong>Download</strong><br />

A clear and download command from the Management Facility will put the<br />

8235 into download mode from the Boot PROM on the 8235 and will load both<br />

code and VROM, and will cause any configuration data in the 8235 to be lost.<br />

It will remain in download mode until a management entity loads a new<br />

version of code.<br />

• Pin Reset Switch<br />

The 8235 has a tiny pinhole at the back that is not labeled. It is a pin reset<br />

which corresponds to an internal switch that performs the hard reset of the<br />

8235 and is often overlooked. It should be used if you lose contact with the<br />

Management Facility due to hardware problems or if you lose the<br />

administrator′s password. It performs the same function as the clear and<br />

download command. No indication of this pin reset is noted on the hardware<br />

itself.<br />

Models Summary: The main difference between all the 8235 models is the<br />

communication port that is used.<br />

Table 19. 8235 Models<br />

Model<br />

Feature<br />

Note<br />

Token-Ring Ethernet HS Serial<br />

Port (115.2<br />

kbps)<br />

8235-021 X X<br />

8235-022 X X<br />

The Models 031 and 032 have empty slots, into which you can install up to<br />

eight cards (eight modem cards, or eight serial cards, or eight ISDN BRI<br />

cards, or a combination of them).<br />

Communication Options: Here is a brief description of the different<br />

communication options that the 8235 has:<br />

• Models 021 (token-ring) and 022 (Ethernet)<br />

Internal<br />

Modem or<br />

ISDN BRI<br />

Serial Port<br />

(57.6<br />

kbps)<br />

8235-031 X 1-8 1-8 1-8<br />

8235-032 X 1-8 1-8 1-8<br />

8235-051 X 2<br />

8235-052 X 2<br />

8250<br />

module<br />

8250<br />

module<br />

78 The Technical Side of Being an Internet Service Provider<br />

X X<br />

X X


This soft copy for use by <strong>IBM</strong> employees only.<br />

The high-speed base Models 021 and 022 support serial port speeds up to<br />

115.2 kbps, enhancing the 8235 model offerings. These new models are<br />

shipped with eight RS-232-D (V.24/V.28) ports for attachment of up to eight<br />

modems with 115.2 kbps serial port speed. Excellent performance can be<br />

achieved with the high-speed V.34 data compression modems.<br />

• Models 031 (token-ring) and 032 (Ethernet)<br />

These models do not contain a fixed port configuration. The customer<br />

configures the ports to meet their needs with any combination of modems<br />

and/or serial cards.<br />

Model 031 is an unpopulated token-ring base server, and Model 032 is an<br />

unpopulated Ethernet base server. Both models provide plug-in slots for<br />

V.34 modem cards and serial cards. These models support a total of eight<br />

cards (eight modem cards or eight serial cards or eight ISDN BRI cards, or a<br />

combination of them totaling eight).<br />

These models can support eight remote users simultaneously with reliable<br />

asynchronous transmission speeds up to 115.2 kbps. With the serial cards,<br />

you can configure some or all of the ports to attach external asynchronous<br />

terminal adapters for digital services, such as ISDN or Switched 56.<br />

The Management Facility of 8235 Models 031 and 032 is an extension to the<br />

facility provided with the other models of the 8235 and is enhanced to include<br />

management of the new V.34 integrated modems and serial cards.<br />

<strong>IBM</strong> has extended the flexibility of the <strong>IBM</strong> 8235 Models 031 and 032 remote<br />

access server with several new upgrade modules:<br />

<strong>IBM</strong> 8235-031 and 032 BRI module:<br />

− 2B+D with V.110 and V.120 rate adaption.<br />

− S/T and U interface versions are available.<br />

− BRI module can be monitored from <strong>IBM</strong> MF. Configuration setup,<br />

revisions, and troubleshooting can all be managed remotely.<br />

<strong>IBM</strong> 8235-031 and 032 Sync/Async module:<br />

− Users can connect synchronous devices (ISDN BRI TAs, CSU/DSUs and<br />

modem eliminators) directly to the <strong>IBM</strong> 8235 Models 031 and 032. The<br />

direct synchronous connection takes advantage of the faster line speed<br />

(128 kbps versus 115 kbps), the elimination of extra timing bits (Async<br />

has two extra timing bits per character transmitted), and the overhead of<br />

converting a synchronous transmission into asynchronous transmission.<br />

− Supports either synchronous or asynchronous communications channels.<br />

• Models 051 (token-ring) and 052 (Ethernet)<br />

These 2-port models have the same functionality as the 8235 8-port models.<br />

They are for those who want to take advantage of the 8235 functions in a<br />

small office network where only a few remote-access ports are needed.<br />

• 8250 Modules<br />

These modules integrate <strong>IBM</strong> 8235 remote LAN access server product<br />

functions into the 8250 hub.<br />

There are two kinds of 8235 modules:<br />

− One for attaching an Ethernet network<br />

− One for token-ring network attachment<br />

Chapter 2. Connectivity 79


This soft copy for use by <strong>IBM</strong> employees only.<br />

These modules occupy a single slot in the 8250 hub chassis. The Ethernet<br />

module provides one Ethernet attachment switchable to any of the three<br />

Ethernet segments on the 8250 backplane. Likewise, the token-ring module<br />

provides one token-ring attachment that can operate at either 4 or 16 Mbps.<br />

The attachment is switchable to any of the seven token-ring backplane<br />

segments.<br />

Each module has eight serial communication ports. Each port has an<br />

RS-232-D (V.24/V.28) interface with a DIN connector for attachment to<br />

standard asynchronous modems. Data transfer speed ranges from 2400 bps<br />

up to 28.8 kbps, or even up to 115.2 kbps when using high-speed data<br />

compression modems. The modules come with eight DIN-to-25 pin RS232<br />

patch cables to attach to external modems.<br />

Supported Protocols: The 8235 supports remote clients using any of all the<br />

following protocols:<br />

• NetBIOS and 802.2<br />

The 8235 software filters on LLC service access points (SAPs) and on<br />

NetBIOS names based on the filter tables contained in the server. The<br />

tables will be set up in the box, but the information can be overridden using<br />

the operating system shell. There are no external parameters available to<br />

manage filtering as there are for an <strong>IBM</strong> Token-Ring Bridge or for LAN<br />

Distance software. LLC SAP filters allow X′02, X′04, X′05, X′08, X′E0, X′F0<br />

and X′F4 SAPs to be bridged. These are also configurable.<br />

Frame forwarding (that is, the process of forwarding data from the client<br />

workstation to the LAN and from the LAN to the client) is accomplished<br />

differently depending on the protocol selected during the configuration of the<br />

connections.<br />

• Bridging<br />

Figure 36. Source Routing Bridge<br />

80 The Technical Side of Being an Internet Service Provider<br />

The token-ring acts like an <strong>IBM</strong> token-ring bridge with NetBIOS and 802.2<br />

protocols as shown in Figure 36.


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 37. 8235 Acting As a Transparent Bridge<br />

The bridged frames appear on the ring as if they came from an adapter.<br />

NetBIOS and 802.2 dial-in also supports specialized filtering to protect clients<br />

from broadcast traffic on the dial-in links.<br />

The 8235 acts like a transparent bridge for Ethernet as shown in the<br />

Figure 37.<br />

• Ring Parameter Server<br />

The ring parameter server (RPS) function has been implemented in the case<br />

where the 8235 is the only bridge on the ring. Here is an explanation of what<br />

the RPS function provides.<br />

The RPS is the target for all request initialization MAC frames that are sent<br />

by ring stations during their attachment to the ring segment. The RPS<br />

function makes the following parameters available to all ring stations on the<br />

ring in response to the request initialization MAC frame:<br />

− Ring number<br />

− Ring station soft error report time value (default of 2 seconds)<br />

− Physical location (not currently implemented)<br />

There can be more than one RPS function active on any given ring segment.<br />

Note<br />

This differs from an <strong>IBM</strong> source routing bridge in that LAN reporting<br />

mechanism functions are not present in the 8235, which would allow it to<br />

report configuration information to LAN Network Manager (LNM) or to<br />

accept configuration changes from LNM.<br />

• IP Traffic<br />

The 8235 will transparently forward IP traffic based on the IP address. The<br />

8235 implements the proxy address resolution protocol (ARP) function to<br />

reduce broadcast traffic over the remote lines.<br />

Chapter 2. Connectivity 81


Figure 38. 8235 Proxy ARP<br />

Note<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

This means that the 8235 will respond to all ARP queries for remote client<br />

addresses with its own hardware address instead of having the ARPs go<br />

across the WAN. The source stations will then forward packets to the<br />

remote clients to the 8235′s physical address. The 8235 will then route<br />

the packet to the correct client based on the IP address.<br />

An example of how the network would appear is shown in Figure 38:<br />

The 8235 will implement the following IP functions:<br />

− IP Address Resolution Protocol (ARP)<br />

− Internet Protocol<br />

− Internet Control Message Protocol (ICMP)<br />

− Transmission Control Protocol (TCP)<br />

− User Datagram Protocol (UDP)<br />

− Trivial File Transfer Protocol (TFTP)<br />

− Boot Protocol (BOOTP)<br />

− Telnet<br />

− Routing Information Protocol (RIP)<br />

82 The Technical Side of Being an Internet Service Provider<br />

For IP traffic, Van Jacobson Header compression is supported. This is<br />

transparent to the user, but enhances performance over the telephone<br />

network connection.<br />

IP environments pose a unique challenge to dial-in access, as the addresses<br />

contain the identification of the network. If the users provide their own IP<br />

address, then they are limited to dialing in to the network for which they


This soft copy for use by <strong>IBM</strong> employees only.<br />

have been preconfigured. There are, however, some environments where<br />

the user will dial in to the same network all of the time and want to keep the<br />

same IP address. Furthermore, because of the nature of IP address<br />

discovery (ARP), it is desirable to limit the amount of ARP traffic across the<br />

WAN.<br />

Because of this, the 8235 supports address assignment in two ways:<br />

1. Proxy ARP with static client addressing, which has the following<br />

properties:<br />

− Dial-in client has a configured IP address, provided to the box by<br />

IPCP.<br />

− A user must dial-in or attach to the same network all of the time.<br />

− Full end-user TCP/IP application suite support.<br />

− IP address for each dial-in client is resolved to MAC address of the<br />

LAN port (proxy ARP).<br />

− Packets are routed based on host ID. If the network ID does not<br />

match the host ID, the packets will not be forwarded.<br />

− Remote-to-remote is a special case. The 8235 recognizes it and<br />

forwards the traffic as a special case.<br />

− Header compression is supported.<br />

2. Proxy ARP with dynamic client addressing, which has the following<br />

properties:<br />

• IPX Traffic<br />

− The 8235 provides unique client IP address through IPCP.<br />

− Dial-in users can dial in to any network that is reachable from the<br />

LAN to which the 8235 is connected.<br />

− The user does not own a well-known IP address. While this may<br />

prohibit the use of dial-in clients as servers, it allows the use of most<br />

user-oriented software.<br />

− The IP address for each dial-in client is resolved to the MAC address<br />

of a LAN port.<br />

− Packets are routed based on host ID.<br />

− Remote-to-remote is a special case. The 8235 recognizes it and<br />

forwards the traffic as a special case.<br />

− Header compression is supported.<br />

The 8235 implements an IPX router function as defined by Novell.<br />

Chapter 2. Connectivity 83


Figure 39. 8235 IPX Router<br />

Basic IPX protocols implemented by the 8235 are:<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

− Internet packet exchange (IPX) providing the basic network layer<br />

transport for NetWare IPX.<br />

− Sequenced Packet eXchange (SPX) for a reliable byte stream protocol.<br />

This is used for NetWare diagnostics and for downloading code images<br />

over IPX.<br />

− Routing information protocol (RIP), which provides a mechanism for IPX<br />

routers to exchange network topology information as needed to maintain<br />

routing tables. RIP uses a distance vector algorithm to calculate best<br />

routes.<br />

− Service advertising protocol (SAP), which provides a mechanism for end<br />

systems to locate NetWare services. The 8235 advertises its management<br />

via SAP.<br />

The 8235 supports dial-in routing by the remote user for IPX onto the local<br />

LAN. The network number of the dial-in port can be assigned by the<br />

administrator. If the assigned number is in use on the network when a user<br />

dials in, the box can be configured to take one of three actions: use the net<br />

number anyway, use a random number, or refuse the connection. If the<br />

dial-in client uses a non-zero node address, the server will accept it. If the<br />

client uses a zero node address, the server will provide the client′s address.<br />

The 8235 supports the following IPX frame types:<br />

− Ethernet II (Ethernet)<br />

− 802.3 (Ethernet)<br />

− 802.2 (Ethernet)<br />

− SNAP (Ethernet)<br />

84 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

− SNAP (token-ring)<br />

− 802.2 (token-ring)<br />

• AppleTalk ARA 2.0<br />

You can configure the 8235 as an end node or router and assign it to an<br />

AppleTalk zone.<br />

AppleTalk protocols support zones for managing user access to network<br />

devices and services. Zones are logical names associated with networks.<br />

The network administrator chooses an AppleTalk Phase 2 default zone<br />

during the initial setup of the network. The 8235 can be placed in this default<br />

zone or in a valid Phase 2 zone in the zone list.<br />

Note: The 8235 supports AppleTalk Phase 2 networks only.<br />

The 8235 may appear as one of the following on the AppleTalk network:<br />

− A node<br />

− A router<br />

End nodes<br />

Apple Remote Access (ARA) software allows Apple users to connect to an<br />

AppleTalk network through a modem/serial link. The ARA remote client<br />

calls a locally attached ARA server. The ARA server provides the client with<br />

access to LAN resources (electronic mail, file servers, printers, and network<br />

applications).<br />

An ARA server operating in end-node mode is responsible for forwarding<br />

packets sent to and from the ARA client. The ARA server examines packets<br />

sent on the network. If the destination is the ARA server or a remote ARA<br />

client, or it is a broadcast packet, then the server accepts the packet. If the<br />

destination is a remote ARA client, the server sends the packet across the<br />

serial link to the remote client.<br />

AppleTalk remote access protocol (ARAP) requires the ARA server to<br />

prevent broadcast routing table maintenance protocol (RTMP) information<br />

from being forwarded to the client over the serial link. The ARA client does<br />

not need the RTMP broadcast information.<br />

A packet sent from an ARA client to a user on a different network is<br />

forwarded by the ARA server to a router using the most recent router<br />

method. This method is used because the ARA server operating in end-node<br />

mode is not a router and must forward the packet based on the most recent<br />

information it has received about the destination. The most recent router<br />

method does not ensure the packet is routed to its destination by the fastest<br />

available path. The ARA server in end-node mode provides for easy<br />

configuration. An end node does not require a new (additional) network<br />

number and is less intrusive on large networks because it does not<br />

broadcast RTMP packets as a router does.<br />

Advantages Using the 8235 in End-Node Mode<br />

− Easy setup.<br />

− Network number not required.<br />

− Serial link traffic could be minimized.<br />

- NBP broadcasts not destined for the client are not forwarded.<br />

- RTMP packets are not forwarded. The 8235 is not a router in this<br />

mode.<br />

Chapter 2. Connectivity 85


This soft copy for use by <strong>IBM</strong> employees only.<br />

The end-node implementation of ARAP in the 8235 is compatible with Apple′s<br />

ARAP implementation. When the 8235 is configured to function as an end<br />

node, the 8235 forwards the data packets to and from the ARA clients in the<br />

same way as an ARA server.<br />

With the 8235 functioning as an end node, all 8235s on the network can be<br />

assigned to one zone in the Phase 2 zone list with the “8235 appears in”<br />

option. Network administrators would only need to access one zone to find<br />

all the 8235s on the network.<br />

8235 ARA clients can be assigned to a different Phase 2 zone. Assigning<br />

ARA users to a different zone can help reduce NBP broadcasts over the<br />

serial link if the zone chosen does not receive many NBP broadcasts. This<br />

can significantly improve performance over the serial link.<br />

ARA Routers<br />

An ARA server in router mode acts as a router between two networks: the<br />

local Internetwork on which the server resides and a network into which<br />

remote clients are assigned. In contrast to an ARA end-node server, which<br />

makes a remote ARA client a node on the network, an ARA server in router<br />

mode makes an ARA client a node on a separate dial-in (remote) network.<br />

The dial-in network has as many nodes as there are ARA clients connected<br />

to the server. This ARA client network can be assigned to any zone on the<br />

network, including a zone in the Phase 2 zone list, or a newly created zone.<br />

When acting as a router, the ARA server maintains complete zone and<br />

routing tables of the Internetwork in memory. When a node on the<br />

Internetwork sends a packet, the router examines the packet header and<br />

determines the destination by checking the routing table. If the destination is<br />

a remote ARA client, the packet is routed to the dial-in network and sent to<br />

the node number of the ARA client.<br />

When a packet is sent from an ARA client to the local network over the serial<br />

link, the ARA server uses its routing table information to route the packet to<br />

its destination by the most efficient path in the routing table.<br />

An ARA server configured as a router can isolate the ARA client from<br />

AppleTalk broadcast packets by permitting the client to be located in a<br />

dial-in zone. This improves performance over the serial link, as only<br />

broadcasts into the dial-in zone are sent over the serial link.<br />

Advantages Using the 8235 in Router Mode<br />

86 The Technical Side of Being an Internet Service Provider<br />

The 8235 can be configured to function as a conforming router or as a seed<br />

router. A conforming router obtains routing information from other routers<br />

on the network. A seed router provides the routing information to the other<br />

routers on the network.<br />

The 8235 operating in router mode provides some advantages:<br />

− AppleTalk broadcast packets sent over the remote link can be limited by<br />

placing the remote link into a dial-in zone. Only broadcasts into that<br />

zone are sent over the link.<br />

− The 8235 knows the fastest route to all networks and will route client<br />

packets by the most efficient path.<br />

− The 8235 can be assigned to a different zone in the Phase 2 zone list. By<br />

assigning all 8235s to a particular management zone, network<br />

administrators only need to access one zone to find all 8235s on the<br />

network.


This soft copy for use by <strong>IBM</strong> employees only.<br />

− The 8235 can isolate ARA clients from the rest of the Internet by<br />

assigning clients to a dial-in zone. Each client has a different node<br />

number in this zone. The dial-in zone may be a newly created zone. It<br />

does not have to be in the Phase 2 zone list. All dial-in clients can be<br />

placed into this dial-in zone. Network administrators can monitor dial-in<br />

activity by monitoring this zone.<br />

− Network and zone information is configurable for ARA clients.<br />

− For LAN-to-LAN connections, the 8235 must be in router mode.<br />

IP Information<br />

IP forwarding allows the 8235 to provide IP address assignment for dial-in<br />

clients. The clients IP address must be part of the Ethernet/IP network.<br />

Other IP hosts on the network communicate with the dial-in users through<br />

the 8235. The 8235 responds to Address Resolution Protocol (ARP) requests<br />

that are destined for a client IP address. This is referred to as proxy ARP.<br />

When an IP host requests an 8235 client IP address, the 8235 responds to the<br />

host with its own Ethernet address, specified on the IP configuration page.<br />

The 8235 accepts client packets and forwards the packet to the correct IP<br />

client/address.<br />

IP packets are routed across an AppleTalk network by means of<br />

encapsulation. The 8235 sends IP packets to Macintosh dial-in clients by<br />

encapsulating the IP packet within an AppleTalk packet. The 8235 forwards<br />

IP packets from an ARA client to an IP host by de-encapsulating the IP<br />

packet.<br />

The 8235 ARA dial-in clients appear as if they are directly connected nodes<br />

within the IP network. The IP host and the dial-in client are not affected by<br />

the fact that their packets are being routed through the 8235.<br />

The Macintosh dial-in client uses the name binding protocol (NBP) to search<br />

for an IPGATEWAY device type in a specified zone. Since the 8235 is the<br />

ARA server for the client, the 8235 processes all of the client′s AppleTalk<br />

packets and checks its configuration to see if it is configured as an IP<br />

gateway for that zone. If it is, the 8235 responds to the Macintosh dial-in<br />

client that it is an IPGATEWAY.<br />

The dial-in client sends a Kinetics Internet Protocol (KIP) command to the<br />

8235 asking for an IP address. The 8235 responds with the dial-in client′s IP<br />

address, subnet mask, broadcast address and the IP address of the name<br />

server.<br />

To communicate with an IP host, the user must have an IP address. IP<br />

addresses are assigned to a Macintosh client as follows:<br />

− Per user: When a dial-in connection is made, the 8235 checks the user<br />

list to see if there is a user IP address. If there is a user IP address in<br />

the user list, the 8235 assigns this IP address to the client.<br />

− Per port: If there is no IP address in the user list, the 8235 assigns the<br />

port IP address to the client.<br />

Security: The 8235 provides several security features. Passwords for both<br />

dial-in and LAN-to-LAN connections are automatically encrypted. User lists store<br />

user profiles that include user names, passwords, permissions and dial-back. If<br />

dial-back is selected in a user profile, the 8235 will hang up after the dial-in or<br />

LAN-to-LAN connection is established; it will then call the user back at a<br />

configured (required dial-back) number or at a number entered by the user when<br />

Chapter 2. Connectivity 87


This soft copy for use by <strong>IBM</strong> employees only.<br />

the connection was established (roaming dial-back). Unauthorized access to the<br />

8235 device configuration or user list can be prevented by assigning the 8235 an<br />

administrator password. This password is stored in the 8235 device<br />

configuration information, not in the user list.<br />

The 8235 has a unified security architecture that allows any security server on<br />

the LAN to be used to authenticate any user regardless of the protocol being<br />

used. This allows a centralized security method to be used for all<br />

authentications. 8235 Version 2.0 code or later supports the authentication<br />

databases:<br />

• 8235 User List<br />

• NetWare Bindery<br />

• SecurID ACE/Server<br />

• Master/Slave User List<br />

The 8235 prompts separately for the user name and password for each method<br />

of authentication. Thus, more than one security method can be used<br />

simultaneously. SecurID could be used to authenticate an individual user who<br />

then logs in to a NetWare Bindery group and is granted the access privileges<br />

associated with that group. Because the user protocol does not matter, the<br />

NetWare Bindery could be used to authenticate an Apple Remote Access (ARA)<br />

Version 2.0 dial-in user.<br />

• 8235 User List<br />

Using the 8235 Management Facility, a user list can be created, edited, and<br />

then saved to a file or loaded into the 8235. The 8235 user list stores the<br />

names, passwords, and permissions of users authorized to dial in to or out<br />

of the network or to connect to another network. User lists are stored in<br />

battery backed-up RAM in the 8235. Each 8235 can have a different user list<br />

or one user list can be downloaded to multiple 8235s. The NetWare Bindery<br />

or SecurID is recommended if there are more than 500 users.<br />

• Using the NetWare Bindery<br />

The NetWare Bindery is a database that resides on a NetWare server. This<br />

database contains profiles of network users that define each user′s NetWare<br />

name, password, dial-back number, and the permissions to use one or more<br />

8235 functions such as dial-in, dial-out or LAN-to-LAN.<br />

When bindery authentication is enabled, it replaces the 8235 user list<br />

authentication.<br />

With bindery security enabled the bindery services utility can be used to<br />

create bindery groups for dial-in, dial-out, and LAN-to-LAN users. The group<br />

names are 8235_DIALIN, 8235_DIALOUT, and 8235_LAN-to-LAN. The bindery<br />

dial-in user groups are used when a user dials in to the network using a<br />

NetWare name and password. The 8235 logs in to the NetWare server with<br />

this user name and password and then logs out. If the 8235 logon to the<br />

server was successful, the 8235 allows the user to access the network<br />

through the 8235.<br />

• Bindery and Apple Remote Access (ARA)<br />

To use the bindery, ARA Version 2.0 users must have the 8235 Security<br />

Module in their Macintosh systems Extensions folder in the System folder.<br />

This module supplies a security drop-in, which provides 8235 password<br />

encryption (thereby allowing bindery security to work with ARA Version 2.0.)<br />

• Using SecurID<br />

88 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 40. 8235 Security System<br />

Security Dynamics, Inc. manufactures two security solutions that are<br />

compatible with the 8235. The first is a multiport, stand-alone device that<br />

can be inserted between the 8235 and the modem. This solution requires no<br />

particular configuration of the 8235. The device dialing in must be capable of<br />

handling the authentication dialog.<br />

Macintosh users who have the external SecurID client box installed for their<br />

8235 can still use their Connection Control Languages (CCL) as before;<br />

however, SecurID should not be enabled in the 8235 Management Facility, as<br />

this will trigger the 8235 internal SecurID client.<br />

SDI′s second security solution is the Security Dynamics ACE/Server, which is<br />

a system of server and client software and SecurID cards. Once enabled,<br />

SecurID authentication is used for all protocols (IP, IPX, NetBEUI, 802.2 LLC,<br />

and ARA).<br />

The 8235 can use SecurID to protect its serial ports from unauthorized dial-in<br />

access. SecurID authenticates users and may be used in conjunction with<br />

the 8235 user list or the NetWare Bindery. See Figure 40 for the SecurID<br />

configuration.<br />

SecurID authentication is not required of dial-out users, users managing the<br />

8235 with the command shell, or users managing the 8235 with the 8235<br />

Management Facility. SecurID does not protect the 8235 from dial-out,<br />

LAN-to-LAN, or local area network shell access. If the 8235 is using SecurID<br />

authentication, incoming LAN-to-LAN connections are not permitted.<br />

The components of a full implementation of SecurID are as follows:<br />

− SecurID server software<br />

This software runs on a UNIX machine. The user data protocol (UDP) is<br />

used to communicate with the client software running on the 8235. This<br />

server software is purchased from Security Dynamics, Inc.<br />

Chapter 2. Connectivity 89


− SecurID client<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

This is the component running on the 8235 that communicates with the<br />

SecurID server via UDP. It is compatible with SecurID server software<br />

Version 1.1 or later.<br />

− SecurID card<br />

This component is a card that provides the user with a passcode number<br />

needed to access the SecurID server.<br />

− Dial-in client software<br />

This is the standard 8235 Remote Dial-in Client Version 2.0 or later for<br />

PC users or Apple Remote Access (ARA) Client Version 2.0 or later for<br />

Macintosh users.<br />

The Activity Logger: The Activity Logger runs under Microsoft Windows and<br />

DOS. It provides information about 8235s and their dial-in activity on the<br />

network.<br />

The logger carries out the following tasks:<br />

• It records the dial-in activity of the 8235 on the network.<br />

• It notifies the network administrator of 8235 activity according to a set of<br />

priorities and classes selected by the administrator.<br />

The 8235 logs its activity to another station using a mechanism of SNMP called a<br />

trap. Each time the 8235 logs an event, it sends a trap message to its trap host.<br />

The trap host can be one of the following:<br />

• A workstation running the 8235 Activity Logger<br />

• An IP host with an SNMP manager<br />

There can only be one trap host associated with an 8235 at any given time. This<br />

trap host is configured in the 8235 Management Facility on the SNMP<br />

configuration window. There are two host types to choose from: None and IP.<br />

If you select IP, then you can also specify the IP address of the trap host. This IP<br />

host must be an SNMP manager and have some facility for displaying SNMP trap<br />

messages if it is to be used as the activity logger. For example, this could be a<br />

NetView for AIX management station.<br />

If you select None, then the trap host address cannot be specified via the 8235<br />

Management Facility. Instead, once the 8235 activity logger (which runs on top<br />

of IPX) selects an 8235 as a device to be logged to that workstation, the selected<br />

8235 sends all of its trap messages to that workstation. If an 8235 is selected on<br />

one activity logger workstation while another activity logger workstation is the<br />

current trap host, the new workstation becomes the new trap host. This provides<br />

flexibility in case a trap host goes down because it is easy to switch over to a<br />

backup host.<br />

2.3.3.4 <strong>IBM</strong> 8235-I40<br />

This section gives an overview of the <strong>IBM</strong> 8235 Dial-in Access.<br />

Further information can be found in:<br />

• <strong>IBM</strong> 8235 Dial-in Access to LANs Server Concepts and Implementation,<br />

SG24-4816<br />

90 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

• http://www.networking.ibm.com/82s/82sprod.html<br />

Introduction: The 8235 Model I40 DIAL Switch (from here on being referred to as<br />

I40) is an enterprise-level device that attaches to one LAN (current release<br />

supports Ethernet only) and several high-speed communication lines such as T1,<br />

E1 and primary rate ISDN (PRI) interfaces. Unlike the other 8235 models, it does<br />

not directly attach to analog lines (except for its out-band management ports) or<br />

basic rate ISDN lines. However, it accepts calls from clients being attached to<br />

those lines that are being directed to its high-speed line interface by the public<br />

carrier.<br />

Disclaimer<br />

Some of the information contained in this chapter may not apply to the initial<br />

release. In particular, this is the case for ARA 1.0, which is not supported,<br />

and any dial-out capabilities, including call-back. However, this is contained<br />

in some of the panels of the Management Facility. For that reason and<br />

because these functions are likely to be added in a future release, they have<br />

not been removed from this chapter.<br />

This is by no means a pre-announcement of any of these features. Plans<br />

may change; for the actual set of functions, refer to the manuals that come<br />

with the product.<br />

We had only limited test opportunity with the I40; for this reason, many of<br />

details described here were derived from working with the Management<br />

Facility; there was no way to test some of them with actual WAN lines and<br />

actual dial-in connections.<br />

Model I40 Hardware Overview: Here we discuss the hardware components of<br />

the I40. They are:<br />

• Chassis<br />

• Slots<br />

− Slots 1-3, dedicated, PCI only<br />

− Slots 4-11, multipurpose, ISA or PCI<br />

• Cards<br />

− CPU card<br />

− LAN card (Ethernet)<br />

− WAN cards (single and dual, T1 and E1)<br />

− Modem card (DMC)<br />

• Bus connections between the cards<br />

• Limitations in current (first) release<br />

Chassis: The I40 has the size and shape of a desktop PC (rack-mountable) and<br />

is populated with cards via a PCI bus just like a PC. But it is not a PC; it does not<br />

allow for the attachment of keyboard, mouse, monitor and it does not have a<br />

processor-equipped motherboard. The base unit mainly houses some front-panel<br />

LEDs, an auto-detecting power supply, cooling devices and a board with a PCI<br />

bus (133 MBps data throughput) to receive up to 11 cards. These cards actually<br />

Chapter 2. Connectivity 91


This soft copy for use by <strong>IBM</strong> employees only.<br />

carry out the functions of the machine. For a view from the top refer to Figure 41<br />

on page 92. There are two groups of slots: 1-3 and 4-11.<br />

Figure 41. 8235-I40 Top View with Upper Cover Removed<br />

Slots 1-3: These slots are PCI only and for dedicated purposes only:<br />

• Slot 1 must be equipped with the main CPU card, carrying the main<br />

processor and its memory.<br />

• Slot 2 must take the LAN adapter. At this initial release there is only one<br />

option, an Ethernet adapter with AUI and 10Base-T connectors. Only one of<br />

those connectors can be used at a time.<br />

• Slot 3 is reserved for future use and must currently be empty.<br />

Slots 4-11: These slots each have a PCI connector and an ISA connector, so<br />

either a PCI card or an ISA card can be installed into each slot. For cooling<br />

reasons (fan airflow) the ISA WAN cards (T1 or E1) have to be installed in slot 4<br />

and 5. The remaining six slots can be used to install Digital Modem Cards<br />

(DMCs).<br />

92 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 42. 8235-I40 Front View - Sample Configuration<br />

Cards: There are four types of cards. See Figure 42 for their placement and<br />

faceplate layout.<br />

1. The CPU card carries the main processor, a Motorola 68060, two<br />

asynchronous serial ports for out-band management and the memory. There<br />

are several types of memory, as follows:<br />

• Flash memory. One part of this is permanent VROM (PVROM); this can<br />

only be replaced by a flash upgrade. The other part is upgradeable<br />

VROM (UVROM); it holds the firmware image; this can be replaced by<br />

selecting Clear and <strong>Download</strong> from the Management Facility.<br />

• Dynamic RAM (DRAM). This is a special 32-bit, EDO, 50 ns memory.<br />

There is 4 MB on board; 4-MB SIMMs can be added up to a total of 64<br />

MB. The box may be shipping with some SIMMs already installed.<br />

Attention<br />

Never attempt to use any off-the-shelf memory here. This is likely to<br />

be destructive.<br />

• VROM. Code and image are loaded here for execution, transmits to and<br />

receives from the LAN card are stored here and all data buffering takes<br />

place here.<br />

• Static RAM (SRAM). This stores data that is to be retained when the<br />

machine is powered off, among which is configuration data, the IP<br />

address of the device and the user list. This memory is battery-backed.<br />

Figure 43 on page 94 shows a sample display provided by the Management<br />

Facility Device Info... function, giving details on these memory types.<br />

Chapter 2. Connectivity 93


Figure 43. Device Info Page - Memory<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

2. The LAN card currently has to be the Ethernet card. Future possible<br />

enhancements are token-ring and others. Unlike other models of the 8235,<br />

the LAN connection is not a fixed, built-in interface, but a removable,<br />

replaceable card. For this reason there is no need to distinguish between<br />

token-ring models and Ethernet models, as is the case with all other current<br />

non-I40 8235 models.<br />

Attention<br />

This LAN card is a feature code of the 8235-I40; it cannot be replaced by<br />

any other general purpose PCI Ethernet adapter.<br />

3. There are four types of WAN cards. They all have three connectors at the<br />

back, marked Port B, Port A and Diagnostics Port from top to bottom.<br />

Depending on the type of card (single or dual), either port A is inactive and<br />

port B only is active (single) or both ports are active (dual).<br />

Port A corresponds to line 1 in the WAN card configuration page; port B<br />

corresponds to line 2. Consequently, a single WAN card has only a line 2, not<br />

a line 1.<br />

The Diagnostic port is not used for data transfer and is not described here.<br />

All four WAN cards have an ISA connector to plug in to the PCI bus. They all<br />

have an integrated processor. These are the different types of cards:<br />

• PR Single T1<br />

Primary Rate Interface - Single T1 WAN Card<br />

This card has one physical T1 interface. On board is an integrated CSU.<br />

• PR Dual T1<br />

Primary Rate Interface - Dual T1 WAN Card<br />

This card has two physical T1 interfaces. On board is an integrated CSU.<br />

• PR Single E1<br />

Primary Rate Interface - Single E1 WAN Card<br />

This card has one physical E1 interface. It does not require a CSU;<br />

however, it has straps where the CSU could be placed. These straps<br />

must not be removed.<br />

• PR Dual E1<br />

Primary Rate Interface - Dual E1 WAN Card<br />

94 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

This card has two physical E1 interfaces and no integrated CSU (see<br />

above).<br />

4. There is one type of digital modem card (DMC). It has a PCI connector. It<br />

carries 12 Rockwell V.34 chip sets, so it accounts for 12 analog modems.<br />

Each of them can support a 28.8-kbps connection with a port speed of up to<br />

115.2 kbps. The card has a dedicated microprocessor and is<br />

flash-upgradeable.<br />

Bus Connections: In addition to the Peripheral Component Interconnect (PCI)<br />

bus, there is a second connection, only between the WAN cards and the DMCs.<br />

This is the Multi Vendor Integration Protocol (MVIP) flat cable bus. The MVIP<br />

connectors are located near the top edge of these cards, so the cable is running<br />

across the top of the vertically inserted cards in slots 4 to 11 (see Figure 44).<br />

Figure 44. 8235-I40 Card Insertion (MVIP Flat Cable)<br />

MVIP is an industry-standard TDM bus technology, carrying 256 64-kbps<br />

full-duplex channels, yielding 16 Mbps overall throughput capacity. This MVIP<br />

bus is being used for communication between DMCs and WAN cards for analog<br />

calls that require modem processing. When an analog call comes in, the WAN<br />

card is capable of detecting this and routing it to a modem. The modem (one out<br />

of 12 residing on a DMC) does the DSP processing and then, in turn, routes the<br />

data stream, which is now digital, to the main CPU over the PCI bus. When a<br />

digital call comes in, the WAN card directly forwards the data to the main CPU.<br />

So there is no additional impact on the PCI bus imposed by analog calls as<br />

Chapter 2. Connectivity 95


This soft copy for use by <strong>IBM</strong> employees only.<br />

compared to digital calls, even though analog calls require more processing.<br />

(See Figure 45 on page 96 for the data flow.)<br />

Figure 45. 8235-I40 Data Flow<br />

Capacity Limitations: For the initial release, the following limitations apply:<br />

• Two WAN cards can be present with a maximum of three WAN interfaces. So<br />

the maximum is one single and one dual WAN card.<br />

• There can be up to five DMCs present. This accounts for 60 modems.<br />

• The number of supported connections depends on the type of WAN interface<br />

being used and on the type of calls (digital or analog):<br />

− 60 analog sessions maximum (five DMCs)<br />

− 78 sessions maximum (mix of digital and analog) for E1 (three E1<br />

interfaces)<br />

− 71 sessions maximum (mix of digital and analog) for T1 (three T1<br />

interfaces)<br />

These limitations are likely to change in future releases, as they are not design<br />

limits.<br />

2.3.3.5 RLAN Function of 2210<br />

Another option for a dial equipment is the <strong>IBM</strong> 2210 with RLAN. Its function<br />

makes it possible to use the 2210 either as a remote access server in the ISP or<br />

as a dial-out server for the LAN customers.<br />

This new RLAN function implemented new RFCs in the 2210:<br />

• PPP Internet Protocol Control Protocol Extensions for Name Server Address<br />

(RFC 1877)<br />

• Dynamic Host Configuration Protocol (RFC 1541)<br />

• Microsoft Point to Point Compression (MPPC) Protocol (RFC 2118)<br />

The RLAN additions implement:<br />

• Callback/Dialback<br />

96 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

This is a feature associated with remote access solutions. It attempts to<br />

accomplish two objectives:<br />

1. It can be used as a form of security. When used in this way, callback is<br />

generally referred to as required callback. When it′s negotiated the user<br />

will be dialed back at a predetermined number. Only then the PPP link<br />

will be allowed to come up.<br />

2. Callback can also be implemented as a toll-saver feature. When used in<br />

this way, callback is generally referred to as roaming callback. Unlike<br />

required callback, roaming callback is requested by the client. The<br />

primary function of roaming callback is to bill the company maintaining<br />

the dial server the toll charges instead of the user.<br />

The user configuration is done via the PPP user list.<br />

Callback is not supported in some backend authentication protocols that<br />

don′t support more than a user/password pair.<br />

• Dial-In<br />

In this design, a dial-circuit can be configured to support PPP dial-in on the<br />

2210. The dial-in client runs on remote workstation and access to the<br />

resources as if it was attached to the LAN. This is supported in the WAN<br />

ports configured to handle V.34 modems.<br />

Chapter 2. Connectivity 97


Figure 46. Dial-In Design<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

The V.34 handler facilitates data flow and commands between virtual nets<br />

(dial-circuits) and the Connection Management Library (CML).<br />

Enhancements to CML include the ability to allow PAP/CHAP authentication<br />

in addition to the proprietary method.<br />

This function provides more reliable modem control as well as the capability<br />

to provide WAN restoral over analog modems.<br />

• Dial-Out BBS, FAX<br />

98 The Technical Side of Being an Internet Service Provider<br />

The dial-out functions on the 2210 allow LAN users access to networked<br />

modems. These outgoing calls can be placed to FAX machines, BBS and<br />

ISPs.


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 47. Dial-Out Design<br />

This feature is configured on the 2210 by adding a dial-out net. This net is<br />

then linked to one of the base modem ports. The access to elementary<br />

modem functions on the network is limited to outbound access only.<br />

• Proxy DHCP<br />

The negotiation of an IP address for a remote access client is made through<br />

PPP via IPCP. Currently, the IP address that is chosen for the client is<br />

selected via one of the following three methods:<br />

− Client specified<br />

− User ID specified<br />

− Port specified<br />

The user ID and port specified require that an IP address be stored locally<br />

on the box in SRAM or some other persistent memory. Proxy DHCP is an<br />

additional method to determine the IP address for a dial-in client based on<br />

the Dynamic Host Configuration Protocol outlined in RFC 1541.<br />

This protocol allows for the dynamic allocation of IP addresses from a pool<br />

located on a server accessible by the 2210. This server is queried upon<br />

connection by a remote user and returns a suitable IP address from a pool.<br />

Chapter 2. Connectivity 99


This soft copy for use by <strong>IBM</strong> employees only.<br />

This address is then used during ICPC negotiation with the client. Access to<br />

the DHCP server is then transparent to the dial-in user.<br />

The Proxy DHCP helps customers manage large networks.<br />

• MPPC Compression<br />

2.3.4 Customer Requirements<br />

MPPC Compression consists of the addition of support for STAC-Extended<br />

(mode 4) and Microsoft Point-to-Point Compression (MPPC) protocol for PPP<br />

link. STAC mode-4 uses the same compression engine as the already<br />

supported STAC modes. However, STAC mode-4 uses a packet format that<br />

is different from other STAC modes. For MPPC, the compression engine<br />

code provided by Microsoft is used. This function allows clients that support<br />

STAC-Extended and MPPC to negotiate a link with compression enabled<br />

allowing performance increases for low-speed links.<br />

In this section we point out the basic hardware and software that can be used in<br />

the clients connections. As we can have a larger number of variations based on<br />

the type of users (with or without a LAN) and the connection type and<br />

technologies (dial-up, dedicated, ISDN, etc.), we mention the hardware and<br />

software that can be used in the SOHO-users dial-up and dedicated connections.<br />

2.3.4.1 Hardware<br />

In general, the minimum requirements for the dial-up connections are:<br />

• PC 386 (recommended 486 or higher)<br />

• Clock speed of 25 MHz<br />

• 8 MB RAM<br />

• Modem at 9.600 bps (recommended higher)<br />

All these items may also vary depending on the operational system<br />

prerequisites.<br />

However, these are the basic requirements to just make the connection. As the<br />

Internet applications are getting more and more rough with graphical and<br />

multimedia resources, these minimum hardware requirements will be<br />

insufficient. The ISP should help its customers to find the ideal configuration for<br />

their proposals and needs.<br />

For the dedicated connections through leased lines, the customer will need a<br />

router and a circuit compatible with the throughput he or she needs. (See 9.4,<br />

“Bandwidth” on page 270 for capacity planning information.)<br />

2.3.4.2 Software<br />

The clients will need several programs to achieve the Internet resources. The<br />

most important are the ones that provide these functions:<br />

• PPP<br />

• Web browser<br />

• E-mail<br />

• News reader<br />

These programs can be used in different combinations and are usually:<br />

100 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

• A starter kit given by the provider<br />

• Commercial solutions<br />

• Shareware or public domain products<br />

The first requirement is for the PPP or SLIP communication program to call the<br />

provider and make the IP connection. The software to do that is called dialer and<br />

can be supplied by:<br />

• The client RAS (for example, the 8235 client to connect to 8235 server)<br />

• Within the operation system (for example, Windows95, Windows NT, OS/2<br />

Internet Dialer)<br />

• TCP/IP package (for example, Chameleon)<br />

The 8235 is shipped with software packages that provide the support for three<br />

different system environments: DOS, Windows and OS/2.<br />

Windows NT, Windows 95 and OS/2 Warp 4 come with PPP support. UNIX is also<br />

pretty self-sufficient. However, Windows 3.1 and Windows for Workgroups 3.11<br />

don′t come with TCP/IP and PPP so it′s necessary to use some additional<br />

winsocks. Although there is a large number of companies developing these<br />

winsock.dlls, the choice of which winsock to use is governed be a couple of<br />

factors:<br />

• The winsock.dll the ISP recommends.<br />

• The network environment the customer has. If he or she has a commercial<br />

networking software, he or she must obtain it from the respective vendor.<br />

• The personal preference, as even though the winsocks follow the same<br />

TCP/IP standard, they each have different features.<br />

Finally, the customer can obtain it by:<br />

• Purchasing a commercial product, if he or she already uses network<br />

software.<br />

• <strong>Download</strong>, evaluate and purchase some shareware winsock.dll such as<br />

Trumpet.<br />

• <strong>Download</strong> and use a freely available one.<br />

Some ISPs give a starter kit that contains a dialer and can also includes a Web<br />

browser, e-mail and news support. However, it has become less important as<br />

we have such facilities as the PPP support that comes in operational systems.<br />

With the starter kit the installation and configuration of the products are<br />

automatically done; it creates the proper directories, installs the files and asks<br />

some needed questions. Sometimes even the new user account can be<br />

configured automatically, as it sends the user name to the ISP site and it<br />

receives a password. For the optional software included in the starter package,<br />

the ISP needs to pay a fee to the software′s owner, and software such as<br />

Netscape cannot be distributed in a disk without a license. One example of<br />

these installer packages that can be used is InetMgr. (See<br />

http://www.ccsweb.com for more information.)<br />

If a new subscriber prefers to use the dialer that comes within the operational<br />

system, he or she will need to configure its fields manually with the IP numbers<br />

of the various servers. He or she will also need to contact the ISP to get his or<br />

Chapter 2. Connectivity 101


This soft copy for use by <strong>IBM</strong> employees only.<br />

her user name and password. Both tasks can be set up with a 5-minutes talk<br />

over the telephone line.<br />

This previous scenario is typical for a SOHO user. The corporate user may<br />

connect to the ISP through a proxy server or a firewall.<br />

A proxy is a program that runs on a gateway host that acts as an intermediary<br />

for the other machines on the network, so they can connect to the Internet via a<br />

LAN using the same phone or dedicated connection provided in the gateway. A<br />

proxy server establishes the actual Internet connection, and the other machines<br />

on the LAN make requests for Internet resources of the proxy server. The proxy<br />

server then passes along the request to the Internet, receives the information<br />

requested, and then passes back this information to the machine on the LAN that<br />

requested it. The proxy server itself can be used to access the Internet; it just<br />

doesn′t need to pass the requested information back. With the firewall there′s<br />

this same (and more) functionality plus the security issues. In both cases, the<br />

corporate users will use only the browser and optional softwares. The dialer is<br />

not needed due to the dedicated connection.<br />

Note<br />

It′s important to test the the client starter kit or the market-used dialers to<br />

check if their are compatible with your RAS.<br />

There is a wide range of software available for those applications. We show<br />

only some of them:<br />

102 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Table 20 (Page 1 of 2). Client Software Applications<br />

Type Name Platform Support Comments<br />

Dialer Windows 95<br />

Dial-up<br />

Networking<br />

Windows<br />

OS/2 Mac UNIX PPP SLIP<br />

X X X The Windows 95 Dialer is an<br />

interface that works over the<br />

built-in Windows 95 dialer program<br />

called Dial-Up Networking (DUN).<br />

Windows NT X X X As NT was specifically designed<br />

for non-dial up network<br />

connections, LAN and dial<br />

connections can and will conflict,<br />

so some help is needed on<br />

network and dial connections.<br />

Windows NT RAS v3.5x does not<br />

support dynamic IP addressing<br />

using SLIP, so a true automated<br />

script is not possible.<br />

Trumpet<br />

Winsock<br />

Netmanage<br />

Chameleon<br />

Netscape<br />

Navigator<br />

Personal<br />

Edition<br />

OS/2 Warp Dial<br />

Other<br />

Providers<br />

X X X This is a shareware TCP/IP stack<br />

and dialer.<br />

X X X This package includes a TCP/IP<br />

stack and applications such as<br />

e-mail, news reader, tn3270, etc.<br />

X X X This is Netscape′s dial-up Internet<br />

connectivity kit, which includes<br />

Netscape Navigator and a dialer<br />

written by Shiva.<br />

X X X The OS/2 Warp dialer is an<br />

interface over the built in TCP/IP<br />

software provided by <strong>IBM</strong>.<br />

Version 1.67 and earlier do not<br />

support PPP, only Version 1.68<br />

and above. OS/2 Warp Connect<br />

and OS/2 Warp V4 (also known as<br />

Merlin) include the dialer, the<br />

WebExplorer browser and e-mail.<br />

MacPPP X X Open Transport or MacTCP may<br />

be used with MacPPP but never at<br />

the same time, because they<br />

conflict with one another. System<br />

7.5.3 and later are preinstalled<br />

with Open Transport.<br />

Chapter 2. Connectivity 103


Table 20 (Page 2 of 2). Client Software Applications<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Type Name Platform Support Comments<br />

Windows<br />

OS/2 Mac UNIX PPP SLIP<br />

Dialer InterSLIP X X This is a shareware Internet<br />

dialer.<br />

FreePPP X X A combined effort of several<br />

individuals who made<br />

enhancements to MacPPP.<br />

Supports Open Transport. Open<br />

Transport or MacTCP may be used<br />

with FreePPP but never at the<br />

same time, because they conflict<br />

with one another. System 7.5.3<br />

and later are preinstalled with<br />

Open Transport. FreePPP is a<br />

Freeware software package and<br />

does not have any software<br />

support.<br />

Internet in a<br />

Box<br />

X X X By Spry.<br />

FTP OnNet X X V1.2 requires the server to send a<br />

login sequence to the client and<br />

some services do not support this.<br />

It′s better to obtain Version 2.0 or<br />

higher.<br />

Pathway<br />

Access<br />

X X X This is a TCP/IP suite by<br />

Attachmate.<br />

Crosstalk X X Also by Attachmate.<br />

AIX v4.1.5 or<br />

v4.2<br />

X X Prior versions of AIX do not<br />

support Password Authentication<br />

Protocol (PAP) so can not be used<br />

with servers that have PPP with<br />

PAP implementations.<br />

Linux X X X SLIP and PPP setup procedures<br />

are available. You may find SLIP<br />

the easier of the two to set up.<br />

Note: The customer must use SLIP or PPP depending on the configuration that<br />

will be used in the ISP.<br />

104 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Table 21. Client Software Applications<br />

Type Name Platform Comments<br />

Windows<br />

OS/2 Mac UNIX<br />

Mail Eudora X X Eudora Mail is a Macintosh and Windows<br />

(16-bit and 32-bit versions are available)<br />

based e-mail application. There are many<br />

different versions of Eudora Mail (all with<br />

a slightly different interface), and also two<br />

different Eudora types: Eudora Light<br />

(freeware version) and Eudora Pro (fully<br />

registered and supported version from<br />

Qualcomm).<br />

Netscape Mail X X X X Netscape browser Version 2 and higher<br />

have a built in e-mail program. Netscape<br />

is not an offline mail program and it does<br />

not offer a spell checker.<br />

Pegasus X Pegasus Mail is a Windows-based e-mail<br />

application (32 and 16-bit versions are<br />

available). There may be slight<br />

differences in the interface of the many<br />

Pegasus versions but the overall concept<br />

is nearly identical. Also there are many<br />

help resources available to Pegasus user<br />

including extensive help in the application<br />

itself and the news group<br />

comp.mail.pegasus-mail.ms-windows.<br />

Ultimail X Ultimail is the e-mail software that is<br />

provided in the bonus pack of the <strong>IBM</strong><br />

operating system OS/2 Warp.<br />

Browser Netscape X X X X The world′s leading Internet browser.<br />

News<br />

Reader<br />

Internet Explorer X Internet Explorer (IE) is the WWW<br />

Browser provided by Microsoft and it is<br />

available via download from Microsoft′ s<br />

Web site.<br />

Web Explorer X Web Explorer is the WWW browser that is<br />

provided in the bonus pack of the <strong>IBM</strong><br />

operating system OS/2 Warp.<br />

NCSA Mosaic X X X Developed at the National Center for<br />

Supercomputing Applications at the<br />

University of Illinois in Urbana -<br />

Champaign.<br />

WinVN X This is one of the first newsreader<br />

packages, with fewer features than<br />

FreeAgent.<br />

FreeAgent X One of the best News reader packages<br />

available on the Internet; has many<br />

functions and options and makes picture<br />

decoding very simple.<br />

Netscape X X X X Built-in newsreader program that comes<br />

with the browser.<br />

Internet Explorer X Built-in newsreader program that comes<br />

with the browser.<br />

NewsReader/2 X Package that comes with the OS/2 Warp<br />

Bonus Pack and Netsuite.<br />

Chapter 2. Connectivity 105


This soft copy for use by <strong>IBM</strong> employees only.<br />

Finally, for a customer to be able to make the connection to the ISP and use the<br />

Internet applications, in general he or she will need the following information:<br />

• A PPP/SLIP account▐1▌<br />

• A user name▐1▌<br />

• A password▐1▌<br />

• The phone number to be used<br />

• The serial protocol used (PPP or SLIP)<br />

• Whether the IP address is permanently assigned (static) or it will be obtained<br />

from the RAS (dynamic)<br />

• Name server configuration<br />

− The customer machine′s hostname<br />

− The TCP/IP domain name<br />

− The addresses of the DNS servers (primary and secondary)<br />

− Netmask<br />

• E-mail configuration<br />

− POP server name<br />

− SMTP server name<br />

− E-mail address<br />

• WWW Server URL<br />

• News server name<br />

▐1▌Supplied during the installation process within the starter kit or in a previous<br />

ISP telephone contact.<br />

For information of how to configure the dial-up connection in Windows95 see:<br />

http://www.windows95.com.<br />

106 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Chapter 3. Server Hardware Platforms<br />

Server computers do many things: run transaction systems, manage Web sites,<br />

control intranets, manage databases, store data for decision support, as well as<br />

provide file and printing services for local PCs. Choosing the right servers can<br />

be one of the most important information technology decisions an organization<br />

makes.<br />

The term server was first applied to the small computers used to share disk<br />

space, printers, and network access for PCs. Over time, server has become the<br />

commonly used name for all multiuser computers. Technically speaking, a<br />

computer acts as a server when it responds to requests from other computers in<br />

a network. In practice, this is what multiuser computers spend most of their time<br />

doing.<br />

Before PCs, almost all computers were servers. As PCs became the center of<br />

the information universe, a name was needed for the other computers that<br />

worked behind the scenes. For a while it seemed like natural evolution would<br />

lead to most computing being done by very powerful desktop or laptop systems.<br />

The less visible computers that linked them together therefore didn′t seem as<br />

important. Calling them servers reinforced the feeling that their role was<br />

subservient to the PC masters they existed to serve.<br />

Client/server computing is the popular name given to the approach of shifting<br />

much of the computing workload to powerful distributed PCs. While a number of<br />

great applications have been created around the client/server model, in general<br />

it has proven too complex and expensive to administer for most organizations.<br />

High support costs and the need to constantly upgrade PC hardware have<br />

limited the appeal of client/server.<br />

The information technology industry has begun to focus on a different approach.<br />

Internet Web-based computing, Java, and network computers hold out the hope<br />

of reducing support and hardware costs by shifting more of the computing<br />

workload back to larger servers. Suddenly, servers are back in vogue.<br />

Demand for server capacity could grow at an even higher rate due to the<br />

increasing popularity of the Internet and intranets, the extra processing power<br />

required for applications written in object languages such as Java, greater use of<br />

multimedia in applications, and the growing popularity of data mining.<br />

<strong>IBM</strong> is the largest provider of server computers. During 1997 almost $16 billion<br />

is expected to be spent on <strong>IBM</strong>′s four families of servers: S/390, AS/400,<br />

RS/6000, and PC server. Each represents a large and successful business for<br />

<strong>IBM</strong>. While <strong>IBM</strong> no longer dominates the computer industry, what it does still<br />

impacts almost every organization. It is therefore important for decision makers<br />

to understand <strong>IBM</strong>′s plans for its four server lines.<br />

This chapter offers a high-level view of <strong>IBM</strong>′s four server platforms and where<br />

each is headed. By helping decision makers better understand the offerings<br />

available from <strong>IBM</strong>, we also provide a useful perspective on the entire market for<br />

servers.<br />

© Copyright <strong>IBM</strong> Corp. 1997 107


3.1 <strong>IBM</strong> Server′s Strategy<br />

3.1.1 <strong>IBM</strong> Server Business<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Different types of servers are needed to accomplish the growing number of<br />

missions that information technology must accomplish. As a result, it has<br />

become commonplace for advanced users of information technology to employ<br />

many different types of servers. This has led to the challenge of controlling and<br />

supporting increasingly complex computing environments.<br />

<strong>IBM</strong> sells a number of different types of computers. This improves the chances<br />

that it will be able to meet any particular need but also makes its product line<br />

harder to explain. Customers need alternatives but also want everything they<br />

buy to work well together. <strong>IBM</strong> has responded by becoming a leader in the<br />

integration of divergent systems.<br />

During the 1980s, <strong>IBM</strong> had gone too far in offering variety. Its hodgepodge of<br />

incompatible computers confused everyone including its own sales people. Over<br />

a period of years, <strong>IBM</strong> phased out marginal products such as the 8100, Series 1,<br />

and System/36. Four server families now remain: S/390, AS/400, RS/6000, and PC<br />

server. Further consolidation appears unnecessary.<br />

In the early 1990s, server hardware was not a robust business for <strong>IBM</strong>. Success<br />

with AS/400 and RS/6000 systems did not offset rapidly declining mainframe<br />

revenues. At that time all traditional servers seemed destined to decline in<br />

popularity in favor of PCs and Intel-based servers.<br />

As the end of the century approaches, the outlook for <strong>IBM</strong>′s server families is<br />

considerably brighter. The S/390 and AS/400 product lines have each undergone<br />

major redesigns that make them much more competitive and that took longer<br />

than originally planned. After letting others take the lead in PC servers and<br />

UNIX systems, <strong>IBM</strong> has become an important force in both of these markets.<br />

Each <strong>IBM</strong> server family focuses on very specific customer needs. S/390s are<br />

excellent at continuous computing and large-scale processing; AS/400s offer a<br />

wide selection of application packages and exceptional ease of use; RS/6000s<br />

feature a great version of the UNIX operating system and strength handling<br />

commercial and technical-computing workloads; and <strong>IBM</strong>′s PC servers cover the<br />

fast growing market for Intel-based systems. There are points where these<br />

products overlap in price, capacity, and features, but each offers its own unique<br />

value proposition to buyers.<br />

<strong>IBM</strong> will not abandon the customers of any of these servers. Doing so would not<br />

make sense since each has a loyal customer following and helps generate sales<br />

in other parts of <strong>IBM</strong> including software, hardware maintenance, consulting, and<br />

peripherals. <strong>IBM</strong> also has a strong tradition of protecting the investment of past<br />

buyers.<br />

<strong>IBM</strong> will continue to invest heavily in improving all four server lines.<br />

Management does not secretly favor one of them over the others. Having four<br />

horses in the race improves the odds of success. It also creates a number of<br />

advantages and disadvantages. Some of the advantages of having four product<br />

lines include:<br />

• An option is provided for each type of server buyer.<br />

• Customers become loyal to specific server types.<br />

108 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

• One-stop shopping appeals to many buyers.<br />

• Deciding to buy from <strong>IBM</strong> does not lock buyers into one type of server.<br />

Problems associated with four lines include:<br />

• The effort to keep <strong>IBM</strong>′s sales force and Business Partners up to date.<br />

• The confusion among potential buyers.<br />

• The added cost of developing and marketing four products.<br />

<strong>IBM</strong> is working hard to reduce redundant costs. For example, all <strong>IBM</strong><br />

microprocessor chips are now manufactured in the same factory. The savings<br />

from sharing this manufacturing capacity have increased with the shift of the<br />

S/390 to the same underlying CMOS technology that other <strong>IBM</strong> systems use.<br />

Starting in 1997 the AS/400 and RS/6000 will go even further by sharing the same<br />

microprocessor design, a RISC chip with the code name Apache. <strong>IBM</strong> will<br />

further cut costs by assembling both systems in their Rochester, Minnesota<br />

factory. Customers benefit from <strong>IBM</strong>′s product diversity in a number of ways.<br />

For example, a hotel chain might be halfway through the rollout of hundreds of<br />

new UNIX-based front-desk systems when it is acquired by a larger chain that is<br />

standardized on NT. In situations like this, <strong>IBM</strong> can be much more flexible than<br />

a vendor that only provides one type of server.<br />

It is rare for any organization to buy everything from one vendor. A large<br />

organization might be using Windows 3.1 PCs, NetWare file and print servers,<br />

AS/400s as local application servers, traditional mainframes for headquarter′s<br />

applications, and UNIX systems for data warehousing and decision support. This<br />

same company might be building a Web site using Lotus Domino running on NT<br />

servers accessed by Netscape browsers. It is even possible that the Engineering<br />

department still uses DEC VAX design systems and Marketing has some<br />

Macintoshes.<br />

The cost and difficulty of supporting the complex array of software products<br />

listed above is very high. The trend is therefore to reduce the complexity by<br />

setting standards and phasing products out. In situations like this, <strong>IBM</strong> can help<br />

by reducing the number of vendors involved. Its consulting organization can<br />

also help create and implement plans to make complex environments easier to<br />

manage.<br />

In addition to its own line of servers, <strong>IBM</strong> offers technical advice and<br />

maintenance support for most types of hardware and software, including<br />

products made by competitors. This gives those with many types of computers<br />

the option of dealing with fewer vendors. It also allows <strong>IBM</strong> to take a broader<br />

view of the market than others. One benefit of this is the emergence of hybrid<br />

products such as the Integrated PC Server feature offered on AS/400 computers.<br />

3.1.2 Servers in the Age of the Internet<br />

It is too early to tell how the Internet revolution will play out, but one thing<br />

seems certain - growth will surpass anything seen before. In the past year<br />

alone, a great deal has occurred. The number of commercial Web sites<br />

increased from under 25,000 to over 200,000, the base of users grew to over 40<br />

million, and the effort to build Web-style applications was lowered by an order of<br />

magnitude.<br />

Chapter 3. Server Hardware Platforms 109


3.1.3 The Open <strong>IBM</strong><br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Millions of organizations of all sizes will build and expand intranets and public<br />

Web sites in the next few years. This will create a tidal wave of demand for<br />

computing capacity. Much of this demand will be for very large servers for a<br />

combination of reasons:<br />

• The better sites will attract a great deal of traffic as they mature.<br />

• The number of users will grow rapidly as will their amount of usage.<br />

• Agent technology will increase the traffic each user generates. Multimedia<br />

will increase the size and complexity of transactions.<br />

• Software written in object languages such as C++ and Java will require<br />

much more compute capacity.<br />

• Internet Service Providers (ISPs) will achieve economies of scale by using<br />

very large servers.<br />

• An increasing percentage of small sites will be hosted by ISPs. The ability to<br />

create Web applications rapidly will stimulate growth.<br />

The trend toward larger servers is good news for <strong>IBM</strong>. No other vendor can<br />

match <strong>IBM</strong>′s experience in solving the unique problems that high-volume<br />

applications create. The S/390, RS/6000, and AS/400 will each benefit in a<br />

different way from the growth in demand for large servers.<br />

As workloads and complexity increase, S/390 systems become more attractive.<br />

Certain high-volume applications that Internet technology will make possible will<br />

only be practical when hosted on S/390 computers. The RS/6000 SP series is<br />

also well positioned as the most expandable UNIX alternative. SP systems<br />

incorporate some of the same advanced parallel processing technology <strong>IBM</strong><br />

developed for the S/390.<br />

AS/400 systems will not match the top-end capacity of S/390 or SP systems. Over<br />

time they will offer unique advantages as servers for Java-based applications.<br />

This is because the architecture of the AS/400 is a perfect match for the Java<br />

concept of a high-level, standard-programming interface. The large memory<br />

addressing capability built into AS/400 computers also gives them an advantage<br />

in serving applications written in object-oriented languages such as Java and<br />

C++.<br />

During the 1980s when the openness movement was gaining momentum, <strong>IBM</strong><br />

initially fought the idea. In that era when <strong>IBM</strong> came up with innovative<br />

technology such as the Micro Channel, it tried to use the technology to lock<br />

buyers into its product line. <strong>IBM</strong>′s mainframes were once the best illustration of<br />

closed and proprietary systems.<br />

<strong>IBM</strong>′s attitude toward openness has changed. The most dramatic example is the<br />

incorporation of UNIX-based openness standards into the latest S/390 operating<br />

system. As a result, popular UNIX application packages such as SAP R3 are<br />

now being offered on S/390 systems.<br />

The UNIX community can take credit for developing the concept of openness.<br />

Unfortunately, vendors in the UNIX market have done a less-than-perfect job of<br />

following it. As a result, each UNIX environment is somewhat unique. After<br />

coming late to the openness party, <strong>IBM</strong> has actually become a leader in the<br />

effort to re-unify UNIX.<br />

110 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

<strong>IBM</strong>′s AS/400 series has also made great progress in supporting openness.<br />

Major changes in the AS/400′s design, including the introduction of a completely<br />

new programming model, have been made to accommodate open standards.<br />

There is more work to be done, but a number of high-profile UNIX developers<br />

have already brought their applications to the AS/400.<br />

The old <strong>IBM</strong> strategy was to add unique features to its products to lock<br />

customers in. The new approach involves introducing new technology by<br />

licensing it to competitors, publishing specifications, and working to get the<br />

approval of standards bodies.<br />

The new <strong>IBM</strong> openness attitude makes its servers more attractive. Buyers now<br />

have less concern about becoming locked into one specific technology. Software<br />

developers are also more comfortable offering their products on <strong>IBM</strong> servers<br />

since they can now follow accepted standards to a degree never before possible.<br />

A growing number of the most popular applications are now available on all of<br />

the widely used server environments: S/390, AS/400, NT, and the leading Unix<br />

platforms. For example, customers can buy applications from SAP, PeopleSoft,<br />

Lawson, SSA, or J.D. Edwards on an AS/400 knowing they can later move them<br />

to a UNIX or a large systems environment if their needs change.<br />

Much of the attention of openness advocates is now centered on Java. The new<br />

approach to application development and deployment that Java has pioneered<br />

has the potential to become a universal programming environment for all types<br />

of computers. It extends rather than replaces the many standards that have<br />

evolved out of the UNIX community.<br />

Java has become the rallying point for those who wish to limit Microsoft′s<br />

control over software development. <strong>IBM</strong> has not only become a leader within the<br />

openness movement, it is working its way toward the front of the Java parade.<br />

Each of <strong>IBM</strong>′s server platforms will fully support the standard known as the Java<br />

Virtual Machine. <strong>IBM</strong> is working on highly optimized Java compilers for each<br />

server. Java is also the foundation for an ambitious <strong>IBM</strong> project called San<br />

Francisco, an effort to create a set of Java program objects that software<br />

developers can use as a foundation for creating advanced applications. San<br />

Francisco-based applications will be able to run on any computers that support<br />

the Java Virtual Machine.<br />

3.1.4 Summary of <strong>IBM</strong>′s Server Strategy<br />

<strong>IBM</strong> has concluded that no single type of server can satisfy the diverse needs of<br />

computer buyers. Each of <strong>IBM</strong>′s four server families offers a unique value<br />

proposition and appeals to an important group of customers. Collectively, they<br />

cover the needs of a high percentage of server users. Selling the broadest<br />

server product line puts <strong>IBM</strong> in an excellent position. While each server family<br />

is unique, they all strive to offer a common set of values:<br />

• Competitive pricing<br />

• Low cost of ownership.<br />

• High quality and reliability.<br />

• Leadership in taking advantage of network technology.<br />

• Upward scalability.<br />

• Superior advice and support before and after the sale.<br />

• Investment protection over time.<br />

Chapter 3. Server Hardware Platforms 111


3.1.5 Prospects for the Future<br />

• Help when serious emergencies arise.<br />

• Global sales and support coverage.<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

<strong>IBM</strong> doesn′t always offer the hottest microprocessor, the lowest price, or the<br />

longest list of esoteric features. Industry-shaking innovations more often come<br />

from smaller companies such as Netscape, Sun Microsystems, or even Apple.<br />

<strong>IBM</strong> is less likely than others to throw an immature product out and let the<br />

market debug it. The <strong>IBM</strong> style is more often to wait for a new concept to prove<br />

itself in the market before jumping in with an improved second-generation<br />

version. <strong>IBM</strong> uses the combination of all the factors discussed above to<br />

differentiate itself from its competitors. Buying products or services from <strong>IBM</strong> is<br />

intended to be more than a one-time experience. Ideally it is one transaction<br />

within a long-term relationship. <strong>IBM</strong> cannot always live up to its ideals, but it<br />

does tend to set a higher standard for itself than other firms in the industry.<br />

<strong>IBM</strong>′s server business is in a position to contribute high profits and modest<br />

annual revenue growth for a number of years. The reasons why prospects are<br />

good include:<br />

• A five-year effort to transform the S/390 into a more cost-effective,<br />

standards-compliant, and less complex alternative is nearing completion.<br />

The payoff could be large, especially when buyers fully grasp what has been<br />

accomplished.<br />

• The AS/400 line is also now reaping the benefits of a multi-year transition to<br />

the Advanced Series.<br />

• The RS/6000 SP series is one of the hottest selling large-scale servers in the<br />

UNIX marketplace. It offers unmatched growth potential for both commercial<br />

and technical computing.<br />

• <strong>IBM</strong>′s PC servers are competing aggressively for a share of this rapidly<br />

growing market. The ambiguity <strong>IBM</strong> once had about NT is gone. Compaq will<br />

not be unseated as the market leader any time soon, but <strong>IBM</strong> does not have<br />

to do so to be successful. Growth rates for all types of servers are likely to<br />

increase. Network computing is the most important driving force, and it<br />

appears to favor the larger servers that <strong>IBM</strong> is skilled at creating.<br />

• <strong>IBM</strong>′s Software Group is strongly focused on middleware and systems<br />

management. In a world where most organizations use a very complex<br />

combination of PCs, workstations, servers, operating systems, and networks,<br />

the products that work best with everything else have an advantage.<br />

The opportunity for <strong>IBM</strong>′s server business is large, but so are the challenges it<br />

faces. Some of the things <strong>IBM</strong> must do better if it is to reach its potential include:<br />

• Communicating its value propositions more effectively.<br />

• Overcoming any impressions that products are outdated, expensive, and<br />

proprietary.<br />

• Bringing products to market faster.<br />

• Turning excellent research work into useful products before competitors do.<br />

• Helping Java become the preferred development environment for hot new<br />

applications.<br />

112 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

3.2 <strong>IBM</strong> PC Server<br />

More about each of <strong>IBM</strong>′s four server families is provided in the following<br />

sections.<br />

<strong>IBM</strong> has a history of letting competitors establish a new market before jumping<br />

in with a second-generation product. In the 1950s, Univac proved that there was<br />

a market for business computers before <strong>IBM</strong> came roaring in. Apple blazed a<br />

trail in personal computing that <strong>IBM</strong> turned into a highway, and DEC showed the<br />

way with its minicomputers before the <strong>IBM</strong> AS/400 took over.<br />

A similar pattern may be occurring with PC servers. Although <strong>IBM</strong> played a<br />

pivotal role in the evolution of the PC, it was not the first to see the potential of<br />

PC servers. Even when it was clear that a major market opportunity existed, it<br />

took <strong>IBM</strong> time to become serious.<br />

Novell pioneered the idea of controlling LANs with a network operating system<br />

running on a local server. The early servers were simply large PCs. At first, they<br />

did little more than help PC users share disk space and access to printers. As<br />

time passed, the capabilities of PC servers grew rapidly.<br />

Compaq was the first PC vendor to see the need for specialized servers. As a<br />

result, they have established themselves as the market leader. Knocking them<br />

off their perch will not be easy for <strong>IBM</strong> or anyone else. In the market for<br />

Intel-based computers, however, fortunes can shift rapidly. Part of the reason is<br />

that new microprocessor generations arrive frequently.<br />

The Intel PentiumPro represents the sixth generation of processors since the<br />

introduction of the PC. A seventh generation is likely to arrive in 1998. Each<br />

generation provides opportunities and risks. This rapid improvement has also<br />

become the driving force in the entire computer market since it has created a<br />

cost curve that all types of servers must now follow.<br />

Symmetrical multiprocessing has significantly increased the top-end capacity of<br />

Intel servers. Microsoft is working on a technique for clustering Intel processors<br />

called Wolfpack planned for introduction at the end of 1997. Over time, clustering<br />

will greatly increase the range of PC server systems. <strong>IBM</strong> tried to build PC<br />

servers based on its own PowerPC processors but backed off when it became<br />

clear that Intel-based processors had won the battle for this market segment. It<br />

therefore wasn′t until 1995 that <strong>IBM</strong> began a serious effort to become a leader in<br />

Intel-based PC servers. <strong>IBM</strong> also needed to admit that OS/2 was not going to<br />

overtake Windows. Doing so made it possible to concentrate heavily on the fast<br />

growing opportunity for NT servers.<br />

The success of NT is a major driving force in the PC server market. At the<br />

moment, a high percentage of NT installations are either replacements for<br />

NetWare servers or are for new opportunities such as data warehousing. As<br />

such they represent a potential lost opportunity for other <strong>IBM</strong> servers more than<br />

a direct threat to their franchises. <strong>IBM</strong> has come to understand that it cannot<br />

miss out on the growth opportunity that NT servers represent.<br />

At the moment, NT is not in the same class as AIX, OS/400, or OS/390 as a<br />

full-function operating system. On the other hand, NT is already much more than<br />

a simple PC OS. Microsoft does not yet claim that NT is ready to replace the<br />

more mature server operating systems. For the moment, there is plenty of room<br />

Chapter 3. Server Hardware Platforms 113


This soft copy for use by <strong>IBM</strong> employees only.<br />

for NT to grow as an operating system for the advanced desktop user, file and<br />

print serving, application development, and modest-sized distributed<br />

applications.<br />

While Microsoft is content with the near-term success of NT, in the long term<br />

their ambition for it is unlimited. As time passes, the gap between NT and more<br />

mature server operating systems may narrow.<br />

3.2.1 The New PC Server Strategy<br />

At first it looked like 1996 would be a banner year for <strong>IBM</strong> PC servers. The<br />

upgraded product line won a number of industry awards such as the PC World<br />

1996 PC Server Product of the Year. Many hard-to-please industry analysts and<br />

large customers also were quite impressed. Unfortunately, manufacturing<br />

problems limited the number of units <strong>IBM</strong> was able to ship. With limited product<br />

to sell, it made little sense to call attention to the upgraded product line. As a<br />

result, many potential buyers are not aware of the progress <strong>IBM</strong> has made as an<br />

Intel PC server vendor.<br />

In spite of all the past problems, <strong>IBM</strong> is still second only to Compaq in PC server<br />

sales with Hewlett-Packard close behind. It is a minor consolation to <strong>IBM</strong> that<br />

they have remained a major competitor without yet putting their best foot<br />

forward.<br />

The production problems seem now to be solved, and the new management<br />

team running <strong>IBM</strong>′s PC Server Division enters 1997 with reason to be optimistic.<br />

A clear strategy for taking on Compaq has been developed based on the<br />

following elements:<br />

• Follow accepted standards. Intel processors will be used and there will be no<br />

more efforts like the Micro Channel to establish exclusive ownership of new<br />

technology.<br />

• Provide unqualified support for NT. This includes building a strong<br />

relationship with Microsoft′s NT developers.<br />

• Leverage <strong>IBM</strong> knowledge of large-scale processing. <strong>IBM</strong>′s leading-edge<br />

clustering technology will be brought to Intel servers.<br />

• Major in systems management. Using <strong>IBM</strong> products such as NetFinity and<br />

TME 10 make <strong>IBM</strong> PC servers the easiest to use on the market.<br />

• Compete aggressively in price and features.<br />

• Offer the traditional <strong>IBM</strong> values of high quality, excellent support,<br />

international sales coverage, and investment protection.<br />

• Target specific market segments including Notes serving.<br />

• Work with <strong>IBM</strong>′s new Network Computer Division to create an attractively<br />

packaged offering of PC servers and NCs.<br />

• Take advantage of <strong>IBM</strong>′s strong relationships with larger enterprises.<br />

Become a better partner for resellers.<br />

Good margins will be hard to achieve in a market where <strong>IBM</strong> controls neither<br />

the processor nor the operating system. Compaq, Hewlett-Packard, and the<br />

other competitors face the same problem. However, <strong>IBM</strong> has shown with<br />

products such as the ThinkPad and RS/6000 SP series that it can take a<br />

leadership role in a highly competitive market. The challenge in PC servers is<br />

great but not insurmountable.<br />

114 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

The PC server market is very competitive, but it is also growing very rapidly.<br />

Many industry experts have forecast continuing growth of over 20%. If growth at<br />

these rates does not materialize, <strong>IBM</strong>′s other server lines will almost certainly<br />

benefit. Assuming that the market for PC servers will grow rapidly, there is no<br />

reason why <strong>IBM</strong> as well as its competitors cannot be very successful.<br />

3.2.2 <strong>IBM</strong> PC Server Family Overview<br />

PC servers are a good choice for a wide range of Internet applications, creating<br />

a scalar and low-cost solution. You can initialize using a PC server with basic<br />

features and, depending on the model that you choose, improve the processor<br />

power, memory, storage and communication capability. There are a lot of<br />

operating systems available to the Intel platform that can perform an Internet<br />

server solution. They are as follows:<br />

• <strong>IBM</strong> OS/2 Warp Connect<br />

• <strong>IBM</strong> OS/2 Warp Server<br />

• Microsoft Windows 3.1<br />

• Microsoft Windows95<br />

• Microsoft WindowsNT Family<br />

• SCO UNIX<br />

• Linux<br />

• Solaris<br />

• Novell NetWare<br />

• Novell UNIXWare<br />

<strong>IBM</strong> PC Server offers a robust product line to meet a wide range of network,<br />

application and database serving needs, across all sizes of organizations:<br />

• PC Server 310 and PC Server 315<br />

These entry-level products are targeted for file and print serving, as well as<br />

entry-level application serving, ideally suited for small and growing<br />

enterprises, and workgroup and distributed network environments. Powered<br />

by the latest Intel Pentium processor (PC Server 310) and Intel Pentium Pro<br />

processor (PC Server 315), these uniprocessor platforms have all of the key<br />

server features you expect, at the most aggressive price points (Ultra SCSI,<br />

ECC Memory, etc.).<br />

• PC Server 325 and PC Server 330<br />

These mid-range products are targeted for application and database serving,<br />

as well as large file and print serving applications. By offering more power<br />

and scalability than the entry offerings, they meet the needs of growing<br />

organizations, Internet providers and enterprise rollouts. Key server<br />

features include rack drawer capability (PC Server 325), scalable I/O<br />

subsystem with five PCI slots, RAID and hot-swap disk capabilities, and dual<br />

processing Pentium Pro processor complexes. Additionally, the PC Server<br />

325 and 330 are upgradable to Intel′s recently introduced Pentium II<br />

processor technology.<br />

• PC Server 704<br />

For the ultimate in power and scalability, while enhancing the manageability<br />

and control expected in intensive application and database serving<br />

Chapter 3. Server Hardware Platforms 115


This soft copy for use by <strong>IBM</strong> employees only.<br />

environments, the PC Server 704 is the obvious choice. Powered by<br />

four-way symmetrical multiprocessing with Intel′s fastest Pentium Pro<br />

processors, the scalability of the PC Server 704 is matched by disk scalability<br />

of 100+ GB of RAID/hot-swap storage and memory scalability to 2 GB. For<br />

the ultimate in local and remote manageability, the PC Server 704 can be<br />

enhanced with the Advanced Systems Management Adapter.<br />

In conjunction with these servers, <strong>IBM</strong> PC Server is dedicated to offering flexible<br />

and scalable storage solutions to meet a wide range of needs.<br />

To drive scalable, powerful and manageable storage solutions, you first need a<br />

robust offering of disk controllers. <strong>IBM</strong> offers the state-of-the-art <strong>IBM</strong> PC<br />

ServeRAID adapter for the UltraSCSI environment. Driven by a powerful RISC<br />

processor, the ServeRAID adapter has the power to drive three channels of up to<br />

15 devices. Other features include the ability to manage the ServeRAID adapter<br />

remotely, allowing you to add new disk drives and create new arrays from<br />

remote locations.<br />

For more scalable disk storage needs, <strong>IBM</strong> offers the <strong>IBM</strong> SSA PCI RAID<br />

Adapter. Serial Storage Architecture (SSA) allows for up to 96 devices on one<br />

string (or channel), and multiple adapters are supported in most PC Server<br />

products.<br />

In the SCSI and UltraSCSI environments, external storage capacity can be<br />

enhanced with either tower or rack-mounted drawer expansion units:<br />

• 3517 SCSI Multi-Storage Enclosure — Offering seven drive bays for up to 22.5<br />

GB of storage.<br />

• 3518 PC Server Enterprise Expansion Enclosure — Offering 18 hot-swap drive<br />

bays for up to 40 GB of storage.<br />

• 3519 PC Server Rack Storage Expansion Enclosure — Offering six hot-swap<br />

drive bays for up to 27 GB of storage as well as three additional media bays<br />

for tape or CD-ROM solutions.<br />

When your storage needs require enhanced scalability and high-availability, <strong>IBM</strong><br />

PC Server offers connection to Serial Storage Architecture devices. The<br />

following SSA solutions can be added to the PC Server products:<br />

• 3527 SSA Entry Storage Subsystem — Offering five bays for SSA devices for<br />

up to 22.5 GB of storage.<br />

• 7133 SSA Rack-Mounted Disk Subsystem — Offering 16 hot-swap disk drive<br />

bays (over 140 GB).<br />

To allow efficient site management, PC Server offers multiple rack solutions to<br />

meet your needs. If you have existing PC Server system units, you can combine<br />

these into the PC Server 9306 Rack Enclosures very quickly and efficiently.<br />

System units attach to base plates on sliding shelves, thus providing<br />

consolidated floor space, while maintaining full serviceability of the server units,<br />

as well as allowing you to deploy the servers in the future with minimal change.<br />

For industry-standard (EIA 19″) solutions, such as the PC Server 325 Rack<br />

Drawer, PC Server 3519 Server Rack Storage Expansion or the SSA 7133 Rack<br />

Storage solutions, <strong>IBM</strong> supports these products in industry-standard 19″ racks,<br />

such as the APC NetShelter rack enclosure.<br />

116 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

3.3 <strong>IBM</strong> RS/6000<br />

Note: The servers described here may not be available in all countries.<br />

Similarly, other servers may still be available in the country where you live.<br />

The server family has a number of features common to all of its members:<br />

• Pentium and Pentium Pro microprocessors — Each of the servers is based<br />

on Pentium and Pentium Pro technology from a single Pentium 200 MHz<br />

processor in the entry-level machines to four-way Pentium Pro 200 MHz<br />

processor-based systems at the high end.<br />

• SCSI performance — Each server has an UltraSCSI storage subsystem. RAID<br />

controllers are standard on some models for added performance and<br />

security. Serial Storage Architecture (SSA) is available as an option.<br />

• Lotus Domino Server 4.5 — The premier groupware product is supplied with<br />

all <strong>IBM</strong> PC Servers.<br />

• NetFinity — This is a comprehensive systems management tool that allows<br />

LAN administrators to monitor and manage servers and workstations. It<br />

provides an easy-to-use graphical set of local and remote services designed<br />

to make the PC Server and client systems simple and affordable to manage.<br />

It has a flexible, modular design that allows for a variety of system-specific<br />

configurations.<br />

• ServerGuide — This is a set of CD-ROM disks that contain the most popular<br />

operating systems and management tools such as NetFinity. It provides a<br />

simple interface to install and configure the operating system and tools. It is<br />

provided free of charge with each new <strong>IBM</strong> PC Server.<br />

• SVGA video — All models in the family offer super video graphics array<br />

(SVGA) subsystems for displaying high resolutions and colors. This is a<br />

benefit especially where systems and network management are performed<br />

from the server itself.<br />

• CD-ROM drive — Each server is configured with a CD-ROM drive to make it<br />

easier to install software.<br />

• Enhanced keyboard and mouse — Supplied standard with each server.<br />

Further information such as available models, supported devices and technical<br />

details about the <strong>IBM</strong> PC Server family can be found in the <strong>IBM</strong> Personal<br />

Computing home page at:<br />

http://www.pc.ibm.com.<br />

Although <strong>IBM</strong> did not join the UNIX movement until almost 20 years after it<br />

started, they have made up for lost time and have become an important force in<br />

its evolution. During the formative period when UNIX focused largely on technical<br />

computing, interest was very low at <strong>IBM</strong>. In the late 1980s, as the open systems<br />

concept gained acceptance among commercial computer buyers, it became<br />

essential for <strong>IBM</strong> to be involved.<br />

Ironically, the technology breakthrough that made UNIX so successful was the<br />

RISC microprocessor, something invented by <strong>IBM</strong> researchers. At first, however,<br />

<strong>IBM</strong> took little advantage of RISC, letting Sun Microsystems, Silicon Graphics,<br />

Hewlett-Packard, and others take the early lead. It was not until 1990 that <strong>IBM</strong><br />

became a serious contender in the UNIX market.<br />

Chapter 3. Server Hardware Platforms 117


This soft copy for use by <strong>IBM</strong> employees only.<br />

The RS/6000 series entered the UNIX market with a hot new RISC processor. It<br />

quickly forced the established vendors to improve their price/performance.<br />

While the RS/6000 hardware was highly competitive, it was the introduction of<br />

<strong>IBM</strong>′s AIX operating system that caused the greater stir.<br />

Before AIX, UNIX operating systems were optimized for sophisticated users who<br />

wanted maximum flexibility and minute technical control. Mundane functions<br />

such as security, backup, and recovery were after-thoughts, making UNIX<br />

inadequate at the time for many commercial applications.<br />

AIX changed the UNIX market forever by setting new standards for reliability,<br />

recovery, security, operations interfaces, and system management. Traditional<br />

UNIX vendors were forced to scramble to catch up. While the gap has been<br />

narrowed considerably, AIX remains a leader in these areas, especially in<br />

systems management.<br />

During the 1990s, <strong>IBM</strong> has solidified its position as a leader in adapting Unix to<br />

the needs of the business community. UNIX computers remain the leading<br />

choice for technical and academic computing, and RS/6000 systems are making<br />

important inroads in these markets as well. <strong>IBM</strong> recently won a hotly contested<br />

contract to create the largest UNIX-based scientific supercomputer yet built for<br />

the U.S. Department of Energy. This system will handle the nuclear weapon<br />

simulations made necessary by the nuclear test ban.<br />

For a period of time, UNIX and openness were the same thing. Over the past few<br />

years that has changed primarily because other types of computers began<br />

offering the best of the UNIX standards including the C and C++ languages,<br />

Ethernet, TCP/IP, and the X/Open programming interfaces.<br />

The RS/6000 Part of the early appeal of RS/6000 computers was that they offered<br />

the fastest RISC processors available. <strong>IBM</strong> remains competitive but can no<br />

longer claim processor/performance leadership. That honor shifts regularly as<br />

vendors leap-frog each other every few months. The modest market share<br />

obtained by DEC′s Alpha systems demonstrates that technical excellence alone<br />

does not guarantee success.<br />

Since performance leadership is something no vendor can sustain for long, <strong>IBM</strong><br />

has learned to rely on other factors to maintain sales momentum. The RS/6000<br />

value proposition rests on:<br />

• The reliability and capability of AIX<br />

• More room for upward growth than competitors<br />

• Excellent systems management<br />

• Competitive cost of ownership<br />

• Exceptional capability serving large Web sites<br />

• Excellent sales and support around the world<br />

• A large library of advanced applications and tools<br />

The greatest competitive advantage of the RS/6000 at the moment comes from<br />

the highly parallel SP models. Early development of these models was done by<br />

<strong>IBM</strong>′s S/390 Division which has the best understanding of large-scale parallel<br />

computing in the world. <strong>IBM</strong> is good at some things and not so good at others. It<br />

is at their very best in building computers for large, complex, critical tasks. The<br />

SP shows off all these skills.<br />

118 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

The SP is especially good as a server for large Web sites. Advantages include:<br />

• The SP series leads the UNIX market in parallel processing. An SP<br />

configuration can include as many as 512 microprocessors working together.<br />

• AIX was built to handle large-scale commercial processing. It excels at<br />

backup and recovery, systems management, and reliability.<br />

• The RS/6000 design is better than most UNIX systems at managing I/O and<br />

memory. Web site transactions are very I/O and memory intensive, making<br />

them a perfect fit.<br />

• RS/6000s were the first to offer the Web Object Management (WOM)<br />

technology <strong>IBM</strong> developed for its Deep Blue and Olympics Web sites. <strong>IBM</strong><br />

has more practical experience setting up and managing large-scale Web<br />

sites than anyone else.<br />

• Many of the largest Web sites use SP servers including the Netscape site<br />

that currently handles as many as 100 million hits per day.<br />

The market for large-scale UNIX Web servers is <strong>IBM</strong>′s to lose. Sun, NCR, and<br />

Cray are working hard to catch up but will have to overcome <strong>IBM</strong>′s edge in<br />

experience. Eventually, Compaq is sure to offer an NT/Intel-based system for<br />

very large Web sites as well. <strong>IBM</strong>′s unique expertise lies in squeezing the most<br />

out of parallel processors, balancing workloads, handling recovery, insuring that<br />

the system doesn′t fail, and providing system operators with the information they<br />

need.<br />

RS/6000 systems are also popular servers for Lotus Domino, <strong>IBM</strong>′s leading<br />

Internet software product. The SP models are well suited for serving large<br />

numbers of Lotus Notes users. <strong>IBM</strong> itself has become the world′s largest Notes<br />

user and has chosen to use SP hardware for its internal Notes applications.<br />

The current dynamics of the UNIX market seem favorable for <strong>IBM</strong> for the<br />

following reasons:<br />

• The strongest challenge to UNIX from NT is coming in the low-end system<br />

and technical workstation segment. This is hurting other UNIX vendors more<br />

than <strong>IBM</strong>.<br />

• The fastest growing segment of the market is large scale, the area where<br />

<strong>IBM</strong> is strongest.<br />

• The increasing complexity of computer environments is putting a premium<br />

on systems management, the RS/6000′s greatest advantage.<br />

• Hardware price and performance are beginning to take a back seat to<br />

reliability, support, upgrade potential, investment protection, and other<br />

intangible factors that <strong>IBM</strong> is known for.<br />

The UNIX market will remain fiercely competitive, and NT will put added<br />

pressure on UNIX providers. In spite of this, <strong>IBM</strong> has every reason to be<br />

optimistic about the RS/6000. It will continue to play an important role in a<br />

growing market.<br />

Chapter 3. Server Hardware Platforms 119


3.3.1 RS/6000 As a Platform for ISPs<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

The first wave of Internet services were characterized by ad hoc designs, lack of<br />

security, static publishing, basic access, and limited scalability. As would be<br />

expected, the second wave of Internet services requires solutions that support<br />

security, commerce, and transaction-oriented activities; as well as multi-services<br />

integration that is reliable, scalable, and highly-available. The RS/6000′s<br />

strengths which include reliability, scalability, availability, robust portfolio,<br />

end-to-end security, and superlative service and support, make it a flagship<br />

network computing platform fully enabled to support the second wave of<br />

requirements.<br />

• Reliability<br />

RS/6000 delivers reliability via:<br />

− Superior storage<br />

− Management function<br />

− Non-intrusive and low-level performance tools<br />

− Journaled file system (JFS)<br />

− Intuitive systems management (SMIT)<br />

− A wide range of connectivity applications and devices<br />

− Superior I/O storage subsystems<br />

• Scalability<br />

RS/6000 delivers scalability through its:<br />

− Binary compatibility across the product line from work group server to<br />

large scale server.<br />

− In the Internet space, customers don′t know how fast their server needs<br />

will grow and the RS/6000′s scalability enables seamless stability of an<br />

application set as their requirements increase.<br />

− SMP scalable performance enables applications to achieve measurable<br />

performance improvements when processors are added in an SMP<br />

configuration.<br />

− Dynamic capacity expansion enables customers to achieve linear<br />

performance bandwidth gains by adding nodes (on-the-fly) to an SP.<br />

− As resources and nodes are added to an SP, systems administration is<br />

handled from a central control workstation making the SP a superior<br />

platform for LAN and Server consolidation efforts.<br />

• Availability<br />

The industry leading HACMP product set and the recently introduced<br />

Phoenix APIs for applications to exploit high availability and restart as real<br />

advantages today. Inherent RS/6000 features such as the service processors<br />

combined with the Call Home services create another availability advantage<br />

to exploit, particularly with the introduction of the F50 as a price/performance<br />

leader.<br />

• Robust Portfolio<br />

RS/6000 delivers a hardware platform and operating system software<br />

optimized for Symmetric Multiprocessing (SMP), Massively Parallel<br />

Processing (MPP), and TP monitor-type multithreading and load balancing.<br />

Built on this foundation is the most robust collection of integrated network<br />

120 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

computing solutions (POWERsolutions) offered by any system vendor. This<br />

single point of contact for the major components exploits the strengths of<br />

<strong>IBM</strong>′s services and support combined with vendor applications in demand by<br />

our customers.<br />

• Security<br />

A key element to satisfying the second wave requirement is end-to-end<br />

security. Security begins in the hardware and can be accelerated with<br />

cryptography hardware adapters. The AIX Operating System is designed for<br />

C2 level security, and provides an excellent base for a separately available B<br />

level security offering. Secure Sockets Layer (SSL) support in AIX as a client<br />

and server provides security at a connection level. The first implementation<br />

of Secure Electronic Transactions (SET) is introduced in <strong>IBM</strong>′s<br />

Net.Commerce v2 products.<br />

To embellish services for RS/6000′s customers, the <strong>IBM</strong> SecureWay family of<br />

security offerings is a broad portfolio of security hardware, software,<br />

consulting and services to help users secure their information technology.<br />

The offerings apply to server-based and distributed systems and to the<br />

integration of security across enterprises that have extended their reach to<br />

the Internet.<br />

• Support<br />

One of the strongest distinguishers for <strong>IBM</strong> and the RS/6000 is the services<br />

(IGS) and Datapro award-winning support capabilities that round out each of<br />

the solutions. An example of service and support integration was the<br />

significant undertaking of supporting the Atlanta Summer Olympics on<br />

RS/6000 servers. Single point of contact for support of network computing<br />

applications allows customers and business partners to exploit the highly<br />

acclaimed <strong>IBM</strong> support structure for non-<strong>IBM</strong> products.<br />

RS/6000 and AIX provide the level of robustness, scalability and availability that<br />

ISP solutions require.<br />

RS/6000 servers are powerful, cost-effective systems with excellent growth and<br />

availability options to meet the needs of network-based applications such as the<br />

Internet server, Notes server and database server.<br />

<strong>IBM</strong>′s Internet RS/6000 solutions contain the hardware and software that you<br />

need to establish your presence on the Internet. These solutions are designed<br />

to operate in a multivendor, networking environment.<br />

The <strong>IBM</strong> Telecom and Media Industry Solution Unit (ISU) has also implemented a<br />

comprehensive family of solutions designed to meet the reliability and scalability<br />

requirements of Internet Service Providers - the <strong>IBM</strong> Solutions for ISPs family.<br />

The <strong>IBM</strong> Solutions for ISPs consist of packaged hardware, software, and services<br />

offerings designed to allow ISPs the opportunity to quickly get to market with a<br />

variety of new revenue generating services.<br />

The first release of the <strong>IBM</strong> Solutions for ISPs family consists of the following:<br />

• Content Management<br />

− <strong>IBM</strong> Solutions for ISPs Lotus Go Webserver<br />

− <strong>IBM</strong> Solutions for ISPs Web Hosting Server<br />

• Communications and Messaging<br />

Chapter 3. Server Hardware Platforms 121


− <strong>IBM</strong> Solutions for ISPs Scalable Mail Server<br />

• Collaboration<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

− <strong>IBM</strong> Solutions for ISPs Lotus Domino Server (with business partners)<br />

• Security<br />

− <strong>IBM</strong> Solutions for ISPs Firewall Server<br />

• Commerce<br />

− <strong>IBM</strong> Solutions for ISPs Net.Commerce Server<br />

• Infrastructure<br />

− <strong>IBM</strong> Solutions for ISPs Network Dispatcher Server<br />

In addition to the <strong>IBM</strong> Solutions for ISPs solutions listed above, additional<br />

companion products are available from <strong>IBM</strong> that can apply to ISP customers:<br />

• Content Management<br />

− <strong>IBM</strong> Videocharger Server<br />

− Telecom & Media ISU Electronic Yellow Pages<br />

− Telecom & Media ISU Electronic White Pages<br />

− Netscape Enterprise Server<br />

• Messaging and Communications<br />

− Netscape News Server<br />

− Netscape Mail Server<br />

• Commerce<br />

− Netscape Merchant Server<br />

• Security<br />

− Checkpoint FireWall-1<br />

− WebStalker Pro<br />

− Netscape Proxy Server<br />

• Infrastructure<br />

− Tivoli TME Product Family<br />

See Appendix B, “<strong>IBM</strong> Solutions for ISPs” on page 317 for detailed information<br />

about the packages and offerings.<br />

For information such as available models, supported devices and technical<br />

details about the <strong>IBM</strong> RS/6000 family go to the <strong>IBM</strong> RS/6000 home page on the<br />

Internet at:<br />

http://www.austin.ibm.com.<br />

122 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

3.4 AS/400<br />

3.4.1 Advanced Series<br />

The metamorphosis of the S/390 into the microframe was not the only important<br />

transformation going on over the past few years within <strong>IBM</strong>. The AS/400 series<br />

also spent more than three years going through a major transition. The much<br />

improved system is now called the AS/400 Advanced Series. Because the<br />

change took place in stages and the name remained the same, the mistaken<br />

perception outside the AS/400 community is that not much happened.<br />

AS/400 computers have always been difficult to describe and to categorize. They<br />

have attracted a very loyal following and enjoy the highest customer satisfaction<br />

of any server on the market. To those not familiar with the AS/400, it is often<br />

something of a mystery. Part of the problem is that AS/400 advocates use a<br />

special jargon to describe their favorite computer. Phrases such as single-level<br />

addressability, technology-independent machine interface, and object persistence<br />

often fill the air when discussing the AS/400. The success of the AS/400 has<br />

come partially because of the unusual design under the covers. Its unique value<br />

proposition, however, is the real reason behind its popularity. AS/400 systems<br />

are attractive because of:<br />

• OS/400 is the most fully integrated operating system in the world.<br />

• The availability of a broad portfolio of high quality application packages.<br />

• Ease of installation, operation, programming, and use.<br />

• Low total cost of ownership.<br />

• Hardware and software reliability.<br />

• The ease and low cost of use for distributed processing.<br />

• Advanced capability without the need for an army of technicians.<br />

• Support for important industry standards.<br />

In spite of all these advantages, sales of AS/400 computers began to flatten in<br />

the early 1990s for a number of reasons:<br />

• Most AS/400 applications used a character-oriented interface at a time when<br />

PC-oriented graphical client/server applications were becoming popular.<br />

• Interest in UNIX-based openness standards was peaking.<br />

• AS/400 hardware costs were high in relation to UNIX systems.<br />

• Capacity range was less than other alternatives.<br />

The Advanced Series was developed to address these problems.<br />

After their introduction in 1988, AS/400 systems quickly became a major source<br />

of revenue and profit for <strong>IBM</strong>. Over $4 billion per year is spent on the basic<br />

processors and operating systems alone. Billions more are spent on related<br />

devices, software, and services. In order to protect this valuable franchise, <strong>IBM</strong><br />

was willing to spend a great deal creating a second generation of AS/400<br />

systems.<br />

The Advanced Series offers improvements in every important aspect of the<br />

AS/400:<br />

Chapter 3. Server Hardware Platforms 123


This soft copy for use by <strong>IBM</strong> employees only.<br />

• New 64-bit RISC processors based on the PowerPC design have lowered<br />

cost, improved performance, and increased top-end capacity.<br />

• No software conversion was needed to take full advantage of 64-bit<br />

processors.<br />

• Improved adherence to openness standards made it easier to use AS/400s<br />

alongside other types of systems and to develop portable applications.<br />

• A much wider range of models has lowered the entry cost and greatly<br />

increased top-end capacity.<br />

• A graphical interface is now available for OS/400 as well as improved PC<br />

interface software.<br />

• A number of the most popular client/server applications are now available<br />

from leading developers such as SAP, PeopleSoft, Platinum, and J.D.<br />

Edwards.<br />

• The Integrated PC Server eliminates the need for separate servers dedicated<br />

to running network operating systems and to handling functions such as PC<br />

file and print serving.<br />

The Advanced Series became available in stages over three years (1994-1996).<br />

This gradual arrival blunted some of the impact, especially since the new name<br />

was introduced in 1994 when relatively little changed except the shape and color<br />

of the hardware. While all the new technology is now in place, it will take time<br />

for applications to become available that take advantage of the new capabilities.<br />

One of the most important benefits of the switch to PowerPC RISC processors<br />

will come in mid-1997 when new models become available based on the second<br />

generation of RISC processors code named Apache. These processors will also<br />

be used in RS/6000 systems which will provide development and manufacturing<br />

economies to <strong>IBM</strong>.<br />

AS/400 hardware has always been more expensive than comparable UNIX-based<br />

systems. Other factors have given the AS/400 an overall advantage in cost of<br />

ownership. By the end of 1997 there will be little price difference for AS/400<br />

hardware, and the other benefits will remain. For the rest of the 1990s, AS/400<br />

systems are likely to remain a leader in cost of ownership.<br />

One of the most important behind-the-scenes changes in the Advanced Series<br />

was the redesign of the lower levels of OS/400 using object technology. It was<br />

also one of the reasons the transition took as long as it did. The payback for this<br />

investment will come over many years starting in 1997. The most important<br />

benefit will be that <strong>IBM</strong> will be able to introduce future improvements in less<br />

time.<br />

The object technology orientation of the AS/400 will also make it more attractive<br />

as a server as the number of applications written using object techniques<br />

increases. Most observers of the computer industry agree that this is inevitable<br />

given the huge increases in programming productivity that object technology can<br />

provide.<br />

Object-oriented applications can be developed quickly, but they tend to perform<br />

poorly. The AS/400 Advanced Series will help overcome this problem with a<br />

facility called object persistence. In simple terms this means that AS/400s have<br />

a large enough address space to allow them to assign every object a unique<br />

permanent address. Less computing power is therefore needed when AS/400<br />

124 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

3.4.2 Future Direction<br />

servers handle the transfer of control from one object to another because the<br />

permanent virtual address can quickly be used to locate any object even if it is<br />

on another computer in a network.<br />

Advanced Series AS/400s have also been adapted to interface directly with the<br />

Internet. They can be used as Web site servers or can control intranets. A<br />

facility called HTML Gateway automatically makes any existing AS/400<br />

applications accessible through a Web browser. AS/400 systems offer an added<br />

advantage when attached to the Internet because of the way security is built into<br />

OS/400s. Most of the strategies hackers use to create viruses will not work with<br />

AS/400 systems.<br />

<strong>IBM</strong> continues to invest heavily in improving the AS/400 family. Near-term<br />

enhancements will center around increasing top-end capacity through the<br />

Apache processors and through greater use of symmetrical multiprocessing (up<br />

to 12-way in 1997). During 1998 NT will become available on the Integrated PC<br />

Server. In the same timeframe, Lotus Domino will be fully integrated within<br />

OS/400 as will a high-performance version of the Java Virtual Machine. While all<br />

of <strong>IBM</strong> is in love with Java, the AS/400 Division is where the flame burns<br />

brightest. The reasons why the AS/400 and Java are such a good match include:<br />

• The Java Virtual Machine is a high-level programming interface that takes a<br />

standard language and allows it to run on any hardware. This is exactly what<br />

the AS/400′s Technology Independent Machine Interface (TIMI) does. <strong>IBM</strong><br />

only needs to enhance TIMI to make the AS/400 into an excellent Java<br />

server.<br />

• Java creates object-oriented applications that the AS/400 can serve<br />

especially well because of the object persistence capability discussed above.<br />

• Openness advocates see Java as the best hope for a universal programming<br />

language. If Java becomes the most popular language for application<br />

developers, the AS/400′s image as an open system will be greatly enhanced.<br />

This will also insure that the best new applications are immediately available<br />

on AS/400s.<br />

The Java language provides the technical foundation for a project <strong>IBM</strong> calls San<br />

Francisco. Its goal is to help application developers take advantage of object<br />

technology. This will make it possible for developers to create leading-edge<br />

applications at a fraction of the current cost. <strong>IBM</strong> will sell pre-built application<br />

building blocks called frameworks. Developers will take these Java frameworks<br />

and build unique applications on top of them.<br />

Java runs on most popular computers. Applications built with the San Francisco<br />

frameworks will therefore be able to run on many computers. In spite of this, the<br />

AS/400 Division expects to be the major beneficiary of San Francisco because it<br />

expects to offer the best Java servers. Within <strong>IBM</strong>, San Francisco is being<br />

developed in the same laboratory as the AS/400 because of their unique<br />

understanding of object technology and Java.<br />

This same laboratory in Rochester, Minnesota is also where <strong>IBM</strong> does the<br />

development for its new network computer (NC). <strong>IBM</strong> believes that NCs will<br />

evolve into a cost-effective alternative to PCs, especially if Java succeeds. A<br />

special division, headed by Bob Dies, former General Manager of the AS/400<br />

Division, has been formed just to develop network computers. As a result, it is<br />

Chapter 3. Server Hardware Platforms 125


3.4.3 Where AS/400 Systems Fit<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

reasonable to expect a great deal of future synergy between the AS/400 and<br />

NCs. Lotus Notes represents another opportunity for synergy with other <strong>IBM</strong><br />

products. The Notes/Domino server now runs on the AS/400′s Integrated PC<br />

Server. During 1998 <strong>IBM</strong> plans to fully integrate Notes into OS/400. D.H.<br />

Andrews group′s new report ″Lotus Notes and Domino″ provides a high-level<br />

explanation of these very unique products.<br />

AS/400 systems compete in the same general price and capacity range as many<br />

UNIX computers. The value proposition AS/400 and UNIX computers offer is very<br />

different. The largest parts of the UNIX market technical workstations and<br />

servers for compute-intensive applications are segments where AS/400 systems<br />

have little to offer. Where the two do overlap is in commercial application<br />

serving.<br />

The primary disadvantage of UNIX in commercial computing is its complexity.<br />

Buyers who require an environment that is easy to install and use will tend to<br />

prefer the AS/400. Those who want the ability to select and integrate many<br />

different middleware products to create the exact environment needed will be<br />

attracted to UNIX.<br />

AS/400 also overlaps with the lower end of the S/390 product line. As a result,<br />

many organizations have moved applications from S/390 systems to the AS/400<br />

in the past. The heart of the S/390 market is not threatened by the AS/400 since<br />

organizations with very large-scale problems tend to value the unique benefits<br />

that only S/390 can provide.<br />

The most important factor in deciding which to use is the projected workload and<br />

its expected growth. Applications that are accessed by tens of thousands of<br />

workstations, store multiple terabytes of data, and process thousands of<br />

transactions per second are obvious candidates for the S/390. The greater the<br />

need for a completely fail-safe operation, the more likely S/390 is the answer.<br />

When the workload is primarily batch processing or is a good candidate for a<br />

highly centralized approach, then S/390 systems also tend to be more attractive.<br />

The most obvious reason to use an AS/400 is the availability of an application<br />

well suited to the buyer′s need. When an application workload can comfortably<br />

fit on an AS/400, it is an option worth considering because of the much greater<br />

simplicity. AS/400s also make sense when there is a need to distribute<br />

computing power to a number of remote locations.<br />

In the longer term, the greatest potential threat to the AS/400 franchise is Intel<br />

servers running NT. At the moment, AS/400 systems offer a great deal of<br />

capability not yet available with NT, especially in terms of system management.<br />

There are also currently not nearly as many NT applications on the market. On<br />

the other hand, NT is changing and improving at a very rapid rate.<br />

A growing number of AS/400 sites are using NT as the network operating system<br />

for their PC networks. The threat to <strong>IBM</strong> is not that NT will instantly take over but<br />

that a slowly increasing percentage of computing tasks will go on servers<br />

running NT. To counter this threat <strong>IBM</strong> will offer NT on their Integrated PC<br />

Servers within AS/400s.<br />

<strong>IBM</strong> is counting on Java to slow the momentum of NT. Java will not stop NT<br />

from overtaking NetWare as the leading network operating system. The real<br />

126 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

3.5 <strong>IBM</strong> System/390<br />

question is what will become the preferred programming environment for<br />

software developers. If Java is a winner, then the AS/400 will benefit<br />

substantially.<br />

3.4.3.1 <strong>IBM</strong> AS/400 within Internet Environment<br />

The AS/400 platform is an excellent choice to create an Internet server because<br />

Internet Connection for AS/400 supports HTTP drivers that can serve any native<br />

AS/400 application without a rewrite or recompile over the Internet. Even<br />

traditional, host-based applications can be served to terminals running popular<br />

Web browsers. Internet users are also able to download files or software, as<br />

well as access the AS/400 database, from Web browsers.<br />

Using the HTTP protocol, customers can enhance existing AS/400 applications<br />

with hypertext capabilities or attention-getting graphics, audio and video. With<br />

Internet Connection, users can also monitor the attention people are paying to<br />

their presences on the Web.<br />

AS/400 supports the TCP/IP Serial Link Internet Protocol (SLIP), which provides<br />

native TCP/IP connectivity to the Internet over telephone lines.<br />

AS/400 also supports the popular Internet Post Office Protocol (POP3), enabling<br />

AS/400 to deliver electronic correspondence to OS/2, UNIX, Windows and<br />

Macintosh clients running the most popular mail products.<br />

With support for Lotus Notes Release 4, AS/400 users can use a solution that<br />

integrates messaging, groupware and the World Wide Web for building and<br />

distributing custom client/server, Internet and intranet applications.<br />

Notes open architecture leverages and maximizes existing AS/400 investments<br />

by providing a client/server application development environment, bidirectional<br />

field-level replication, client/server messaging and integration with relational<br />

databases. Lotus Notes also provides Internet integration, allowing users to<br />

publish, locate and share Internet information through functions included in<br />

Notes Release 4. Lotus Notes will reside under OS/2 on a dedicated AS/400<br />

Integrated PC Server (FSIOP). The Integrated PC Server can manage up to eight<br />

networks, consisting, for example, of Notes, OS/2 or Novell NetWare.<br />

AS/400 has an integrated operating system that provides unrivaled security on<br />

the Internet. AS/400 security features protect against hackers and viruses.<br />

If you need information such as available models, supported devices and<br />

technical details about AS/400 Family go to the <strong>IBM</strong> AS/400 home page at:<br />

http://www.as400.ibm.com<br />

For a long period of time it was fashionable to dismiss S/390 systems as relics of<br />

a bygone era. The mainframe age appeared to have passed, and it seemed to be<br />

only a matter of time before a combination of Intel and RISC-based servers<br />

replaced them all. Had <strong>IBM</strong> left the System/390 alone, it surely would have faded<br />

away as predicted.<br />

Since the S/360 series was introduced in 1965, mainframes have been a key<br />

source of profitability for <strong>IBM</strong>. Every few years something new has come along to<br />

Chapter 3. Server Hardware Platforms 127


This soft copy for use by <strong>IBM</strong> employees only.<br />

threaten this franchise. The most recent attack came the closest to succeeding<br />

because by the early 1990s mainframes had become non-competitive in four<br />

important ways:<br />

• Costs were much higher than alternatives.<br />

• S/390s were too complex.<br />

• Available applications were old and tired.<br />

• Industry-standard interfaces and development tools were unavailable.<br />

<strong>IBM</strong> began to overhaul the S/390 line in 1993. By mid-1997 the transformation will<br />

be largely complete. Since the changes have taken over five years, their<br />

significance has been easy to miss. It hasn′t helped that <strong>IBM</strong> stuck to its old<br />

habit of using esoteric jargon to describe what it was doing.<br />

The key elements of the mainframe makeover were:<br />

• Reducing cost by changing chip technology.<br />

• Adopting industry standards.<br />

• Bundling middleware products and lowering software costs.<br />

• Attracting a new wave of leading applications.<br />

As the dust begins to settle, it is clear that the new S/390 is different enough so<br />

that <strong>IBM</strong> would have been justified in changing its name. At the very least, the<br />

change should be sufficient to bury the meaningless name mainframe.<br />

The new S/390 systems are physically small, no longer require water cooling,<br />

and can run many more applications. They achieve almost unlimited growth<br />

potential through the parallel connection of large numbers of microprocessors.<br />

A more accurate nickname for them (and the alternatives that will soon come<br />

from Hitachi and Amdahl) would be microframe. The rest of this report will use<br />

microframe as the generic name for the new type of computer that S/390s have<br />

become.<br />

3.5.1 Mainframes Morph into Microframes<br />

The first challenge <strong>IBM</strong> faced in 1993 was to phase out the high-speed, but<br />

expensive bipolar processors that powered all of the larger S/390s. The plan<br />

was to switch to the same type of chips other computers were using<br />

Complementary Metal Oxide Semiconductor (CMOS) in order to get on the same<br />

volume driven cost curve as Intel processors.<br />

The new S/390 microframes use a CMOS chip with a unique instruction set but<br />

are able to benefit from all the other economies of scale. Each year since 1993<br />

<strong>IBM</strong> has increased the speed of its CMOS processors. In mid-1997 a processor<br />

called the G4 will rival the speed of <strong>IBM</strong>′s bipolar processors. <strong>IBM</strong> is therefore<br />

now ramping down its bipolar production lines.<br />

Having decided to use CMOS processors, <strong>IBM</strong> needed a way to grow top-end<br />

capacity faster than processor chip speeds. The practical limitations of<br />

symmetrical multiprocessing were being reached; so another approach was<br />

needed. The result was a highly parallel architecture called Parallel Sysplex<br />

that clustered large numbers of CMOS processors together into integrated<br />

systems.<br />

128 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

3.5.2 OS/390<br />

It is not difficult to physically connect large numbers of processors together.<br />

Allowing them to operate as one system and to divide up a complex workload is<br />

another matter. The necessary system software changes represented a huge<br />

challenge that took longer than planned. Parallel capability needed to be added<br />

to MVS as well as middleware products such as CICS, IMS, VSAM, and DB2.<br />

Third-party middleware products from companies such as Oracle, Informix,<br />

Sybase, and Computer Associates also needed to be upgraded.<br />

The system software for Parallel Sysplex has arrived in stages over the past<br />

three years. 1997 will be the first year when Parallel Sysplex computers are able<br />

to run almost any application that large-scale customers are likely to have. As<br />

Parallel Sysplex matures, it could become the standard approach for large-scale<br />

transaction processing.<br />

The investment in Parallel Sysplex should begin to pay off in 1997 as the demand<br />

for large-scale systems explodes. Other alternatives will find it hard to match the<br />

top-end growth and price/performance of Parallel Sysplex.<br />

<strong>IBM</strong> has also helped make S/390 more competitive by lowering the cost of<br />

software on CMOS and Parallel Sysplex systems and by creating OS/390 an<br />

integrated package of the most popular S/390 middleware products and the<br />

latest version of MVS.<br />

In addition to solving the S/390′s cost problem, <strong>IBM</strong> has worked hard to make it<br />

much more open. Important openness enhancements include:<br />

• Support for connection interfaces such as Ethernet, FDDI, and ATM.<br />

• Offering TCP/IP as an alternative to SNA for network management.<br />

• Adopting UNIX-standard programming interfaces.<br />

• Allowing the attachment of industry-standard devices.<br />

The combination of competitive costs and open interfaces has made it possible<br />

to begin to attract quality application packages. S/390 microframes are now in a<br />

better position to compete for computing workloads because:<br />

• They excel at providing continuous computing for high-traffic applications.<br />

• Parallel Sysplex offers almost unlimited growth potential.<br />

• High-bandwidth remote communication makes greater centralization<br />

feasible.<br />

• Very large database servers are needed for client/server applications such<br />

as SAP.<br />

• DB2 excels in high-volume situations.<br />

• <strong>IBM</strong> is working with its largest customers on industry solutions, many on<br />

S/390.<br />

• The incremental cost of adding S/390 capacity is usually low.<br />

All this will result in rapid growth in demand for S/390 capacity even though the<br />

total number of S/390 installations in the world will increase slowly.<br />

Because economies of scale strongly encourage consolidation, the initial<br />

investment to set up a full-function S/390 environment is very large. The<br />

Chapter 3. Server Hardware Platforms 129


This soft copy for use by <strong>IBM</strong> employees only.<br />

hardware cost is only a starting point. A number of highly specialized technical<br />

people are needed to surround any large S/390 system. In some places the<br />

talent needed is not available at any cost. Small S/390 systems are available, but<br />

they are best used as satellites for larger complexes. Those not using OS/390<br />

and a full suite of middleware do not gain the benefit of the full S/390<br />

experience.<br />

Once the investment has been made to establish a S/390 environment, the<br />

marginal cost to add capacity is very small. When a certain size is reached,<br />

there is a limited need to add expensive technical support people. For this<br />

reason CMOS and Parallel Sysplex make it easy for current S/390 users to keep<br />

upgrading. It also makes it attractive to add additional S/390 capacity when a<br />

new requirement comes along, such as building a data warehouse.<br />

An important source of new S/390 installations will be emerging economies<br />

including Asia, Eastern Europe, and Latin America. Rapid economic growth often<br />

triggers the need for large-scale processing especially within the government<br />

sector. It makes little sense, for example, to use anything other than a<br />

microframe for processing tax returns.<br />

The economies of scale make S/390 an excellent platform for outsourcing. Over<br />

time, fiber-optic technology will make channel-speed communications affordable<br />

over long distances. This will greatly increase the appeal of using S/390 capacity<br />

provided from large central data centers, outsourcing providers, or computer<br />

utility firms.<br />

The trend toward distribution of computing resources has largely been driven by<br />

high communication costs, limited line speeds, and poor response times. As<br />

these factors diminish, there is certain to be a return to greater centralization.<br />

3.5.3 <strong>IBM</strong> System/390 within Internet Environment<br />

With S/390, you can meet the needs of thousands of Internet and intranet users.<br />

As a server designed for large-volume transactions, it can easily handle just<br />

about anything in global networking.<br />

S/390 lets you link existing applications to the World Wide Web with minimal<br />

modifications and without moving data to other Web-serving platforms. The <strong>IBM</strong><br />

Internet Connection Server for MVS/ESA has a direct connection to CICS, IMS,<br />

DB2 and MQSeries. The S/390 allows you to start small on your Internet and<br />

intranet offerings, then scale up as needed to handle thousands of transactions.<br />

The S/390 can rely on cryptography functions to protect your data. You can<br />

establish a wide range of security measures and procedures, such as access<br />

control policies, passwords, and special user privileges.<br />

Built into the current Internet Connection Server for MVS/ESA, through the<br />

System Access Facility, is access to such MVS system resource managers as<br />

RACF or the OS/390 security server. You can use this technology to control<br />

access to files and other system resources.<br />

Instead of adding servers to meet changing performance demands, you can<br />

allocate S/390 server capacity to the public network partition.<br />

S/390 gives you all the security and performance that you need to create a<br />

powerful Internet server.<br />

130 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

3.6 Summary<br />

Figure 48. Platforms and Services<br />

If you need more information such as available models, supported devices and<br />

technical details about S/390 go to the <strong>IBM</strong> S/390 home page on the Internet at:<br />

http://www.s390.ibm.com<br />

Figure 48 shows the <strong>IBM</strong> platforms and their indicated use in the Internet<br />

environment:<br />

Today you can use all these platforms to deliver information on the Internet. The<br />

choice will be made based on your performance needs and investment limits.<br />

Chapter 3. Server Hardware Platforms 131


132 The Technical Side of Being an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.


This soft copy for use by <strong>IBM</strong> employees only.<br />

Chapter 4. Internet Services<br />

4.1 Domain Name Service<br />

There are several services you should consider supporting for your user base.<br />

This chapter outlines several of the key services commonly supported by ISPs.<br />

It is important to note that you won′t be expected to run a server for every single<br />

service discussed here. You should treat this list as food for thought. You may<br />

also find that some, or all of these services may be provided either free<br />

(included in the cost of your link), or at an additional cost from your upstream<br />

provider.<br />

Throughout this chapter, server refers to the program running on one of your<br />

machines providing the service being discussed. You will be able to run more<br />

than one server on each machine in most cases.<br />

The Domain Name Service (DNS) has become the glue that binds the Internet<br />

together. It provides a mechanism for converting easy-to-remember names such<br />

as www.ibm.com, into the less easy to remember IP addresses that are used in<br />

the underlying protocols. It is also used for other services, for example, using a<br />

special record in the DNS. You can make use of your upstream provider′s mail<br />

backup servers (if they provide that service). DNS issues are discussed in the<br />

comp.protocols.tcp-ip.domains news group.<br />

4.1.1 Berkeley Internet Name Daemon<br />

4.2 Mail Service<br />

Before you can register any domains (see 2.2.4.6, “How to Obtain a Domain<br />

Name” on page 48), you need to have the domains configured on a name<br />

server. If you choose to run your own name server, the most commonly used<br />

server is Berkeley Internet Name Daemon (BIND, which is now maintained by<br />

the Internet Software Consortium (ISC). Other DNS implementations have been<br />

made available, but the majority of name servers in the field are either running<br />

BIND, or a product that is based on BIND. BIND is released in source code<br />

format for free by the ISC, and a lot of effort has been made to support as many<br />

operating systems as possible.<br />

If you are running UNIX as your server platform, the chances are that the<br />

provided DNS daemon is an (albeit out of date) implementation of BIND.<br />

The support Web page for BIND can be found at http://www.isc.org/bind.html and<br />

it includes lots of links to other DNS-related sites. BIND has its own support<br />

newsgroup: comp.protocols.dns.bind.<br />

It used to be the case that if you provided an e-mail address for your users, then<br />

you were classed as an ISP. Although this perception has changed, e-mail is<br />

still a critical service to provide. Your users will expect at least one e-mail<br />

address from you, most ISPs now provide around three e-mail addresses per<br />

account.<br />

© Copyright <strong>IBM</strong> Corp. 1997 133


4.2.1 POP Server<br />

4.2.2 SMTP Server<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

You will need two mail servers, one to your users to collect their ow mail (POP<br />

server), and one to receive the incoming mail and place it on the POP server<br />

and allow your users to send mail (SMTP server or relay).<br />

Because your dial up users won′t be connected to the Internet 24 hours a day,<br />

they won′t always be connected when somebody sends them mail, so you will<br />

have to hold their mail for them, until they pick it up.<br />

The most common method of mail retrieval by clients is via the POP3 (Post<br />

Office Protocol Version 3). The user′s e-mail software connects to the POP<br />

server, logs on with a user ID and password, downloads any waiting mail,<br />

deletes the mail from your server and disconnects.<br />

Most UNIX operating systems come with a POP server supplied, but there are<br />

several alternatives available on the Internet.<br />

4.2.1.1 Internet Mail Application Protocol<br />

Internet Mail Application Protocol, currently at Version 4 (IMAP4), is less<br />

common than POP3, but is gaining popularity all the time. The most significant<br />

difference between POP and IMAP, is that IMAP clients leave the mail on the<br />

server, rather than downloading the messages and removing them from the<br />

server as POP clients do. IMAP provides folders on the server to provide a<br />

remote mailbox which can be manipulated in the same way as local mailboxes.<br />

The way that e-mail is sent from source to destination has changed very slightly<br />

since it was first used. It used to be the case that the source machine connected<br />

directly to the target machine, transferred the note and disconnected. If the<br />

target machine was down, then the source machine would try again later, and<br />

keep trying until either the mail was delivered, or some time-out limit was<br />

reached. However, some machines wanted to receive e-mail, but weren′t<br />

directly connected to the Internet. This was accomplished by placing mail relays<br />

on the Internet that knew how to contact these non-Internet connected machines.<br />

These principles still hold, but the mail relays now have an extra role to perform,<br />

as some, or all of your customers won′t be connected to the Internet 24 hours a<br />

day, so if the destination is down, their machines may not be able to retry. The<br />

solution to this, is for you to provide a mail relay for them. In this case, the<br />

user′s e-mail software sends the mail to your mail relay, which then attempts to<br />

send it on to the destination on behalf of the user.<br />

Every single UNIX implementation comes with a mail server. The most popular<br />

one is Sendmail which is supported by its author, Eric Allman<br />

(http://www.sendmail.org/). Sendmail is not without some very subtle bugs<br />

though. It is highly recommended that if you choose Sendmail, you keep<br />

updated with any fixes or new releases.<br />

4.2.3 <strong>IBM</strong> Messaging Solutions for ISPs<br />

The <strong>IBM</strong> Messaging Solutions for ISPs is described in B.8, “<strong>IBM</strong> Messaging<br />

Solution for ISPs” on page 323. This is a scalable solution which means that<br />

you can start small and build up as your user base increases. Its based on a set<br />

of modular application servers which include SMTP, POP3 and IMAP4 servers. It<br />

also includes an Lightweight Directory Access Protocol (LDAP) compliant<br />

134 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

4.3 Web Service<br />

4.4 FTP Service<br />

4.5 Chat Service<br />

4.5.1 Internet Relay Chat<br />

4.6 News Service<br />

directory, which allows clients such as Netscape Navigator to issue directory<br />

enquiries.<br />

In today′s Internet, you are nobody without a Web site. Your users will also<br />

expect some space on your Web server to put up some pages of their own. This<br />

could be accomplished by either asking your users to e-mail you their Web<br />

pages and graphics for you to upload onto the Web server, or by giving each<br />

user FTP access to their own area on the Web server.<br />

There are literally hundreds of Web servers available on the Internet to<br />

download, including one from Lotus: Go Webserver available from<br />

http://www.ics.raleigh.ibm.com/dominogowebserver/. Go Webserver is<br />

described in B.9, “Lotus GO Server” on page 330.<br />

FTP or File Transfer Protocol is a simple protocol that is supported by all Internet<br />

server and client platforms. An FTP server can be used to distribute updates to<br />

client programs to your users, and your users may want to share data with other<br />

people via FTP.<br />

This section describes the real-time chat services available.<br />

IRC or Internet Relay Chat was created in Finland in 1988. It allows users from<br />

all over the world to get together online and chat in real time.<br />

It is unlikely that you will need to run an IRC server yourself, as there are lots of<br />

IRC networks already in existance. An IRC network is a group of IRC servers<br />

connected together so that a user on one server can participate in a discussion<br />

with a user on another server, possibly on the other side of our planet.<br />

The Internet Relay Chat Help Web site at http://www.irchelp.org/ provides lots of<br />

help with IRC, and also lists all of the major IRC networks.<br />

You may also wish to put the <strong>IBM</strong> IRC Client for Java on your Web site. This will<br />

allow your users to connect to an IRC network and start chatting without having<br />

to download any software, other than a Java applet. The <strong>IBM</strong> IRC Client for Java<br />

is available from AlphaWorks: http://www.alphaWorks.ibm.com/.<br />

USENET is made up of several thousand newsgroups. A newsgroup can be<br />

thought of as a bulletin board. Users can read that newsgroup, and if they have<br />

something to contribute, then they post to it. (A user′s post is referred to as an<br />

article.)<br />

Each news server maintains its own copy of the newsgroup and sends a copy of<br />

each new article to all of its neighbors that it thinks are interested in it. Thus<br />

Chapter 4. Internet Services 135


This soft copy for use by <strong>IBM</strong> employees only.<br />

news propogates as a flood. Two articles may take completely different paths to<br />

get from one point to another because some sites may have backlogs, or may<br />

only transfer news at a certain time, etc.<br />

Newsgroups are collected into hierarchies of similar interest, either<br />

geographically or topically. Hierarchies are then usually split into<br />

subhierarchies and so on, right down to news groups. For example, the<br />

newsgroup discussing the software that drives the USENET is:<br />

news.software.nntp.<br />

news - Discussion about USENET<br />

software - Discussion about USENET software<br />

nntp - Discussion about the USENET software that implements NNTP<br />

(Network News Transport Protocol).<br />

There are nearly 500 official hierarchies, with at least two more on the way. The<br />

Master List of Hierarchies is maintained by Lewis S. Eisen (leisen@pfx.on.ca),<br />

and is available on the Web at:<br />

http://home.magmacom.com/leisen/master_list.html and is posted to USENET<br />

every second Monday in the groups news.answers, news.admin.hierarchies and<br />

news.groups.<br />

The big-8 news hierarchies are:<br />

comp. USENET computer newsgroups<br />

humanities. USENET discussions about Humanities<br />

misc. USENET miscellaneous newsgroups<br />

news. USENET news<br />

rec. USENET recreational newsgroups<br />

sci. USENET science newsgroups<br />

soc. USENET social issues newsgroups<br />

talk. USENET talk newsgroups<br />

Humanities hasn′t really taken off, so the big-7 are often discussed where the<br />

big-8 would be expected.<br />

The big-8 have very explicit rules regarding creating new groups. A discussion<br />

must be had and a vote taken before the control message is sent out. When this<br />

process was being created, a group of people decided that they didn′t like the<br />

formality, and so created the alt. hierarchy, where anybody in the world can<br />

create new groups.<br />

Alt. is often described as being an abbreviation for alternative that is, an<br />

alternative to the big-8. Eric Ziegast (ziegast@uunet.uu.net) stated: ″ALT stands<br />

for ′Anarchists, Lunatics and Terrorists″, as quoted by David Barr in his ″So You<br />

Want to Create an Alt Newsgroup″ FAQ<br />

(http://www.cis.ohio-state.edu/barr/alt-creation-guide.html).<br />

The necessary configuration files are also posted to the USENET every month by<br />

Simon Lyall (simon@darkmere.gen.nz) in the news.lists.misc and<br />

news.admin.hierarchies newsgroups with the subject ″USENET Hierarchies:<br />

Config Files FAQ″.<br />

136 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

4.6.1 USENET<br />

USENET is rapidly approaching crisis state. A handful of companies are viewing<br />

USENET as free marketing.<br />

This has had several adverse side-effects:<br />

• In many newsgroups, it is now almost impossible to hold a discussion on the<br />

original topic of the newsgroup, because of the volume of spam. Such<br />

newsgroups are described as having a signal-to-noise ration approaching<br />

zero. Signal-to-noise is a term stolen from radio enthusiasts describing the<br />

quality of the transmission. A high signal-to-noise ratio means that there is<br />

little background noise or static.<br />

• A small group of people have taken it upon themselves to try and clear up<br />

some of the spam by sending out cancel messages. These cancellers have<br />

programs that monitor the USENET and when a post′s Breidbart Index (BI)<br />

hits a certain threshold it is cancelled. For a detailed description of the<br />

Breidbart Index, see http://www.math.uiuc.edu/tskirvin/faqs/spam.html.<br />

• The volume of the SPAM and the cancels are severely impacting the<br />

performance of the news servers. For a full feed, the approximate figures for<br />

August 1997 are 600,000 articles and 10 GB. Of those 600,000 approximately<br />

10% will be cancel messages.<br />

Another problem with USENET is that alt groups are created, but never die.<br />

The USENET community have several initiatives in plan to try and fix the<br />

situation.<br />

1. USENET2 or 2senet<br />

2. The other USENET2<br />

3. The mod hierarchy<br />

Each of these approaches the situation differently, and with differing goals.<br />

4.6.1.1 USENET2 or 2senet<br />

This initiative is being undertaken by a group of system administrators fed up<br />

with the current anarchy that is USENET. This currently takes the form of a<br />

single hierarchy, although it is expected to grow with time.<br />

2senet lays down some very explicit rules about what is and what is not<br />

permitted in an article. The rules revolve around the term soundness. Sound<br />

articles are defined in the rules, as are sound sites. Unsound articles are either<br />

dropped or cancelled by a net-monitor program that monitors 2senet. Unsound<br />

sites are cut off from the 2senet completely. See http://www.usenet2.org/ for<br />

more details about 2senet.<br />

4.6.1.2 The Other USENET2<br />

The other USENET2 (a unfortunate name space collision) was proposed by Joe<br />

Greco (joe@ns.sol.net). Rather than start from scratch with brand new<br />

newsgroups, Greco proposes that USENET2 is set up with the same list of<br />

newsgroups, and that articles from the old USENET are gatewayed in by a few<br />

gateway machines, after they have been delayed for a short amount of time to<br />

be processed by SPAM filters and for cancel messages to catch them up.<br />

Chapter 4. Internet Services 137


4.6.2 Netscape News Server<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

If a site is found to break any of the USENET2 rules, it is to be disconnected from<br />

USENET2 until a vote by USENET2 administrators affirms that they are willing to<br />

give the site a second chance. The USENET2 rules can be found at:<br />

http://www.nntp.sol.net/usenet2.txt.<br />

4.6.1.3 The mod. Hierarchy<br />

The mod. hierarchy is attempting to solve the problems of the alt. hierarchy.<br />

Mod. tries to keep as much of the character as alt. as possible. The main<br />

differences are:<br />

• Anyone can request that a newsgroup is created, rather than create it<br />

themselves. With very few exceptions, any requested newsgroup will be<br />

created.<br />

• Every newsgroup is moderated. What this means is that rather than posts<br />

going straight to the newsgroup, they are e-mailed to the moderator who will<br />

post them on behalf of the user. The moderator is under no pressure to<br />

approve all postings, in fact many people who follow USENET are hoping that<br />

the moderator won′t approve SPAM or off-topic posts, etc.<br />

• Newsgroups that appear to have died, that is have no traffic, will be<br />

removed.<br />

Discussion of mod. takes place in the news.admin.hierarchies newsgroup. The<br />

manifesto is published at http://www.uiuc.edu/ph/www/tskirvin/faqs/manif.html.<br />

The <strong>IBM</strong> Solutions for ISP′s recommended news server is Netscape News<br />

server, which has been renamed to Collabra in its latest release. Netscape<br />

News, or Collabra is based on INN mentioned above, and adds administrative<br />

tools, such as a Web-based admin tool, and on the NT version, a graphical front<br />

end. All of the above considerations apply to Netscape News, as they would for<br />

any other news server.<br />

138 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Chapter 5. Management<br />

5.1 Authentication<br />

Though the planning and setup of your ISP will initially require all your attention,<br />

once your ISP has been established you will be spending most of your time<br />

managing your ISP resources. The manner in which you manage these<br />

resources is a critical factor in the success of your ISP. Success means being<br />

able to provide customers with high levels of service and performance. This is<br />

essential to ensure your customers′ satisfaction. Proper management will allow<br />

you to react to network outages or increased customer demand. You will need<br />

to manage the users that have access to your system, the amount of time they<br />

spend on your system, the amount of time others spend looking at their<br />

offerings, as well as your own connection to the Internet. Tools available to help<br />

you with these tasks are discussed in the following sections.<br />

Anytime a modem is added to a network, the network becomes more vulnerable<br />

to security breaches. An ISP, of course, wants to guard against such break-ins.<br />

However, valid users must be permitted to access the services that you provide.<br />

The security system that an ISP puts in place must not be so cumbersome as to<br />

cause valid users difficulty in accessing the system. All popular authentication<br />

solutions keep track of users and their authorizations. When a user attempts to<br />

access your services a sequence of identification is performed.<br />

The typical identification sequence consists of obtaining a user name and<br />

password from the user and then verifying this through the authorization system.<br />

If the user name and password are correct, the user is granted access to<br />

specific resources on the network. If the conditions of the log-in process are not<br />

met, the user is denied access to the network.<br />

There are many authentication protocols in use today. Table 22 shows some of<br />

these. Of course it is important that an authentication system support as many<br />

different types of clients as possible. Ideally, there is a link between the<br />

authorization and the billing system, which is discussed next.<br />

Table 22 (Page 1 of 2). Authentication Protocols<br />

Protocol Sponsor Platform<br />

CHAP/PAP Microsoft<br />

www.internic.net/rfc/rfc1994.txt<br />

Kerberos MIT Athena project<br />

web.mit.edu<br />

Macintosh<br />

UNIX<br />

Windows 95<br />

DOS<br />

OS/2<br />

OS/390<br />

UNIX<br />

VM<br />

Windows<br />

Windows 95<br />

© Copyright <strong>IBM</strong> Corp. 1997 139


Table 22 (Page 2 of 2). Authentication Protocols<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Protocol Sponsor Platform<br />

RADIUS Livingston Enterprises<br />

www.livingston.com<br />

TACACS CISCO<br />

cio.cisco.com<br />

AIX<br />

BSD/OS<br />

HP/UX<br />

Linux<br />

OSF/1<br />

RADIUS NT<br />

SGI Irix<br />

Solaris<br />

SunOS<br />

Cisco IOS<br />

5.1.1 Challenge Handshake Authentication Protocol/Password Authentication<br />

Protocol (CHAP/PAP)<br />

The Point-to-Point Protocol (PPP) provides a standard method of encapsulating<br />

Network Layer protocol information over point-to-point links. PPP also defines<br />

an extensible Link Control Protocol, which allows negotiation of an<br />

Authentication Protocol for authenticating its peer before allowing Network Layer<br />

protocols to transmit over the link.<br />

After a PPP link has been established, PPP provides for an optional<br />

Authentication phase before proceeding to the Network Layer Protocol phase.<br />

By default, authentication is not mandatory. If authentication is desired, the<br />

Authentication Protocol Configuration Option must be specified during the link<br />

establishment phase.<br />

These authentication protocols are intended for use primarily by hosts and<br />

routers that connect to a PPP network server via switched circuits or dial-up<br />

lines, but might be applied to dedicated links as well. The server can use the<br />

identification of the connecting host or router in the selection of options for<br />

network layer negotiations. CHAP and PAP are two authentication protocols for<br />

PPP links.<br />

5.1.1.1 PAP<br />

The Password Authentication Protocol (PAP) provides a simple method for the<br />

peer to establish its identity using a 2-way handshake. This is done only upon<br />

initial link establishment.<br />

After the link establishment phase is complete, an ID/password pair is<br />

repeatedly sent by the peer to the authenticator until authentication is<br />

acknowledged or the connection is terminated.<br />

PAP is not a strong authentication method. Passwords are sent over the circuit<br />

“in the clear”, and there is no protection from playback or repeated trial and<br />

error attacks. The peer is in control of the frequency and timing of the attempts.<br />

Any implementations which include a stronger authentication method (such as<br />

CHAP, described below) must offer to negotiate that method prior to PAP. This<br />

140 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

authentication method is most appropriately used where a plain text password<br />

must be available to simulate a login at a remote host. In such use, this method<br />

provides a similar level of security to the usual user login at the remote host.<br />

Note: It is possible to limit the exposure of the plain text password to<br />

transmission over the PPP link, and avoid sending the plain text password over<br />

the entire network. When the remote host password is kept as a one-way<br />

transformed value, and the algorithm for the transform function is implemented<br />

in the local server, the plain text password should be locally transformed before<br />

comparison with the transformed password from the remote host.<br />

5.1.1.2 CHAP<br />

CHAP basically uses a random challenge, with a cryptographically hashed<br />

Response which depends upon the challenge and a secret key.<br />

CHAP is used to periodically verify the identity of the peer using a three-way<br />

handshake. This is always done upon initial link establishment and may be<br />

repeated anytime after the link has been established.<br />

A typical protocol sequence is as follows:<br />

1. After the link establishment phase is complete, the authenticator sends a<br />

challenge message to the peer.<br />

2. The peer responds with a value calculated using a one-way hash function.<br />

3. The authenticator checks the response against its own calculation of the<br />

expected hash value. If the values match, the authentication is<br />

acknowledged; otherwise the connection should be terminated.<br />

4. At random intervals, the authenticator sends a new challenge to the peer,<br />

and repeats steps 1 to 3.<br />

CHAP provides protection against a playback attack by another peer through the<br />

use of changing identifiers and variable challenge values. The authenticator is<br />

in control of the frequency and timing of challenges.<br />

This authentication method depends upon a secret known only to the<br />

authenticator and that peer. The secret is not sent over the link.<br />

Although the authentication is only one-way, by negotiating CHAP in both<br />

directions the same secret set may easily be used for mutual authentication.<br />

Since CHAP may be used to authenticate many different systems, name fields<br />

may be used as an index to locate the proper secret in a large table of secrets.<br />

This also makes it possible to support more than one name/secret pair per<br />

system, and to change the secret in use at any time during the session.<br />

CHAP requires that the secret be available in plaintext form. Irreversibly<br />

encrypted password databases commonly available cannot be used.<br />

It is not as useful for large installations, since every possible secret is<br />

maintained at both ends of the link.<br />

Note: To avoid sending the secret over other links in the network, it is<br />

recommended that the challenge and response values be examined at a central<br />

server, rather than each network access server. Otherwise, the secret should be<br />

sent to such servers in a reversibly encrypted form. Either case requires a<br />

trusted relationship, which is outside the scope of this specification.<br />

Chapter 5. Management 141


5.1.2 Kerberos<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

The Kerberos Authentication and Authorization System is an encryption-based<br />

security system that provides mutual authentication between the users and the<br />

servers in a network environment. Kerberos performs the following functions for<br />

a system:<br />

• Authentication to prevent fraudulent requests/responses between users and<br />

servers that must be confidential and on groups of at least one user and one<br />

service.<br />

• Authorization can be implemented independently from the authentication by<br />

each service that wants to provide its own authorization system. The<br />

authorization system can assume that the authentication of a user/client is<br />

reliable.<br />

• Permits the implementation of an accounting system that is integrated,<br />

secure and reliable, with modular attachment and support for charge backs<br />

or billing purposes.<br />

The Kerberos system is primarily used for authentication purposes, but it also<br />

provides the flexibility to add authorization information.<br />

In the Kerberos system, a client that wants to contact a server for its service,<br />

first has to ask for a ticket from a mutually trusted third party, the Kerberos<br />

Authentication Server (KAS). This ticket is obtained as a function where one of<br />

the components is a private key known only by the service and the Kerberos<br />

Authentication Server, so that the service can be confident that the information<br />

on the ticket originates from Kerberos.<br />

The Kerberos Authentication Model permits only the service to verify the identity<br />

of the requestor and gives no information on whether the requester can use the<br />

service or not. The Kerberos Authorization Model is based on the principal that<br />

each service knows the user so that each one can maintain its own authorization<br />

information. However, the Kerberos Authorization System could be extended<br />

and used for authorization purposes. Kerberos could then check if a user/client<br />

is allowed to use a particular service.<br />

5.1.3 Remote Authentication Dial-In User Service (RADIUS)<br />

Remote Authentication Dial-In User Service (RADIUS) is a good example of an<br />

open and easily integrated authentication protocol. The RADIUS server allows<br />

or denies access to the network. It allows all security information to be located<br />

in a single, central database, instead of scattered around the network on several<br />

different devices. It creates a single, centrally located database of users and<br />

services. It also performs extensive tracking and logging of user activities. This<br />

type of information is used for billing purposes as discussed in the next section.<br />

The next release of <strong>IBM</strong>′s Interactive Network Dispatcher will provide support for<br />

the RADIUS authentication server. See B.12.4, “Internet Service Provider<br />

Applications” on page 342 for more information.<br />

Another product that interfaces with RADIUS is InstantReg from Expansion<br />

Systems Corporation. It also has a billing component that provides seamless<br />

integration between user authorization and accounting, as discussed in 5.2,<br />

“Accounting” on page 146.<br />

142 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

5.1.4 Terminal Access Controller Access System (TACACS)<br />

Originally, TACACS allowed a router that accepted dial-up access to accept a<br />

user name and password and send a query to a TACACS authentication server,<br />

sometimes called a TACACS daemon or simply TACACSD. This server was<br />

normally a program running on a host. The host would determine whether to<br />

accept or deny the request and sent a response back. The router then allowed<br />

access or not, based upon the response.<br />

While routers accepting dial-in access are no longer a major presence on the<br />

Internet, terminal servers are. Cisco Systems terminal servers implement an<br />

extended version of this TACACS protocol. Thus, the access control decision is<br />

delegated to a host. In this way, the process of making the decision is opened<br />

up and the algorithms and data used to make the decision are under the<br />

complete control of whoever is running the TACACS daemon. For example:<br />

Anyone with a first name of Joe can only log in after 10:00 p.m. Monday-Friday,<br />

unless his last name is Smith or there is a Susan already logged in.<br />

The extensions to the protocol provide for more types of authentication requests<br />

and more types of response codes than were in the original specification.<br />

The original TACACS protocol specification does exist. However, due to<br />

copyright issues, it is not publicly available. RFC 1492 An Access Protocol<br />

Sometimes Called TACACS was written to alleviate this lack of access. This<br />

version of the specification was developed with the assistance of Cisco Systems,<br />

who has an implementation of the TACACS protocol that is believed to be<br />

compatible with the original specification. To be precise, the Cisco Systems<br />

implementation supports both the simple (non-extended) and extended versions.<br />

It is the simple version that would be compatible with the original.<br />

In this protocol a request/response pair is the basic unit of interaction. In this<br />

pair, the client sends a request and the server replies with a response. All<br />

requests must be acknowledged with a response. This requirement implies that<br />

all requests can be denied, although it is probably futile to attempt to deny a<br />

logout request.<br />

In some cases, a string of request/response pairs forms a larger unit, called a<br />

connection. There are three types of connections:<br />

1. Authenticate only, no connection<br />

2. Login connection<br />

3. SLIP connection<br />

Requests supported by this protocol are:<br />

• AUTH (user name, password, line, style)<br />

This request asks for an authentication. The parameters are:<br />

− The user name<br />

− The password<br />

− An indication of which line the request is for<br />

− A style of authentication<br />

The user name is a string that identifies the user. In principle, it can be of<br />

any length and contain any characters. In practice, it should be no longer<br />

Chapter 5. Management 143


This soft copy for use by <strong>IBM</strong> employees only.<br />

than 128 characters and should contain only the ASCII characters “!” (33<br />

decimal) through “∼ ” (126 decimal), inclusive.<br />

The password is a string that is used to authenticate the user identified by<br />

the user name. In principle, it can be of any length and contain any<br />

characters. In practice, it should be no longer than 128 characters and<br />

should contain only the ASCII characters “!” (33 decimal) through “∼ ” (126<br />

decimal), inclusive.<br />

The line is a non-negative decimal integer. If the client supports multiple<br />

physical access channels, this value identifies the particular channel. By<br />

convention, lines are numbered starting from one, although this should be<br />

taken with a grain of salt. For example, Cisco Systems′ implementation uses<br />

zero to designate the console port, then continues with one for the main<br />

serial lines. Clients that support only one channel should use line zero.<br />

The authentication style is a possibly empty string. It identifies the particular<br />

style of authentication to be performed. Its syntax and semantics are local.<br />

• LOGIN (user name, password, line) returns (result1, result2, result3)<br />

This request asks for an authentication and signals that, if the authentication<br />

succeeds, a login connection is starting. The parameters are:<br />

− The user name<br />

− The password<br />

− An indication of which line the request is for<br />

The meanings of the input fields are the same as the AUTH request. If the<br />

request is successful, this request returns three result values in addition to<br />

the success status. The result values are non-negative integers. Their<br />

interpretation is local. For example, Cisco Systems terminal servers<br />

interpret result3 to be the identifier of a local access list to use for additional<br />

validation.<br />

• CONNECT (user name, password, line, destinationIP, destinationPort) returns<br />

(result1, result2, result3)<br />

This request can only be issued when the user name and line specify an<br />

already-existing connection. As such, no authentication is required and the<br />

password will in general be the empty string. It asks, in the context of that<br />

connection, whether a TCP connection can be opened to the specified<br />

destination IP address and port.<br />

The return values are as for LOGIN.<br />

• SUPERUSER (user name, password, line)<br />

This request can only be issued when the user name and line specify an<br />

already-existing connection. As such, no authentication is required and the<br />

password will in general be the empty string. It asks, in the context of that<br />

connection, whether the user can go into superuser or enable mode on the<br />

terminal server.<br />

As an example of the flexibility inherit in this whole scheme, the TACACSD<br />

supplied by Cisco Systems ignores the user name part and instead checks<br />

whether the password matches that of the special user $enable$.<br />

• LOGOUT (user name, password, line, reason)<br />

This request can only be issued when the user name and line specify an<br />

already-existing connection. As such, no authentication is required and the<br />

144 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

password will in general be the empty string. It indicates that the connection<br />

should be terminated (but see SLIPON). It must be acknowledged, but the<br />

success/fail status of the acknowledgment is irrelevant. The reason value<br />

indicates why the connection is terminating. A null reason value is supplied<br />

when the connection is going into SLIP mode.<br />

• SLIPON (user name, password, line, SLIPaddress) returns (result1, result2,<br />

result3)<br />

This request can only be issued when the user name and line specify an<br />

already-existing connection. As such, no authentication is required and the<br />

password will in general be the empty string. It asks, in the context of that<br />

connection, whether the specified SLIPaddress can be used for the remote<br />

end of the connection.<br />

If the server replies with a success, the client can proceed to a SLIPON<br />

request. (It need not do so right away, however.)<br />

Note that semantics of user name can get hairy. For example, the Cisco<br />

Systems implementation encodes information in this way:<br />

− If the user just requested the default address be assigned, this field<br />

holds the user name in lowercase.<br />

− If the user requested a specific IP address or host name for the SLIP<br />

connection, this field contains the requested host name in UPPER case.<br />

If the server replies with a success, the client will immediately send a<br />

LOGOUT request. However, the connection will remain established until a<br />

SLIPOFF request is sent. No other authentication requests will be sent for<br />

that connection.<br />

SLIPaddress specifies the IP address used by the remote host. If a<br />

SLIPADDR request has been made, it will be that address. Otherwise, it will<br />

be the default address assigned by the client (for example, Cisco terminal<br />

server).<br />

The return values are as for LOGIN.<br />

• SLIPOFF (user name, password, line, reason)<br />

This request can only be issued when the user name and line specify an<br />

already-existing connection that is in SLIP mode. As such, no authentication<br />

is required and the password will in general be the empty string. It indicates<br />

that the connection should be terminated. It must be acknowledged, but the<br />

success/fail status of the acknowledgment is irrelevant. The reason value<br />

indicates why the connection is terminating.<br />

This protocol carries the user name and password in clear text. As such, if an<br />

attacker is capable of monitoring that data, the attacker could capture user<br />

name/password pairs. Implementations can take several steps to minimize this<br />

danger:<br />

• Use point-to-point links where possible.<br />

• Physically secure the transmission medium.<br />

• If packets must traverse multiple network segments, use a secure routing<br />

subsystem. This implies:<br />

− Tight control over router configurations.<br />

− Tight control over routing protocols.<br />

Chapter 5. Management 145


5.2 Accounting<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

− Avoid use of bridges, as they can be silently fooled into duplicating<br />

packets.<br />

This protocol potentially opens up a new way of probing user names and<br />

passwords. Thus, implementations may wish to have servers:<br />

• Limit responses to a controlled list of clients<br />

• Throttle the rate of responding to requests<br />

• Log all failures (and possibly successes, too)<br />

This protocol essentially allows clients to offload accept/reject decisions to<br />

servers. While an obvious implementation would simply use the server′s native<br />

login mechanism to make the determination, there is no reason to limit<br />

implementations to that mechanism. Servers could:<br />

• Use alternate lists of accounts (for example, password files),<br />

• Use alternate mechanisms for accessing the accounts (for example, a<br />

database, NIS),<br />

• Use alternate algorithms (for example, SecureID cards),<br />

• Translate the request to another protocol and use that protocol to make the<br />

determination (for example, Kerberos).<br />

Regardless of the billing policy of an ISP, some kind of system is needed to keep<br />

track of customers, their account details and their payment history. Billing used<br />

to be one of the last considerations in establishing an ISP. This is no longer the<br />

case. The right billing package can make or break an ISP′s operation. A billing<br />

package should provide the flexibility to react to market changes.<br />

An accounting system for an ISP can be something as simple as a utility that<br />

creates time-stamped records of when each user logged in and logged out. It<br />

can quickly get complicated and include information such as which port they<br />

used, what their IP address was, what filters are in effect and so on.<br />

This information can be used to calculate total online time for users, which could<br />

then be used for billing purposes. This type of facility is not normally a part of a<br />

server. There are, however, separate packages that will perform these tasks.<br />

Some packages tailored for ISPs are just starting to emerge on the market. If at<br />

all possible there should be a link to the authentication system. This would<br />

allow the billing database to be derived from the user authorization database.<br />

<strong>IBM</strong>′s Net.Commerce, for instance, provides a large set of APIs that can be used<br />

to interface with other systems to provide billing support. See 6.6,<br />

“Net.Commerce” on page 166 and B.11, “Net.Commerce” on page 338 for more<br />

information.<br />

Another package that has an integrated authorization component is TotalBilling<br />

from Expansion Systems Corporation. This package provides online credit card<br />

processing, and bills can be generated to be transmitted via e-mail or printed<br />

and sent via regular mail. It can also automatically configure RADIUS<br />

authorization files. An example of a TotalBilling Account Payment/Billing<br />

Information screen is shown in Figure 49 on page 147.<br />

146 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 49. TotalBilling Account Payment/Billing Information Screen<br />

Table 23 (Page 1 of 2). Billing Packages<br />

Table 23 shows more billing packages that are available.<br />

Product Vendor Platform<br />

Arbor/BP Kenan System<br />

www.kenan.com<br />

Billing and Tracking System<br />

(BATS)<br />

Astroarch Counsulting, Inc.<br />

www.astroarch.com<br />

HAWK-i MGL Systems<br />

www.mgl.ca<br />

UNIX platforms:<br />

DEC<br />

HP<br />

<strong>IBM</strong><br />

NCR<br />

SUN<br />

AIX<br />

BSDI<br />

FreeBSD<br />

HP-UX<br />

IRIX<br />

Linux<br />

MachTen<br />

OSF/1<br />

SCO<br />

Solaris<br />

SunOS<br />

UNIXware<br />

Windows 95<br />

Windows NT<br />

Chapter 5. Management 147


Table 23 (Page 2 of 2). Billing Packages<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Product Vendor Platform<br />

Internet Administration<br />

Framework (IAF)<br />

Solect<br />

www.solect.com<br />

Internet Back Office Billing (BOB) GreenSoft Solutions, Inc.<br />

www.greensoft.com<br />

Internet Billing Coolworld.com<br />

www.coolworld.com<br />

ISP Billing Software & A/R<br />

Software<br />

LPAC<br />

www.lpac.com<br />

ISP Power ISP Power Corp.<br />

www.isppower.com<br />

ISPTrack cyberacs.com<br />

www.cyberacs.com<br />

NT PayMaster Imagen Communications Inc.<br />

www.imagen.net<br />

Platypus Boardtown Corp.<br />

www.boardtown.com<br />

TotalBill Expansion Systems Corp.<br />

www.expansion.com<br />

User Tracking & Accounting (UTA) RTD<br />

www.rtd.com<br />

Solaris<br />

Windows NT<br />

Windows95<br />

WindowsNT<br />

AIX<br />

DOS<br />

FreeBSD<br />

Linux<br />

Novell<br />

SCO<br />

Solaris<br />

Windows 95<br />

Windows 95<br />

Windows NT<br />

UNIX<br />

Windows NT<br />

Windows NT<br />

Windows 95<br />

Windows NT<br />

DEC Alpha<br />

DEC UNIX<br />

HP-UX<br />

Solaris<br />

Sun Sparc<br />

Sun Ultra<br />

Windows NT<br />

BSD/OS<br />

BSDI<br />

FreeBSD<br />

Linux<br />

Solaris<br />

SunOS<br />

The RADIUS authentication protocol, mentioned previously, is a popular protocol<br />

and has been ported to many different hardware and software platforms. The<br />

log files from RADIUS can be used to compute usage and a customer could be<br />

billed for any usage overtime dependant on their type of account. Almost all the<br />

products in Table 23 on page 147 can work with these log files.<br />

148 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

5.3 Network Management<br />

5.3.1 Standards<br />

If an ISP is to remain competitive, then it will have to effectively manage its<br />

network. It will be necessary to determine if the connection to the Internet is<br />

operational and what the actual throughput of the network has been.<br />

Network Management consists of all the activities and products that are used to<br />

plan, configure, control, monitor, tune and administrate your computer network.<br />

This can be extremely complex dependent upon:<br />

• The number and variety of network components for example, servers,<br />

modems, routers and gateways<br />

• System mix: for example, operating systems, protocols and versions<br />

• Geographic location of components<br />

• Number of companies involved<br />

• Number of services provided<br />

Unfortunately managing all these different aspects has been characterized by<br />

individual management tools. Each vendor offers its own interfaces for the same<br />

management task, requiring knowledge of each management tool. Fortunately,<br />

tools are appearing that help to provide a global view of the system.<br />

Management via a global view of the system is accomplished through integrated<br />

network management.<br />

Essential to integrated network management is that the managed components<br />

deliver information in a format that can be interpreted independent of the<br />

product originating the information. This requires standardization of interfaces<br />

and protocols.<br />

The current network management framework for TCP/IP-based Internets consist<br />

of:<br />

1. SMI (RFC 1155) - Describes how managed objects contained in the<br />

Management Information Base (MIB) are defined. (See 5.3.2, “Structure and<br />

Identification of Management Information (SMI)” on page 151 for more<br />

information.)<br />

2. MIB-II (RFC 1213) - Describes the managed objects contained in the MIB.<br />

(See 5.3.3, “Management Information Base (MIB)” on page 151 for more<br />

information.)<br />

3. SNMP (RFC 1098) - Defines the protocol used to manage these objects. (See<br />

5.3.4, “Simple Network Management Protocol (SNMP)” on page 151 for more<br />

information.)<br />

The Internet Architecture Board (IAB) issued an RFC detailing its<br />

recommendation, which adopted two different approaches:<br />

• In the short term SNMP should be used.<br />

The IAB recommends that all IP and TCP implementations be<br />

network-manageable. At the current time, this implies implementation of the<br />

Internet MIB-II (RFC 1213), and at least the recommended management<br />

protocol SNMP (RFC 1157).<br />

Chapter 5. Management 149


This soft copy for use by <strong>IBM</strong> employees only.<br />

Note that the historic protocols Simple Gateway Monitoring Protocol (SGMP),<br />

RFC 1028 and MIB-I (RFC-1156) are not recommended for use.<br />

• In the long term, use of the emerging OSI network management protocol<br />

(CMIP) would be investigated. This is known as over TCP/IP (CMOT). (See<br />

5.3.5, “Common Management Information Protocol over TCP/IP (CMOT)” on<br />

page 152 for more information.)<br />

Both SNMP and CMOT use the same basic concepts in describing and<br />

defining management information called Structure and Identification of<br />

Management Information (SMI) described in RFC 1155 and Management<br />

Information Base (MIB) described in RFC 1156.<br />

Simple Network Management Protocol (SNMP) is an Internet standard protocol.<br />

Its status is recommended. Its current specification can be found in RFC 1157 -<br />

Simple Network Management Protocol (SNMP).<br />

MIB-II is an Internet standard protocol. Its status is recommended. Its current<br />

specification can be found in RFC 1213 - Management Information Base for<br />

Network Management of TCP/IP-based Internets: MIB-II.<br />

Common Management Information Protocol (CMIP) and Common Management<br />

Information Services (CMIS) are defined by the ISO/IEC 9595 and 9596 standards.<br />

CMIS/CMIP Over TCP/IP (CMOT) is an Internet proposed standard protocol. Its<br />

status is elective. Its current specification can be found in RFC 1189 - Common<br />

Management Information Services and Protocols for the Internet (CMOT) and<br />

(CMIP).<br />

OIM-MIB-II is an Internet proposed standard protocol. Its status is elective. Its<br />

current specification can be found in RFC 1214 - OSI Internet Management:<br />

Management Information Base.<br />

Other RFCs issued by the Internet Architecture Board (IAB) on this subject are:<br />

• RFC 1052 - IAB Recommendations for the Development of Internet Network<br />

Management Standards<br />

• RFC 1085 - ISO Presentation Services on Top of TCP/IP-based Internets<br />

• RFC 1155 - Structure and Identification of Management Information for<br />

TCP/IP-based Internets<br />

• RFC 1156 - Management Information Base for Network Management of<br />

TCP/IP-based Internets<br />

• RFC 1215 - Convention for Defining Traps for Use with the SNMP<br />

• RFC 1227 - SNMP MUX Protocol and MIB<br />

• RFC 1228 - SNMP-DPI: Simple Network Management Protocol Distributed<br />

Programming Interface<br />

• RFC 1230 - IEEE 802.4 Token Bus MIB<br />

• RFC 1231 - IEEE 802.5 Token-Ring MIB<br />

• RFC 1239 - Reassignment of Experimental MIBs to Standard MIBs<br />

• RFC 1351 - SNMP Administrative Model<br />

• RFC 1352 - SNMP Security Protocols<br />

150 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

5.3.2 Structure and Identification of Management Information (SMI)<br />

The SMI defines the rules for how managed objects are described and how<br />

management protocols may access these objects. The description of managed<br />

objects is made using a subset of the ASN.1 (Abstract Syntax Notation 1, ISO<br />

standard 8824), a data description language. The object type definition consists<br />

of five fields:<br />

• Object: A textual name, termed the object descriptor, for the object type<br />

along with its corresponding object identifier defined below.<br />

• Syntax: The abstract syntax for the object type. It can be a choice of<br />

SimpleSyntax (Integer, Octet String, Object Identifier, Null) or an<br />

ApplicationSyntax (NetworkAddress, Counter, Gauge, TimeTicks, Opaque) or<br />

other application-wide types. (See RFC 1155 for more details.)<br />

• Definition: A textual description of the semantics of the object type.<br />

• Access: One of read-only, read-write, write-only or not-accessible.<br />

• Status: One of mandatory, optional, or obsolete.<br />

5.3.3 Management Information Base (MIB)<br />

The MIB defines the objects that may be managed for each layer in the TCP/IP<br />

protocol. There are two versions, MIB-I and MIB-II. MIB-I was defined in RFC<br />

1156, and is now classified as an historic protocol with a status of not<br />

recommended.<br />

The list of managed objects defined has been derived from those elements<br />

considered essential. This approach of taking only the essential objects is not<br />

restrictive, since the SMI provides extensibility mechanisms such as the<br />

definition of a new version of the MIB and definition of private or non-standard<br />

objects.<br />

5.3.4 Simple Network Management Protocol (SNMP)<br />

The SNMP added the improvement of many years of experience in SGMP and<br />

allowed it to work with the objects defined in the MIB with the representation<br />

defined in the SIM.<br />

RFC 1157 defines the Network Management Station (NMS) as the one that<br />

executes network management applications (NMA) that monitor and control<br />

network elements (NE) such as hosts, gateways and terminal servers. These<br />

network elements use a management agent (MA) to perform the network<br />

management functions requested by the network management stations. The<br />

Simple Network Management Protocol (SNMP) is used to communicate<br />

management information between the network management stations and the<br />

agents in the network elements.<br />

All the management agent functions are only alterations (set) or inspections (get)<br />

of variables limiting the number of essential management functions to two and<br />

avoiding more complex protocols. In the other direction, from NE to NMS, a<br />

limited number of unsolicited messages (traps) are used to inform about<br />

asynchronous events. In the same way, trying to preserve the simplicity, the<br />

interchange of information requires only an unreliable datagram service and<br />

every message is entirely and independently represented by a single transport<br />

datagram. This means also that the mechanisms of the SNMP are generally<br />

suitable for use with a wide variety of transport services. The RFC 1157 specifies<br />

Chapter 5. Management 151


This soft copy for use by <strong>IBM</strong> employees only.<br />

the exchange of messages via the UDP protocol, but a wide variety of transport<br />

protocols can be used.<br />

The entities residing at management stations and network elements that<br />

communicate with one another using the SNMP are termed SNMP application<br />

entities. The peer processes that implement it are the protocol entities. An<br />

SNMP agent with some arbitrary set of SNMP application entities is called an<br />

SNMP community, where each one is named by a string of octets that need to be<br />

unique only to the agent participating in the community.<br />

A message in the SNMP protocol consists of a version identifier, an SNMP<br />

community name and a protocol data unit (PDU). It is mandatory that all<br />

implementations of the SNMP support the five PDUs:<br />

• GetRequest: Retrieve the values of a specific object from the MIB.<br />

• GetNextRequest: Walk through portions of the MIB.<br />

• SetRequest: Alter the values of a specific object from the MIB.<br />

• GetResponse: Response from a GetRequest, a GetNextRequest and a<br />

SetRequest.<br />

• Trap: Capability of the network elements to generate events to network<br />

management stations such as agent initialization, agent restart and link<br />

failure. There are seven trap types defined in RFC 1157: coldStart,<br />

warmStart, linkDown, linkUp, authenticationFailure, egpNeighborLoss and<br />

enterpriseSpecific.<br />

5.3.5 Common Management Information Protocol over TCP/IP (CMOT)<br />

CMOT is the network management architecture that has been developed to<br />

move towards a closer relationship with the Open System Interconnection (OSI)<br />

network management standards named Common Management Information<br />

Protocol (CMIP). With these premises CMOT, as in the OSI model, can be<br />

divided into an organizational model, functional model and informational model.<br />

In the organizational and informational models the same OSI concept is used in<br />

CMOT and in SNMP. The object identification is formed using the subtree<br />

related to the DoD with subdivisions in management, directory, experimental and<br />

private. All the management objects are defined in the Management Information<br />

Base (MIB) being represented by the Structure and Identification of Management<br />

Information (SMI), a subset of the ASN.1 (OSI Abstract Syntax Notation 1).<br />

In the functional model CMOT adopted the OSI model that divides the<br />

management components into managers and agents. The agent collects<br />

information, performs commands and executes tests and the manager receives<br />

data, generates commands and sends instructions to the agents. This manager<br />

and agent are formed by a set of specific management information per<br />

communication layer named the Layer Management Entities (LME).<br />

All the LMEs are coordinated by a System Management Application Process<br />

(SMAP) that can communicate between different systems over the Common<br />

Management Information Protocol (CMIP).<br />

In the OSI approach the management can occur only over fully established<br />

connections between the managers and the agents. CMOT allows management<br />

information exchange over connectionless services (datagram). But to maintain<br />

the same service interface required by CMIP, called Common Management<br />

152 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

5.3.6 Tools<br />

Figure 50. WhatsUp Main Window<br />

Information Services (CMIS), the CMOT architecture defined a new<br />

communication layer, the Lightweight Presentation Protocol (LPP). This layer<br />

has been defined to provide the presentation services required for the CMIP so<br />

that the entirely defined network management standards defined by OSI will fit in<br />

the TCP/IP CMOT architecture.<br />

Depending on your needs and the complexity of your network, it may be possible<br />

to manage your network with a simple program, such as WhatsUp or you may<br />

require a sophisticated heterogeneous network management system, such as<br />

Tivoli′s Management Environment (TME).<br />

Although WhatsUp is small, it is powerful. It is a network monitoring tool for<br />

small-to-medium sized TCP/IP networks. It provides graphical network<br />

monitoring tools that initiate both visual and audible alarms when monitored<br />

network elements do not respond to polling. WhatsUp will even notify you<br />

remotely by digital beeper, alphanumeric pager, or e-mail. Basically, you can<br />

build a map of your network and the status of each component to be monitored<br />

can be displayed. This status can be logged and analyzed to determine system<br />

downtime and performance. Figure 50 shows the main window of WhatsUp with<br />

its graphical display of network elements and connections. This window also<br />

provides access to other WhatsUp features. More information can be found at<br />

www.ipswitch.com/products/whatsup/.<br />

Tivoli′s Management Environment (TME) can provide centralized control and<br />

management of heterogeneous distributed networks. Specifically, TME 10<br />

NetView enables an administrator to monitor a network through a centralized<br />

TME 10 NetView console. It automatically provides logical discovery of network<br />

resources and places those resources and their relationships in topology maps.<br />

Through the integration with TME 10 Framework it is able to provide support<br />

across multiple operating systems. More information can be found at<br />

www.tivoli.com.<br />

Chapter 5. Management 153


5.4 Usage Management<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Along with the need to manage network operability and performance, there are<br />

many other considerations that need to be made with regard to network<br />

management. If any of your subscribers are content providers, they will<br />

eventually come to you with questions such as:<br />

• How many people have looked at my home page?<br />

• Which of my pages is the most popular?<br />

• How many copies of my demo have been downloaded?<br />

These content providers may even be selling advertising on the Web presence<br />

that you are providing them. Their ability to charge for advertising on their site<br />

will be directly coupled with their ability to determine how many visitors they<br />

have had to their site. The typical method of selling advertising is by the<br />

number of times that an ad is displayed. This requires some kind of tracking<br />

tool. Another method of selling advertising is called click-through. This is based<br />

on the amount of visitors who actually click on an advertisement that will lead<br />

them to the advertisers site. There is no getting around a tracking tool for this<br />

advertising method. The most recent form of advertising is called Intermercials.<br />

These type of ads provide animation, product information and interactivity, all<br />

without taking the visitor away from the original site. A tool to track the amount<br />

of time that a visitor interacts with this type of advertisement remains to be<br />

developed.<br />

One such product that provides a tracking capability is WebTrends. WebTrends<br />

will analyze the log files created by your Web servers and provide you with<br />

information about your site and the users that access it. WebTrends is<br />

compatible with log files created by many Web servers. WebTrends main screen<br />

can be seen in Figure 51 on page 155.<br />

154 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 51. WebTrends Main Screen<br />

Reports generated by WebTrends include statistical information as well as<br />

graphs that show trends, usage, and market share among other things. Reports<br />

can be generated as HTML files that can be viewed by a Web browser, as well<br />

as formats for many popular word processors. A sample report can be seen in<br />

Figure 52 on page 156.<br />

Chapter 5. Management 155


Figure 52. WebTrends Sample Report<br />

156 The Technical Side of Being an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.


This soft copy for use by <strong>IBM</strong> employees only.<br />

WebTrends can even track ad views and click-throughs as can be seen in<br />

Figure 53 on page 157.<br />

Figure 53. WebTrends Ad Views and Clicks Configuration Screen<br />

Table 24 shows more of the packages that are available to assist in tracking,<br />

analyzing and reporting on system usage.<br />

Table 24 (Page 1 of 2). System Usage Analysis Software<br />

Product Vendor Platform<br />

AccessWatch Dave Maher<br />

www.accesswatch.com<br />

Analog Freeware<br />

www.statslab.cam.ac.uk/∼ sret1/analog/<br />

Bazaar Analyzer Aquas<br />

www.bazaarsuite.com<br />

net.Analysis net.Genesis<br />

www.netgen.com<br />

NetIntellect Webmanage<br />

www.webmanage.com<br />

Statbot Freeware<br />

www.xmission.com/∼ dtubbs/club/cs.html<br />

UNIX<br />

Windows NT<br />

Macintosh<br />

RISCOS<br />

UNIX<br />

VMS<br />

Windows NT<br />

Java-based,<br />

platform-independent<br />

Solaris<br />

Windows NT<br />

Windows 95<br />

Windows NT<br />

AIX<br />

BSDI<br />

DEC Alpha/OSF<br />

DEC Ultrix<br />

FreeBSD<br />

HP/UX<br />

IRIX<br />

Linux<br />

MS-DOS<br />

Solaris<br />

SunOS<br />

Chapter 5. Management 157


Table 24 (Page 2 of 2). System Usage Analysis Software<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Product Vendor Platform<br />

WebTrends For example, Software<br />

www.webtrends.com<br />

Windows 95<br />

Windows NT<br />

Currently, a leading industry trade group, the Internet Advertising Bureau, is<br />

trying to help standardize the terms used in online advertising. The organization<br />

has already developed a preliminary list of definitions for several terms. More<br />

information about these terms and other working committees can be found at<br />

www.iab.net. If these standards are adopted, it will hopefully be easier to<br />

understand and compare different online advertising options.<br />

158 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Chapter 6. Electronic Commerce<br />

6.1 Electronic Money (E-Money)<br />

6.1.1 Types of E-Money<br />

From an ISP perspective, the initial source of revenue obviously comes from<br />

providing access to the Internet. This in and of itself could provide substantial<br />

revenue. There are, however, many other means of obtaining revenue via the<br />

Internet. Some additional services that can be sold to customers as an<br />

extension to a basic connectivity package have been discussed in Chapter 4,<br />

“Internet Services” on page 133. These services are, in essence, an extended<br />

form of advertising. They provide customers 24-hour access to product<br />

descriptions, demos and technical information. However an ISP can not afford to<br />

ignore the ongoing economic explosion known as electronic commerce.<br />

According to Randall E. McComas, segment executive, emerging markets, <strong>IBM</strong><br />

Global Telecommunications & Media Industries business unit, “The successful<br />

Internet service providers of tomorrow can′t just provide access and content.<br />

They have to enable electronic commerce and collaboration, and <strong>IBM</strong> is helping<br />

them do just that.”<br />

Electronic commerce is basically using the Internet to conduct business involving<br />

the exchange of money. Every financial transaction over the Internet is<br />

theoretically vulnerable to manipulation. In order to develop the Net into a<br />

reliable channel for commerce several different protocols have been developed.<br />

Two consortia have proposed extensions to SSL and S-HTTP for electronic<br />

commerce. These extensions, currently in draft form, have been submitted for<br />

comments. One consortium, of which <strong>IBM</strong> is a member, has chosen to build<br />

commerce-specific extensions on top of already widespread protocols such as<br />

SSL and S-HTTP. This includes the Internet Keyed Payments (iKP) system (see<br />

6.4, “<strong>IBM</strong> Corporation iKP (Internet Keyed Payment Protocols)” on page 163), a<br />

family of secure payment protocols that enable credit card payments via the<br />

Internet. Subsequently, <strong>IBM</strong> has worked with MasterCard, Visa and other<br />

technology vendors to develop Secure Electronic Transaction (SET) (see 6.5,<br />

“Secure Electronic Transactions (SET)” on page 165), a standard for credit card<br />

payments over the Net that is based on the same principles as iKP.<br />

Public-key cryptography and digital signatures make e-money possible. It would<br />

take too long to go into detail how public-key cryptography and digital signatures<br />

work. But the basic idea is that anyone can verify a signature using the readily<br />

available public key but only the holder of the private key can place a valid<br />

signature.<br />

In general, there are two distinct types of e-money:<br />

• Identified e-money contains information revealing the identity of the person<br />

who originally withdrew the money from the bank. Also, in much the same<br />

manner as credit cards, identified e-money enables the bank to track the<br />

money as it moves through the economy.<br />

• Anonymous e-money (also known as digital cash) works just like cash. Once<br />

anonymous e-money is withdrawn from an account, it can be spent or given<br />

away without leaving a transaction trail.<br />

There are two varieties of each type of e-money:<br />

© Copyright <strong>IBM</strong> Corp. 1997 159


• Online e-money<br />

• Offline e-money<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Online means you need to interact with a bank (via modem or network) to<br />

conduct a transaction with a third party. Offline means you can conduct a<br />

transaction without having to directly involve a bank. Offline anonymous<br />

e-money (true digital cash) is the most complex form of e-money because of the<br />

double-spending problem.<br />

6.1.2 The Double-Spending Problem<br />

Since e-money is a bunch of bits, a piece of e-money is very easy to duplicate.<br />

Since the copy is indistinguishable from the original you might think that<br />

counterfeiting would be impossible to detect. A trivial e-money system would<br />

allow us to copy of a piece of e-money and spend both copies. We could<br />

become millionaires in a matter of a few minutes. Obviously, real e-money<br />

systems must be able to prevent or detect double spending.<br />

Online e-money systems prevent double spending by requiring merchants to<br />

contact the bank′s computer with every sale. The bank computer maintains a<br />

database of all the spent pieces of e-money and can easily indicate to the<br />

merchant if a given piece of e-money is still spendable. If the bank computer<br />

says the e-money has already been spent, the merchant refuses the sale. This<br />

is very similar to the way merchants currently verify credit cards at the point of<br />

sale.<br />

Offline e-money systems detect double spending in a couple of different ways.<br />

One way is to create a special smart card containing a tamper-proof chip called<br />

an observer (in some systems). The observer chip keeps a mini database of all<br />

the pieces of e-money spent by that smart card. If the owner of the smart card<br />

attempts to copy some e-money and spend it twice, the imbedded observer chip<br />

would detect the attempt and would not allow the transaction. Since the<br />

observer chip is tamper-proof, the owner cannot erase the mini-database without<br />

permanently damaging the smart card.<br />

The other way offline e-money systems handle double spending is to structure<br />

the e-money and cryptographic protocols to reveal the identity of the double<br />

spender by the time the piece of e-money makes it back to the bank. If users of<br />

the offline e-money know they will get caught, the incidence of double spending<br />

will be minimized (in theory). The advantage of these kinds of offline systems is<br />

that they don′t require special tamper-proof chips. The entire system can be<br />

written in software and can run on ordinary PCs or cheap smart cards.<br />

It is easy to construct this kind of offline system for identified e-money. Identified<br />

offline e-money systems can accumulate the complete path the e-money made<br />

through the economy. The identified e-money information increases each time it<br />

is spent. The particulars of each transaction are appended to the piece of<br />

e-money and travel with it as it moves from person to person, merchant to<br />

vender. When the e-money is finally deposited, the bank checks its database to<br />

see if the piece of e-money was double spent. If the e-money was copied and<br />

spent more than once, it will eventually appear twice in the spent database. The<br />

bank uses the transaction trails to identify the double spender.<br />

Offline anonymous e-money (sans observer chip) information also increases with<br />

each transaction, but the information that is accumulated is of a different nature.<br />

The result is the same however. When the anonymous e-money reaches the<br />

160 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

bank, the bank will be able to examine its database and determine if the<br />

e-money was double spent. The information accumulated along the way will<br />

identify the double spender.<br />

The big difference between offline anonymous e-money and offline identified<br />

e-money is that the information accumulated with anonymous e-money will only<br />

reveal the transaction trail if the e-money is double spent. If the anonymous<br />

e-money is not double spent, the bank can not determine the identity of the<br />

original spender nor can it reconstruct the path the e-money took through the<br />

economy.<br />

With identified e-money, both offline or online, the bank can always reconstruct<br />

the path the e-money took through the economy. The bank will know what<br />

everyone bought, where they bought it, when they bought it, and how much they<br />

paid. And what the bank knows, the taxation authority knows.<br />

There are a lot of companies developing products based on the e-money<br />

technology. Some of the more popular products are:<br />

Digicash This is the largest electronic cash scheme, based on electronic coins.<br />

It has a large number of subscribers, both buyers and merchants, and<br />

is supported by a number of banks. It uses an innovative blind<br />

signature scheme to protect the anonymity of the buyer.<br />

Mini-pay This is a scheme proposed by <strong>IBM</strong> research. Its unique feature is<br />

that for small payments there is no need for the seller to request<br />

funds from the server that holds the account. Each buyer has a daily<br />

spending limit and, as long as it is not exceeded, the seller can be<br />

relatively sure that the bill will be paid. The advantage of this<br />

scheme is faster, lighter transactions, at the cost of a small additional<br />

risk.<br />

Netbill This is a scheme developed at Carnegie Mellon University. In this<br />

case the cash is not held directly by the buyer, but by a Netbill server.<br />

It is primarily designed for delivering for-fee data content. When the<br />

buyer elects to buy the data or service, the seller sends the data in<br />

an encrypted form. It also sends a billing request to the Netbill<br />

server. If there are sufficient funds in the buyer′s account, the server<br />

sends the buyer the key to unlock the data. If the buyer accepts, the<br />

cost is deducted from his or her account.<br />

Table 25 shows the locations of the Web sites of these and other e-money<br />

products.<br />

Table 25 (Page 1 of 2). E-Money Product Locations<br />

Product Web Site<br />

CheckFree www.checkfree.com<br />

CyberCash www.cybercash.com<br />

Digicash www.digicash.com<br />

First Union Bank www.firstunion.com<br />

First Virtual www.fv.com<br />

MasterCard www.mastercard.com<br />

Mini-pay www.ibm.net.il/ibm_il/int-lab/mpay<br />

Mondex www.mondex.com<br />

Chapter 6. Electronic Commerce 161


Table 25 (Page 2 of 2). E-Money Product Locations<br />

Product Web Site<br />

Netbill www.netbill.com<br />

NetCheque www.netcheque.org<br />

NetMarket www.netmarket.com<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Sandia′s Electronic Cash System www.cs.sandia.gov/HPCCIT/el_cash.html<br />

Security First Network Bank www.sfnb.com<br />

USC′s Netcash gost.isi.edu/info/netcash<br />

Visa www.visa.com<br />

6.2 Electronic Checks (E-Check)<br />

A current method of money exchange that could be efficiently handled over the<br />

Internet is the use of paper checks. Currently a person must fill out a paper<br />

check, which is then typically mailed to the payee, who in turn must endorse it<br />

and take it to a bank. The bank must process the paper check, ship it to a<br />

clearinghouse bank, which in turn sends it back to the payees bank where the<br />

amount is credited to the payee′s account. The paper check is either kept in a<br />

file or scanned and sent back to the check′s originator.<br />

This whole process can be handled much more efficiently over the Internet. This<br />

is the central idea behind the e-check. The Financial Services Technology<br />

Consortium (FSTC), comprised of major U.S. banks and technology companies,<br />

including <strong>IBM</strong>, is working on assessment and demonstration of the feasibility of<br />

electronic checks.<br />

Elaine Palmer, manager of embedded cryptographic systems at <strong>IBM</strong>′s Watson<br />

Lab says, “For years, the United States Department of the Treasury has been<br />

trying to get its payees to get on an Electronic Data Interchange (EDI) system so<br />

that they send in their bills and receive their payments electronically.” However,<br />

setting up to do business on an EDI system costs about $100,000 and small<br />

businesses have not wanted to take the plunge. The Internet provides an<br />

opportunity to accomplish the same thing with a much lower cost of investment.<br />

E-checks are claimed against funds held in a regular bank demand deposit<br />

account. They′re designed for purchases of US $10 or more. In many ways, an<br />

e-check works like a paper check. Chances are that e-checks will use the<br />

existing SET protocol (see 6.5, “Secure Electronic Transactions (SET)” on<br />

page 165) which will be interfaced with the existing infrastructure for check<br />

clearing, settlement and records keeping.<br />

6.3 Secure Electronic Payment Protocol<br />

<strong>IBM</strong>, Netscape, GTE, CyberCash, and Master Card have cooperatively developed<br />

extensions they call the Secure Electronic Payment Protocol (SEPP). <strong>IBM</strong> has<br />

contributed both security technology including Internet Keyed Payment Protocol<br />

(iKP), a secure payment technology developed at <strong>IBM</strong>′s research laboratory in<br />

Zurich, Switzerland, and its long-standing experience building and operating very<br />

large financial networks. SEPP protects transactions between a card holder and<br />

a merchant, and between the merchant and card holder′s financial institution.<br />

162 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

There are seven major business requirements addressed by the Secure<br />

Electronic Payment Protocol (SEPP) system:<br />

• Confidentiality of payment information.<br />

• Integrity of all payment data transmitted via public networks.<br />

• Authentication that a card holder is the legitimate owner of a credit card<br />

account.<br />

• Authentication that a merchant can accept credit card payments with an<br />

acquiring member financial institution.<br />

• Interoperability of bank card/credit card programs among software and<br />

network providers.<br />

• Protection from electronic commerce-related attacks.<br />

• Separate privacy mechanisms for general information exchange and<br />

payment data exchange.<br />

The scope of SEPP encompasses both interactive online and non-interactive<br />

store-and-forward (e-mail message-based) payment transactions. Several<br />

transaction messages are required; others add the ability to operate when the<br />

customer or the financial institution are not available. Card holder account and<br />

payment data information must be secured as it travels across the network,<br />

preventing interception and alteration of this data by unauthorized parties. The<br />

SEPP standard guarantees that message content is not altered during<br />

transmission. Payment data sent from card holders to merchants is protected in<br />

such a manner as to be verifiable. If any component is altered in transit, the<br />

transaction will not be processed accurately. SEPP provides the means to<br />

ensure that the contents of all payment messages sent match the contents of<br />

messages received. Merchants will be able to verify that a card holder is using<br />

a valid account number.<br />

A mechanism that links a card holder to a specific account number reduces the<br />

incidence of fraud and therefore the overall cost of payment processing. SEPP<br />

also provides a mechanism to prevent intruders from establishing a phony<br />

storefront and collecting payment data. Merchants who receive payment data<br />

are sponsored by a financial institution and display a certificate verifying this<br />

relationship.<br />

6.4 <strong>IBM</strong> Corporation iKP (Internet Keyed Payment Protocols)<br />

The <strong>IBM</strong> Research Division has developed a family of secure payment protocols,<br />

called iKP that circumvent most of the above problems. While developed at <strong>IBM</strong>,<br />

the technology has been immediately disclosed for public review, and it is being<br />

openly discussed in a number of fora and consortia (for example, W3C, FSTC,<br />

IETF, etc.) and with a number of financial and technical partners as <strong>IBM</strong> has no<br />

intention of keeping it proprietary. The technology uses strong cryptography in a<br />

very secure way but packages it so that it should satisfy usage and<br />

import/export restrictions in most countries. It was designed to work with any<br />

browser and server on any platform; the first prototype is designed to work with<br />

credit cards, but the intrinsic design is flexible and will allow supporting other<br />

payment instruments in due time. This first prototype is also entirely in software<br />

because typical Internet stations today do not include secure hardware or<br />

support smart card readers, but provisions are made in the design to<br />

accommodate such devices later, and work is already in progress in that<br />

Chapter 6. Electronic Commerce 163


Figure 54. <strong>IBM</strong> iKP<br />

6.4.1 Security Considerations<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

direction. The iKP technology is designed to allow customers to order goods,<br />

services, or information over the Internet, while relying on existing secure<br />

financial networks to implement the necessary payments, as suggested in<br />

Figure 54 on page 164.<br />

The intent of iKP is to address certain security issues related to three-party<br />

payment mechanisms conducted over the Internet. Note that iKP does not<br />

address security concerns applicable to negotiations that may occur before iKP<br />

is initiated. Depending upon the communications method utilized, security<br />

protocols such as SSL, S-HTTP, PEM, or MOSS should be utilized if privacy,<br />

authentication, signatures, or other security attributes are required for the<br />

negotiations.<br />

Public key signature mechanisms are critically dependent upon the security of<br />

the corresponding private keys. iKP requires private and public keys of<br />

acquirers and optionally of sellers and buyers. Implementers should pay<br />

particular attention to the methods used to store the private keys of these<br />

participants. Encryption of stored private keys, tamper-proof hardware,<br />

certificate revocation mechanisms, and certificate expiration dates should all be<br />

164 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

considered. iKP expects that public keys are distributed via certificates signed<br />

by well-known certification authorities (CAs).<br />

The definition of such CAs, and the distribution mechanism for their root public<br />

keys, is outside the scope of iKP. The security of iKP ultimately relies upon the<br />

security of the root keys as utilized by the buyer, seller, and acquirer software.<br />

Implementers should consider carefully how software configures and stores<br />

these root keys. It is suggested that there be mechanisms by which buyers,<br />

sellers, and acquirer employees/users can verify the certificate authorities and<br />

root keys recognized by their software.<br />

6.5 Secure Electronic Transactions (SET)<br />

Banks and financial institutions have had networks for electronic payment<br />

processing for many years. These networks connect highly secure, trusted<br />

computer systems, using dedicated links and powerful cryptographic hardware.<br />

A number of international standards exist to define the protocol for messages<br />

exchanged over the network.<br />

The challenge for Internet credit card processing lies in producing a scheme that<br />

can provide adequate protection at a reasonable cost without compromising<br />

trust in any of the existing systems.<br />

During 1995, various financial organizations and technology companies formed a<br />

number of alliances aimed at producing standards for credit card payment. This<br />

was a confusing time, with a number of competing standards and consortia. The<br />

technical community would probably still be arguing the merits of one solution or<br />

another, but the two largest credit card companies, Visa and MasterCard,<br />

realized that nothing would happen without a globally accepted standard. They<br />

joined forces with the key software companies to produce a single proposal,<br />

SET.<br />

SET is based on ideas from previous proposed standards and is also heavily<br />

influenced by Internet Keyed Payment Protocols (iKP ) as mentioned in 6.4, “<strong>IBM</strong><br />

Corporation iKP (Internet Keyed Payment Protocols)” on page 163.<br />

Other credit card payment systems do exist, but they are generally not as broad<br />

a market as SET is. For example, First Virtual Internet Payments System<br />

(FVIPS), operated by First Virtual Holdings Inc. is a scheme in which the<br />

prospective buyer registers credit card details with First Virtual and receives a<br />

personal identification number (PIN). The buyer can then use the PIN in place of<br />

a card number at any merchant that has an account with First Virtual. Payment<br />

details must be confirmed by e-mail before any purchase is completed.<br />

Although this scheme has been successful it is limited due to the requirement<br />

for both buyer and seller to be affiliated with the same service. SET more<br />

closely follows the model of normal credit card payments, in which the only<br />

relationship between the organization that issues the card and the one that<br />

processes the purchase is that they subscribe to the same clearing network.<br />

SET is specifically a payment protocol. It defines the communication between<br />

card holder, merchant and payment gateway for card purchases and refunds. It<br />

defines the communication between the different parties and certification<br />

authorities for public key signature. It does not define anything beyond that.<br />

Chapter 6. Electronic Commerce 165


6.6 Net.Commerce<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

If you want some further insight into these processes, refer to the Secure<br />

Electronic Transactions Specification, which is in three parts:<br />

• Book 1, Business Description<br />

• Book 2, Programmer′s Guide<br />

• Book 3, Formal Protocol Definition<br />

The documents are available in several different formats from<br />

www.mastercard.com/set.<br />

The Net.Commerce product allows you, as the merchant or service provider, to<br />

create an electronic store where your products or services can be sold to<br />

potential customers on the Internet′s World Wide Web (WWW). Using<br />

Net.Commerce, your shoppers can browse and purchase goods and services<br />

described in your electronic store. This store will make the shoppers feel like<br />

they are shopping in a real store.<br />

Net.Commerce can be used with a standard Web browser, such as the Netscape<br />

Navigator 2.0 or another Java-compatible browser. In addition, Lotus payment<br />

switch technology provides the integrity and the authentication necessary to<br />

allow your shoppers to securely purchase products and services over the<br />

Internet. Net.Commerce is now SET-enabled to allow a more secure credit card<br />

transaction than SSL. It also interfaces with CyberCash to help automate the<br />

purchasing process.<br />

Net.Commerce consists of a Store Manager, a Net.Commerce director, and a<br />

Net.Commerce daemon. Figure 55 on page 167 shows these components and<br />

how they interact with other products that are part of <strong>IBM</strong>′s world of electronic<br />

commerce.<br />

166 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 55. Net.Commerce<br />

6.6.1 Store Manager<br />

6.6.2 The Store Creator<br />

Store Manager is a component of Net.Commerce that provides the tools that a<br />

store administrator needs to create and administer electronic stores. Store<br />

Manager also provides the tools for keeping track of prices, orders, shoppers,<br />

and groups of shoppers for group discounting or group pricing.<br />

Store Manager contains a collection of Java applets that are installed on the<br />

Net.Commerce server and that can be accessed from any Java-compatible<br />

browser on the World Wide Web. Store Manager consists of the following<br />

components: the store creator, store administrator, and the template editor.<br />

For more information about Store Manager and its components, and how to<br />

create and maintain a virtual storefront on the World Wide Web, refer to the<br />

Net.Commerce Store Manager Handbook.<br />

The store creator is a series of easy-to-use interfaces on the World Wide Web<br />

that guide a user through the initial steps of creating a basis for an electronic<br />

store. The store creator provides the basic elements of an electronic store, and<br />

directs the user to the store administrator and to the template editor to provide<br />

the remaining content and design of the electronic store.<br />

The store creator enables a store administrator to perform the following basic<br />

store operations:<br />

• Create a store basis<br />

• Configure the electronic store<br />

• Design the store′s home page<br />

Chapter 6. Electronic Commerce 167


• Categorize the store′s products<br />

• Design a default store header and footer<br />

• Design the shopping basket<br />

• Define shopper groups<br />

• Configure Net.Commerce<br />

6.6.3 The Store Administrator<br />

6.6.4 The Template Editor<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

The store administrator is a collection of Java forms on the World Wide Web that<br />

provides easy access to entering, editing, and maintaining store information in<br />

the merchant server database.<br />

Using the store administrator, a user can:<br />

• Create an electronic store<br />

• Configure Net.Commerce and the electronic store<br />

• Change and maintain the stores information<br />

• Enter and modify product and price information<br />

• Maintain shopper records<br />

• Maintain groups of shoppers<br />

• Assign custom headers and footers to store pages<br />

• Customize the store display for different shopper groups<br />

• Keep track of orders<br />

The template editor provides a what-you-see-is-what-you-get (WYSIWYG)<br />

environment allowing you to design the look and feel of your electronic store, so<br />

that your shoppers feel like they are in a real store. With it you can create your<br />

store pages that includes the store′s home page, interactive navigational pages<br />

and dynamic catalog pages.<br />

6.6.5 The Net.Commerce Director<br />

The Net.Commerce director is a non-parse header common gateway interface<br />

(pph-cgi) program allowing two-way communication between the <strong>IBM</strong> Internet<br />

Connection Secure Server and the Net.Commerce daemon. It is called by the<br />

<strong>IBM</strong> Internet Connection Secure Server to display products and services offered<br />

for sale to your shoppers. The Net.Commerce director communicates via a<br />

TCP/IP socket with the Net.Commerce daemon to quickly access the store′s<br />

database. The TCP/IP communication is secured through a public/private key<br />

encryption mechanism.<br />

6.6.6 The Net.Commerce Daemon<br />

The Net.Commerce daemon is a program used to access information stored in a<br />

DB2 database from which your online product catalogs are built. It can assist in<br />

building pages dynamically and rapidly, in maintaining and multiplexing the<br />

connections to the database, and managing the security and administration of<br />

the Net.Commerce.<br />

168 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

6.6.7 The Lotus Payment Switch<br />

The Lotus payment switch performs authorization for credit card transactions<br />

when shoppers place their orders.<br />

The transaction information is transmitted in a secure fashion to the payment<br />

server for processing. The response is returned to the Net.Commerce server<br />

where an appropriate URL tells the shopper whether the transaction has been<br />

accepted or rejected.<br />

6.6.8 The Olympic Ticket Sales - An Example of Net.Commerce<br />

The Atlanta 1996 Olympic Ticket Sales was an example of a large electronic<br />

commerce application on the Internet. It was implemented with <strong>IBM</strong><br />

Net.Commerce. This example demonstrates the potential of Net.Commerce.<br />

Let′s buy some tickets.<br />

Figure 56. The Olympic Ticket Sale Start Page<br />

We start at the ticket sale home page at sales2.atlanta.olympic.org. In the upper<br />

part of the screen you can see the heading definition done with Net.Commerce.<br />

You will find this heading on every page in the ticket sale.<br />

After choosing the Start button, the selection page appears. Here you see the<br />

different search possibilities you have for getting tickets. In the same way you<br />

can build selection categories for your business using Net.Commerce.<br />

Chapter 6. Electronic Commerce 169


Figure 57. Search for Tickets Part 1<br />

Figure 58. Search for Tickets Part 2<br />

170 The Technical Side of Being an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 59. Result of Search by Date<br />

We want to know if there are any tickets available on the 31st of July, so we<br />

choose the Search by Date function. The search result showed us all events for<br />

that date where tickets were available.<br />

We decided to go to a hockey game in the morning and to a handball game in<br />

the afternoon.<br />

Chapter 6. Electronic Commerce 171


Figure 60. Ticket Price and Quantity<br />

Figure 61. Ticket Request List<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

After every selection, we saw the list of all of our ticket requests, with the<br />

possibility to change the requests.<br />

172 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 62. Unsuccessful Security Test<br />

By clicking the OK button in the ticket request list, we started the payment<br />

process. Net.Commerce first checks if the browser supports SSL. Our browser<br />

didn′t support SSL, so we got the following page as a result:<br />

As you see, Net.Commerce offers your customers two ways to order and pay:<br />

• With SSL support in your browser, your customers can order online and pay<br />

with their credit card.<br />

• Without SSL support they can use the Net.Commerce for selecting the<br />

products or services they want and then they can order offline.<br />

Chapter 6. Electronic Commerce 173


Figure 63. Offline Purchase<br />

6.7 Example Electronic Commerce Solution<br />

174 The Technical Side of Being an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 64. Example Electronic Commerce Solution. Electronic sales environment with built-in secure resources.<br />

The solution shown in Figure 64 is a basic electronic commerce solution. You<br />

can add more features to this solution providing more resources and improved<br />

service to the customers.<br />

There are some very important things to consider with regard to this solution,<br />

such as:<br />

• Link bandwidth: The link bandwidth must be high enough to provide an<br />

acceptable response time for the customers.<br />

• Server performance: The server performance is directly related to the link<br />

bandwidth. Always choose servers that can receive upgrades in storage<br />

capacity, memory and if possible, processors.<br />

• Security: You must develop applications that take advantage of current<br />

security transaction technologies, such as S-HTTP, SSL and e-money. If you<br />

Chapter 6. Electronic Commerce 175


This soft copy for use by <strong>IBM</strong> employees only.<br />

have a site that use these standardized technologies you are able to provide<br />

service to customers using various types of browsers.<br />

• Database server: This is a vital server where all information about product<br />

availability, customer information, prices, etc. will be stored. Always look for<br />

upgradeable servers. Take care when choosing database software. Some<br />

databases have limitations when used with Web-integrated environments.<br />

The <strong>IBM</strong> Web servers can be easily integrated with DB/2 servers running on<br />

OS/2, Windows NT, RS/6000, AS/400 and mainframes. The <strong>IBM</strong> servers also<br />

support CICS integration.<br />

• Firewall: The firewall is a vital part of this solution, because it provides the<br />

security for the internal LAN and to the internal servers, such as the<br />

database server.<br />

You can connect the headquarters LAN, where all the information-critical servers<br />

are located, to remote LANs at stock and delivery sites. This ensures that<br />

customers receive quick, reliable information based on an integrated logistics<br />

system.<br />

All computers on the internal LAN will be able to access the Internet using all<br />

resources, such as e-mail, WWW, Gopher, FTP, Telnet, etc.<br />

Table 26 (Page 1 of 2). Example Electronic Commerce Solution Specifications<br />

Resource Software requirements Hardware requirements<br />

Firewall • AIX 4.1.4<br />

• <strong>IBM</strong> Secure Network Gateway<br />

for AIX<br />

• Two LAN interfaces<br />

configured and running<br />

• <strong>IBM</strong> RS/6000 Model 43P<br />

• PowerPC 133 Mhz CPU<br />

• 64 MB RAM<br />

• 4.0 GB hard disk<br />

• Two LAN adapters<br />

External network Ethernet 10Base-T recommended,<br />

using <strong>IBM</strong> 8222 or <strong>IBM</strong> 8224 hubs<br />

Option #1 - Windows NT server • Windows NT 3.5.1 or later<br />

• <strong>IBM</strong> Internet Connection<br />

Secure Server<br />

• <strong>IBM</strong> Net.Commerce Server<br />

for Windows NT<br />

• <strong>IBM</strong> WWW DB/2 Gateway for<br />

Windows NT<br />

• TCP/IP configured and<br />

running<br />

• LAN interface configured and<br />

running<br />

• MS-Internet Explorer or<br />

Netscape Navigator 2.0<br />

176 The Technical Side of Being an Internet Service Provider<br />

• <strong>IBM</strong> PC Server 310<br />

• Pentium 90Mhz CPU<br />

• 32 MB RAM<br />

• 2.0 GB hard disk<br />

• LAN adapter<br />

• DAT backup tape<br />

• CD-ROM unit


This soft copy for use by <strong>IBM</strong> employees only.<br />

Table 26 (Page 2 of 2). Example Electronic Commerce Solution Specifications<br />

Resource Software requirements Hardware requirements<br />

Option #2 - <strong>IBM</strong> AIX server • <strong>IBM</strong> AIX 4.1 or later<br />

• <strong>IBM</strong> Internet Connection<br />

Secure Server<br />

• <strong>IBM</strong> Net.Commerce Server<br />

for Windows NT<br />

• <strong>IBM</strong> WWW DB/2 Gateway for<br />

Windows NT<br />

• TCP/IP configured and<br />

running<br />

• LAN interface configured and<br />

running<br />

• <strong>IBM</strong> WebExplorer or Netscape<br />

Navigator 2.0<br />

Database server • <strong>IBM</strong> AIX 4.1 or later<br />

• <strong>IBM</strong> DB/2 Database server for<br />

AIX<br />

• TCP/IP configured and<br />

running<br />

• LAN interface configured and<br />

running<br />

• <strong>IBM</strong> RS/6000 Model C10<br />

• PowerPC 120 Mhz CPU<br />

• 64 MB RAM<br />

• 4.0 GB hard disk<br />

• LAN adapter<br />

• DAT backup tape<br />

• CD-ROM unit<br />

• <strong>IBM</strong> RS/6000 Model C10<br />

• PowerPC 120 Mhz CPU<br />

• 64 MB RAM<br />

• 6.0 GB hard disk<br />

• LAN adapter<br />

• DAT backup tape<br />

• CD-ROM unit<br />

Router IP routing support level • <strong>IBM</strong> 2210 Model 12E<br />

• 8MB RAM<br />

Leased line You can use microwave radio,<br />

satellite, common leased-lines,<br />

ISDN, etc. The minimum<br />

recommended link speed is 128<br />

kbps<br />

Provider <strong>IBM</strong> Global Network services<br />

Table 27. Client Specifications on the Internal LAN<br />

Resource Software requirements Hardware requirements<br />

LAN client • <strong>IBM</strong> DOS, OS/2, AIX,<br />

MS-DOS, Windows 3.x, 95 or<br />

NT<br />

• TCP/IP configured and<br />

running<br />

• LAN interface configured and<br />

running<br />

• Browser compatible with the<br />

operating system<br />

• <strong>IBM</strong> PC or compatible<br />

• 486DX4 or Pentium CPU<br />

• 8 MB RAM<br />

• 500 MB hard disk<br />

• LAN adapter<br />

Chapter 6. Electronic Commerce 177


178 The Technical Side of Being an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.


This soft copy for use by <strong>IBM</strong> employees only.<br />

Chapter 7. Tools<br />

7.1 Multimedia<br />

7.1.1 Image Formats<br />

If an Internet Service Provider is considering offering more than just plain access<br />

to the Internet, learning about the Internet environment can not be avoided. It is<br />

necessary to understand which aspects of the Internet can be utilized to<br />

implement new services. These include, as a minimum, numerous multimedia<br />

applications that are preconfigured to run over the Net and can range to various<br />

means of programming local applications. These can be used to implement new<br />

services, such as interactive presentations, distance learning, conferencing and<br />

entertainment.<br />

This section gives you an overview of the multimedia concepts and terms used<br />

in the Internet environment.<br />

The following are common image formats on the Internet.<br />

7.1.1.1 JPEG Image Format<br />

JPEG (pronounced jay-peg) is a standardized image compression mechanism.<br />

JPEG stands for Joint Photographic Experts Group, the original name of the<br />

committee that wrote the standard. All graphical browsers support the JPEG<br />

format. JPEG is designed for compressing either full-color or gray-scale images<br />

of natural, real-world scenes. It works well on photographs, naturalistic artwork,<br />

and similar material, but not so well on lettering, simple cartoons, or line<br />

drawings.<br />

JPEG handles only still images, but there is a related standard called MPEG for<br />

motion pictures. JPEG is lossy, meaning that the decompressed image isn′t<br />

quite the same as the one with which you started. There are lossless image<br />

compression algorithms, but JPEG achieves much greater compression than is<br />

possible with lossless methods.<br />

JPEG is designed to exploit known limitations of the human eye, notably the fact<br />

that small color changes are perceived less accurately than small changes in<br />

brightness. Thus, JPEG is intended for compressing images that will be looked<br />

at by humans. If you plan to machine-analyze your images, the small errors<br />

introduced by JPEG may be a problem for you, even if they are invisible to the<br />

eye.<br />

A useful property of JPEG is that the degree of lossiness (loss resolution) can be<br />

varied by adjusting compression parameters. This means that the image maker<br />

can trade off file size against output image quality. You can make extremely<br />

small files if you don′t mind poor quality; this is useful for applications such as<br />

indexing image archives. Conversely, if you aren′t happy with the output quality<br />

at the default compression setting, you can jack up the quality until you are<br />

satisfied and accept lesser compression.<br />

Another important aspect of JPEG is that decoders can trade off decoding speed<br />

against image quality by using fast but inaccurate approximations to the required<br />

calculations. Some viewers obtain remarkable speedups in this way. There are<br />

© Copyright <strong>IBM</strong> Corp. 1997 179


This soft copy for use by <strong>IBM</strong> employees only.<br />

two good reasons to use JPEG against other formats: to make your image files<br />

smaller, and to store 24-bit-per-pixel color data instead of 8-bit-per-pixel data.<br />

Making image files smaller is a win for transmitting files across networks and for<br />

archiving libraries of images. Being able to compress a 2-MB full-color file down<br />

to, for example, 100 KB makes a big difference in disk space and transmission<br />

time. JPEG can easily provide 20:1 compression of full-color data. If you are<br />

comparing GIF and JPEG, the size ratio is usually more like 4:1.<br />

If your viewing software doesn′t support JPEG directly, you′ll have to convert<br />

JPEG to some other format to view the image. Even with a JPEG-capable<br />

viewer, it takes longer to decode and view a JPEG image than to view an image<br />

of a simpler format such as GIF. Thus, using JPEG is essentially a time/space<br />

trade-off: you give up some time in order to store or transmit an image more<br />

cheaply. But it′s worth noting that when network or telephone transmission is<br />

involved, the time savings from transferring a shorter file can be greater than the<br />

time needed to decompress the file.<br />

The second fundamental advantage of JPEG is that it stores full color<br />

information: 24 bits/pixel (16 million colors). GIF, the other image format widely<br />

used on the Net, can only store 8 bits/pixel (256 or fewer colors). GIF is<br />

reasonably well matched to inexpensive computer displays. Most run-of-the-mill<br />

PCs can display no more than 256 distinct colors at once. But full-color<br />

hardware is getting cheaper all the time, and JPEG images look much better<br />

than GIFs on such hardware. Within a couple of years, GIF will probably seem<br />

as obsolete as the black-and-white MacPaint format does today. Furthermore,<br />

JPEG is far more useful than GIF for exchanging images among people with<br />

widely varying display hardware, because it avoids prejudging how many colors<br />

to use. Hence, JPEG is considerably more appropriate than GIF for use as a<br />

USENET and World Wide Web standard format.<br />

Many people are scared off by the term lossy compression. But when it comes<br />

to representing real-world scenes, no digital image format can retain all the<br />

information that impinges on your eyeball. By comparison with the real-world<br />

scene, JPEG loses far less information than GIF. The real disadvantage of lossy<br />

compression is that if you repeatedly compress and decompress an image, you<br />

lose a little quality each time.<br />

JPEG does not support transparency and is not likely to do so any time soon. It<br />

turns out that adding transparency to JPEG would not be a simple task. The<br />

traditional approach to transparency, as found in GIF and some other file<br />

formats, is to choose one otherwise-unused color value to denote a transparent<br />

pixel. That can′t work in JPEG because JPEG is lossy; a pixel won′t necessarily<br />

come out the exact same color that it started. Normally, a small error in a pixel<br />

value is OK because it affects the image only slightly. But if it changes the pixel<br />

from transparent to normal or vice versa, the error would be highly visible and<br />

annoying, especially if the actual background were quite different from the<br />

transparent color.<br />

A more reasonable approach is to store an alpha channel (transparency<br />

percentage) as a separate color component in a JPEG image. That could work<br />

since a small error in alpha makes only a small difference in the result. The<br />

problem is that a typical alpha channel is exactly the sort of image that JPEG<br />

does very badly on: lots of large flat areas and sudden jumps. You′d have to<br />

use a very high quality setting for the alpha channel. It could be done, but the<br />

penalty in file size is large. A transparent JPEG done this way could easily be<br />

180 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

double the size of a non-transparent JPEG. That′s too high a price to pay for<br />

most uses of transparency.<br />

The only real solution is to combine lossy JPEG storage of the image with<br />

lossless storage of a transparency mask using some other algorithm.<br />

Developing, standardizing, and popularizing a file format capable of doing that is<br />

not a small task and transparency doesn′t seem worth that much effort.<br />

7.1.1.2 GIF Image Format<br />

The GIF image format uses a built-in LZW compression algorithm. This<br />

compression algorithm is patented technology and currently owned by Unisys<br />

Corporation. As of 1995, Unisys decided that commercial vendors, whose<br />

products use the GIF LZW compression, must license its use from Unisys. End<br />

users, online services, and non-profit organizations do not pay this royalty.<br />

Since its inception, GIF has been a royalty-free format. Only as of 1995 did<br />

Unisys decide to collect royalties. To avoid this royalty, vendors have developed<br />

an alternative to GIF that supports transparency and interlacing called PNG<br />

(ping), the Portable Network Graphic. To our knowledge PNG, however, does not<br />

support a multiple image data stream.<br />

The GIF87a allowed for the following features:<br />

• LZW compressed images<br />

• Multiple images encoded within a single file<br />

• Positioning of the images on a logical screen area<br />

• Interlacing<br />

This means that nine years ago it was possible to do simple animation with GIFs<br />

by encoding multiple images, what we refer to as frames, in a single file. GIF89a<br />

is an extension of the 87a spec. GIF89a added:<br />

• How many 100ths of a second to wait before displaying the next frame<br />

• Wait for user input<br />

• Specify transparent color<br />

• Include unprintable comments<br />

• Display lines of text<br />

• Indicate how the frame should be removed after it has been displayed<br />

• Application-specific extensions encoded inside the file<br />

Netscape Navigator is the only browser than comes close to full GIF89a<br />

compliance. The lines of text and user input are not currently supported in<br />

Navigator 2.0, and the image removal doesn′t support removal by the previous<br />

image. Most browsers support single image GIF87a and will only recognize the<br />

transparency flag of GIF89a.<br />

GIF89a is still a 256-color (maximum) format. GIF allows for any number of<br />

colors between 2 and 256. The fewer the colors the less data and the smaller<br />

the graphic files. If your GIF only uses four colors, you can reduce the palette to<br />

only 2 bits (4 color) and decrease the file size by upwards of 75%.<br />

The following software lets you set bits-per-pixel for GIFs:<br />

• Adobe Photoshop<br />

Chapter 7. Tools 181


• Fractal Painter<br />

• Painter 2.0<br />

• PhotoStudio<br />

• PhotoGIF<br />

• PaintShop Pro<br />

• PaintIt<br />

• WebImage<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

GIFs are composed of blocks and extensions. Blocks can be classified into three<br />

groups:<br />

• Control<br />

• Graphic-Rendering<br />

• Special Purpose<br />

Control blocks, such as the header, the logical screen descriptor, the graphic<br />

control extension and the trailer, control how the graphic data is handled.<br />

Graphic-rendering blocks such as the image descriptor and the plain text<br />

extension contain data used to render a graphic. Special purpose blocks such<br />

as the comment extension and the application extension are not used by GIF<br />

decoders at all. The logical screen descriptor and the global color table affect<br />

all the images in a single file. Each control block will only affect a single image<br />

block that immediately follows it. A GIF file contains a global palette of common<br />

colors for all the images in its file to work from. This palette can have 2, 4, 8, 16,<br />

32, 64, 128, or 256 defined colors. Palettes are very important. Every color<br />

displayed in your GIF must come from a palette. The fewer colors used, the<br />

easier it will be for systems to display your images. The global palette is<br />

applied to all images in a GIF file. If an individual image differs greatly from that<br />

global palette, it may have a local palette that affects its color only. However, no<br />

image can every reference more than one palette, so 256 colors per image is the<br />

maximum. Having a bunch of local palettes with wildly varied colors can<br />

sometimes cause color shifts in your display.<br />

The following are the benefits of using GIF images:<br />

• All the benefits of GIF: transparency, compression, interlacing, 2, 4, 8, 16, 32,<br />

64, 128 and 256 color palettes for optimum size and compression.<br />

• Supported by the basic Netscape product and no plug-ins or additional<br />

software. Tested on Win 3.1x, Win95, Mac, UNIX, Sun, Linux, and Irix.<br />

• Web designer does not need access to Internet provider′s Web server,<br />

server-side includes (SSI), or CGI/PERL scripting. If you have a program that<br />

can make multi-image 89a GIFs, you can make this animation.<br />

• The animation is repeatable and reusable. You can place the same image<br />

on a page multiple times. It performs a single download for all and loops all<br />

from the cache.<br />

• The animation only loads once, so your modem doesn′t keep downloading<br />

constantly. It is faster than server-reliant methods.<br />

• The animations are surprisingly compact.<br />

• Anyone can use them on their page. Anyone with a Web page can include<br />

this animation. In fact, if you save any of the animated GIFs to your hard<br />

182 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

7.1.2 Audio File Formats<br />

drive, you will have the entire animation to put in your own pages. Please<br />

contact the creator for usage.<br />

• Works like any other GIF; include on your page in an IMG or FIG tag, even<br />

anchor it; it works invisibly.<br />

The following are the limitations of using GIF:<br />

• All the limitations of GIFs: maximum of 256 colors, photographs are better<br />

compressed by JPEG.<br />

• Only plays in Netscape 2.0 or higher, but does work with many platforms<br />

(Windows, Mac, UNIX, etc.).<br />

• Will play once or continuously. Refresh will not play the image again, but<br />

reload or resizing the windows will. If the viewer returns back to the page<br />

from elsewhere, the image will play, even if cached. Later revisions of<br />

Navigator may support finite iterations of the animations.<br />

• It cannot be used as a background GIF. Only the first frame will display.<br />

Compuserve released the technical specification for GIF89a in July of 1989. The<br />

technical specification is an exact breakdown of the byte-for-byte structure and<br />

rules for interpreting and building this format.<br />

Historically, almost every type of machine used its own file format for audio data,<br />

but some file formats are more generally applicable. In general, it is possible to<br />

define conversions between almost any pair of file formats. However,<br />

sometimes you lose information.<br />

File formats are a separate issue from device characteristics. There are two<br />

types of file formats: self-describing formats, where the device parameters and<br />

encoding are made explicit in some form of header, and raw formats, where the<br />

device parameters and encoding are fixed.<br />

Self-describing file formats generally define a family of data encodings, where a<br />

header field indicates the particular encoding variant used. Headerless formats<br />

define a single encoding and usually allow no variation in device parameters<br />

(except sometimes sampling rate, which can be hard to figure out other than by<br />

listening to the sample). The header of self-describing formats contains the<br />

parameters of the sampling device and sometimes other information (for<br />

example, a human-readable description of the sound, or a copyright notice).<br />

Most headers begin with a simple magic word. Some formats do not simply<br />

define a header format, but may contain chunks of data intermingled with chunks<br />

of encoding information. The data encoding defines how the actual samples are<br />

stored in the file (for example, signed or unsigned, as bytes or short integers, in<br />

little-endian or big-endian byte order, etc.). Strictly spoken, channel interleaving<br />

is also part of the encoding, although so far we have seen little variation in this<br />

area. Some file formats apply some kind of compression to the data (for<br />

example, Huffman encoding or simple silence deletion).<br />

Here′s an overview of popular file formats.<br />

Table 28 (Page 1 of 2). Popular Audio File Formats<br />

Extension, name Origin Variable parameters<br />

au or snd NeXT, Sun rate, #channels, encoding, info string<br />

Chapter 7. Tools 183


This soft copy for use by <strong>IBM</strong> employees only.<br />

Table 28 (Page 2 of 2). Popular Audio File Formats<br />

Extension, name Origin Variable parameters<br />

aif(f), AIFF Apple, SGI rate, #channels, sample width, lots of info<br />

aif(f), AIFC Apple, SGI same (extension of AIFF with<br />

compression)<br />

iff, IFF/8SX Amiga rate, #channels, instrument info (8 bits)<br />

voc Soundblaster rate (8 bits/1 ch; can use silence deletion)<br />

wav, WAVE Microsoft rate, #channels, sample width, lots of info<br />

sf IRCAM rate, #channels, encoding, info<br />

none, HCOM Mac rate (8 bits/1 ch; uses Huffman<br />

compression)<br />

mod or nst Amiga (see below)<br />

Note that the file name extension .snd is ambiguous; it can be either the<br />

self-describing NeXT format or the headerless Mac/PC format, or even a<br />

headerless Amiga format.<br />

IFF/8SVX allows for amplitude contours for sounds (attack, decay, etc).<br />

Compression is optional (and extensible) and volume (author, notes and<br />

copyright properties, etc.) is variable.<br />

AIFF, AIFC and WAVE are similar in spirit but allow more freedom in encoding<br />

style (other than 8 bit/sample), amongst others.<br />

There are other sound formats in use on Amiga by digitizers and music<br />

programs, such as IFF/SMUS.<br />

DEC systems use a variant of the NeXT format that uses little-endian encoding<br />

and has a different number.<br />

Standard file formats used in the CD-I world are IFF, but on the disc they are in<br />

real-time files.<br />

An interesting interchange format for audio data is described in the proposed<br />

Internet Standard MIME, which describes a family of transport encodings and<br />

structuring devices for electronic mail. This is an extensible format, and initially<br />

standardizes a type of audio data dubbed audio/basic, which is 8-bit U-LAW data<br />

sampled at 8000 samples/sec.<br />

Finally, a somewhat different but popular format are MOD files, usually with the<br />

extension .mod or .nst. (They can also have a prefix of mod.) This originated at<br />

the Amiga but players now exist for many platforms. MOD files are music files<br />

containing two parts:<br />

1. A bank of digitized samples<br />

2. A sequencing information describing how and when to play the samples<br />

7.1.3 Musical Instruments Digital Interface (MIDI)<br />

This international standard for digital music was established in 1982. It specifies<br />

the cabling and hardware required for connecting electronic musical instruments<br />

and computer systems. MIDI also specifies a communication protocol for<br />

passing data from one MIDI device to another. Any musical instrument can<br />

become an MIDI device by having the correct hardware interfaces and MIDI<br />

messages processing capabilities. Devices communicate with each other by<br />

sending messages that are digital representations of a musical score. MIDI data<br />

may include items such as sequences of notes, timings, instrument designations<br />

and volume settings. The standard multimedia platform can play MIDI files<br />

184 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

through either internal or external synthesizers. External MIDI devices are<br />

connected to the computer via the sound card′s MIDI port. MIDI expands the<br />

audio options available when developing multimedia. Use of MIDI is attractive<br />

because MIDI files require minimal storage space compared to digitized audio<br />

files, such as .WAV files.<br />

MIDI ports are used to send and receive MIDI data. There can be many MIDI<br />

ports installed in a system. Each MIDI port contains an MIDI IN, MIDI OUT, and<br />

MIDI THRU connection. MIDI IN receives messages sent from other MIDI<br />

devices. MIDI OUT transmits messages that are originating from the local<br />

device to other MIDI systems. MIDI THRU forwards messages that were<br />

received by the MIDI IN to other devices. Each port can handle 16 MIDI<br />

channels. A synthesizer is the device that produces sound. Generally it has a<br />

built-in keyboard. There are several different methods used in synthesizer<br />

technology to produce musical instrument sounds. By altering standard wave<br />

forms, such as the sine wave, a variety of sounds can be produced. Another<br />

method of producing sound is by playing back stored samples of real<br />

instruments. The newest synthesizer technology employs powerful computer<br />

technology to emulate musical instruments via mathematical algorithms that<br />

represent certain aspects of an instrument (for example, a bowed string, pipe<br />

blown). This technology gives musicians the ability to play a realistic instrument<br />

performance. New virtual instruments can also be created (for example, a<br />

saxophone that sounds when you blow in one end).<br />

There are two common standard types of synthesizers. They fall into the<br />

category of either extended or base devices.<br />

• A base level synthesizer device only supports channels/tracks 13-16. The<br />

first three of these channels are used for the main song parts (for example,<br />

bass, rhythm, and melody). Channel 16 is used as a percussive track (for<br />

example, drums). All MPC systems should support the base level.<br />

• Extended level devices support tracks 1-10. The first nine are for melodic<br />

tracks while the tenth is used for percussion.<br />

Most modern synthesizers allow all 16 tracks to be utilized and it doesn′t matter<br />

which tracks are used for which instruments.<br />

7.1.3.1 General MIDI Standard<br />

When assigning various instruments to each track in a MIDI recording, a patch<br />

number is used to specify the instrument or sound to use. To help standardize<br />

which instruments should be located on individual patch numbers, the general<br />

MIDI specification was developed by the MIDI Manufacturer′s Association (MMA).<br />

7.1.3.2 MIDI Mapper<br />

The MIDI Mapper, which is configured from the control panel, allows<br />

non-standard MIDI devices to have their instrument patch numbers reassigned<br />

(mapped) to conform to the general MIDI specifications. Percussion key<br />

assignments can also be altered.<br />

Chapter 7. Tools 185


7.1.4 Digital Movie Formats<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

7.1.3.3 MIDI Sequencer<br />

A sequencer system is used to record, edit and playback MIDI messages. The<br />

sequencer fundamentally acts like a multitrack tape recorder for MIDI<br />

instruments. On a computer system the sequencing functions are run by<br />

software applications.<br />

7.1.3.4 When to Use MIDI<br />

MIDI is a great alternative to digital audio in the following circumstances:<br />

• File size is a major consideration.<br />

files.<br />

MIDI files are far smaller than wave data<br />

• Digital audio will not perform properly. This is often due to the lack of<br />

system resources, such as CPU power, disk speed or available RAM.<br />

• You do not require speech overlay.<br />

• Sound quality may be better than digital audio in some cases. This occurs<br />

when you have a high-quality MIDI sound source.<br />

• MIDI can be more interactive. MIDI data can be easily manipulated. Details<br />

of a composition can be re-arranged.<br />

• Time scaling can be effected without loss of quality or pitch.<br />

7.1.3.5 Storage Formats<br />

MIDI data can be stored in three different formats: 0, 1, and 2. Multimedia on the<br />

Windows PC can only work with formats 0 and 1. Most sequencers can export to<br />

these formats. Type 0 is a single track format and is especially good for<br />

CD-ROM because it reduces the number of disc seeks and uses less RAM. Type<br />

1 format is for multiple track storage. Both formats have a .MID file extension.<br />

Digital movie files are multimedia files that integrate sounds, music, and voices<br />

with computer graphics and animation to present information in an exciting,<br />

dynamic way.<br />

Movies are made up of a series of still images played in sequence. Each image<br />

is called a frame. The number of frames per second is called frame rate, at<br />

which a movie is played or recorded.<br />

The movies you can play on your computer are probably different from what you<br />

see in the cinema or on TV. Most movie files you can get from the FTP sites are<br />

presented in a small window in your computer screen, and they can only be<br />

played several minutes, or several seconds. This is because movie files are<br />

huge files that take a lot of disk space. If you have a very powerful computer,<br />

you will be able to see the real movies on your screen. Actually, some<br />

commercial products that can create and play back good quality movies on your<br />

computer are already available in the market. If you don′t want to invest your<br />

money on these products until you know what they look like, you can get the<br />

product demos from the companies′ FTP sites for free.<br />

186 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

7.1.4.1 What You Need to Play Movie Files<br />

To play movie files on your computer, you need a relatively powerful computer.<br />

Hardware requirements:<br />

• Your microprocessor central processing unit, or CPU, must be a 16-Mhz<br />

386SX or higher. A true 32-bit microprocessor such as the 486 is better<br />

because it can process and transfer larger amounts of data quickly.<br />

• Your computer must have at least 4 MB of RAM.<br />

memory you have, the better.<br />

Of course, the more<br />

• The minimum hard disk size is 30 MB; however 80 to 200 MB hard disk<br />

drives are recommended. Slow hard disk access time can degrade<br />

multimedia performance. A 3.5-inch high-density (1.44 MB) floppy disk drive<br />

is also required.<br />

• A sound card with a pair of external speakers or a set of headphones is<br />

required to play digitized sound files in high-quality stereo format.<br />

• A VGA video board capable of at least 16 colors at 640x480 resolution. Most<br />

standard video boards and monitors meet this requirement. Support for 256<br />

colors is recommended.<br />

Software requirements:<br />

• Audio device drivers for different audio formats<br />

• A video device driver<br />

• Multimedia playback software, and multimedia players<br />

7.1.4.2 Movie File Formats<br />

Like other files, you can identify movie files by their file extensions. There are<br />

only a few movie file formats you can see from the Internet, which are<br />

international standard file formats for multimedia.<br />

MPEG: MPEG is a very popular movie file format for PCs. MPEG stands for<br />

Moving Pictures Expert Group. The members of this group come from more than<br />

70 companies and institutions worldwide including Sony, Philip, Matsushita and<br />

Apple. They meet under the International Standard Organization (ISO) to<br />

generate digital video standards for compact discs, cable TV, direct satellite<br />

broadcast and high-definition television. MPEG meets about four times a year<br />

for roughly a week each time. They have completed the committee draft of<br />

MPEG phase I that is called MPEG I. MPEG I defines a bit stream for<br />

compressed video and audio optimized to fit into a data rate of 1.5 Mbps. MPEG<br />

deals with three issues: video, audio, and system (the combination of the two<br />

into one stream). MPEG is developing the MPEG-2 Video Standard, which<br />

specifies the coded bit stream for high-quality digital video. As a compatible<br />

extension, MPEG-2 Video builds on the completed MPEG-1 Video Standard by<br />

supporting interlaced video formats and a number of other advanced features.<br />

Since MPEG deals with three issues, the file extensions by MPEG standards are<br />

a little bit different. The most common file extension is .mpg. You will also see:<br />

• .mp2 - MPEG II audio<br />

• .mps - MPEG system<br />

• .mpa - MPEG audio<br />

Chapter 7. Tools 187


This soft copy for use by <strong>IBM</strong> employees only.<br />

Apple QuickTime: QuickTime is an ISO standard for digital media. It was<br />

originally created by Apple Computer Inc. and used in Macintosh. It brings<br />

audio, animation, video, and interactive capabilities to personal computers and<br />

consumer devices. QuickTime movies are real movies. This standard is much<br />

more mature than the MPEG standard. In December 1993, Apple announced that<br />

it had begun demonstrating technology that will make future television and<br />

multimedia devices more compelling, interactive, and useful for people.<br />

Specifically, Apple demonstrated the integration of MPEG technology into<br />

applications using QuickTime technology. QuickTime for Windows is available<br />

for customers who use Microsoft′s Windows/DOS operating system. QuickTime<br />

movies have file extension .qt and .mov. You can play the .mov files on both<br />

MACs and PCs.<br />

Other Multimedia Video Formats: There are other multimedia file formats. For<br />

example, AVI is a video format for Microsoft Windows, and .awa/.awm are Gold<br />

Disk Animation. More and more .avi files are available on the Internet. If you<br />

have Windows in your computer, you can use Media Player to play (.avi) files.<br />

Media Player is in the Windows′ accessories group.<br />

7.1.4.3 Movie Players<br />

To play a movie on your computer, you need a piece of software called a<br />

multimedia player, specifically, MPEG player or QuickTime player. These<br />

players are also called decoders because they decode the MPEG or QuickTime<br />

compressed codes. Some software allows you to both encode and decode<br />

multimedia files (for example, to make and play the files). Some software only<br />

allows you to play back multimedia files. You have to be very careful to find the<br />

correct movie player when you get on the Information Highway. This is because<br />

different computers or operating systems use different movie players. There are<br />

more movie players for X-Windows and Macintosh machines than for PCs. You<br />

run your movie player on your computer and open the movie file within the<br />

movie player. Movies on floppy disks should be copied to your hard disk before<br />

you play them.<br />

7.1.5 Multimedia Applications on the Internet<br />

The following area covers some selected multimedia applications that are<br />

available on the Internet.<br />

7.1.5.1 Audio On-Demand<br />

It is now possible to deliver audio in real-time, on demand, and over the World<br />

Wide Web. Indeed it is not only possible; with the advent of faster connections<br />

and greater modem speeds, it has become easy. There is a profusion of audio<br />

streaming technologies available, such as:<br />

• RealAudio<br />

• Internet Wave<br />

• TrueSpeech<br />

• ToolVox<br />

• AudioLink<br />

• MPEG/CD<br />

• Streamworks<br />

• VDO<br />

188 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

• LiveMedia<br />

RealAudio still stands head and shoulders above the others in terms of<br />

availability and use but is not an obviously superior product in sound quality and<br />

speed. It is the only audio-on-demand software that is currently shipped with<br />

Netscape Navigator as a plug-in, and Progressive Networks (developers of<br />

RealAudio) have announced a collaboration with Microsoft.<br />

However, VDOLive and ToolVox are also available as plug-ins and other<br />

streaming products are likely to follow. It is by no means certain which of the<br />

current crop is going to end up as a standard or, indeed, if there is going to be<br />

one. As it becomes easier to download software interactively from the Web,<br />

there may be less of a need for any one standard to emerge.<br />

7.1.5.2 Video Conference<br />

Video is a sequence of still images. When presented at a high enough rate, the<br />

sequence of images (frames) gives the illusion of fluid motion. For instance, in<br />

the United States, movies are presented at 24 frames per second (fps) and<br />

television is presented at 30 fps. Desktop videoconferencing uses video as an<br />

input. This video may come from a camera, VCR, or other video device. An<br />

analog video signal must be encoded in the digital form so that it can be<br />

manipulated by a computer.<br />

To understand digital encoding, it helps to understand some background<br />

information about analog video, including basic color theory and analog<br />

encoding formats. Analog video is digitized so that it may be manipulated by a<br />

computer. Each frame of video becomes a two-dimensional array of pixels. A<br />

complete color image is composed of three image frames, one for each color<br />

component. Uncompressed images and video are much too large to deal with<br />

and compression is needed for storage and transmission. Important metrics of<br />

compression are the compression ratio and bits per pixel (the number of bits<br />

required to represent one pixel in the image). Video compression is typically<br />

lossy, meaning some of the information is lost during the compression step.<br />

This is acceptable though, because encoding algorithms are designed to discard<br />

information that is not perceptible to humans or information that is redundant.<br />

Some videoconference technologies available to use on the Internet include:<br />

• Network Video is an Internet videoconferencing tool developed at<br />

Xerox/PARC. It is the most commonly used video tool on the Internet<br />

MBone. The native nv encoding technique utilizes spatial (intraframe) and<br />

temporal (interframe) compression. The first step of the nv algorithm<br />

compares the current frame to the previous frame and marks the areas that<br />

have changed significantly. Each area that has changed is compressed<br />

using transform encoding.<br />

Either a DCT or a Haar wavelet transform is used. The nv encoder<br />

dynamically selects which transform is used based on whether network<br />

bandwidth (use DCT) or local computation (use Haar) is limiting the<br />

performance. The DCT is desired since it almost doubles the compression<br />

ratio. The output of the transform is quantized and run-length encoded.<br />

Periodically, unchanged parts of the image are sent at higher resolution,<br />

which is achieved by eliminating the quantization step. Typically, nv can<br />

achieve compression ratios of 20:1 or more.<br />

Chapter 7. Tools 189


This soft copy for use by <strong>IBM</strong> employees only.<br />

• CU-SeeMe is an Internet videoconferencing tool developed at Cornell<br />

University. It utilizes spatial (intraframe) and temporal (interframe)<br />

compression, with a few twists to optimize performance on a Macintosh, its<br />

original platform. CU-SeeMe represents video input in 16 shades of grey<br />

using 4 bits per pixel. The image is divided into 8x8 blocks of pixels for<br />

analysis. New frames are compared to previous frames, and if a block has<br />

changed significantly it is retransmitted. Blocks are also retransmitted on a<br />

periodic basis to account for losses that may have occurred in the network.<br />

Figure 65. Videoconference Screen Shots Using Cu-SeeMe (Cornell University)<br />

Transmitted data is compressed by a lossless algorithm developed at<br />

Cornell that exploits spatial redundancy in the vertical direction. The<br />

compressed size is about 60% of the original (a 1.7:1 compression ratio).<br />

The CU-SeeMe encoding algorithm was designed to run efficiently on a<br />

Macintosh computer, and operates on rows of eight 4-bit pixels as 32-bit<br />

words, which works well in 680x0 assembly code. The default transmitting<br />

bandwidth setting for CU-SeeMe is 80 kbps. This number is automatically<br />

adjusted on the basis of packet-loss reports returned by each person<br />

receiving the video. About 100 kbps is required for fluid motion in a typical<br />

talking heads scenario.<br />

• Indeo is a video compression technique designed by Intel. It evolved from<br />

Digital Video Interactive (DVI) technology. Indeo starts off with YUV input,<br />

with U and V subsampled 4:1 both horizontally and vertically. Indeo supports<br />

motion estimation, using the previous frame to predict values for the current<br />

frame and only transmitting data if the difference is significant. Transform<br />

encoding is done using an 8x8 Fast Slant Transform (FST) in which all<br />

operations are either shifts or adds (no multiplies). Quantization and<br />

run-length/entropy encoding are used as in previous algorithms. Indeo<br />

specifies that the encoded bit stream be a maximum of 60% of the input<br />

data, therefore compression is guaranteed to be at worst 1.7:1.<br />

190 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

7.2 Java<br />

Desktop Video-Conferencing Systems: There are three major platforms for<br />

desktop videoconferencing products: Intel-based personal computers running<br />

Microsoft Windows or <strong>IBM</strong> OS/2, Apple Macintosh computers, and UNIX-based<br />

workstations running the X Window System. Unfortunately, there is currently<br />

very little interoperability among products and platforms. Products are evolving<br />

towards conformance to the emerging desktop videoconferencing interoperability<br />

standards. All systems require hardware that captures and digitizes the audio<br />

and video. Video is typically input in NTSC or PAL formats.<br />

Most systems have some sort of graphical user interface that assists in making<br />

connections to other parties, usually utilizing the paradigm of placing a<br />

telephone call. Many products allow you to store information about other parties<br />

in a phone book or Rolodex format. Systems commonly have controls to adjust<br />

audio volume, picture contrast, etc. Many systems have controls that allow you<br />

to adjust the transmitted bandwidth for video to minimize traffic on a network.<br />

An additional feature found in most systems is a shared drawing area usually<br />

called a whiteboard which is analogous to the whiteboards found in many<br />

conference rooms and classrooms. These whiteboards commonly allow<br />

participants to import other graphics such as images and to make annotations.<br />

Whiteboards are good for simple sketches, but fine detail is difficult to achieve<br />

using a mouse.<br />

Many systems allow an easy way to transfer files between participants. Some<br />

systems allow application sharing, which enables a participant to take control of<br />

an application running on another participant′s computer. The usefulness of<br />

application sharing is often demonstrated with an example of sharing a<br />

spreadsheet or word processor program to facilitate group collaboration.<br />

Java is important because it brings to the computer society the binary<br />

compatibility that has been requested for a long time.<br />

All operating systems are incompatible with each other, including even<br />

programs for the same operating system on different hardware platforms.<br />

Sometimes this can be fixed with a standard language supported on all platforms<br />

(such as C and C++). You only have to use ANSI C code to make it portable,<br />

so you couldn′t make anything with the GUIs. The problem with interpreted<br />

languages was even worse, having no standardization (REXX has already an<br />

ANSI standard) and no GUI code portability.<br />

Java creates the concept of byte codes, which is a similar concept to the Virtual<br />

Machine on VM or the DOS Virtual Machine on OS/2. This translates from a set<br />

of codes previously declared (the API from DOS or the VM API) to the proper<br />

code for the operating system. Java has a Java Virtual Machine running in the<br />

operating system that responds to a code that is very similar to those on the<br />

computer processors. That′s why you have to compile it, and after that it has to<br />

be interpreted. The interpreter makes the translation faster than the regular<br />

interpreters because the classes (applications or applets) are in a similar code<br />

as the machine′s.<br />

The improvement on this is very simple. Now you have something very similar<br />

to a binary compatibility. Your code runs the same in OS/2, AIX or the Windows<br />

Chapter 7. Tools 191


7.2.1 Applets and Applications<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

32-bit family without recompiling it or changing something in the GUI code to<br />

keep the look and feel in all platforms.<br />

Java also provides a natural way to make object-oriented programming and one<br />

interface specially created to make applications for the World Wide Web using<br />

the browsers and extending the HTML language with the tag.<br />

Java is more than a tool to create cute pages on the WWW. It can be a tool to<br />

make client/server applications and stand-alone applications as well.<br />

The applications that already have the ability to run in a browser are called<br />

applets.<br />

The applications are not restricted in any way. You can do anything you want.<br />

You can run programs that read and write files, can make communications<br />

between two different machines (or more) using any port (using TCP/IP) and<br />

program your own protocol.<br />

When you are writing applets you are working in a restricted place.<br />

7.2.1.1 Applets Security Restrictions<br />

Sun allows people to try to break the security on both sides (server and client) of<br />

the applets in order to improve it. The restrictions are:<br />

1. Applets can not read or write from the file system. Except for those<br />

directories that the user defines in an access control list, it is empty by<br />

default. This list is specific for the browser you use, some browsers will not<br />

be allowed to read or write on the file system at all.<br />

2. Applets can only communicate with the server where the applet was stored.<br />

This restriction can also be avoided by the browser, so you can′t count on it.<br />

3. Applets can not run any program on the client system. For all UNIX systems<br />

this also includes forking a process.<br />

4. Applets can not load DLLs or native programs to the local platform.<br />

As you can see, almost all the security that Java provides is client-focused, so if<br />

you are planning to make an applet, you have to see about your server security.<br />

This is very important if you are planning to establish a communication between<br />

the client and the host. Avoid this approach if it is possible.<br />

192 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Chapter 8. Internet Security<br />

Many companies are thinking of connecting their internal corporate networks to<br />

the Internet, and for good reasons. There are many rewards associated with<br />

both increased visibility and the opportunity to run new types of applications.<br />

At the same time, companies are concerned with the security of their systems.<br />

The Internet is a collection of connected networks, but nobody really knows the<br />

structure of the Internet. The Internet keeps changing all of the time. There is<br />

no centralized network management and no single authority is in charge.<br />

All data crossing the Internet is passed “in the clear” such as user names,<br />

passwords, and e-mail messages. The entire company is exposed to the outside<br />

world.<br />

In this redbook, we take a layered approach to securing your ISP when attaching<br />

it to the Internet. We strongly recommend not connecting your ISP to the<br />

Internet until you are 100% sure that you have thoroughly reviewed security and<br />

that the TCP/IP applications you have chosen to use across the Internet are<br />

properly and securely configured.<br />

Network security is a key component of Internet security and in this chapter we<br />

provide some elements that will help you to evaluate the need for a firewall or<br />

not.<br />

This chapter provides a general overview of the security issues and risks when<br />

connecting to the Internet and the technologies available to cope with those<br />

security challenges.<br />

8.1 The Costs of Security Breaches<br />

Let’s take a quick look at how much poor security costs both business and the<br />

U.S. government each year. The size of the figures involved should help you<br />

concentrate on implementing the appropriate security measures at your own<br />

site.<br />

According to information released by the U.S. Senate’s Permanent Investigations<br />

Subcommittee, intruders cost big business more than US $800 million last year.<br />

In most cases, the attacks on their systems and the resulting losses were not<br />

reported to law-enforcement agencies for fear that an extended investigation<br />

with its attendant publicity would harm the corporation.<br />

The report indicates that the problem is worse in private industry than in<br />

government computer systems, with intruders concentrating on banks (always a<br />

popular target) and hospitals, where cases of record-altering are on the rise. Of<br />

the US $800 million losses, about half, or US $400 million, were incurred by U.S.<br />

companies and the rest by companies operating in other countries.<br />

According to this same report, there were an estimated 250,000 attacks on the<br />

U.S. Department of Defense computers last year, and the rate of attack is<br />

doubling every year. And these are the attacks that were detected. Who knows<br />

how many were either undetected or went unreported for other reasons. Recent<br />

© Copyright <strong>IBM</strong> Corp. 1997 193


8.2 The Internet and Security<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

attacks on unclassified U.S. Department of Defense computers are reportedly<br />

successful 65 percent of the time.<br />

Some of these attacks were considered of nuisance value only, but some were a<br />

serious threat to national security. One of the best documented took place<br />

during spring 1994 at an Air Force laboratory in Rome, NY. Two intruders made<br />

more than 150 trips into the lab’s computer systems, collecting passwords from<br />

outside users and then using these passwords to invade more than 100 other<br />

computers attached to the Internet. An investigation led to the arrest of one of<br />

the intruders, a 16-year-old boy living in London, England. The other intruder<br />

was never identified and never apprehended.<br />

The problem is certainly considered serious because more than 90 percent of<br />

the Pentagon’s daily traffic is carried by unclassified computer systems<br />

connected to the Internet, and anyone tampering with logistical information or<br />

shipping information could cause chaos to military operations.<br />

When intruders gain access to your Web site, they may do one of several things.<br />

They may deface your Web pages with a message such as “The system has<br />

been Cracked!” or they may erase your Web site pages and replace them with<br />

their own. Sites as diverse as the British government, the American<br />

Psychoanalytic Association, and the Nations of Islam have suffered from such<br />

attacks in the recent past.<br />

A few years ago, security wasn’t a major concern for most sites connected to the<br />

Internet. As far as the universities participating in the Internet were concerned,<br />

the basic premise was to provide free access to everything, and if a few people<br />

took advantage, that was the price you had to pay. Many universities on the<br />

Internet still follow this philosophy and impose few restrictions of any kind. Most<br />

control access with only a user ID and a password, and many still allow<br />

anonymous use of their systems; anyone can log on without a valid user ID and<br />

a password.<br />

The huge potential for commerce on the Internet has changed much of this<br />

thinking, and many system and network administrators now feel that any user of<br />

their site is a potential for intrusion. This is actually true. Therefore, they<br />

usually begin with the premise of “don’t trust anyone”. Today, this is definitely<br />

the best policy.<br />

8.2.1 Orange Book Security Classes<br />

Even with this attitude of openness, security has still been a big concern of the<br />

non-university types participating in the Internet. The Internet started out as the<br />

ARPAnet and was driven mainly by the U.S. Department of Defense. As such, it<br />

should be apparent that the Department of Defense would be very concerned<br />

about security, and it is. The Department of Defense has published several<br />

documents relating to security and security specifications.<br />

One of the better known is commonly called the Orange Book, which is a<br />

nickname for Department of Defense specifications called Department of Defense<br />

Trusted Computer System Evaluation Criteria, which has a standard number of<br />

5200.28. The purpose is to provide technical hardware, firmware, and software<br />

194 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

security criteria and associated technical evaluation methodologies in support of<br />

the overall automatic data processing system security policy model.<br />

The Orange Book breaks security levels into four basic parts: A, B, C, and D.<br />

These classes are defined as follows in increasing order of security:<br />

• Division D: Minimal protection; operating systems such as DOS and System<br />

7 for the Macintosh that have no system security fall into this category.<br />

• Division C: Discretionary protection; most of the commercially used<br />

operating systems claim to meet the Division C security, usually C2. There<br />

is a big difference between being C2 certified by the National Computer<br />

Security Center (NCSC) and claiming your operating system adheres to the<br />

published C2 guidelines.<br />

− Class (C1): Discretionary security protection - Features include the use<br />

of passwords or other authentication methods; the ability to restrict<br />

access to files, directories, and other resources, and the ability to<br />

prevent the accidental destruction of system-level programs. Many<br />

versions of UNIX and certain network operating systems fall into this<br />

category.<br />

− Class (C2): Controlled access protection - Features include those found<br />

in C1 plus the ability to audit or track all user activity, to restrict<br />

operations for specific users, and to ensure that data left in memory<br />

cannot be accessed by other users or applications.<br />

• Division B: Mandatory protection; must be able to provide mathematical<br />

documentation of security and be able to maintain system security even<br />

during a system failure. Division B is divided into three classes:<br />

− Class (B1): Labeled Security Protection<br />

− Class (B2): Structured Protection<br />

− Class (B3): Security Domains<br />

• Division A: Verified protection; must be able to prove that the security<br />

system and policy match the security design specification. Division A is<br />

divided into two classes:<br />

− Class (A1): Verified Design<br />

− Beyond Class (A1)<br />

An operating system that allows anyone complete access to all system<br />

resources falls into Class D. C1 and C2 security can be reasonably implemented<br />

in a commercial environment. After B1, however, the computing environment<br />

rapidly changes, and many of the mandatory access-control mechanisms<br />

become impractical for normal commercial operations, although they have their<br />

place in ultra-secure systems run by government agencies.<br />

If you want to take an in-depth look at the contents of the Orange Book, check<br />

into this URL:<br />

http://tecnet0.jcte.jcs.mil:9000/htdocs/teinfo/directives/soft/stan.html<br />

Chapter 8. Internet Security 195


8.2.2 Red Book Security<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Some aspects of C2 apply directly to computers in a networked environment,<br />

and so the National Computer Security Center released a separate publication,<br />

known as the Red Book, to address security implementation in a networked<br />

environment. The official title of this publication is Trusted Network<br />

Interpretation of the Trusted Computer System Evaluation Criteria, NSCS-TG-005.<br />

The Red Book is really a guide to interpreting the Orange Book; each of the C2<br />

criteria are described in the context of a network. The single most important<br />

distinction made in the Red Book is in defining the role of what it calls the<br />

network sponsor. Older mainframe systems have an easily defined owner in the<br />

mainframe itself, but networks make it more difficult to establish ownership.<br />

A second set of security principles is being developed by the Information<br />

Systems Security Association (ISSA). Called the Generally Accepted System<br />

Security Principles, it is usually known as GSSP. Fifteen principles have been<br />

defined and published in a draft form, and these principles relate more to the<br />

individuals managing the security of the system than do the actual system itself.<br />

We will be hearing more about GSSP in the future.<br />

8.2.3 C2 and Your Security Requirements<br />

The major features of the C2 standard are that a system must:<br />

• Enforce the security policy<br />

8.3 Defining Security Threats<br />

8.3.1 Internal Threats<br />

• Maintain an audit log and take steps to protect the audit log from tampering<br />

• Maintain a domain for itself and must protect that domain against tampering<br />

• Force identification and authentication of all users<br />

• Protect the identification and authentication mechanism against tampering<br />

• Maintain a security kernel and protect it from tampering<br />

• Require strict identification and authentication for any access to any security<br />

systems such as audit logs, password files, and the security kernel itself<br />

Windows NT, for example, falls into the C2 security division, complying with all<br />

guidelines, provided the server is constantly kept behind a locked door.<br />

The most common security threats range from complete network infiltration to<br />

simple virus contamination. Some threats are accidental, and others are<br />

malicious; some affect hardware, and others affect software. We look at them all<br />

in this next section.<br />

Internal security problems are probably the most common. Users entrusted with<br />

certain levels of access to systems and hardware can be a major threat if not<br />

controlled and monitored carefully. Put simply, you never know what someone<br />

is going to do. Even the most loyal employees or workers can change their tune<br />

and get into a malicious mode, wreaking havoc on your computing environment.<br />

Check your workers’ backgrounds, references, and previous employers carefully,<br />

and routinely change and audit your security methods.<br />

196 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.3.2 External Threats<br />

8.3.3 Intruders Are People<br />

8.3.4 Securing Hardware<br />

8.3.5 Securing Software<br />

External security threats are the most problematic. You never know when an<br />

outsider will attempt to breach your systems or who the perpetrator may be.<br />

Some people go to great extremes to gain access to your systems and<br />

information. There are many documented cases of outsiders easily gaining<br />

access to systems that were assumed to be protected. Even the Department of<br />

Defense admits that its computer systems were attacked more than 250,000<br />

times in 1995. That statistic alone should stop you in your tracks and make you<br />

think a bit. It has been recently theorized that a well-funded group of computer<br />

hackers could bring the entire country to a screeching halt within 90 days with<br />

almost no trouble at all.<br />

Intruders may use your own policies and routines against you. Any intruder<br />

could pose as a person from one of your departments or come in as a worker<br />

representing another firm that would normally be considered non-intrusive.<br />

Someone posing as part of the cleaning crew; as a utility worker, as a building<br />

inspector, as an insurance official, and so on could have only one purpose:<br />

gaining the knowledge needed to infiltrate your network. You can even assume<br />

that people are digging through your trash looking for keys to assist them in<br />

breaching your systems. You need to understand that anything is possible and<br />

that people will do anything to get what they want.<br />

Beware of strangers asking questions about how the system works, and never<br />

give anyone your password. The notorious Kevin Mitnik used very subtle<br />

persuasion techniques that came to be known as social engineering to first gain<br />

people’s confidence and then their passwords.<br />

The most obvious manifestation of your computer system is the hardware you<br />

use. Let’s take a look at some of the more common threats to your hardware:<br />

• Theft of a computer, printer, or other resource.<br />

• Tampering by a disgruntled employee who interferes with dip switches or<br />

cuts a cable.<br />

• Destruction of resources by fire, flood, or electrical power surges. And don’t<br />

forget that those sprinklers in the ceiling can put out hundreds of gallons of<br />

water a minute; most of the damage to computer systems comes not from<br />

fire, but from the water to put out the fire.<br />

• Ordinary wear and tear.<br />

inhibit wear and tear.<br />

A normal preventive maintenance program should<br />

The second component of your system is software. Threats to software include<br />

the following:<br />

• Deletion of a program, either by accident or by malicious intent.<br />

• Theft of a program by one of your users.<br />

• Corruption of a program, caused either by a hardware failure or by a virus.<br />

More on virus attacks in a moment.<br />

Chapter 8. Internet Security 197


8.3.6 Securing Information<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

• Bugs in the software; yes, they do happen, and their effect may be<br />

immediate and catastrophic or very subtle and not come to light for years.<br />

The third component of your system is the data and data files used by the<br />

corporation. Threats to information can include:<br />

• Deletion of a file or files. Again, make and test your backups regularly.<br />

• Corruption, caused either by hardware problems or by a bug in the software.<br />

• Theft of company data files.<br />

8.3.7 The Threat from Viruses<br />

One of the most common threats to computer security comes from a computer<br />

virus. There are literally thousands of strains of computer viruses, ranging from<br />

harmless ones that simply put a message on the screen, all the way to vicious<br />

ones that destroy all data they can reach on the local machine and the network.<br />

Most viruses can reproduce themselves over and over on every system they<br />

touch. Virus eradication can be a most painful experience indeed.<br />

Today, with the vastness and power of the Internet, malicious intruders can gain<br />

access to any number of viruses in a matter of seconds by doing a simple<br />

search on one of the popular search engines.<br />

8.4 How Intruders Break In To Your System<br />

8.4.1 Sendmail<br />

8.4.2 Checking CGI Scripts<br />

Intruders break in to your system in any number of ways. With the advent of the<br />

Internet, lots of UNIX software is being ported to Windows NT and other<br />

operating systems, and so are a lot of the security holes in that UNIX software.<br />

This means that your seemingly harmless and brand new software may in fact<br />

be a new generation of an age-old problem.<br />

Intruders have traditionally used services that run on computers to gain access<br />

to them. One of the most widely used holes is in Sendmail and its many<br />

derivatives. Sendmail can actually assist a potential intruder in creating files,<br />

altering files, and even mailing sensitive files to the intruder. Go over your mail<br />

server software carefully, and find out its origins. If it turns out to be a Sendmail<br />

port from UNIX, use the UNIX hacking techniques against it.<br />

Web servers by themselves pose only moderate security risks, particularly when<br />

protected by a firewall or a proxy server. But the one concern is how your<br />

system uses CGI scripts. Your Web server may be configured to create HTML<br />

pages on-the-fly using a script written in Perl or in some other scripting<br />

language.<br />

When considering these external programs, ask these questions:<br />

• Can a knowledgeable attacker trick the external program into doing<br />

something that you don’t want it to do?<br />

• Can a knowledgeable attacker upload an external program and have that<br />

program execute on your system?<br />

198 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.4.3 FTP Problems<br />

8.4.4 Telnet Problems<br />

You can minimize the threat from both these sources by using some of the<br />

techniques that will be discussed later in this chapter and by ensuring that your<br />

Web server does not contain anything that you don’t want revealed to the<br />

outside world.<br />

Do not take it for granted that someone’s really nifty Web enhancement software<br />

is completely safe and harmless. Writing CGI scripts is not particularly easy,<br />

and writing secure scripts can be a job for the experts. You cannot completely<br />

assume that some programmer is writing a nice little CGI script to complement<br />

your Web site, one that you won’t be able to resist trying out and that will<br />

invariably put the holes in place that others need to infiltrate your systems and<br />

networks.<br />

Lots of programmers hide backdoors, tricks, and traps in their seemingly<br />

harmless software for their own convenience in testing and debugging and then<br />

forget to remove these elements when they release the package. You may think<br />

you have just downloaded and installed the world’s greatest page counter,<br />

whereas in reality you have just installed an open door on your system. Always<br />

test shareware and freeware thoroughly on a stand-alone system, and ask<br />

others for their reviews on the software before you can place it on one of your<br />

production servers. Otherwise, you may lose everything.<br />

FTP can be a real problem, and you should take great care when configuring<br />

your FTP server. Double- and triple-check your file permissions for every FTP<br />

user account. Log on as that user, and ensure that the access is restricted in<br />

the way you want it. Additionally, many intruders use anonymous FTP servers to<br />

upload and stash pirated software, cracking tools, and other illegal material that<br />

you do not want on your FTP server. One easy way to protect your site is not to<br />

allow users to upload files to your FTP site; just let them download the material<br />

you originally established the FTP server to manage and distribute. If it is<br />

important that you allow uploads, set the directory permissions so that you have<br />

to explicitly specify who can upload files.<br />

You need to be aware of the potential exposures you can have when you enable<br />

a Telnet server:<br />

• The Telnet server cannot restrict a user from getting a sign-on display if the<br />

Telnet server is already started. There is no anonymous Telnet support.<br />

• When you type your user ID and password, both flow “in the clear” across<br />

your network. Hackers on the Internet or on your intranet can use sniffers<br />

(line-tracing equipment) to access your logon passwords.<br />

• The number of sign-on attempts is equal to the number of system sign-on<br />

attempts allowed multiplied by the number of virtual devices that can be<br />

created. This increases the number of attempts a hacker can try to log on to<br />

your system. Because of this, attacks can turn into denial of service.<br />

• The Telnet server application does not provide good logging procedures.<br />

Chapter 8. Internet Security 199


8.4.5 E-Mail Problems<br />

8.4.6 Keystroke Grabbers<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

There are a few risks associated with electronic mail; some examples are<br />

forging mail or snooping mail that might contain confidential or private<br />

information. But accepting e-mail opens the door to three major exposures that<br />

we cover in more detail in this section:<br />

• Denial-of-service attacks:<br />

Incoming mail, if it makes the form of mail bombing, can tie up your<br />

computer resources (disk space and processor) to the point where your<br />

server is put out of commission. Although we worry about this type of<br />

attack, in practice, you can probably have similar effects from an accident<br />

such as a chain letter or a few huge images (MIME attachments) sent to your<br />

users.<br />

• <strong>Download</strong>ing viruses:<br />

Attachments sent in e-mail can be stored in a shared folder or in the<br />

integrated file of the POP3 server and from there they can be downloaded to<br />

other users’ PCs or POP3 clients.<br />

• Snooping on POP3 user ID or password:<br />

Standard POP clients send the user’s ID and password in the clear;<br />

therefore, anyone snooping on the connection can see them. On the AS/400<br />

system, for example, each POP user needs a user profile and directory entry<br />

so if someone is able to capture the POP user’s ID and password, they also<br />

get the user ID and password of an AS/400 user. If the intruder manages to<br />

get hold of a powerful user profile (for example, one with *ALLOBJ special<br />

authority), the intruder can cause much damage to your system.<br />

• Snooping on sensitive e-mail:<br />

You need to think about the exposure of sending sensitive or confidential<br />

information over the Internet. Depending on your own environment, you<br />

might need to use alternative methods to exchange sensitive information.<br />

You can see more information about how to manage sensitive information on<br />

8.7.9.5, “What Do You Do with Sensitive Information?” on page 212.<br />

Another way intruders gain access is to implement a keystroke grabber. These<br />

programs actually monitor and record every keystroke on a given computer.<br />

Typically, a keystroke grabber records keystrokes on the machine on which the<br />

program is running. Thus, the intruder must have internal access or gain access<br />

externally through the network connections. If you want to take a look at some<br />

keystrokes grabbers, use one of the popular search engines on the Internet, and<br />

enter the keywords keycopy or playback. You will find several without much<br />

effort.<br />

One of the best ways to guard against unauthorized software installation is by<br />

using Microsoft’s Systems Management Server (SMS), part of the BackOffice<br />

suite of programs. SMS performs numerous tasks to help you manage the PCs<br />

on your network, and one of its more interesting features is the ability to monitor<br />

the software on one of your workstations.<br />

SMS will actually let you know when new software is installed and when<br />

software has been removed. This may tip you off to a potential problem before it<br />

gets to serious proportions. You will find information on SMS at Microsoft’s Web<br />

site.<br />

200 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.4.7 Password Attacks<br />

8.4.8 Spoofing Your System<br />

8.4.9 Sniffers<br />

Intruders use programs called password crackers more than any other tools to<br />

gain unauthorized access to systems, and poorly chosen passwords increase<br />

your risk of intrusion tremendously. <strong>Download</strong> at least one or more password<br />

crackers, and use it on your own systems to test the kinds of passwords that you<br />

routinely provide your users.<br />

And when you do crack a password, adjust your policies to disallow similar<br />

password schemes in the future, and obviously change that cracked password<br />

immediately.<br />

The <strong>IBM</strong> Emergency Response Team (<strong>IBM</strong> ERS) has a group that monitors<br />

security threats and preventive measures. They estimate that 80 percent or<br />

more of the intrusion problems they see have to do with poorly chosen<br />

passwords. You can obtain more information about this service on this redbook,<br />

located in the Appendix A, “Availability Services” on page 297.<br />

You should also have a procedure in place to manage expiring passwords so<br />

that users actually do change their passwords routinely. Old passwords are<br />

increasingly vulnerable to attack; the longer a password stays unchanged, the<br />

more time a potential intruder has to crack it. Intruders routinely use<br />

dictionaries in conjunction with password-cracking programs to automatically<br />

attempt various user ID and passwords combinations. These robotics software<br />

programs can run through thousands of combinations in a day, making an old<br />

and poorly chosen password a literal walk in the park to discover.<br />

You should also caution your uses against using the same passwords in different<br />

places, such as using their network logon to access their screen saver.<br />

Some intruders may attempt to use spoofing to gain access to your systems.<br />

Spoofing is the process of replacing parts of the TCP/IP header with bogus<br />

information in an effort to fool your firewall or proxy into thinking that the<br />

network traffic came from an allowed and trusted origin. Be sure your firewall<br />

can prevent this sort of trickery, and implement its prevention fiercely.<br />

Intruders don’t have to steal keystrokes to find out what is happening on your<br />

network; sometimes they use a sniffer to access information that you want to<br />

keep secret. A sniffer watches the network packets as they go to and from your<br />

site and a remote site; it can see the information being transferred.<br />

Hardware and software sniffers are readily available and are used to monitor<br />

network traffic. If that traffic happens to contain a user ID or a password, your<br />

network security is at risk. Hardware sniffers normally have to be used on the<br />

physical cable of your network, which reduces the threat from internal users<br />

somewhat. Software sniffers can run from a workstation attached to your<br />

network and even over a dial-up link.<br />

Intruders may use a sniffer to look at your passwords or your data. Protecting<br />

your passwords is easy; change them often. Protecting your data is more<br />

difficult and may involve end-to-end encryption techniques.<br />

Chapter 8. Internet Security 201


8.4.10 Closing a Back Door on Your System<br />

8.5 How to Control the Risk?<br />

8.6 What Should You Secure?<br />

Figure 66. Layer Approach to Security<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

When an intruder successfully breaks in to your system, he or she usually<br />

creates a back door for easy return. If you have detected and obstructed an<br />

intruder, scour your systems for back doors. One of the easiest, although<br />

sometimes painful, ways to wipe out back door is to simply reformat your<br />

server’s hard disk and reinstall the operating system. This wipes out anything<br />

out of the ordinary.<br />

There is always a risk with being attached to the Internet. However, the benefits<br />

for a company being present in the Internet are many. But it is a high-level<br />

management decision whether and how to deal with the Internet and to consider<br />

the risks. These policies are part of the overall I/T and networking policies and<br />

strategies.<br />

When you devise your security measures, you should think of a layer approach<br />

to security. When you connect an ISP to the Internet, there are many points<br />

where security is compromised and, therefore, that you should protect. You<br />

should think of this layer approach as a system with multiple locks; if a hacker<br />

manages to break one of them, you have others to protect you.<br />

Figure 66 shows different areas where you should apply security measures:<br />

• Network Security: Controlling access to your ISP.<br />

• Application Security: Application-specific security. Do you want to enable a<br />

particular application such as FTP or Telnet? Do you want to enable only<br />

anonymous users or do you want to require user ID and password?<br />

• Transaction Security: Ensuring data privacy and partners authentication.<br />

• System Security: You have to verify all the features and functions that your<br />

operating system has and use them properly. This can make your ISP a<br />

secure environment.<br />

202 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.6.1 Network Security<br />

8.6.2 Application Security<br />

8.6.3 Transaction Security<br />

8.6.4 System Security<br />

Network security control access to your ISP. Who is allowed to enter your<br />

corporation’s network to access your Internet server? Probably you do not want<br />

to generally limit the access but it is a major issue to protect your internal<br />

network and the productive systems within your company’s internal network.<br />

Network security can be achieved in various ways:<br />

• Isolating the Internet servers<br />

• Multiprotocol router blocking from non-wanted TCP/IP traffic<br />

• Securing the network gateway (usually called a firewall) to protect the<br />

company-internal network<br />

Internet network security also determines how your own users may access the<br />

Internet.<br />

Each application that you can use on your ISP connected to the Internet such as<br />

HTTP, FTP, Telnet, and so on offer different alternatives to limit access and make<br />

it safe to use.<br />

Commercial transactions through the Internet require safe communications. The<br />

parties need to be identified and exchanged data has to be protected. In this<br />

case:<br />

• How can you perform authentication without sending an user ID and<br />

password in the clear?<br />

• How can you protect the privacy of your data to ensure that only authorized<br />

persons may read it?<br />

• How can you assure that messages have not been altered between the<br />

sender and the recipient?<br />

There is a single technology that provides the foundation for solving all of these<br />

challenges called cryptography. Secure Sockets Layer (SSL) is an<br />

industry-standard providing cryptography. It includes encryption, message<br />

integrity verification, and authentication. For more information about<br />

cryptography see 8.11, “Cryptography” on page 229. For more information on<br />

SSL see 8.14.2, “Secure Socks Layer” on page 257.<br />

Depending of the operating system, an OS/400 for example, you can have a<br />

strong set of security tools, but you must take the time to learn about the tools<br />

and apply them.<br />

There are various areas of the system’s security to be considered before<br />

attaching your system to the Internet:<br />

• System-wide security values<br />

• User profile and password management<br />

• Resource security<br />

• General TCP/IP definitions<br />

Chapter 8. Internet Security 203


8.6.5 The Security Checklists<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

While establishing your security policies, you should keep in mind the checklists<br />

below.<br />

8.6.5.1 Connection Security Checklist<br />

Here are some of the basic problems facing administrators connecting their<br />

networks to the Internet:<br />

• Millions of people are connected to the Internet now, and more connect<br />

every day. Some will invariably behave unethically.<br />

• Proper security configuration and administration can become very<br />

complicated. Don’t be afraid to get some training.<br />

• Many host systems are run by administrators with little or no experience.<br />

Don’t be one of them. Get some training.<br />

• Most administrators connect their sites to the Internet and then think about<br />

security. You can’t make this mistake.<br />

• Many computers run software systems that have unpatched security holes.<br />

Even when you buy new software off the shelf, contact the publisher to see if<br />

any patches have been related or are planned.<br />

• Internet traffic, and network traffic in general for that matter, are very<br />

vulnerable to sniffers and other forms of electronic snooping. Encrypt<br />

sensitive network traffic, even if it is not destined for the Internet, you may<br />

have potential internal intruders.<br />

8.6.5.2 Network Security Checklist<br />

Here are some suggestions that you can use as you formulate network security<br />

policy for your own site:<br />

• Ensure that your file servers, routers, and gateway equipment are in a<br />

locked, secure location with a minimum number of people having access.<br />

This is part of the C2 security requirement.<br />

• Create and enforce a password assignment and use policy.<br />

• Inform users about your security policies and about their responsibilities.<br />

• Frequently back up your data and store it in a certified off-site facility.<br />

• Add expiration dates to user accounts to force password changes and the<br />

termination of short-term user accounts, such as those assigned to vendors<br />

and contractors.<br />

• Activate intruder detection and lockout features as provided in your<br />

operating system.<br />

• If you use dial-in access servers, implement the strongest authentication<br />

methods allowed by your software. Use call-back capabilities whenever<br />

possible.<br />

• Periodically, security sweep your network to detect potential problems.<br />

Third-party security-sweeping programs are available for most platforms.<br />

• Provide virus protection for all users, and scan all file servers and<br />

workstations daily. Use real-time virus scanners that stay loaded and run all<br />

the time.<br />

204 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

• Ensure that all operating system patches are installed immediately when<br />

they are distributed. Don’t expect the manufacturer to track you down and<br />

tell you about them.<br />

• Use the maximum level of auditing and logging capabilities to detect<br />

unauthorized activity before it creates damage.<br />

8.6.5.3 Internet Security Checklist<br />

If you plan to build and connect your ISP to the Internet, here are some tips to<br />

remember about Internet security and that are important in your computing<br />

environment:<br />

• Treat the Internet as the potentially hostile environment that it is.<br />

• Don’t allow the reuse of passwords. Use smart cards or card keys for user<br />

authentication to sensitive systems whenever possible.<br />

• If you must allow passwords that are valid for more than one logon, choose<br />

strong password policies that mandate frequent changes, and don’t allow the<br />

reuse of old passwords.<br />

• Install a firewall or a proxy server to protect your network.<br />

• Do not send confidential information in clear text across the network.<br />

Instead, encrypt all sensitive messages and files before transmitting them<br />

across any network, including the Internet.<br />

• Limit services that are offered on your network to those that are necessary.<br />

Never run software just for the sake of saying that you have it installed.<br />

• Provide security training for your network administrators.<br />

• Establish your network security properly. Install software patches, don’t use<br />

guest accounts, activate intruder detection schemes, and establish lock-out<br />

mechanisms for too many bad password attempts.<br />

8.6.5.4 E-Mail Security Checklist<br />

Consider these tips on e-mail security as part of your policies and procedures:<br />

• Assume that any unencrypted message you send via e-mail can be<br />

intercepted and read by prying eyes. Use an encryption tool to encrypt all<br />

sensitive e-mail. Over time, your e-mail could fit together like the pieces of a<br />

puzzle, eventually revealing vital information and facts you may not want<br />

known. The rule of thumb here is: never send any unencrypted information<br />

in e-mail that you wouldn’t want broadcasted on national television.<br />

• E-mail addresses can be spoofed, or faked, so that someone can make a<br />

message appear as if it came from someone else.<br />

• You may want to use a separate file for highly sensitive information: Encrypt<br />

it, attach the encrypted file to the e-mail message, and then encrypt that<br />

message and file attachment again as a whole.<br />

• Your e-mail passwords should always be different from any of your other<br />

network passwords. Never use the same password for two different things,<br />

and never reuse an old password.<br />

Chapter 8. Internet Security 205


8.7 Establishing a Security Policy<br />

8.7.1 Who Makes the Policy?<br />

8.7.2 Who Is Involved?<br />

8.7.3 Responsibilities<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Today’s computer world is radically different from the computing environments of<br />

yesteryear. These days, many systems are in private offices and labs, often<br />

managed by individuals or persons employed outside the traditional computer<br />

data center or IS department. And more important, many systems are<br />

connected to the Internet, exposing them to the entire world and giving users of<br />

networks connected to the Internet the avenues they need to reach internal<br />

networks.<br />

Keep all that in mind as you read this section and establish your own policies.<br />

Policy creation must be a joint effort by technical personnel, who understand the<br />

full ramifications of the proposed policy and the implementation of the policy,<br />

and by decision makers who have the power to enforce the policy. A policy that<br />

is neither possible to implement nor enforceable is useless. Since a computer<br />

security policy can affect everyone in an organization, it is worth taking some<br />

care to make sure you have the right level of authority in on the policy decisions.<br />

Though a particular group (such as a campus information services group) may<br />

have responsibility for enforcing a policy, an even higher group may have to<br />

support and approve the policy.<br />

Establishing a site policy has the potential for involving every computer user at<br />

the site in a variety of ways. Computer users may be responsible for personal<br />

password administration. Systems managers are obligated to fix security holes<br />

and to oversee the system. It is critical to get the right set of people involved at<br />

the start of the process. There may already be groups concerned with security<br />

who would consider a computer security policy to be their area. Some of the<br />

types of groups that might be involved include auditing/control, organizations<br />

that deal with physical security, campus information systems groups, and so<br />

forth. Asking these types of groups to “buy in” from the start can help facilitate<br />

the acceptance of the policy.<br />

A key element of a computer security policy is making sure everyone knows<br />

their own responsibility for maintaining security. A computer security policy<br />

cannot anticipate all possibilities; however, it can ensure that each kind of<br />

problem does have someone assigned to deal with it. There may be levels of<br />

responsibility associated with a policy on computer security. At one level, each<br />

user of a computing resource may have a responsibility to protect his or her<br />

account. Users who allow their account to be compromised increase the<br />

chances of compromising other accounts or resources. System managers may<br />

form another responsibility level: they must help to ensure the security of the<br />

computer system. Network managers may reside at yet another level.<br />

206 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.7.4 Risk Assessment<br />

8.7.5 Defining Security Goals<br />

One of the most important reasons for creating a computer security policy is to<br />

ensure that efforts spent on security yield cost-effective benefits. Although this<br />

may seem obvious, it is possible to be mislead about where the effort is needed.<br />

As an example, there is a great deal of publicity about intruders on computers<br />

systems; yet most surveys of computer security show that for most<br />

organizations, the actual loss from “insiders” is much greater.<br />

Risk analysis involves determining what you need to protect, what you need to<br />

protect it from, and how to protect it. It is the process of examining all of your<br />

risks, and ranking those risks by level of severity. This process involves making<br />

cost-effective decisions on what you want to protect. The old security adage<br />

says that you should not spend more to protect something than it is actually<br />

worth.<br />

8.7.4.1 Identifying the Assets<br />

One step in a risk analysis is to identify all the things that need to be protected.<br />

Some things are obvious, such as all the various pieces of hardware, but some<br />

are overlooked, such as the people who actually use the systems. The essential<br />

point is to list all things that could be affected by a security problem, such as:<br />

• Hardware: CPUs, boards, keyboards, terminals, workstations, personal<br />

computers, printers, disk drives, communication lines, terminal servers and<br />

routers.<br />

• Software: Source programs, object programs, utilities, diagnostic programs,<br />

operating systems and communication programs.<br />

• Data: During execution, stored online, archived offline, backups, audit logs,<br />

databases and in transit over communication media.<br />

• People: Users and people needed to run systems.<br />

• Documentation:<br />

procedures.<br />

On programs, hardware, systems and local administrative<br />

• Supplies: Paper, forms, ribbons and magnetic media.<br />

8.7.4.2 Identifying the Threats<br />

Once the assets requiring protection are identified, it is necessary to identify the<br />

threats to those assets. The threats can then be examined to determine what<br />

potential for loss exists. It helps to consider the threats you are trying to protect<br />

your assets from.<br />

When you are defining security procedures against potential threats, consider<br />

the following:<br />

• Look at exactly what you are trying to protect.<br />

• Look at who you need to protect it from.<br />

• Look at what you need to protect it from.<br />

• Determine the likelihood or potential threats.<br />

• Implement measures that will protect your assets in a manner that is<br />

cost-effective for you or your firm.<br />

Chapter 8. Internet Security 207


This soft copy for use by <strong>IBM</strong> employees only.<br />

• Review your processes and procedures continuously, and improve them<br />

every time a weakness is found or a new security mechanism becomes<br />

available.<br />

The goals of your security policy should be to minimize all types of threat and<br />

ensure that threats are as infrequent as possible. A secondary goal is to<br />

minimize the effect of any security breach once it occurs.<br />

Aim your network security policy toward the following goals:<br />

• Preventing malicious damage to files and systems<br />

• Preventing accidental damage to files and systems<br />

• Limiting the results of any deletions or damage to files that occurs<br />

• Protecting the integrity and confidentially of data<br />

• Preventing unauthorized access to the system<br />

• Providing appropriate disaster recovery systems so that the server can be<br />

restored and be back online again quickly<br />

8.7.6 Establishing Security Measures<br />

Once your security goals are in place, you can decide which of the many<br />

available security techniques make sense for your installation. Here are some<br />

suggestions:<br />

• Be sure the server is physically secure.<br />

• Use power-conditioning devices such as line conditioners or a<br />

Uninterruptible Power Supply (UPS).<br />

• Implement fault-tolerant services on the server. Take advantage of<br />

Redundant Array of Inexpensive Disks (RAID). For example, Windows NT<br />

supports several levels of RAID, so choose the level that makes most sense<br />

for your operation.<br />

• Make regular and frequent backups and test them to ensure that they<br />

contain what you think they do.<br />

• Install call-back modems to prevent unauthorized logon attempts from<br />

remote locations.<br />

• Use the audit trail features of your operating system.<br />

• Control access to certain files and directories.<br />

• Control uploading privileges on your FTP server to minimize the possibility of<br />

someone infecting you with a virus.<br />

• Consider using traffic padding, a technique that equalizes network traffic and<br />

thus makes it more difficult for an hacker to infer what is happening on your<br />

network.<br />

• Implement packet filtering, which makes snooping almost impossible.<br />

• Prepare a plan that you can execute when you detect that your network is<br />

under attack. Decide what you will do and the sequence in which you will do<br />

it. Define when you will shut down the service, the connection to the<br />

Internet, or your own internal network.<br />

208 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.7.7 Know Your Server<br />

8.7.8 Locking In or Out<br />

The reason you are establishing your ISP should directly dictate a portion of your<br />

security policies. For example, if your ISP is designed to deliver information and<br />

content to people on the Internet and if you want to control who has access to<br />

that information, establish a portion of your security policy to dictate guidelines<br />

for access. Decide how you will control access. The most common way is with<br />

user IDs and passwords. You must establish the procedures used for verifying a<br />

user. Don’t assume that anyone will be truthful when filling in your online survey<br />

form, and verify as much of the information as you can.<br />

Some of the policies that you establish for preventing external intrusion of your<br />

ISP are the same as those for preventing internal threats. However, you can use<br />

other mechanisms, such as firewalls and proxy servers, to diminish external<br />

security threats.<br />

Whenever a site suffers an incident that compromises computer security, the<br />

strategies for reacting may be influenced by two opposing pressures.<br />

If management fears that the site is sufficiently vulnerable, it may choose a<br />

protect and proceed strategy. This approach will have as its primary goal the<br />

protection and preservation of the site facilities and to provide normality for its<br />

users as quickly as possible. Attempts will be made to actively interfere with the<br />

intruders processes, prevent further access and begin immediate damage<br />

assessment and recovery. This process may involve shutting down the facilities,<br />

closing off access to the network, or other drastic measures. The drawback is<br />

that unless the intruder is identified directly, they may come back into the site<br />

via a different path, or may attack another site.<br />

The alternate approach, pursue and prosecute, adopts the opposite philosophy<br />

and goals. The primary goal is to allow intruders to continue their activities at<br />

the site until the site can identify the responsible persons. This approach is<br />

endorsed by law enforcement agencies and prosecutors. The drawback is that<br />

the agencies cannot exempt a site from possible user lawsuits if damage is done<br />

to their systems and data.<br />

Prosecution is not the only outcome possible if the intruder is identified. If the<br />

culprit is an employee or a student, the organization may choose to take<br />

disciplinary actions. The computer security policy needs to spell out the choices<br />

and how they will be selected if an intruder is caught.<br />

Careful consideration must be made by site management regarding their<br />

approach to this issue before the problem occurs. The strategy adopted might<br />

depend upon each circumstance. Or there may be a global policy that mandates<br />

one approach in all circumstances. The pros and cons must be examined<br />

thoroughly and the users of the facilities must be made aware of the policy so<br />

that they understand their vulnerabilities no matter which approach is taken.<br />

The following is a checklist to help a site determine whether or not to adopt<br />

protect and proceed.<br />

Protect and Proceed<br />

• If assets are not well protected.<br />

• If continued penetration could result in great financial risk.<br />

Chapter 8. Internet Security 209


8.7.9 Policy Issues<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

• If the possibility or willingness to prosecute is not present.<br />

• If user base is unknown.<br />

• If users are unsophisticated and their work is vulnerable.<br />

• If the site is vulnerable to lawsuits from users.<br />

There are a number of issues that must be addressed when developing a<br />

security policy. These are:<br />

• Who is allowed to use the resources?<br />

• What is the proper use of the resources?<br />

• Who may have system administration privileges?<br />

• What are the user’s rights and responsibilities?<br />

• What do you do with sensitive information?<br />

• What happens when the policy is violated?<br />

These issues are discussed below. In addition you may wish to include a<br />

section in your policy concerning ethical use of computing resources.<br />

8.7.9.1 Who Is Allowed to Use the Resources?<br />

One step you must take in developing your security policy is defining who is<br />

allowed to use your system and services. The policy should explicitly state who<br />

is authorized to use what resources.<br />

8.7.9.2 What Is the Proper Use of the Resources?<br />

After determining who is allowed access to system resources it is necessary to<br />

provide guidelines for the acceptable use of the resources. You may have<br />

different guidelines for different types of users (that is, students, faculty, external<br />

users). The policy should state what is acceptable use as well as unacceptable<br />

use. It should also include types of use that may be restricted. Define limits to<br />

access and authority. You will need to consider the level of access various<br />

users will have and what resources will be available or restricted to various<br />

groups of people. Your acceptable use policy should clearly state that individual<br />

users are responsible for their actions. Their responsibility exists regardless of<br />

the security mechanisms that are in place. It should be clearly stated that<br />

breaking into accounts or bypassing security is not permitted.<br />

The following points should be covered when developing an acceptable use<br />

policy:<br />

• Is breaking into accounts permitted?<br />

• Is cracking passwords permitted?<br />

• Is disrupting service permitted?<br />

• Should users assume that a file being world-readable grants them the<br />

authorization to read it?<br />

• Should users be permitted to modify files that are not their own even if they<br />

happen to have write permission?<br />

• Should users share accounts?<br />

The answer to most of these questions will be no.<br />

210 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

You may wish to incorporate a statement in your policies concerning copyrighted<br />

and licensed software. Licensing agreements with vendors may require some<br />

sort of effort on your part to ensure that the license is not violated. In addition,<br />

you may wish to inform users that the copying of copyrighted software may be a<br />

violation of the copyright laws and is not permitted.<br />

Specifically concerning copyrighted and/or licensed software, you may wish to<br />

include the following information:<br />

• Copyrighted and licensed software may not be duplicated unless it is<br />

explicitly stated that you may do so.<br />

• Methods of conveying information on the copyright/licensed status of<br />

software.<br />

• When in doubt, don’t copy.<br />

Your acceptable use policy is very important. A policy that does not clearly state<br />

what is not permitted may leave you unable to prove that a user violated the<br />

policy.<br />

There are exception cases such as tiger teams and users or administrators<br />

wishing for licenses to hack, you may face the situation where users will want to<br />

hack on your services for security research purposes. You should develop a<br />

policy that will determine whether you will permit this type of research on your<br />

services and if so, what your guidelines for such research will be.<br />

Points you may wish to cover in this area:<br />

• Whether it is permitted at all.<br />

• What type of activity is permitted:<br />

viruses, etc.<br />

breaking in, releasing worms, releasing<br />

• What type of controls must be in place to ensure that it does not get out of<br />

control (separate a segment of your network for these tests).<br />

• How you will protect other users from being victims of these activities,<br />

including external users and networks.<br />

• The process for obtaining permission to conduct these tests.<br />

In cases where you do permit these activities, you should isolate the portions of<br />

the network that are being tested from your main network. Worms and viruses<br />

should never be released on a live network.<br />

You may also wish to employ, contract, or otherwise solicit one or more people<br />

or organizations to evaluate the security of your services, of which may include<br />

hacking. You may wish to provide for this in your policy.<br />

8.7.9.3 Who May Have System Administration Privileges?<br />

One security decision that needs to be made very carefully is who will have<br />

access to system administrator privileges and passwords for your services.<br />

Obviously, the system administrators will need access, but inevitably other users<br />

will request special privileges. The policy should address this issue. Restricting<br />

privileges is one way to deal with threats from local users. The challenge is to<br />

balance restricting access to these to protect security while giving people who<br />

need these privileges access so that they can perform their tasks. One<br />

approach that can be taken is to grant only enough privilege to accomplish the<br />

necessary tasks.<br />

Chapter 8. Internet Security 211


This soft copy for use by <strong>IBM</strong> employees only.<br />

Additionally, people holding special privileges should be accountable to some<br />

authority and this should also be identified within the site’s security policy. If the<br />

people you grant privileges to are not accountable, you run the risk of losing<br />

control of your system and will have difficulty managing a compromise in<br />

security.<br />

8.7.9.4 What Are The Users’ Rights and Responsibilities?<br />

The policy should incorporate a statement on the users’ rights and<br />

responsibilities concerning the use of the site’s computer systems and services.<br />

It should be clearly stated that users are responsible for understanding and<br />

respecting the security rules of the systems they are using. The following is a<br />

list of topics that you may wish to cover in this area of the policy:<br />

• What guidelines you have regarding resource consumption (whether users<br />

are restricted, and if so, what the restrictions are).<br />

• What might constitute abuse in terms of system performance.<br />

• Whether users are permitted to share accounts or let others use their<br />

accounts.<br />

• How secret should users keep their passwords.<br />

• How often users should change their passwords and any other password<br />

restrictions or requirements.<br />

• Whether you provide backups or expect the users to create their own.<br />

• Disclosure of information that may be proprietary.<br />

• Statement on electronic mail privacy (Electronic Communications Privacy<br />

Act).<br />

• Your policy concerning controversial mail or post to mailing lists or<br />

discussion groups (obscenity, harassment, etc.).<br />

• Policy on electronic communications: mail forging, etc.<br />

8.7.9.5 What Do You Do with Sensitive Information?<br />

The primary solution for the possibility of sniffing confidential data is education.<br />

You need to update your security policy and educate your users. They should<br />

treat a public network just as they treat unprotected phone lines and public<br />

places.<br />

• If information is sensitive enough that you would not read it on a bus or a<br />

plane, then you probably should not send it across the Internet.<br />

• If information is confidential enough that you would not repeat it on a cellular<br />

telephone, then you probably should not send it across the Internet.<br />

• If you would not send it through the normal mail, except perhaps with a<br />

double envelop, then you probably should not send it across the Internet.<br />

• Consider providing separate user profiles for Internet and e-mail usage, at<br />

least for users with powerful profiles. That way, if someone sees an e-mail<br />

that an employee sends, the hacker will not have the name of a powerful<br />

profile on your system.<br />

• Put this information in an area with restrict access in your server.<br />

• Limit the access for those users who really have to manage the information.<br />

• Guarantee that you will always have a backup copy of the area with these<br />

sensitive information to recover in cases of attacks by the intruder.<br />

212 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.7.9.6 What Happens When the Policy Is Violated?<br />

It is obvious that when any type of official policy is defined, be it related to<br />

computer security or not, it will eventually be broken. The violation may occur<br />

due to an individual’s negligence, accidental mistake, having not been properly<br />

informed of the current policy, or not understanding the current policy. It is<br />

equally possible that an individual (or group of individuals) may knowingly<br />

perform an act that is in direct violation of the defined policy.<br />

When a policy violation has been detected, the immediate course of action<br />

should be pre-defined to ensure prompt and proper enforcement. An<br />

investigation should be performed to determine how and why the violation<br />

occurred. Then the appropriate corrective action should be executed. The type<br />

and severity of action taken varies depending on the type of violation that<br />

occurred.<br />

8.7.10 General Internet Security Principles<br />

The general Internet security principles are:<br />

• Simplicity: You are probably to find that Internet security can be quite<br />

complicated. Since Internet security can involve lots of complex<br />

configurations, there is the opportunity for introducing errors that can be<br />

exploited by a hacker. As a matter of fact, configuration holes are one of the<br />

most common means of intrusion. The simpler your configuration, the more<br />

likely it is to be correct.<br />

• Explicit authority: Your defaults should be set up to deny access. Only the<br />

specific users you authorize should be able to perform functions. Everything<br />

else should be denied.<br />

• Choke points: Limiting the number of connections or routes data can take<br />

allows you to concentrate on your defenses. It makes it easier to control and<br />

monitor. This choke point may be physical or logical.<br />

• Secondary defense: Do not assume your defenses always work. You can<br />

make configuration errors or hackers can get past one of your defenses, but<br />

if you have another roadblock in place, it either slows them down or stops<br />

them completely. Developing a healthy paranoia helps you to do a good job.<br />

• Do not trust: Do not trust any information you receive from the Internet such<br />

as IP addresses, hostnames, or passwords. These can be forged.<br />

Figure 67 on page 214 shows all the elements to build a good security policy to<br />

your environment before connecting it to the Internet.<br />

Chapter 8. Internet Security 213


Figure 67. Security Policy and the Internet<br />

8.8 Establishing Procedures to Prevent Security Problems<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

The security policy by itself doesn’t say how things are protected. The security<br />

policy should be a high-level document, giving general strategy. The security<br />

procedures need to set out, in detail, the precise steps your site will take to<br />

protect itself.<br />

The security policy should include a general risk assessment of the types of<br />

threats a site is mostly likely to face and the consequences of those threats.<br />

Part of doing a risk assessment will include creating a general list of assets that<br />

should be protected. This information is critical in devising cost-effective<br />

procedures.<br />

It is often tempting to start creating security procedures by deciding on different<br />

mechanisms first: our site should have logging on all hosts, call-back modems,<br />

and smart cards for all users. This approach could lead to some areas that have<br />

too much protection for the risk they face, and other areas that aren’t protected<br />

enough. Starting with the security policy and the risks it outlines should ensure<br />

that the procedures provide the right level of protection for all assets.<br />

8.8.1 Steps to Implement Secure Internet Applications<br />

The steps to implement secure Internet applications are:<br />

• Design for Security: Based on policies decided by observing your company’s<br />

general I/T and networking security directions. For later testing, auditing,<br />

and extension, document the security measures you decided to implement.<br />

• Test: Do not assume that all of the security features you implemented are<br />

running properly; test them. And test them on a regular basis. Any time you<br />

make a change in a configuration, you want to verify that you have not<br />

inadvertently opened a security hole.<br />

214 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.8.2 Identifying Possible Problems<br />

Engage a neutral or company-external person to test the security measures<br />

of your Internet environment.<br />

There are utilities available, mostly UNIX-based, to test Internet security.<br />

These programs check mainly the network access.<br />

• Control: Logging the activities provides information on the usage of your<br />

Internet applications. Develop queries to analyze this data and to find<br />

possible attacks and misuse.<br />

PC based utilities are available to analyze and present the result graphically.<br />

Check for attacks that can be detected and for attacks where appropriate<br />

action can be taken immediately. For example, an attempt to use a<br />

non-existing user ID should result at least in a message to the QSYSOPR<br />

message queue (in cases of AS/400 Internet servers), generation of an SNA<br />

alert (in cases of S/390 Internet servers), or an SNMP trap or transmission of<br />

a paper message.<br />

• User Education: You cannot assure security alone. You need to make sure<br />

that your users are helping. All of the complex security features in the world<br />

are not going to help you if users share their passwords in e-mail messages.<br />

Users must be educated on the risks associated with the Internet and be<br />

given clear instructions on what they should and should not do.<br />

• Revision: Time changes things. Technology is getting more advanced,<br />

Internet applications are enhanced, and hackers are getting smarter.<br />

Consequently, your security measures need to be revised periodically.<br />

To determine risk, vulnerabilities must be identified. Part of the purpose of the<br />

policy is to aid in finding the vulnerabilities and thus decreasing the risk in as<br />

many areas as possible.<br />

8.8.2.1 Access Points<br />

Access points are typically used for entry by unauthorized users. Having many<br />

access points increases the risk of access to an organization’s computer and<br />

network facilities. Network links to networks outside the organization allow<br />

access into the organization for all others connected to that external network. A<br />

network link typically provides access to a large number of network services,<br />

and each service has a potential to be compromised. Dial-up lines, depending<br />

on their configuration, may provide access merely to a login port of a single<br />

system. If connected to a terminal server, the dial-up line may give access to<br />

the entire network. Terminal servers themselves can be a source of problems.<br />

Many terminal servers do not require any kind of authentication. Intruders often<br />

use terminal servers to disguise their actions, dialing in on a local phone and<br />

then using the terminal server to go out to the local network. Some terminal<br />

servers are configured so that intruders can Telnet in from outside the network,<br />

and then Telnet back out again, again making it difficult to trace them.<br />

8.8.2.2 Software Bugs<br />

Software will never be bug free. Publicly known security bugs are common<br />

methods of unauthorized entry. Part of the solution to this problem is to be<br />

aware of the security problems and to update the software when problems are<br />

detected. When bugs are found, they should be reported to the vendor so that a<br />

solution to the problem can be implemented and distributed.<br />

Chapter 8. Internet Security 215


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.8.2.3 Insider Threats<br />

An insider to the organization may be a considerable threat to the security of the<br />

computer systems. Insiders often have direct access to the computer and<br />

network hardware components. The ability to access the components of a<br />

system makes most systems easier to compromise. Most desktop workstations<br />

can be easily manipulated so that they grant privileged access. Access to a<br />

local area network provides the ability to view possibly sensitive data traversing<br />

the network.<br />

8.8.3 Controls to Protect Assets in a Cost-Effective Way<br />

After establishing what is to be protected, and assessing the risks these assets<br />

face, it is necessary to decide how to implement the controls which protect these<br />

assets. The controls and protection mechanisms should be selected in a way so<br />

as to adequately counter the threats found during risk assessment, and to<br />

implement those controls in a cost-effective manner. It makes little sense to<br />

spend an exorbitant sum of money and overly constrict the user base if the risk<br />

of exposure is very small.<br />

8.8.3.1 Choose the Right Set of Controls<br />

The controls that are selected represent the physical embodiment of your<br />

security policy. They are the first and primary line of defense in the protection of<br />

your assets. It is therefore most important to ensure that the controls that you<br />

select are the right set of controls. If the major threat to your system is outside<br />

penetrations, it probably doesn’t make much sense to use biometric devices to<br />

authenticate your regular system users. On the other hand, if the major threat is<br />

unauthorized use of computing resources by regular system users, you will<br />

probably want to establish very rigorous automated accounting procedures.<br />

8.8.3.2 Use Common Sense<br />

Common sense is the most appropriate tool that can be used to establish your<br />

security policy. Elaborate security schemes and mechanisms are impressive,<br />

and they do have their place, yet there is little point in investing money and time<br />

on an elaborate implementation scheme if the simple controls are forgotten. For<br />

example, no matter how elaborate a system you put into place on top of existing<br />

security controls, a single user with a poor password can still leave your system<br />

open to attack.<br />

8.8.3.3 Use Multiple Strategies to Protect Assets<br />

Another method of protecting assets is to use multiple strategies. In this way, if<br />

one strategy fails or is circumvented, another strategy comes into play to<br />

continue protecting the asset. By using several simpler strategies, a system can<br />

often be made more secure than if one very sophisticated method were used in<br />

its place. For example, dial-back modems can be used in conjunction with<br />

traditional logon mechanisms. Many similar approaches could be devised that<br />

provide several levels of protection for assets. However, it’s very easy to go<br />

overboard with extra mechanisms. One must keep in mind exactly what it is that<br />

needs to be protected.<br />

216 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.9 Physical Security<br />

It is a given in computer security that if the system itself is not physically secure,<br />

nothing else about the system can be considered secure. With physical access<br />

to a machine, an intruder can halt the machine, bring it back up in privileged<br />

mode, replace or alter the disk, plant virus programs, or take any number of<br />

other undesirable (and hard to prevent) actions. Critical communications links,<br />

important servers, and other key machines should be located in physically<br />

secure areas. Some security systems (such as Kerberos) require that the<br />

machine be physically secure. If you cannot physically secure machines, care<br />

should be taken about trusting those machines. Sites should consider limiting<br />

access from non-secure machines to more secure machines. In particular,<br />

allowing trusted access from these kinds of hosts is particularly risky. For<br />

machines that seem or are intended to be physically secure, care should be<br />

taken about who has access to the machines. Remember that custodial and<br />

maintenance staff often have keys to rooms and may not knowingly allow access<br />

to unauthorized individuals.<br />

8.9.1 Procedures to Recognize Unauthorized Activity<br />

Several simple procedures can be used to detect most unauthorized uses of a<br />

computer system. These procedures use tools provided with the operating<br />

system by the vendor, or tools publicly available from other sources.<br />

8.9.1.1 Monitoring System Use<br />

System monitoring can be done either by a system administrator or by software<br />

written for the purpose. Monitoring a system involves looking at several parts of<br />

the system and searching for anything unusual. The most important thing about<br />

monitoring system use is that it be done on a regular basis. Picking one day out<br />

of the month to monitor the system is pointless, since a security breach can be<br />

isolated to a matter of hours. Only by maintaining a constant vigil can you<br />

expect to detect security violations in time to react to them.<br />

8.9.2 Tools for Monitoring the System<br />

This section describes some of the tools for monitoring the system.<br />

8.9.2.1 Logging<br />

Most operating systems store numerous bits of information in log files.<br />

Examination of these log files on a regular basis is often the first line of defense<br />

in detecting unauthorized use of the system.<br />

Compare Lists of Currently Logged in Users and Past Login Histories: Most<br />

users typically log in and out at roughly the same time each day. An account<br />

logged in outside the normal time for the account may be in use by an intruder.<br />

Many Systems Maintain Accounting Records for Billing Purposes: These<br />

records can also be used to determine usage patterns for the system; unusual<br />

accounting records may indicate unauthorized use of the system.<br />

System Logging Facilities, Such As the UNIX syslog: Utility should be checked<br />

for unusual error messages from system software. For example, a large number<br />

of failed login attempts in a short period of time may indicate someone trying to<br />

guess passwords.<br />

Chapter 8. Internet Security 217


This soft copy for use by <strong>IBM</strong> employees only.<br />

Operating System Commands: That list currently executing processes can be<br />

used to detect users running programs they are not authorized to use, as well as<br />

to detect unauthorized programs that have been started by an intruder.<br />

8.9.2.2 Monitoring Software<br />

Other monitoring tools can easily be constructed using standard operating<br />

system software, by using several, often unrelated, programs together. For<br />

example, checklists of file ownerships and permission settings can be<br />

constructed (for example, with ls and find on UNIX) and stored offline. These<br />

lists can then be reconstructed periodically and compared against the master<br />

checklist (on UNIX, by using the diff utility). Differences may indicate that<br />

unauthorized modifications have been made to the system.<br />

8.9.2.3 Other Tools<br />

Other tools can also be used to monitor systems for security violations, although<br />

this is not their primary purpose. For example, network monitors can be used to<br />

detect and log connections from unknown sites.<br />

8.9.3 Vary the Monitoring Schedule<br />

The task of system monitoring is not as daunting as it may seem. System<br />

administrators can execute many of the commands used for monitoring<br />

periodically throughout the day during idle moments (for example, while talking<br />

on the telephone), rather than spending fixed periods of each day monitoring the<br />

system. By executing the commands frequently, you will rapidly become used to<br />

seeing normal output, and will easily spot things that are out of the ordinary. In<br />

addition, by running various monitoring commands at different times throughout<br />

the day, you make it hard for an intruder to predict your actions. For example, if<br />

an intruder knows that each day at 5:00 p.m. the system is checked to see that<br />

everyone has logged off, he or she will simply wait until after the check has<br />

completed before logging in. But the intruder cannot guess when a system<br />

administrator might type a command to display all logged in users, and thus he<br />

or she runs a much greater risk of detection.<br />

Despite the advantages that regular system monitoring provides, some intruders<br />

will be aware of the standard logging mechanisms in use on systems they are<br />

attacking. They will actively pursue and attempt to disable monitoring<br />

mechanisms. Regular monitoring therefore is useful in detecting intruders, but<br />

does not provide any guarantee that your system is secure. Also, monitoring<br />

should not be considered an infallible method of detecting unauthorized use.<br />

8.9.3.1 Define Actions to Take When Unauthorized Activity Is<br />

Suspected<br />

The procedures for dealing with these types of problems should be written down.<br />

Who has authority to decide what actions will be taken? Should law enforcement<br />

be involved? Should your organization cooperate with other sites in trying to<br />

track down an intruder? Whether you decide to lock out or pursue intruders, you<br />

should have tools and procedures ready to apply. It is best to work up these<br />

tools and procedures before you need them. Don’t wait until an intruder is on<br />

your system to figure out how to track the intruder’s actions; you will be busy<br />

enough if an intruder strikes.<br />

218 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.9.4 Communicating Security Policy<br />

Security policies, in order to be effective, must be communicated to both the<br />

users of the system and the system maintainers.<br />

8.9.4.1 Educating the Users<br />

Users should be made aware of how the computer systems are expected to be<br />

used, and how to protect themselves from unauthorized users.<br />

Proper Account/Workstation Use: All users should be informed about what is<br />

considered the “proper” use of their account or workstation. This can most<br />

easily be done at the time a user receives their account by giving them a policy<br />

statement. Proper use policies typically dictate things such as whether or not<br />

the account or workstation may be used for personal activities (such as<br />

checkbook balancing or letter writing), whether profit-making activities are<br />

allowed, whether game playing is permitted, and so on. These policy statements<br />

may also be used to summarize how the computer facility is licensed and what<br />

software licenses are held by the institution; for example, many universities have<br />

educational licenses that explicitly prohibit commercial use of the system.<br />

Account/Workstation Management Procedures: Each user should be told how to<br />

properly manage their account and workstation. This includes explaining how to<br />

protect files stored on the system, how to log out or lock the terminal or<br />

workstation, and so on. Much of this information is typically covered in the<br />

beginning user documentation provided by the operating system vendor,<br />

although many sites elect to supplement this material with local information. If<br />

your site offers dial-up modem access to the computer systems, special care<br />

must be taken to inform users of the security problems inherent in providing this<br />

access. Issues such as making sure to log out before hanging up the modem<br />

should be covered when the user is initially given dial-up access. Likewise,<br />

access to the systems via local and wide area networks presents its own set of<br />

security problems which users should be made aware of. Files that grant trusted<br />

host or trusted user status to remote systems and users should be carefully<br />

explained.<br />

Determining Account Misuse: Users should be told how to detect unauthorized<br />

access to their account. If the system prints the last login time when a user logs<br />

in, he or she should be told to check that time and note whether or not it agrees<br />

with the last time he or she actually logged in. Command interpreters on some<br />

systems maintain histories of the last several commands executed. Users<br />

should check these histories to be sure someone has not executed other<br />

commands with their account.<br />

Problem Reporting Procedures: A procedure should be developed to enable<br />

users to report suspected misuse of their accounts or other misuse they may<br />

have noticed. This can be done either by providing the name and telephone<br />

number of a system administrator who manages security of the computer<br />

system, or by creating an electronic mail address to which users can address<br />

their problems.<br />

Chapter 8. Internet Security 219


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.9.4.2 Educating the Host Administrators<br />

In many organizations, computer systems are administered by a wide variety of<br />

people. These administrators must know how to protect their own systems from<br />

attack and unauthorized use, as well as how to communicate successful<br />

penetration of their systems to other administrators as a warning.<br />

Account Management Procedures: Care must be taken when installing accounts<br />

on the system in order to make them secure. When installing a system from<br />

distribution media, the password file should be examined for standard accounts<br />

provided by the vendor. Many vendors provide accounts for use by system<br />

services or field service personnel. These accounts typically have either no<br />

password or one that is common knowledge. These accounts should be given<br />

new passwords if they are needed, or disabled or deleted from the system if they<br />

are not. Accounts without passwords are generally very dangerous since they<br />

allow anyone to access the system.<br />

Even accounts that do not execute a command interpreter (accounts that exist<br />

only to see who is logged in to the system) can be compromised if set up<br />

incorrectly. A related concept is that of anonymous file transfer (FTP), which<br />

allow workstations users from all over the network to access your system to<br />

retrieve files from (usually) a protected disk area. You should carefully weigh<br />

the benefits that an account without a password provides against the security<br />

risks of providing such access to your system. If the operating system provides<br />

a shadow password facility that stores passwords in a separate file accessible<br />

only to privileged users, this facility should be used. It protects passwords by<br />

hiding their encrypted values from unprivileged users. This prevents an attacker<br />

from copying your password file to his or her machine and then attempting to<br />

break the passwords at his or her leisure. Keep track of who has access to<br />

privileged user accounts (the root user ID on UNIX or the MAINT user ID on<br />

VMS). Whenever a privileged user leaves the organization or no longer has<br />

need of the privileged account, the passwords on all privileged accounts should<br />

be changed.<br />

Configuration Management Procedures: When installing a system from the<br />

distribution media or when installing third-party software, it is important to check<br />

the installation carefully. Many installation procedures assume a trusted site,<br />

and hence will install files with world-writeable permission enabled, or otherwise<br />

compromise the security of files. Network services should also be examined<br />

carefully when first installed. Many vendors provide default network permission<br />

files which imply that all outside hosts are to be trusted, which is rarely the case<br />

when connected to wide area networks such as the Internet.<br />

Many intruders collect information on the vulnerabilities of particular system<br />

versions. The older a system, the more likely it is that there are security<br />

problems in that version that have since been fixed by the vendor in a later<br />

release. For this reason, it is important to weigh the risks of not upgrading to a<br />

new operating system release (thus leaving security holes unplugged) against<br />

the cost of upgrading to the new software (possibly breaking third-party software,<br />

etc.).<br />

Bug fixes from the vendor should be weighed in a similar fashion, with the added<br />

note that security fixes from a vendor usually address fairly serious security<br />

problems. Other bug fixes, received via network mailing lists and the like,<br />

should usually be installed, but not without careful examination. Never install a<br />

bug fix unless you’re sure you know what the consequences of the fix are;<br />

220 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.10 Firewall<br />

there’s always the possibility that an intruder has suggested a fix which actually<br />

gives him or her access to your system.<br />

Recovery Procedures - Backups: It is impossible to overemphasize the need for<br />

a good backup strategy. File system backups not only protect you in the event of<br />

hardware failure or accidental deletions, but they also protect you against<br />

unauthorized changes made by an intruder. Without a copy of your data the way<br />

it’s supposed to be, it can be difficult to undo something an attacker has done.<br />

Backups, especially if run daily, can also be useful in providing a history of an<br />

intruder’s activities. Looking through old backups can establish when your<br />

system was first penetrated. Intruders may leave files around which, although<br />

deleted later, are captured on the backup tapes. Backups can also be used to<br />

document an intruder’s activities to law enforcement agencies if necessary. A<br />

good backup strategy will dump the entire system to tape at least once a month.<br />

Partial (or incremental) dumps should be done at least twice a week, and ideally<br />

they should be done daily. Commands specifically designed for performing file<br />

system backups (UNIX dump or VMS BACKUP command) should be used in<br />

preference to other file copying commands, since these tools are designed with<br />

the express intent of restoring a system to a known state.<br />

8.9.4.3 Problem Reporting Procedures<br />

As with users, system administrators should have a defined procedure for<br />

reporting security problems. In large installations, this is often done by creating<br />

an electronic mail alias that contains the names of all system administrators in<br />

the organization. Other methods include setting up some sort of response team<br />

similar to the CERT, or establishing a hotline serviced by an existing support<br />

group.<br />

A firewall provides a means of protecting your internal corporate network from<br />

unauthorized access from the Internet. They are just one of the tools for defense<br />

that can be employed.<br />

A firewall is used to help implement your Internet security policy. The firewall<br />

provides a barrier between a secure network and unsecured network such as<br />

the Internet. The firewall controls access to and from the secure network.<br />

Chapter 8. Internet Security 221


Figure 68. Protecting Your Internal Network with an Internet Firewall<br />

Things a firewall can do:<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

• Let the internal users access Web servers on the Internet.<br />

• Let the users exchange mail with other users on the Internet.<br />

• Prevent users on the Internet from accessing systems in your corporate<br />

network.<br />

• Prevent information about your network (for instance, IP addresses) from<br />

being exposed to the users on the Internet.<br />

Things a firewall cannot do:<br />

8.10.1 Why Are Firewalls Needed?<br />

• A firewall is able to protect from intrusion from the outside. A firewall does<br />

not protect you from an inside user sending sensitive information over the<br />

Internet.<br />

• A firewall does not provide protection of data that is sent from an internal<br />

user to an Internet user.<br />

• Most firewall are not able to check for viruses.<br />

There are potential intruders on the Internet. These intruders attempt to exploit<br />

the known weaknesses in the IP, TCP, and ICMP protocols and the applications<br />

that use them.<br />

Many people believe that since a system can have a strong host security, as<br />

AS/400 for example, it can be directly connected to the Internet. Unfortunately,<br />

this is not true because the AS/400 system has to contend with the same<br />

unsecured TCP/IP protocols as other systems.<br />

It is not just the server that you need to protect. Once you connect to the<br />

Internet, every system of your internal network is accessible from the Internet.<br />

Firewalls are needed so that a security exposure on any of the systems in your<br />

internal network cannot be exploited by users on the Internet.<br />

222 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.10.2 Firewall Principles<br />

8.10.3 Firewall Elements<br />

When setting up a firewall, there are a number of principles that you are advised<br />

to follow. Some are:<br />

• Make sure that you do not have any other connections to the Internet. The<br />

firewall provides a choke point, forcing all traffic to and from the Internet to<br />

flow through it.<br />

• There should be no direct TCP/IP connections between the applications on<br />

the internal systems and the servers on the Internet. A direct connection<br />

enables the server to learn information (such as the IP address) about the<br />

client system. All communication connections should be broken at the<br />

firewall.<br />

• Information about the internal network should be prevented from reaching<br />

the Internet. Information on host names and IP addresses is valuable.<br />

• Systems that are intended to be accessed by users on the Internet should be<br />

on the outside of the firewall. Once you start letting Internet traffic through<br />

the firewall, you open new holes for an intruder.<br />

Some people assume that a firewall is a single box with one wire in and one<br />

wire out. This is not always the case. A firewall is constructed from one or<br />

more software products that run on one or more hosts that may be general<br />

purpose systems or routers.<br />

Major technologies implemented with a firewall are:<br />

• Packet filtering to limit traffic<br />

• Proxy servers or SOCKS servers to break TCP/IP connections<br />

• Domain name services to hide network information<br />

Policy plays an important role because the various technologies can be used in<br />

many ways. It is important that a company decides on its Internet security policy<br />

before it begins the process of building a firewall.<br />

8.10.3.1 IP Packet Filtering<br />

IP packet filtering is a technology inserted at a low level in the IP protocol stack.<br />

A packet filter compares the packet against a set of rules that say which packets<br />

are permitted (this means which packets have to be forwarded or discarded).<br />

Packet filters are a good way to selectively allow some traffic into a subnetwork<br />

to protect from unwanted traffic. A packet filter is completely transparent to the<br />

user.<br />

Packet filters check the packet header to determine whether to forward or to<br />

discard the packet. Most packet filters allow filtering by:<br />

• Source and destination IP address<br />

• Protocols such as TCP, UDP, or ICMP<br />

• Source and destination ports (ports identify a TCP/IP application such as FTP<br />

or Telnet)<br />

• Whether the packet is destined for or originated from a local application<br />

• Whether the packet is inbound or outbound<br />

Chapter 8. Internet Security 223


Figure 69. Packet Filtering Router<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Your initial thought might be that this is going to be real easy. But we have to<br />

make a distinction between inbound/outbound packets and inbound/outbound<br />

connections. Inbound packets resulting from an outbound connection are OK.<br />

That means packet filters need to pay attention to the flags in the TCP header<br />

(SYN or ACK) that indicate if this is a new connection or a response to an<br />

existing connection.<br />

A typical installation has 50 to 100 of these rules. They usually come in sets that<br />

allow a particular application to run between a set of IP addresses. And at the<br />

end, there is a rule that says to deny all other traffic. This is an implementation<br />

of one of the Internet security principles: That which is not expressly permitted<br />

is denied.<br />

8.10.3.2 Packet Filtering Router<br />

Most popular routers have some sort of packet filtering technology. Although by<br />

themselves they are not really a firewall, they may provide enough protection in<br />

some circumstances.<br />

Let’s take the situation where you want to attach your server as a Web server to<br />

the Internet. This server is a public server, which means you want users on the<br />

Internet to be able to easily find it. You want to provide some protection for this<br />

server but you cannot isolate it. Using packet filtering support on the router is<br />

probably all you need. You can set up your rules to allow HTTP requests in and<br />

HTTP requests out but block unwanted traffic such as Telnet and FTP.<br />

Notice the network is broken into two pieces. The internal or secure network<br />

has all internal users and production machines. It is kept separate from the<br />

perimeter network, which has your server intended to be accessed from the<br />

Internet. We keep these two networks unlinked because a router alone cannot<br />

provide enough protection for your internal systems.<br />

This network scenario with an isolated Internet server is a cheap solution since<br />

you need a router anyway to connect to the ISP. But this solution has some<br />

limitations:<br />

• There is no logging of packets discarded by the router.<br />

224 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 70. Proxy Server<br />

• It is hard to keep the isolated system current since it cannot be reached from<br />

the internal network.<br />

• Internet applications cannot work with your productive database.<br />

8.10.3.3 Proxy Server<br />

A proxy server is a TCP or UDP application. Its purpose is to receive requests<br />

from a client and resend them to a server and to resend responses from the<br />

server back to the client.<br />

Proxy servers are unique to the particular protocol that they handle (for instance,<br />

an HTTP proxy or a Telnet proxy).<br />

The most important objective of a proxy server is to break the TCP/IP<br />

connection. Clients no longer talk directly to servers. The server only sees the<br />

IP address of the proxy server, not of the originating client. This is useful to<br />

keep the internal network information private.<br />

The clients need to know the address of the proxy server to send the request to<br />

the proxy instead of the server it wants to communicate with. This means the<br />

client application needs to be proxy-aware, which means specific definitions are<br />

required. The servers, on the other hand, are standard. They have no<br />

knowledge that a proxy server is being used.<br />

One of the bad things about proxy servers is that they are unique to a particular<br />

application. If you obtain a new TCP/IP application, you may have a difficult time<br />

finding a proxy server to support it.<br />

Probably the most common example of a proxy server is the HTTP proxy server.<br />

An HTTP proxy server relays requests from a Web browser to a Web server.<br />

The client’s browser is configured to send requests for URLs to the proxy server<br />

instead of the server.<br />

Chapter 8. Internet Security 225


Figure 71. SOCKS Server<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Not all proxy servers are quite so easy to use. A Telnet proxy server, for<br />

example, may require the users to Telnet to the proxy server, to log on, and to<br />

Telnet again to the system that they want to communicate with. The IP address<br />

of the proxy server is used as the source address, hiding the IP address of the<br />

ISP.<br />

Another common proxy is one that relays mail between internal mail servers and<br />

other mail servers on the Internet. Because the mail proxy server simply<br />

forwards mail, sometimes it is called a mail relay. The mail proxy server relays<br />

all incoming mail to an internal mail server where it can be accessed by the<br />

internal users. All outgoing mail is also routed through the mail proxy server.<br />

Mail proxy servers use SMTP. The workstations, when communicating with the<br />

internal mail server, communicate through POP.<br />

8.10.3.4 SOCKS Server<br />

Sockets server, SOCKS for short, is another TCP/IP application that resends<br />

requests and responses between clients and servers.<br />

The SOCKS server can be thought of as a multi-talent proxy server. Instead of<br />

handling one type of application protocol, it handles them all (HTTP, Telnet, FTP,<br />

and so on).<br />

The purpose of the SOCKS server is the same as the proxy server; it breaks the<br />

TCP/IP connection and hides internal network information.<br />

However, to use a SOCKS server, the client must be written to support the<br />

SOCKS protocol. Some applications such as Web browsers support SOCKS.<br />

There are also some systems such as OS/2 that support SOCKS in their TCP/IP<br />

protocol stack so that all client applications can use a SOCKS server.<br />

226 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 72. Domain Name Services<br />

The client configuration gives the name of the SOCKS server to use and rules for<br />

when it should be used.<br />

To avoid the need to have individual proxy servers such as for HTTP, TELNET,<br />

and FTP, there is a move to SOCKS servers.<br />

8.10.3.5 Domain Name Services<br />

Domain Name Services is the application that enables a client to determine the<br />

IP address of a given host name. Most of the time, we use host names such as<br />

www.mycompany.com when talking about hosts on the Internet. The Domain<br />

Name Server (DNS) translates host names into IP addresses.<br />

When constructing a firewall, we use Domain Name Services so that internal<br />

users can locate the IP addresses of all systems, internal and public, while users<br />

on the Internet can only locate the IP addresses of our Internet servers.<br />

We need two Domain Name Services, one for internal names and one for<br />

external names. The internal Domain Name Service is responsible for your<br />

internal systems. It forwards name resolution requests to the external Domain<br />

Name Service if it does not know the host name. The external Domain Name<br />

Service is configured to forward requests to name servers on the Internet if it<br />

does not know the host name. This allows internal users to access hosts on the<br />

Internet.<br />

Users on the Internet send requests to the external Domain Name Service to<br />

locate your Internet server.<br />

Domain Name Service requests only go out. The external Domain Name Service<br />

does not forward requests to the internal Domain Name Service.<br />

Chapter 8. Internet Security 227


8.10.4 Glossary of the Most Common Firewall-Related Terms<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Abuse of privilege: When a user performs an action that they should not have<br />

according to organizational policy or law.<br />

Application-level firewall: A firewall system in which service is provided by<br />

processes that maintain complete TCP connection state and sequencing.<br />

Application level firewalls often readdress traffic so that outgoing traffic appears<br />

to have originated from the firewall, rather than the internal host.<br />

Authentication: The process of determining the identity of a user that is<br />

attempting to access a system.<br />

Authentication token: A portable device used for authenticating a user.<br />

Authentication tokens operate by challenge/response, time-based code<br />

sequences, or other techniques. This may include paper-based lists of one-time<br />

passwords.<br />

Authorization: The process of determining what types of activities are permitted.<br />

Usually, authorization is in the context of authentication: once you have<br />

authenticated a user, they may be authorized different types of access or<br />

activity.<br />

Challenge/response: An authentication technique whereby a server sends an<br />

unpredictable challenge to the user, who computes a response using some form<br />

of authentication token.<br />

Defense in-depth: The security approach whereby each system on the network<br />

is secured to the greatest possible degree. May be used in conjunction with<br />

firewalls.<br />

DNS spoofing: Assuming the DNS name of another system by either corrupting<br />

the name service cache of a victim system, or by compromising a domain name<br />

server for a valid domain.<br />

Firewall: A system or combination of systems that enforces a boundary between<br />

two or more networks.<br />

Host-based security: The technique of securing an individual system from attack.<br />

Host-based security is operating system and version dependent.<br />

Insider attack: An attack originating from inside a protected network.<br />

Intrusion detection: Detection of break-ins or break-in attempts either manually<br />

or via software expert systems that operate on logs or other information<br />

available on the network.<br />

IP spoofing: An attack whereby a system attempts to illicitly impersonate<br />

another system by using its IP network address.<br />

Logging: The process of storing information about events that occurred on the<br />

firewall or network.<br />

Log retention: How long audit logs are retained and maintained.<br />

Log processing: How audit logs are processed, searched for key events, or<br />

summarized.<br />

228 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.11 Cryptography<br />

Network-level firewall: A firewall in which traffic is examined at the network<br />

protocol packet level.<br />

Perimeter-based security: The technique of securing a network by controlling<br />

access to all entry and exit points of the network.<br />

Policy: Organization-level rules governing acceptable use of computing<br />

resources, security practices, and operational procedures.<br />

Proxy: A software agent that acts on behalf of a user. Typical proxies accept a<br />

connection from a user, make a decision as to whether or not the user or client<br />

IP address is permitted to use the proxy, perhaps does additional authentication,<br />

and then completes a connection on behalf of the user to a remote destination.<br />

Trojan horse: A software entity that appears to do something normal but which,<br />

in fact, contains a trap door or attack program.<br />

Tunneling router: A router or system capable of routing traffic by encrypting it<br />

and encapsulating it for transmission across an untrusted network for eventual<br />

de-encapsulation and decryption.<br />

Social engineering: An attack based on deceiving users or administrators at the<br />

target site. Social engineering attacks are typically carried out by telephoning<br />

users or operators and pretending to be an authorized user, to attempt to gain<br />

illicit access to systems.<br />

Virtual network perimeter: A network that appears to be a single protected<br />

network behind firewalls, which actually encompasses encrypted virtual links<br />

over untrusted networks.<br />

Virus: A self-replicating code segment. Viruses may or may not contain attack<br />

programs or trap doors.<br />

New commercial and business applications using network computing have<br />

dramatically emphasized the need for security in business transactions. In fact,<br />

the requirements go well beyond the encoding and decoding of business<br />

transactions, to functions such as user identification and authorization, access<br />

control to resources and services, confidentiality, data integrity, non-repudiation<br />

of transactions, and security management/audit. The science of cryptography<br />

provides the technologies to support these functions. <strong>IBM</strong>’s support of these<br />

cryptographic functions is referred to as <strong>IBM</strong>’s cryptographic infrastructure. The<br />

use of cryptographic services in I/T systems can occur at various levels, from the<br />

applications down to the cryptographic engines, depending on the degree of<br />

cryptographic awareness of the application, that is, the level of cryptographic<br />

functionality the application must know in order to meet its objectives. This<br />

suggests a layering of cryptographic functions, with the option for application<br />

access at whatever layer is appropriate.<br />

Layering reduces the level of cryptographic awareness needed and increases<br />

the portability of applications through the use of standardized APIs.<br />

Cryptographic algorithms can be embedded into applications through the use of<br />

common libraries and toolkits. A layered approach helps identify and manage<br />

the infrastructure of supporting functions.<br />

Chapter 8. Internet Security 229


8.11.1 Layers - Introduction<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

The identification and description of these layers, their implementation, use and<br />

management is necessary to fully communicate <strong>IBM</strong>’s extensive support for<br />

cryptographic functions that help secure business applications.<br />

Any layering approach will inevitably represent an oversimplification of the<br />

relative positioning and use of the various functions. However, a layered<br />

approach does communicate <strong>IBM</strong>’s strategy to support additional functions in the<br />

layers and to include selected components into solutions. The complexity of<br />

using cryptographic functions is reduced while increasing flexibility in the choice<br />

of APIs and cryptographic engines.<br />

We can arrange the cryptographic infrastructure into four conceptual layers, as<br />

shown.<br />

Applications<br />

--------------------------------------------<br />

Supporting Services and Subsystems<br />

--------------------------------------------<br />

APIs and Toolkits<br />

--------------------------------------------<br />

Cryptographic engines<br />

Layers are used to describe functions within a layer that are both<br />

complementary and related. Functions in one layer may exploit functions in any<br />

other layer. The layering is not rigid or insulated; functions may exploit other<br />

functions within the same layer. These functions are selectable and extensible,<br />

defining an open infrastructure with content driven by industry standards, where<br />

appropriate.<br />

The Application layer can use the Supporting Services or API layer directly,<br />

depending upon the level of cryptographic awareness required by the<br />

application. An example is electronic commerce applications over the Internet.<br />

The Supporting Services and Sub-systems layer consists of an extensible set of<br />

services that invoke and exploit the APIs according to the level of cryptographic<br />

knowledge required by the service. These services facilitate the use of<br />

cryptographic functions by applications. An example is certificate management<br />

for public key infrastructures, consisting of a set of services used to generate,<br />

store, distribute, revoke, and renew certificates for other related applications.<br />

The APIs and Toolkits layer consists of the industry-standard sets of calls to the<br />

underlying cryptographic engines or sets of linkable library routines that<br />

incorporate cryptographic algorithms into applications or supporting services.<br />

Regardless of the API set or cryptographic engine used for a given function, the<br />

functional results obtained will be the same, thus validating the modular<br />

mix/match suggested by the layered infrastructure.<br />

The Cryptographic Engines layer is a common set of cryptographic functions,<br />

implemented across a variety of platforms. This set of functions is available in<br />

hardware or software. Hardware implementations have the advantage of<br />

superior speed of execution and resistance to tampering. Some examples of<br />

this layer are integrated cryptographic co-processors, cryptographic adapters<br />

(add-on to any platform) and software routines.<br />

230 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.11.2 Layers - Detail<br />

Figure 73. The <strong>IBM</strong> Cryptography Infrastructure<br />

8.11.2.1 Applications<br />

Networked business applications have exploited cryptographic capabilities to<br />

enhance security for years. Businesses are extending these applications to the<br />

Internet at a rapid rate.<br />

The broad set of business applications that exploit the Internet are often referred<br />

to as e-commerce. Examples include Internet shopping, Internet banking,<br />

Internet information services and Internet-health related services. An overview<br />

of these e-commerce applications serves to illustrate how encryption services,<br />

APIs and cryptographic engines are all used by the application.<br />

Internet Shopping Mall: After browsing merchandise offered through the Web<br />

pages of a merchant at any convenient time and place, a user would select<br />

items to purchase. The user may select a credit card as the method of payment<br />

for the goods or services and the application invokes a secure payment<br />

cryptographic service using the industry-defined Secure Electronic Transaction<br />

(SET) protocols. The application would not have to be programmed at the<br />

cryptographic API level since that would be handled by the SET subsystem (see<br />

8.11.2.2, “Supporting Services and Subsystems” on page 232). The<br />

cryptographic functions used would be invoked transparently between the<br />

communicating parties using the Protocol for Payment Negotiation (PPN). The<br />

added cryptographic value to the user is integrity and confidentiality of credit<br />

and payment information, plus verification of the merchant. The merchant can<br />

prove that the transaction occurred and that he or she will be paid.<br />

Chapter 8. Internet Security 231


This soft copy for use by <strong>IBM</strong> employees only.<br />

Internet Banking: Banking on the Internet is clearly an opportunity where<br />

proper security measures must be in place to protect the financial assets of the<br />

consumer and the corporate assets of the financial institution. Consumers can<br />

be authorized to use these banking services through the use of certificate<br />

management services. These services provide the consumer and the browser<br />

application a certificate that would be used to authenticate the client, authorize<br />

the client to banking applications, and select the level of confidentiality and<br />

integrity appropriate to the application. Internet banking uses the public key<br />

infrastructure services and the APIs and encryption algorithms below those<br />

services. All three levels of service will be transparent to the client application<br />

and the consumer.<br />

<strong>IBM</strong> InfoMarket Service: <strong>IBM</strong> InfoMarket Service addresses the need to control<br />

the distribution of information over the Internet and protect intellectual property<br />

rights. With the proliferation of search engines on the Internet, the challenge to<br />

users is to find those items of value and to pay for them, where appropriate.<br />

The challenge to publishers is to protect their intellectual property and to get<br />

paid for items ordered. <strong>IBM</strong>’s InfoMarket Service is an Internet-based content<br />

distribution utility for publishers who want to reach new customers, featuring<br />

security and copyright management, and allows for publisher control over<br />

content and pricing. Complete network and back-office support services are<br />

included. The <strong>IBM</strong> InfoMarket Service provides compatibility with leading<br />

information storage and retrieval vendors. The use of encryption is transparent<br />

to the user.<br />

Internet Health Care: With an Internet-based health care system, patient<br />

records can be stored in a central location and accessed immediately by all<br />

properly authorized personnel required in the various processes. The<br />

information may be used by a primary care physician, by medical specialists, in<br />

the hospital and pharmacy and by the insurance company. Cryptographic<br />

functions, such as confidentiality, integrity, and authentication, are necessary<br />

and are invoked by the application, transparent to the users. Smart cards could<br />

also be incorporated, as a method of transporting patient medical records.<br />

8.11.2.2 Supporting Services and Subsystems<br />

The supporting services and subsystems are:<br />

Key Recovery Services: <strong>IBM</strong> is working on a solution to key recovery that will<br />

support all existing key distribution schemes and encryption algorithms.<br />

SecureWay key recovery technology will be a process that associates<br />

information with an encrypted message, perhaps as header information. Key<br />

recovery schemes could make use of underlying cryptographic functions and<br />

could extend already existing cryptographic APIs.<br />

Secure Content Distribution (Cryptolope Containers): The availability of the<br />

Internet has led to the proliferation of illegal copies of copyrighted, digital<br />

information. Software enforcement of copyright can be circumvented, posing the<br />

question of how to effectively protect the intellectual property of digital content<br />

owners. The <strong>IBM</strong> solution is to secure the content in a Cryptolope container.<br />

Cryptolope containers are advancing a new frontier in the world of electronic<br />

commerce.<br />

Cryptolope containers feature advanced cryptographic enveloping technology,<br />

enabling businesses to penetrate new markets and launch themselves into the<br />

next century. Cryptolope containers are based on a new packaging technology<br />

232 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

that enables and enhances electronic commerce on the Internet and<br />

communication within enterprises. A Cryptolope container is a sophisticated<br />

electronic package that holds an encrypted version of a text document or an<br />

electronic commodity, such as music, film, art, software, graphics and<br />

multimedia products.<br />

Each container also has an abstract attached that describes its contents, their<br />

price (when applicable) and the terms and conditions for using the contents.<br />

While the contents are protected, the abstract is accessible. Cryptolope<br />

containers can only be opened using cryptographic keys that are provided to<br />

users who have purchased the contents.<br />

Cryptolope containers protect copyrighted material on the Internet, directing the<br />

material to the authorized customer and providing a method for receiving<br />

payment for usage. Cryptolope containers are digitally signed using RSA<br />

technology to identify the originator of the contents and to protect against<br />

alteration during transmission. DES is used for encryption, decryption, and key<br />

generation.<br />

Cryptolope containers are deployed today in <strong>IBM</strong>’s infoMarket Service. <strong>IBM</strong> is<br />

exploring the use of Cryptolope containers in multiple applications, including<br />

direct marketing, software distribution, electronic document delivery, and<br />

entertainment applications.<br />

Virtual Private Network: Businesses want to communicate with partners and<br />

suppliers over the Internet. This creates a concern for how to keep information<br />

confidential while flowing over a public network. The <strong>IBM</strong> firewall brings the<br />

capability of having a virtual private network, which can address this concern.<br />

Even though the traffic travels over the Internet you can still have confidential<br />

communications.<br />

The firewall encrypts Internet Protocol (IP) packets, creating a private IP tunnel<br />

to transfer data. This process, called tunneling, provides data integrity,<br />

authentication, and confidentiality as the data flows across a public network<br />

between two firewalls that support the Internet Engineering Task Force IPsec<br />

specifications.<br />

Applet Security: The growing popularity of the Internet has led to a frenzy of<br />

development on the World Wide Web. Most noted of such developments has<br />

been the introduction by SUN Microsystems of the popular capability to<br />

download applications that run transparently inside the Web browser. The<br />

language used is Java and the downloaded applications are known as applets.<br />

The browser has no control over or knowledge of the applet contents. If the user<br />

is security-aware, he/she may be obliged to treat each applet as a potential<br />

virus, Trojan horse, worm or simply a badly behaving program with respect to<br />

resource consumption. This realization has generated activity to address the<br />

pressing question of Java security, since Java’s popularity is widely expanding<br />

and is commonly used as the language for Web page executable and other<br />

e-commerce executable. <strong>IBM</strong> has activities underway in the areas of:<br />

cryptographic services for Java applets, code signing combined with applet<br />

resource credentials, access control, and identification and authentication of<br />

applets. <strong>IBM</strong> intends to work openly with industry to share the results of these<br />

research activities.<br />

Chapter 8. Internet Security 233


This soft copy for use by <strong>IBM</strong> employees only.<br />

Certificate Management: Distributed computing in a commercial context nearly<br />

always involves the exchange of information and execution of transactions that<br />

have value and need to be protected. Confidentiality, integrity and especially the<br />

authenticity of the unseen communication partners all become important<br />

requirements. How is such electronic business conducted with the same degree<br />

of confidence as face-to-face business? The need to provide secure<br />

communications across public networks is a top priority for businesses in this<br />

environment. The <strong>IBM</strong> Public Key Infrastructure will supply the technology to<br />

create, publish, maintain, revoke and renew digital certificates and to distribute<br />

them to various destinations, such as Web browsers and smart cards. It<br />

supports authentication, encryption, digital signature and access control<br />

operations using the certificate contents. It also provides a communications<br />

transport that enables client and server applications to exploit protected<br />

communications over public or private networks. The certificate management<br />

services available with <strong>IBM</strong>’s PKI shows how cryptographic functions and APIs<br />

can be applied without user knowledge of the details. To further address this<br />

need, <strong>IBM</strong> is working with Nortel’s Entrust technology to define and implement<br />

the infrastructure needed to ensure that digital identities can be created and<br />

used in electronic commerce applications.<br />

Identities are issued by a trusted authority and are represented by a certificate<br />

that includes standard information such as a public key, a globally accessible<br />

name, expiration dates, and application-unique information such as a title, a<br />

degree earned, a license owned, and job responsibility. This certificate is<br />

digitally signed by the trusted authority, known as a certificate authority. The<br />

certificate authority validates information in the certificate and signs it thereby<br />

validating the authenticity of the information signed.<br />

Secure Electronic Transactions (SET): SET is not the only electronic payment<br />

system designed for the World Wide Web. It is, however, emerging as the only<br />

significant standard for credit card transactions. In this section we give a brief<br />

history of the origins of SET, and also discuss other payment approaches.<br />

Banks and financial institutions have had networks for electronic payment<br />

processing for many years. These networks connect highly secure, trusted<br />

computer systems, using dedicated links and powerful cryptographic hardware.<br />

A number of international standards exist to define the protocol for messages<br />

exchanged over the network.<br />

The challenge for Internet credit card processing lies in producing a scheme that<br />

can provide adequate protection at a reasonable cost without compromising<br />

trust in any of the existing systems.<br />

During 1995, various financial organizations and technology companies formed a<br />

number of alliances aimed at producing standards for credit card payment.<br />

This was a confusing time, with a number of competing standards and consortia.<br />

The technical community would probably still be arguing the merits of one<br />

solution or another, but the two largest credit card companies, Visa and<br />

MasterCard, realized that nothing would happen without a globally accepted<br />

standard. They joined forces with the key software companies to produce a<br />

single proposal, SET.<br />

SET is based on ideas from previous proposed standards and is also heavily<br />

influenced by Internet Keyed Payment Protocols (iKP), which is the result of<br />

research carried out at the <strong>IBM</strong> Zurich Laboratory.<br />

234 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Other credit card payment systems do exist, but they are generally not aimed at<br />

the broad market, as SET is. For example, First Virtual Internet Payments<br />

System (FVIPS), operated by First Virtual Holdings Inc. is a scheme by which the<br />

prospective buyer registers credit card details with First Virtual and receives a<br />

personal identification number (PIN). The buyer can then use the PIN in place of<br />

a card number at any merchant that has an account with First Virtual. Payment<br />

details must be confirmed by e-mail before any purchase is completed.<br />

Although this scheme has been successful it is limited due to the requirement<br />

for both buyer and seller to be affiliated with the same service. SET more<br />

closely follows the model of normal credit card payments, in which the only<br />

relationship between the organization that issues the card and the one that<br />

processes the purchase is that they subscribe to the same clearing network.<br />

<strong>IBM</strong> was a key contributor to the design of SET and is supporting SET for<br />

consumer payment (using a browser such as Netscape), in its Merchant Server<br />

(Net.Commerce Payment Manager), and in a new Payment Gateway, which<br />

connects the consumer/merchant to the financial institution for payment.<br />

<strong>IBM</strong> Directions for Web Payments, SuperSET: Having delivered products and<br />

services that cover all of the roles and functions in the SET framework, <strong>IBM</strong><br />

development is working to expand the product set to embrace any other<br />

payment method. This development effort, known internally as SuperSET, will<br />

deliver electronic wallet and electronic till software that provides a number of<br />

interfaces to allow other payment modules to be easily integrated. It will also<br />

provide protocol negotiation capability, including JEPI, as soon as it is finalized.<br />

8.11.2.3 APIs and Toolkits<br />

The APIs and toolkits are:<br />

Common Cryptographic Architecture (CCA): The <strong>IBM</strong> Common Cryptographic<br />

Architecture (CCA) is a cryptographic API for secret key algorithms (DES) and<br />

public key algorithms (RSA). It provides services for data privacy, data integrity,<br />

key generation, distribution, and installation and Personal Identification Number<br />

(PIN) processing using the Data Encryption Standard (DES). It also supports<br />

digital signature generation and verification and distribution of Data Encryption<br />

Algorithm (DEA) key encrypting keys using the RSA algorithm. The architecture<br />

provides interoperability between products that are compliant, regardless of<br />

platform. CCA is designed for use within most standard programming<br />

languages.<br />

CCA provides advanced key management through the use of control vector<br />

technology. Control vectors are non-secret quantities cryptographically bound to<br />

the key, providing key separation and limiting the valid uses of the key.<br />

The CCA API provides a common set of services for cryptographically-aware<br />

applications to exploit without knowledge of the underlying cryptographic<br />

engines.<br />

BSAFE: BSAFE is RSA’s portable C programming toolkit that provides<br />

re-entrant, linkable code that supports a complete palette of the most popular<br />

cryptographic and hashing algorithms and a random number generator. BSAFE<br />

provides an API into encryption engines without the application programmer<br />

having to access the APIs. BSAFE supports many standards including the PKCS<br />

series, the Public Key interoperability specification, including PKCS #11, which is<br />

oriented to portable tokens (PC Cards or Smart Cards). BSAFE simplifies the<br />

Chapter 8. Internet Security 235


This soft copy for use by <strong>IBM</strong> employees only.<br />

integration into any C program state-of-the-art confidentiality and authentication<br />

features. BSAFE is licensed for use by a large number of vendors, including<br />

<strong>IBM</strong>. <strong>IBM</strong> and RSA announced plans for BSAFE to exploit the CCA API. <strong>IBM</strong> is<br />

ensuring that when its hardware cryptographic engines are present, they will be<br />

chosen by BSAFE over software implementations.<br />

Generic Security Services API (GSS-API): GSS-API is a session-oriented<br />

interface developed by the Internet Engineering Task Force (IETF) in conjunction<br />

with X/Open (now the Open Group) to facilitate the secure communication in a<br />

client/server environment. Its objective is to isolate the calling program from the<br />

security mechanisms being invoked.<br />

The GSS-API includes support for mutual authentication and the establishment of<br />

appropriate levels of message confidentiality and integrity. <strong>IBM</strong> supports<br />

GSS-API through its various DCE deliverables. The advantage of using the<br />

GSS-API is the low level of security awareness required of the application<br />

program.<br />

Generic Cryptographic Services (GCS-API): GCS-API is a generic,<br />

comprehensive, algorithm-independent, cryptographic API, produced by the<br />

Open Group’s Security Working group (together with NIST and NSA) and is being<br />

designed to provide convergence on a single, multivendor standard.<br />

Microsoft Crypto API (C-API): Microsoft’s C-API provides extensible, exportable,<br />

system-level access to common cryptographic functions such as encryption,<br />

hashing and digital signatures. Microsoft’s C-API requires a Cryptographic<br />

Service Provider (CSP) to implement cryptographic algorithms.<br />

Cryptographic APIs/toolkits will be supported within the SecureWay<br />

cryptographic infrastructure as they appear in the industry and are required by<br />

customers.<br />

Privacy Enhanced Mail: Electronic mail normally transits the network in the<br />

clear (anyone can read it). This is obviously not the optimal solution. Privacy<br />

enhanced mail provides a means to automatically encrypt electronic mail<br />

messages so that a person snooping at a mail distribution node is not (easily)<br />

capable of reading them. Several privacy-enhanced mail packages are currently<br />

being developed and deployed on the Internet. The Internet Activities Board<br />

Privacy Task Force has defined a draft standard, elective protocol for use in<br />

implementing privacy enhanced mail.<br />

8.11.2.4 Cryptographic Engines<br />

The cryptographic engines are:<br />

Kerberos: Kerberos, named after the dog who in mythology is said to stand at<br />

the gates of Hades, is a collection of software used in a large network to<br />

establish a user′s claimed identity. Developed at the Massachusetts Institute of<br />

Technology (MIT), it uses a combination of encryption and distributed databases<br />

so that a user at a campus facility can log in and start a session from any<br />

computer located on the campus. This has clear advantages in certain<br />

environments where there are a large number of potential users who may<br />

establish a connection from any one of a large number of workstations. Some<br />

vendors are now incorporating Kerberos into their systems.<br />

236 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Smart Cards: Smart cards will play an important role in cryptography because<br />

they are tamper-resistant, cost-effective, and a simple means by which a user<br />

can be authenticated across an insecure network. Smart cards can enhance the<br />

Secure Electronic Transaction protocol (SET) by storing user certificates. This<br />

would mean that a SET-enabled smart card could be used in a secure browser<br />

equipped with an appropriate reader, increasing security and mobility by<br />

allowing SET transactions from a number of sources, in addition to the user’s<br />

home workstation.<br />

Figure 74. Smart Card. The password synchronized smart card.<br />

Smart cards can provide these services because they contain a microprocessor<br />

and a tamper-resistant enclosure that can securely store cryptographic keys,<br />

certificates, and other data. Operations can be performed on the data within the<br />

secure boundary. An example of such a smart card is <strong>IBM</strong>’s MultiFunction Card<br />

(MFC). The MFC can separate and protect the data required by multiple<br />

applications on the same card and secure network transactions. An example<br />

smart card application is for a single card to be used to access, reserve, and<br />

pay for travel and entertainment. This same card could store user preferences<br />

to be used by the application. Tickets and any loyalty schemes (for example,<br />

frequent flyer miles) could be downloaded directly to the same smart card. This<br />

card would be presented at the airport during travel and would contain any<br />

necessary travel documents including the user’s passport, credit, and debit<br />

cards. <strong>IBM</strong> Smart Consumer Services leverage <strong>IBM</strong> experience in I/T to deliver<br />

end-to-end solutions. Smart Consumer Services are available from <strong>IBM</strong> now.<br />

The services consist of management consultancy, feasibility/business case<br />

analysis, design, development and card creation, management and<br />

administration, together with the prerequisite readers and modules. Applications<br />

have been delivered and others are under development for availability later.<br />

Chapter 8. Internet Security 237


This soft copy for use by <strong>IBM</strong> employees only.<br />

JEPI: The emergence of a single standard for credit card payments, SET, is a<br />

very positive development for Web payments. However, as the previous sections<br />

have shown, there are many situations in which SET is not appropriate, and<br />

many other payment systems that browser and server software needs to<br />

accommodate.<br />

In fact this diversity implies two requirements:<br />

1. Electronic wallet and till technology that can handle multiple payment types<br />

2. A negotiation protocol for client and server to determine what payment<br />

options they share<br />

In real life, we take this latter protocol for granted. It goes something like this:<br />

Buyer: Do you accept American Express?<br />

Seller: No, we only take MasterCard and Visa.<br />

Buyer: How about a personal check?<br />

Seller: (laughs) That′ s very funny.<br />

Buyer: I′ ll have to pay in cash then.<br />

Seller:<br />

(etc...)<br />

No problem, so long as it′ s in small-denomination used bills.<br />

In cyberspace, the same exchange has not yet been finalized, but a project<br />

called Joint Electronic Payments Initiative (JEPI) is working hard to define the<br />

protocol. This is a combined effort of CommerceNet and the World Wide Web<br />

Consortium (W3C). You can find out more about JEPI at:<br />

http://www.w3.org/pub/WWW/Payments/jepi.html.<br />

Data Encryption Standard (DES): DES is perhaps the most widely used data<br />

encryption mechanism today. Many hardware and software implementations<br />

exist, and some commercial computers are provided with a software version.<br />

DES transforms plain text information into encrypted data (or ciphertext) by<br />

means of a special algorithm and seed value called a key. So long as the key is<br />

retained (or remembered) by the original user, the ciphertext can be restored to<br />

the original plain text. One of the pitfalls of all encryption systems is the need to<br />

remember the key under which a thing was encrypted. (This is not unlike the<br />

password problem discussed elsewhere in this document.) If the key is written<br />

down, it becomes less secure. If forgotten, there is little (if any) hope of<br />

recovering the original data. Most UNIX systems provide a DES command that<br />

enables a user to encrypt data using the DES algorithm.<br />

Crypt: Similar to the DES command, the UNIX crypt command allows a user to<br />

encrypt data. Unfortunately, the algorithm used by crypt is very insecure (based<br />

on the World War II Enigma device), and files encrypted with this command can<br />

be decrypted easily in a matter of a few hours. Generally, use of the crypt<br />

command should be avoided for any but the most trivial encryption tasks.<br />

Workstation Interface Adapters: <strong>IBM</strong> is developing a PCI-based cryptographic<br />

co-processor. The co-processor has a general purpose PC-compatible<br />

subsystem, random number generator, and cryptographic functions, all inside a<br />

tamper-responding enclosure. The device will support high-speed cryptographic<br />

operations and will provide a protected environment for sensitive applications<br />

and data. <strong>IBM</strong>’s plan is to include a rich set of data privacy and authentication<br />

functions in the initial PCI offering, including DES and CDMF encryption, ANSI<br />

message authentication, RSA digital signature generation and verification and<br />

key distribution. The hardware will be designed to meet the Federal Information<br />

238 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Processing Standard 140-1 level 3. A PCMCIA (notebook) version is under<br />

consideration.<br />

S/390 Integrated Cryptographic Co-Processor Feature: The <strong>IBM</strong> Integrated<br />

Cryptographic Co-Processor Feature (packaged as a single CMOS chip), together<br />

with the Integrated Cryptographic Service Facility (ICSF), will provide the ability<br />

to support high-volume cryptographic transaction rates and bulk data security<br />

requirements. The programming interface to use the facilities conforms to the<br />

Common Cryptographic Architecture (CCA) and allows interoperability with other<br />

conforming systems. The cryptographic co-processor provides facilities for<br />

public and private key encryption (DES, CDMF, and RSA), hashing algorithms,<br />

digital signature, and key management.<br />

Transaction Security System (TSS): The <strong>IBM</strong> Transaction Security System range<br />

of products and services provides comprehensive support for DES and RSA<br />

based cryptographic processing. The system uses the Common Cryptographic<br />

Architecture (CCA), described above, for interoperability across all the<br />

workstation and host environments.<br />

The <strong>IBM</strong> 4755 Cryptographic adapter provides the DES and RSA-based<br />

cryptographic processing for use with DOS, OS/2, AIX and OS/400 environments.<br />

The <strong>IBM</strong> 4754 Security Interface Unit, together with the <strong>IBM</strong> Personal Security<br />

card, supports strong authentication of users, optionally using a Signature<br />

Verification feature, and supports encryption on the smart card as an alternative<br />

encryption source. The <strong>IBM</strong> 4753 network security processor provides the<br />

cryptographic services for the MVS host environment.<br />

Checksums: Easily the simplest mechanism, a simple checksum routine can<br />

compute a value for a system file and compare it with the last known value. If<br />

the two are equal, the file is probably unchanged. If not, the file has been<br />

changed by some unknown means. Though it is the easiest to implement, the<br />

checksum scheme suffers from a serious failing in that it is not very<br />

sophisticated and a determined attacker could easily add enough characters to<br />

the file to eventually obtain the correct value. A specific type of checksum,<br />

called a CRC checksum, is considerably more robust than a simple checksum. It<br />

is only slightly more difficult to implement and provides a better degree of<br />

catching errors. It too, however, suffers from the possibility of compromise by<br />

an attacker. Checksums may be used to detect the altering of information.<br />

However, they do not actively guard against changes being made. For this,<br />

other mechanisms such as access controls and encryption should be used.<br />

Cryptographic Checksums: Cryptographic checksums (also called cryptosealing)<br />

involve breaking a file up into smaller chunks, calculating a (CRC) checksum for<br />

each chunk, and adding the CRCs together. Depending upon the exact algorithm<br />

used, this can result in a nearly unbreakable method of determining whether a<br />

file has been changed. This mechanism suffers from the fact that it is<br />

sometimes computationally intensive and may be prohibitive except in cases<br />

where the utmost integrity protection is desired. Another related mechanism,<br />

called a one-way hash function (or a manipulation detection code (MDC)) can<br />

also be used to uniquely identify a file. The idea behind these functions is that<br />

no two inputs can produce the same output, thus a modified file will not have the<br />

same hash value. One-way hash functions can be implemented efficiently on a<br />

wide variety of systems, making unbreakable integrity checks possible. (Snefru,<br />

a one-way hash function available via USENET as well as the Internet is just one<br />

example of an efficient one-way hash function.)<br />

Chapter 8. Internet Security 239


8.11.3 Conclusion<br />

8.12 Router Security<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

This infrastructure is open, supports industry and defacto standards, and<br />

provides a choice of APIs, toolkits, and services. It can be extended as new<br />

cryptographic engines, toolkits, and APIs evolve.<br />

A total cryptographic function set is provided, supporting the many aspects of<br />

security across the <strong>IBM</strong> product line. Through the supporting services, the<br />

infrastructure can provide a cryptographic programming environment, which can<br />

be inserted into the broader business environment of object technologies and<br />

program development aids. The implied consistency helps with validation and<br />

scenario checking. The infrastructure provides a cryptographic product and<br />

services roadmap, allowing ISVs and end users alike to anticipate cryptographic<br />

extensions and enhancements.<br />

By exploiting these four layers of cryptographic functions, APIs, services and<br />

applications across a variety of hardware and software platforms, businesses<br />

can build and extend applications. Businesses must be confident that they can<br />

fully and efficiently secure their applications in a consistent manner, independent<br />

of the platform used to provide the services and of the APIs most appropriate to<br />

those applications.<br />

This infrastructure enables consistency, choice, full function, high performance<br />

and simplicity to the high level of security required for today’s business<br />

applications.<br />

This section discusses PPP Authentication Protocols on the router <strong>IBM</strong> 2210 at<br />

PPP interfaces. It includes these sections:<br />

• Introduction to PPP Authentication Protocols<br />

• Challenge-Handshake Authentication Protocol (CHAP)<br />

• Password Authentication Protocol (PAP)<br />

8.12.1 Introduction to PPP Authentication Protocols<br />

PPP Authentication Protocols provide a form of security between two nodes<br />

connected via a PPP link. If authentication is required on a box, then<br />

immediately after the two boxes successfully negotiate the use of the link at the<br />

LCP layer (LCP packets are exchanged until LCP goes into an open state), they<br />

go into an authentication phase where they exchange authentication packets. A<br />

box is neither able to carry network data packets nor negotiate the use of a<br />

network protocol (NCP traffic) until authentication negotiations have been<br />

completed.<br />

There are different authentication protocols in use, Password Authentication<br />

Protocol (PAP) and Challenge-Handshake Authentication Protocol (CHAP).<br />

These are described in detail in RFC 1334, and briefly described later in this<br />

section.<br />

Whether a box requires the other end to authenticate itself (and if so, with what<br />

protocol) is determined during the LCP negotiation phase. Hence, in some<br />

sense authentication can be considered to fail even at the link establishment<br />

phase (LCP negotiation), if one end does not know how, or refuses, to use the<br />

authentication protocol that the other end requires.<br />

240 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Each end of a link sets its own requirements for how it wants the other end to<br />

authenticate itself. For example, given two routers A and B connected over a<br />

PPP link, side A may require that B authenticate itself by using PAP, and side B<br />

may require that A similarly identify itself by using CHAP. It is valid for one end<br />

to require authentication while the other end requires none.<br />

In addition to initial authentication during link establishment, with some protocols<br />

an authenticator may demand that the peer reestablish its credentials<br />

periodically. With CHAP, for example, a rechallenge may be issued at any time<br />

by the authenticator and the peer must successfully reply or lose the link. If<br />

more than one authentication protocol is enabled, the router initially attempts to<br />

use them in priority order:<br />

1. CHAP<br />

2. PAP<br />

8.12.2 Challenge-Handshake Authentication Protocol (CHAP)<br />

The Challenge-Handshake Authentication Protocol (CHAP) is used to periodically<br />

verify the identity of the peer using a three-way handshake. This is done upon<br />

initial link establishment, and may be repeated any time after the link has been<br />

established. After the initial link establishment, the authenticator sends a<br />

challenge message to the peer. The peer responds with a value calculated<br />

using a one-way hash function. The authenticator checks the response against<br />

its own calculation of the expected hash value. If the values match, the<br />

authentication is acknowledged; otherwise the connection is terminated.<br />

The Nways MRS Software User’s Guide covers the information about the PPP<br />

Authentication Protocols in detail.<br />

8.12.3 Password Authentication Protocol (PAP)<br />

The Password Authentication Protocol (PAP) provides a simple method for the<br />

peer to establish its identity using a two-way handshake. This is done only upon<br />

initial link establishment. Following link establishment, the peer sends an<br />

ID/password pair to the authenticator until authentication is acknowledged or the<br />

connection is terminated. Passwords are sent over the circuit in the clear, and<br />

there is no protection from playback or repeated trial-and-error attacks. The<br />

peer controls the frequency and timing of the attempts.<br />

8.12.4 Scenario: PPP with Bridging between Two <strong>IBM</strong> 2210s<br />

In this scenario, we have a 2210 with a token-ring interface (2210A) and a 2210<br />

with an Ethernet interface (2210B). Both 2210s are linked together using a PPP<br />

link with RS-232 modems.<br />

The 2210A is a source route translational bridge. The 2210B is a transparent<br />

bridge.<br />

• Interfaces:<br />

2210A token-ring runs at 16 Mbps, and is attached to the LAN using the STP<br />

connector.<br />

2210B Ethernet is attached to the Ethernet LAN using the 10Base-T<br />

connector.<br />

• Bridging:<br />

Chapter 8. Internet Security 241


This soft copy for use by <strong>IBM</strong> employees only.<br />

2210A is a source route translational bridge with SRB on the token-ring<br />

interface, and STB on the serial 1 interface. The bridge number of 2210A is<br />

A. The LAN segment number of the 2210A on the token-ring is 111, and the<br />

TB domain is seen from SRB Domain as the LAN segment number 222.<br />

2210B is a transparent bridge with STB on both serial 1 and Ethernet<br />

interfaces.<br />

• PPP Authentication Protocol:<br />

2210A is configured to authenticate the remote router with the following<br />

configuration:<br />

Authenticate Protocol: PAP<br />

PPP_USER: 2210B<br />

Password: remote<br />

2210B is configured to identify itself on the link when being authenticated by<br />

2210A as shown in the following configuration:<br />

Local name: 2210B<br />

Password: remote<br />

Figure 75. Scenario: PPP Authentication Protocol<br />

8.13 Remote Access Security<br />

Optimizing security in a remote access system requires trade-offs among level of<br />

security, complexity, manageability, cost, ease-of-use, and a myriad of other<br />

factors. Each network manager makes those trade-offs differently, so there is no<br />

single optimal solution for remote access security. There are, however,<br />

optimization strategies that make sense for certain specific categories of remote<br />

access system.<br />

242 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

A small, relatively simple remote access installation with straightforward security<br />

requirements should place as few demands on its network manager as possible.<br />

Therefore, the optimal security system for such installations is simple and<br />

requires minimal initial setup time. Simplicity and low startup effort are best<br />

obtained by using the remote access servers internal database to store<br />

authentication and authorization information.<br />

A remote access server’s internal database should be simple, easy to use, and<br />

require very little up-front time to get working. In addition to storing user names<br />

and passwords, an internal database should also store a configurable set of<br />

attributes for each user, such as call-back, maximum connection time, IP<br />

address, and server administration permissions. The database may also add<br />

security options such as a user lockout feature that disables a user name after a<br />

number of unsuccessful login attempts.<br />

Since each remote access server maintains its own copy of an internal<br />

database, it is imperative that the database can be replicated quickly and easily<br />

for multiple servers. Ideally, user information in a set of remote access servers<br />

should be manageable as if they comprise one integrated system.<br />

For larger-scale remote access systems with straightforward security<br />

requirements, it makes sense for a network manager to trade lengthier initial<br />

setup for long-term time savings in managing the system. Large system security<br />

is best optimized by integrating the remote access system’s authentication and<br />

authorization with a robust centralized authentication service that serves the<br />

network as a whole.<br />

This section discusses about all the features and third-party methods to be used<br />

with the <strong>IBM</strong> 8235 Remote Access.<br />

8.13.1 <strong>IBM</strong> 8235 Security Features<br />

Regarding these security features, you can split the environment into three<br />

different areas:<br />

• The 8235 itself<br />

• The WAN side of the 8235: All components that are connected to the WAN<br />

ports, such as modems, the client systems and possible external security<br />

devices.<br />

• The LAN side of the 8235: All components that can have a LAN connection<br />

with the 8235. In the security context discussed here these will be security<br />

servers.<br />

In accordance with these areas, we discuss the main security features and<br />

options available in three groups, as shown in Figure 76 on page 244:<br />

Chapter 8. Internet Security 243


Figure 76. Overview of Security Options<br />

• 8235 built-in security<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

This includes user ID and password protection as well as other features.<br />

• The WAN side<br />

This is also referred to as out-band, and cover the gatekeeper devices.<br />

• The LAN side<br />

This is also referred to as in-band and, in this section, we cover the six<br />

supported in-band third-party methods.<br />

This discussion includes options built in to the product, external options with<br />

explicit support within the range of 8235 components and black-box external<br />

options of which the 8235 is not aware.<br />

A basic aspect, sometimes underestimated, is physical access to the device. It is<br />

generally recommended to protect the 8235 physically at your location by placing<br />

the device in a secure room or cabinet that can maintain the correct operating<br />

environment. This is not only for security reasons, but also to ensure<br />

uninterrupted operation.<br />

244 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

The device can be administered from any location through the IPX or IP<br />

protocols, or through a dial-in or LAN-to-LAN connection. Only during initial<br />

installation and in case of maintenance should physical access to the device be<br />

necessary.<br />

You can find a lot of information and configuring examples about the features<br />

and third-party methods discussed in this section in <strong>IBM</strong> 8235 Dial-In Access to<br />

LANs Server: Concepts and Implementation, SG24-4816.<br />

8.13.1.1 Security Options on the WAN Side of the 8235<br />

This section includes two areas that are closely related:<br />

• The DIALs clients themselves, their configuration options and how they<br />

support third-party components<br />

• The third-party security devices that have been tested with the 8235 and the<br />

DIALs clients and possible special considerations that apply<br />

DIALs Client Security:<br />

The security features of the 8235 product are mainly carried out by the 8235 box<br />

itself and additional external security servers on the LAN. There is not much a<br />

DIALs client can do to improve its own security by itself, given the fact that a<br />

potential intruder can steal the machine on which the DIALs client is running.<br />

A simple, but important feature is that the client does not store its password. If<br />

a configuration file is stored while the password field is filled in, the password<br />

will not be stored.<br />

Any other security feature needs to be outside the client by the very nature of<br />

the problem. However, the client has to support those external security options.<br />

Third-Party Security Feature<br />

The DIALs client (applies to DOS, Windows and OS/2 version) has a feature to<br />

provide support for entering third-party security information using a terminal<br />

interface.<br />

If you are calling an 8235 that uses a third-party security device, you need to<br />

enter the security information (in addition to your dial-in name and password)<br />

when you connect to the remote network. For this to be possible you need to be<br />

able to enter a dialog mode, receiving prompts and typing answers.<br />

Automating Third-Party Security<br />

The DIALs Client can enter third-party security information for you automatically,<br />

either when you press certain function keys or when the third-party security<br />

phase begins.<br />

Basically, this is possible only by adding some information in the connection file.<br />

Advanced Security Dialog<br />

This is a feature of the DIALs client for Windows only and OS/2.<br />

If you are calling an 8235 that uses a supported third-party security device (such<br />

as SecurID from Security Dynamics, Inc.) that is able to use the Advanced<br />

Security dialog box in the DIALs Client, you will need to enter the security<br />

Chapter 8. Internet Security 245


This soft copy for use by <strong>IBM</strong> employees only.<br />

information (in addition to your dial-in name and password) when you connect to<br />

the remote network. To use the Advanced Security dialog box, make sure that<br />

both of the following conditions are true:<br />

• The 8235 is Version 4.0 (or higher) and is configured to use Advanced<br />

Security.<br />

• The DIALs client is also at Version 4.0, at least.<br />

• You did not select the Third-Party Security Device Installed check box in the<br />

Connection File Options dialog box.<br />

External WAN Security Devices:<br />

There are two manufacturer’s devices that have been developed to work with the<br />

8235. The concept of these products, as shown in Figure 76 on page 244, is to<br />

be transparent and invisible for both client and 8235, once the authentication is<br />

done. The two products are:<br />

• Security Dynamics ACM<br />

• Digital Pathways’ Defender 5000<br />

These devices work with the same token devices as their software LAN side<br />

counterparts, the Security Dynamics ACE server and the Digital Pathways server.<br />

They differ in terms of number of supported users, number of ports and<br />

scalability.<br />

For a general discussion of token devices and two-factor authentication, refer to<br />

“Two-Factor Authentication-Only Solutions” on page 253.<br />

There are pros and cons for this approach:<br />

• Pros<br />

− Can use another serial service in addition to the 8235<br />

− Strong accounting and management<br />

• Cons<br />

− Cannot be used with 8235 modem cards<br />

− Different (yet another) configuration<br />

− Different troubleshooting<br />

− Different modem configuration (Make sure your modem’s speed is<br />

supported.)<br />

To overcome the problem of the integrated modems, there is another approach:<br />

a device that attaches directly to the telephone line. The modem is then<br />

attached to the security device in turn. However, attaching to a public phone<br />

line requires legal ratification. So a product like this might not be available in all<br />

countries.<br />

8.13.1.2 8235 Built-In Security<br />

The main security feature built in to the 8235 is the user list and its capabilities<br />

for both global settings that apply to all users and user-specific profiles with<br />

detailed user privilege configurations.<br />

In addition to that, there are several other integrated security features. They are<br />

described in “Other Built-In Security Features” on page 247.<br />

246 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

User List:<br />

The 8235 and the Management Facility store user information in the 8235<br />

disk-based files called user lists.<br />

When user list security has been configured, the 8235 controls the access of<br />

Dial-In, Dial-Out, and LAN-to-LAN users by the means of user lists. After you<br />

download the user list to the 8235, the 8235 stores the user list in non-volatile<br />

RAM, which means that this information is not lost when you switch the 8235 off.<br />

Note: However, it is recommended that you store the user list on your<br />

Management Facility’s hard disk prior to sending it to the device. Otherwise, if<br />

there is a problem with the 8235 and you cannot continue, you will lose your<br />

work. You can always retrieve the list from disk and reattempt sending it once<br />

the problem is removed.<br />

What can you do with a user list?<br />

• Create a new one<br />

• Open a user list file for editing<br />

• Pull the user list from the selected 8235<br />

In all the cases above, you will be able to manipulate the user list in the same<br />

way using Management Facility panels. When you are finished, you can:<br />

• Store the user list on your disk<br />

• Send it to the device from which you had previously obtained it or send it to<br />

the selected device, if you have just created it<br />

If you want, you can remove a user list that has previously been sent to a<br />

device. These functions allow you to create the same user list for a number of<br />

8235 devices without having to retype every parameter for each box. This is an<br />

advantage when you have several 8235s. However, if you allow users to change<br />

their own password, you must be careful not to end up with different passwords<br />

on each machine. It is recommended that you use centralized user lists in this<br />

case.<br />

Other Built-In Security Features:<br />

The ordinary user passwords are stored in the user list. However, there is<br />

password information in the configuration file as well. This section tells you<br />

where. The general rule is that no password is ever stored without encryption.<br />

The Administrator Password, Shell Access<br />

It is strongly recommended that you assign a non-trivial administrator password<br />

to each 8235. Otherwise, an unauthorized person can reconfigure it. For a<br />

dial-in box such as the 8235, this is even more important than for other devices,<br />

because it accepts switched connections.<br />

Note: The password is not stored in the user list, but in the device configuration.<br />

This password is required for any attempt, not only to reconfigure the device or<br />

the user list, but also to obtain information such as statistics, log file or port<br />

status. Further, port and connection management functions require this<br />

password.<br />

Chapter 8. Internet Security 247


Security Features Specific to Configuration Options<br />

The security features specific to configuration options are:<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

• LAN-to-LAN: For the establishment of LAN-to-LAN connections, a user<br />

ID-based process is used. A user ID authorized for LAN-to-LAN is required<br />

on the local side, and a user ID authorized for LAN-to-LAN is required on the<br />

remote side. However, this process requires storage of user ID and<br />

password information in the configuration (site definition) in addition to the<br />

respective user list.<br />

• AppleTalk: If AppleTalk is enabled, device and zone filtering can be used<br />

effectively to limit access to certain parts of the network for particular ARA<br />

clients or groups.<br />

• Token-Ring: If bridged protocols are used on token-ring, a parameter can be<br />

set in the Additional Configurations page to the effect that source route<br />

bridging is deactivated in the 8235. The 8235 then only bridges these<br />

protocols from the dial-up line into the segment to which it is attached.<br />

NetBIOS and LLC 802.2 access now is limited to that ring.<br />

Note: This parameter exists because there are token-ring networks that do<br />

not employ source route bridging. In those cases the 8235 needs to be able<br />

to turn it off. The security aspect is a side effect.<br />

8.13.1.3 External LAN Security Devices<br />

8235 Version 4.0 or higher directly supports six third-party authentication<br />

databases:<br />

• The NetWare Bindery<br />

• The TACACS server<br />

• The TACACS+ server<br />

• The RADIUS server<br />

• The Security Dynamics ACE server<br />

• The Digital Pathways Defender server<br />

The Bindery as well as the 8235 user lists can store a full user profile. RADIUS<br />

is also capable of full authorization. TACACS and TACACS+ support can work<br />

with a generic user profile that applies to all users being authorized by these<br />

methods.<br />

SecurID and Defender, however, validate only the user identity; they cannot<br />

supply a profile for the user.<br />

Their additional benefit is that they require a token to be provided by the user in<br />

addition to user ID and password. This token (a character string) is obtained<br />

from a token device in possession of the person owning the user ID.<br />

The way to think about such a security design is that SecurID is used to<br />

authenticate users; the other databases are used to both authenticate users and<br />

to authorize access to the 8235’s services. The same applies respectively to<br />

Defender Server.<br />

The token methods are used in conjunction with any one of the authorization<br />

methods. For example, you can use SecurID to authenticate users and the<br />

NetWare Bindery to set up departmental access privileges for groups of users.<br />

248 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

The 8235 then prompts separately for the user name and password for each<br />

method of authentication; this allows you to use some forms of authentication for<br />

group authorizations. (For example, SecurID authenticates the individual, who<br />

then logs in to the Bindery with a user ID of sales to obtain Sales group<br />

permissions.)<br />

Note: If an 8235 is configured to use external security and cannot access the<br />

external security server when a user dials in, then the authentication fails, and<br />

the 8235 denies service to the user. For this reason, it is advisable, if possible,<br />

to have back-up security servers available to avoid a single point of failure.<br />

Servers Providing Authentication and Authorization:<br />

The following methods are mutually exclusive. The activation of any of them<br />

also excludes the activation of both internal user lists and the user list server.<br />

However, there may still be an internal user list to provide global settings for the<br />

chosen method via a special generic user ID.<br />

NetWare Bindery<br />

Note<br />

The 8235 has Bindery Services support only for NetWare 3.x, not for 4.x. The<br />

corresponding service offered by NetWare 4.x, NDS (NetWare Directory<br />

Service) is currently not supported by the 8235.<br />

Do not attempt to use NetWare 4.x Bindery emulation instead. If it is not<br />

supported, it does not work. The reason for this is the fact that Bindery<br />

emulation does not support the slash commands used by the 8235 to store<br />

user profile information that otherwise would go into the internal user list.<br />

NetWare Bindery is a database that resides on a NetWare network 8235 over<br />

IPX. This database contains profiles of users of the network. These profiles<br />

define each user’s name, password, dial-back number, and permission to use<br />

one or more 8235 functions (Dial-In, Dial-Out, and LAN-to-LAN).<br />

TACACS<br />

The Terminal Access Controller Access Control System (TACACS) is a security<br />

protocol used to communicate between 8235s and an IP authentication database.<br />

It is based on UDP.<br />

An 8235 functions as a proxy TACACS client for dial-in users. It forwards the<br />

user’s ID and password to a centralized database that also has the TACACS<br />

protocol. The centralized database looks up the information and sends back an<br />

accept or deny message, which either allows or denies the user access. This<br />

process is entirely transparent to the dial-in user.<br />

Note: Although TACACS runs over IP, the dial-in user need not be using IP to<br />

be authenticated by an 8235 using TACACS.<br />

However, an 8235 using TACACS must have IP enabled.<br />

For more information about TACACS, refer to RFC 1492, An Access Control<br />

Protocol, Sometimes Called TACACS. TACACS and other remote access security<br />

protocols are designed to support thousands of remote connections. In a large<br />

Chapter 8. Internet Security 249


This soft copy for use by <strong>IBM</strong> employees only.<br />

network, the user database is usually large, and is best kept on a centralized<br />

server.<br />

Note: The centralized server can either be a TACACS database or a database<br />

such as the UNIX password file /etc/password with TACACS protocol support.<br />

For example, the UNIX server with TACACS passes requests to the UNIX<br />

database and sends the accept or reject message back to the access server.<br />

In extended TACACS, enhancements were made to support new and advanced<br />

features:<br />

• Multiple TACACS servers.<br />

• syslog - Sends accounting information to a UNIX host.<br />

• connect - The user is authenticated into the access server shell and can<br />

Telnet or initiate SLIP or PPP or ARA.<br />

Extended TACACS is multiprotocol-capable and can authorize connections with:<br />

• SLIP<br />

• Enable<br />

• PPP (IP or IPX)<br />

• ARA<br />

• EXEC<br />

• Telnet<br />

TACACS+, BLOCKADE<br />

TACACS+ is a completely new version of the TACACS protocol referenced by<br />

RFC 1492. It is currently studied by the IETF in order to become an RFC. It is<br />

based on TCP as opposed to UDP to increase security and reliability. We<br />

describe here the potential of this protocol. This does not imply that every<br />

implementation is using all those functions; in particular, the 8235 currently uses<br />

the authentication part only. This may change, once an RFC exists.<br />

• TACACS + General Description:<br />

TACACS+ has three major components: the protocol support within the<br />

access servers and routers, the protocol specification, and the centralized<br />

security database. Similar to an internal security database, TACACS+<br />

supports the following three required features of a security system, which<br />

are three separate protocol components, each of which can be implemented<br />

on separate servers:<br />

− Authentication<br />

- Login and password query<br />

- Challenge/response (CHAP)<br />

- Messaging support (any)<br />

- Encrypted in MD5<br />

- Replaceable with Kerberos 5<br />

− Authorization<br />

250 The Technical Side of Being an Internet Service Provider<br />

- One authentication<br />

- Authorization for each service<br />

- Per-user access list and user profile<br />

- Users can belong to groups<br />

- IP and Telnet support (IPX, ARA future)<br />

- Any access or command and permission or restrictions


This soft copy for use by <strong>IBM</strong> employees only.<br />

− Accounting<br />

TACACS+ provides accounting information to a database through TCP<br />

to ensure a more secure and complete accounting log. The accounting<br />

portion of the TACACS+ protocol contains the network address of the<br />

user, the user name, the service attempted, protocol used, time and<br />

date, and the packet-filter module originating the log. For Telnet<br />

connections, it also contains source and destination port, action carried<br />

(communication accepted, rejected), log, and alert type. Formats are<br />

open and configurable.<br />

The billing information includes connect time, user ID, location connected<br />

from, start time, and stop time. It identifies the protocol that the user is<br />

using and may contain commands being run if the users are connected<br />

through exec and Telnet.<br />

• TACACS + and the 8235:<br />

The following features are supported for TACACS+ servers:<br />

− Authentication through the TACACS+ server when a user logs in to an<br />

8235.<br />

− Challenge/response dialogs are transmitted to the TACACS+ server by<br />

the 8235 if the TACACS+ server is configured for challenge/response.<br />

− Data encryption of TACACS+ packets sent over the network.<br />

Note: Since the authorization capabilities of TACACS+ are not used<br />

currently, all users are given the same user privileges. These privileges can<br />

be modified through a generic user profile TACACS or through the Additional<br />

Configuration page. There is only one generic user ID TACACS that applies<br />

to both TACACS and TACACS+.<br />

• Blockade - A sample TACACS + Server<br />

An example of a TACACS+ server that has been tested with the 8235 is<br />

Blockade for <strong>IBM</strong> 8235. There are four systems along with their respective<br />

components involved in the authentication (currently authentication is the<br />

only supported feature):<br />

1. The DIALs client, attempting to log in.<br />

2. The 8235, configured with TACACS+ as an external security device.<br />

3. An OS/2 system, having IP connectivity with the 8235, running the<br />

Blockade for <strong>IBM</strong> 8235 software. This is the TACACS+ server to be<br />

specified in the 8235. Within the Blockade terminology this is called a<br />

Distributed Third-party Authentication Server (DAS).<br />

4. An MVS system with RACF (other supported options: ACF2, Top Secret),<br />

running the Blockade Enterprise Security Server (ESS), which acts as a<br />

link between RACF and the DAS. Note that the VM platform is not<br />

supported by this product.<br />

This is a short description based on Blockade System’s documentation. (You<br />

can see all the information available on http://www.blockade.com.)<br />

Blockade for <strong>IBM</strong> 8235 enhances the functionality of the <strong>IBM</strong> remote access<br />

server by providing centralized administration, extended user authentication<br />

and enhanced logging and audit. All security management is centralized on<br />

the MVS platform using RACF. Blockade for <strong>IBM</strong> 8235 operates as a DAS<br />

that communicates with the <strong>IBM</strong> 8235. The Blockade for <strong>IBM</strong> 8235 DAS in<br />

turn communicates with the Blockade ESS residing on the MVS platform.<br />

Chapter 8. Internet Security 251


This soft copy for use by <strong>IBM</strong> employees only.<br />

When a user attempts to connect to the LAN using the <strong>IBM</strong> 8235, the<br />

Blockade DAS collects the necessary identification information (this may be<br />

user ID and password, user ID/password/dynamic token information, etc.). It<br />

then passes the information to the ESS for authentication against user profile<br />

information stored in the RACF database.<br />

There is no technical limit to the number of 8235s supported by one DAS.<br />

Blockade for <strong>IBM</strong> 8235 supports all leading token devices for extended user<br />

authentication. All support is provided by the ESS without requiring any<br />

additional hardware or software. Token device manufacturers explicitly<br />

listed by Blockade are Security Dynamics, Digital Pathways and<br />

CRYPTOCard. For more details on token devices, see “Two-Factor<br />

Authentication-Only Solutions” on page 253.<br />

The bottom line is that control of remote LAN access is centralized around<br />

an existing mainframe security product. As an additional benefit, you get<br />

remote LAN access audit records written to SMF.<br />

RADIUS<br />

Remote Authentication Dial-In User Service (RADIUS) is another distributed<br />

security solution to centralize authentication for multiple, distributed<br />

communication servers such as the 8235. It has a feature important for service<br />

providers: it is capable of providing accounting and billing information.<br />

RADIUS includes two pieces: an authentication server and client protocols.<br />

The server is a UNIX software product developed by Livingston Enterprises (see<br />

http://www.livingston.com). It is being shipped in source code format and can be<br />

adapted to work with systems and protocols already in use. Ports have been<br />

reported to the following platforms:<br />

• AIX<br />

• HP/UX<br />

• SunOS<br />

• Solaris<br />

• Ultrix<br />

• Alpha OSF/1<br />

• BSDI BSD/386<br />

• Linux<br />

• SCO<br />

• UnixWare<br />

The RADIUS protocol defines how authentication and authorization information of<br />

users is sent between the server and the 8235 that acts as a client. The full<br />

protocol specification is available as an Internet-draft form in the Internet<br />

Engineering Task Force (IETF).<br />

This communication is conducted using UDP. The packets traveling between the<br />

8235 and the RADIUS server are encrypted with a method that uses a 64-byte<br />

key.<br />

The authentication request is sent over the network from the 8235 to the RADIUS<br />

server. This communication can be done over a local or wide area network,<br />

allowing network managers to locate RADIUS clients such as the 8235 remotely<br />

from the RADIUS server. If the server cannot be reached, the client can route<br />

the request to an alternate server.<br />

252 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Note: This enables global enterprises to offer their users a dial-in service with a<br />

unique login user ID for corporate wide access, no matter what access point is<br />

being used.<br />

When an authentication request is received, the server validates the request,<br />

then decrypts the data packet to access the user name and password<br />

information. This information is passed on to the appropriate security system<br />

being supported.<br />

This could be UNIX password files, Kerberos, a commercially available security<br />

system or even a custom developed security system.<br />

If the user name and password are correct, the server sends an authentication<br />

acknowledgment. If at any point in this log-in process conditions are not met,<br />

the RADIUS server sends an authentication reject to the 8235 and the user is<br />

denied access to the network.<br />

A single RADIUS server can support hundreds of communication servers and<br />

tens of thousands of users.<br />

The RADIUS architecture supports third-party security enhancements, similar to<br />

the 8235 itself. So it allows centralization and unification of enhanced, tokenized<br />

authentication even if a mix of different communication servers is used including<br />

some that cannot invoke tokenized authentication servers themselves. This is<br />

not the case with the 8235, which supports SecurID and Digital Pathways<br />

Defender of its own. However, if a method not supported by the 8235 is<br />

preferred, it can be integrated via RADIUS.<br />

RADIUS Accounting is a recent enhancement. It uses the RADIUS protocol for<br />

its packet format and adds attributes to handle the additional information needed<br />

for accounting. The accounting server listens for UDP packets at port 1646, and<br />

is not required to run on the same host as the RADIUS server, although that can<br />

be done and is often convenient. A backup accounting server is supported.<br />

Note: The current Release 4.0 of the 8235 only supports RADIUS authentication.<br />

The 8235-I40 will support RADIUS Accounting. At the time of writing no details<br />

were available.<br />

Two-Factor Authentication-Only Solutions:<br />

For a sophisticated hacker or a determined insider it is relatively easy to<br />

compromise a user’s password and gain access to valuable information<br />

resources.<br />

Single-factor identification (a static password) may hence be considered<br />

insecure. Many people choose poor passwords or store them in unsecured<br />

places; they attach them to their keyboard, PC or monitor, for example. A high<br />

percentage of successful break-ins into networks are due to guessed or stolen<br />

passwords.<br />

Before any other security measure is meaningful, authorized system users<br />

should be reliably identified, while all unauthorized users must be locked out.<br />

The method discussed in this section is a two-factor authentication. It consists<br />

of:<br />

Chapter 8. Internet Security 253


This soft copy for use by <strong>IBM</strong> employees only.<br />

• Something secret that a person knows, such as a memorized password or<br />

personal identification number (PIN)<br />

• Something unique that a person owns, such as a smart card that generates a<br />

random token<br />

The 8235 supports two external two-factor authorization methods:<br />

• Security Dynamics’ SecurID ACE Server<br />

• Digital Pathways Defender Server<br />

SecurID<br />

There are four components of a full implementation of SecurID:<br />

• ACE/Server<br />

This component, which uses the UDP Protocol to communicate with an 8235,<br />

runs on a UNIX machine. Supported platforms listed by Security Dynamics<br />

Inc. are <strong>IBM</strong> AIX, Sun Microsystems’ SunOS/Solaris, Hewlett Packard’s<br />

HP-UX. (The 8235 is compatible with any ACE/Server Version 1.1 or higher.)<br />

You must purchase this server software from Security Dynamics, Inc. (see<br />

more information on http://www.securid.com).<br />

The 8235 supports the use of secondary ACE/Servers. A secondary ACE<br />

server is a backup to the primary server. When the primary server is down,<br />

the secondary server authenticates user logins and maintains an audit trail.<br />

• SecurID client<br />

This component runs on the 8235 and communicates with the SecurID server<br />

via UDP. It is enabled when you configure the 8235 for SecurID.<br />

• SecurID token<br />

The SecurID token is an access control security token that is used to<br />

positively identify users of computer systems and networks. It automatically<br />

generates a unique, unpredictable access code every 60 seconds. This<br />

access code, in combination with the user’s PIN, is typed by the user at login<br />

time. The SecurID client function within the 8235 passes this on to the<br />

SecurID server. Relying on a correct system clock, the server is<br />

synchronized with the token and thus either permits or denies access for this<br />

user.<br />

Security Dynamics lists two types of token devices:<br />

1. The SecurID card with a 6-digit display.<br />

2. The SecurID PINPAD card that requires the PIN to be entered before a<br />

token is displayed. This is so the secret PIN is not transmitted over any<br />

line and is not exposed to snooping.<br />

• Dial-in client software<br />

This component is the DIALs Client program for PC users or the ARA<br />

program for Macintosh users.<br />

Digital Pathways Defender Security Server<br />

You can find any information about this product on Digital Pathways, Inc.’s Web<br />

site:<br />

http://www.digpath.com<br />

254 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.14 Secure Web Servers<br />

There are four components involved in this two-factor authorization:<br />

• Defender security server<br />

This software component, which must be purchased from Digital Pathways,<br />

Inc., runs either on NetWare (as an NLM), Windows NT or UNIX. It provides<br />

the centralized authentication database. It supports multiple servers.<br />

Currently the 8235 supports two of them.<br />

• Communication server as agent<br />

This is the 8235 configured as the Defender security server agent. When the<br />

8235 starts up, it uses IP (in case of Windows NT or UNIX) or IPX (in case of<br />

NetWare as the server platform) to connect to the primary Digital Pathways<br />

server. The Digital Pathways server authenticates the 8235 using the agent<br />

ID and agent key. These need to be configured identically on both machines.<br />

If the authentication is successful, the connection remains active.<br />

• SecureNet Key token<br />

SecureNet Key token devices must be purchased from Digital Pathways, Inc.<br />

They use a challenge/response process with the Defender server. The<br />

server sends an 8-digit challenge. The user enters this and the PIN into<br />

SecureNet Key. SecureNet Key then displays an 8-digit response which, in<br />

turn is typed in by the user and is used to either accept or deny this login.<br />

With this method, only one-time information gets transmitted over the line;<br />

no PIN or password can be overheard by a hacker.<br />

• Dial-in client software<br />

This component is the DIALs Client program for PC users, having the<br />

Third-Party Security feature enabled. After modem negotiation, a TTY<br />

window appears and displays the challenge prompt coming from the<br />

Defender server. This is how the user carries out the challenge/response<br />

dialog imbedded in the 8235 dial-in procedure.<br />

Note: An 8235 configured to use Digital Pathways authentication can answer<br />

LAN-to-LAN connections, but the LAN-to-LAN connection establishment will not<br />

use Digital Pathways authentication; the connection will be made using only the<br />

primary authentication method.<br />

The World Wide Web (WWW) is a distributed hypermedia system which is rapidly<br />

gaining acceptance among Internet users. Although many WWW browsers<br />

support other, preexisting Internet application protocols, the native and primary<br />

protocol used between WWW clients and servers is the HyperText Transfer<br />

Protocol. The ease of use of the Web has prompted widespread interest in its<br />

employment as a client/server architecture for many applications. Many such<br />

applications require the client and server to be able to authenticate each other<br />

and exchange sensitive information confidentially. Current HTTP implementations<br />

have only modest support for the cryptographic mechanisms appropriate for<br />

such transactions. Secure HTTP (S-HTTP) and Secure Socks Layer are special<br />

protocols that provide secure communication mechanisms between the browser<br />

and the server in order to enable spontaneous commercial transactions for a<br />

wide range of applications.<br />

Chapter 8. Internet Security 255


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 77. Secure Web Server. All data is encapsulated using a secure protocol and sent across the TCP/IP<br />

channel. Only the server and the relative client at this moment can understand the data built in this secure<br />

protocol.<br />

8.14.1 Secure Hypertext Transfer Protocol (S-HTTP)<br />

Secure HTTP (S-HTTP) provides secure communication mechanisms between an<br />

HTTP client/server pair in order to enable spontaneous commercial transactions<br />

for a wide range of applications.<br />

Our design intent is to provide a flexible protocol that supports multiple<br />

orthogonal operation modes, key management mechanisms, trust models,<br />

cryptographic algorithms and encapsulation formats through option negotiation<br />

between parties for each transaction.<br />

Secure HTTP supports a variety of security mechanisms to HTTP clients and<br />

servers, providing the security service options appropriate to the wide range of<br />

potential end uses possible for the World Wide Web. The protocol provides<br />

symmetric capabilities to both client and server (in that equal treatment is given<br />

to both requests and replies, as well as for the preferences of both parties) while<br />

preserving the transaction model and implementation characteristics of the<br />

current HTTP. Several cryptographic message format standards may be<br />

incorporated into S-HTTP clients and servers, including, but not limited to,<br />

PKCS-7, PEM, and PGP.<br />

S-HTTP supports interoperation among a variety of implementations, and is<br />

compatible with HTTP. S-HTTP aware clients can talk to S-HTTP oblivious<br />

256 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.14.2 Secure Socks Layer<br />

servers and vice versa, although such transactions obviously would not use<br />

S-HTTP security features.<br />

S-HTTP does not require client-side public key certificates (or public keys),<br />

supporting symmetric session key operation modes. This is significant because it<br />

means that spontaneous private transactions can occur without requiring<br />

individual users to have an established public key. While S-HTTP will be able to<br />

take advantage of ubiquitous certification infrastructures, its deployment does<br />

not require it.<br />

S-HTTP supports end-to-end secure transactions, in contrast with the existing<br />

defacto HTTP authorization mechanisms which require the client to attempt<br />

access and be denied before the security mechanism is employed. Clients may<br />

be primed to initiate a secure transaction (typically using information supplied in<br />

an HTML anchor); this may be used to support encryption of fill-out forms, for<br />

example.<br />

With S-HTTP, no sensitive data need ever be sent over the network in the clear.<br />

S-HTTP provides full flexibility of cryptographic algorithms, modes and<br />

parameters. Option negotiation is used to allow clients and servers to agree on<br />

transaction modes. Should the request be signed? Encrypted? Both? What<br />

about the reply?<br />

S-HTTP attempts to avoid presuming a particular trust model, although its<br />

designers admit to a conscious effort to facilitate multiply-rooted hierarchical<br />

trust, and anticipate that principals may have many public key certificates.<br />

Message protection may be provided on three orthogonal axes: signature,<br />

authentication, and encryption. Any message may be signed, authenticated,<br />

encrypted, or any combination of these (including no protection).<br />

The SSL protocol is designed to provide privacy between two communicating<br />

applications (a client and a server). Second, the protocol is designed to<br />

authenticate the server, and optionally the client. SSL requires a reliable<br />

transport protocol for data transmission and reception. The advantage of the<br />

SSL protocol is that it is application protocol-independent. A higher level<br />

application protocol (for example: HTTP, FTP, TELNET, etc.) can layer on top of<br />

the SSL protocol transparently. The SSL protocol can negotiate an encryption<br />

algorithm and session key as well as authenticate a server before the<br />

application protocol transmits or receives its first byte of data. All of the<br />

application protocol data is transmitted encrypted, ensuring privacy. The SSL<br />

protocol provides channel security which has three basic properties:<br />

• The channel is private. Encryption is used for all messages after a simple<br />

handshake is used to define a secret key.<br />

• The channel is authenticated. The server endpoint of the conversation is<br />

always authenticated, while the client endpoint is optionally authenticated.<br />

• The channel is reliable.<br />

check (using a MAC).<br />

The message transport includes a message integrity<br />

In SSL, all data sent is encapsulated in a record, an object that is composed of a<br />

header and some non-zero amount of data. The primary goal of the SSL<br />

protocol is to provide privacy and reliability between two communicating<br />

applications. The protocol is composed of two layers. At the lowest level,<br />

Chapter 8. Internet Security 257


This soft copy for use by <strong>IBM</strong> employees only.<br />

layered on top of some reliable transport protocol is the SSL Record Protocol.<br />

The SSL Record Protocol is used for encapsulation of various higher level<br />

protocols. One such encapsulated protocol, the SSL Handshake Protocol, allows<br />

the server and client to authenticate each other and to negotiate an encryption<br />

algorithm and cryptographic keys before the application protocol transmits or<br />

receives its first byte of data. One advantage of SSL is that it is application<br />

protocol independent. A higher level protocol can layer on top of the SSL<br />

Protocol transparently. The SSL protocol provides connection security that has<br />

three basic properties:<br />

• The connection is private. Encryption is used after an initial handshake to<br />

define a secret key. Symmetric cryptography is used for data encryption.<br />

• The peer′s identity can be authenticated using asymmetric, or public key,<br />

cryptography.<br />

• The connection is reliable. Message transport includes a message integrity<br />

check using a keyed MAC. Secure hash functions (for example, SHA, MD5,<br />

etc.) are used for MAC computations.<br />

The goals of SSL Protocol, in order of their priority, are:<br />

• Cryptographic security: SSL should be used to establish a secure connection<br />

between two parties.<br />

• Interoperability: Independent programmers should be able to develop<br />

applications utilizing SSL that will then be able to successfully exchange<br />

cryptographic parameters without knowledge of one another′s code.<br />

• Extensibility: SSL seeks to provide a framework into which new public key<br />

and bulk encryption methods can be incorporated as necessary. This will<br />

also accomplish two sub-goals: to prevent the need to create a new protocol<br />

(and risking the introduction of possible new weaknesses) and to avoid the<br />

need to implement an entire new security library.<br />

• Relative efficiency: Cryptographic operations tend to be highly CPU-intensive,<br />

particularly public key operations. For this reason, the SSL protocol has<br />

incorporated an optional session caching scheme to reduce the number of<br />

connections that need to be established from scratch. Additionally, care has<br />

been taken to reduce network activity.<br />

258 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 78. SSL and S-HTTP Protocols. The browsers that supports SSL and HTTP can access servers that are not<br />

using security resources, but the non-secure browsers cannot access this secure server when the security<br />

resources are enabled.<br />

8.14.3 Control Access Products to Web Sites and Home Pages<br />

The Internet is fast becoming a part of everyone’s life. And with access<br />

becoming easier and easier, the already staggering number of 30 million<br />

subscribers is growing exponentially each month. Soon nearly all people with<br />

home computers will be a part of the Internet community.<br />

This has many benefits: sharing of resources and ideas, communicating with<br />

people in remote corners of the globe, and huge amounts of readily accessible<br />

reference materials. But like any community it has its darker side. Hate mail,<br />

racist speeches, pornographic material, bomb and drug formulas, and other<br />

sensitive and inappropriate information is being sent right into our homes along<br />

with everything else.<br />

The following products below are available in the Internet and have the intention<br />

to prevent or block the access to a Web site containing some prohibited or<br />

immoral material. You can indicate them for your users when they ask you<br />

about how to control or block the access, for example, when parents don’t want<br />

their children to see a pornographic home page.<br />

8.14.3.1 SurfWatch<br />

SurfWatch is an award-winning easy-to-use filtering software solution that<br />

parents, educators and employers can use to screen the Internet providing a<br />

unique technical alternative to government censorship. SurfWatch is provided by<br />

Spyglass and you can get more information on http://www.surfwatch.com.<br />

Evaluation Policies: A site will be blocked if it meets the following guidelines:<br />

• A disclaimer indicating restricted access; a screen or warning that identifies<br />

the site as adult-oriented or containing information unsuitable for those<br />

under age.<br />

Chapter 8. Internet Security 259


This soft copy for use by <strong>IBM</strong> employees only.<br />

• The publisher has requested that his/her site be blocked.<br />

• Any page or site that predominantly contains links to sites matching the<br />

following criteria:<br />

− Sexually explicit<br />

− Violence or hate speech<br />

− Drugs or alcohol<br />

− Gambling<br />

Customizing SurfWatch Filters<br />

SurfWatch may block sites that some users will want to have available, and may<br />

allow access to some sites that users may want blocked. SurfWatch products<br />

provide the ability to customize filtering according to individual standards. The<br />

SurfWatch Manager feature allows your user to customize the filters that<br />

SurfWatch employs.<br />

SurfWatch Family<br />

• SurfWatch for Windows and Macintosh<br />

SurfWatch is available for Windows95, Windows 3.1 and Macintosh and can<br />

easily be installed and used with any WWW browser. SurfWatch blocks tens<br />

of thousands of explicit sites locally at the user′s machine, without restricting<br />

the access rights of other Internet users. Filters are constantly updated<br />

using a combination of pattern-matching technologies and a tracking of<br />

known adult-oriented sites. Monthly updates provide users the most recent<br />

list of blocked sites.<br />

• SurfWatch for Microsoft Proxy Server<br />

Spyglass is offering SurfWatch for Microsoft Proxy Server. In addition to the<br />

high-speed Internet access you gain from the Microsoft Proxy Server, user<br />

organizations can take advantage of the trusted Internet content filters<br />

provided by SurfWatch.<br />

• SurfWatch for Oracle Proxy Server<br />

Spyglass announced a new alliance with Oracle. In addition to all of the<br />

advantages your users gain from the Oracle Proxy Server, user<br />

organizations can now take advantage of the trusted Internet content filters<br />

provided by SurfWatch for Oracle Proxy Server.<br />

8.14.3.2 Net Nanny<br />

Net Nanny is a software program that allows you to monitor, screen and block<br />

access to anything residing on, or running in, out or through your PC, online or<br />

off. It′s two-way screening in real-time and only you determine what is screened<br />

with the help of its site list which can be downloaded free from the Net Nanny’s<br />

Web site. It′s a complete Internet and PC management tool. It runs with all the<br />

major online providers too.<br />

Net Nanny operates on the Internet, non-Internet BBSs, all major online services<br />

such as Compuserve, AOL & Prodigy (Both proprietary and Internet components)<br />

and all local applications running on the PC.<br />

There are no monthly site update subscription fees ever.<br />

260 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

This software was designed with the safety of users′ children as top priority. But<br />

this software may also be used to prevent access to certain information on your<br />

PC. Here are some examples of the benefits to use Net Nanny:<br />

• Prevents users′ personal information (address, phone and credit card<br />

numbers) from being given out on the Internet.<br />

• Provides users with free can go and can’t go site lists to download into the<br />

screening databases.<br />

• Prevents loading, downloading and running of unauthorized software or<br />

CD-ROMs.<br />

• Prevents user-definable words, phrases, sites, URLs, Newsgroups and IRC<br />

Chat Rooms from being sent from, received by, or accessed by your PC.<br />

• Mask inappropriate words, phrases or language.<br />

• Block images too. Screen individual sites let your user know the name of<br />

like “Playmate.html”. Block GIFs or JPEGs and release the function when<br />

you′re supervising.<br />

• Prevent users′ disks and hard drives from being reformatted.<br />

• Prevent users′ files from being deleted or tampered with.<br />

• Develop users′ own screening list for sites, words, phrases and subjects.<br />

• Audit Trail of monitored sites, words, phrases and user-defined content on<br />

the PC.<br />

• Audit Trail indicates PC startup, and triggered violation shutdown item dates<br />

and times.<br />

• Operates with all major online providers and in e-mail and IRC.<br />

• Screens all PC activity including TCP/IP streams, Internet tools and other<br />

Bulletin Board Services (BBS) online, and any and all Windows or DOS<br />

applications offline.<br />

• Net Nanny has other convenient functions. Tell Net Nanny what your user<br />

does not want entered or received on his/her terminal.<br />

• Select the terminal action you want to take for violations: monitor, log,<br />

mask, warn, block, application shutdown, or all.<br />

• Installs, enables, disables or removes easily.<br />

• Administration Program allows access to all Net Nanny functions.<br />

• Leaves no extra files on disk when removed.<br />

• Parents, teachers or employers may add, modify, or delete screening list<br />

items at any time.<br />

• Parents, teachers or employers may turn Net Nanny on and off, at their own<br />

discretion.<br />

• Cannot be turned off unless done through the Administration Program.<br />

• Net Nanny operates with or without the children knowing.<br />

See http://www.netnanny.com for more information.<br />

Chapter 8. Internet Security 261


This soft copy for use by <strong>IBM</strong> employees only.<br />

8.14.3.3 CYBERsitter 97<br />

CYBERsitter 97 is even more advanced than previous versions. Strictly 32-bit,<br />

CYBERsitter 97 is designed for Windows 95 and Windows NT exclusively. It<br />

works with dial-up networking and network connections.<br />

CYBERsitter 97 gives the parent or other concerned individual the ability to limit<br />

their children′s access to objectionable material on the Internet. Parents can<br />

choose to block, block and alert, or simply alert them when access to these<br />

areas is attempted.<br />

Working secretly in the background, CYBERsitter analyzes all Internet activity.<br />

Whenever it detects activity the parent has elected to restrict, it takes over and<br />

blocks the activity before it takes place. If desired, CYBERsitter will maintain a<br />

complete history of all Internet activity, including attempts to access blocked<br />

material.<br />

Password protected, CYBERsitter is easy to deactivate or reconfigure by the<br />

parent, and virtually impossible for the child to detect or defeat.<br />

CYBERsitter 2.1 was picked as “Editor’s Choice” in the filtering software<br />

category by PC Magazine, April 1997.<br />

CYBERsitter includes:<br />

• Lists that can block literally 1000s of World Wide Web sites that are not<br />

suitable for children. Any site that focuses on topics such as adult or sexual<br />

issues, illegal activities, bigotry, racism, drugs, or pornography are included<br />

in the list.<br />

• CYBERsitter′s bad site list also includes hundreds of USENET Newsgroups<br />

that focus on the same types of topics as the above WWW sites. You can<br />

optionally block access to all Newsgroups.<br />

• CYBERsitter′s can optionally block all access to Internet chat (IRC).<br />

• One of CYBERsitter′s most unique features is its state of the art phrase<br />

filtering function. Rather than block single words or pre-defined phrases,<br />

CYBERsitter actually looks at how the word or phrase is used in context. Not<br />

only does this provide an excellent blocking method for objectionable text,<br />

but it eliminates the possibility that words with double meanings will be<br />

inadvertently blocked.<br />

• It can be set to block all FTP access.<br />

from unauthorized downloads.<br />

This can help to keep your system safe<br />

• It has a built-in, one mouse click function for updating its filter file. It takes<br />

just a few seconds, and it′s always free.<br />

Its filter file is updated daily and because the Internet changes on a daily<br />

basis, CYBERsitter give users the capability to always be up-to-date.<br />

CYBERsitter 97 includes AutoUpdate. It is no longer necessary to manually<br />

update filter files. CYBERsitter automatically updates users′ filter files every<br />

week while users are doing other online activities. This new feature<br />

operates secretly in the background.<br />

CYBERsitter is provided by Solid Oak Software and you can find more<br />

information on http://www.solidoak.com.<br />

262 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Figure 79. CYBERtimer Control Access Product<br />

8.14.3.4 CYBERtimer<br />

CYBERtimer is a program for Windows 95 Internet access control and is part of<br />

the CYBERsitter family of products designed to help parents, educators, and<br />

other adults responsible for children’s Internet access to better manage their<br />

time online as well protect them from objectionable material.<br />

Designed as two separate utilities, CYBERtimer and CYBERsitter can be used<br />

separately or together to suit user needs. CYBERtimer was developed primarily<br />

at the request of a great number of CYBERsitter’s customers. While CYBERsitter<br />

does an outstanding job of restricting access to objectionable material on the<br />

Internet, many customers have reported that their children spend far too much<br />

time online and have become ”Internet junkies“. Others report finding that their<br />

children have been spending half the night in chat rooms while their parents<br />

thought they were asleep.<br />

CYBERtimer addresses these problems by allowing parents to specify a<br />

maximum amount of time online a child can spend on a daily, weekly, or monthly<br />

basis. Additionally, parents can specify a time period when Internet access will<br />

be allowed.<br />

Features include:<br />

• Simple 1 minute setup<br />

• Control online access by time of day<br />

• Specify an allowable number of hours online per day, week, or month<br />

• Easily reconfigure when needed<br />

• Password protected<br />

• Works with America On-line<br />

Chapter 8. Internet Security 263


8.15 Security Mailing Lists<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

8.14.3.5 Cyber Patrol<br />

Cyber Patrol is an Internet access management utility that parents and teachers<br />

use to control children′s access to the Internet.<br />

It allows those responsible for children to restrict access to certain times of day,<br />

limit the total time spent online in a day, and block access to Internet sites they<br />

deem inappropriate. Cyber Patrol also can be used to control access to the<br />

major online services and to local applications such as games and personal<br />

financial managers.<br />

Cyber Patrol comes loaded with Microsystems Software’s The CyberNOT List, a<br />

listing of researched Internet sites containing materials which parents may find<br />

questionable as well as the “The CyberYES List”; a listing of researched Internet<br />

sites containing fun and educational material for children. Parents can choose<br />

to use either the CyberNOT Block List or the CyberYES Allowed Sites List<br />

according to the individual child′s needs. Using the block list allows users to go<br />

everywhere except to prohibited sites. Using the allowed sites list restricts the<br />

user to only the sites on the list.<br />

The block list is divided into categories and access can be managed down to the<br />

file directory or page level. This means that appropriate material at an Internet<br />

address need not be blocked simply because there is some restricted material<br />

elsewhere at the address. Parents and teachers may select all or any of the<br />

categories to be blocked by general content, time of day, or specific Internet site.<br />

A lot of information can be found on http://www.cyberpatrol.com.<br />

The UNIX Security Mailing List exists to notify system administrators of security<br />

problems before they become common knowledge, and to provide security<br />

enhancement information. It is a restricted-access list, open only to people who<br />

can be verified as being principal systems people at a site. Requests to join the<br />

list must be sent by either the site contact listed in the Defense Data Network′s<br />

Network Information Center′s (DDN NIC) WHOIS database, or from the root<br />

account on one of the major site machines. You must include the destination<br />

address you want on the list, an indication of whether you want to be on the mail<br />

reflector list or receive weekly digests, the electronic mail address and voice<br />

telephone number of the site contact if it isn′t you, and the name, address, and<br />

telephone number of your organization. This information should be sent to<br />

SECURITY-REQUEST@CPD.COM.<br />

The RISKS digest is a component of the ACM Committee on Computers and<br />

Public Policy. It is a discussion forum on risks to the public in computers and<br />

related systems, and along with discussing computer security and privacy<br />

issues, has discussed such subjects as the Stark incident, the shooting down of<br />

the Iranian airliner in the Persian Gulf (as it relates to the computerized<br />

weapons systems), problems in air and railroad traffic control systems, software<br />

engineering, and so on. To join the mailing list, send a message to<br />

RISKS-REQUEST@CSL.SRI.COM. This list is also available in the USENET<br />

newsgroup comp.risks.<br />

The VIRUS-L list is a forum for the discussion of computer virus experiences,<br />

protection software, and related topics. The list is open to the public, and is<br />

implemented as a moderated digest. Most of the information is related to<br />

264 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

personal computers, although some of it may be applicable to larger systems.<br />

To subscribe, send to the address<br />

LISTSERV%LEHI<strong>IBM</strong>1.BITNET@MITVMA.MIT.EDU the line:<br />

SUB VIRUS-L your full name<br />

This list is also available via the USENET newsgroup comp.virus.<br />

The TCP/IP Mailing List is intended to act as a discussion forum for developers<br />

and maintainers of implementations of the TCP/IP protocol suite. It also<br />

discusses network-related security problems when they involve programs<br />

providing network services, such as Sendmail. To join the TCP/IP list, send a<br />

message to TCP/IP-REQUEST@NISC.SRI.COM. This list is also available in the<br />

USENET newsgroup comp.protocols.tcp/ip. The USENET groups misc.security<br />

and alt.security also discuss security issues. Misc.security is a moderated group<br />

and also includes discussions of physical security and locks. Alt.security is<br />

un-moderated.<br />

Chapter 8. Internet Security 265


266 The Technical Side of Being an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.


This soft copy for use by <strong>IBM</strong> employees only.<br />

Chapter 9. Capacity Planning<br />

9.1 Introduction<br />

9.2 Content Type<br />

This chapter contains useful information to do efficient server capacity planning,<br />

as well as considerations about programming, domain and IP addressing, staff<br />

members and how to estimate the costs that are involved to build your ISP<br />

environment.<br />

Sizing a Web server for the Internet can be a very difficult task. The Internet<br />

includes millions of interconnected individuals who are navigating from one Web<br />

server to the next in search of information that has value to them.<br />

Rapid advances in Internet technology are changing the way we work. New<br />

technologies of software and hardware are announced every day. Selecting the<br />

proper server hardware is vital to those ISPs who want to be productive now and<br />

in the future. Internet applications need servers capable of providing information<br />

that is available full-time with good performance.<br />

Availability and performance are fundamental requirements when we talk about<br />

servers that will be connected on the Internet and about the recommendations at<br />

the end of this chapter. There is no Internet user that likes to wait to receive<br />

information. You need to guarantee that your server will deliver information<br />

faster so that these users will want to be consumers of your products and<br />

services.<br />

Today you can use all existing platforms to deliver information on the Internet,<br />

such as Intel and RISC-based machines, AS/400 and mainframes. You need to<br />

choose the system that fills your performance needs and investment limits.<br />

Another consideration that you must have in mind during the capacity planning<br />

is that the operating system on which your server is going to run is probably the<br />

decisive factor in your choice of a Internet programming language. Not all<br />

Internet programming languages are available on every platform.<br />

This fact is not only essential when you plan to develop Internet or intranet<br />

applications, but also if you consider migrating your server to another platform.<br />

As with equipment and programming applications, the initial evaluation process<br />

should take into account the number of staff and the level of expertise necessary<br />

to plan, build, launch and maintain the ISP’s site.<br />

The following sections describe the considerations necessary when choosing a<br />

hardware system, a programming interface, your staff members and a lot of<br />

other important information, as well as a planning for future expansion.<br />

To specify the size of your Web content, you must first attempt to measure the<br />

amount of data that is likely to flow to and from your Web site. Initially, doing so<br />

can be difficult because if you are offering something new and unusual on your<br />

site, you may see much more traffic than you expect; some popular sites<br />

© Copyright <strong>IBM</strong> Corp. 1997 267


9.2.1 Internet Services<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

generate 100,000 hits a day; in other words, the number of times a day that you<br />

think your site will be visited.<br />

The physical size of the Web content is important in looking at the resources<br />

required for a server, indicating the necessary data storage requirements.<br />

A major portion of the content on the Web is static. This includes both images<br />

and textual data. The CPU resources required to serve such data are minimal.<br />

The <strong>IBM</strong> server products have a large performance range from basic Intel<br />

processor-based systems to highly parallel processing servers.<br />

Additionally, when the content on the Web server is dynamically generated,<br />

substantial processing resources may be required. Dynamic content on a Web<br />

site can be generated in many ways, from a simple counter that displays the<br />

number of hits that a page has received, to a system that uses analysis of user<br />

clicks to tailor the information (and advertisements in some cases) that the user<br />

sees at the site. In some configurations, there are still situations where the<br />

performance is network bound.<br />

The best choice is to talk with other network administrators to get an idea of how<br />

they approached estimating their needs, and then ask how well (or badly) they<br />

think they did.<br />

Generally, a Web text page is about 500 words, or about 7 KB, but as soon as<br />

you add a graphic or two, you must increase this size estimate. Maybe<br />

something about 30 KB or 50 KB is a reasonable starting point. So use this<br />

number if you have not yet designed any of your Web pages.<br />

To get an idea of the traffic all this involves, multiply the hit rate you expect by<br />

the average size of your Web pages; for example, if you expect a hit rate of<br />

10,000 a day, and your average Web page is 50 KB, your daily server traffic will<br />

be on the order of 5,000 MB of data.<br />

You can take these calculations further and estimate your average hourly traffic,<br />

but remember that the Internet pays no attention to time zones; it is always<br />

there, not just for an 8-hour workday, but 24-hours every day. You will certainly<br />

see peaks and troughs in your hit rates during any 24-hour period. For example,<br />

when it is 8:00 p.m. in Europe, and people are accessing your site after a day at<br />

work, it is only noon in California, and it is still early in the morning in Alaska<br />

and Hawaii.<br />

Besides all of these considerations above, you cannot forget about the other<br />

services you plan to offer on your ISP, such as:<br />

• E-mail<br />

• POP (Post Office Protocol)<br />

• FTP<br />

• Telnet<br />

• SMTP<br />

• Chat<br />

• Gopher<br />

You can find detailed information about each one of these services on<br />

Chapter 4, “Internet Services” on page 133.<br />

268 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

9.2.2 Electronic Commerce<br />

9.3 Number of Clients<br />

As Electronic Commerce requires special protocols to attend security issues<br />

involved in this service (see more information in Chapter 6, “Electronic<br />

Commerce” on page 159), there is an increase on the average file size between<br />

the users and the ISP′s business transactions.<br />

Basically, the users have to fill out forms with some personal and financial<br />

information, besides some technical information about the product or service<br />

that they want to buy and/or sell through the Internet.<br />

Generally, this service generates a high hits a day due its characteristics, mainly<br />

if your E-Commerce becomes a very known Web site by the users.<br />

The link bandwidth must be high enough to provide an acceptable response time<br />

for all of customers.<br />

The number of simultaneous users of a site is very challenging to characterize.<br />

Unlike other types of client/server architectures, the weight of an individual client<br />

on the Web server is quite small and short-lived. Connections to a Web server<br />

are traditionally stateless sessions that begin with an open from the client, a<br />

request for data, a server reply with data, and then the session closes.<br />

Depending on the speed of the network connection, the size of the data<br />

requested and the server load, this session can last from tenths to tens of<br />

seconds.<br />

Table 29 compares several communications technology circuits in terms of the<br />

maximum available bandwidth. It is important to emphasize that there are many<br />

other influencing factors that come into play when you attempt to calculate<br />

actual bandwidth rates, including protocol overhead, the speed of intermediate<br />

connecting circuits, configuration of intermediate host computer systems, and<br />

many others. But the information below can give you some initial dimensions.<br />

Table 29. Comparison of Maximum Bandwidth and Maximum Number of Users for<br />

Popular Internet Connections<br />

Connection Type Maximum Bandwidth Maximum number of<br />

Users<br />

V.32 or V.42 modem 14.4 kbps 1 to 3<br />

V.34 modem 28.8 kbps 1 to 3<br />

V.34-1996 modem 33.6 kbps 1 to 3<br />

56 k modem 56 kbps 1 to 3<br />

Frame relay 56 kbps 10 to 20<br />

ISDN 128 kbps 10 to 55<br />

Fractional T1 64 kbps increments 10 to 20<br />

T1 1.544 Mbps 100 to 500<br />

T3 44.736 Mbps more than 5,000<br />

You can check a couple of other places to help build these estimates. If your<br />

Web site will be designed primarily to help handle technical support material,<br />

ask the existing Technical Support staff how many calls a day they get, or if your<br />

Chapter 9. Capacity Planning 269


9.4 Bandwidth<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

site will offer customer service information, ask the current staff to describe their<br />

workload.<br />

In working with a customer to size up a Web solution, it is important to<br />

understand the implications of the speed of the networking connection to the<br />

Web server. More often than not, many potential Web content providers are very<br />

focused on the vague hits per day quantity. The level of traffic that a particular<br />

Web server can support will be dependent on the server type, the content<br />

accessed on the server and the speed of the connection of the server to the<br />

intra/Internet environment.<br />

An Internet service provider will deliver a connection of defined speed.<br />

The simplest kind of connection to the Internet is via a dial-up connection,<br />

sometimes called an on-demand connection. This can be through a conventional<br />

modem or through a digital system such as ISDN. This type of connection is<br />

only available part time, as its name suggests, and is not really suitable for an<br />

ISP that should be available 24 hours every day. Besides that, the dial-up<br />

connection has little or no extra bandwidth to allow for future expansion.<br />

The most commonly used protocols to the dial-up connection are SLIP or PPP,<br />

but due its lacks error-correction capabilities, SLIP is slowly being replaced by<br />

PPP. This last one, on the other hand, provides router-to-router, host-to-router,<br />

and host-to-host connections, as well as an automatic method of assigning an IP<br />

address so that mobile users can connect to the network at any point.<br />

A leased line, also known as a dedicated circuit, on the order hand is always<br />

available and can be provided by modem, by ISDN, and by many other kinds of<br />

communication circuits. For most Web servers, these options of connection<br />

makes much more sense.<br />

Needless to say that the price of the service rises with the available bandwidth.<br />

9.4.1 Formulas for Bandwidth Use<br />

The following formula provides a general idea of the amount of bandwidth used<br />

in any one time period:<br />

wo + wi + eo + ei + is + ms - ch = tb<br />

where:<br />

wo = WWW output (information sent to external requests)<br />

wi = WWW input (information retrieved for internal requests)<br />

eo = e-mail out<br />

ei = e-mail in<br />

is = Internet services (news, Telnet, FTP, audio and video, and so on)<br />

ms = management services (DNS, routing information, and so on)<br />

ch = caching (via WWW browsers or servers, or a local news server)<br />

tb = total bandwidth<br />

270 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

9.4.1.1 A Very Simple Example<br />

To determine the bandwidth usage for a small computer consulting firm, we can<br />

see the following example using the previous formula:<br />

6 staff receiving 20 e-mail per day = 120 e-mail messages<br />

6 staff sending 10 e-mail per day = 60 e-mail messages<br />

4 development staff with WWW access = 6 MB access per day<br />

2 support staff with WWW access = 2 MB access per day<br />

Complete Usenet feed = 60 MB<br />

Telnet sessions to clients = 500 KB per day<br />

FTP of files to/from clients = 1.5 MB per day<br />

FTP files for demos/bug fixes = 4 MB per day<br />

Management services = 20 bytes/datagram x approx. 370,000 datagrams<br />

Accesses to WWW site per day = 75<br />

Total size of WWW site = 3.2 MB<br />

Average Amount of WWW site viewed = 40 %<br />

Caching = Little other than USENET news feeds (Each person works in a<br />

separate development area.)<br />

The total bandwidth used in one day would be:<br />

wo = 75 x 3.2 MB x 0.4 = 96 MB<br />

wi = 6 MB + 2 MB = 8 MB<br />

eo = 60 x 8 KB ⇒ approx. 0.5 MB<br />

ei = 120 x 8 KB ⇒ approx. 1 MB<br />

is = 60 + 0.5 + 1.5 + 4 = 66 MB<br />

ms = 20 x approx. 370,000 ⇒ approx. 7 MB<br />

ch = NA<br />

tb = 178.5 MB<br />

Bandwidth via 28.8 kbps connection per day is, therefore:<br />

28,800 bps x 60 s/min x 60 min/hr. x 24 hrs. = 2,488,320,000 bits<br />

2,488,320,000 ÷ 8 bits/B x 1,024 B/KB x 1,024 KB/MB ⇒ approx. 296 MB per<br />

day<br />

At first glance, a 28.8 kbps dedicated connection seems sufficient for the<br />

consulting firm. Unfortunately, the actual usable bandwidth for staff activities is<br />

much lower:<br />

296 MB x (7.5 ÷ 24) = 92.5 MB per work day<br />

The lower amount of bandwidth is due to the limited number of work hours per<br />

day. All activity based on human access in the office and the local area<br />

generally takes place in a 7.5-hour period. As a result, the total bandwidth used<br />

during each business day is better estimated as follows:<br />

wo = 75 x 3.2 MB x 0.4 x 0.7 ⇒ approx. 67 MB<br />

wi = 6 MB + 2 MB = 8 MB<br />

Chapter 9. Capacity Planning 271


eo = 60 x 8 KB ⇒ approx. 0.5 MB<br />

ei = 120 x 8 KB ⇒ approx. 1 MB<br />

is = 0.5 + 1.5 + 4 = 6 MB<br />

ms = 20 x approx. 160,000 ⇒ approx. 3 MB<br />

ch = NA<br />

tb = 85.8 MB<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

In the revised table, the amount of WWW output is reduced by 30 percent to<br />

account for after-hours accesses, and the Internet services value is reduced by<br />

the entire USENET feed. Because the feed can take place at one time during<br />

off-peak hours, the amount need not to be included in the daytime bandwidth<br />

usage. Consequently, the management services overhead is reduced due to the<br />

lower number of datagrams required to handle the information.<br />

In this example, the total utilization is 85.5 MB ÷ 92.5 MB or approximately 92<br />

percent. This level of utilization probably is sustainable, although staff and<br />

clients will likely experience slow-downs during peak periods of the day (8:00 to<br />

9:30 a.m. and 1:00 to 2:30 p.m.). The actual degree of lag depends on the work<br />

habits of both your staff and clients.<br />

9.4.2 Internal and External Connections<br />

In general, Internet sites with largely static data are connected by Ethernet-LAN<br />

intranet sites (internal connection). Sites with high-bandwidth connections to the<br />

Internet and intranet sites can utilize FDDI.<br />

Sites that will generate significant Web content in response to user actions or<br />

potential E-Commerce sites should consider the FDDI technology for the intranet<br />

as their internal connection and T1 lines to the Internet backbone as their<br />

external connection.<br />

In Chapter 2, “Connectivity” on page 5 you can find all the information<br />

available to define the type of the most used upstream (connection between your<br />

ISP and the Internet backbone) or downstream connections (connection between<br />

your ISP and the users) and what you need to know about them.<br />

Table 30 can give you some examples about the most used types of connection:<br />

Table 30 (Page 1 of 2). Line Options<br />

272 The Technical Side of Being an Internet Service Provider<br />

Category Service Grade Circuit Speed<br />

Dial-up Modems 9.6 modem 9.6 kbps<br />

14.4 modem 14.4 kbps<br />

28.8 modem 28.8 kbps<br />

33.6 modem 33.6 kbps<br />

56k modem 56 kbps<br />

Low-speed DS0 56/64 kbps<br />

Fractional T1 56/64 kbps up to 1.544<br />

Mbps<br />

Medium-speed T1 (DS1) 1.544 Mbps<br />

E1 2.048 Mbps


This soft copy for use by <strong>IBM</strong> employees only.<br />

9.5 Telephone Lines<br />

Table 30 (Page 2 of 2). Line Options<br />

Which connection methodology is best for your ISP depends in large on the<br />

services and issues that are important for you. In every case, examine the<br />

following factors to determine their importance to your organization:<br />

• Internal connectivity needed<br />

• WWW bandwidth needed<br />

• Type of information provided<br />

• Tolerance for delays or failures<br />

• Technical expertise available<br />

• Complexity of the WWW site<br />

• Availability of connectivity options<br />

• Costs of connectivity options<br />

• Security issues of each option<br />

• Site size<br />

Category Service Grade Circuit Speed<br />

High-speed E3 34.368 Mbps<br />

Intranet or Network<br />

Connection<br />

T3 (DS3) 44.736 Mbps<br />

Ethernet 10 Mbps<br />

Token-ring 16 Mbps<br />

FDDI and Fast Ethernet 100 Mbps<br />

ATM 155 Mbps up to 622 Mbps<br />

One of the first questions that you can ask yourself after estimating the number<br />

of clients and your bandwidth to the Internet backbone is the following:<br />

How many phone lines do I need?<br />

To start, it pretty much depends on your budget. Initially, we can estimate that<br />

you can have 8-10 lines, once you′re ready to give your system a bit of publicity.<br />

But it really all depends on your market and how high a profile you can maintain.<br />

As a general rule, ten users per line is suggested for conventional dial-up<br />

connections.<br />

After about 400 users, it goes to about 12:1 and then goes to 15:1 around 1000.<br />

(These are only estimates based on vague sources of data input.)<br />

If you have under 16 lines on you system, you may wind up having to buy a line<br />

for every 6-8 users.<br />

Permanent SLIP connections by definition take precisely one dial-up line per<br />

user, and should be priced accordingly. Some people have gone to 4-6 users<br />

per line even for non-permanent SLIP.<br />

Chapter 9. Capacity Planning 273


This soft copy for use by <strong>IBM</strong> employees only.<br />

Here is a summary of what can happen when your telephone lines go over that<br />

ratio:<br />

• Good services will have a ratio of 10 to 12 users per line. At this level, you<br />

generally will not see busy signals except for brief periods of time during<br />

peak hours (which are usually 5:00 p.m. until midnight local time). Users<br />

seem not to mind at all if they get a busy signal for a couple of minutes<br />

every few days, so it seems to be OK.<br />

• At a ratio around 15:1, you see people talking about longer periods of busies<br />

(10 minutes or more) regularly every night, and you start to get complaints.<br />

• At 18:1, your users start defecting in masses as they can′t get on for hours<br />

on end.<br />

• Above this rate, for example, 20:1, you can have a terrible situation where<br />

several hundred of defecting customers will be very displeased with your<br />

service.<br />

Finally, don’t forget that lines can take a long time to install. We recommend<br />

you at least give 2-4 months lead time from when you decide to add more lines<br />

to when they are live. Some examples of time delaying problems:<br />

• V.34 chip shortages industry wide put new modem orders on hold.<br />

• Telephone company can run into facility problems at your location.<br />

• Telephone company can mess up your order and takes weeks to straighten it<br />

out.<br />

9.6 Networking Hardware<br />

• Electrical upgrades required.<br />

• Wiring upgrades.<br />

• UPS/power backup upgrades.<br />

We are sure there is a slew of other possible problems that can arise. If you are<br />

at 12:1 now and decide to put new lines in, you are too late, expect possibly a<br />

few months of busy signals. And add more lines than you need; proactive is the<br />

key.<br />

This is especially good advice for a large ISP that runs sizable numbers of lines<br />

and has to order lines in bulk.<br />

The basic networking hardware components to build an ISP environment are the<br />

following:<br />

• Upstream Connection<br />

− Router<br />

− CSU/DSU<br />

− Hub<br />

• Downstream Connection<br />

− Remote Access Server<br />

− Modem<br />

You can find a lot of information about these networking hardwares and the <strong>IBM</strong><br />

products that you have to implement these connections on 2.2.3, “Networking<br />

Hardware” on page 17.<br />

274 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

9.6.1 Upstream Connection<br />

There are some <strong>IBM</strong> products that you can use to plan and build the ISP’s<br />

upstream connection: the 2210 / 2216 routers and the 8224 / 8237 hubs.<br />

9.6.1.1 Router<br />

The most important characteristics that you should observer in a router are:<br />

• Performance: The more number of connections and bandwidth, the more pps<br />

(packets per second) is required from the router.<br />

• Management: The more management tools to indicate what is happening and<br />

allow easy adjustment and restoration of parameters you have in your<br />

router, the easier it is to track problems and errors to maintain your ISP site<br />

operational and with a good performance.<br />

• Routing protocols: Try to choose a router that offers the largest possibility of<br />

protocols support and configuration. The most common routing protocols<br />

used on the Internet are RIP, OSPF and BGP-4.<br />

• Filters: Security capabilities are very important too. The router should<br />

include the basic filter capabilities in order to permit or not a specific packet<br />

flow, as well as support to firewall capabilities in the future if you want.<br />

There are some other useful characteristics that you should verify before buying<br />

a router:<br />

• Dial On-Demand: Capability of the router to establish a telephone connection<br />

only when necessary. This can be useful in scenarios where telephone<br />

connection time is at a premium, because it is a long distance call, or if your<br />

telephone company is charging you less with the understanding that the line<br />

will not be used 24-hours a day.<br />

• Dynamic Redial: Capability to sense that the telephone connection has been<br />

broken, and to automatically attempt to reestablish the connection. This<br />

could be useful if you occasionally or frequently receive noisy telephone<br />

connections or have other problems, such as power outages.<br />

• Expandability: An extremely useful capability of a router. For example, you<br />

may be able to use your SLIP/PPP router over normal telephone lines, and<br />

then upgrade to another data link technology, such as ISDN or leased lines,<br />

when it becomes available or affordable. It is also a good idea to purchase<br />

a router that can have its software updated easily, just in case you need to<br />

receive updates from your vendor.<br />

Finally, if you intend to buy an <strong>IBM</strong> router, you can find useful technical<br />

information about them on 2.2.3.3, “<strong>IBM</strong> 2210” on page 20 and 2.2.3.4, “<strong>IBM</strong><br />

2216” on page 30.<br />

9.6.1.2 CSU/DSU<br />

This Channel Service Unit/Data Service Unit (CSU/DSU) device depends on the<br />

connection speed and the characteristics of your network. In general, it’s a V.35<br />

interface and is already provided in the routers with DSU functionality, which<br />

improve your cost investments because it is much cheaper than buying a DSU<br />

separate unit.<br />

Chapter 9. Capacity Planning 275


9.6.2 Downstream Connection<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

9.6.1.3 Hub<br />

This equipment, although not directly related to the upstream connection, will be<br />

present in your ISP network to connect the equipments in you network, such as<br />

routers and servers, in a star cabling topology (Ethernet LAN type) or in a ring<br />

topology (token-ring LAN type).<br />

The most common used hubs are Ethernet with RJ45 connectors, but you can<br />

also have hubs that support token-ring, FDDI or ATM.<br />

In general, you have to contemplate the following characteristics before buying<br />

your hub(s):<br />

• Number of ports<br />

• Media expansion ports<br />

• Stackable function<br />

• Segmentation support<br />

• Cascading support through its media expansion ports<br />

• Provides centralized management of remote sites and branch offices<br />

• Supports MIB-II (RFC 1213), the hub repeater MIB (RFC 1516), and the Novell<br />

Repeater MIB through the SNMP agent<br />

• Supports SNMP over IP and IPX ports<br />

You can find useful technical information about hubs in 2.2.3.5, “<strong>IBM</strong> 8224” on<br />

page 37 and 2.2.3.6, “<strong>IBM</strong> 8237” on page 42.<br />

There are also two <strong>IBM</strong> products that you can use in your ISP environment for<br />

the Remote Access Server in downstream connections: the <strong>IBM</strong> 8235 / 8235-I40.<br />

You can find detailed information in 2.3.3.3, “<strong>IBM</strong> 8235” on page 67 and 2.3.3.4,<br />

“<strong>IBM</strong> 8235-I40” on page 90.<br />

9.6.2.1 Remote Access Server (RAS)<br />

The RAS requirements also depend of the connection type. If you are going to<br />

use dial-up only with modems, RAS must have the following characteristics:<br />

• A number of serial ports available<br />

• Cascading support if you need more than one RAS to attend the whole<br />

number of users through the serial ports<br />

On the other hand, if you are going to use an ISDN connection, the must have<br />

the ISDN PRImary support feature besides those mentioned above.<br />

Finally, if you are going to use leased and/or dedicated connections, the usual<br />

way of establishing these links is through routers in both sides (ISP and user′s<br />

side). Then the RAS is not used in this case.<br />

Some other characteristics that you can look for before buying your RAS are:<br />

• Multiprotocol support<br />

• Virtual connections<br />

• Persistent connections<br />

• Spoofing<br />

• Client Event Log Applications<br />

• Management<br />

• Security features<br />

276 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

9.6.3 Choosing the Protocols<br />

9.6.2.2 Modems<br />

When planning your ISP site, take care to select a high-quality modem to save<br />

you a great deal of hassle in the long run. Low-quality modems, on the other<br />

hand, are not necessarily slower; they are just less reliable due to software and<br />

hardware bugs. They also are often difficult or impossible to upgrade. Don’t<br />

assume that well-known modem manufacturers necessarily have the highest<br />

quality of modems; the opposite is often the case.<br />

To find a high-quality modem, read multiple reviews of modems written by<br />

independent third parties. You can find such reviews in the trade press, on the<br />

Web, or in USENET (comp.dcom.modems, for example). Keep in mind that<br />

reviews are often aimed at the consumer market, rather than at using the<br />

modem for a dedicated connection. In addition, it is important to find out if a<br />

given modem works with the software, operating system, and hardware you<br />

intend to use.<br />

Some large, well-known modem manufacturers sell modems at a cost that is<br />

quite low, compared to their lesser-known competitors. People buy these<br />

modems due to name recognition, and the fact that everybody else seems to be<br />

buying them.<br />

Unfortunately, sometimes later you become surprised to discover that your<br />

modem is unstable, and that the manufacturer is offering a “free upgrade” to the<br />

modem’s firmware, which fixes the problem(s).<br />

Information about upgrades and bug fixes is generally available from the modem<br />

manufacturer’s telephone support line, BBS, or Web site.<br />

Another thing that frequently happens is today’s modems come with a wide<br />

range of features, from fax capabilities to being able to store the phone numbers<br />

of incoming calls, to dial back capability. Given that you are going to use these<br />

modems for a dial-up connection with your users, many of these features are of<br />

very limited use to you. One feature that can prove invaluable, however, is the<br />

capability to perform upgrades to the modem’s software. This enables you to fix<br />

bugs in the modem’s software quickly, and possibly even for free. The bottom<br />

line is just common sense: never pay extra for features that you don’t need, if<br />

you have the choice.<br />

You are free to choose the interior protocols that best meet your needs for<br />

routing inside your own network. This choice will be restricted, however, by the<br />

compatibility of routing protocols. Each Interior Gateway Protocols (IGP) has its<br />

own specific characteristics which must be considered before attempting to mix<br />

protocols. The choice may also be restricted based on your chosen<br />

implementation because some products will only use a specific IGP.<br />

In theory, you are also free to choose the EGP or BGP you will use to connect to<br />

the Internet, but in practice the assignment of Autonomous System (AS) numbers<br />

is now restricted to your service provider. Therefore, your service provider will<br />

provide the connection to the Internet, including the EGP implementation, on<br />

your behalf.<br />

Routing within your network can be accomplished using either static or dynamic<br />

routing.<br />

Chapter 9. Capacity Planning 277


This soft copy for use by <strong>IBM</strong> employees only.<br />

9.6.3.1 Static Routing<br />

The task of statically defining all the necessary routes may be simple for a small<br />

network, and has the advantage of reducing traffic in the network. Another<br />

advantage is that static routing enforces rigid control on the allocation of<br />

addresses and the ability of one resource to access another. One major<br />

disadvantage is that hosts and routers will require reconfiguration if you move a<br />

resource or add another resource to the network.<br />

Static routes have an important role to play in a router network and can be used<br />

to define routes to networks accessible via passive routers and routes to remote<br />

networks or subnets where dynamic protocols are undesirable due to link cost.<br />

9.6.3.2 Dynamic Routing<br />

When should you use dynamic routing? We recommend that static routing be<br />

used in small networks or networks with a small number of routers, but dynamic<br />

routing should be used in the following cases:<br />

• Large networks with multiple routers.<br />

• Several subnets have been implemented.<br />

• Multiple connections have been implemented between subnets or to other<br />

networks where hosts or routers are being moved, or network configuration<br />

is being regularly altered.<br />

• Dynamic environments.<br />

9.6.3.3 Which Interior Protocol?<br />

We do not recommend the use of HELLO in any new TCP/IP implementation.<br />

The decision may be forced due to the types of hosts and routers you already<br />

have in your network. RIP is used widely and is supported in AIX, UNIX, OS/2,<br />

DOS and Windows environments, making it very suitable for LAN<br />

implementations. RIP is also supported on MVS and VM hosts, making it<br />

suitable as a network-wide protocol in all but the largest networks (that is, those<br />

networks where routes may contain more than 15 hops).<br />

OSPF, on the other hand, has not been widely implemented as yet on hosts but<br />

is widely available on routers. OSPF has the added advantages of supporting<br />

variable length subnetting and cost-based routing that allows the best path to be<br />

chosen instead of only the shortest path. This makes OSPF an attractive choice<br />

for interconnecting networks or subnets. OSPF is also the best choice for very<br />

large networks where RIPs limitation of 15 hops becomes a consideration.<br />

If dynamic routing is implemented, it must be remembered that most host<br />

implementations utilize RIP which does not allow variable length subnetting.<br />

This will not be an issue for most small or medium-sized networks, but for large<br />

networks using variable length subnet masks, a mixture of dynamic protocols<br />

may need to be investigated. Perhaps the best method in these cases is to<br />

implement RIP within subnets and then connect the subnets with an OSPF<br />

backbone.<br />

You can find much more information about routing protocols in Chapter 4 -<br />

″Routing″ included in The Basics of IP Network Design, SG24-2580.<br />

278 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

9.7 Servers<br />

You need to choose the perfect combination between a hardware platform and<br />

the operating system. This is because some platforms do not support the<br />

newest powerful applications that can be useful to improve the quality of your<br />

Internet server.<br />

Some companies use an existing operational platform as the Internet server. It<br />

can be a problem if this server has confidential documents, corporative<br />

applications and highly secure data. A hacker will be able to steal or destroy<br />

this important data using daemons such as HTTP, GOPHER, and FTP servers as<br />

gates to go inside your system. The best option is to create a server on a<br />

dedicated machine that will be exposed to the Internet without any confidential<br />

data. The majority of servers connected to the Internet are running on UNIX<br />

systems on RISC-based machines, but today a lot of new servers running OS/2,<br />

Windows NT and Linux on Intel-based machines are being used. Some<br />

companies are also using mainframes running VM and MVS and AS/400 as<br />

servers. The following table shows the available services on each platform.<br />

Table 31. Available Services on Different Operating Systems<br />

Operating<br />

System<br />

DNS E-mail GOPHER HTTP TELNET FTP NEWS DB/2 LOTUS<br />

NOTES<br />

AIX YES YES YES YES YES YES YES YES YES YES<br />

OS/2 YES YES YES YES YES YES YES YES YES YES<br />

NT YES YES YES YES YES YES YES YES YES YES<br />

OS/400 NO YES YES YES YES YES NO YES YES NO<br />

MVS YES YES YES YES YES YES NO YES YES YES<br />

9.7.1 Hardware Requirements<br />

JAVA<br />

The competition for hardware is becoming stronger day after day. PC prices, for<br />

example, are falling down, fueled in part by the rapid pace of processor<br />

development, oversupply of memory components, and effective cost reductions<br />

in other pieces. PC and UNIX system vendors with products targeted for Internet<br />

servers are also looking for your money, with subtle schemes to increase<br />

capabilities and availability while keeping costs low. In fact, many high-end<br />

manufacturers of fault-tolerant computers also want to make inroads into the<br />

WWW server market.<br />

As dedicated connections become commodities in the Internet world, vendors<br />

will compete with value-added services such as Web hosting. Many will offer<br />

package prices to attract new customers.<br />

This can be a tremendous opportunity - or a large trap. Desperation produces<br />

both good and bad deals. While your network connections are being obtained,<br />

you have time for a careful selection process of hardware servers and<br />

components. This will be necessary to separate the good deals from the bad.<br />

Another important reason is compatibility. Just because the WWW is based on<br />

standards does not mean everything interoperates.<br />

Chapter 9. Capacity Planning 279


This soft copy for use by <strong>IBM</strong> employees only.<br />

Applications compatibility is a complex topic, full of sublets that even<br />

professionals often miss. Allowing time for a good design will help minimize the<br />

number and severity of problems that arise down the road.<br />

Make sure the high-level system design is finished and relatively stable before<br />

proceeding with the servers hardware purchase. Remember that while the<br />

Internet is based on standards, there are still several from which to choose.<br />

Given the turbulence and rapid change on the market due to a variety of<br />

technologies totally revolutionary, besides the numberless options of<br />

configurations, platforms and products, consultant expertise could be particularly<br />

valuable to you in this area. Many times, the experience needed to evaluate<br />

servers will not be located in-house, let alone other Web developments. If that is<br />

true for you, these are several external resources to consider:<br />

• Consultants<br />

The most directly beneficial is the external consultant. You should be sure<br />

to get a list of clients and references, complete with URLs, and it is essential<br />

to check them out online. Try them out on numerous occasions and at<br />

different times during the day. If you already have e-mail access, don’t be<br />

shy about sending mail to Webmaster@foo.com (or whatever reference is<br />

listed) and asking for people’s experiences. Most people on the Web tell it<br />

like it is.<br />

• Newsgroups<br />

Almost every type of protocol and almost every product has at least one<br />

related bulletin board or newsgroup available. Checking on them can be<br />

beneficial.<br />

• Magazine Reviews and Periodicals<br />

Many magazine reporters and freelance authors spend their time<br />

summarizing their products with stories that often include useful charts and<br />

screen shots.<br />

• Vendors<br />

We recommend this with caution. They often know a great deal about the<br />

products in the industry, but they can be biased as well. You should ask<br />

them for detailed documentation of their products, and then read those with<br />

a critical eye. You also should ask them for references.<br />

• CPU<br />

There is a variety of CPUs available for each platform that you choose. You<br />

have to follow the considerations above before you decide this essential item<br />

in your server configuration. For example:<br />

− In Intel world, you can use a Pentium processor running at 100 Mhz or<br />

faster, or even choose a multiprocessor machine according to your<br />

needs.<br />

− If you′re using a RISC system, you will want a machine using one or<br />

more PowerPC processors or an MIPS RISC system.<br />

• RAM<br />

As you add more users and applications to your server, you will need to add<br />

more memory. Even then you may have to add as your site attracts more<br />

visitors.<br />

• Internal Bus<br />

280 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Any system should have one of the advanced 32-bit buses; EISA, PCI, and<br />

Micro Channel are good choices. The important thing is that the bus support<br />

mastering, which makes a VESA bus system a poor choice.<br />

• Video<br />

You will need at least a VGA video card, but you don’t need the latest<br />

technology and most expensive product available. For Intel platform, for<br />

example, boards based on the S3 chip set give good performance; they have<br />

been around for a long time and so are generally well supported. The S3<br />

systems are also available for a good price these days.<br />

These days, most video cards come with at least 1 MB of RAM installed,<br />

which normally gives you 256 colors at 1024 by 768 pixels.<br />

• CD-ROM<br />

Today you will definitely need a CD-ROM; no one loads large software<br />

packages from floppy disks any more. In fact, some server software is not<br />

available on floppy disks, only on CD-ROM. An SCSI interface is usually<br />

better supported better than any of the proprietary interfaces.<br />

• Tape Drive<br />

It is absolutely essential for every installation to have a tape drive available<br />

for system backup and for reloading software in the event of a system or<br />

hardware failure. The tape can also use the SCSI interface; just make sure<br />

that the tape is big enough to back up the whole file server at one go. No<br />

one likes doing attended backups and waiting around to swap tapes.<br />

• Hard Disk<br />

Again, an SCSI-based disk system is a good idea because the operating<br />

systems today support a wide variety of SCSI products. Another excellent<br />

reason for using an SCSI-based hard disk system is that fault-tolerance<br />

mechanisms such as Redundant Array of Inexpensive Disks (RAID) and disk<br />

mirroring require properly working SCSI systems. You certainly can create a<br />

mirrored set of non-SCSI hard disks, which are less expensive, but they will<br />

not have sector remapping capability.<br />

The server storage space requirements is determined by the amount of<br />

information that will be stored on the server at any one time. This amount is<br />

not just that of your initial site, but should include some room for<br />

enhancements and growth. Because disk storage is relatively inexpensive<br />

for your ISP site, the amount of space you require should not heavily affect<br />

your costs.<br />

Use the following formula to determine the appropriate additional disk<br />

storage needed for your site, to minimize costs while providing you with<br />

some degree of flexibility:<br />

i + k + ((i+k) x g) - b = t<br />

where:<br />

i = initial site size in MBs<br />

k = known enhancements to site in MBs<br />

g = growth factor<br />

b = basic WWW space<br />

t = total space required<br />

Chapter 9. Capacity Planning 281


This soft copy for use by <strong>IBM</strong> employees only.<br />

In this equation, the formula adds all the known factors (site size,<br />

enhancements to site, and basic space available for the WWW account) and<br />

then adds in a site growth factor. The ratio of growth you expect over the<br />

next 1-year period depends on the type of site you have developed. If your<br />

site will maintain continual historical data for the entire year, your site will<br />

grow rapidly. If the site will provide only a simple profiles pages, then<br />

growth may be limited to 10 up to 20 percent.<br />

• Mice and Serial Ports<br />

If you intend to use a PC or a RISC machine, you will often need three serial<br />

ports on your server: one for the mouse, one to attach to the UPS system<br />

(more on this item will be talked later on this section), and one for the<br />

modem to support Remote Access Services (RAS). Sometimes using three<br />

serial ports can be a problem, and using a parallel mouse such as a InPort<br />

mouse can partly solve this. Multiport serial adapters may be needed.<br />

• Modems<br />

If you use or plan to use RAS, you will need a modem so that remote users<br />

can access the server. You can find more about modems in 9.6.2,<br />

“Downstream Connection” on page 276.<br />

• UPS<br />

9.7.2 Growth and Scalability<br />

A Uninterruptible Power Supply (UPS) takes over and continues to provide<br />

power when the main power to the server fails. You will want your ISP site<br />

available at all times, and so a UPS is an excellent way to ensure this. Be<br />

sure that all the equipment you need for continued operation, not just the<br />

server itself, has UPS support, including all the communications equipment.<br />

The best choices UPS systems suitable for use are available from American<br />

Power Conversion (APC) and from Best Power Technology.<br />

• Communications Equipment<br />

You will also need the appropriate communications equipment to support the<br />

type of link you have chosen. This can be small and compact in the case of<br />

an ISDN terminal adapter (TA) assembly, for example, or it can be a whole<br />

group of equipment for some of the larger data communication connections;<br />

in some instances, most of the communications equipment may be located<br />

on the phone company’s premises. The larger the communications<br />

requirement, the more equipment you will need, and the more crucial proper<br />

air-conditioning becomes, even in northern climates and in Europe, areas<br />

that don’t normally use air-conditioners at any time.<br />

The preceding list defines the main hardware components for your ISP site, but<br />

what should you do if you are adding a Web server to your existing server(s)<br />

network, which already has certain hardwares installed and a population of<br />

users?<br />

Do not underestimate the impact that Web traffic may have on the performance<br />

of your server, and be ready to upgrade your hardware if the existing installation<br />

proves inadequate. If you insist on running with the existing systems, you will<br />

not only alienate new visitors to your site as they wait for a slow server to<br />

respond, but you will also make your corporate users very angry indeed as they<br />

watch their previously speedy applications grind to a halt.<br />

282 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

9.8 Domain and IP Addressing<br />

Part of the system administrator’s job is to monitor system performance and<br />

make the appropriate recommendations and upgrades as they are needed.<br />

The demand for scalable systems is growing. Stated simply, a scalable system<br />

is one that permits the addition of processing power, storage, memory,<br />

input/output (I/O), and connectivity with relative ease, so user organizations can<br />

deploy larger, more complex, more sophisticated applications to exploit<br />

constantly growing databases and make both available to increasing numbers of<br />

users through very high bandwidth networks.<br />

Technically, the simplest way to provide scalability is to build larger and faster<br />

uniprocessors. Systems can also be made faster using highly sophisticated<br />

architectures (either alone or in combination with unique technologies). The<br />

advantage of scaling uniprocessors is that the software remains the same; it<br />

simply runs on a faster processor.<br />

One can also scale by integrating multiple uniprocessors into a single system in<br />

which they share resources such as memory, I/O, the operating system, and<br />

application software. Having one of each resource makes a symmetric<br />

multiprocessor (SMP) system relatively easy to program and manage. In<br />

addition, the SMP will run essentially the same software as the uniprocessor,<br />

although it may have to be modified to remove bottlenecks than the faster<br />

multiprocessor could expose.<br />

Another way to get scalability is to use parallel systems where multiple<br />

processors are connected to each other by a high-performance interconnect<br />

mechanism. Each processor has its own memory, its own I/O configuration, and<br />

its own copy of the operating system. Thus, far higher levels of scalability are<br />

achievable. Indeed, such systems become almost infinitely scalable because the<br />

incremental processor does not increase contention for resources; it comes with<br />

all it needs to do productive work.<br />

The AIX systems can scale efficiently to four or eight processors using PowerPC<br />

technology on SMP systems. So, using parallel systems based on Power and<br />

Power2 processors, AIX can deliver extremely high performances. Because it′s<br />

relatively new, NT does not scale nearly as well as UNIX. Theoretically, NT is<br />

designed to support up to 32 processors; in reality it is currently limited to four<br />

processors in most situations. Depending on the mix of applications and<br />

hardware architectures, the number of processors can be as low as two or as<br />

high as eight. The OS/2 can scale up to 16 processors on the Warp Server<br />

version and is a good choice for Internet applications that demand performance<br />

and integration with CICS, IMS and DB/2. If you are writing in-house<br />

applications for multiprocessor systems, you must write code so that instructions<br />

are handled as a series of threads. This lets the operating system efficiently<br />

direct processes to different CPUs.<br />

If you do not take time to plan your network, the apparent calmness of<br />

interconnection using TCP/IP can lead to problems.<br />

For example, lack of effective planning of network addresses may result in<br />

serious limitations in the number of hosts you are able to connect to your<br />

network. Lack of centralized coordination may lead to duplicate resource names<br />

and addresses, which may prevent you from being able to interconnect isolated<br />

Chapter 9. Capacity Planning 283


9.8.1 Design Considerations<br />

9.8.2 DNS Security<br />

9.8.3 A Word of Caution<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

networks. Address mismatches may prevent you from connecting to the<br />

Internet, and other possible problems may include the inability to translate<br />

resource names to resource addresses because connections have not been<br />

made between name servers.<br />

When faced with the task of either designing a new TCP/IP network or allowing<br />

existing networks to interconnect, there are several important design issues that<br />

will need to be resolved. For example, how to allocate addresses to network<br />

resources, how to alter existing addresses, whether to use static or dynamic<br />

routing, how to configure your name servers, and how to protect your network<br />

are all questions that need to be answered. At the same time the issues of<br />

reliability, availability and backup will need to be considered, along with how you<br />

will manage and administer your network.<br />

Once you have gone down the DNS route, then most design issues will depend<br />

on your requirements and the implementation you adopt. Check for electronic<br />

mail, network security via firewalls, resilience and high availability. To ensure<br />

the last of those points, you will need to run at least two name servers, probably<br />

more, and remember that the location and position of the name servers are vital.<br />

You can find a lot of information about the security issues, possible threats,<br />

firewall, and much more in this redbook in Chapter 8, “Internet Security” on<br />

page 193.<br />

If you tackle the issues in a methodical way, then you shouldn’t have too many<br />

problems. The following list summarizes the main issues:<br />

• Before you begin designing your IP network, a word of caution may be<br />

appropriate: IP network design is not an exact science, but more a<br />

pragmatic one.<br />

• You will probably avoid many unpleasant surprises if you test out each<br />

TCP/IP implementation you intend to use in your IP network to ensure that<br />

each product behaves as your design expects it to.<br />

• Make the correct decision on whether to use a private or public IP address.<br />

• Plan the size and growth of your network and allocate the most suitable<br />

class of IP address; don′t forget that some IP addresses are special and<br />

cannot be used.<br />

• Implement subnets if appropriate, but ensure they are administered<br />

correctly; remember to keep a constant subnet mask for each class of<br />

address.<br />

• Depending on the size and mobility of your network (or parts of it) you may<br />

want to make use of dynamic address allocation with DHCP to reduce the<br />

administrative burden.<br />

• Finally, if you are opting for a public network number, don′t forget to register<br />

with your local IANA authority or your chosen service provider.<br />

See 2.2.4, “Domain and IP Address” on page 44 if you want more information<br />

about domain and IP addresses. For a completely guide on how to plan and<br />

284 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

9.9 Staff Members<br />

9.9.1 Project Leader<br />

design your network, you can refer to The Basics of IP Network Design,<br />

SG24-2580.<br />

In this section, we discuss who will identify the human resources necessary to<br />

complete your Internet project. After this, we discuss about those who actually<br />

implement your ISP.<br />

The project leader has the most influential role in determining the success of<br />

your plan. It is almost always a full-time employee, usually someone with at<br />

least a year or more of corporate experience, and definitely someone with a<br />

successful track record. Selecting this project “czar” is the most important<br />

decision this redbook helps you make. Some of the qualities you should seek<br />

include the following:<br />

• Organization: The leader is someone who can coordinate all aspects of the<br />

project and isn’t reluctant to delegate authority.<br />

• Vision: This is a person who can envision the strategic and tactical business<br />

advantages that the ISP project has for the company.<br />

• Thorough: Building a successful ISP project is complex, so someone who will<br />

expect each person to fulfill each task in a timely and orderly fashion is<br />

required.<br />

• Flexible: Your leader must be able to adjust to new demands and<br />

requirements, and seize upon new opportunities, because the Internet and<br />

Web technologies are changing so quickly.<br />

• Comfortable with technology: The leader doesn’t necessarily have to be<br />

proficient in the use of the Internet and Web but must be eager to learn and<br />

to share that knowledge with others.<br />

• Innovator: The right leader is someone who has a record of accomplishment<br />

and showing initiative.<br />

• Team player: This is a corporate project, not an individual career builder.<br />

The leader must be able to reach across departmental lines to recruit the<br />

necessary support that will unite the company behind this new venture.<br />

• Decisive: Crucial decisions will have to be made, and the company’s<br />

executive management must have confidence that the team leader will make<br />

the best ones.<br />

In addition to these qualities, this individual must be empowered to push the ISP<br />

plan to completion, with authority to delegate tasks, expedite and define<br />

processes, cut through red tape, mobilize the necessary resources, and keep all<br />

parties on track. The higher placed this individual, the quicker and better your<br />

chances for effectiveness.<br />

Chapter 9. Capacity Planning 285


9.9.2 Rest of Team<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

The size of the team is dependent upon the size of the company, the number of<br />

departments, and the judgment of the project leader. The team could be two<br />

people or it could be twelve, although large groups can prove to be difficult to<br />

manage and prone to stagger over microscopic details.<br />

Only after you have picked the leader should the rest of the team be assembled.<br />

This group should represent key departments within your organization.<br />

Team members should reflect the qualities of the team leader. They also should<br />

be enthusiastic but realistic about the ISP project. On the other hand, a dose of<br />

reality will be needed occasionally to keep the team’s perspective. Hands-on<br />

experience with the Internet technologies, content production, electronic<br />

marketing, or any other related elements are strongly recommended.<br />

The following members could be identified and included in ISP’s Web site staff:<br />

• Site engineering: This is a general heading of the person or people<br />

responsible for the technological side of the Web site. This would include<br />

hardware, software, and connectivity planning and systems. If the site is<br />

hosted on an ISP server, much of this job function should be included with<br />

the hosting arrangement.<br />

• Webmaster’s: One or more people should be responsible for the Web site<br />

itself, including the design, construction and maintenance of the HTML<br />

pages, programming of any CGI scripts, and general maintenance of the Web<br />

site. In most cases, very little of this would be handled by an ISP. If the<br />

page design is outsourced to a Web developer, there still be a person in<br />

charge of interacting with the developers.<br />

• Accounting: Businesses live on money, thus there is a need for accountants<br />

and other accounting staff. Accounts receivable and payable positions must<br />

be filled. You also need a person to prepare the taxes or act as the main<br />

contact to an outside accounting agency.<br />

• Business management: Business managers drive the direction of the<br />

company and ensure that employees’ work gets the company where it needs<br />

to be. Of course, small operations may have only one or two people, but<br />

one or both still need to think in business terms about the history, current<br />

status, and future potential of the Web venture.<br />

• Customer service: A big catch-all category of persons responsible for<br />

keeping the customer happy. This could include technical support for<br />

products that require it, handling customer complaints and other such<br />

day-to-day responses to customer needs. But in a Web commerce site, for<br />

example, this category of personnel need not be technically proficient,<br />

because little interaction with the technology, other than phone and e-mail, is<br />

required.<br />

• Marketing and advertising: Getting the word out, generating leads, and<br />

building the corporate identity are crucial to the success of any business.<br />

With a Web site, the company has to face both online and standard<br />

advertising hurdles, as well as giving the customer peace of mind that the<br />

company and its products are legitimate. Again, these types of functions can<br />

also be outsourced to third-party advertising agencies.<br />

286 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

9.9.3 Using Consultants<br />

9.9.4 Outside Partners<br />

9.9.5 Dream Team<br />

There are many circumstances in which using consultants makes perfect sense.<br />

When the requisite technical or production skills are lacking in-house, when<br />

internal resources are already stretched thin, or when staff has difficult seeing<br />

how an Internet or Web application can be useful, it’s time to look for outside<br />

assistance.<br />

Technical and business consultants can be found through existing vendor<br />

relationships, or by asking peers who have gone through a similar ISP project.<br />

Also, many firms can be located by searching the Web and by looking through<br />

various local, regional, and national computer or Internet publications, where<br />

these companies are most likely to advertise.<br />

After compiling a list of prospective companies, you can further screen them by<br />

submitting a Request for Information. This series of questions should ask for a<br />

wide range of information, including:<br />

• Scope of service, from Web site development to maintenance<br />

• Types of Internet connectivity and support that are available<br />

• Experience in providing security and firewalls<br />

• Experience in dealing with electronic commerce<br />

• Resumes of contracted individuals<br />

• Rates<br />

• Samples of work (especially online samples you can visit and evaluate)<br />

• References<br />

You should also use this screening process with prospective consultants to brief<br />

them about your project, and to ask them for ideas and suggestions.<br />

An important fact to remember when retaining outside expertise: Unless they<br />

are contracted (often at great expense) to remain onsite every day, they will<br />

work with other clients and therefore may not be ready to respond quickly to<br />

your needs. Be sure to engage whatever facet of your organization authorizes<br />

contracts early, so outside contracts can be written and enacted quickly.<br />

In consideration of external resources already employed by your company, you<br />

need to consider whether they can assist, and to what extent you need to involve<br />

them. Technical consultants, advertising and marketing, order fulfillment, and<br />

even banking partners can play valuable roles in your ISP project in addition to<br />

their on-going responsibilities.<br />

If circumstances do not permit their full involvement, keep your partners advised<br />

of relevant decisions and progress. Often, they can provide unexpected aid, or<br />

can at least make better decisions based on your input.<br />

To summarize this section, here is what your project dream team will consist of:<br />

• A manager with strong leadership<br />

• Creative yet realistic individuals<br />

• Empowered representatives from key corporate departments<br />

• People (on staff or external) with technical knowledge of the Internet and<br />

Web<br />

• A team-oriented group excited about their assignment<br />

Chapter 9. Capacity Planning 287


9.10 CGI Programming<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

CGI programs are often called CGI scripts, but as you will see in the examples<br />

below, you can develop your own CGI programs in many languages, not only in<br />

scripting languages. The reason they are referred to as scripts is historical in<br />

that they were originally developed in sh, bash, and perl on UNIX platforms.<br />

9.10.1 Selecting Your Programming Language<br />

The principle of the Common Gateway Interface is that you should be able to use<br />

any programming language. You choose the one you will be using according to:<br />

• The platform on which your server is running<br />

• The task your application has to perform<br />

• Your programming skills<br />

• The response time of your applications<br />

9.10.1.1 Your Server Platform<br />

The operating system on which your server is running is probably the decisive<br />

factor in your choice of a programming language.<br />

Not all programming languages are available on every platform. For example,<br />

there is no port of Visual Basic for AIX, OS/2 or MVS. This fact is not only<br />

essential when you plan to develop intranet or Internet applications, but also if<br />

you consider migrating your server to another platform. Imagine you have set<br />

up a server that has become so popular that it has outgrown the resources of<br />

the Windows NT host on which you have installed it. Because the Internet<br />

Connection Servers are ported from the same code, you can easily migrate your<br />

server to a more powerful AIX or MVS system, unless you programmed your<br />

applications in a platform-specific programming language, such as Visual Basic.<br />

Furthermore, some languages are more suited to an operating system than<br />

others. This is typically the case of C for AIX and REXX for OS/2. We advise you<br />

to use a standard language that is supported on most platforms rather than<br />

exotic flavors of rare but nevertheless powerful languages. This will assure you<br />

of better support and will allow you to share the experience and sometimes even<br />

the applications of other developers. Check your favorite search engine and<br />

your news server to find them.<br />

9.10.1.2 The Purpose of Your Application<br />

Another important criterion in selecting a programming language is the purpose<br />

of your application. Not all languages are suited to every application. For<br />

example, a batch file under Windows NT is all it takes to switch to a different<br />

page depending on the browser used to view it. However, DOS commands are<br />

clearly inappropriate to query and update complex databases. Therefore, make<br />

sure the programming language you choose allows you to do want you want it to<br />

do, and even a little more. A good way of finding out if it does is to search the<br />

Internet for examples of applications similar to the ones you want to create.<br />

288 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

9.10.2 Programming Languages<br />

9.10.1.3 Your Programming Skills<br />

The two previous criteria may still leave you with a choice among several<br />

programming languages. In this case, use a programming language that you<br />

are familiar with. This will allow you to develop safe and reliable applications<br />

easily. After all, you are developing potentially exposed applications. You need<br />

to have sufficient knowledge of the language to ensure that your CGI scripts are<br />

reliable and do not expose your server to hackers and other undesirables.<br />

Furthermore, you want to deliver the relevant information continuously and<br />

safely for your network. This will be much easier if you are comfortable with<br />

your programming environment.<br />

9.10.1.4 Response Time<br />

The response time of your application may determine whether you will use an<br />

interpreted or a compiled programming language. If the required response time<br />

are to be small then you will want to opt for a compiled language. Some<br />

languages, such as REXX, may be run interpreted or compiled, thus offering both<br />

the easy testing and debugging of an interpreted language, and the speed of a<br />

compiled language.<br />

In this section we list some of the programming languages with which it is<br />

possible to develop CGI scripts. Select the one you will use based upon the<br />

above criteria.<br />

A complete description of these languages would exceed the scope of this book<br />

so we do not attempt it.<br />

Furthermore, updated descriptions of the languages most commonly used on the<br />

Internet are available on the Internet. We recommend that you consult these<br />

descriptions before you start a large project. A good starting point is Yahoo<br />

which can be found at:<br />

http://www.yahoo.com/Computers_and_Internet/Programming_Languages/<br />

Please refer to Table 32 for a summary of some available languages by each<br />

platform.<br />

Table 32 (Page 1 of 2). CGI Programming Languages by Platform<br />

Scripting<br />

Languages<br />

Windows NT OS/2 AIX HP-UX Solaris MVS<br />

DOS, batch<br />

files<br />

OS/2, batch<br />

files,<br />

command<br />

files<br />

Shell<br />

Scripts<br />

(Bourne,<br />

Korn, C,<br />

bash, and<br />

so on)<br />

C Freeware Freeware Operating<br />

System,<br />

Freeware,<br />

Commercial<br />

Shell<br />

Scripts<br />

(Bourne,<br />

Korn, C,<br />

bash, and<br />

so on)<br />

Operating<br />

System,<br />

Freeware<br />

Shell<br />

Scripts<br />

(Bourne,<br />

Korn, C,<br />

bash, and<br />

so on)<br />

Operating<br />

System,<br />

Freeware<br />

OMVS<br />

POSIX Shell<br />

Script<br />

Commercial<br />

Perl Freeware Freeware Freeware Freeware Freeware Freeware<br />

REXX Evaluation,<br />

Commercial<br />

Operating<br />

System<br />

Freeware,<br />

Shareware,<br />

Commercial<br />

Freeware,<br />

Shareware<br />

Freeware,<br />

Shareware<br />

Operating<br />

System<br />

Chapter 9. Capacity Planning 289


Table 32 (Page 2 of 2). CGI Programming Languages by Platform<br />

NetRexx Not<br />

Available<br />

Java Not<br />

Available<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Windows NT OS/2 AIX HP-UX Solaris MVS<br />

9.11 How to Estimate Costs<br />

9.11.1 Telephone Costs<br />

Freeware Not<br />

Available<br />

Not<br />

Available<br />

Not<br />

Available<br />

Not<br />

Available<br />

Freeware Freeware Freeware Freeware Not<br />

Available<br />

Notice that Perl is available on all platforms for which there is an Internet<br />

connection server. This explains why Perl is one of the most popular CGI<br />

programming languages.<br />

However, Java is now becoming the Internet programming language, because of<br />

its adaptation to the Internet. Although Java is mainly used in applets imbedded<br />

into HTML documents, it is possible to write stand-alone Java programs that can<br />

thus be used as CGI scripts.<br />

When making the decision and planning to build an ISP, you have to consider all<br />

the costs that are involved on it. This section gives you the main costs and<br />

considerations about them that you must have in mind during the process to<br />

choose what will be the best choice for your future ISP.<br />

The intention of this section is not to be a financial guide but only a reference<br />

point.<br />

It is important to note that telephone companies charge for telephone lines<br />

based on their intended use. This is why business lines are more expensive<br />

than residential lines. Your telephone company may have a different rate for<br />

data lines. To avoid loss or mistakes, get the kind of phone line appropriate for<br />

use with a dedicated data connection. In addition to this monthly charge, you<br />

may also have to pay a one-time setup charge, or installation fee.<br />

9.11.2 Internet Service Provider Costs<br />

If you are not going to connect directly to the Internet backbone, but through a<br />

bigger ISP, then the costs apply to you.<br />

Your service provider may also charge you both one-time setup fees and<br />

on-going fees. The one-time setup charge may include services such as routing<br />

configuration at their site, domain name registration, domain name service, and<br />

so on. The on-going fees may include administration costs when you need you<br />

provider to maintain these services.<br />

The main on-going cost will be for bandwidth. Your service provider will either<br />

charge you a flat rate or a rate based on your usage. In the case of a dedicated<br />

28.8-kbps connection, it is likely that your provider will charge you a flat rate;<br />

even if you continuously transferred data over your connection, this would not<br />

impact the provider or other customers.<br />

290 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

9.11.3 Hardware Costs<br />

9.11.4 Software Costs<br />

9.12 Recommendations<br />

Hardware costs include any hardware you will need to purchase. You will need<br />

a modem or a router at each of the connections.<br />

If you are not planning on using routers on your end, but need to connect your<br />

whole LAN to the Internet, you will also need a computer to act as a router. If<br />

you don’t have a capable machine, you will need to purchase one.<br />

You may need to purchase additional software. PPP and SLIP software, for<br />

example, will sometimes, but not always, come free with the operating system<br />

you are using for your gateway. Excellent free software is also available for<br />

most platforms. Even if the operating system for your gateway supports TCP/IP,<br />

you may need to purchase a separate server version in order to perform routing<br />

functions. The required software is generally included free, or is available as a<br />

free add-on with UNIX-based operating systems.<br />

The basic Internet structure is the World Wide Web (WWW) server and the e-mail<br />

server. You can use other resources such as the FTP server, Telnet server,<br />

database server, Gopher server, News server, Chat server, and DNS server, but<br />

the WWW server and the e-mail server are all you need to create an initial<br />

Internet structure. Depending on the hardware technology and the power of your<br />

server, you can run some of these server daemons on same machine. When the<br />

performance needs to increase, you will need to improve server performance or<br />

divide these daemons on other servers.<br />

Creating an Internet structure can be a low, medium or high-cost investment; it<br />

depends on the type of service and information that you will provide on the<br />

Internet. In general, Internet sites that are connected by T1 lines and<br />

Ethernet-LAN connected intranet sites with largely static data, are adequately<br />

served by a entry uniprocessor system with adequate disk storage for the<br />

content provided. It is important to have enough RAM to accommodate both the<br />

http server processes and for file caching of page content that resides on disk.<br />

Sites with high-bandwidth connections to the Internet and intranet sites that can<br />

utilize FDDI will benefit from mid-range and SMP solutions. Sites that will<br />

generate significant Web content in response to user actions or potential<br />

E-Commerce sites should consider such systems even if they are connected by<br />

T1 lines to the Internet or Ethernet-LAN to the intranet.<br />

Table 33 (Page 1 of 2). How to Calculate Maximum HTTP Operation/Sec for a<br />

Determinable Bandwidth and File Size<br />

Network<br />

connection<br />

type<br />

Bandwidth File average<br />

size - 1 KB<br />

File average<br />

size - 10 KB<br />

9.6 modem 9.6 kbps 1.2 0.1 0.0<br />

14.4 modem 14.4 kbps 1.8 0.2 0.0<br />

28.8 modem 28.8 kbps 3.6 0.3 0.0<br />

33.6 modem 33.6 kbps 4.2 0.4 0.0<br />

56 k modem 56 kbps 7.0 0.7 0.1<br />

File average<br />

size - 100 KB<br />

Chapter 9. Capacity Planning 291


This soft copy for use by <strong>IBM</strong> employees only.<br />

Table 33 (Page 2 of 2). How to Calculate Maximum HTTP Operation/Sec for a<br />

Determinable Bandwidth and File Size<br />

Network<br />

connection<br />

type<br />

Bandwidth File average<br />

size - 1 KB<br />

File average<br />

size - 10 KB<br />

56 kb leased 56 kbps 7.0 0.7 0.1<br />

64 kb leased 64 kbps 8.0 0.8 0.1<br />

ISDN 1 64 kbps 8.0 0.8 0.1<br />

ISDN 2 128 kbps 16.0 1.6 0.2<br />

T1 1.5 Mbps 187.5 18.7 1.8<br />

Ethernet 10 Mbps 1250.0 125.0 12.5<br />

T3 45 Mbps 5625.0 562.0 56.2<br />

FDDI 100 Mbps 12500.0 1250.0 125<br />

Fast Ethernet 100 Mbps 12500.0 1250.0 125<br />

ATM/155 155 Mbps 19375.0 1937.0 193.0<br />

ATM/622 622 Mbps 77750.0 7775.0 777.0<br />

File average<br />

size - 100 KB<br />

Table 4 shows the questions that can help you choose the right platform to fit<br />

your needs.<br />

Table 34 (Page 1 of 2). Main Questions to Consider before Configuring a Server<br />

Questions Commentary<br />

Should AIX, OS/2, VM or Windows NT serve as the<br />

Internet server platform?<br />

You need to consider your budget, people skills,<br />

your existing in-house environment and performance<br />

needs before choosing one platform.<br />

How many hits per day on the server? You can use this information to do an effective<br />

capacity planning. Generally, on a low-hit site you<br />

can use an Intel platform, and on a high-hit site it is<br />

indicated that you use RISC-based machines.<br />

What are the pages medium size? You can multiply the medium page size (KB) by the<br />

number of hits daily on the server and obtain how<br />

much information will be delivered.<br />

Must your external users have access to the<br />

databases?<br />

If so, what type of database support is required, such<br />

as <strong>IBM</strong> DB/2, Oracle, Sybase, Ingress or Informix<br />

integration?<br />

What are your security requirements? For example,<br />

will it be necessary to protect highly confidential<br />

information and restrict access to the internal<br />

corporate network?<br />

Will multiple home pages be installed on the same<br />

server?<br />

292 The Technical Side of Being an Internet Service Provider<br />

If yes, you will need a more powerful server because<br />

in most cases the database gateway daemon<br />

degenerates the system performance.<br />

The database gateways can have different<br />

behaviors. First contact your database supplier to<br />

check the needs of this software.<br />

If yes, you will need a secure server that supports<br />

SSL or S-HTTP. This server gets part of the<br />

processor power to make security validations.<br />

If yes, first consider all the questions listed above,<br />

and if necessary add additional memory and/or<br />

processor power on your server.


This soft copy for use by <strong>IBM</strong> employees only.<br />

Table 34 (Page 2 of 2). Main Questions to Consider before Configuring a Server<br />

Questions Commentary<br />

What type of interface do you need to use? It must<br />

be intuitive, Motif or Windows-like and easy to use?<br />

9.13 Planning for Future Expansion<br />

9.14 Final Considerations<br />

This is a very important item when you do not have<br />

specialized skills on different platforms. The<br />

Windows and Motif-based operating systems such as<br />

Windows NT, AIX X-Windows and OS/2 are easier to<br />

use, administrate and install. The VM, MVS and<br />

OS/400 operating systems do not support graphical<br />

applications.<br />

You will undoubtedly need to increase both the amount of the hardware disk<br />

storage on your Web server, as your site becomes more popular with both<br />

visitors and staff within the corporation, and the bandwidth of your<br />

communications link in the fairly immediate future, and certainly within a couple<br />

of years. Internet applications will continue to grow in terms of computing and<br />

storage needs, as well as in terms of the loads they impose on your<br />

communications link.<br />

Selecting certain communications options can be expensive when it is time to<br />

upgrade your service. Don’t put it off; just assume that you will have to upgrade<br />

and that you will be upgrading sooner than your current plans indicate. Both<br />

ISDN and Fractional T1 services are scalable, and you can work to add<br />

bandwidth as soon as it becomes obvious that you need a little extra.<br />

Some ISPs offer service guarantees, and others offer rebates based on down<br />

time. All networks fail at some point, and the important factor here is how<br />

quickly your ISP isolates the problem and how fast it is fixed and full service<br />

restored.<br />

We give a useful tips below on how you can improve your services and make<br />

your ISP become one of the best choice for your customers.<br />

• Coping with Power Outages<br />

The most common cause of service loss is one that is not actually under the<br />

control of the ISP, a power outage at the customer site. A blackout on a<br />

neighboring construction site can bring the best-made plans crashing. A<br />

power outage will either be transient and very, very short, resulting in no<br />

loss or virtually no loss in service, or it will last for several hours or even<br />

days, depending on the severity. A long power outage is also likely to affect<br />

your ISP. When a problem like this occurs, you can help your customers and<br />

provide them with a unique specialized service on this area: <strong>IBM</strong> Business<br />

Recovery Services. See all the information about this and other services on<br />

Appendix A, “Availability Services” on page 297.<br />

• Circuit Failure Rates<br />

The next most common failure after a power failure is loss of the<br />

communications circuit. Again, this can range from a very brief interruption<br />

to a total loss in service that lasts for several hours or even days. Ask your<br />

Chapter 9. Capacity Planning 293


This soft copy for use by <strong>IBM</strong> employees only.<br />

telephone companies for detailed statistics on its circuit interruptions, and<br />

ask what contingency plans are in place to provide an alternative service if<br />

the break lasts for longer than expected.<br />

• Maintenance Outages<br />

Finally, there are two areas of maintenance to consider. Unscheduled<br />

maintenance relates to fixing unexpected hardware or software problems<br />

and should amount to less than an hour per occurrence. Scheduled<br />

maintenance, on the other hand, is planned well in advance, and your ISP<br />

should be able to give to your users a list of all scheduled and preventive<br />

maintenance operations, the length of time they are expected to take, and<br />

their potential impact on services.<br />

• Recovery Plan and Site Backup<br />

If your really intend to be the best option to your customers when they<br />

decide to contract an ISP, then you must have a recovery plan against all the<br />

disasters that may occur to your environment (some of them commented on<br />

previously).<br />

This plan should contain all the information that you need to know on how to<br />

start a contingency plan, all the staff members that will be involved and their<br />

responsibilities, beside the procedures that will be taken to maintain your<br />

customers on the air.<br />

A site backup is a fully complete environment outside your installations that<br />

can restore your tape backups and your staff members when some disaster<br />

occur to your physical installations.<br />

<strong>IBM</strong> offers these services to you. You can find more information about these<br />

services in Appendix A, “Availability Services” on page 297.<br />

• Assessing Technical Support<br />

Another way to assess an ISP’s ability to provide continuing service is to find<br />

out when its network operations center is fully staffed. As you expect<br />

Internet access 24-hours a day, 7-days a week, you need to plan your ISP to<br />

solve technical problems outside normal business hour. The support must<br />

be there when your users needs it. ISPs with people on-site provide better<br />

service than those whose support staff are on call. If your staff is on call<br />

during the night, try to get some statistics about average response time and<br />

about how many service outages of what duration take place during the<br />

night. You should also plan an ISP’s policies for staffing the Technical<br />

Support desk during major holidays.<br />

Be sure that your ISP has an adequate supply of spares on hand to be able<br />

to act quickly when common emergencies associated with hardware failures<br />

occur.<br />

• Value-Added Services<br />

Many ISPs also provide additional information or services. Many can<br />

provide activity statistics, and most publish a newsletter. Ask other ISPs to<br />

see copies of all the reports you would receive if you were a customer of<br />

them.<br />

• Installation and Operation Costs<br />

Any ISP must be able to provide their customers with information on<br />

installation and operating costs, and also about any charges that might apply<br />

in the future if they decide to upgrade your services. High prices do not<br />

necessarily mean good service.<br />

294 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

9.14.1 Questions about Your ISP<br />

Communications is an area where we can look forward to declining costs<br />

over the years, as the ISP’s costs also fall. Just be sure you understand<br />

exactly what you are getting for your money.<br />

To close out this section, here is a summary of the most frequently questions<br />

that you should answer to your customers about the services you are offering:<br />

• How long has your company been providing Internet services?<br />

services do you provide?<br />

Which<br />

• Do you give a service guarantee or a rebate against system outages?<br />

• Do you have a recovery plan or a site backup to operate even in cases of<br />

disasters to your ISP environment?<br />

• Which services outages do you expect and how long will each last? How do<br />

you inform subscribers that the service is down, by phone or by e-mail?<br />

• What kind of network monitoring equipment do you have?<br />

• What are your plans to upgrade your hardware software, and<br />

communications circuits?<br />

• When is your operations center staffed and how do we report problems?<br />

• Are there any restrictions on how I can use the Internet connection?<br />

• To which other networks are you connected and at what speeds?<br />

• What security techniques do you use at your site and recommend that I use<br />

at mine?<br />

• How will you ensure that my data is kept private?<br />

• Can you provide the names of three references who run sites similar in size<br />

and scope to the one I am establishing?<br />

Chapter 9. Capacity Planning 295


296 The Technical Side of Being an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.


This soft copy for use by <strong>IBM</strong> employees only.<br />

Appendix A. Availability Services<br />

How well should you prepare for something that probably won’t happen?<br />

Chances are that your company will never be hit by an earthquake or a tornado,<br />

but it is possible. A more common occurrence might be a construction crew<br />

cutting through your phone lines or a computer hacker worming his or her way<br />

into your network. Disasters don’t have to be major events from mother nature<br />

to disrupt the flow of business and your relationship with customers. In fact, the<br />

smallest disruption can turn into a large-scale catastrophe. The secret to<br />

survival is never to be caught by surprise.<br />

<strong>IBM</strong> Business Recovery Services (BRS) can help protect your ability to service<br />

and support your customers, whether you are a local company or a highly<br />

networked global enterprise, or whether you are running LANs, WANs, large<br />

centralized servers or distributed client systems through consulting and planning<br />

services to help you design, implement and manage a comprehensive business<br />

protection and recovery program that takes into consideration your business<br />

faces. It’s an approach that not only helps you recover when your business<br />

experiences a disruption, but also protects against the kinds of events that can<br />

cause those disruptions. This approach to total business protection is termed,<br />

<strong>IBM</strong> Business Protection Model.<br />

A.1 <strong>IBM</strong> Business Protection Model<br />

A.1.1 Risk Management<br />

The following pages describe the five-part <strong>IBM</strong> Business Protection Model which<br />

is designed to help prepare for, and recover from everything from a minor local<br />

disruption to a major regional disaster.<br />

It is always cheaper, smarter and faster to avoid a disaster than recover from<br />

one. <strong>IBM</strong> can help you identify and minimize risks, as well as prevent<br />

disruptions that are indeed preventable.<br />

If risk is the likelihood that something bad will occur, then risk management<br />

allows an organization to control and protect all of their asset base, as well as<br />

measure, integrate and consider cost effective mitigation efforts.<br />

First you must determine the business value of all your assets, then your task is<br />

to identify, on an on-going basis, threats to those assets. Everything from<br />

earthquakes, to hurricanes, to destruction caused by a disgruntled employee or<br />

political upheaval. Next you must identify vulnerabilities, those weaknesses that<br />

can be exploited by a threat and where you are most at risk.<br />

Finally, you must develop safeguards that will eliminate, or at least minimize,<br />

your vulnerabilities.<br />

Through the process of risk analysis you can compare the cost of a disruption to<br />

your business that might be caused by a threat, with the cost of implementing a<br />

safeguard. This way you can develop priorities, and also prevent some disasters<br />

by taking the appropriate precautions. For example, one of our clients, as a<br />

result of a risk analysis, determined that their data center was located next to a<br />

rail line that regularly carried hazardous materials. This threat was eliminated<br />

© Copyright <strong>IBM</strong> Corp. 1997 297


A.1.2 Recovery Strategy<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

by relocating the data center. The message here is that the more you invest in<br />

risk management, the lower your ultimate risk.<br />

A.1.1.1 Risk Management Services<br />

It is always cheaper, smarter and faster to avoid a disaster than recover from<br />

one. <strong>IBM</strong> can help you identify and minimize risks, as well as prevent<br />

disruptions that are indeed preventable<br />

Education: <strong>IBM</strong> offers technical education covering a range of business<br />

protection topics, from risk analysis and critical business components, to<br />

systems-specific recovery strategies and planning techniques.<br />

Integrated Risk Management Products and Services: Using industry-leading<br />

tools, <strong>IBM</strong> can help establish a quantitative approach to identifying and<br />

neutralizing the types of events that can disrupt your business.<br />

Internet Security Services: <strong>IBM</strong> offers products and services designed to<br />

protect your I/T environment against hackers and other breaches of security.<br />

Hackers make headlines. Internet Security Services can help ensure that you<br />

are not in them.<br />

Anti-Virus Software and Services: <strong>IBM</strong> AntiVirus is a comprehensive and<br />

reliable anti-virus software tool that protects critical applications and data<br />

throughout your company, whether you have stand-alone PCs or a complex<br />

LAN/WAN environment. <strong>IBM</strong> also offers virus training and education, <strong>IBM</strong><br />

AntiVirus deployment and virus emergency incident management services.<br />

Business Capacity Services: <strong>IBM</strong> offers temporary facilities with hardware and<br />

support personnel for evaluating capacity requirements, new applications,<br />

software upgrades or for testing your year 2000 conversion efforts.<br />

This is the second essential discipline.<br />

While you should always focus on risk management first and prevent those<br />

disasters that you can, you must be prepared in the event your company does<br />

encounter some type of outage.<br />

Your company’s recovery strategy must be dictated by which resources are most<br />

critical to the continued operation of your business. All facets of your daily<br />

operations must be examined to identify which of your processes and resources<br />

generate the most revenue and are therefore the most critical. The recovery<br />

strategy is truly the analytical phase of your business protection program. This<br />

is where the decisions need to be made on what is required to keep you in<br />

business, in what time frame and what is the financial impact to your business of<br />

not recovering.<br />

If information is required to take orders, respond to customer requests or create<br />

new products, what are the minimum service levels, network availability and<br />

response times that must be met to sustain your client requests?<br />

You must identify critical business processes, applications, information, key<br />

personnel, and the financial consequences of an outage. Once you have<br />

identified them, you can focus on the options available to bring your critical<br />

resources back on line in the required time frame.<br />

298 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

A.1.3 Recovery Capability<br />

A.1.2.1 Recovery Strategy services<br />

One of the keys to a successful recovery plan is a sound recovery strategy. <strong>IBM</strong><br />

can pinpoint your company’s critical assets and determine the best way to<br />

protect them.<br />

Business Impact Analysis: Which of your business’ processes, applications,<br />

technology and resources are most critical? What are the potential financial<br />

losses if they are disrupted? This in-depth analysis gives you the answers.<br />

Environment Analysis: <strong>IBM</strong> offers a structured evaluation of your I/T<br />

environment that focuses on hardware, software, networks and workflow. <strong>IBM</strong><br />

can help you understand your systems and their relationship to your total<br />

business and recommend a preliminary recovery strategy, whether your<br />

technology environment is distributed or centralized.<br />

Enterprise Solutions Study: The Enterprise Solutions Study provides a team of<br />

highly skilled <strong>IBM</strong> Business Recovery Consultants to analyze the unique<br />

business protection requirements of large companies with complex system<br />

environments or mega-site installations.<br />

Voice Recovery Analysis: <strong>IBM</strong> consultants can help you design, implement and<br />

manage a voice recovery plan that ensures your calls are handled promptly and<br />

professionally in the event of a disruption.<br />

Network Recovery Analysis: Experienced <strong>IBM</strong> Consultants can help you develop<br />

a comprehensive recovery solution that quickly reconnects your employees,<br />

suppliers and customers to your organization’s critical business information and<br />

applications.<br />

The third essential discipline, Recovery Capability, is the sum total of the human,<br />

technological and physical resources required to substitute for your normal<br />

operating function. You must make the decision on how these capabilities<br />

should be provided.<br />

Can you do it all in-house, or do you outsource to a recovery specialist for the<br />

capability you need?<br />

As you make your decision to stage, acquire, or subscribe the support you<br />

desire, you must ensure that whether your own “recovery support group” or<br />

your external provider has the experience and skills in the various technologies<br />

you employ, the resources they can bring to answer your needs, and the ability<br />

to anticipate change. Above all, because of the on-going and dynamic nature of<br />

this process, the service provider you choose today should be able to serve you<br />

capably as your business develops, changes, and expands.<br />

A.1.3.1 Recovery Capability Services<br />

Recreating an entire information technology environment on demand requires a<br />

massive infrastructure of facilities, multiple-vendor equipment inventories,<br />

services and skills. <strong>IBM</strong> offers a comprehensive worldwide network of<br />

leading-edge resources and unparalleled recovery capacity.<br />

Appendix A. Availability Services 299


This soft copy for use by <strong>IBM</strong> employees only.<br />

Alternate Sites: Actually, <strong>IBM</strong> stands ready to provide recovery support at 110<br />

permanent recovery centers in 62 countries around the world.<br />

<strong>IBM</strong> maintains:<br />

• Fully-equipped hot sites for large, midrange and client/server environments<br />

in Gaithersburg, MD, and Sterling Forest, NY, with an additional center in<br />

Boulder, CO, scheduled to open in January 1997.<br />

• Additional fully maintained large, midrange, client/server and end user hot<br />

sites strategically located around the world.<br />

• Conveniently located Remote Customer Suites that allow access through the<br />

recovery network to all of our recovery resources. Our dedicated recovery<br />

network facility also allows for the option to recover remotely from any<br />

location you designate.<br />

• Recovery support for a wide range of information technology, including:<br />

− <strong>IBM</strong><br />

− Unisys<br />

− Dell<br />

− DEC<br />

− Hewlett-Packard<br />

− Optical Storage<br />

− Tandem<br />

− Sun<br />

− Xerox<br />

− Data General<br />

− Apple<br />

− Check Sorters<br />

− Stratus<br />

− Compaq<br />

• Unique rollback capabilities, providing access to the full range of resources<br />

in <strong>IBM</strong> data centers around the world. This helps ensure an alternate site<br />

will be available to you even if the disaster that strikes you also affects a<br />

large number of other companies.<br />

• Cold sites that are available for up to six months for customers whose<br />

recovery requirements exceed six weeks.<br />

High Availability:<br />

<strong>IBM</strong> offers services designed to rapidly restore system function and preserve the<br />

integrity of data from on-going transactions. These services ultimately reduce<br />

recovery windows to hours, minutes or even seconds.<br />

Network Recovery:<br />

The loss of a location can be transparent to customers, as long as information is<br />

available somewhere else. <strong>IBM</strong> can quickly reconstruct and redirect your<br />

network, including your critical Internet connections, and provide flexible,<br />

reliable high-bandwidth links between your site and our recovery resources<br />

worldwide.<br />

Equipment Quickship: Temporary hardware replacement for a wide range of<br />

environments can be shipped within 24 to 48 hours of disaster declaration to a<br />

customer-designated site. Flexible terms and conditions allow you to configure<br />

300 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

A.1.4 Recovery Plan<br />

your hardware subscription as your requirements change. Available technology<br />

includes DEC, HP, <strong>IBM</strong> PC, Apple, Compaq, Sun, AST, CISCO, Shiva, Synoptics<br />

and more.<br />

End User Services: <strong>IBM</strong> provides complete and cost-effective solutions to help<br />

you resume business operations and get your end user environments back up<br />

and running. We can provide equipment to duplicate any workplace, including<br />

alternate space, telecommunication equipment, fax machines, copiers, LANs,<br />

workstations, file servers, hubs and routers. Nowadays, more than 7,500 end<br />

user spaces are available worldwide to meet the recovery needs of a wide range<br />

of work group sizes.<br />

Voice Recovery: With the industry’s most sophisticated and comprehensive<br />

voice recovery solutions, <strong>IBM</strong> can meet the recovery requirements of a wide<br />

range of call center environments. Solutions range from simply providing space<br />

and equipment for your call center personnel, to rerouting your incoming calls to<br />

trained <strong>IBM</strong> agents who answer calls on your behalf.<br />

Mail and Distribution Services: Through an alliance with Pitney Bowes, <strong>IBM</strong> can<br />

provide highly-qualified, full-service print/mail/finishing sites to help get your<br />

mailroom back up and operating at an alternate site.<br />

Recovery planning is the fourth essential discipline.<br />

Once you have your recovery strategy in place and have positioned your<br />

recovery capability, you should formulate your recovery plan and document the<br />

tasks required to implement it.<br />

An effective plan should focus on three specifics: backup, recovery and<br />

implementation. The backup process documents the information and procedures<br />

to preserve all your critical resources. It should focus not only on the<br />

information, and technology reserves but also alternate staff members and their<br />

responsibilities. It should record the substitute facilities acceptable to support<br />

your recovery capability requirements.<br />

The recovery process records the procedures needed to restore these vital<br />

functions and resume normal business functions. The implementation process<br />

outlines all associated tasks and responsibilities.<br />

The purpose of testing your business recovery plan is to prove that your<br />

recovery capability exists and that all or part of your plan will work. The best<br />

way to assure maximum recoverability is to conduct unannounced tests and act<br />

aggressively on the results. Plans must be amended to accommodate changes<br />

that have occurred that affect your assets and critical business functions.<br />

A.1.4.1 Recovery Plan services<br />

After you have outlined a business recovery strategy based on a realistic<br />

understanding of your requirements, <strong>IBM</strong> can help you develop, implement, test<br />

and maintain a total business protection program.<br />

Plan Development: <strong>IBM</strong> Business Recovery Consultants, using <strong>IBM</strong>’s proven<br />

methodology and tools, can help you develop, test and maintain your business<br />

recovery plan. Plans can be developed for any platform and any aspect of your<br />

Appendix A. Availability Services 301


A.1.5 Business Continuity<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

business. <strong>IBM</strong> offers customized planning engagements, workshops and<br />

software tools to help you develop your recovery plan.<br />

Recovery Management Services: <strong>IBM</strong> offers support services to augment or<br />

mirror your recovery team by providing skills and resources to perform recovery<br />

testing or disaster support activities. These services can range from simple tape<br />

management to total recovery outsourcing.<br />

The fifth essential discipline is business continuity.<br />

No matter how strong your focus is on managing risk and how well prepared you<br />

are for an unexpected event, there are disasters and events that go beyond the<br />

normal bounds of recovery programs.<br />

In response to these events we see a growing need to focus on areas that have<br />

not traditionally been seen as part of the disaster recovery process.<br />

For example, before a major disaster strikes, you should:<br />

• Establish relationships with key suppliers of potentially scarce resources<br />

such as office equipment, real estate, construction services.<br />

• Work with government agencies that are involved in disaster recovery, such<br />

as FEMA and the Red Cross.<br />

• Develop a plan to deal with the emotional toll your employees experience<br />

during a large scale disaster.<br />

The hurricanes in southern Florida, not only caused power outages but leveled<br />

city blocks. The earthquakes in Kobe and Mexico caused devastation not to just<br />

the business districts, but to whole communities as well.<br />

Business continuity involves a focus on the activities you should take to ensure<br />

the resumption of your business in the event of a catastrophic event as well as<br />

the management process that should be in place to support the on-going<br />

evolution of your business protection demands.<br />

A.1.5.1 Business Continuity Services<br />

Once a recovery program is put in place, you need to focus on ways to augment<br />

that program to help ensure the continuous availability of your business’<br />

infrastructure. <strong>IBM</strong> can help you integrate a total business protection plan that<br />

includes your technology, your facilities and your employees.<br />

Business Resumption Services: <strong>IBM</strong> offers a crisis team that can be dispatched<br />

to any designated site to coordinate and manage your recovery in the event of a<br />

disaster. These services can include:<br />

• Relocation services<br />

• Construction services<br />

• Acquisition services<br />

• Workplace services<br />

• Crisis management services<br />

Performance Testing Services: Your ability to serve your customers, deliver<br />

your products and services to the marketplace and stay in business depends in<br />

large part on how well your information systems perform. It’s not something you<br />

302 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

A.2 BRS - Worldwide Locations<br />

A.3 BRS - Services<br />

want to leave to guesswork so we provide a complete range of I/T planning,<br />

design, implementation, operation, upgrade and evaluation services.<br />

Business Recovery Services has presence worldwide in 62 countries, across four<br />

geographies providing consulting services and recovery support for large<br />

systems, midrange and distributed environment customers.<br />

<strong>IBM</strong> brings to you the convenience of doing business in your own language and<br />

culture with reduced travel, therefore permitting easy access to a business<br />

environment in which you are comfortable.<br />

BRS offers highly trained and experienced personnel, a recovery center, facilities<br />

and equipment to support your international needs. Should a regional disaster<br />

occur, you are able to receive the unsurpassed capabilities only BRS can<br />

provide. A true benefit of local access - global reach.<br />

Table 35. Summary<br />

International Presence 62 Countries<br />

Large Systems 37 Countries<br />

Mid-Range Systems 54 Countries<br />

Distributed Systems 29 Countries<br />

Consulting Services 50 Countries<br />

The <strong>IBM</strong> Business Recovery Services has a wide range of services to offer:<br />

• Business Resumption Services<br />

• Consultation Services<br />

• Distributed Systems and Multi-Vendor Services<br />

• e-Business Recovery Services<br />

• High Availability Services<br />

• <strong>IBM</strong> AntiVirus Products and Services<br />

• Internet Emergency Response Services<br />

• Large Systems Services<br />

• Recovery Management Services<br />

• Workgroup/Voice Recovery Services<br />

• Year 2000 Testing Services<br />

However, in this redbook we give an explanation about e-Business Recovery<br />

Services and Internet Emergency Response Services only.<br />

If you want, you can obtain more information about the other services on the <strong>IBM</strong><br />

Business Recovery Services’ Web sites:<br />

http://www.brs.ibm.com<br />

Appendix A. Availability Services 303


A.3.1 e-Business Recovery Services<br />

Figure 80. e-Business Recovery Services Areas<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

e-Business is business conducted via the Internet and includes electronic<br />

commerce, collaboration, and content management. Each day more companies<br />

are experimenting with or implementing business function applications on the<br />

Internet that are mission critical. The need for the ability to recover from a<br />

service outage has never been greater. If a disaster forces you to shut down<br />

your Internet presence, you could be left out of touch with customers,<br />

employees, or key suppliers. This could result in a loss of revenue, as well as<br />

customer dissatisfaction.<br />

With the <strong>IBM</strong> e-Business Recovery Services, provided by <strong>IBM</strong> Business Recovery<br />

Services (BRS), if you experience an unplanned outage of an Internet-based<br />

application, <strong>IBM</strong> provides the network access, networking equipment and server<br />

equipment necessary to reestablish your electronic presence on the global<br />

Internet. <strong>IBM</strong> can also provide for the backup and recovery of the critical data<br />

needed to continue business operations in a time frame that meets the needs of<br />

your business.<br />

The <strong>IBM</strong> e-Business Recovery Services combine the industry-leading strength of<br />

<strong>IBM</strong> in three areas of business recovery capability:<br />

• Internet access and network equipment<br />

• Server hardware and peripherals<br />

• Safe backup and recovery of data<br />

<strong>IBM</strong> BRS will work with you to design and implement a business recovery<br />

solution to meet the requirements of your critical Internet business applications.<br />

The e-Business Recovery Services areas are:<br />

• Internet access and network equipment<br />

<strong>IBM</strong> BRS offers access to multiple Internet Service Providers (ISPs) to enable<br />

you to reestablish your electronic presence on the Internet. <strong>IBM</strong> can help<br />

you to redirect network traffic from the location experiencing an outage to an<br />

<strong>IBM</strong> BRS center. In addition to Internet access, <strong>IBM</strong> BRS is equipped with<br />

304 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

the latest in multivendor, multiprotocol networking equipment and<br />

infrastructure. So whether it&c sq.s your Internet access, or your entire<br />

enterprise network environment that needs to be recovered, <strong>IBM</strong> can provide<br />

a total business recovery solution.<br />

• Server hardware and peripherals<br />

<strong>IBM</strong> BRS is the industry leader in multiplatform, multivendor interim<br />

processing solutions that protect your business from unplanned outages of<br />

your information technology systems. Whether you have chosen to run your<br />

web site on a UNIX, AIX, Windows NT, OS/400, MVS, or other platform, <strong>IBM</strong><br />

has the equipment and support needed to successfully recover your<br />

application. And, if you are like many other businesses that are linking your<br />

web site to existing back-end database systems, we can support those<br />

systems, too, enabling you to implement a seamless and cost-effective<br />

recovery plan.<br />

• Safe backup and recovery of data<br />

The traditional model for recovery of unplanned data center outages called<br />

for a 24 to 48 hour recovery window. But in the electronic marketplace, you<br />

may not be able to tolerate an outage of that duration. In response to our<br />

customers need to minimize their exposure, <strong>IBM</strong> has developed a suite of<br />

high availability solutions ranging from off-site storage of backup data on<br />

tape to mirrored systems that deliver the highest level of availability and<br />

data integrity in the industry.<br />

A.3.1.1 <strong>IBM</strong> Provides the Complete Solution<br />

<strong>IBM</strong>’s Internet expertise and experience is long-standing and world recognized.<br />

We have an extensive history of Internet contributions, including design and<br />

implementation of the router technology for NFSnet. With <strong>IBM</strong> e-Business<br />

Recovery Services, <strong>IBM</strong> is continuing this tradition by offering the services you<br />

need to ensure your electronic marketplace presence can continue, even if your<br />

site struck by disaster. No matter what the size of your implementation, <strong>IBM</strong><br />

BRS can help you to make sure your business critical Internet-based<br />

applications stay available.<br />

Appendix A. Availability Services 305


Figure 81. e-Business Recovery Services Implementation<br />

<strong>IBM</strong> provides:<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

• Access line and site router with Ethernet and token-ring interfaces at the<br />

recovery center<br />

• One registered IP address per host system subscribed to at the recovery<br />

center<br />

• Server and peripheral equipment required to reestablish the application<br />

Customer responsibility:<br />

• Provide for the redirection of Internet traffic to the <strong>IBM</strong> BRS Center<br />

• Provide for any information security required<br />

The more you depend on networking to keep in touch with your customers,<br />

employees and business partners, the more critical your networking capability is<br />

to the survival of your business. <strong>IBM</strong> can help you stay in touch, even during a<br />

disaster.<br />

306 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

A.3.2 Internet Emergency Response Service (IERS)<br />

Offered through <strong>IBM</strong> Business Recovery Services organization, the Internet<br />

Emergency Response Service (IERS) is a component of <strong>IBM</strong> SecureWay line of<br />

security products and services. IERS is designed to increase a customer’s<br />

Internet security skills, enabling them to utilize the Internet with reduced<br />

exposure. The service is based on <strong>IBM</strong>’s eight years of experience managing its<br />

own 40 Internet connections and those of its customers, as well as extensive<br />

incident response experience in virus and network security. The service draws<br />

on the expertise of the <strong>IBM</strong> T.J. Watson Research Center, which is<br />

world-renowned in the fields of network security and encryption technology.<br />

(You can see more information about the Research Center on<br />

http://www.watson.ibm.com.)<br />

The primary Internet Emergency Response Service offering is a packaged<br />

solution that includes the five principal components of the service as described<br />

below. The package is priced on a per-connection basis, where a connection is<br />

defined as a host (IP address) that is directly connected to the Internet.<br />

Generally, this means firewalls and the systems outside them, such as Web<br />

servers, name servers, and so forth. It is designed and priced for larger<br />

companies that have a business need for their Internet connection, and have<br />

created a centralized incident management capability.<br />

In order to accommodate smaller customers who have a less substantial need<br />

for the Internet, the initialization workshop, security advisory subscription,<br />

monthly and weekly periodic testing, and incident management services are<br />

offered on an self-service basis. To be eligible for this plan, the customer must<br />

have an Internet firewall deployed, and a centralized incident response<br />

capability.<br />

In order to assist customers who want to learn more about Internet security, are<br />

unsure how they should handle Internet security incident response, or simply<br />

wish to learn more about the IERS offering, we offer the Initialization Workshop<br />

as a separate one-time-cost item. The cost of this workshop is fully refundable<br />

against the IERS package subscription charge.<br />

The annual subscription service covers five key components:<br />

A.3.2.1 Initialization Workshop<br />

In order to implement this service effectively, the IERS team plans and conducts<br />

a one-day workshop on the customer’s premises. The workshop is preceded by<br />

an exchange of Internet Security Policy and Implementation text. Presentations<br />

are made by the customer and the IERS team in the first half of the workshop.<br />

The second half of the session is reserved for case study analysis. The<br />

workshop helps form the close working relationship which characterizes this<br />

service by leveraging the customer’s staff through an extension of their own<br />

skills.<br />

This workshop is a standard component of the IERS service, but is also offered<br />

separately to prospective IERS customers for a reduced fee (which is fully<br />

refundable against the IERS package subscription charge).<br />

Workshop Focus:<br />

The workshop generally focuses on three areas:<br />

1. Customer’s level of Internet preparedness<br />

Appendix A. Availability Services 307


This soft copy for use by <strong>IBM</strong> employees only.<br />

Examine the current state of the customer’s Internet access and security<br />

procedures, and how these relate to the customer’s business model.<br />

Examine the importance of risk analysis and how to do it. Examine the<br />

customer’s Internet security policy, key issues in policy management, and<br />

how to develop and maintain a policy.<br />

2. Translating policy into implementation<br />

How to develop router, gateway, and firewall configurations from the security<br />

policy document. Understanding potential vulnerabilities, and the risks<br />

associated with particular technologies and access methods. Available<br />

security tools and services, and how they relate to the customer’s needs.<br />

3. The incident management process<br />

How to detect a security breach, how to respond to an attempted/successful<br />

security breach, how to prevent further breaches, how to recover from the<br />

breach, how to track down the source of an incident. Essential preparation<br />

steps. Legal issues and evidence collection.<br />

Internet Security Workshop Preparation:<br />

In order to maximize the customer’s value from the workshop, the IERS team will<br />

customize the session to meet the customer’s needs. The workshop is tailored<br />

to address the issues determined from a prior analysis of the customer’s Internet<br />

connectivity architecture, security policy, and implementation.<br />

We ask that the customer provide the following information at least one week<br />

prior to the date of the workshop:<br />

1. A short summary of the organization - Type of business, national or<br />

international scope, organizational relationships (subsidiaries, joint ventures,<br />

etc.).<br />

2. A short summary of the organization’s use of the Internet - Why the<br />

organization is connected, what the connection is used for, what it means to<br />

the business (that is, is it tied to profit and loss).<br />

3. A description of the internal corporate networking architecture, including<br />

network diagrams, computing platforms and operating systems, protocols in<br />

use, etc.<br />

4. A description of all Internet connections, including firewalls, Web servers, ftp<br />

servers, name servers, etc. Network diagrams should be included as well.<br />

5. A copy of the corporate Internet security policy, if such a policy exists, and<br />

information about how that policy is distributed to the employees.<br />

6. A copy of any parts of the corporate Information security policies that relate<br />

to Internet connection or use.<br />

A.3.2.2 Incident Management<br />

IERS provides coverage 7 days a week, 24 hours a day to help customers<br />

respond to perceived attacks and exposures across their secure connections to<br />

the Internet. In this capacity, IERS acts as an extension to the customer’s<br />

existing computer security staff, giving them the depth of experience from a team<br />

that deals with Internet intrusions daily. Incidents are treated as strictly<br />

confidential.<br />

308 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

A.3.2.3 Periodic Electronic Verification<br />

IERS will periodically remotely test the customer’s Internet connections. This<br />

testing will help ensure that secure connections do not become vulnerable as a<br />

result of system or configuration changes, or developments in break-in<br />

technology. Through the expertise of the <strong>IBM</strong> Global Security Analysis<br />

Laboratory, the testing tools are continually improved to incorporate the latest<br />

known vulnerabilities.<br />

Internet ERS periodic electronic verification <strong>IBM</strong>’s Internet Emergency Response<br />

Service (IERS) team provides both weekly and monthly testing of your Internet<br />

connections.<br />

Weekly Connection Policy Compliance Testing: Once a week, we test your<br />

Internet connection(s) to make sure that it is configured according to your<br />

security policy. For example, if your policy says that you do not allow Telnet<br />

from the Internet into your corporate network, we check to make sure that you<br />

are not allowing it, and if you are for some reason, we notify you immediately.<br />

We also check your connection for a number of well-known vulnerabilities and<br />

notify you if we find any. This testing is designed primarily to detect changes in<br />

the configuration of your connection, whether they were made by authorized or<br />

unauthorized means.<br />

Monthly Connection Vulnerability Testing: Once a month, we test your Internet<br />

connection(s) to make sure that it is not vulnerable to any known methods of<br />

attack. In performing this test, we use well-known tools such as Internet Security<br />

Scanner (ISS), SATAN, and others. We also make use of tools that have been<br />

custom-developed for our service by the <strong>IBM</strong> Global Security Analysis<br />

Laboratory. If we discover anything during our testing, we notify you<br />

immediately and work with you to remove the vulnerability.<br />

Monthly Testing Report: Every month we provide you with a written report. This<br />

report contains the detailed results of your monthly vulnerability test, as well as<br />

a summary of the previous month’s weekly policy compliance tests. It also<br />

includes a summary of all actions that were taken on your account in the<br />

previous month. These reports may be kept in a binder, and reviewed at any<br />

time for information about the security of your Internet connection.<br />

A.3.2.4 Tailored Security Vulnerability Advisories<br />

Through IERS’s on-going monitoring of a wide array of sources including the<br />

underground customized alerts and advisories specific to the customer’s<br />

environment will be provided. Though potentially similar to advisories the<br />

customer may be used to seeing from other sources, IERS’s are generally<br />

earlier, more specific, and from broader sources.<br />

<strong>IBM</strong>-ERS Advisories: You can browse the advisories using the links below, or<br />

you can search them for specific topics.<br />

Security Vulnerability Alerts<br />

<strong>IBM</strong>-ERS Security Vulnerability Alerts (SVA) are designed to provide the<br />

customers of the <strong>IBM</strong> Emergency Response Service with information about new<br />

or recently discovered security vulnerabilities in operating system or network<br />

software. They provide a description of the problem, an analysis of the<br />

problem’s impact, and suggested solutions.<br />

Outside Advisory Redistributions<br />

Appendix A. Availability Services 309


This soft copy for use by <strong>IBM</strong> employees only.<br />

The <strong>IBM</strong>-ERS Outside Advisory Redistribution is designed to provide customers<br />

of the <strong>IBM</strong> Emergency Response Service with access to the security advisories<br />

sent out by other computer security incident response teams, vendors, and other<br />

groups concerned about security.<br />

For Your Information <strong>IBM</strong>-ERS<br />

For Your Information (FYI) documents are designed to provide customers of the<br />

<strong>IBM</strong> Emergency Response Service with information about current topics in the<br />

Internet security field. FYI documents will be issued periodically as the need<br />

arises. Topics may include security implications of new protocols in use on the<br />

Internet, implementation suggestions for certain types of services, and answers<br />

to frequently asked questions.<br />

A.3.2.5 Ongoing Relationship<br />

Because the IERS team functions as an extension of the customer’s security<br />

skills, IERS encourages on-going non-emergency communications about Internet<br />

security issues with its customers. This allows the customer to leverage the vast<br />

security experience and depth of multivendor multiproduct familiarity within the<br />

IERS team, thereby better ensuring that the evolving customer environment<br />

remains secure.<br />

A.3.2.6 Other Internet Emergency Response Services<br />

The Internet Emergency Response Service may be augmented with the following<br />

services, which are not a part of the basic offering:<br />

Firewall Remote Administration: The IERS team will administer the customer’s<br />

firewall system remotely from a secure facility, via a strongly-authenticated and<br />

fully encrypted connection. Requests for administrative changes to the firewall<br />

are made to the IERS team by the customer’s Firewall Coordinator (or his or her<br />

backup or designate), and are subject to call-back authentication.<br />

Firewall Remote Monitoring: The IERS team will perform periodic remote<br />

analysis of the firewall log files. This service involves the weekly transmittal of<br />

the firewall log files to an <strong>IBM</strong> location via the Internet. All log files transmitted<br />

to <strong>IBM</strong> are encrypted before they are sent, to prevent the disclosure of<br />

confidential information. At the <strong>IBM</strong> location, the log files will be subjected to<br />

automatic analysis procedures designed to identify well-known attack signatures.<br />

Any anomalies discovered by this process will be communicated to the<br />

customer’s Firewall Coordinator (or his or her backup or designate).<br />

Real-Time Intrusion Detection to IERS: Recently, <strong>IBM</strong> Global Services<br />

announced in Chicago, IL (USA) that it has entered into an agreement with<br />

WheelGroup Corporation to use WheelGroup’s NetRanger product to detect<br />

network attacks and send an alarm as the attacks are occurring.<br />

This announcement is a significant expands security offering for e-business.<br />

It is a major addition to the portfolio of services offered through the <strong>IBM</strong> Internet<br />

Emergency Response Service, which addresses and helps to eliminate security<br />

concerns related to Internet/intranet activity. With this announcement, <strong>IBM</strong><br />

strengthens its e-Business capabilities for customers seeking to confidently<br />

conduct business over the Internet and through their intranets.<br />

<strong>IBM</strong> can deploy NetRanger intrusion detection sensors at critical locations on a<br />

company’s network such as its Internet connection and strategic intranet<br />

310 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

connections, similar to the way a security firm installs alarm systems for<br />

residential customers. <strong>IBM</strong> also can pro-actively monitor the sensors, 24 hours<br />

a day, seven days a week, from its Network Security Operations Center (NSOC)<br />

in Boulder, Colo. When the sensors detect a security violation or misuse, an<br />

alarm message is sent to the NSOC. <strong>IBM</strong>’s security experts can then<br />

immediately take action to neutralize the problem.<br />

By immediately detecting attacks against the customer network, <strong>IBM</strong> is able to<br />

repel the attack and diminish the impact. Even the most security conscious<br />

companies can now realize the advantages of e-business.<br />

This relationship joins <strong>IBM</strong>’s full-service security expertise with WheelGroup’s<br />

leading edge intrusion detection technology. It provides an unmatched security<br />

monitoring solution for corporations using the Internet and intranets.<br />

The suite of network security services and consulting methodologies delivered<br />

through <strong>IBM</strong>’s Business Recovery Services offerings provides companies with an<br />

array of security capabilities including assessing a customer’s Internet/intranet<br />

security preparedness, educating a customer in the components of<br />

Internet/intranet security, deploying security components, managing the risk<br />

associated with doing business electronically, and responding to emergency<br />

situations.<br />

A.3.3 Final Considerations about Availability Services<br />

As companies continue to integrate the Internet and their own intranets with<br />

mission-critical applications, they become vulnerable to new and unanticipated<br />

security threats. Such exposures can place organizations at risk at every level,<br />

down to the very credibility upon which they build their reputations.<br />

While network security is on everyone’s mind these days, few companies can<br />

afford to dedicate their own resources to building and implementing a sound and<br />

lasting security strategy. At the same time, no enterprise can afford to have its<br />

business become a casualty of poor planning or preventable harm.<br />

As a developer of much of the technology that evolved into today’s Internet, <strong>IBM</strong><br />

is uniquely positioned to offer your business the confidence it needs to safely<br />

conduct and benefit from e-business.<br />

<strong>IBM</strong>-ERS is a Member Team of the Forum of Incident Response and Security<br />

Teams (FIRST), a global organization established to foster cooperation and<br />

response coordination among computer security teams worldwide.<br />

<strong>IBM</strong> is a Management Team Member of the Manhattan Cyber Project, whose<br />

mission is to improve on the availability and effectiveness of technology, people,<br />

and processes, that safeguard U.S. Corporations and critical infrastructure areas<br />

from the pervasive cyber threat.<br />

A.3.3.1 The Four Phases of Internet Adoption<br />

To help its customers develop their plans for integrating the Internet into their<br />

businesses, <strong>IBM</strong> has identified four principal phases along the road of Internet<br />

adoption:<br />

• Access<br />

In this first phase of adoption, a company has just begun to explore the<br />

Internet, and to learn about its potential benefits. A few employees are using<br />

Appendix A. Availability Services 311


This soft copy for use by <strong>IBM</strong> employees only.<br />

modems, connected to their desktop PCs, to dial into either a local Internet<br />

service provider, or a national service such as America Online. In this<br />

phase, the company is using the Internet as a resource for getting<br />

information only; all requests for access are in the outbound direction, and<br />

all information flow is in the inbound direction. Exchanging electronic mail<br />

and browsing the Web make up the majority of activities in this phase.<br />

• Presence<br />

In this phase, the company has begun to make use of the Internet not only as<br />

a resource for getting information, but also as a means of providing<br />

information to others. Direct connection of the company’s internal network<br />

means that now all employees have the ability to access the Internet<br />

(although this may be restricted by policy), allowing them to use it as an<br />

information resource, and also enabling processes such as customer support<br />

via e-mail. The creation of a Web server, either by the company’s own staff<br />

or through a content hosting service, allows the company to provide static<br />

information such as product catalogs and data sheets, company background<br />

information, software updates, etc. to its customers and prospects.<br />

• Integration<br />

In this phase, the company has begun to integrate the Internet into its<br />

day-to-day business processes, by connecting its Web server directly<br />

(through a firewall or other protection system) to its back-office systems. In<br />

the previous phase, updates to the Web server’s data were made manually,<br />

via tape or other means. In this phase, the Web server can obtain<br />

information on-demand, as it is requested by users. To use banking as an<br />

example, this phase enables the bank’s customers to obtain their account<br />

balances, find out when checks cleared, and other information retrieval<br />

functions.<br />

• E-Business<br />

In the final phase, the company has enabled bidirectional access requests<br />

and information flow. This means that not only can customers on the<br />

Internet retrieve information from the company’s back-office systems, but<br />

they can also add to or change information stored on those systems. At this<br />

stage, the company is conducting business electronically; customers can<br />

place orders, transfer money (via credit cards or other means), check on<br />

shipments, and so forth. Business partners can update inventories, make<br />

notes in customer records, etc. In short, the entire company has become<br />

accessible via the Internet.<br />

While your company may choose not to follow this road to its end, you are most<br />

likely right now somewhere on it, either at one of the phases or in transition<br />

between them.<br />

A.3.3.2 The Five Stages of Internet and Intranet Security<br />

Use of the Internet is not without its risks. However, <strong>IBM</strong> believes that while it’s<br />

important to recognize these risks, it’s also important not to exaggerate them.<br />

After all, crossing the street is not without its risks, either. But by recognizing<br />

the dangers, and taking the proper precautions (such as looking both ways<br />

before stepping off the curb), millions of people cross the street safely every day.<br />

<strong>IBM</strong> has defined five stages of Internet and intranet security:<br />

• Assess<br />

312 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

This stage examines your current state of Internet and intranet security<br />

preparedness, and identifies areas in which improvement is needed.<br />

• Educate<br />

In this stage, you learn more about protecting those things (protocols,<br />

systems, and applications) that were identified in the assess stage.<br />

• Deploy<br />

Once you have identified what needs to be secured, and learned how to<br />

protect it, you deploy solutions (technology, policies, and procedures) to<br />

implement that protection.<br />

• Detect<br />

No security solution is perfect. This stage uses a variety of techniques to<br />

detect weaknesses before they can be exploited.<br />

• Respond<br />

In the event that a vulnerability is successfully exploited, this stage makes<br />

sure that a plan is in place to respond to that emergency.<br />

The Internet and intranets are in a state of constant change (new protocols, new<br />

applications, new technologies) and a company’s security practices must be able<br />

to adapt to these changes. To enable this, the five stages above should be<br />

viewed as forming a circle; after deploying a security solution, enabling some<br />

detection, and devising a response plan, the assess stage is repeated, looking<br />

for further weaknesses. Those new weaknesses are then learned about and<br />

dealt with, and a third round begun. This continuous improvement makes sure<br />

that your corporate assets are always protected.<br />

A.3.3.3 <strong>IBM</strong>: Total Security Solutions<br />

<strong>IBM</strong> offers a total security solution. Regardless of which phase of Internet<br />

adoption you find yourself in, or which security stage you are currently<br />

addressing, the Emergency Response Service offers technologies and services<br />

to help you keep your business secure.<br />

Some of the key services we offer are:<br />

Assess Stage<br />

• Vulnerability Evaluation<br />

Assessment of potential vulnerabilities to unauthorized access or use<br />

because of improper configuration or out-of-date software.<br />

• Planning and Implementation Workshop<br />

One-day workshop to examine current state of Internet access and security<br />

policies and procedures, and to develop a plan to advance to the next stage.<br />

• Security Controls Review<br />

Identifies the strengths and weaknesses of I/T security controls, determines<br />

exposures, recommends process for improvement.<br />

• Business Impact Analysis<br />

Identifies critical information assets, their exposure risk, and tactical and<br />

strategic actions for safeguarding them.<br />

Appendix A. Availability Services 313


Educate Stage:<br />

• Advisories<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Timely information from a variety of sources about security vulnerabilities in<br />

protocols and applications.<br />

• Security Workshop<br />

Two-day workshop, conducted by senior consultants, on topic(s) of specific<br />

interest to the attendees.<br />

• Training<br />

Available in several forms including white papers and technical publications,<br />

classroom-based short courses, and one-on-one hands-on instruction.<br />

• <strong>Redbooks</strong><br />

“How to” books on a variety of security-related topics, published by <strong>IBM</strong>’s<br />

International Technical Support Organization (see more information at<br />

http://www.redbooks.ibm.com).<br />

DEPLOY STAGE:<br />

• <strong>IBM</strong> Firewall<br />

Combines all three firewall architectures (circuit gateway, proxies, packet<br />

filtering) into one security system (see more information at<br />

http://www.ics.raleigh.ibm.com/firewall).<br />

• <strong>IBM</strong> AntiVirus<br />

Protects against more than 10,000 strains of computer viruses on Windows<br />

3.1, Windows 95, Windows NT, OS/2, and NetWare (see more information at<br />

http://www.av.ibm.com).<br />

• <strong>IBM</strong> Global Network<br />

Serves over 30,000 companies in over 850 cities in 100 countries worldwide.<br />

• Asset Protection Planning and Policy<br />

Custom-developed security architecture that includes a variety of security<br />

management processes.<br />

• Security Solution Design<br />

Comprehensive design including systems, networks, physical and intellectual<br />

assets and personnel.<br />

Detect Stage:<br />

• Penetration Testing<br />

Simulated attempts to initiate unauthorized activities on, or gain access to,<br />

networks or computer systems.<br />

• Intrusion Detection<br />

Deployed at critical connection points on a network, monitors network traffic<br />

for misuse/security violations.<br />

• Log File Analysis<br />

Analysis of firewall log files for evidence of well-known attacks, plus<br />

inbound/outbound traffic analysis.<br />

• Audit Reports<br />

314 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Describe the results of vulnerability evaluation, log file analysis, and<br />

intrusion detection activities.<br />

• War Dialing<br />

Sequential search of telephone exchanges for modems configured in answer<br />

mode.<br />

Respond Stage:<br />

• Incident Investigation<br />

Expert guidance and assistance in all six phases of security incident<br />

management: detection, containment, eradication, recovery, prevention, and<br />

prosecution.<br />

• E-Business Recovery<br />

Network access and equipment to quickly reestablish electronic presence on<br />

the Internet in the event of an unplanned outage, whatever the cause (see<br />

more information at http://www.brs.ibm.com/website.html).<br />

• Business Recovery Services<br />

Business protection, recovery, and resumption services for large, midrange<br />

and distributed multiplatform computing environments (see more information<br />

at http://www.brs.ibm.com).<br />

• Centralized Virus Management<br />

Processes and procedures for tracking and reacting to virus incidents on an<br />

enterprise-wide basis.<br />

A.3.3.4 On-Call, One-Call<br />

<strong>IBM</strong> Emergency Response Service provides companies with an array of security<br />

services and consulting methodologies. As a subscriber to these services, you<br />

will have access to the best resources in the business - <strong>IBM</strong> technology and<br />

expertise - on call 24 hours a day, 7 days a week:<br />

• <strong>IBM</strong> Global Services<br />

The most comprehensive and complete information technology services<br />

provider in the world (see more information at http://www.ibm.com/services).<br />

• <strong>IBM</strong> SecureWay<br />

Broad portfolio of security solutions, services, and technologies (see more<br />

information at http://www.ibm.com/Security).<br />

• <strong>IBM</strong> Global Network<br />

Managed network services for content, collaboration, and electronic<br />

commerce, as well as network outsourcing services (see more information at<br />

http://www.ibm.com/globalnetwork).<br />

• <strong>IBM</strong> Global I/T Security Consulting Practice<br />

Assessment, planning, design, and implementation services based on the<br />

<strong>IBM</strong> Security Architecture (see more information at<br />

http://www.ibm.com/Security/html/consult.html).<br />

• <strong>IBM</strong> Global Security Analysis Laboratory<br />

Researches the vulnerability of networks and systems; develops new<br />

technologies to counter future threats (see more information at<br />

http://www.zurich.ibm.com/Technology/Security/extern/Internet/gsal.html).<br />

Appendix A. Availability Services 315


This soft copy for use by <strong>IBM</strong> employees only.<br />

And because we continue to update and revise our services, you will have the<br />

assurance of knowing that your network security processes and strategies won’t<br />

fall prey to obsolescence. To find out more about the services available through<br />

the <strong>IBM</strong> Emergency Response Service, choose from the links below, or send<br />

your questions to ers-sales@vnet.ibm.com. For information about ERS in<br />

Europe, the Middle East, and Africa, contact ers@emea.ers.ibm.com.<br />

Table 36. Useful Links about <strong>IBM</strong> Emergency Response Service<br />

Internet Emergency Response Service http://www.ers.ibm.com/sales-info/iers/index.html<br />

Information about the ERS team http://www.ers.ibm.com/team-info/index.html<br />

<strong>IBM</strong>-ERS press releases http://www.ers.ibm.com/sales-info/press-releases/index.html<br />

Meet the ERS advisory board http://www.ers.ibm.com/team-info/advboard.html<br />

Generic information about ERS http://www.ers.ibm.com/sales-info/moreinfo.html<br />

316 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs<br />

Internet usage is exploding. As the industry evolves with breathtaking speed,<br />

Internet Service Providers are in the historic position of transforming the way<br />

average citizens and businesses worldwide conduct their everyday lives. ISPs<br />

are also in a strong position to transform themselves from companies that only<br />

deliver Internet access to multiservice providers that deliver online services with<br />

real business value.<br />

The opportunities for Internet Service Providers go far beyond providing simple<br />

access to the Internet. Millions of people are looking to the Internet as their<br />

primary gateway to communicate, to form virtual communities, and increasingly,<br />

to purchase merchandise. In short, the second wave of Internet services,<br />

focused on electronic business (e-business), is quickly gaining momentum. With<br />

a requirement for high-volume transactions, legacy data integration, security,<br />

and scalable and reliable platforms, <strong>IBM</strong>′s years of experience with mission<br />

critical communications applications begs the question ... Who better than <strong>IBM</strong><br />

can help create the new world of Internet business services?<br />

Over the past several years, <strong>IBM</strong> has been involved in designing some of the<br />

largest Web sites in the world. From the 1996 Olympic games, to Wimbledon, to<br />

the Masters, <strong>IBM</strong> has developed the technology and know-how to build scalable<br />

Internet services. Now we are taking the technology and expertise gained from<br />

these major events and packaging a family of integrated solutions customized<br />

for ISPs. Leveraging <strong>IBM</strong> strengths in hardware, software, and services, these<br />

solutions are designed to deliver reliable services to large numbers of Internet<br />

subscribers.<br />

B.1 <strong>IBM</strong>: Preparing ISPs for the Second Wave<br />

While many opportunities abound for Internet Service Providers, they must also<br />

overcome the significant challenges presented by the second wave of Internet<br />

services. First generation Internet infrastructure is frequently based on ad hoc<br />

solutions developed with minimal attention to reliability and scalability. The<br />

number of online service outages making headlines is enough to drive this point<br />

home. With a focus on providing Internet access, these solutions will have<br />

trouble supporting the services required for the second wave: real-time<br />

collaboration, personalized content, and secure electronic transactions.<br />

<strong>IBM</strong> believes that preconfigured, integrated solutions supporting a broad range<br />

of services will be driving force that enables ISPs to address the challenges of<br />

the second wave. For this reason, <strong>IBM</strong> is introducing a family of solutions<br />

specifically developed for the ISPs, with a focus on reliability, scalability, and<br />

service flexibility. <strong>IBM</strong>′s Solutions for ISPs deliver capabilities in the following<br />

areas:<br />

• Content management<br />

• Collaboration<br />

• Commerce<br />

• Security<br />

• Infrastructure<br />

© Copyright <strong>IBM</strong> Corp. 1997 317


This soft copy for use by <strong>IBM</strong> employees only.<br />

Leveraging the best Internet technology from <strong>IBM</strong>, Lotus, Tivoli, and <strong>IBM</strong><br />

Business Partners, the <strong>IBM</strong> solutions for ISPs are the platform of choice for<br />

Internet Service Providers who are looking to differentiate their services in this<br />

competitive marketplace. The <strong>IBM</strong> Solutions for ISPs run on the industry leading<br />

open platform for mission-critical applications -the <strong>IBM</strong> RS/6000. Exploiting the<br />

price/performance advantages of RISC technology, and the network tested<br />

reliability of the AIX operating system, the <strong>IBM</strong> Solutions for ISPs are supported<br />

by an operating environment second to none for business critical Internet<br />

services.<br />

B.2 Introducing <strong>IBM</strong> Solutions for ISPs<br />

In this dynamic marketplace, <strong>IBM</strong> is providing the servers, software, and<br />

services to ensure that Internet Service Provider′s infrastructure can meet the<br />

requirements of the second wave. <strong>IBM</strong> understands the challenges and<br />

opportunities facing ISPs and combines its expertise in networking and<br />

transaction processing with new Internet technologies that will dramatically<br />

impact how ISPs conduct their business. To help capitalize on the revenue<br />

opportunities opening up with the Internet′s second wave, <strong>IBM</strong> offers the<br />

solutions for ISPs. The solution components include:<br />

• Network access technology supporting residential dial-up, high-speed leased<br />

lines for business, and interconnection to Internet backbones. <strong>IBM</strong> Global<br />

Network (IGN) services can be utilized for NAP access, and to provide local<br />

POP support on a global basis.<br />

• Computing platforms including a choice of RS/6000 servers to meet the<br />

performance and price/performance requirements of ISPs, from new entrants<br />

to large ISPs who need to support millions of subscribers. Representing the<br />

broadest UNIX product family in the industry, the RS/6000 is a reliable and<br />

scalable platform for Internet services. The flexible server options supported<br />

by <strong>IBM</strong> Solutions for ISPs include entry rack systems, enterprise rack<br />

systems, and scalable RS/6000 SP frames.<br />

• The supported operating system is AIX, <strong>IBM</strong>′s commercial grade<br />

implementation of UNIX. Options for High Availability Cluster<br />

Multiprocessing (HACMP), <strong>IBM</strong>′s acclaimed technology for minimizing<br />

service outages, and <strong>IBM</strong> Enterprise Connectors, software to efficiently<br />

access legacy applications, complete a robust operating environment which<br />

leads the industry in reliability, and data and transaction integration.<br />

• <strong>IBM</strong>′s breakthrough Internet middleware developed to support large scale<br />

Web sites will be integrated with the <strong>IBM</strong> Solutions for ISPs, including<br />

technology from the Web Object Manager (WOM) developed to support the<br />

1996 Olympics. A key component of this technology is Net.Dispatcher, a load<br />

balancing software used in some of the most scalable Web sites ever built.<br />

• A set of application servers are the centerpiece of the <strong>IBM</strong> solutions for ISPs<br />

family, serving as the delivery vehicle for value added services.<br />

Incorporating the leading Internet technologies from <strong>IBM</strong>, Lotus, and<br />

Business Partners, the application servers support solutions for content<br />

management, collaboration, commerce, and security.<br />

• Revenue generating Value Added Solutions running on top of the <strong>IBM</strong><br />

solutions for ISPs application servers offer the differentiation required in the<br />

competitive Internet marketplace. From hosting storefronts with commerce<br />

solutions, to supporting virtual communities with collaboration solutions, to<br />

hosting Electronic Yellow Pages with content management solutions, the<br />

318 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

services which can be implemented with <strong>IBM</strong>′s Solutions for ISPs are<br />

virtually unlimited.<br />

B.2.1 Operations, Administration, Maintenance and Provisioning<br />

B.3 <strong>IBM</strong>: Professional Services<br />

B.4 Explore the Possibilities<br />

A key component of any solution deployed by Internet Service Providers is<br />

OAM&P. <strong>IBM</strong>′s Solutions for ISPs are supported by service management<br />

technology.<br />

The service management system is based on industry leading management<br />

software from <strong>IBM</strong>′s Tivoli Systems. Including capabilities for consolidated<br />

console, server and network management, application monitoring, Internet<br />

service management, software distribution, and system backup and recovery.<br />

The foundation for the <strong>IBM</strong> solutions for ISPs service management system is the<br />

robust, object-based Tivoli Management Framework (TMF).<br />

The <strong>IBM</strong> solutions for ISPs are supported by <strong>IBM</strong>′s highly skilled services<br />

personnel. Designed to accelerate the implementation of Internet solutions and<br />

accelerate time to market, professional services available include Internet<br />

consulting, product support services, solution installation, integration, and<br />

customization, and education.<br />

The <strong>IBM</strong> Solutions for ISPs family is designed to allow ISPs the opportunity to<br />

offer a broad range of revenue generating services for the second wave. With a<br />

focus on content management, collaboration, and commerce, the three ″Cs″ of<br />

e-business, the <strong>IBM</strong> Solutions for ISPs family offers the following range of<br />

solutions required to meet the expanding requirements of your business and<br />

residential customers:<br />

• Offer core Internet services including Web access, news, and mail using<br />

technology from industry leader Netscape Communications.<br />

• Host storefronts for business customers with the <strong>IBM</strong> solutions for ISPs<br />

Net.Commerce solution, providing the comfort of secure transactions with the<br />

industry-standard SET protocol.<br />

• Transform published Yellow pages directory into a an online multimedia<br />

database for business customers. Let electronic Yellow pages entries<br />

mature into additional service opportunities for secure Web site hosting and<br />

links to electronic commerce.<br />

• Augment Web site and storefront hosting services with streaming video<br />

using <strong>IBM</strong>′s Videocharger Server for customer self-service and training, or<br />

online product demonstrations.<br />

• Host business customers intranets with the rich infrastructure provided by<br />

the <strong>IBM</strong> solutions for ISPs Lotus Domino Solution.<br />

• Support community services for business and residential subscribers using<br />

the collaborative power of the <strong>IBM</strong> solutions for ISPs Lotus Domino Server.<br />

These are some of the revenue-generating services that ISPs can implement<br />

with <strong>IBM</strong>′s Solutions for ISPs family. The breadth of services available is limited<br />

only by imagination.<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 319


B.5 <strong>IBM</strong>: The Source for ISP Solutions<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

<strong>IBM</strong> has been a leader in providing business support systems for provisioning,<br />

customer service and billing. <strong>IBM</strong>′s Telecom and Media Industry Solutions Units<br />

focus on enhanced services, information services, and network operations, has<br />

established a strong presence for <strong>IBM</strong> as a solution provider to<br />

telecommunications and media customers. Now we are leveraging our<br />

experience, strength, and investments in network computing to deliver a family<br />

of Internet Service Provider solutions. Let <strong>IBM</strong>′s experience pay off by<br />

partnering with your customers in the race to provide electronic business on the<br />

Internet.<br />

B.6 What Are the <strong>IBM</strong> Solutions for ISPs<br />

The <strong>IBM</strong> Telecom and Media Industry Solution Unit (ISU) has implemented a<br />

comprehensive family of solutions designed to meet the reliability and scalability<br />

requirements of Internet Service Providers, the <strong>IBM</strong> Solutions for ISPs family.<br />

The <strong>IBM</strong> Solutions for ISPs consist of packaged hardware, software, and services<br />

offerings designed to allow ISPs the opportunity to quickly get to market with a<br />

variety of new revenue generating services.<br />

A typical <strong>IBM</strong> Solution for an ISP consists of the following:<br />

• An RS/6000 workgroup server, entry rack server, enterprise rack server, or<br />

an SP node.<br />

• AIX Version 4.2.<br />

• <strong>IBM</strong> Solutions for ISPs Web Integration Center documenting the <strong>IBM</strong><br />

Solutions for ISPs family solutions.<br />

• <strong>IBM</strong> Solutions for ISPs application software. The application software may<br />

be an existing AIX Licensed Program Product (LPP) or a Telecom and Media<br />

ISU PRPQ.<br />

• Installation and implementation services. Depending on the complexity of<br />

the solution, these services could be <strong>IBM</strong> Global Services (IGS) SmoothStart<br />

Services, IGS Professional Services or Telecom and Media ISU Professional<br />

Services<br />

• Advanced application services. These services are designed to enhance the<br />

availability, scalability, and manageability of the <strong>IBM</strong> Solutions for ISPs<br />

solution. Advanced application services include high availability (HACMP),<br />

disaster recovery (HAGEO), Business Recovery Services, scalability<br />

(Interactive Network Dispatcher, Service Management (Tivoli) and<br />

backup/restore (ADSM).<br />

B.6.1 The <strong>IBM</strong> Solutions for ISPs Family<br />

The first release of the <strong>IBM</strong> Solutions for ISPs family consists of the following:<br />

• Content Management<br />

− <strong>IBM</strong> Solutions for ISPs Lotus Go Webserver<br />

− <strong>IBM</strong> Solutions for ISPs Web Hosting Server<br />

• Communications and Messaging<br />

− <strong>IBM</strong> Messaging Solution for ISPs<br />

320 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

• Collaboration<br />

− <strong>IBM</strong> Solutions for ISPs Lotus Domino Server (with business partners)<br />

• Security<br />

− <strong>IBM</strong> Solutions for ISPs Firewall Server<br />

• Commerce<br />

− <strong>IBM</strong> Solutions for ISPs Net.Commerce Server<br />

• Infrastructure<br />

− <strong>IBM</strong> Solutions for ISPs Network Dispatcher Server<br />

In addition to the <strong>IBM</strong> Solutions for ISPs solutions listed above, additional<br />

companion products are available from <strong>IBM</strong> which can apply to ISP customers:<br />

• Content Management<br />

− <strong>IBM</strong> Videocharger Server<br />

− Telecom and Media ISU Electronic Yellow Pages<br />

− Telecom and Media ISU Electronic White Pages<br />

− Netscape Enterprise Server<br />

• Messaging and Communications<br />

− Netscape News Server<br />

− Netscape Mail Server<br />

• Commerce<br />

− Netscape Merchant Server<br />

• Security<br />

− Checkpoint FireWall-1<br />

− WebStalker Pro<br />

− Netscape Proxy Server<br />

• Infrastructure<br />

− Tivoli TME Product Family<br />

The Telecom and Media ISU has developed boilerplate customer proposals for<br />

the <strong>IBM</strong> Solutions for ISPs family. A services team is in place within the<br />

Telecom and Media ISU to support customers proposals and to manage the <strong>IBM</strong><br />

Solutions for ISPs installations.<br />

B.7 RS/6000 As a Platform for Internet Service Providers<br />

The first wave of Internet services were characterized by ad hoc designs, lack of<br />

security, static publishing, basic access, and limited scalability. As would be<br />

expected, the second wave of Internet services requires solutions that support<br />

security, commerce, and transaction-oriented activities; as well as multiservices<br />

integration that is reliable, scalable, and highly available. The RS/6000′s<br />

strengths which include reliability, scalability, availability, robust portfolio,<br />

end-to-end security, and superlative service and support, make it a flagship<br />

network computing platform fully enabled to support the second wave of<br />

requirements.<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 321


This soft copy for use by <strong>IBM</strong> employees only.<br />

RS/6000 delivers reliability via superior storage management functions,<br />

non-intrusive low-level performance tools, journaled file system, intuitive<br />

systems management (SMIT), a wide range of connectivity applications and<br />

devices, and superior I/O storage subsystems.<br />

RS/6000 delivers scalibility via binary compatibility across the product line from<br />

work group server to large scale server and in the Internet space, customers<br />

don′t know how fast their server needs will grow and the RS/6000′s scalability<br />

enables seamless stability of an application set as their requirements increase.<br />

SMP scalable performance enables applications to achieve measurable<br />

performance improvements when processors are added in an SMP configuration.<br />

Dynamic capacity expansion enables customers to achieve linear performance<br />

bandwidth gains by adding nodes (on-the-fly) to an SP. Finally, as resources and<br />

nodes are added to an SP, systems administration is handled from a central<br />

control workstation making the SP a superior platform for LAN and server<br />

consolidation efforts.<br />

RS/6000 delivers availibility via the industry leading HA-CMP product set and the<br />

recently introduced Phoenix APIs for applications to exploit high availability and<br />

restart as real advantages today. Inherent RS/6000 features such as the service<br />

processors combined with the Call Home services create another availability<br />

advantage to exploit, particularly with the introduction of the F50 as a<br />

price/performance leader.<br />

The RS/6000 robust portfolio delivers a hardware platform and operating system<br />

software optimized for Symmetric Multiprocessing (SMP), Massively Parallel<br />

Processing (MPP), and TP-monitor-type multithreading and load balancing. Built<br />

on this foundation is the most robust collection of integrated network computing<br />

solutions (POWERsolutions) offered by any system vendor. This single point of<br />

contact for the major components exploits the strengths of <strong>IBM</strong>′s services and<br />

support combined with vendor applications in demand by our customers.<br />

A key element to satisfying the second wave requirement is end-to-end security.<br />

Security begins in the hardware and can be accelerated with cryptography<br />

hardware adapters. The AIX Operating System is designed for C2 level security,<br />

and provides an excellent base for a separately available B level security<br />

offering (available from Bull). Secure Sockets Layer (SSL) support in AIX as a<br />

client and server provides security at a connection level. The first<br />

implementation of Secure Electronic Transactions (SET) is introduced in <strong>IBM</strong>′s<br />

Net.Commerce v2 products (6/97 GA). To embellish services for RS/6000′s<br />

customers, the <strong>IBM</strong> SecureWay family of security offerings is a broad portfolio of<br />

security hardware, software, consulting and services to help users secure their<br />

information technology. The offerings apply to server-based and distributed<br />

systems and to the integration of security across enterprises that have extended<br />

their reach to the Internet.<br />

One of the strongest distinguishers for <strong>IBM</strong> and the RS/6000 is the service (IGS)<br />

and Datapro award-winning support capabilities that round out each of the<br />

solutions. An example of service and support integration was the significant<br />

undertaking of supporting the Atlanta Summer Olympics on RS/6000 servers. A<br />

single point of contact for support of network computing applications allows<br />

customers and business partners to exploit the highly acclaimed <strong>IBM</strong> support<br />

structure for non-<strong>IBM</strong> products.<br />

RS/6000 and AIX provide the level of robustness, scalability and availability that<br />

ISP solutions require, characteristics that Intel/NT workstations currently lack.<br />

322 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Table 37. AIX vs. Sun: Features<br />

The largest UNIX competitor for ISP solutions is Sun. Both Sun and <strong>IBM</strong> have<br />

their sights set on becoming the leader in network computing. By all accounts,<br />

Sun is a formidable competitor. Take a look at the SPECWeb and TPC-M results<br />

to get an indication of how the performance of the RS/6000 and Sun systems<br />

stack up. While these results are important, they are not the only factor in<br />

determining how production environments for commerce will perform.<br />

For example, Sun′s Ultra Enterprise series has expansion limitations. Enterprise<br />

3000, 5000, 6000 trade-off CPU RAM for I/O slots and the Enterprise 4000 trades<br />

CPU/RAM for internal disk and/or I/O slots. But perhaps the RS/6000′s real<br />

advantage lies in AIX itself. The following table shows the advantages that AIX<br />

has over Solaris, advantages which are critical for reliable and<br />

easy-to-administer services solutions.<br />

Feature AIX Solaris<br />

Logical Volume Manager included nonintegrated server offering<br />

Disk Mirroring included nonintegrated server offering<br />

Journal File System included nonintegrated server offering<br />

Table 38. AIX vs. Sun: Plans<br />

In fact, DH Brown consultants rated AIX superior to Solaris in overall commercial<br />

and technical function, as well as in high availability software capabilities<br />

(HACMP). For 1997, Sun has a catch-up plan for high availability to add the<br />

features that AIX has today.<br />

SUN′s 1997 Plan AIX-HACMP Support<br />

Integration of HA failover and parallel (PDB) function available today<br />

Disaster recovery available today<br />

HA support of 4 node clusters (today only 2 nodes) available today for up to 8 nodes<br />

Another source of information on <strong>IBM</strong> and Sun is the recent article by Enabling<br />

Technologies Group (ETG), industry consultants.<br />

B.8 <strong>IBM</strong> Messaging Solution for ISPs<br />

Today, with over 125 million users, electronic messaging is a vital element in our<br />

nation′s communications infrastructure. This document provides an overview of<br />

the <strong>IBM</strong> Messaging Solution for ISPs, which is designed to help Internet Service<br />

Providers (ISPs) thrive on the opportunities in this environment.<br />

The <strong>IBM</strong> Messaging Solution for ISPs is a scalable, highly-available Internet<br />

standards-based messaging system from <strong>IBM</strong> and Soft-Switch which is designed<br />

to meet the high volume and performance demands of Telcos, ISPs and VANs.<br />

The system supports the full suite of Internet messaging standards including:<br />

SMTP, ESMTP, MIME, SNMP, LDAP, POP3 and IMAP4. The <strong>IBM</strong> Messaging<br />

Solution for ISPs provides near-linear scalability by supporting hundreds of<br />

thousands of mailboxes per server, and enabling the clustering of multiple<br />

mailbox and protocol servers. The system combines <strong>IBM</strong>′s unparalleled systems<br />

and service with Soft-Switch′s corporate and VAN messaging experience to<br />

deliver a solution which enables ISPs to offer value-added messaging services.<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 323


B.8.1 Solution Overview<br />

B.8.2 Software<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Today′s Internet Service Provider exists in a high-volume, low-margin business<br />

environment. Because of the extremely competitive nature of the ISP business,<br />

some analysts predict there will be 50% fewer ISPs by the year 2000. Only the<br />

ISPs who can profitably offer popular services on controllable margins will<br />

succeed. A messaging system that isn′t reliable could quickly convert profits to<br />

customer service costs. The key to success in this environment is to reduce<br />

customer support requirements with an infrastructure that is highly available,<br />

incredibly reliable, and backed by the best service organization in the world.<br />

<strong>IBM</strong> understands the requirements for a messaging infrastructure that is highly<br />

scalable, reliable and easily managed. To meet this need, <strong>IBM</strong>′s Network<br />

Computing, Telecom and Media Industry Solutions Unit has coordinated<br />

resources from Soft-Switch, the RS/6000 division, the <strong>IBM</strong> Internet division and<br />

other internal <strong>IBM</strong> communities to package and deploy the best products and<br />

services to meet the needs of Internet Service Providers. This solution, which is<br />

called the <strong>IBM</strong> Messaging Solution for ISPs, includes software and hardware that<br />

will enable ISPs to offer comprehensive consumer and business<br />

Internet-standard messaging services to their customers.<br />

The development of this system was undertaken only after an extensive review<br />

of existing products revealed their inability to handle the projected volume for a<br />

successful commercial ISP. This research also set clear design goals; that is, to<br />

take advantage of the most efficient hardware and operating system, and to<br />

design the system to be modular and scalable. This mandate has yielded a<br />

system that is flexible, scalable, and extensible, and has been proven in a live<br />

production environment.<br />

<strong>IBM</strong> and Soft-Switch have been involved in the design and implementation of all<br />

facets of e-mail, including pioneering work in messaging, directory services and<br />

multiprotocol switching systems. <strong>IBM</strong> and Soft-Switch are offering “Best of<br />

Breed” ISP-oriented products which take advantage of the native strengths of<br />

both parties: <strong>IBM</strong>′s expertise in highly available, fault-tolerant hardware<br />

systems, and Soft-Switch′s years of meeting the messaging needs of the largest<br />

networks in the world.<br />

The <strong>IBM</strong> Messaging Solution for ISPs is not a single monolithic server, but rather<br />

a modular system based on a number of application servers that can be<br />

deployed on a single CPU, or across a number of hardware servers. The<br />

solution overview describes each of the components from the software and<br />

hardware point of view.<br />

The <strong>IBM</strong> Messaging Solution for ISPs is made up of software application servers<br />

and other components. Incoming messages enter from the Internet and are<br />

routed to the most available SMTP switch, which parses the message and<br />

validates the receiver and originator through the directory. The message is then<br />

either sent to the Message Store or forwarded (if the user is remote).<br />

Subscriber access to stored messages comes from the Internet to the router,<br />

which connects the request to the nearest, least busy POP3/IMAP4 server to<br />

handle the request. The subscriber is authenticated and the message store<br />

location is determined, and the message is accessed.<br />

324 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

B.8.2.1 Network Dispatcher (IP Routing)<br />

The SMTP data stream coming in from the Internet is routed by <strong>IBM</strong>′s Network<br />

Dispatcher to the most available SMTP server in the protocol server cluster. The<br />

Network Dispatcher continuously monitors server workload and balances traffic<br />

across teams of servers. By always routing the SMTP data to an available<br />

server, the Network Dispatcher provides a highly available presence for a given<br />

Web site.<br />

The Network Dispatcher provides a single, well-known, virtual IP address for a<br />

cluster of IP servers. This means that a high-volume site can be horizontally<br />

scaled across a number of servers (each with a unique IP network address), and<br />

can receive mail even if some of the servers are busy or offline. These servers<br />

can be serviced by any number of machines.<br />

The Network Dispatcher is proven technology and has been used to host<br />

high-volume Web sites such as for the Deep Blue chess match, the Master′s Golf<br />

Tournament, and the 1996 Summer Olympics.<br />

B.8.2.2 SMTP Server<br />

After receiving the SMTP data stream from the Network Dispatcher, the SMTP<br />

server parses the message, validates the recipient through the directory,<br />

performs a number of operations on the message, and then either sends it to the<br />

mailbox for storage or forwards it to another recipient.<br />

In addition to the Internet-standard simple mail transport protocols, the SMTP<br />

server supports some ESMTP commands, including:<br />

• Delivery Status Notification Support - Returns a positive or negative indicator<br />

of delivery to the message originator as described in RFC 1891-1894.<br />

• 8-Bit MIME Transport - Enables more efficient transport of large binary<br />

objects.<br />

• Message Sizing - Proactively alerts clients of message size acceptance<br />

criteria. Prevents a dial-in user from transmitting a huge message only to<br />

find it was rejected after 20 minutes of transmission time.<br />

SMTP servers can be deployed in clusters for redundancy and load balancing.<br />

B.8.2.3 POP3/IMAP4 Protocol Server<br />

When a user connects to the system from the Internet to retrieve their mail, the<br />

Network Dispatcher routes their request to the most-available POP3 or IMAP4<br />

protocol server. The protocol server then retrieves the message from the<br />

mailbox (sometimes called a message store) and returns it to the client (in the<br />

case of POP3), or allows the client to access the appropriate folders in the<br />

mailbox (in the case of IMAP4). The protocol servers can be deployed on one or<br />

many machines, and can easily be scaled to handle thousands of simultaneous<br />

connections.<br />

Post Office Protocol 3 (POP3) stores mail messages on a server and downloads<br />

pending mail to the client when it logs in. Internet Mail Access Protocol (IMAP4)<br />

allows for messages to be acted upon by the client while they are still resident<br />

on the server, allowing for more selective downloading. For more information on<br />

mail protocols, please refer to the Internet Mail Consortium Web site at<br />

www.imc.org.<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 325


This soft copy for use by <strong>IBM</strong> employees only.<br />

The protocol server supports the complete set of POP3 commands, including<br />

APOP, the POP3 secure authentication command. APOP uses a<br />

challenge-response authentication model to guarantee that a password cannot<br />

be hacked from the client/server data stream.<br />

B.8.2.4 Message Store (Mailbox) Server<br />

The mailbox database is where the SMTP server stores messages, and from<br />

where the POP3 and IMAP4 servers retrieve mail. (The mailbox database is<br />

sometimes referred to as the message store.) The message store is based on<br />

the Oracle RDBMS (Version 7.3.2.3). and has been tested with Oracle′s Parallel<br />

server and HACMP. The mail protocol servers communicate with the message<br />

store server through standard SQL*Net.<br />

The structure of the message store enables mailbox storage to be divided into<br />

unique realms. A realm is a message store partition that contains a definable<br />

number of mailboxes that share a common set of attributes. A realm provides a<br />

convenient way to partition users for the purposes of administration and Internet<br />

addressing. Realms make it easy to set up virtual intranets for multiple<br />

customers within a single server environment. This realm functionality is the<br />

key element that uniquely qualifies the <strong>IBM</strong> Messaging Solution for ISPs to meet<br />

the needs of ISPs who are trying to outsource messaging from small- to<br />

medium-sized companies. Each realm has:<br />

• Web Browser Administration - After the initial setup, the administration of the<br />

realm can be given to the customer. Realm administrators can use an HTML<br />

browser to add, delete or modify user names and passwords and to set<br />

mailbox quotas through a Web page interface, allowing end users to<br />

maintain administrative control.<br />

• Realm & Mailbox Quotas - Each realm can be assigned quotas for numbers<br />

of mailboxes and overall disk space. Each mailbox within a realm can also<br />

be assigned a disk space and message quota. If a definable threshold is<br />

reached for any of these quotas (some percentage of the quota), a<br />

customizable message will automatically be sent to the appropriate realm<br />

administrator or mailbox owner, warning them to read/delete their mail.<br />

• Unique User IDs - User names are guaranteed to be unique within each<br />

realm. For example, there can be more than one Joe Smith at multiple<br />

companies using an ISP′s service, as long as they are in separate realms.<br />

• Internet vanity domains - The <strong>IBM</strong> Messaging Solution for ISPs allows the<br />

assignment vanity domains to end user realms. This allows the ISP to set up<br />

client domains with names like MalvernHardware.com, instead of<br />

MalvernHardware.bigISP.net. Domain names still need to be registered<br />

through the IANA.<br />

• Customizable realm messages - The realm administrator can customize all of<br />

the messages associated with a realm, such as the welcome message and<br />

quota warning.<br />

• Mass mailings - Messages can be sent to large groups of subscribers or<br />

entire communities of users, and only one copy of a message is stored,<br />

regardless of the number of recipients.<br />

The message store is designed to use machine resources efficiently.<br />

Benchmark tests and production experience indicate a single message store<br />

server can easily support more than 1 million subscribers and 3000 simultaneous<br />

POP3 sessions.<br />

326 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

The mailboxes themselves also have special attributes. For example, mailboxes<br />

can have unlimited aliases of up to 100 characters each. The system can also<br />

track the age of mail in mailboxes and automatically delete messages that<br />

exceed a defined holding period.<br />

In addition to the features designed for the corporate market, the <strong>IBM</strong> Messaging<br />

Solution for ISPs also supports consumer-oriented functionality. For example,<br />

the server supports household accounts for families. From the ISP point of view,<br />

household accounts are a way to bundle together multiple mailboxes for a single<br />

point of billing and administration.<br />

B.8.2.5 Operations Management<br />

The <strong>IBM</strong> Messaging Solution for ISPs has extensive system monitoring and<br />

management capabilities that can be accessed through management programs<br />

which utilize the Internet-standard Simple Network Management Protocol<br />

(SNMP).<br />

One of the key design considerations for the <strong>IBM</strong> Messaging Solution for ISPs<br />

was to have the system integrate smoothly with an ISP′s existing operational<br />

infrastructure. This design requirement was implemented using SNMP and Mail<br />

and Directory Management (MADMAN) Management Information Base (MIB).<br />

This implementation covers operational statistics and system status related to<br />

the application and the message transfer agent (RFC 1565 and 1566).<br />

Since the <strong>IBM</strong> Messaging Solution for ISPs is instrumented with SNMP, existing<br />

network management applications can be used to monitor exception notifications<br />

(SNMP traps) generated by the server. The system includes the following<br />

SNMP-based instrumentation that can be used to collect data that is useful for<br />

measuring capacity planning, service level compliance, and monitoring message<br />

processing:<br />

• Total number of simultaneous sessions<br />

• Average response time per session<br />

• Queue size<br />

• Total number of messages received and sent per operating period<br />

• Total number of bytes received and sent per operating period<br />

This management methodology significantly reduces the effort required to<br />

monitor the system, as opposed to some competitive systems, whose proprietary<br />

management schemes require the installation of additional monitors in the<br />

operations center. This level of integrated management also makes it easier to<br />

handle larger amounts of data with existing staff levels, further mitigating<br />

operational costs. Most of the configuration and management functions of the<br />

system can also be accessed via browser-based interfaces.<br />

Message tracking is one of the most labor-intensive tasks for any e-mail<br />

administrator. The <strong>IBM</strong> Messaging Solution for ISPs includes message tracking<br />

capabilities that help administrators identify whether or not a message has been<br />

delivered, whether it is sitting in a queue, and how long it took to process<br />

through the SMTP server. The message tracking system has been specifically<br />

designed to allow unsophisticated users (such as help desk personnel) to track<br />

mail status.<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 327


B.8.3 Hardware<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

The <strong>IBM</strong> Messaging Solution for ISPs is already integrated with the <strong>IBM</strong><br />

Solutions for ISPs Subscriber Management system, and <strong>IBM</strong> services personnel<br />

can help you integrate it with existing accounting, billing and subscriber<br />

management systems.<br />

B.8.2.6 LDAP-Compliant Directory, X.500 Directory Support<br />

The <strong>IBM</strong> Messaging Solution for ISPs comes with an integrated user directory<br />

which can be accessed using the Lightweight Directory Access Protocol (LDAP).<br />

This enables directory queries from standard desktop clients such as Netscape<br />

Navigator, as well as remote user administration. The directory can be<br />

administered through an API, forms, and/or directory-enabled applications.<br />

For ISPs that have already invested in implementing an X.500 directory, or are<br />

interested in doing so, the user directory can be replicated to an X.500 directory.<br />

If the customer does not already have an X.500 directory, they can purchase one<br />

from Soft-Switch which supports DAP, DSP, DISP, authentication, and access<br />

control lists.<br />

B.8.2.7 Software Scalability<br />

The software components contained within the <strong>IBM</strong> Messaging Solution for ISPs<br />

facilitate both horizontal and vertical scalability for the entire solution. The<br />

product has been specifically designed to take advantage of RAM, processors<br />

(including SMP), and hard disk arrays to offer near-linear vertical scalability. For<br />

horizontal scalability, the protocol servers, message stores and directories can<br />

all be arrayed across multiple machines yet still function as a single, coherent<br />

unit. As an ISP′s customer community grows, additional protocol servers and<br />

message store servers can be added as needed, while the service maintains a<br />

constantly available presence on the Internet. By integrating key IP and<br />

application routing technology, such as <strong>IBM</strong>′s Network Dispatcher, multiple<br />

servers for both scalability and redundancy can be effectively deployed, offering<br />

scalability far beyond any other product offered in today′s market.<br />

The <strong>IBM</strong> Messaging Solution for ISPs runs on the RS/6000 platform. The <strong>IBM</strong><br />

AIX OS (Version 4.1.4) is also required. The following table details the hardware<br />

in a production network that supports 200,000 mailboxes and 750 concurrent<br />

SQL*Net connections to the message store′s Oracle Server.<br />

Table 39. Low-Scale Production Network Hardware<br />

Server Machine Network RAM Disk<br />

Oracle Server 2-Way R40 10 Mb Ethernet 512 MB 75GB DASD<br />

Protocol Servers (Inbound) 3 Peripheral<br />

single F30s<br />

SMTP Server (Outbound) Peripheral single<br />

F30<br />

HTTP and STAMP Server Peripheral single<br />

F30<br />

10/100 Mb<br />

Ethernet<br />

10/100 Mb<br />

Ethernet<br />

10/100 Mb<br />

Ethernet<br />

256 MB 8GB<br />

256 MB 8GB<br />

256 MB 8GB<br />

Mail Platform Lotus Mail Client, Eudora Pro, Microsoft Exchange and Internet<br />

Explorer, Netscape Navigator and Communicator, and any other<br />

Internet standards-compliant mail system<br />

The following table details the estimated hardware to support 1,000,000<br />

mailboxes and 2,000 concurrent SQL*Net connections to the Oracle Server.<br />

328 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Table 40. High-Scale Production Network Hardware<br />

Server Machine Network RAM Disk<br />

Oracle Server 4 Way 200 MHz<br />

PPC 604e R50<br />

Protocol Servers (Inbound) 3 Peripheral 2<br />

way 200 MHz<br />

604e J50s<br />

SMTP Server (Outbound) Peripheral single<br />

F30<br />

HTTP and STAMP Server Peripheral single<br />

F30<br />

B.8.4 Services<br />

10 Mb Ethernet 2GB Six 300 MB<br />

7137s in RAID 5<br />

DASD<br />

10/100 Mb<br />

Ethernet<br />

10/100 Mb<br />

Ethernet<br />

10/100 Mb<br />

Ethernet<br />

256 MB 16 GB<br />

256 MB 16 GB<br />

256 MB 8GB<br />

This estimate is based on preliminary sizing which will be verified in benchmark<br />

tests. The actual systems will vary in deployment depending on a customer′s<br />

risk tolerance and desired level of performance. In most production<br />

environments, Soft-Switch will strongly recommend clustering all of the servers<br />

with at least three machines where the server utilization will be below 33%.<br />

This strategy will mitigate risk by enabling automatic failovers and enabling<br />

regular maintenance schedules without causing service outages.<br />

B.8.3.1 Hardware Scalability<br />

The <strong>IBM</strong> Messaging Solution for ISPs, as an application on the RS/6000 platform,<br />

can be used to fully exploit the power of the RS/6000 product line, including<br />

single processor and multiprocessor systems, as well as the SP complex, which<br />

enables clustering of RS/6000 for manageable hardware scalability for very large<br />

deployments. This, in conjunction with the implementation of <strong>IBM</strong>′s High<br />

Availability Clustering Management Protocol, enables unmatched scalability and<br />

reliability to meet the demands of today′s ISP customers. Also, with HA-GO,<br />

service providers can build and deploy a thoroughly comprehensive remote site<br />

disaster recovery architecture, should their business plan demand such a<br />

capability.<br />

B.8.3.2 High Availability<br />

The Oracle database (which is the only single point of failure in the system) can<br />

be deployed in a highly available manner, including the integration between<br />

HACMP and Oracle′s parallel server code. The architecture of the system<br />

enables multiple levels of the POP3 and SMTP software to be run in parallel<br />

against the database. This allows new levels of software to be tested in parallel<br />

with production level components for staging of an upgrade migration.<br />

<strong>IBM</strong> and Soft-Switch offer a comprehensive program of services and training<br />

including system installation and configuration, maintenance services, growth<br />

consulting and disaster recovery.<br />

Soft-Switch installation specialists will provide whatever consultancy,<br />

troubleshooting and hands-on support is required to install the <strong>IBM</strong> Messaging<br />

Solution for ISPs. The installation process consists of:<br />

• Initial installation<br />

• Configuration<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 329


This soft copy for use by <strong>IBM</strong> employees only.<br />

• Adjustment to meet agreed-upon customer requirements<br />

• Running load simulation tools for capacity planning<br />

• Functional testing<br />

• Production implementation<br />

B.8.5 Summary and Conclusion<br />

B.9 Lotus GO Server<br />

Soft-Switch can supply tools and consulting for smooth migration from an ISP′s<br />

or end user′s existing system, including the conversion of user lists and<br />

multiprotocol message switching between legacy systems and the <strong>IBM</strong><br />

Messaging Solution for ISPs.<br />

<strong>IBM</strong>′s Messaging Solution for ISPs is a solution that meets the stringent<br />

requirements of today′s Telcos, VANs and ISPs for a messaging solution that is<br />

flexible, scalable, and extensible. It is based on technology that has been<br />

proven in a large service provider environment and takes advantage of the<br />

scalable, high available RS/6000 product line. Packaged with comprehensive<br />

services that only <strong>IBM</strong> can provide, this complete solution is unmatched in<br />

today′s dynamic market.<br />

The <strong>IBM</strong> Messaging Solution for ISPs is only one component of <strong>IBM</strong>′s broad set<br />

of ISP solutions described throughout this document. As with the other<br />

components, the breadth and depth of the features and functions represents the<br />

leveraged intellectual capital and applied technologies of many organizations<br />

across <strong>IBM</strong>, all brought to bear as a solution for today′s service providers—a<br />

solution for success.<br />

The Lotus GoWeb Server is a complete Web server product with advanced<br />

security and development features. With the Lotus GoWebserver ISP′s have<br />

everything they need to quickly and easily establish a Web presence, and get<br />

started on the road to working the Web for business. With Java on the server<br />

side an ISP can build powerful and portable Web applications. The Web server<br />

provides a JDK V1.1 Java development environment based upon Sun<br />

Microsystems, Inc. standards for Java Servlets (server-side applications), Java<br />

Beans, and JDBC for database access.<br />

Features Overview<br />

• Acts as a repository for home pages created with HTML.<br />

• Answers requests from a Web browser (client) using HTTP to transfer<br />

documents.<br />

• Provides proxy server support, allowing a Web browser to access remote<br />

servers not directly accessible to it.<br />

• Supports proxy caching by temporarily storing files and then quickly<br />

responding to the next request for the files delivering fast HTML page<br />

performance to browser users.<br />

• Provides language neutral server application support which is consistent<br />

across the full spectrum of supported platforms, for both Common Gateway<br />

Interface (CGI) applications and server extension applications.<br />

330 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

• Allows users to write Web server extensions that customize the processing<br />

of client requests, to include Java servlet support. Lets an ISP easily port<br />

their existing NSAPI (Netscape API) programs to run on the Web server<br />

without any loss of function.<br />

• Allows server applications to dynamically insert information into an HTML<br />

document that the server sends to a client.<br />

• Efficiently maintains multiple Web sites on a single server with multiple IP<br />

address support.<br />

• Delivers enhanced logging and reporting, plus error message customization.<br />

• Includes a utility to generate X.509 Security Certificates for use within an<br />

enterprise or between business partners.<br />

Serving up static content from a file system the Lotus Go Server can deliver 150<br />

pages per second with 3000 active users on a 39H class node; about 160 pages<br />

per second for a 4-way H10 and about 900 per second for a 4-way F50. If the<br />

enterprise server is serving up the content via port 443 (that is, SSL encryption),<br />

then these numbers should be halved. But the biggest hit to performance is the<br />

execution of applications in the server to pull data from a back-end database,<br />

HTML the data, and send it out to the clients. Under these dynamic content<br />

distribution scenarios, a 39H class node can do five pages per second; six for an<br />

H10, and 30 for a 4-way F50.<br />

Therefore, the most important questions to understand when deploying the<br />

server piece of the solution is to understand the type of work being<br />

accomplished with the server.<br />

B.9.1 HACMP and Network Dispatcher<br />

If the Web server piece of the solution is of critical importance then HACMP<br />

needs to be deployed and we need to assign a backup server to the<br />

configuration. Further, if the backup will be there, then it makes sense to<br />

configure the backup to earn its keep by handling requests distributed to it by a<br />

front-end ND which is collocated with the primary Web server.<br />

B.9.2 Scalability and Network Dispatcher<br />

Network Dispatcher only makes sense in the case where more than one<br />

hardware box will be applied to a similar service. This may happen for all<br />

services envisioned since it may require a backup server to be called into action<br />

in the case of primary server outage. But it may also be necessary to have<br />

multiples of similarly configured boxes to address the performance requirements<br />

of the solution. In this case Network Dispatcher is also ideally suited to allow<br />

this scalability and should be configured into the solution where the performance<br />

requirements dictate aggregating the performance of each separate AIX box in<br />

the solution.<br />

In the case of the SMP boxes, scalability can also be achieved by increasing the<br />

number of processor cards. But, the cost of additional processor cards is very<br />

low so it probably makes more sense to order a server with a max processor<br />

configured solution (for example, the price for a 1-way F50 is 29K and only 50K<br />

for a 4-way F50). But if this price differential is significant from a customer<br />

perspective, then configure for fewer processors and add additional processor<br />

cards as the actual workload indicates it is necessary.<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 331


B.9.3 Installation<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

The Web server with Network Dispatcher and HACMP can be installed in the<br />

plant prior to shipping to the customer location. In order to configure this<br />

software to meet the customers needs a detailed communication of network<br />

interfaces and addresses needs to be communicated and an expert in the plant<br />

will have to be assigned to accomplish the desired effect.<br />

B.9.4 Hardware and Software Requirements<br />

The hardware and software requirements are a RISC System/6000 or <strong>IBM</strong> Power<br />

Series Family with AIX:<br />

• Version 4.1.3 or later.<br />

• Approximately 8 MB of free disk space to install the server, which includes<br />

the base file sets, security file sets, and message catalog. An additional 4<br />

MB of free disk space is required to install the DB2 and CICS Gateway<br />

features.<br />

• A minimum of 32 MB of RAM; recommended RAM is 64 MB.<br />

• A mouse, trackball, TrackPoint, or pen. Although all functions can be<br />

performed with the keyboard, a pointing device is recommended.<br />

• Any communication hardware adapter supported by the TCP/IP protocol<br />

stack to make network connections.<br />

• AIX Version 4.1.3 or later.<br />

• If the server handles a large number of incoming connections, request APAR<br />

IX52752 for AIX Version 4.1.3. The fix for this APAR increases from 10 to 100<br />

the listen() backlog maximum limit that is set by AIX.<br />

For the DB2 Gateway:<br />

• DB2/6000 or access to a DB2 server through the client<br />

• Application Enabler (CAE), DataJoiner, or the Distributed Database<br />

Connection Services (DDCS) features of DB2<br />

• 2.5 MB of free disk space in the /usr/lpp partition<br />

• 0.5 MB of free disk space in the root directory<br />

• For the CICS Gateway:<br />

− CICS/6000 Version 2.1 or CICS/6000 Client 2.1<br />

− 1 MB of free disk space in the /usr/lpp partition<br />

B.10 Lotus Domino RS/6000 POWERsolution<br />

Collaboration, or groupware, includes applications that allow teams to really<br />

work together. Applications in this space include electronic mail and messaging,<br />

project management, distance learning, intranet sites that disseminate critical<br />

information to team members, online human resource applications, sales force<br />

automation tools, concurrent product development enablers, and<br />

intranets/extranets that link internal teams with vendors, suppliers and partners<br />

to share information and streamline processes.<br />

Lotus Domino Server and Lotus Notes Workstation is a client/server environment<br />

that allows users (or clients) to communicate securely over a local area network<br />

332 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

or telecommunications link, and create and/or access documents residing on a<br />

shared computer (or server). With Lotus Domino Server and Lotus Notes<br />

Workstation, people can work together regardless of their software or hardware<br />

platform or technical, organizational, or geographical boundaries.<br />

Lotus Notes Workstation combines an application development environment, a<br />

document database and a sophisticated messaging system, giving you the power<br />

to create custom applications for improving the quality of everyday business<br />

processes in areas such as product development, customer service, sales and<br />

account management. At its most basic level, Lotus Notes Workstation is a<br />

document database, serving as a repository for both textual and other<br />

information, for example, images, presentations, spreadsheets.<br />

Lotus Domino Server and Lotus Notes Workstation provide the ability to<br />

distribute this information throughout an enterprise via replication, yet only those<br />

who need to see the information have access to it. In short, the intent is to<br />

improve communication, coordination and collaboration across any enterprise.<br />

Two primary components compose this solution:<br />

Domino Server: Provides services to Notes Workstation users and other<br />

Domino servers, including storage and replication of shared databases and<br />

mail routing. The Lotus Domino Server can run on PCs under OS/2 Windows<br />

NT. It can also run as a NetWare NLM, or under UNIX systems such as <strong>IBM</strong><br />

AIX, HP-UX and Sun Solaris. Note that only the Transmission Control<br />

Protocol/Internet Protocol (TCP/IP) and Internetwork Packet<br />

eXchange/Sequenced Packet eXchange (IPX/SPX) network protocols are<br />

supported for Lotus Domino Server Release 4.5 running on AIX.<br />

Notes Workstation: Communicates with one or more Domino servers,<br />

providing the interface that allows a Notes user to access shared databases<br />

and to read and send mail. The Lotus Notes Workstation can run under<br />

OS/2, Windows 3.1, Windows 95, Apple′s System 7 and on UNIX graphical<br />

workstations such as Xstations.<br />

Shared databases exist on Domino servers. Users place icons representing<br />

individual databases (for example the mail file, bulletin boards, documentation<br />

databases) on their workstations in their individual workspaces. By selecting an<br />

icon, a user can open a database to perform such actions as accessing an<br />

existing document or creating a new document. Users also can maintain local<br />

(non-shared) databases and replicate these databases so that users always have<br />

access to the latest version of a document. Replication is the process of<br />

synchronizing multiple copies of a database so the information is the same on<br />

multiple servers.<br />

B.10.1 Packaging and Installation<br />

Lotus Domino is available as an Internet POWERSolution or as a separate<br />

software product. <strong>IBM</strong>′s family of Internet POWERsolutions contain ready-to-run<br />

packages including choice of Internet software to establish your presence and<br />

conduct business on the World Wide Web or benefit from Internet technology or<br />

enterprise-wide intranet. The RS/6000 Internet POWERSolution with Lotus<br />

Domino includes the following items:<br />

RS/6000 Server<br />

• AIX Version 4.2 including POP3 and IMAP4 mail server protocols<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 333


This soft copy for use by <strong>IBM</strong> employees only.<br />

• Lotus Domino 4.5 Server and Lotus Notes Desktop Client<br />

• RS/6000 Welcome Center, Internet Edition<br />

• <strong>IBM</strong>′s implementation of Sun′s Java programming environment<br />

• Netscape Navigator<br />

• Adobe Acrobat Reader<br />

• Get Connected Guide<br />

• RS/6000 Web Server Software Sampler CD<br />

If you are going to install Lotus Domino on AIX yourself, refer to the installation<br />

instructions available in the Lotus Domino on the RS/6000 Welcome Guide<br />

(packaged with your Lotus Domino for AIX CD-ROM) or the <strong>IBM</strong> redbook, Lotus<br />

Domino Server Release 4.5 on AIX Systems: Installation, Customization, and<br />

Administration (SG24-4694-01).<br />

The Domino POWERsolution functionality is enhanced via two additional products<br />

available on the RS/6000 Web Servers Software Sampler CD: Business in a Box ,<br />

a suite of 20 integrated business applications developed by Emerging<br />

Technology Solutions, Inc. integrating six primary company functions and backup<br />

agent for Lotus Domino, by Cheyenne Software, provides online data protection<br />

for Lotus Domino databases.<br />

The RS/6000 Lotus Domino POWERsolution enables:<br />

• Secure, interactive application development and secure, easy access to<br />

business applications and processes for employees, suppliers, and<br />

customers<br />

• Standards-based implementation of Internet business solutions<br />

• Integrated productivity support including e-mail, workflow, calendar and<br />

scheduling, database and transaction system support, and collaboration<br />

• Development and management of a company′s Internet presence<br />

Simplified ordering of preconfigured, pretested and preinstalled solutions on a<br />

range of RS/6000 systems<br />

Lotus Domino can transform intranets from an information delivery mechanism<br />

into vehicles for conducting business. Companies can host team discussions<br />

about projects and involve customers in these discussions enabling<br />

customer-driven decision making; customers can order products online or be<br />

provided with self-service. Lotus Domino provides the function needed to<br />

support a rich collaboration base and extend this function to the Internet<br />

including:<br />

• A powerful object store to contain data and applications<br />

• A directory to manage people and resources<br />

• Agent development and support for automated processes<br />

• Calendar and scheduling plus Workflow increase resource utilization and<br />

people productivity<br />

• Mobile support for traveling users<br />

• A rich set of services to build secure, interactive applications for doing<br />

business on the Internet or intranet<br />

334 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

• Messaging system that provides scalability and reliability over a range<br />

network protocols<br />

• Integrated application development to develop custom business applications<br />

using a choice of development tools<br />

• Integration with RDBMSs and transaction systems<br />

• Flexible security that controls access to information and function<br />

• Support for replication technology for local, remote and mobile users<br />

• Support for SNMP management tools<br />

• Integrated site builder and management tools<br />

B.10.2 Lotus Domino on the RS/6000 Reference Configurations<br />

These are Lotus Domino on the RS/600 reference configurations:<br />

2-way J40 Reference Configurations Feature Description<br />

7013-J40 RISC SYSTEM 6000<br />

2412 ENHANCED SCSI-2 DIFF F/W ADAPT<br />

2441 CBL SCSI SHORT INT DEVICES<br />

2934 ASYNCH TERM/PRT CABLE EIA-232<br />

2972 AUTO TR LANSTREAMER 32 MC ADP<br />

3053 2.2 GB SCSI-2 DISK DRIVE (x5)<br />

3094 2.2 GB F/W DIFF MODULE SEL (x2)<br />

4148 512 MB MEM SELECT<br />

5005 SOFTWARE PRELOAD OPTION<br />

9051 DUAL POWERPC 604 112MHZ PR CAR<br />

9212 BASE ENHAN SCSI-2 DIFF F/W ADAP<br />

9221 3.5 IN 1.44 MB DISKETTE DR<br />

9300 LANGUAGE GROUP,U.S.ENGLISH<br />

9441 BASE SCSI CBL-INT DEVICES<br />

9607 8X SPEED TRAY LOADING CD-ROM<br />

9800 POWER CORD SPECIFY US CANADA<br />

4-way J40 Reference Configuration Feature Description<br />

013-J40 RISC SYSTEM 6000<br />

2412 ENHANCED SCSI-2 DIFF F/W ADAPT<br />

2441 CBL SCSI SHORT INT DEVICES<br />

2934 ASYNCH TERM/PRT CABLE EIA-232<br />

2972 AUTO TR LANSTREAMER 32 MC ADP<br />

3053 2.2 GB SCSI-2 DISK DRIVE (x5)<br />

3094 2.2 GB F/W DIFF MODULE SEL (x2)<br />

4148 512 MB MEM SELECT<br />

4158 512 MB CARD<br />

4301 DUAL POWERPC 604 112MHZ PROC<br />

5005 SOFTWARE PRELOAD OPTION<br />

9051 DUAL POWERPC 604 112MHZ PR CAR<br />

9212 BASE ENHAN SCSI-2 DIFF F/W ADAP<br />

9221 3.5 IN 1.44 MB DISKETTE DR<br />

9300 LANGUAGE GROUP,U.S.ENGLISH<br />

9441 BASE SCSI CBL-INT DEVICES<br />

9607 8X SPEED TRAY LOADING CD-ROM<br />

F50 REFERENCE CONFIGURATION<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 335


This soft copy for use by <strong>IBM</strong> employees only.<br />

F50, 2-WAY, 384 MB MEMORY, 6 4.5 GB DISKS Feature Description<br />

7025-F50 RS/6000 DESKSIDE SERVER SMP<br />

2446 SCSI-2 16-BIT CBL SPT 6-PK #1<br />

2901 4.5 GB ULTRA-SCSI 16-BIT HOT SW (x5)<br />

2934 ASYNCH TERM/PRT CABLE EIA-232<br />

2979 PCI AUTO LANSTREAM TOKEN-RING<br />

4106 256 MB(2X128MB) DIMMS 200PIN 1<br />

4110 256 MB(2X128MB) DIMMS 200PIN 10<br />

4303 POWERPC 604E 166MHZ 2-WAY PROC<br />

5005 AIX OPERATING SYSTEM PREINSTALLED<br />

6206 <strong>IBM</strong> PCI SIN-END ULTRA SCSI AD<br />

9300 LANGUAGE GROUP SPECIFY US ENG<br />

9394 BASE 4.5 GB F/W ULTRA SCSI DASD<br />

9800 PWR CORD SPEC US/CAN 125V,15A<br />

(THE FOLLOWING FEATURES ARE PART OF THE F50 BASE SYSTEM SO<br />

THEY DO NOT APPEAR IN THE CONFIGURATION REPORT.)<br />

8X CD-ROM<br />

3.5 INCH 1.44 MB DRIVE<br />

SCSI 6-PACK 1 KIT (IF NOT SELECTED OUT)<br />

UNPOPULATED MEMORY CARD -HOLDS EIGHT DIMM PAIRS<br />

SERVICE PROCESSOR<br />

TWO INTEGRATED SCSI-2 F/W ADAPTERS<br />

INTEGRATED ETHERNET ADAPTER<br />

B.10.3 Lotus Domino on the RS/6000 in the Enterprise<br />

B.10.4 HACMP<br />

Both Lotus Domino Server and Notes Workstation are functionally<br />

platform-independent. That is, they will look the same to the end user and<br />

perform most of the same functions regardless of platform. However, clearly<br />

there are differences in the underlying operating systems′ platforms<br />

B.10.4.1 Planning Domino Servers for High Availability<br />

The following information is from the Planning, Installing, and Configuring the<br />

Lotus Domino Server on the RS/6000 SP (<strong>IBM</strong> Poughkeepsie - RS/6000 SP<br />

Parallel Subsystem Integration Team Version 1.0 - January 28, 1997).<br />

HACMP can be configured (through use of directories on external disks) in up to<br />

eight node SP clusters or across SMP machines, where a designated node (or<br />

SMP server) will detect and restart a Domino server on another node (or SMP<br />

server), either a hot spare or active node or server. This process is called<br />

failover. HACMP can be used with any of the mail routing, mail, replication, and<br />

application servers in your configuration.<br />

In the Domino Server Powered by Notes Release 4.5, Domino Advanced Services<br />

(a separate product for Domino) provides event driven replication of any<br />

selected database, between all nodes in a configured (up to six nodes) cluster or<br />

between SMP machines. Should a server of one of the database replicas fail,<br />

Domino Advanced Services will failover the user to a server of another replica.<br />

This is very similar to an HACMP failover, with the added benefit of user load<br />

balancing of across the cluster.<br />

Since Domino advanced services provides nearly identical function to HACMP, is<br />

there any need for HACMP in your implementation? The answer is up to you, but<br />

336 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

the following recommendations are those that are the easiest to implement and<br />

most cost-effective.<br />

Table 41. Domino Server Recommendations<br />

Domino Server<br />

Function<br />

Preferred Availability<br />

Solution<br />

Mail either HACMP or Domino<br />

Advanced Services<br />

Rationale<br />

Domino Advanced Services will support Mail user<br />

failover if a mail server is unavailable. However,<br />

shared mail is not yet supported and HACMP may be<br />

easier to implement for Mail availability.<br />

Mail Router HACMP ▐*▌ Domino Advanced Services does not fail over mail<br />

routing functions. HACMP can failover/restart and<br />

recover this functionality.<br />

Application Domino Advanced Services Domino Advanced Services will load balance and<br />

failover users to a backup for properly replicated<br />

databases.<br />

Out-of-Domain<br />

Replication<br />

HACMP ▐**▌ Domino Advanced Services does not failover<br />

out-of-domain replication.<br />

Therefore if it is required to keep a dedicated<br />

replication server available, use HACMP.<br />

Internet HACMP▐***▌ Domino http/IP addresses not failed over by Domino<br />

advanced services as with HACMP.<br />

Internotes Domino Advanced Services Internotes Servers are part of the advanced services<br />

functions/servers that can be failed over.<br />

Note:<br />

B.10.5 Network Dispatcher<br />

▐*▌ HACMP may not be required. Your requirements may not demand<br />

that the mail router be available all of the time, since no data will be lost<br />

(if mail spool disks on this server are mirrored). Mail-in-flight will be<br />

delayed until the mail router is repaired.<br />

▐**▌ HACMP may not be required, since you might not demand that a<br />

replication server be available all of the time, since replication can be<br />

completed when the server is repaired, or there might be multiple<br />

replication servers each covering different priority replication which will<br />

cover the replication on a different time scale.<br />

▐***▌ If you are using load balancing (LoadLeveler ISS) across multiple<br />

Domino servers with the same data, HACMP might not be required.<br />

<strong>IBM</strong>′s Interactive Network Dispatcher dynamically and continuously monitors<br />

server workloads balancing traffic across teams of servers located anywhere in<br />

the world. Interactive Network Dispatcher′s functionality is fully supported by<br />

Lotus Domino on AIX. See http://www.ics.raleigh.ibm.com/netdispatch/ for more<br />

information about the Interactive Network Dispatcher product.<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 337


B.10.6 Scalability<br />

B.11 Net.Commerce<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Lotus Domino on RS/6000 servers have been shown to support thousands of<br />

users on single servers in both NotesBench reports (see the following) and in<br />

real-world application deployment. And the Domino server itself specifically<br />

offers increased server capacity through features such as Domino Advanced<br />

Services, symmetric multiprocessor (SMP) support and object storage of<br />

unlimited size.<br />

Net.Commerce is a packaged solution that provides a rich set of tools to enable<br />

a business to host and operate its own E-commerce server. Operating<br />

Net.Commerce on an RS6000 offers a business a very reliable and scalable<br />

solution. Included components of Net.Commerce consist of the following<br />

products or features:<br />

• DB2 with the option of using Open Database Connectivity (ODBC) such as<br />

Oracle 7.3.<br />

• Internet Connection Secure Server (ICSS) 4.2.1 which supports SSL2.<br />

• Application Programming Interfaces (APIs) which allow the customization of<br />

the product and the flexibility of integrating with legacy systems.<br />

• Merchant Server manages the interface to the customer and allows flexibility<br />

with the dynamic page creation capability.<br />

• Net.Data which is an application that gives developers the ability to use Web<br />

macros to access a variety of databases on various platforms.<br />

• Store and site managers provide intuitive interfaces for managing the store<br />

and products, etc.<br />

• Template Designer is a Java-based design tool that includes templates for<br />

creating Web pages for Net.Commerce.<br />

Net.Commerce is now SET-enabled to allow a more secure credit card<br />

transaction than SSL. (The customer will need to purchase Net.Commerce<br />

Payment to utilize SET). Net.Commerce interfaces with Taxware International<br />

(U.S. only) and CyberCash to help automate the purchasing processes.<br />

Depending on your system size, the following items apply:<br />

• 43P 140 256-512 MB of RAM and 4-9 GB of disk<br />

A small size installation of the product. A single 43P-132 has been used to<br />

manage a store, but for performance reasons this would be a better choice.<br />

The amount of disk and memory requirements will vary on size of product<br />

and customer database and possible price points. This is a single machine<br />

configuration where the Web server and the database are on the same<br />

machine. The firewall is assumed to be provided by the Internet Service<br />

Provider (ISP).<br />

• 2 F50s 512-1 GB RAM and 20 GB of disk on database machine.<br />

A medium size installation of the product. A large store is currently using a<br />

G40 for the database, while a medium sized mall is using a J40. The size for<br />

the database server will depend mainly on number of products, customers<br />

and traffic. The reason the F50 is recommended is due to its TPC-C<br />

performance and its scalability. It could be installed as a single CPU server<br />

338 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

and utilizing its internal raid, and then expanded later to a multiple CPU<br />

external disk configuration. Please note that to implement HACMP that<br />

external disk utilization would be required. The F50 was chosen for its price<br />

performance as a Web server and its scalability.<br />

• SP<br />

B.11.1 High Availability<br />

B.11.2 Network Dispatcher<br />

B.11.3 Connectivity<br />

B.11.4 Scalability<br />

A large size installation of the product. This solution has not been<br />

implemented in a single store configuration, but it is being considered and/or<br />

implemented in a mall configuration.<br />

High Availibility is a vital key in the reliability and availability of the RS/6000<br />

hardware solution. The minimum number of RS/6000 machines that could be<br />

utilized in an HACMP environment is three. This would involve a single RS/6000<br />

Web server. This configuration would have two RS/6000s running the database.<br />

The two database machines would share the disk drives so that if the first<br />

machine failed, it would rollover to the second RS/6000 and it would take over<br />

the database drives. Careful consideration should be given to the type and<br />

number of disk drives that are used in the raid or mirroring setup. (Database<br />

performance is affected by disk configuration.) If an additional Web server is<br />

needed due to the large number of users, then Network Dispatcher could be<br />

implemented. Care1ul planning should be done to ensure that the environment<br />

gives the customer the reliability they expect.<br />

This is a software product that allows load balancing across multiple servers.<br />

This allows a customer to scale his or her Web server needs dynamically by<br />

adding additional machines with minimal work. A single machine runs the<br />

dispatcher function that distributes the traffic across the machines defined in its<br />

configuration. This could also be set up with HACMP so that in the event the<br />

Network Dispatcher failed that another RS/6000 could take over the Dispatcher.<br />

The type of connection provided to an RS/6000 setup will depend on the store<br />

type and design. Please analyze the throughput of the adapters used in the<br />

systems to ensure the best performance. Care should be taken to guarantee<br />

that there is ample bandwidth and number of concurrent sessions available for<br />

the users.<br />

The ICSS Web Server used with Network Dispatcher (Network Dispatcher is a<br />

separately purchasable product) that allows the customer to start with a single<br />

RS/6000 and add separate servers to the configuration as needed. The F50 can<br />

start out as a single processor machine and be upgraded to a total of 4<br />

processors. The SP is a scalable solution by nature. Thus allowing the<br />

customer to protect his investment in his original hardware and add the needed<br />

hardware to meet his current operational loads.<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 339


B.11.5 Billing Support<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Net.Commerce provides a large set of APIs that can be used to interface with<br />

other systems to provide billing support. Thus allowing the product to meet the<br />

specific needs of each customer. Net.Commerce also is enabled to support<br />

Net.Commerce Payment ( separate product) which uses SET to provide secure<br />

credit card transactions. Net.Commerce also can be teamed up with CyberCash<br />

to facilitate credit card transactions. To help the merchant handle the complexity<br />

of handling sales tax from state to state etc. Taxware International (U.S. only)<br />

can be integrated into Net.Commerce.<br />

B.12 <strong>IBM</strong> Interactive Network Dispatcher<br />

B.12.1 Challenge<br />

The Interactive Network Dispatcher is an advanced IP packet level<br />

load-balancing and traffic management software solution that′s a integral<br />

component of any customer′s Internet or Web based application deployment. It′s<br />

a member of the eBusiness Enhancer category of the <strong>IBM</strong> Network Computing<br />

Framework announced on April 15, 1997. It originated from advanced research<br />

at <strong>IBM</strong>′s Watson Research Laboratory and was first successfully used in the<br />

“1996 Deep Blue vs Gary Kasparov” chess competition and its use has been<br />

repeated in some of the world′s most highly visible and visited Web sites<br />

including the 1996 Summer Olympics, the US Open, Masters Tournament, the<br />

French Open, and Wimbledon. It will be used in the upcoming 1998 Nagano<br />

Olympics.<br />

The need for application scalability and availability are common across a broad<br />

number of industries and organizational sizes. This product is key for customers<br />

that want to deploy applications across 2 or more servers at a single site or<br />

across multiple sites. It is ideal at the departmental level or across the<br />

enterprise. It plays an essential role in providing an infrastructure that can<br />

address scalability and availability requirements. It is currently being used by a<br />

growing number of organizations in various industries, namely the financial<br />

services and the ISP/telco organizations. They have clearly recognized the<br />

benefits and competitive edge that can be gained by deploying this technology.<br />

As Web site traffic and volume grows, organizations are faced with challenges to<br />

expand capacity, manage and leverage existing resources, continue to improve<br />

user services and deliver new ones. It is therefore critical to build a Web<br />

architecture that can respond to changing and increasing customer demands<br />

while supporting business objectives. This decision is important to small,<br />

medium and large organizations that are deploying Internet and intranet<br />

applications.<br />

Organizations typically add additional Web servers to support the growing Web<br />

site traffic and to enhance availability of their Web sites. The addition of servers<br />

moves the bottleneck of performance to other parts of the system. The<br />

challenge now becomes how to manage the incoming traffic and balance the<br />

requests across the multiple servers. Customers have developed a number of<br />

home-grown solutions or have employed common techniques such as<br />

Round-Robin DNS to address these requirements. Unfortunately these<br />

techniques don′t provide optimal load balancing and availability to support user<br />

demands, are not easily manageable and do not scale well because hot spots<br />

340 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

B.12.2 Description<br />

occur causing server load asymmetry. This often results in site outages and<br />

poor utilization of servers.<br />

The Interactive Network Dispatcher enables multiple Web servers to efficiently<br />

function as a single system to better manage high volumes of information and<br />

electronic transactions over networks. This optimizes Web site performance,<br />

maximizes existing hardware investments, simplifies the administration of Web<br />

servers and improves availability of Web site resources and end user<br />

satisfaction.<br />

The Interactive Network Dispatcher optimally manages incoming IP traffic within<br />

a local Web site or across multiple Web sites. It delivers the performance,<br />

administration and availability advantages by using a number of <strong>IBM</strong> patented<br />

routing algorithms. The Interactive Network Dispatcher provides multiple<br />

configuration options to address any users′ needs. It supports multiple virtual<br />

clusters of Web servers, whereby you can configure multiple domains<br />

(www.ibm.com, www.isp.com, etc.) behind a single IP address. (Multiple IP<br />

addresses can be easily supported.) Within each cluster, multiple ports can be<br />

configured (HTTP, SSL, FTP, etc.). Also multiple servers can be supported within<br />

each port.<br />

Load balancing and traffic management is accomplished by using a weighting<br />

load assignment, which is based on various feedback and monitoring<br />

mechanisms. The number of connections (new and existing) are maintained for<br />

each of the servers. Also, application advisors routinely request the status of<br />

TCP/IP applications (for example, Web HTTP servers) to determine their<br />

availability and load. Acknowledgments are collected from each of the servers<br />

and are used to dynamically adjust the server weights enabling an appropriate<br />

routing decision incoming packets. An additional level of feedback is possible by<br />

installing agent code that resides on the actual server. This provides a more<br />

complete set of system metrics (CPU utilization, I/O, etc.) to enrich the<br />

decision-making capability. This is useful in mixed application, high-energy Web<br />

sites.<br />

Individually or collectively, these various feedback mechanism can be used to<br />

provide a customized load-balancing solution for any customer.<br />

The product runs on the popular operating systems (<strong>IBM</strong>′s AIX, Win NT, Sun<br />

Solaris) machine which receives the incoming packet requests, and can support<br />

any standard TCP/IP-based application server behind it (SunOS, SGI, HPUX,<br />

OS/390, OS/2, MAC, OS/400, SCO, Linux and more). It can manage traffic and<br />

balance load across a single Web site or across multiple sites in a WAN<br />

environment to leverage your enterprise or company-wide server resources.<br />

The design philosophy behind the Interactive Network Dispatcher is to ensure<br />

the product is easy to install and configure, requires no operating system<br />

modifications or physical alterations to a network and is highly scalable to<br />

respond to peak demands. Also the product does not modify incoming IP<br />

packets for data integrity, sees only the incoming requests and not outgoing<br />

server responses for performance, and is totally transparent to clients or users<br />

except for improved service.<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 341


B.12.3 Benefits<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

The Interactive Network Dispatcher has several key benefits for customers:<br />

• Improved user service - Optimized to handle peak loads and eliminate<br />

blackouts. Provides ability to route around scheduled and unscheduled<br />

outages. It makes multiple servers function as one.<br />

• Application support - Supports any TCP/IP application. Allows you to<br />

partition server(s) to support multiple application types (FTP, HTTP, SSL,<br />

Telnet, mail, ...).<br />

• Lower incremental investments - Maximizes hardware by using existing<br />

resources and provides the ability to dynamically and incrementally add<br />

resources as needed. Can support heterogeneous server environments<br />

(different operating systems and server sizes).<br />

• Ease server administration - Single point of control for easy setup,<br />

configuration and maintenance.<br />

• Improved site and data security - IP address of backend servers are not<br />

visible providing additional site security.<br />

B.12.4 Internet Service Provider Applications<br />

Internet Service Providers (ISPs) are a key audience for this type of technology.<br />

Because of the growth of the World Wide Web, ISPs now offer much more than<br />

just Internet access to their customers. Because of their extensive Internet<br />

backbone, ISPs can also provide Web hosting services and additional security<br />

solutions to the customers enabling them to effectively outsource their company<br />

Web site or their corporate intranets. If a customer uses an ISP for both their<br />

Internet access and Web hosting services, the ISP needs to ensure that the<br />

customer can connect to the Internet as well as support large numbers to the<br />

customer′s Web site. Because ISPs provide services targeted to individual<br />

consumers and to businesses they have scalability and availability requirements<br />

for a broad range of applications. They range from Internet access support,<br />

e-mail, news, chat, security, IP traffic management and much more. With<br />

customers spread across large geographic areas, ISPs need to be able to<br />

dynamically leverage resources in LAN and WAN environments. ISPs need to<br />

manage the distribution of IP traffic in these diverse application requirement<br />

environments, and protect and ensure their infrastructure investments are<br />

consistent with the profile of growth and the changing demands placed on them.<br />

ISPs can use the Interactive Network Dispatcher to support those infrastructure<br />

and application requirements.<br />

Here are just a few application areas where significant benefit can be gained by<br />

ISPs:<br />

• News servers<br />

• Scalable mail servers<br />

• Security and firewall support<br />

• Collaborative services (chat, teleconferencing, etc.)<br />

• Streaming Video services<br />

• Web site content hosting<br />

• Event and special promotion management<br />

• Subscriber management<br />

342 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

B.12.5 Summary<br />

B.13 <strong>IBM</strong> Firewall 3.1<br />

• intranet applications (integrated applications - HR, Mfg, Sales, Logistics, etc.<br />

for example, SAP, BAAN, PeopleSoft, etc.)<br />

• SET or payment services and gateways<br />

An ISP can utilize the Interactive Network Dispatcher to build and support<br />

customized Web sites for its customers. It enables the ISP to add additional Web<br />

servers as needed, without changing the IP infrastructure. The ISP is able to<br />

host Web sites that can be continuously accessed since the Interactive Network<br />

Dispatcher provides the capability to automatically route around unexpected<br />

failures or scheduled down-times for system maintenance. With the Interactive<br />

Network Dispatcher, IP traffic can be managed to ensure optimal performance,<br />

partition resources economically and offer support for mixed application<br />

environments.<br />

The next release of the Interactive Network Dispatcher includes features that<br />

enhance the ability of ISPs to deploy advanced applications that provide optimal<br />

performance and availability. They include a hot standby or backup capability<br />

should the primary machine fail. We are also delivering additional mail and<br />

news protocol advisor support to enhance the granularity of the load balancing<br />

for POP3, SMTP, NNTP and Telnet application protocols. Stateless UDP support<br />

is also being provided for applications such as RADIUS authentication servers.<br />

Additional flexibility is being provided to allow customers more flexibility in<br />

configuring and customizing feedback metrics from server environments. Our<br />

focus is to maintain <strong>IBM</strong>′s industry leading-edge advantage in this arena. Our<br />

research, development and marketing teams are tightly coupled and poised to<br />

timely deliver advanced functions to meet the needs of the marketplace.<br />

The Interactive Network Dispatcher′s advanced design benefits have been<br />

recognized as essential components of any Web-based infrastructure, based on<br />

our early experiences, including several key ISP customers. It delivers value in<br />

any environment where customers want application scalability and availability.<br />

Its benefits quickly become visible to end users or clients and business<br />

customers. It offers businesses such as ISPs an opportunity to respond to<br />

changing user demand and growth, the ability to economically manage and<br />

expand their infrastructure and deliver new services to enhance their<br />

competitive position in the dynamic marketplace.<br />

The <strong>IBM</strong> Firewall stops network intruders in their tracks. It combines all three<br />

leading firewall architectures (application proxies, SOCKS circuit gateway, and<br />

filtering architectures) in one flexible, powerful security system. It runs on an<br />

<strong>IBM</strong> RS/6000 workstation with AIX Version 4.1.5 or 4.2.<br />

The firewall node′s major responsibilities are to allow accumulation of evidence<br />

of attempted break-ins to the secure network from the nonsecure side, and an<br />

ability to quickly shut down a break-in path when one is detected. This is<br />

accomplished by defining filter rules to be deployed in the firewall to limit traffic<br />

per the security guidelines of the installation, to log the traffic patterns, and<br />

review those logs and take appropriate action where the logs indicate actual<br />

activity does not conform to the security policy of the site/installation.<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 343


B.13.1 HACMP and Scalability<br />

B.13.2 Connectivity<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

In the case of ISP solution deployment, the firewall will remove the registered<br />

user and account database from open access to the Internet community. And it<br />

will also, in the case of some content hosting and commerce opportunities, be<br />

the bridge to secure/private information from the Web server interface available<br />

on the Internet side.<br />

Security experts agree that the best application of the firewall is to force the HW<br />

box running the firewall code to be stand-alone. That is, do not collocate other<br />

functions/processes on the FW node. This does, of course, add cost to the<br />

equation and one needs to have a discussion about the cost the customer is<br />

willing to incur for what degree of relative security. For this paper, we are<br />

assuming maximum security possible for an environment where we are allowing<br />

some traffic to flow to/from the Internet from/to the intranet. That is, a Bastion<br />

host with the firewall containing a network adapter to allow Internet nodes to<br />

send/receive packets from the firewall node and a separate adapter to allow<br />

intranet nodes to send/receive packets from the firewall nodes. Then routes are<br />

added to the Internet and intranet nodes to cause packets to flow through the<br />

firewall node when a server on one side wants to communicate with a server on<br />

the other side.<br />

As the firewall represents a single point of failure for the ISP solution, it needs to<br />

be made a highly available link. HACMP is supported across a cluster of SNG<br />

firewall nodes. So in the ISP deployment we would have one node act as the<br />

active/primary firewall and another node waiting as a hot-standby. The size<br />

node to be deployed for the firewall application is a function of the number and<br />

size of packets to be processed per second, the type of activity the firewall is<br />

going to perform (for example, just packet filtering or SOCKS and/or proxy work),<br />

and the number/type of network adapters to be configured. A 39h class node<br />

with FDDI adapter can handle 4000 packets/second on the Internet side and<br />

another 4000 packets/second on the intranet side before all its cycles are<br />

consumed. This translates into about 900 short TCP/IP conversations per<br />

second. Unfortunately, increasing processing power alone will not increase that<br />

performance. Although added processing power could allow the firewall node to<br />

handle longer conversations (read bigger packets and/or more complex filtering<br />

like proxy), the adapter itself is gated by about 5000 packets per second. So to<br />

exploit the added horsepower of the 4-way H10 or 4-way F50 such that you could<br />

see 1000 conversations/second with the H10 or 5000 conversations/second with a<br />

4-way F50 then you would need several network adapters to feed the packets<br />

through the server.<br />

The network connectivity concerns and issues were described in the scalability<br />

section where it was pointed out that the network adapter itself can be a limiting<br />

factor in the routing/filtering of packets. 10 Base-T Ethernet is worse than FDDI<br />

and ATM is better than FDDI. There are price differences associated with these<br />

different connectivity options. The FDDI reference above is a good performing<br />

solution. the connectivity chosen will probably be more of a function of the<br />

network already in use by the customer.<br />

344 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

B.13.3 Packaging and Installation<br />

Any deployment of a firewall requires the help of consultants and security<br />

experts to insure the security policy is enforced.<br />

B.13.3.1 Specific SNG Considerations<br />

Without modification, installation of the SNG node on the SP will not be able to<br />

be monitored and controlled from the SP′s CWS. To allow the single point of<br />

management and control to be applied to the SNG nodes, some slight<br />

modifications to the SNG node will be required. In particular, both the<br />

/etc./inittab and /etc./inetd.conf files need to be changed to allow some daemon<br />

processes to survive the SNG install lockdown, and there will need to be<br />

additions to the filter rules on the SNG node to allow packets to flow between the<br />

SNG node and the SP′s control workstation. Those modifications are referenced<br />

in the document titled Consolidation of Internet and Intranet Servers on the SP<br />

and they should be reviewed with the customer′s security team to determine if<br />

these modifications are intolerable from a security perspective. If the customer′s<br />

security team decides the exposure is too great, then the SP may not be a<br />

suitable platform for this customer.<br />

To deliver a secure solution on the SP when Internet and intranet nodes are<br />

located in the same frame, the internal networks of the SP need to be configured<br />

in a certain way. When a switch is part of the configuration, it will need to be<br />

partitioned using the SP partitioning functions to logically break the switch<br />

network into two separate networks. The firewall and intranet nodes should be<br />

placed in one switch partition and the Internet nodes should be placed in a<br />

different switch partition.<br />

The Ethernet segregation is accomplished by physically connecting the Internet<br />

nodes on one Ethernet LAN segment and the intranet nodes on a different<br />

Ethernet LAN segment. Each of these LAN segments would be connected to<br />

separate adapters in the SP control workstation. This goes a long way to<br />

isolating the two networks, but it still leaves a common interface point that needs<br />

to be addressed to yield the secure solution: the control work station.<br />

The control workstation intersection point is best addressed by forcing the<br />

Internet nodes to communicate with the CWS via the firewall. This is<br />

accomplished by adding a route from the CWS to the firewall and from the<br />

Internet nodes to the firewall and adding filter rules to the firewall that will<br />

permit monitor and control packets to flow between the CWS and Internet nodes.<br />

After the routes are set up and the SNG product installed on the firewall node,<br />

then the Ethernet adapter with which the CWS was originally connected to the<br />

Internet nodes should be unconfigured. With this setup all communication<br />

between the CWS and the Internet will be accomplished in a secure manner.<br />

And the intranet nodes will be protected from the Internet nodes via the firewall<br />

installation.<br />

But the aforementioned setup does lead to a small complication. In particular,<br />

the PSSP does not support IP address takeover of the EN0 traffic on an SP node.<br />

Therefore, an SNG node failure could disrupt the administrator′s ability to<br />

monitor and control the Internet nodes when the SNG node is experiencing an<br />

outage. Our sense is that this is the last thing that an administrator would want<br />

to do when his or her primary firewall node is down; but we do have a<br />

recommendation to alleviate this limitation. We recommend that the route from<br />

the Internet to the CWS be through the backup firewall node. Therefore, an<br />

primary SNG node outage is not accompanied by an inability to control all of the<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 345


This soft copy for use by <strong>IBM</strong> employees only.<br />

nodes in the SP cluster. Further, when installing the Internet nodes, the<br />

administrator should configure the firewall node as the boot/install server for the<br />

Internet nodes so that if it were necessary to rebuild a broken Internet node later<br />

in time this could be easily accomplished without a direct connection to the<br />

control workstation.<br />

For a full description of SNG and HACMP integration with SNG please refer to<br />

the following Web site:<br />

http://hawww.ak.munich.ibm.com/HACMP/HA-FW/HA-FW.HTML.<br />

For a full description of integrating Internet and intranet nodes in an SP<br />

configuration please see the white paper Consolidating Internet and Intranet<br />

servers on the SP.<br />

B.13.4 Hardware and Software Requirements<br />

Table 42. Tested Interfaces<br />

The following are the hardware and software requirements for Firewall Version<br />

3.1:<br />

• RISC System/6000 that is supported by the AIX/6000 4.1.5 or 4.2 operating<br />

system, excluding shared memory multiprocessors.<br />

• Any communication hardware interface supported by the TCP/IP protocol<br />

stack.<br />

• For the IPSec remote client, an <strong>IBM</strong> PC or compatible that is supported by<br />

Windows 95.<br />

• At least two network interfaces to the firewall. One network interface<br />

connects to the secure, internal network that the firewall protects. The other<br />

network interface connects to the non-secure, outside network or Internet.<br />

The interfaces that have been tested are:<br />

Interface 1 Interface 2<br />

Token-Ring Token-Ring<br />

Token-Ring Ethernet<br />

While we cannot guarantee that other IP interfaces work, we expect that they<br />

should.<br />

Note:<br />

Token-ring adapters can operate at either 4 or 16 Mb per second.<br />

Ethernet adapters can operate at 10 Mb per second.<br />

These are the disk requirements for AIX (approximately 800 MB to 1000<br />

MB of disk space):<br />

• 7 MB of disk space for the base firewall<br />

346 The Technical Side of Being an Internet Service Provider<br />

• 10 MB for Netscape Navigator (or 20 MB if a tar object of Netscape is<br />

downloaded and unpacked)<br />

• 7 MB for AIX patches (The required AIX patch is:<br />

bos.net.tcp.client.4.2.0.1.bff.)<br />

• 5 MB for SystemView packages (required for SNMP, and packaged<br />

with firewall)


This soft copy for use by <strong>IBM</strong> employees only.<br />

• 1 MB for Report Utilities<br />

• Approximately 50 MB for log files<br />

Depending on how the firewall is configured, the storage needs for logs will vary.<br />

For example, if there is little recorded in the log file, the need be as little as 1<br />

MB of log storage per day. However, if a full socks firewall is implemented, you<br />

could need as much as 30 MB per day for log files. Assuming the need is to<br />

keep seven days worth of logs, this is 7 - 210 MB disk space for logs.<br />

• At least 64 MB of memory.<br />

• Security authentication devices. The <strong>IBM</strong> Firewall directly supports the<br />

following security devices that provide remote authentication of users:<br />

− AssureNet Pathways SecureNet Key Card (Models SNK-010 and SNK-004)<br />

− + Security Dynamics SecurID Card (Model SD200 is the standard card<br />

without buttons; PINPAD is the card with buttons.)<br />

• <strong>IBM</strong> AIX/6000 Version 4.1.5 or 4.2<br />

• For the IPSec remote client, Microsoft Windows 95<br />

• For the IPSEC remote client, Microsoft ISDN Accelerator Pack<br />

• Java-enabled Netscape browser<br />

B.13.4.1 Navigator V3.1<br />

The Netscape Navigator is available for download at:<br />

http://home.netscape.com/eng/mozilla/3.0/relnotes/unix-3.0.HTML.<br />

It is also included in the AIX 4.1.5 Value Pak and the AIX 4.2 Bonus Pak.<br />

B.14 <strong>IBM</strong> Solutions Available to ISPs<br />

B.14.1 Tivoli<br />

The following applications, although not part of the <strong>IBM</strong> Solutions for ISPs family<br />

of solutions, are available to ISPs to help them create a competitive service<br />

environment.<br />

TME 10 products provide centralized control of a service providers applications.<br />

TME 10 solves the challenges of network and applications management, while<br />

still using the management disciplines known from legacy systems.<br />

With TME 10, a service provider can:<br />

• Improve the availability, reliability, security, and integrity of your<br />

applications.<br />

• Get a solid, rapid return on your investment. An in-depth study of 13<br />

companies showed average break even in 116 days.<br />

• Deploy applications with unprecedented levels of security and control.<br />

• Reduce the time required to bring new applications to users.<br />

TME 10 allows for full-cycle applications management, from S/390 data centers to<br />

UNIX and Windows NT servers to laptops to the Internet, all controlled with one<br />

coherent approach.<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 347


B.14.2 VideoCharger<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Using an industry-standard, open object-oriented framework, TME 10 solves the<br />

major problems of applications management, including software deployment,<br />

resource availability, task automation, user administration, and much more.<br />

TME 10 products handle the most compelling management tasks, organized<br />

according to the following four management disciplines:<br />

• Deployment<br />

• Security<br />

• Availability<br />

• Operations and administration<br />

B.14.3 Electronic Yellow Pages<br />

VideoCharger Server for AIX provides a client/server solution for the delivery of<br />

audio and video to Internet- or intranet-connected clients. The video is streamed<br />

across the network, enabling real-time delivery and eliminating the need to<br />

download or save a file before video and audio is played. With the additional<br />

stream support provided in this release of VideoCharger Server for AIX,<br />

scalability is significantly enhanced. For more information on the video charger<br />

products please look into the following Web site:<br />

http://www.rs6000.ibm.com/solutions/videoservers.<br />

This offering can be used to start a base service that can accommodate a much<br />

greater depth of content and services than the Yellow Pages print directory,<br />

while leveraging the familiar print Yellow Pages product. The software for the<br />

base service supports familiar categories/headings and advertising features<br />

such as bold listings and display ads. It also offers the ability to link to product<br />

and service provider Web sites, e-mail, coupons, maps, consumer guides and<br />

reviews, community interest information, catalogs and electronic shopping.<br />

Users interact with a publisher-customized graphical user interface (GUI) to<br />

conduct a search by geographical area, by heading, by keyword and by brand.<br />

The core of the solution is the <strong>IBM</strong> DB2 Multimedia Relational Extenders, which<br />

add the capability to define and implement new complex data types (text, image,<br />

audio, and video). DB2 Extenders allow the solution to deliver listing, brand and<br />

display advertising to the user similar to that which is delivered by the paper<br />

product today. The solution primarily resides on the RS/6000 hardware platform.<br />

The most important services components are:<br />

• Client/server technology supporting all required standard interfaces<br />

(RS/6000, AIX).<br />

• Availability of electronic commerce options for future incorporation into the<br />

online yellow page directory service.<br />

• A highly flexible search engine design supporting retrieval of any<br />

combination of elements (DB2); flexible business model options; choice of<br />

self-owned and -supported directory service or one owned and hosted by<br />

<strong>IBM</strong>. <strong>IBM</strong>′s Internet Yellow Page Solution is a collection of <strong>IBM</strong> software and<br />

hardware products. These off-the-shelf products are integrated with custom<br />

software to create a solution targeted at the needs of the telecommunication<br />

industry. This generic solution can be customized by <strong>IBM</strong> or customers to<br />

meet exact requirements.<br />

348 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

B.14.4 Electronic White Pages<br />

The Electronic White Pages solution provides a way to access the <strong>IBM</strong> ISx<br />

Listing Services Inquiry Program (LSIP) white pages database via the Internet.<br />

Using a standard Web browser, and LSIP type of query can be submitted and<br />

presented to the end user in a simple listing format. Taking advantage of<br />

existing ISx (Directory Assistance) products, this generic solution provides a very<br />

economical means of providing white pages information to end users via the<br />

new electronic medium.<br />

Hardware: RS/6000, end user PC<br />

B.14.5 Other Solutions for ISPs<br />

Software: AIX, Windows or OS/2 for end user PC, Netscape Web browser<br />

Services: Services are likely to include solution customization, meaning<br />

additional chargeable features to meet customer requirements beyond those<br />

provided by the basic solution. As this is a customer installable product,<br />

services for turnkey installation by <strong>IBM</strong> will be available.<br />

The following solutions are available as LPPs or RS/6000 Internet<br />

POWERsolutions. <strong>IBM</strong> RS/6000 Internet POWERsolutions are a comprehensive<br />

family of packages designed specifically to help customers take advantage of the<br />

Internet. Built around <strong>IBM</strong>′s award-winning AIX and RS/6000 technologies, each<br />

package includes a choice of an RS/6000 server and a selection of Internet or<br />

intranet products.<br />

Some POWERsolutions provide preinstalled software on the RS/6000 of choice.<br />

Others are more complex and require a great deal of installation and<br />

customization work. These more complex ones, such as Net.Commerce, are<br />

provided as a reference to facilitate the task of assembling the POWERsolution.<br />

B.14.5.1 Netscape Proxy<br />

An organization can use Netscape Proxy Server to cache frequently requested<br />

information at Internet gateways, departments, and remote offices, providing<br />

users with fast access to information while tracking and controlling access to<br />

network resources.<br />

B.14.5.2 Netscape Mail<br />

Send e-mail with rich, multimedia content across the enterprise and the Internet.<br />

Netscape Mail Server quickly delivers e-mail with embedded sound, graphics,<br />

video files, HTML forms, Java applets, and desktop applications. They<br />

outperform other messaging systems in the speed of message processing,<br />

handling of queues, and power of directory lookups, and they can communicate<br />

with virtually all mail systems and gateways.<br />

B.14.5.3 Netscape News<br />

Netscape News Server makes collaboration and knowledge sharing among<br />

teams easy and effective. A company′s employees can participate in private<br />

virtual meetings that break down barriers of time and distance. Users can<br />

create their own discussion groups to share product development ideas, allow<br />

customers to discuss problems and request information, check the status of<br />

requests and billing information, track and distribute competitive information<br />

from the field, and develop communities of interest around products and<br />

services.<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 349


B.15 Lotus Press Release<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

B.14.5.4 Netscape Merchant<br />

Netscape Merchant System allows businesses to quickly and easily build<br />

full-featured Web-based shopping sites. Netscape Merchant System handles the<br />

nuts and bolts, providing all the features needed to operate a sophisticated<br />

online storefront from front to back, including product information and display<br />

updates, order processing and calculation of shipping and sales tax charges,<br />

secure credit card transaction processing, and secure delivery of completed<br />

orders for fulfillment processing.<br />

B.14.5.5 Netscape Enterprise Server<br />

Netscape Enterprise Sever is a high-performance, secure World Wide Web<br />

server for creating, managing, and intelligently distributing information and<br />

running Internet applications. It is an open platform for creating network-centric<br />

applications using cross-platform tools based on the Java and JavaScript<br />

programming languages.<br />

B.14.5.6 Haystack WebStalker<br />

WebStalker Pro for AIX is an automated software tool that acts as a<br />

“watchdog-in-a-box,” actively patrolling the entire Web site, helping to ensure<br />

the integrity of the server 24 hours a day. Developed by Haystack Labs Inc.,<br />

WebStalker Pro operates in real-time, watching all processes on the entire Web<br />

server, cutting off abusive connections as they happen, and sending immediate<br />

alarms with details of suspicious activities. WebStalker Pro is available as an<br />

additional option for qualified RS/6000 Internet POWERsolutions, which are<br />

prepackaged Internet server systems.<br />

B.14.5.7 Check Point Firewall<br />

The Check Point FireWall-1 enterprise security solution is a comprehensive<br />

application suite that integrates access control, authentication, encryption,<br />

network address translation, content security, auditing, and connection control.<br />

The suite is unified by Check Point′s OPSEC policy management framework,<br />

which provides integration and enterprise management for FireWall-1 and many<br />

third-party network security applications.<br />

Contact: Dawn Geary Lisa Burke<br />

Lois Paul & Partners Lotus Development Corp.<br />

(617) 238-5700 (617) 693-1571<br />

Dawn_Geary@lpp.com Lisa_Burke@lotus.com<br />

Lotus Announces Instant!TEAMROOM<br />

Rentable Collaborative Application<br />

Extends Global Collaboration to Any Size Organization via Web Browsers;<br />

Interliant and NETCOM to Host Initial Rental Availability<br />

NEW YORK, June 17, 1997 -- As part of its initiative to extend Notes and Domino<br />

technology to small and medium sized businesses as well as to extranets, Lotus<br />

Development Corp. today announced the immediate availability of<br />

350 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Instant!TEAMROOM, a rentable application hosted by Internet Service Providers<br />

(ISPs). Instant!TEAMROOM (formerly code-named Domino.Collaboration) allows<br />

workgroups to quickly and easily establish a private workspace outside of any<br />

one corporate firewall on the World Wide Web for collaborating on projects in an<br />

accessible, secure and affordable manner. Designed for teams in and among<br />

companies of all sizes to share ideas and information, store documents and<br />

track team progress and project status, Instant!TEAMROOM brings the power of<br />

collaboration well within the technical and financial reach of any group or<br />

organization.<br />

Instant!TEAMROOM is available now through Interliant and will be available<br />

through NETCOM Online Communications within 30 days. Instant!TEAMROOM<br />

will be offered by additional Internet Service Providers and other Lotus ′Net<br />

Service Provider, Alliance Partners (′NSP, Alliance Partners -- formerly known as<br />

Lotus Notes Public Network providers). The combined reach of these ISPs and<br />

′NSP, Alliance Partners makes Instant!TEAMROOM available to the entire global<br />

Internet community.<br />

Instant!TEAMROOM establishes a new category of application that leverages the<br />

Domino Instant! Host (formerly code-named SPA.Host) platform, enabling ISVs to<br />

develop and ISPs to host a catalog of rentable applications (see “Lotus and<br />

Business Partners Create Standard Platform for Developing and Hosting<br />

Rentable Applications”). Applications for the Domino Instant! platform -- to be<br />

developed by Lotus and its business partners worldwide -- are designed to<br />

provide organizations with easy and convenient access to a wide variety of<br />

solutions for collaborating on the Web.<br />

Both Instant!TEAMROOM and the Domino Instant! Host platform are part of<br />

Lotus′ long-term strategy to extend and leverage the benefits of Lotus Domino<br />

technology by establishing new categories of rentable applications through new<br />

initiatives with Lotus Business Partners, ISPs and value-added resellers.<br />

“Instant!TEAMROOM is all about bringing the benefits of collaboration to any<br />

organization of any size, whether it be an ad hoc team of consultants managing<br />

a fundraising campaign, or a corporate division that needs to do business with<br />

geographically dispersed customers and suppliers,” said Brian Bell, vice<br />

president, Emerging Products Group, Lotus. “The Domino Instant! applications<br />

initiative gives our Business Partners and partner ISPs and ′NSP, Alliance<br />

Partners unprecedented opportunity for new revenue, opening a whole new<br />

market. We look forward to succeeding together in the emerging rentable<br />

applications space.”<br />

“With Instant!TEAMROOM, Lotus continues to be the leading innovator in the<br />

collaborative computing space,” said Eric Arnum, contributing editor, Electronic<br />

Mail and Messaging Systems. “Instant!TEAMROOM is unique in that it breaks<br />

down any existing barrier to entry -- administrative, technical, financial -- to<br />

collaborative computing. The rental applications market has big potential for<br />

software solutions vendors, ISPs and NSPAPs, and end users. With<br />

Instant!TEAMROOM, Lotus is providing groupware for the rest of us, signifying a<br />

winning opportunity for all parties.”<br />

Point, Click and Assemble a Team<br />

A PC with a Web browser supporting file attachments is all that is needed to<br />

create a teamroom. The team leader goes to the Instant!TEAMROOM Web site<br />

(http://www.lotus.com/instant) and selects a service provider from the list<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 351


This soft copy for use by <strong>IBM</strong> employees only.<br />

provided. Following step-by-step instructions, including selecting a teamroom<br />

URL, user name and password, the team leader completes a simple subscription<br />

form using a credit card number for payment. Within seconds, the team leader<br />

is notified that their private teamroom is ready to use. Once inside, the team<br />

leader can begin inviting other members to join. Each new invited member is<br />

automatically e-mailed a secure password along with their user name. As new<br />

documents and responses are created, authors are able to select specific user<br />

and group access rights for each document. The team leader is billed monthly<br />

by the ISP for only as long as the teamroom is active. Once a project is<br />

completed, teamroom contents can be deleted or, for a fee, archived.<br />

Work the Web Anytime from Anywhere -- Easily and Securely<br />

Instant!TEAMROOM is accessible through the Web, 24 hours a day, from<br />

wherever team members are located. Because Instant!TEAMROOM is based on<br />

Lotus′ Domino technology, users can be assured that any communications or<br />

transactions involved are secure.<br />

Louis P. Batson III Architects of Greenville, SC first utilized Instant!TEAMROOM<br />

as an extended intranet site through which the organization collaborates with a<br />

staff architect who works from home.<br />

“In this instance we are using Instant!TEAMROOM as an internal CAD<br />

management tool, allowing us to share drawings and respond to questions,”<br />

explained Clay Gandy, Intern Architect. “But now that we′ve seen how powerful<br />

this process can be, we′re about to start a site with a consulting engineer. By<br />

sharing information with critical members of our extended team, we hope to<br />

capture the design development process, and to see how it serves us as a<br />

history of the project.” Gandy noted that, in addition to being a powerful<br />

resource, Instant!TEAMROOM was “a lot more configurable than I originally<br />

thought. I′ve been able to customize it quite a bit in order to make it work<br />

specifically for our industry.”<br />

Create an Instant!TEAMROOM Now<br />

Today, users can subscribe to Instant!TEAMROOM through Interliant via the<br />

Instant!TEAMROOM Web site (http://www.lotus.com/instant/).<br />

Instant!TEAMROOM will also be available through NETCOM within 30 days.<br />

Additional ISPs and many of the Lotus ′Net Service Provider, Alliance Partners<br />

will soon be offering Instant!TEAMROOM.<br />

“Hosting Instant!TEAMROOM is a natural extension of Interliant′s corporate<br />

strategy of building global communities. It provides our customers with a secure<br />

space to collaborate with business partners, clients and other contacts on the<br />

Web. By offering Instant!TEAMROOM on a rental basis, we are delivering<br />

revolutionary collaborative tools to our customers without imposing long-term<br />

commitments to infrastructure or deployment cycles,” said Jim Lidestri,<br />

President and CEO of Interliant. Mike Kallet, senior vice president of products<br />

and services at NETCOM commented, “With Instant!TEAMROOM, our customers<br />

will benefit from immediate collaborative computing. This partnership with Lotus<br />

enables NETCOM to continue to provide customers with value-added Internet<br />

services for advanced productivity.”<br />

Systems Requirements, Pricing, Availability<br />

352 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Instant!TEAMROOM subscriptions are available through a growing list of Lotus<br />

Business Partner ISPs and ′NSP, Alliance Partners via links from the<br />

Instant!TEAMROOM Web site (www.lotus.com/instant). Subscription rates are<br />

determined by the individual ISPs and ′NSP, Alliance Partners hosting the<br />

service. Instant!TEAMROOM currently supports Netscape Navigator 3.x, and will<br />

support Microsoft Internet Explorer 4.x when it becomes commercially available.<br />

Lotus Development Corporation, founded in 1982, is a subsidiary of <strong>IBM</strong><br />

Corporation. Lotus offers high quality software products and services that reflect<br />

the company′s unique understanding of the new ways in which individuals and<br />

businesses must work together to achieve success. Lotus′ innovative approach<br />

is evident in a new class of applications that allow users to access and<br />

communicate information in ways never before possible, both within and beyond<br />

organizational boundaries. Lotus now markets its products in more than 80<br />

countries worldwide and provides numerous professional consulting, support and<br />

education services through the Lotus Services Group.<br />

###<br />

Lotus and Lotus Notes are registered trademarks, and Domino, Domino Instant!,<br />

Domino Instant! Host, Instant!TEAMROOM, Instant! Host, Lotus ′Net Service<br />

Providers and Alliance Partners are trademarks of Lotus Development<br />

Corporation. All other company names and products are trademarks or<br />

registered trademarks of their respective companies.<br />

EDITOR′S NOTE: All Lotus news releases are available on the Internet, via the<br />

Lotus Development Corp. Home Page at http://www.lotus.com/. The Lotus<br />

Home Page is an easy way to find information about Lotus and its business<br />

partners′ products and services.<br />

A copy of this release and other company information are also available via fax<br />

by dialing 1-800-57-LOTUS within the U.S. and Canada or 201-946-2336 outside<br />

the U.S. and Canada<br />

Contact: Dawn Geary or Rick McLaughlin Lisa Burke<br />

Lois Paul & Partners Lotus Development Corp.<br />

(617) 238-5700 (617) 693-1571<br />

Dawn_Geary@lpp.com Lisa_Burke@lotus.com<br />

Rick_McLaughin@lpp.com<br />

FOR IMMEDIATE RELEASE<br />

PC Expo Booth # 3422 & 3436<br />

Lotus and Business Partners Create Standard Platform<br />

for Developing and Hosting Rentable Applications<br />

Combined Efforts to Fuel Rentable Applications Market; Lotus and Interliant<br />

Team to Develop Domino Instant! Host<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 353


This soft copy for use by <strong>IBM</strong> employees only.<br />

NEW YORK, June 17, 1997 -- Lotus Development Corp. today announced<br />

relationships under which Lotus and its Business Partners will provide<br />

Domino-based enabling tools and platforms to small and medium sized<br />

enterprises, which will facilitate the growth of the emerging rentable applications<br />

industry. Lotus Business Partners - Independent Software Vendors (ISV),<br />

Internet Service Providers (ISP) and other Lotus ′Net Service Providers, Alliance<br />

Partners (′NSP, Alliance Partners) - will be able to develop and provide catalogs<br />

of rentable applications that will allow end users to quickly and easily access<br />

and self-manage collaborative Web-based applications.<br />

As part of these relationships, Lotus and Interliant are jointly developing Domino<br />

Instant! Host, the hosting platform by which Domino-based applications may be<br />

rented through ISPs and ′NSP, Alliance Partners (formerly known as Lotus Notes<br />

Public Network providers), and a new version of the Domino Instant! Host<br />

Software Developer Kit which will allow ISVs to modify existing or develop and<br />

test new Domino-based applications so that they are rentable via the Domino<br />

Instant! Host platform.<br />

In addition, Lotus announced that it has completed work with Changepoint<br />

International Corporation to ensure that Changepoint′s Involv application suite<br />

and the Involv Host platform, which enables ISVs to develop, host and manage<br />

their own end-user self-service applications are compatible with the Domino<br />

Instant! Host application programming interface (API). This provides ISVs<br />

interested in developing and servicing their own collaborative applications today,<br />

for either rental on the Web or for deployment on corporate intranets, with a<br />

level of assurance that those applications will be upwardly compatible to the<br />

Domino Instant! Host platform.<br />

“Together with our Business Partners, we will leverage our combined<br />

experience in delivering collaborative solutions to lead this emerging market.<br />

Lotus, our Business Partners, ISPs and ′NSP, Alliance Partners see the<br />

tremendous value that rentable applications can provide our customers,” said<br />

Steve Brand, director of Hosted Internet Solutions, Lotus′ Emerging Products<br />

Group. “The concept of making Web-based collaborative applications universally<br />

accessible through a rentable model offers tremendous opportunities for ISVs<br />

and service providers. ISVs can reach previously inaccessible businesses and<br />

organizations of all sizes. For ISPs and ′NSP, Alliance Partners rentable<br />

Domino-based applications represent an opportunity to provide their customers<br />

with a new class of collaborative Web applications.”<br />

“Lotus is providing the tools to make rentable applications a reality,” said Eric<br />

Arnum, contributing editor, Electronic Mail and Messaging Systems. “Lotus, its<br />

partners and customers - especially small and medium sized enterprises - will<br />

benefit from rentable applications because they do not require an IS staff to run<br />

them and they reduce the cost of ownership. Service providers will gain a vast<br />

set of vertical, valued-added applications to offer customers. Business Partners<br />

will gain a new market opportunity for their applications, and customers will<br />

have easy access to thousands of applications in an affordable and timely<br />

manner.”<br />

Applications developed for the Domino Instant! Host platform are designed for<br />

use by individuals or organizations who need to collaborate but lack either the<br />

technical expertise, time or financial resources required to set up a Web server<br />

for a single application, or simply need to move quickly on a project. Because<br />

354 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

the applications are rented through ISPs and other ′NSP, Alliance Partners<br />

customers pay for them only as long as they have a need for them.<br />

These agreements are part of an overarching strategy to allow Lotus and its<br />

Business Partners to establish a new category of applications that leverages<br />

Domino to provide rentable applications and further extend Domino to the small<br />

and medium enterprise market. Domino Instant! Host and leading-edge<br />

rentable applications based on this platform are possible through Domino, the<br />

premier collaborative Web applications server.<br />

Interliant and Lotus to Provide Hosting Platform and Developers Kit<br />

Interliant and Lotus are jointly developing Domino Instant! Host and the Domino<br />

Instant! Host Software Developer Kit to help ensure that thousands of existing<br />

and future horizontal and vertical Domino-based applications will be offered by<br />

service providers by allowing ISVs to develop and test rentable Domino-based<br />

applications. The technologies greatly simplify the steps developers and ISPs<br />

would otherwise need to take to make applications available for rent by<br />

eliminating the need for service providers and Web application developers to<br />

customize, respectively, their hosting environments and applications. This will<br />

result in providing Web users of all needs access to catalogs of rentable<br />

business solutions on a “pay as you go” basis.<br />

The development of Domino Instant! Host merges Lotus′ experience with<br />

groupware and Interliant′s expertise in providing support for network-centric<br />

applications to bring a powerful, versatile platform to market. The Domino<br />

Instant! Host platform is designed to be run by service providers and facilitates<br />

the interaction between the platform and the application, including billing,<br />

tracking and maintenance of applications. Applications hosted on the platform<br />

can be initiated from any Web browser supporting file attachments through an<br />

easy, step-by-step process that establishes a billing record, registers authorized<br />

participants and obtains a URL for the site. The applications will also automate<br />

such administrative tasks as reserving space on the service provider′s Web<br />

server, installing the application and managing the disposition of the hosted<br />

content at the end of a project.<br />

The Domino Instant! Host Software Developer Kit includes a development and<br />

runtime environment where ISVs can develop and test their applications, an<br />

architectural overview of the Domino Instant! Host platform and an API<br />

specification that delivers standardized methods for interaction between the<br />

service provider′s hosting environment and the Lotus Business Partner′s<br />

application.<br />

“Lotus has consistently pushed the envelope of collaborative computing. We<br />

welcome the opportunity to work closely with Lotus to develop new technologies<br />

that will enable our ISV partners to develop network-centric applications quickly<br />

and easily,” said Jim Lidestri, president and CEO of Interliant. “We′ve already<br />

received an excellent response from partners eager to deliver rental applications<br />

with Domino Instant! Host and Interliant.”<br />

“By leveraging our service providers′ experience we′ll provide the breadth and<br />

depth of offerings required to drive the rentable applications market,” said Lotus′<br />

Brand. “Interliant brings valuable insight into the way that ISPs will integrate and<br />

ISVs will develop to this platform.”<br />

Platform Compatibility Extends Opportunities for ISVs<br />

Appendix B. <strong>IBM</strong> Solutions for ISPs 355


This soft copy for use by <strong>IBM</strong> employees only.<br />

By developing and freely distributing the Domino Instant! Host APIs via the<br />

Domino Instant! Host Software Developers Kit, Lotus is establishing one standard<br />

for all Domino-based rental applications. As part of this effort, Lotus is working<br />

with Changepoint International Corporation to ensure that applications developed<br />

for Changepoint′s Involv Host (see related Changepoint release) are written to<br />

the same Instant! Host APIs that are supported by the Domino Instant! Host<br />

platform. This enables Business Partners to develop, test and deploy<br />

self-service collaborative applications today while allowing their development<br />

efforts to be leveraged to the Domino Instant! Host platform.<br />

“The Domino Instant! Host platform is setting the standard for rentable or<br />

self-service collaborative applications designed for use over the Web, via a<br />

private intranet infrastructure or extranet,” said Brand. “Working closely with<br />

Changepoint ensures that ISVs have a single standard allowing them to have a<br />

major presence in the rentable applications market today and in the future.”<br />

Availability and Pricing<br />

Version 1.1 of the Domino Instant! Host Software Developer Kit (a.k.a. Domino<br />

SPA Developers Kit) will be available in July and the Domino Instant! Host<br />

platform is scheduled for first availability to ISPs in the third quarter. Pricing for<br />

use of applications will be set individually by the service provider.<br />

The Domino Instant! Host Software Developer Kit is available to all authorized<br />

Lotus Business Partners via Lotus′ Web site (http://www.lotus.com/). Web<br />

developers interested in receiving the Domino Instant! Host Software Developer<br />

Kit should register to become a Lotus Business Partner via Lotus′ Web site or<br />

via the Instant! applications home page (http://www.lotus.com/instant).<br />

Lotus Development Corporation, founded in 1982, is a subsidiary of <strong>IBM</strong><br />

Corporation. Lotus offers high quality software products and services that reflect<br />

the company′s unique understanding of the new ways in which individuals and<br />

businesses must work together to achieve success. Lotus′ innovative approach<br />

is evident in a new class of applications that allow users to access and<br />

communicate information in ways never before possible, both within and beyond<br />

organizational boundaries. Lotus now markets its products in more than 80<br />

countries worldwide and provides numerous professional consulting, support and<br />

education services through the Lotus Services Group.<br />

###<br />

Lotus and Lotus Notes are registered trademarks, and Domino, Domino Instant!,<br />

Domino Instant! Host, Instant!TEAMROOM, Instant! Host, Lotus ′Net Service<br />

Providers and Alliance Partners are trademarks of Lotus Development<br />

Corporation. All other company names and products are trademarks or<br />

registered trademarks of their respective companies.<br />

EDITOR′S NOTE: All Lotus news releases are available on the Internet, via the<br />

Lotus Development Corp. Home Page at http://www.lotus.com/. The Lotus<br />

Home Page is an easy way to find information about Lotus and its business<br />

partners′ products and services.<br />

A copy of this release and other company information are also available via fax<br />

by dialing 1-800-57-LOTUS within the U.S. and Canada or 201-946-2336 outside<br />

the U.S. and Canada.<br />

356 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Appendix C. Special Notices<br />

This publication is intended to help <strong>IBM</strong>ers, business partners and customers to<br />

decide on offering an ISP service. The information in this publication is not<br />

intended as the specification of any programming interfaces that are provided by<br />

any <strong>IBM</strong> product. See the PUBLICATIONS section of the <strong>IBM</strong> Programming<br />

Announcement for each <strong>IBM</strong> product for more information about what<br />

publications are considered to be product documentation.<br />

References in this publication to <strong>IBM</strong> products, programs or services do not<br />

imply that <strong>IBM</strong> intends to make these available in all countries in which <strong>IBM</strong><br />

operates. Any reference to an <strong>IBM</strong> product, program, or service is not intended<br />

to state or imply that only <strong>IBM</strong>′s product, program, or service may be used. Any<br />

functionally equivalent program that does not infringe any of <strong>IBM</strong>′s intellectual<br />

property rights may be used instead of the <strong>IBM</strong> product, program or service.<br />

Information in this book was developed in conjunction with use of the equipment<br />

specified, and is limited in application to those specific hardware and software<br />

products and levels.<br />

<strong>IBM</strong> may have patents or pending patent applications covering subject matter in<br />

this document. The furnishing of this document does not give you any license to<br />

these patents. You can send license inquiries, in writing, to the <strong>IBM</strong> Director of<br />

Licensing, <strong>IBM</strong> Corporation, 500 Columbus Avenue, Thornwood, NY 10594 USA.<br />

Licensees of this program who wish to have information about it for the purpose<br />

of enabling: (i) the exchange of information between independently created<br />

programs and other programs (including this one) and (ii) the mutual use of the<br />

information which has been exchanged, should contact <strong>IBM</strong> Corporation, Dept.<br />

600A, Mail Drop 1329, Somers, NY 10589 USA.<br />

Such information may be available, subject to appropriate terms and conditions,<br />

including in some cases, payment of a fee.<br />

The information contained in this document has not been submitted to any<br />

formal <strong>IBM</strong> test and is distributed AS IS. The use of this information or the<br />

implementation of any of these techniques is a customer responsibility and<br />

depends on the customer′s ability to evaluate and integrate them into the<br />

customer′s operational environment. While each item may have been reviewed<br />

by <strong>IBM</strong> for accuracy in a specific situation, there is no guarantee that the same<br />

or similar results will be obtained elsewhere. Customers attempting to adapt<br />

these techniques to their own environments do so at their own risk.<br />

The following terms are trademarks of the International Business Machines<br />

Corporation in the United States and/or other countries:<br />

AIX AIX/6000<br />

AlphaWorks APPN<br />

AS/400 AT<br />

CICS CICS/6000<br />

Cryptolope Current<br />

DataJoiner DB2<br />

DB2 Extenders Deep Blue<br />

ESCON <strong>IBM</strong><br />

<strong>IBM</strong> Global Network IMS<br />

© Copyright <strong>IBM</strong> Corp. 1997 357


LAN Distance LoadLeveler<br />

Micro Channel MVS/ESA<br />

Net.Data NetFinity<br />

NetView Nways<br />

OS/2 OS/390<br />

OS/400 Parallel Sysplex<br />

Personal Security Power Series<br />

PowerPC 604 PowerPC<br />

RACF RISC System/6000<br />

RS/6000 S/390<br />

SecureWay SP<br />

System/36 SystemView<br />

System/390 ThinkPad<br />

TrackPoint VSE/ESA<br />

WaveRunner WebExplorer<br />

Workplace <strong>IBM</strong>®<br />

The following terms are trademarks of other companies:<br />

C-bus is a trademark of Corollary, Inc.<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Java and HotJava are trademarks of Sun Microsystems, Incorporated.<br />

Microsoft, Windows, Windows NT, and the Windows 95 logo are trademarks<br />

or registered trademarks of Microsoft Corporation.<br />

PC Direct is a trademark of Ziff Communications Company and is used<br />

by <strong>IBM</strong> Corporation under license.<br />

Pentium, MMX, ProShare, LANDesk, and ActionMedia are trademarks or<br />

registered trademarks of Intel Corporation in the U.S. and other<br />

countries.<br />

UNIX is a registered trademark in the United States and other<br />

countries licensed exclusively through X/Open Company Limited.<br />

Other company, product, and service names may be trademarks or<br />

service marks of others.<br />

358 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

Appendix D. Related Publications<br />

The publications listed in this section are considered particularly suitable for a<br />

more detailed discussion of the topics covered in this redbook.<br />

D.1 International Technical Support Organization Publications<br />

For information on ordering these ITSO publications see “How to Get ITSO<br />

<strong>Redbooks</strong>” on page 361.<br />

• <strong>IBM</strong> 8235 Dial-In Access to LANs Server: Concepts and Implementation,<br />

SG24-4816<br />

D.2 <strong>Redbooks</strong> on CD-ROMs<br />

D.3 Other Publications<br />

• <strong>IBM</strong> 2210 Nways Multiprotocol Router Description and Configuration<br />

Scenarios, SG24-4446<br />

• The Basics of IP Network Design, SG24-2580<br />

• <strong>IBM</strong> Frame Relay Guide, GG24-4463<br />

• ATM Technical Overview, SG24-4625<br />

• <strong>IBM</strong> 2210 Nways Multiprotocol Router Description and Configuration<br />

Scenarios, SG24-4446<br />

• Nways 2216 Multiaccess Connector Description and Configuration, SG24-4957<br />

• Building the Infrastructure for the Internet, SG24-4824<br />

• <strong>IBM</strong> PC Server Technology and Selection Reference, SG24-4760<br />

• LAN Concepts and Products: Adapters, Hubs and ATM, SG24-4754<br />

<strong>Redbooks</strong> are also available on CD-ROMs. Order a subscription and receive<br />

updates 2-4 times a year at significant savings.<br />

CD-ROM Title Subscription Collection Kit<br />

Number Number<br />

System/390 <strong>Redbooks</strong> Collection SBOF-7201 SK2T-2177<br />

Networking and Systems Management <strong>Redbooks</strong> Collection SBOF-7370 SK2T-6022<br />

Transaction Processing and Data Management Redbook SBOF-7240 SK2T-8038<br />

AS/400 <strong>Redbooks</strong> Collection SBOF-7270 SK2T-2849<br />

RS/6000 <strong>Redbooks</strong> Collection (HTML, BkMgr) SBOF-7230 SK2T-8040<br />

RS/6000 <strong>Redbooks</strong> Collection (PostScript) SBOF-7205 SK2T-8041<br />

Application Development <strong>Redbooks</strong> Collection SBOF-7290 SK2T-8037<br />

Personal Systems <strong>Redbooks</strong> Collection SBOF-7250 SK2T-8042<br />

These publications are also relevant as further information sources:<br />

• Trusted Network Interpretation of the Trusted Computer System Evaluation<br />

Criteria, NSCS-TG-005<br />

• RFC 1492 - An Access Control Protocol, Sometimes Called TACACS<br />

© Copyright <strong>IBM</strong> Corp. 1997 359


360 The Technical Side of Being an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.


This soft copy for use by <strong>IBM</strong> employees only.<br />

How to Get ITSO <strong>Redbooks</strong><br />

This section explains how both customers and <strong>IBM</strong> employees can find out about ITSO redbooks, CD-ROMs,<br />

workshops, and residencies. A form for ordering books and CD-ROMs is also provided.<br />

This information was current at the time of publication, but is continually subject to change. The latest<br />

information may be found at http://www.redbooks.ibm.com.<br />

How <strong>IBM</strong> Employees Can Get ITSO <strong>Redbooks</strong><br />

Employees may request ITSO deliverables (redbooks, BookManager BOOKs, and CD-ROMs) and information about<br />

redbooks, workshops, and residencies in the following ways:<br />

• PUBORDER — to order hardcopies in United States<br />

• GOPHER link to the Internet - type GOPHER.WTSCPOK.ITSO.<strong>IBM</strong>.COM<br />

• Tools disks<br />

To get LIST3820s of redbooks, type one of the following commands:<br />

TOOLS SENDTO EHONE4 TOOLS2 REDPRINT GET SG24xxxx PACKAGE<br />

TOOLS SENDTO CANVM2 TOOLS REDPRINT GET SG24xxxx PACKAGE (Canadian users only)<br />

To get BookManager BOOKs of redbooks, type the following command:<br />

TOOLCAT REDBOOKS<br />

To get lists of redbooks, type one of the following commands:<br />

TOOLS SENDTO USDIST MKTTOOLS MKTTOOLS GET ITSOCAT TXT<br />

TOOLS SENDTO USDIST MKTTOOLS MKTTOOLS GET LISTSERV PACKAGE<br />

To register for information on workshops, residencies, and redbooks, type the following command:<br />

TOOLS SENDTO WTSCPOK TOOLS ZDISK GET ITSOREGI 1996<br />

For a list of product area specialists in the ITSO: type the following command:<br />

TOOLS SENDTO WTSCPOK TOOLS ZDISK GET ORGCARD PACKAGE<br />

• <strong>Redbooks</strong> Web Site on the World Wide Web<br />

http://w3.itso.ibm.com/redbooks<br />

• <strong>IBM</strong> Direct Publications Catalog on the World Wide Web<br />

http://www.elink.ibmlink.ibm.com/pbl/pbl<br />

<strong>IBM</strong> employees may obtain LIST3820s of redbooks from this page.<br />

• REDBOOKS category on INEWS<br />

• Online — send orders to: USIB6FPL at <strong>IBM</strong>MAIL or DK<strong>IBM</strong>BSH at <strong>IBM</strong>MAIL<br />

• Internet Listserver<br />

With an Internet e-mail address, anyone can subscribe to an <strong>IBM</strong> Announcement Listserver. To initiate the<br />

service, send an e-mail note to announce@webster.ibmlink.ibm.com with the keyword subscribe in the body of<br />

the note (leave the subject line blank). A category form and detailed instructions will be sent to you.<br />

Redpieces<br />

For information so current it is still in the process of being written, look at ″Redpieces″ on the <strong>Redbooks</strong> Web<br />

Site (http://www.redbooks.ibm.com/redpieces.htm). Redpieces are redbooks in progress; not all redbooks<br />

become redpieces, and sometimes just a few chapters will be published this way. The intent is to get the<br />

information out much quicker than the formal publishing process allows.<br />

© Copyright <strong>IBM</strong> Corp. 1997 361


How Customers Can Get ITSO <strong>Redbooks</strong><br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Customers may request ITSO deliverables (redbooks, BookManager BOOKs, and CD-ROMs) and information about<br />

redbooks, workshops, and residencies in the following ways:<br />

• Online Orders — send orders to:<br />

<strong>IBM</strong>MAIL Internet<br />

In United States: usib6fpl at ibmmail usib6fpl@ibmmail.com<br />

In Canada: caibmbkz at ibmmail lmannix@vnet.ibm.com<br />

Outside North America: dkibmbsh at ibmmail bookshop@dk.ibm.com<br />

• Telephone orders<br />

United States (toll free) 1-800-879-2755<br />

Canada (toll free) 1-800-<strong>IBM</strong>-4YOU<br />

Outside North America (long distance charges apply)<br />

(+45) 4810-1320 - Danish<br />

(+45) 4810-1420 - Dutch<br />

(+45) 4810-1540 - English<br />

(+45) 4810-1670 - Finnish<br />

(+45) 4810-1220 - French<br />

• Mail Orders — send orders to:<br />

<strong>IBM</strong> Publications<br />

Publications Customer Support<br />

P.O. Box 29570<br />

Raleigh, NC 27626-0570<br />

USA<br />

• Fax — send orders to:<br />

• 1-800-<strong>IBM</strong>-4FAX (United States) or (+1)001-408-256-5422 (Outside USA) — ask for:<br />

Index # 4421 Abstracts of new redbooks<br />

Index # 4422 <strong>IBM</strong> redbooks<br />

Index # 4420 <strong>Redbooks</strong> for last six months<br />

• Direct Services - send note to softwareshop@vnet.ibm.com<br />

• On the World Wide Web<br />

<strong>Redbooks</strong> Web Site http://www.redbooks.ibm.com<br />

<strong>IBM</strong> Direct Publications Catalog http://www.elink.ibmlink.ibm.com/pbl/pbl<br />

• Internet Listserver<br />

With an Internet e-mail address, anyone can subscribe to an <strong>IBM</strong> Announcement Listserver. To initiate the<br />

service, send an e-mail note to announce@webster.ibmlink.ibm.com with the keyword subscribe in the body of<br />

the note (leave the subject line blank).<br />

Redpieces<br />

(+45) 4810-1020 - German<br />

(+45) 4810-1620 - Italian<br />

(+45) 4810-1270 - Norwegian<br />

(+45) 4810-1120 - Spanish<br />

(+45) 4810-1170 - Swedish<br />

<strong>IBM</strong> Publications<br />

144-4th Avenue, S.W.<br />

Calgary, Alberta T2P 3N5<br />

Canada<br />

United States (toll free) 1-800-445-9269<br />

Canada 1-403-267-4455<br />

Outside North America (+45) 48 14 2207 (long distance charge)<br />

<strong>IBM</strong> Direct Services<br />

Sortemosevej 21<br />

DK-3450 Allerød<br />

Denmark<br />

For information so current it is still in the process of being written, look at ″Redpieces″ on the <strong>Redbooks</strong> Web<br />

Site (http://www.redbooks.ibm.com/redpieces.htm). Redpieces are redbooks in progress; not all redbooks<br />

become redpieces, and sometimes just a few chapters will be published this way. The intent is to get the<br />

information out much quicker than the formal publishing process allows.<br />

362 The Technical Side of Being an Internet Service Provider


This soft copy for use by <strong>IBM</strong> employees only.<br />

<strong>IBM</strong> Redbook Order Form<br />

Please send me the following:<br />

Title Order Number Quantity<br />

First name Last name<br />

Company<br />

Address<br />

City Postal code Country<br />

Telephone number Telefax number VAT number<br />

• Invoice to customer number<br />

• Credit card number<br />

Credit card expiration date Card issued to Signature<br />

We accept American Express, Diners, Eurocard, Master Card, and Visa. Payment by credit card not<br />

available in all countries. Signature mandatory for credit card payment.<br />

How to Get ITSO <strong>Redbooks</strong> 363


364 The Technical Side of Being an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.


This soft copy for use by <strong>IBM</strong> employees only.<br />

Index<br />

Numerics<br />

1.5 Mbps 11<br />

10Base-T (UTP) 76<br />

10Base2 (Thin Ethernet) 76<br />

10Base5 (Thick Ethernet) 76<br />

44.6Mb/s 11<br />

56 kbps 10<br />

64 kbps 10<br />

8250 79<br />

A<br />

Abuse of privilege 228<br />

Access points 215<br />

accounting 251, 253<br />

ACE/Server 89, 254<br />

Activity 211<br />

Activity Logger 90<br />

address resolution protocol (ARP) 81, 82<br />

administrator password 247<br />

advertising 154, 158<br />

allocation of addresses 278<br />

Analysis 207<br />

API (application programming interface) 70<br />

Apple Remote Access (ARA) 85, 86, 88<br />

AppleTalk 85, 248<br />

application programming interface (API) 70<br />

ARA (Apple Remote Access) 85, 86, 88<br />

ARA routers 86<br />

ARAP (AppleTalk remote access protocol) 85<br />

ARP (address resolution protocol) 81, 82, 83<br />

AS numbers 277<br />

AS/400 267<br />

AS/400 FSIOP 127<br />

AS/400 native applications on the Web 127<br />

AS/400 Notes support 127<br />

AS/400 POP3 implementation 127<br />

AS/400 security 127<br />

Audio File Formats<br />

.aif,.aiff and .aifc 183<br />

.au and .snd 183<br />

.mod 184<br />

.wav 183<br />

Audio formats 183<br />

AUI (Thick Ethernet) 75<br />

authentication 228, 248, 249, 250, 252, 253<br />

protocols 139<br />

Authentication Protocols for PPP 240<br />

Authorization 228, 248, 249, 250<br />

Average Web response size 268<br />

B<br />

Backup 221<br />

Bandwidth 270<br />

bibliography 359<br />

billing 251<br />

Bindery 248, 249<br />

Blockade 251<br />

Blockade DAS 251<br />

BNC (Thin Ethernet) 75<br />

BOOTP (boot protocol) 82<br />

BRI module 79<br />

bridging 80<br />

broadcast packets 86<br />

C<br />

CA 165<br />

cables<br />

Calculating HTTP operations 291<br />

Campus 206<br />

Care 206<br />

CCL (Connection Control Language) 89<br />

certification authority 165<br />

challenge 141, 228<br />

Challenge-Handshake Authentication Protocol<br />

(CHAP) 241<br />

channel aggregation 71, 72<br />

CHAP 250<br />

CHAP/PAP 140<br />

Checksums 239<br />

CICS 130<br />

class of address 284<br />

clear and download 78<br />

client event logging 70<br />

CMIP 150, 152, 153<br />

CMIS 150, 153<br />

CMOT 150, 152, 153<br />

Common sense 216<br />

Communications programs 207<br />

Compact discs 187<br />

Compuserve GIF 183<br />

Computer users 206<br />

computers 207<br />

Configuring a server 292<br />

connect application 68<br />

Connection Control Language (CCL) 89<br />

Connection File Wizard 69<br />

Connection speed 270<br />

connectivity features 39, 43<br />

Content type 267<br />

Controls 216<br />

Copyright 211<br />

Cost 207<br />

© Copyright <strong>IBM</strong> Corp. 1997 365


cost based routing 278<br />

CPU card 93<br />

CRC 239<br />

Creation 206<br />

Critical 206<br />

Crypt 238<br />

Cryptosealing 239<br />

CSU/DSU 79<br />

CyberCash 162, 163, 166<br />

D<br />

DB/2 130<br />

Decisions 206<br />

Defender 248, 254<br />

Defender security server 255<br />

delta technology 71<br />

DES 238<br />

design considerations 284<br />

design problems 283<br />

DHCP 284<br />

dial-in 67, 68, 255<br />

dial-up 140, 143, 219<br />

DIFF 218<br />

Digicash 161<br />

Digital movie formats 186<br />

Digital phone-line 10<br />

Digital video file formats 187<br />

Digital video hardware requirements 187<br />

Digital video players 188<br />

Digital video software requirements 187<br />

Direct Satellite Broadcast 187<br />

Dividing daemons 291<br />

DMC 95, 96<br />

modem card 95<br />

domain name service 227<br />

Domain Name Services 51<br />

DOS drivers 68<br />

download 78<br />

DRAM (dynamic RAM) 93<br />

DUMP 221<br />

dynamic address allocation 284<br />

Dynamic content 268<br />

dynamic environments 278<br />

dynamic protocols 278<br />

dynamic RAM (DRAM) 93<br />

E E1 94<br />

ECPA 212<br />

EDI 162<br />

Educating 220<br />

EGP implementation 277<br />

electronic commerce<br />

protocols 159<br />

electronic store 166<br />

encryption 252<br />

366 The Technical Side of Being an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

end nodes 85<br />

ESS 252<br />

Ethernet 75, 77, 78, 94, 272<br />

event logging 70<br />

express installation 69<br />

F<br />

FAQ about capacity planning 292<br />

Fast Ethernet 272<br />

FDDI 272<br />

filtering<br />

IP packet 223<br />

filters, LLC SAP 80<br />

firewall 221<br />

element 223<br />

principles 223<br />

Fix 206, 221<br />

flash memory 93<br />

floating virtual connections (FVC) 70<br />

Forms 207<br />

frame types 84<br />

Full-color video 56, 179<br />

FVC (floating virtual connections) 70<br />

G game playing 219<br />

gatekeeper 244<br />

GIF 181<br />

GIF Frames 181<br />

GIF limitations 183<br />

GIF logical screen area 181<br />

GIF, benefit to use 182<br />

GIF87a 181<br />

GIF89a 181<br />

good performance 267<br />

Gray-scale video 179<br />

GTE 163<br />

H<br />

hacker 279<br />

handshake 140, 141<br />

Hardware 91, 207<br />

Hardware and software combination 279<br />

HELLO 278<br />

High-definition television 187<br />

hops 278<br />

Hot Plugging 32<br />

I<br />

I/O 283<br />

I40 91<br />

IAB 149, 150<br />

IANA 284<br />

<strong>IBM</strong> 2210 Nways 51


This soft copy for use by <strong>IBM</strong> employees only.<br />

<strong>IBM</strong> AS/400 127<br />

<strong>IBM</strong> RS/6000 121<br />

<strong>IBM</strong> S/390 130<br />

ICMP (Internet control message protocol) 82<br />

identification 253<br />

IETF (Internet Engineering Task Force) 250, 252<br />

IGP 277<br />

iKP 159, 163, 164, 165<br />

Implementation 206<br />

IMS 130<br />

In-house applications 283<br />

Infrastructure investment 291<br />

Intel 267<br />

Interface 293<br />

interface connectivity 35<br />

interface supported 32<br />

Interlacing 181<br />

Internet control message protocol (ICMP) 82<br />

Internet Engineering Task Force (IETF) 250, 252<br />

Internet Packet Exchange (IPX) 83, 84<br />

Internet protocol (IP) 81, 82<br />

InterNIC 51<br />

intranet 270<br />

IP packet filtering 223<br />

IPGATEWAY 87<br />

IPX (Internet Packet Exchange) 83, 84<br />

ISA 92<br />

ISDN 56, 272<br />

J<br />

Java Virtual Machine 191<br />

JPEG 179<br />

JPEG compression 180<br />

juggling virtual connections (JVC) 70<br />

K<br />

Kerberos 140, 142, 236, 250, 253<br />

Key element 206<br />

kinetics Internet protocol (KIP) 87<br />

KIP (kinetics Internet protocol) 87<br />

L LAN 272<br />

LAN implementations 278<br />

LAN-to-LAN 248, 255<br />

LanConnect applets 71<br />

large networks 278<br />

Large-volume transactions 130<br />

Leased lines 272<br />

Levels of responsibility 206<br />

limitations 96<br />

Linux 279<br />

LLC (low-layer capability) 80<br />

LLC SAP filters 80<br />

LME 152<br />

Logging 228<br />

lossy compression 180<br />

low-layer capability (LLC) 80<br />

LPP 153<br />

LS 218<br />

LZW compressed images 181<br />

M<br />

MAC 257<br />

Macintosh 87<br />

Magnetic media 207<br />

MAINT 220<br />

Management Facility (MF) 67, 72, 247<br />

MAS<br />

supporting protocols 37<br />

Master Card 163<br />

mastering 69<br />

MD5 250<br />

MDC 239<br />

MIB 149, 150, 151, 152<br />

MIDI<br />

channels 185<br />

device 185<br />

General standard 185<br />

mapper 185<br />

Sequencer 186<br />

Synthesizers, types of 185<br />

When to Use 186<br />

Mini-pay 161<br />

MIT 236<br />

MLP (Multilink protocol) 68, 71<br />

model I40 253<br />

Monitoring tools 217<br />

MOSS 164<br />

most recent router 85<br />

MPEG 187<br />

MPEG-2 187<br />

MQSeries 130<br />

MRS<br />

software packages 29<br />

Multilink protocol (MLP) 68, 71<br />

Multiple GIF images 181<br />

Multiple home-pages 293<br />

Multiple strategies 216<br />

Multiprocessing with AIX 283<br />

Multiprocessing with OS/2 283<br />

Multiprocessors 283<br />

multiprotocol 68<br />

MVIP 95<br />

MVS 251<br />

N<br />

name binding protocol (NBP) 87<br />

NDIS (network driver interface specification) 68<br />

NDS (NetWare Directory Service) 249<br />

Net.Commerce<br />

Daemon 168<br />

Index 367


Net.Commerce (continued)<br />

Director 168<br />

electronic store 166, 167, 168<br />

Lotus Payment Switch 169<br />

merchant 166<br />

Store Administrator 168<br />

Store Creator 167<br />

Store Manager 167<br />

Template Editor 168<br />

Netbill 161<br />

NetBIOS 80<br />

NetWare 255<br />

Network managers 206<br />

networks supported 28<br />

NETX 68<br />

new port driver 70<br />

NMA 151<br />

NMS 151<br />

Novell NetWare 115<br />

Novell UNIXWare 115<br />

O Obscenity 212<br />

open data-link interface (ODI) 68<br />

Operating systems 207<br />

OS/2 drivers 68<br />

OSI 152, 153<br />

OSPF backbone 278<br />

out-band 244<br />

Overlooked 207<br />

P<br />

packet filtering router 224<br />

Paper 207<br />

Parallel servers 268<br />

passive routers 278<br />

password<br />

254<br />

139, 140, 141, 143, 144, 145, 146, 245, 247,<br />

Password Authentication Protocol (PAP) 241<br />

PCI 91, 92<br />

PDU 152<br />

PEM 164<br />

persistent connections (PC) 70<br />

personal identification number (PIN) 254<br />

physical access 244<br />

Physical security 217<br />

piggybacking updates 71<br />

PIN (personal identification number) 254<br />

pin reset switch 78<br />

PINPAD 254<br />

Playing movie files 187<br />

Policy 229<br />

Possible problems 215<br />

power status 73<br />

power switching 69<br />

PowerPC 283<br />

368 The Technical Side of Being an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

PPP 140<br />

PPP Authentication Protocols<br />

introduction to PPP Authentication Protocols 240<br />

Password Authentication Protocol (PAP) 241<br />

Scenario: PPP with Bridging 241<br />

Privileges 210<br />

Procedures 217<br />

Proper use 210<br />

Protect and proceed 209<br />

protocols 67<br />

proxy ARP 83<br />

proxy server 225<br />

public switched telephone network 68<br />

Pursue and prosecute 209<br />

Q QuickTime 188<br />

R<br />

RACF 130, 251<br />

RADIUS 140, 142, 146, 148, 248, 252<br />

RAW audio format 183<br />

rear panel 74<br />

Recommendations 291<br />

remote access 67<br />

Remote Authentication Dial-In User Service<br />

(RADIUS) 252<br />

Response 228<br />

Responsibilities 210<br />

Restrictions in applets 192<br />

RFC 249, 250<br />

ring parameter server (RPS) 81<br />

RIP 278<br />

RIP (routing information protocol) 82, 84<br />

RISC 267<br />

Risk 207<br />

ROOT 220<br />

router 143<br />

router network 278<br />

routing information protocol (RIP) 82, 84<br />

routing table maintenance protocol (RTMP) 85<br />

RPS (ring parameter server) 81<br />

RTMP (routing table maintenance protocol) 85<br />

S<br />

S-HTTP 159, 164, 256<br />

S/390 267<br />

S/390 security 130<br />

SAP (service advertising protocol) 84<br />

Scalability 283<br />

Scenario: PPP with Bridging 241<br />

SCO UNIX 115<br />

Secure Electronic Payment Protocol 163<br />

Secure servers 293<br />

Secure WWW Servers 255


This soft copy for use by <strong>IBM</strong> employees only.<br />

SecureNet Key 255<br />

SecurID 245, 248, 254<br />

SecurID (Security Dynamics ACE/Server) 88<br />

SecurID client 254<br />

SecurID token 254<br />

Security 71, 87, 242<br />

Security Mailing Lists 264<br />

Self-describing audio format 183<br />

SEPP 163<br />

Sequenced Packet eXchange (SPX) 84<br />

serial port status 73<br />

server<br />

proxy 225<br />

SOCKS 226<br />

service advertising protocol (SAP) 84<br />

service provider 277, 284<br />

SET 159, 162, 165, 166<br />

SGMP 150, 151<br />

SIM 151<br />

simple network management protocol (SNMP) 71, 90<br />

Simultaneous users 269<br />

Sizing a server 267<br />

Slip 127, 145<br />

slot 92<br />

SMAP 152<br />

smart card 254<br />

SMI 149, 150, 151, 152<br />

SMP applications 283<br />

SMP Systems 283<br />

SNMP 149, 150, 151, 152<br />

SNMP (simple network management protocol) 71, 90<br />

SNMP Management 71<br />

SNMP manager 90<br />

SOCKS server (Sockets) 226<br />

Software bugs 215<br />

software packages 29<br />

Solaris 115<br />

source route bridging 80<br />

Special privileges 211<br />

spoofing 69, 70, 228<br />

SPX (Sequenced Packet eXchange) 84<br />

SSL 159, 164, 166, 173, 257<br />

Stac 4.0 compression 70<br />

static definitions 278<br />

static RAM (SRAM) 93<br />

static routing 278<br />

Stereo sound 56<br />

Storage formats 186<br />

supporting protocols 37<br />

switched circuit 140<br />

Sync/Async module 79<br />

Synthesizer 185<br />

SYSLOG 217<br />

System managers 206<br />

T<br />

T1 11, 94, 272<br />

T3 11, 272<br />

TACACS 140, 143<br />

TACACS (Terminal Access Controller Access Control<br />

System) 249<br />

TACACS+ 248, 250<br />

Tapes 221<br />

TCP (transmission control protocol) 82, 250<br />

TDM 95<br />

Telephone lines 127<br />

Telnet 82, 215<br />

Terminal Access Controller Access Control System<br />

(TACACS) 249<br />

TFTP (trivial file transfer protocol) 82<br />

the Internet 277<br />

Thick Ethernet (10Base5) 76<br />

Thick Ethernet (AUI) 75<br />

Thin Ethernet (10Base2) 76<br />

Thin Ethernet (BNC) 75<br />

third-party security 245<br />

timed LAN-to-LAN connections (TLC) 71<br />

timed updates 71<br />

Tivoli 153<br />

TME 153<br />

token 248, 253, 254<br />

token device 246, 252<br />

token-ring 74, 77, 78, 248, 272<br />

transmission control protocol (TCP) 82, 250<br />

Transmitting video 180<br />

transparent bridging 81<br />

triggered updates 71<br />

trivial file transfer protocol (TFTP) 82<br />

Trojan horse 229<br />

Tunneling router 229<br />

two-factor authentication 246, 253<br />

U<br />

UDP (user datagram protocol) 82, 249, 252, 254<br />

Uniprocessors 283<br />

UNIX 250, 252, 254, 255, 279<br />

USENET 264<br />

user ID 139, 140, 143, 144, 145, 146<br />

user name 139, 140, 143, 144, 145, 146<br />

User responsibilities 212<br />

Users 207<br />

Using existing systems as Web servers 279<br />

UTP 75<br />

UTP (10Base-T) 76<br />

UVROM 93<br />

V<br />

variable length subnetting 278<br />

Video compression 179<br />

video formats 188<br />

Index 369


Video quality 179<br />

Violated 210<br />

Violated policy 213<br />

virtual connection (VC) 69, 70, 71<br />

Virtual network 229<br />

Virtual ROM (VROM) 93<br />

Virus 229, 264<br />

VM 251<br />

VxD 68<br />

W<br />

WAN (wide area network) 94<br />

WAN card 94<br />

warm boot 77<br />

Warp Server 283<br />

WaveRunner 69<br />

Windows NT 255<br />

Z<br />

zone 85, 86<br />

370 The Technical Side of Being an Internet Service Provider<br />

This soft copy for use by <strong>IBM</strong> employees only.


This soft copy for use by <strong>IBM</strong> employees only.<br />

ITSO Redbook Evaluation<br />

The Technical Side of Being an Internet Service Provider<br />

SG24-2133-00<br />

Your feedback is very important to help us maintain the quality of ITSO redbooks. Please complete this<br />

questionnaire and return it using one of the following methods:<br />

• Use the online evaluation form found at http://www.redbooks.com<br />

• Fax this form to: USA International Access Code + 1 914 432 8264<br />

• Send your comments in an Internet note to redbook@vnet.ibm.com<br />

Please rate your overall satisfaction with this book using the scale:<br />

(1 = very good, 2 = good, 3 = average, 4 = poor, 5 = very poor)<br />

Overall Satisfaction ____________<br />

Please answer the following questions:<br />

Was this redbook published in time for your needs?<br />

If no, please explain:<br />

Yes____ No____<br />

_____________________________________________________________________________________________________<br />

_____________________________________________________________________________________________________<br />

_____________________________________________________________________________________________________<br />

_____________________________________________________________________________________________________<br />

What other redbooks would you like to see published?<br />

_____________________________________________________________________________________________________<br />

_____________________________________________________________________________________________________<br />

_____________________________________________________________________________________________________<br />

Comments/Suggestions: ( THANK YOU FOR YOUR FEEDBACK! )<br />

_____________________________________________________________________________________________________<br />

_____________________________________________________________________________________________________<br />

_____________________________________________________________________________________________________<br />

_____________________________________________________________________________________________________<br />

_____________________________________________________________________________________________________<br />

© Copyright <strong>IBM</strong> Corp. 1997 371


<strong>IBM</strong>L ®<br />

This soft copy for use by <strong>IBM</strong> employees only.<br />

Printed in U.S.A.<br />

SG24-2133-00

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!