Tcp Ip Services

Embed Size (px)

Citation preview

  • 7/31/2019 Tcp Ip Services

    1/20

    TCP/IP Services

    by Scott Slyvester and Brad L Brech

    Abstract

    Enterprises around the world have recognized the shift of networking to TCP/IP technologies and

    the business potential of leveraging these technologies as well as the Internet itself. It is being

    used in many fashions for internal company, intercompany, or for public access. As the awareness

    and adoption rate of TCP/IP has increased, the AS/400 has been enhancing its TCP/IP and

    related technologies. As a result, the AS/400 has built-in leading-edge security and

    enterprise-class TCP/IP.

    This article provides an overview of AS/400 TCP/IP support, and with other articles in thejournal, provides greater insight to the technology the AS/400 provides to meet the networking

    needs of its customers.

    Key messages

    AS/400 delivers the TCP/IP networking offerings that provide you the confidence you

    need to simplify and grow your e-business.

    AS/400 leverages both its strong system networking hardware support, scalability,

    security, and built-in industry TCP/IP standards for enterprise-class TCP/IP in support of

    e-business.

    Introduction

    The need to interconnect networks based on different protocols and platforms was recognized

    early in the 1970s during a period when the use and development of networking technology was

    increasing. The rapid growth in networking over the past three decades has allowed users much

    greater access to resources and information as well as causing significant problems when merging,

    or interconnecting, different types of networks. Open protocols and common applications were

    required, leading to the development of a protocol suite known as

    Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP originated with the U.S.Department of Defense (DoD) in the mid-1960s and took its current form around 1978.

    Because of its openness, it is the main protocol used for system interconnection, and the protocol

    on which the Internet runs.

  • 7/31/2019 Tcp Ip Services

    2/20

    The Growth of TCP/IP

    TCP/IP has become widely used due to its inexpensive availability in UNIX and its spread to

    other operating systems, resulting in increasing use in both local area network (LAN) and wide

    area network (WAN) environments. Today, TCP/IP provides the ability for corporations to merge

    differing physical networks while giving users a common suite of functions. It allowsinteroperability between equipment supplied by multiple vendors on multiple platforms, and it

    provides access to the Internet. In fact, the Internet, which has become the largest computer

    network in the world, is based on the TCP/IP protocol suite. The Internet consists of large

    international, national, and regional backbone networks, which allow local and campus networks

    and individuals access to global resources. Use of the Internet has grown rapidly over the last few

    years. The most recent estimate has a number in excess of 29 million hosts on the Internet today.

    As opposed to the Internet, the term intranet has evolved recently to describe TCP/IP networks

    that are entirely under the control of a private authority or company. Those intranets may or may

    not have connections to other independent intranets (which would then be referred to as

    extranets) or the Internet. They may or may not be fully or partially visible to the outside

    depending on the implementation. TCP/IP also provides for the routing of multiple protocols from

    and to diverse networks. For example, a requirement to connect isolated networks using IPX,

    AppleTalk, and TCP/IP protocols using a single physical connection can be accomplished by

    using routers utilizing TCP/IP protocols.One further reason for the growth of TCP/IP is the

    popularity of the socket programming interface, which is the programming interface between the

    TCP/IP transport protocol layer and TCP/IP applications. A large number of applications have

    been written for the TCP/IP socket interface.

    TCP/IP is a defacto

    We mentioned in the previous section that the Internet is a large multinational, multivendor,

    multiplatform network. That might give reason to ask some questions, such as:

    Are there any standards for such a diverse network?

    Who establishes and reviews them?

    Who assigns network addresses?

    Who manages the Internet?

    The Internet Society (ISOC), formerly known as Internet Activities Board (IAB), is the nonprofit,

    coordinating committee for Internet design, engineering, and management. The ISOC members

    are committed to making the Internet function effectively and evolve to meet a large-scale,

    high-speed future. The ISOC holds several bodies for administering, standardizing, andresearching for the Internet:

    The Internet Architecture Board (IAB)

    The Internet Engineering Task Force (IETF)

    The Internet Research Task Force (IRTF)

    The Internet Assigned Numbers Authority (IANA)

  • 7/31/2019 Tcp Ip Services

    3/20

    While the IAB oversees and manages the Request For Comments (RFC) publication process, the

    IETF actually defines the standards through a number of subcommittees or task forces, and the

    IRTF engages in Internet-related research projects. RFC is the mechanism through which the

    Internet protocol suite has been evolving. For example, an Internet protocol can have one of six

    states: standard, draft standard, proposed standard, experimental, informational, and historic. In

    addition, an Internet protocol has one of five statuses: required, recommended, elective,limited use, and not recommended. By communicating using the RFC, new protocols are being

    designed and implemented by researchers from both academic institutions and commercial

    corporations. At the same time, some old protocols are being superseded by new ones.

    The RFC standards are described in the "Internet Official Protocol Standards" RFC,

    currently RFC 2200. The task of coordinating the assignment of values to the parameters of

    protocols is delegated to the IANA. These protocol parameters include op-codes, type fields,

    terminal types, system names, object identifiers, and so on.

    TCP/IP stack support

    TCP/IP, as a set of communications protocols, is based on layers. Unlike SNA or OSI, which

    distinguish seven layers of communication, there are only four layers in the TCP/IP model. They

    enable heterogeneous systems to communicate by performing network-related processing such as

    message routing, network control, error detection, and correction.

    The layering model of TCP/IP is shown in Figure 1, with an explanation of each layer following

    thereafter:

    LAN, X.25, ATM,

    Frame Relay, Async

    IP, ICMP, IGMP, ARP

    TCP, UDP, PPP, L2TP

    Sockets, Secure Sockets

    FTP, HTTP, Telnet, DHCPDNS, SMTP, POP, SNMP

    and many more

    Network Interface Layer

    Internetwork Layer

    Trasnport Layer

    Application Layer

    Figure 1. Protocol stack

  • 7/31/2019 Tcp Ip Services

    4/20

    Application layer

    The application layer is provided by the program that uses TCP/IP for communication. Examples

    of applications are Telnet, FTP, e-mail, HTTP, and SMTP. The interface between the application

    and transport layers is defined by port numbers and sockets. The applications that are part of the

    AS/400 offering are discussed later in the TCP/IP suite servers section.

    Transport layer

    The transport layer provides communication between application programs. The applications may

    be on the same host or on different hosts. Multiple applications can be supported simultaneously.

    The transport layer is responsible for providing a reliable exchange of information. The main

    transport layer protocol is TCP. Another is User Datagram Protocol (UDP), which provides a

    connectionless service in comparison to TCP, which provides a connection-oriented service. That

    means that applications using UDP as the transport protocol have to provide their own

    end-to-end flow control. Usually, UDP is used by applications that need a fast transport

    mechanism.

    Internetwork layer

    The internetwork layer provides communication between computers. Part of communicating

    messages between computers is a routing function that ensures that messages will be correctly

    delivered to their destination. The Internet Protocol (IP) provides this routing function. Examples

    of internetwork layer protocols follow: IP, ICMP, IGMP, ARP and RARP.

    Network interface layer

    The network interface layer, sometimes also referred to as the link layer, data link layer, ornetwork layer, is implemented by the physical network that connects the computers. Examples are

    LAN (IEEE 802.x standards), Ethernet, X.25, ISDN, ATM, Frame Relay, or async. Note that the

    RFCs actually do not describe or standardize any network layer protocols per se. They only

    standardize ways of accessing those protocols from the internetwork layer.

    Internet protocol (IP)

    IP is the layer that hides the underlying physical network from the upper-layer protocols. It is an

    unreliable, best-effort and connectionless packet delivery protocol. Note that best-effort means

    that the packets sent by IP may be lost, out of order, or even duplicated, but IP will not handle

    these situations. It is up to the higher-layer protocols to deal with these situations.

    One of the reasons for developing a connectionless network protocol was to minimize the

    dependency on specific computing centers that used hierarchical connection-oriented networks.

    The DoD intended to deploy a network that would still be operational if parts of the country were

    destroyed.

  • 7/31/2019 Tcp Ip Services

    5/20

    IP uses IP addresses to specify source and target hosts on the Internet. (For example, we can

    contrast an IP address in TCP/IP with a fully qualified NETID.LUNAME in SNA.) An IP address

    consists of 32 bits, which is usually represented in the form of four decimal numbers, one decimal

    number for each byte (or octet). For example, a 32-bit address 9 67 38 1 decimal notation

    (9.67.38.1).

    An IP address consists of two logical parts: a network address and a host address. An IP address

    belongs to one of four classes depending on the value of its first four bits. (A fifth class, class E, is

    not commonly used.)

    Transport protocols

    Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) provides a reliable delivery of a stream of bytes in

    sequence. TCP takes a stream of data, breaks it into segments (a TCP header and application

    data), sends each one individually using IP, and then reassembles the segments back into theoriginal steam. If any segements are lost or damaged during the transmission, TCP detects this

    and resend the missing segments. From a performance perspective, the AS/400 supports TCP

    extensions for high-performance (RFC 1323) that provides for large TCP transmissions over

    high-bandwidth connections.

    UDP (User Datagram Protocol)

    UDPenables an application to send datagrams to other programs on other systems with aminimum of protocol overhead. Unlike TCP, UDP is datagram oriented and does not guarantee

    the delivery of data in sequence. Datagrams may possibly be dropped or reordered as they travel

    from the source to the destination. UDP can be used instead of TCP when the application does

    not want to incur the overhead of TCP connecting and disconnecting. It then becomes the

    responsibility of the application to ensure reliable data transfer and sequencing of datagrams. The

    AS/400 UDP also includes multicast support, which allows a host to send packets to a group of

    hosts in a single transmission.

    PPP (Point-to-Point Protocol)

    Dial-up TCP/IP, known as Point-to-Point protocol, is used to dial into remote sytems, or allow

    remote systems to dial into the AS/400 over a telephone line using a modem. Null modems or

    non-switched connections are also supported. The Serial Line Internet Protocol (SLIP) andPoint-to-Point Protocol (PPP) are supported on the AS/400. In addition, the AS/400 supports

    dial-on-demand PPP connections and routing over point-to-point connections.

    L2TP (Layer 2 Tunneling Protocol)

    Layer 2 Tunneling Protocol (L2TP) enables connections, which are also called virtual lines, that

    provide cost-effective access for remote users regardless of whether their IP address is

  • 7/31/2019 Tcp Ip Services

    6/20

    dynamically assigned. Further, L2TP connections secure access when they are used in

    conjunction with IP Security (IPSec). L2TP is actually a variation of an IP encapsulation

    protocol. An L2TP tunnel is created by encapsulating an L2TP frame inside a UDP packet, which

    in turn is encapsulated inside an IP packet. The source and destination addresses of this IP packet

    define the tunnels endpoints. Because the outer encapsulating protocol is IP, you can apply

    IPSec protocols to the composite IP packet. This protects the data that flows within the L2TPtunnel. You can then apply Authentication Header (AH), Encapsulated Security Payload (ESP),

    and Internet Key Exchange (IKE) protocols in a straightforward manner. Using IPSec protocols

    to encrypt an L2TP tunnel provides encryption for all sesssions contained in the tunnel. The

    AS/400 can serve as either an L2TP-enabled client or an L2TP network server (LNS).

    Internet Control Message Protocol (ICMP)

    The Internet Control Message Protocol (ICMP) provides for error and control messages between

    host systems and routers. Routers and host systems use ICMP to send reports of problems.

    ICMP also includes an echo request or reply message that is used to test whether a destination

    can be reached and is responding (via Packet InterNet Groper (PING)).

    Internet Group Management Protocol (IGMP)

    The InternetGroup Management Protocol (IGMP) is used by IP hosts to report their host groupmemberships to neighboring multicast routers. Multicast routers send host membership query

    messages to discover which host groups have members on their attached networks. Hosts

    respond to the query by generating host membership reports reporting each host group to which

    they belong. The multicast routes use this information to determine where multicast datagrams

    need to be forwarded.

    ARP

    The Address Resolution Protocol (ARP) dynamically associates Internet addresses to physical

    hardware addresses on a local network. ARP relies on the broadcast capabilities of the underlying

    media to provide this function.

    Security

    The TCP/IP protocol suite provides some security features as options to the base protocol.

    Several options have been defined, but the three most used and talked about are IP packet

    filtering, network address translation, and IP secure.

    IP packet filtering and network address translation

    The AS/400 provides support for IP packet filtering and Network Address Translation (NAT). IP

    packet filtering and NAT provided added security features for the AS/400 systems role as an

    Internet server. Administrators can put security policies in place for access to the Internet or

  • 7/31/2019 Tcp Ip Services

    7/20

    intranets. In some environments, IP packet filtering and network address translation make it

    possible to connect an AS/400 to the Internet without a firewall.

    IP packet filtering examines every IP packet coming into and out of a TCP/IP interface and then

    compares them against a set of filter rules that are written for that TCP/IP interface. If the IP

    packet matches a filter rule, the IP packet filtering performs the operation that the filter ruledescribes (PERMIT, DENY). If there is not a match, the system drops the IP packet.

    The network address translations support contains two types: masquerade NAT and static NAT.

    Masquerade NAT, also known as hiding addresses, translates a source IP address into a second,

    or masquerade, address. The masquerade address appears as the source IP address on the

    outbound IP packets. A reverse translation occurs for inbound IP packets. Masquerade NAT is a

    strongersecurity feature than static NAT because it does not allow inbound connections that arenot a result of an outbound request. Conversations are initiated from the masquerade address in

    an outbound direction only. As a result, the IP addresses must be internal or trusted addressess.

    In addition, masquerade NAT can translate port numbers. Static NAT, also known as mapping

    addresses, translates all occurrences of a specific source address to another specific sourceaddress for incoming or outgoing IP packets. Static NAT does not translate port numbers.

    IPSec (IP Secure)

    The AS/400 fully implements the IPSecInternet standards. The IPSec implementation provides astable, long lasting base for providing network layer security. It supports all of the cryptographic

    algorithms in use today and can also accommodate newer, more powerful algorithms as they

    become available. IPSec protocols address these major security issues:

    Data origin authentication verifies that each datagram was originated by the claimed sender.

    Data integrity verifies that the contents of the datagram were not changed in transit.

    Data confidentiality conceals the clear text of a message, typically using encryption.

    Replay protection assures that an attacker cannot intercept a datagram and play it back at a

    later time.

    Automated management of cryptographic keys and security associationsassures that thesecurity policy can be implemented throughout the extended network with little or no manual

    configuration of cryptographic keys and algorithms. This is achieved using the Internet Key

    Exchange (IKE) Internet standard.

    The IPSec protocol contains Authentication Header (AH) and Encapsulating Security Payload

    (ESP). In addition, IPSec support can be in either tunnel or transport mode. Tunnel modecreates a new IP header for the source and destination while transport mode contains the original

    IP header. The AH protocol provides data origin authentication, data integrity, and replay

    protection. Data integrity is assured by the checksum that a message authentication code like

    MD5 generates; data origin authentication is assured by including a secret shared key in the data

    that is to be authenticated; and replay protection is provided by use of a sequence number field

    within the AH header. The format of an ESP packet is more complicated than that of the AH

    packet. There is not only an ESP header, but also an ESP trailer and ESP authentication data. As

  • 7/31/2019 Tcp Ip Services

    8/20

    the name of the protocol implies, the payload is located between the header and trailer. ESP

    always provides data confidentiality (encryption). It can also provide data origin authentication,

    data integrity checking, and protection against replay. ESP and AH can be applied alone, in

    combination with the other (ESP with AH), or even nested within another instance of itself. With

    these combinations, authentication and encryption can be provided between a pair of

    communicating hosts, between a pair of communicating firewalls or gateways, or between a hostand a firewall or gateway.

    More details on Internet security can be found inInternet Security : Doing e-business with

    confidence article.

    API support

    For an application to use all of this support, it needs an application programming interface to the

    protocol stack.

    Sockets and secure sockets interface

    The sockets interface allows you to write your own applicatons to supplement those supplied with

    TCP/IP. Sockets allows unrelated processes to exchange data locally and over netwworks. Both

    connection oriented and connectionless communications are provided for TCP/IP. With this

    support, you can write applications to the TCP, UDP, and IP protocols directly. The sockets

    interface operates over TCP/IP or AnyNet/400. In addition, the sockets interface has been

    enhanced to support the Secure Sockets Layer (SSL).

    Send MIME Mail API

    The send MIME Mail API allows applications to use SMTP and TCP/IP to send mail to the

    Internet.

    Communications line interface support

    The AS/400 provides several types of physical interfaces for networking connectivity. The

    AS/400 supports the following:

    Token-ring (4Mb and 16Mb)

    Ethernet (10Mb and100Mb)

    Distributed Data Interface (DDI), including fiberWireless LAN

    Frame relay

    X.25 Permanent and Switched Virtual Circuits (PVC and SVC)

    X.25 over ISDN

    PPP over ISDN

    Netfinity Integrated PC server LAN

    Asynchronous

  • 7/31/2019 Tcp Ip Services

    9/20

    ATM

    Twinaxial

    Multihoming support

    Given the AS/400s strength as a server and scalable business computer, the AS/400 fullyssupports multihoming. Multihoming is the support of multiple IP addresses by a single host,

    which can be thought of as logical interfaces. These logical interfaces may be associated with one

    or more physical interfaces, and these physical interfaces may be connected to the same or

    different networks.

    The AS/400 TCP/IP implementation supports multihoming by allowing the specification of either

    a single interface or multiple interfaces for a communications line. You can have your AS/400

    appear as any one or combination of the following scenarios:

    A single host on a network over a communcations line

    Multiple hosts on the same network over the same communications linesMultiple hosts on the same network over multiple communications lines

    Multiple hosts on different networks over the same communications lines

    Multiple hosts on different networks over multiple communications lines

    Multiprotocol support (AnyNet/400)

    AS/400 supports AnyNet/400, which is part of the AnyNet family of products. AnyNet products

    allow application programs written for one communication protocol to run over non-native

    protocols without changing (or recompiling) the application programs. The destination address

    determines if the request is sent over the native protocol or through the AnyNet code and on to a

    non-native protocol.

    AnyNet/400 allows sockets, intersystem communications functions (ICF), CPI communications

    (CPI-C), and CICS/400 applications to run over APPC, TCP/IP and Internetwork Packet

    eXchange (IPX). AnyNet/400 is based on the Multiprotocol Transport Network (MPTN)

    architecture, and is designed to allow any application to run over any networking protocol.

    AnyNet/400 can be used to:

    Access APPC using TCP/IP if your applications were developed for the System Network

    Architecture (SNA) but they are using TCP/IP to connect the systems.

    Access APPC using IPX if your applications were developed for SNA but they are using IPXto connect the systems.

    Access sockets using SNA if your sockets applications were developed for TCP/IP but they

    are using SNA to connect the systems.

    Access sockets using IPX if your sockets applications were developed for TCP/IP but they are

    using IPX to connect the systems.

  • 7/31/2019 Tcp Ip Services

    10/20

    TCP/IP suite servers

    As we noted in the introduction, the TCP/IP suite is made up of several applications that provide

    services. The AS/400 provides many of these servers as part of the optional program products

    library. Here is the description of several of the more popular servers.

    Dynamic Host Configuration Protocol (DHCP/DHCP relay agent)

    DHCP provides a framework for passing configuration information to hosts on a TCP/IP

    network. DHCP is based on the Bootstrap Protocol, adding the capability of automatic allocation

    of reusable network addresses and additional configuration options.

    What does it do?

    The Dynamic Host Configuration Protocol (DHCP) provides configuration parameters to Internet

    hosts. DHCP consists of two components:

    A protocol for delivering host-specific configuration parameters from a DHCP server to a

    host

    A mechanism for allocation of network addresses to hosts.

    DHCP is built on a client-server model, where designated DHCP server hosts allocate network

    addresses and deliver configuration parameters to dynamically configured hosts.

    The diversity of hardware and protocol implementations in the Internet would preclude reliable

    operation if random hosts were allowed to respond to DHCP requests. For example, IP requires

    the setting of many parameters within the protocol implementation software. Because IP can beused on many dissimilar kinds of network hardware, values for those parameters cannot be

    guessed or assumed to have correct defaults. Also, distributed address allocation schemes depend

    on a polling or defense mechanism for discovery of addresses that are already in use. IP hosts may

    not always be able to defend their network addresses, so that such a distributed address allocation

    scheme cannot be guaranteed to avoid allocation of duplicate network addresses.

    There are two primary differences between DHCP and BOOTP:

    DHCP defines mechanisms through which clients can be assigned a network address for a

    fixed lease, allowing for serial reassignment of network addresses to different clients.

    DHCP provides the mechanism for a client to acquire all of the IP configuration

    parameters that it needs to operate.

  • 7/31/2019 Tcp Ip Services

    11/20

    Services provided by DHCP:

    The first service provided by DHCP is to provide persistent storage of network parameters for

    network clients. A client can query the DHCP service to retrieve its configuration parameters.

    The client interface to the configuration parameters repository consists of protocol messages to

    request configuration parameters and responses from the server carrying the configurationparameters.

    The second service provided by DHCP is the allocation of temporary or permanent nework (IP)

    addresses to hosts. The basic mechanism for the dynamic allocation of network addresses is

    simple: a client requests the use of an address for some period of time. The allocation mechanism

    (the collection of DHCP servers) guarantees not to reallocate that address within the requested

    time and attempts to return the same network address each time the client requests an address.

    The client may extend its lease with subsequent requests. The client may issue a message to

    release the address back to the server when the client no longer needs the address. The client may

    ask for a permanent assignment by asking for an infinite lease. Even when assigning permanent

    addresses, a server may choose to give out lengthy but not infinite leases to allow detection of thefact that the host has been retired.

    In some environments it is necessary to reassign network addresses due to exhaustion of available

    addresses. In such environments, the allocation mechanism reuses addresses whose lease has

    expired. The server should use whatever information is available in the configuration information

    repository to choose an address to reuse. For example, the server may choose the least recently

    assigned address. As a consistency check, the allocation mechanism may probe the reused

    address, with an ICMP echo request, before allocating the address, and the client will probe the

    newly received address with ARP.

    DHCP supports three mechanisms for IP address allocation:

    Automatic allocation

    DHCP assigns a permanent IP address to the host.

    Dynamic allocation

    DHCP assigns an IP address for a limited time period called a lease. Dynamic allocation

    allows reuse of the addresses that are no longer needed.

    Manual allocation

    The host's address is assigned by a network administrator.

    A particular network will use one or more of these mechanisms, depending on the policies of the

    network administrator.

    Dynamic allocation is the only one of the three mechanisms that allows automatic reuse of an

    address that is no longer needed by the host to which it was assigned. Thus, dynamic allocation is

    particularly useful for assigning an address to a host that will be connected to the network only

    temporarily or for sharing a limited pool of IP addresses among a group of hosts that do not need

  • 7/31/2019 Tcp Ip Services

    12/20

    permanent IP addresses. Dynamic allocation may also be a good choice for assigning an IP

    address to a new host being permanently connected to a network. This is important where IP

    addresses are sufficiently scarce and it is important to reclaim them when old hosts are retired.

    Manual allocation allows DHCP to be used to eliminate the error-prone process of manually

    configuring hosts with IP addresses in environments where (for whatever reasons) it is desirable

    to manage IP address assignment outside of the DHCP mechanisms.

    The AS/400 system has provided a DHCP server as a part of the Base Operating System. It is

    automatically installed as option 3 of the BOS (5769SS1 *BASE) during operating system

    installation. The DHCP integrated server in the AS/400 added the capability for the AS/400 to act

    either as a DHCP transaction server or as a BOOTP/DHCP Relay Agent. Since we have only one

    set of attributes associated with the DHCP server taht is *SERVER or *RELAY therefore it is

    not possible for a single system to assume the roles of a SERVER and a RELAY at the same

    time.

    The DHCP server accommodates the already existing BOOTP integrated server available in theearlier release of the OS/400 within itself and can perform all the functions specific to BOOTP in

    addition to all the added functionality a DHCP server is assumed to carry. There is, however, a

    downside to this scenario, that is , we cannnot run a BOOTP and a DHCP server at the same

    time on a single system. The reason for this is that DHCP is basically an extension of the BOOTP

    protocol and both of them use the same services of the TCP/IP stack i.e. port 67 and 68 to service

    the clients and almost the same message formats in the UDP packets therefore running both the

    servers on a single system yields unpredictable results. Due to the embedded nature of the DHCP

    server it can serve both DHCP clients and existing BOOTP clients. All the functions in BOOTP

    have a one-to-one mapping in DHCP; therefore, migrating from an existing BOOTP configuration

    to DHCP is completely transparent. DHCP is configured completely using the Operations

    Navigator interface which provides a migration wizard to migrate from an existing BOOTP setupto DHCP without any manual configurations or effort. However, you may not want to migrate

    from the BOOTP. Because you may want to assign IP addresses dynamically instead of statically

    (BOOTP), you do not keep the static relationship between hardware address and IP address.

    DHCP server has the capability to serve a complete range of clients including Windows 95/NT,

    network stations, and the latest of all the twinaxial network stations. Now the twinaxial network

    stations can participate in a TCP/IP network and assume an IP address that can put them directly

    6) DHCP Server assigns an IP address according to the pre-programmed

    rules

    1) DHCP Client powers up, and asks if DHCP Server exists via broadcast

    2) System responds with IP address of DHCP Server

    3) Client sends a DHCP Request packet to DHCP Server

    4) DHCP Server responds with a DHCP Offer packet

    5) Client send a DHCP ACK packet

  • 7/31/2019 Tcp Ip Services

    13/20

    on the Internet for Web browsing and similar functions. However DHCP server still lacks the

    capability to provide DHCP services to PPP and ISDN clients.

    Domain Name System (DNS)

    The AS/400 supports the Domain Name System server. The domain name server is used byapplications to translate domain names of hosts to IP addresses. The domain name server is the

    network naming service of intranets and the Internet.

    File Transfer Protocol (FTP)

    AS/400 TCP/IP provides client and server support for transferring files. FTP allows a user to

    transfer data between local and remote hosts. FTP is built on the services of TCP in the transport

    layer. FTP transfers files using either an ASCII or EBCDIC mode. ASCII mode is used to

    transfer data that contains only text characters.

    FTP provides functions such as listing the remote directories, changing the current remote

    directory, creating and removing the remote directories, and transferring one or more files in a

    singe request. In addition, FTP provides support for popular graphical FTP clients and Web

    server development tools via the UNIX-style directory listings and transferring of large integrated

    file system files (greater than 2 GB and upto 256 GB).

    HyperText Transfer Protocol (HTTP)

    The HTTP server provides World Wide Web browser clients access to AS/400 information and

    supplies a rich application deployment environment. In addition, the AS/400 HTTP server

    supports secure HTTP and multiple instances of the HTTP server running on one AS/400.

    Internet Daemon (INETD)

    The INETD super server eliminates the need for many individual servers to be up and running at

    all times waiting for incoming connections. Instead, the INETD listens for connections on a set of

    configured ports, and when a connection request is received, it decides to which service the port

    corresponds, and invokes a program to service the request. After the program is started, the

    INETD continues to listen on the port for additional requests. Essentially, INETD allows one

    running daemon to invoke serveral others, reducing the load on the system.

    Post Office Protocol Mail server (POP)

    The POP server is the AS/400 implementation of the POP version 3 mail interface. This server

    allows AS/400 systems to acts as POP servers for any clients that support the POP mail interface.

    One of the key benefits of the POP serveris that it allows users to exchange multimedia mail.

  • 7/31/2019 Tcp Ip Services

    14/20

    Remote Printing -- Line Printer Requester/Line Printer Daemon (LPR/LPD)

    AS/400 provides client and server support for remote printing. The client, line printer requester

    (LPR), allows the user to send spooled files to a remote system running a remote line printer

    daemon (LPD). This enables printing files remotely to any system that supports and is running an

    LPD. In turn, AS/400 also supports remote printing to its printers by being a remote printerserver using LPD.

    Route Daemon (RouteD)

    The route server provides support for the Routing Information Protocol (RIP) version 1 and

    version 2. Routing Information Protocol on the AS/400 is an Interior Gateway Protocol (IGP)used to assist TCP/IP in the routing of IP data packets.

    Remote Execution (REXEC)

    The remote execution server enables a client user to submit system commands to a remote server

    for processing.

    Simple Mail Transfer Protocol (SMTP)

    AS/400 provides support for the Simple Mail Transfer Protocol. SMTP enables the exchange of

    electronic mail between hosts running TCP/IP. The SMTP function on the AS/400 is coupled

    with the AS/400 SNA distribution services (SNADS). SNADS is part of the OS/400 operating

    system and it contains extensions to support SMTP. SNADS allows you to send mail to various

    types of users (not just SMTP users) with one consistent user interface. The distribution services

    (send, receive, and forward electronic mail) for the OfficeVision licensed program are provided bySNADS.

    Simple Network Management Protocol (SNMP)

    The AS/400 can be an SNMP agent in an SNMP network. That is, the AS/400 gathers

    information about the network and performs the management functions requested by some remote

    SNMP manager. The AS/400 TCP/IP SNMP provides the means for managing a TCP/IP

    environment. SNMP allows network management by elements, such as routers and hosts.

    Network elements act as servers and contain management agents that perform the management

    functions requested. Network management stations act as clients; they run the management

    applications that monitor and control the network. SNMP provides a means of communicatingbetween these elements and stations to send and receive information about network resources.

    SOCKS client

    The AS/400 SOCKS client support enables programs that use sockets such as AF_INET or

    SOCK_STREAM to communicate with server programs that run on systems outside a firewall.

  • 7/31/2019 Tcp Ip Services

    15/20

    In addition, by using SOCKS client support, both AS/400 FTP and AS/400 Telnet client

    connections can be directed through a firewall. The key advantage to AS/400 SOCKS client

    support is that it enables client applications to access a SOCKS server transparently without

    changing any client code. The SOCKS client support operates with any SOCKS server that

    supports version 4 SOCKS protocols.

    Telnet

    AS/400 provides client and server support that allows remote logon to hosts that support the

    Telnet 5250 protocol. The Telnet client supports both 5250 and 3270. In addition, the Telnet

    server supports Secure Sockets Layer (SSL) client requests for encrypted data flow. Telnetmakes your computer act like a mainframe computers workstation. In other words, when using

    Telnet, your computer (the client) pretends to be, or emulates, a terminal attached to the remote

    computer (the Telnet server).

    Trivial File Transfer Protocol (TFTP)

    TFTP is a protocol used to provide basic file transfers with no user authentication to and from a

    remote server. TFTP is used to support the IBM Network Station for AS/400 solution.

    5250 Work Station Gateway

    5250 HTML Workstation Gateway Server is an application that automatically transforms AS/400

    5250 applications to HTML. This server enables users to run AS/400 applications from any client

    supporting a Web browser.

    TCP/IP configuration

    IBM has intensified its focus on simplifying AS/400 TCP/IP administration tasks. The AS/400

    Operations Navigator that is free with each AS/400 contains the AS/400 graphical adminstration

    components. One of those key components is the TCP/IP network graphical admininstration

    component that contains wizards for initial setup called the EZ Setup wizard, as well as wizards

    and graphical user interfaces for day-to-day tasks.

    With the AS/400 Operations Navigator, TCP/IP administration, such as setting up TCP/IP and

    monitoring servers, is easier than ever. A Network folder has been added to the Operations

    Navigator hierarchy, as shown below, to host the new TCP/IP administration functions. Thesegraphical user interfaces are the foundation for configuring AS/400 e-business solutions.

  • 7/31/2019 Tcp Ip Services

    16/20

    Figure 2. TCP/IP graphical administration

    In the Network folder, a Protocols subfolder contains the TCP/IP protocol object. From this

    object, TCP/IP interfaces and the TCP/IP protocol can be administered. TCP/IP interfaces to the

    AS/400 can be set up through a wizard.

    The New Interface wizard creates LAN, WAN, and inbound load balancing interfaces. It guides

    you through all of the steps necessary to create a TCP/IP interface, such as:

    Chooses your communication type

    Choose the hardware

    Select a line or create a new line on the hardware

    Set up the IP address information for the interface

    Set up any gateways and routing information

    Set up the host and domain information for the interface

    Test the interface to verify everything is working as planned

    Once configured, managing your interfaces is easy through the Interfaces window, which allowsyou to start, stop, change, or delete the interfaces.

    The administration of TCP/IP properties, shown in figure 3, is easy since all of the attributes have

    been integrated into a single dialog containing pages for each category as shown below. The

    categories include: host and domain information, host table management, TCP/IP protocol

    settings, TCP/IP port restriction management, AS/400 servers to start when TCP/IP is started,

    and SOCKs client management.

  • 7/31/2019 Tcp Ip Services

    17/20

    Figure 3. TCP/IP graphical administration

    Administration of AS/400 server applications

    Managing your network servers has never been easier using Operations Navigator. In

    the servers subfolder under the network folder, you can monitor the status of the servers, start or

    stop them, and set their attributes. Also, with a simple click, you can set up a server to start

    automatically every time TCP/IP is started. You can manage this through each individual server

    or administer this for all servers in the TCP/IP properties.

    For example, DHCP and DNS both have powerful graphical user interfaces that include wizards

    to simplify their initial setup.

    The DHCP Configuration wizard allows you to migrate existing BOOTP client information and

    configure IBM network stations easily. Once you have set up the DHCP server, you can view

    and change the configuration using the graphical user interface shown in figure 4. The subnets,

    classes, and clients being served, as well as their options, are all presented in one window. For

  • 7/31/2019 Tcp Ip Services

    18/20

    instance, when you click on a subnet in the left pane, all of the classes and clients within the

    subnet are shown in the upper right pane. The locally scoped and inherited options, information

    delivered to all clients within the subnet, are shown in the lower right pane. This provides a quick

    and easy way to manage DHCP information. In addition, the user interface also supports

    configuring DHCP in relay agent mode.

    Figure 4. DHCP server configuration

  • 7/31/2019 Tcp Ip Services

    19/20

    Similar to DHCP, a DNS Setup wizard is included for the initial configuration of the DNS server

    with primary or secondary domains. After setting up the server, you can easily add more primary

    or secondary domains to manage and also add additional hosts to serve. Creating primary

    domains has a nice feature that gives the ability to automatically create reverse domains so that

    when hosts are added into a primary domain they are automatically added to the reverse domain.

    This is a significant time-saver when managing large networks that require reverse mappingdomains. Unlike the DNS administration on Windows NT, the AS/400 DNS administration is

    structured to give a view of the domains it is serving instead of a view of the DNS records that

    make up the DNS servers configuration. This provides a very intuitive user interface for

    managing and monitoring the DNS server. For an active DNS server, the servers statistics and

    active database can also be viewed. This is shown in the DNS configuration screen in figure 5.

    Figure 5. DNS server configuration

    Remote Access Administration

    The AS/400s remote access is administered in the Point-to-Point subfolder under Network.

    Point-to-Point communication profiles and modems can now be created, monitored, and

    maintained for both SLIP and PPP. Switched and leased line dial-in and dial-out communication

    profiles using analog or ISDN modems can simply be created using a single dialog. For instance,

    using Operations Navigator, you can set up the point-to-point communication for mobile users to

    get access to e-mail on AS/400 while out of the office. Also, you can use point-to-point to allow

    connection to the Internet through AS/400. All you need to do is set up a dial-out

    communication profile for AS/400 to call the Internet Service Provider (ISP) which would

    provide the link to the internet. All of the setup is through the new graphical user interface for

    Remote Access.

  • 7/31/2019 Tcp Ip Services

    20/20

    Conclusion

    As discussed in this article, AS/400 integrates a rich set of TCP/IP functions and related

    technologies. AS/400 delivers a robust, complete, and fully integrated TCP/IP suite that is

    leading edge, standards-based, and enterprise class for an e-business advantage.

    References

    AS/400 Books:

    TCP/IP Configuration and Reference Guide SC41-5430

    AS/400 Redbooks:

    Cool Title About the AS/400 and the Internet SG24-4815

    Home Pages:

    Secureway http://www.ibm.com/security