FUTURE ARCHITECTURE: AGENCY WORK GROUP COMPUTING

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP89G00643R000900130008-6
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
19
Document Creation Date: 
December 23, 2016
Document Release Date: 
December 5, 2011
Sequence Number: 
8
Case Number: 
Content Type: 
MISC
File: 
AttachmentSize
PDF icon CIA-RDP89G00643R000900130008-6.pdf1.49 MB
Body: 
Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 FROM: Edward J. Maloney STAT D/OIT STAT ROUTING AND RECORD SHEET SUBJECT: (Optional) EXTENSION No. DD A f9 ist DATE 8 Oct 87 TO: (Officer designation, room number, and building) DATE OFFICER'S COMMENTS (Number each comment to show from whom RECEIVED FORWARDED INITIALS to whom. Draw a line across column after each comment.) 1. DDA EXA .1 Room 7D18 HQS O J' r Bill: , % 2. It 4 0 C IV 19871 Attached are two documents pQ~ for you to read. The first is a draft of a paper describing 3. future architecture in the computing area. This is the one I mentioned to you on Monday in 4. our one-on-one session. Actually, it talks about one portion of the network dealing with work rou 5 g p computing. It is not global network architecture, but, nevertheless shows significant 6. , new thinking on the subject, at least for our organization. 7. The second paper is a copy of a memorandum talking about the diskless PC Work is underwa 8. . y. We are working closely with IMS and it looks as though something useful ma come of this y . 9. I appreciate any comments ou mi ht h ve o ith b h y g a n e er or ot 10. subjects. 11. J M l . oney a . 12. 13. 14. 15. F1.ORM79 EDITION 610 USE PREVIOUSS Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 Future Architecture: Agency Work Group Computing Summary A concept for a new architecture for the Agency's work environment is proposed as an evolutionary replacement for the existing mix of clustered word processing and centrally provided interactive services. The concept emphasizes use of commercial technology and the need for a gradual migration of new systems into the workplace. The proposed architecture migrates as much as possible of the work down to the work group level, retaining central services as a backbone network, a database repository, and a base for transaction-oriented central services. By migrating in this direction in a timely manner, growth in central computer resources can be redirected away from attempting to keep up with demands in personal, interactive computing and toward more naturally centralized services. A more effective balance between work group computing and central processing is the goal._7 The proposed architecture consists of personal computers as workstations with a small local area network for each physically co-located work group. The small LAN would include a file server, communications server, print server and be managed by customer personnel. Restricting the size and scope of the LAN to a physically secure area is essential to eliminating otherwise intractable security problems. The small LANs are connected as necessary either to mainframe systems for central service or, via bridges, between LANs The interface between the worker and any other system is mediated by the PCs. Those customers who do not have PCs will continue to see the current services, and the older systems will interface with the new architecture at regular points so as to allow a mixed population of old versus new environments during transition. The central VM systems will remain as general computing resources to which the PC users have 3270 terminal access and will continue to serve as the "personal computer" for customers who do not have PCs or LANs needed to participate in the new architecture. It will be assumed that the connections between the work group computing systems and central systems use a minimum number of interfaces that can be adapted as technology changes, and these interfaces can use standards as they emerge to assist in allowin changes in component parts of the overall system without major redesign .F In many ways, the architecture is not entirely new. Many of the ideas have been proposed previously and discussed broadly within the Agency. Extensive prototyping of an analyst's work environment has been done in efforts by both the DI and DDS&T. Most of these efforts have focused on comparatively high end workstations with substantial coding investment, connected to each other via a local area network. Essentially what is proposed is to provide this sort of capability on a broader base of more commercial technology, answering various security and connectivity questions, and extending the applicability of the architecture into new areas. The architecture is just that, an overall plan to guide the design of systems. The intent is to provide a commodity system for delivery of the services of common concern for which OIT is primarily responsible. It is not an answer for specific customer requirements; it is a technological and conceptual base onto which development organizations a expected to add value in producing customer-oriented specific solutions 25X1 25X1 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 Background To explain the architecture, it is most instructive to see how it applies to providing gradual replacements for the OIT services as provided today. The most visible of these services are the cable handling systems, data base services and applications, the VM interactive services, the AIM system, and applications built on AIM, including SAFE. OIT also provides terminal and PC services, and clustered word processing equipment and services. All of these services are affected in some way by the proposal. F7 The historical OIT architecture has employed VM front end user interface machines, with back end MVS data base and batch processing engines. More specifically, the MVS back end for SAFE handles cable receipt and dissemination, retrospective search of cables, and updates and queries of private index files, which are cables that the analysts save with keywords. The VM front end provides the man-machine interface, electronic mail, composition, coordination and printing. These services are provided basically by the AIM system, with interfaces to the cables being provided by applications software unique to SAFE. The architecture was designed so that the personal computing of the OIT customer was done on VM, with an intelligent, but non-programmable terminal on the desk. F-1 The older architecture has not yet evolved to take significant advantage of newer trends, specifically the "PC revolution". For many reasons, the direction for some time has been away from merely intelligent terminals to fully programmable workstations. The concept of a person's work environment has to expand to include the local processing capabilities and files inherent in this migration to PC capabilities. Long standing requirements for better user interfaces to services, more graphical displays, more text processing functionality, higher availability, and more customer control can all be addressed when terminals give way to workstations. PCs are now available and inexpensive enough to become the standard workstation in place of mere terminals. But PCs can do a great deal more than just act as terminals, and the challenge is to take the next step and use them as a base for more than just an unintegrated combination in one box of standalone personal computing and terminal-oriented host access. The inherent power of PCs to provide interfaces between customers and systems and to provide services complementary to central services begs to be exploited. With PCs as the basic building block of an architecture, customers and devleopers can provide solutions well matched for specific environments, ranging from secretarial work up through complex analytical tasks.F__1 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 Design The following design is proposed as a strawman. A sampling of products will be called out and an attempt made to design a basic system by interfacing these products together with existing OIT services. Actual selection and procurement or products and the integration are all engineering and development activities that would have to be performed if the concept is successfully prototyped and accepted. The goal in this discussion is to exhibit feasibility and identify minimally qualifying implementations of the architecture, not necessarily the best ones.F__1 Equipment: On each person's desk, an IBM PC/AT or upward compatible machine (generic Intel 80286 or 80386 processor, including PS/2 models 50 or higher) with as much speed and screen resolution as can be afforded (1280 pixels wide is available and desirable). An acquisition is being conducted by OIT to supply a source for such equipment. Each individual's PC would have a mouse, LAN adapter card and, optionally, a floppy disk drive modified to be read-only. In vaulted areas, the PCs could also have internal hard disks for software and working storage. The role of the LAN, the floppy disks, and the hard disks will be discussed later. For at least a transitional period, each PC should also have a 3270 communications card and attach to the PBX for interactive host access. Theoretically, with the right LAN products, host access can also be achieved via a communications server on the LAN, but the PBX phone access has some advantages for the moment, especially for LANs other than IBM's Token Ring. The LAN-based communications server is an alternative path which might in the future offer some performance or functionality not available via the PBX. For 25X1 offices outside of the headquarters i.e. where Intecom PBX connectivity is not available, use of a LAN-based communications server is an attractive alternative to using coax connections to a 3174 remote cluster controller and should be considered from the very beginning. Two specific LAN configurations and products should be supported if at all possible. One is an Ethernet LAN, built from 3COM Etherlink Plus cards or competitive products (Ungermann Bass), but running Novell's Advanced Netware. Novell has by far the best network software and market share and can include excellent security, reliability, fault tolerance, automatic backup and other features which we really should require from the architecture. The other configuration is IBM's Token Ring. For offices with 3270 PC/AT or PS/2's, this is the only real option currently. A hybrid network, running Novell software on the IBM token ring network hardware should also work. This is the best choice for "hedging" one's bet and would be what a pilot office should be wired for unless specific Ethernet requirements are identified. In the near future, a new LAN manager product from Microsoft (the OS/2 LAN Manager) promises to be competitive with Novell and yet stay more within the IBM family of supported products. When available, the OS/2 LAN Manager would be evaluated as a competitor. Wiring would then consist of data grade (equivalent to IBM Type 1) copper wire. In the old headquarters building, for example, this would be run inside Panduit-type covered cable runs along the inside walls and ceiling areas of a vaulted area to a chosen point where the actual network is formed by joining SECRET Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 the individual wires together via an IBM Token Ring junction box (MAU). In the new headquarters building, these runs can be made under the floors even more easily. Either-at the central connection point or in a separate "computer equipment room" (CER) such as where the Wang Alliances sit, the LAN server is placed and wired to the central point. This wire run, and only this one, might be through the building's secure grid of either copper or fiber, depending on distance. It is desirable to physically isolate the LAN server from the office and only allow physical access to it by the system's administrator, as is done for the Wangs. All of the equipment proposed is normal PC hardware, suitable for desk tops in office environments. All of it is customer owned and operated 25X1 and located in customer areas, so this is mandatory. The LAN file server has enough disks to support the customer population, with sizes of 300MB being typical. The file server would best be either a 386-based or OS/2 compatible machine optimally configured for the task. A Novell LAN server can be configured to be fault tolerant, including automatically double-writing all disks and automatic back-up to tape. It has the best "security" access logs and permission control by the systems administrator, and actually has enough security access control to consider putting the server in the customer's vaulted area instead of a separate CER. If the OS/2 LAN Manager can do all this as well, it might be preferable to Novell since it is an avenue for future growth of applications on the file server. The print server has a high quality laser printer capable of desktop publishing. The PC acting as print server may also be able to double as a communications server. It needs to be only a regular PC/AT or PS/2 machine just like the general desk-top model. As the communications server, it provides alternate path host access via an SNA link. For a TRN network, this "alternate" link can be via a TRN "spur" all the way to a mainframe channel-attached 3174 controller at 4 Mbps (probably increasing to 16Mbps soon) without even involving the communications server. Thus TRN networks with this kind of spur may supplant the need for PBX connections unless the customer has needs to access various systems (like CAMS or DESIST) that can be reached via the PBX but not via the SNA network that includes the internal Agency systems. The interoperability of such a TRN connection and Novell LAN software is currently unknown, however, which is another reason why parallel investigation of operating over a more IBM compatible network (IBM LAN software based on 25X1 Microsoft LAN technology) is desirable. The main reason for the communications server is NOT to provide mainframe interactive access unless it is better than other paths (like the PBX) for this in a particular situation. The communications server is primarily there to provide store and forward exchange of data between the LAN and other LANs or mainframe systems. For this purpose, it needs one or more communications adapters. The desire has been expressed in some environments to have direct LAN-to-LAN exchange of items without any mainframe dependencies at all. The communications servers can form a network of their own using a variety of links, ranging from just asynchronous RS232 lines to complex LAN gateway products. The requirements for LAN-to-LAN mail exchange need to be validated and products selected to accomplish it. It is by no means clear that exchange through a central OIT server is not the best solution, using a processor with high availability for this task. Investigation of LAN gateways should be pursued for other reasons, since there will be requirements for larger logical SECRET Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 LANs than one physical LAN wire can accommodate. Physically secured LAN gateways may offer adequate compartmentation security to link two local work group LANs without allowing customers on one to access data on the other. 25X1 Enough research is required in this area that using separate LANs with mainframe hubs represents a conservative, interim architecture, however. The most important interfaces for the new architecture will be those between the communications server and the mainframe. There may be several such interfaces depending on the requirements for a particular environment. The PC LAN architecture base can exist without any host links at all, in which case it can serve as a replacement for stand-alone, clustered word processing systems. Links can obviously be added for other purposes, including mainframe interactive access (3270) as discussed above. The less obvious links are those which provide transfer of information, specifically files of data -- documents, data bases, pictures, or anything else. There is a great deal of hyperbole about distributed data bases and remote file access protocols and other advanced communications concepts. The proposed architecture is designed to be open for these possibilities as they mature, but these concepts generally assume high speed, dedicated communications and a great deal of very complex network functionality. The design objectives for the proposed architecture are that it scale down to situations where there are relatively slow speed or non-dedicated (switched) circuits, including the particularly slow speeds characterizing the Agency's overseas network. For this reason, the only interfaces presumed between the LAN and a host are an electronic mail one plus an interactive 3270 link if needed for specific requirements. Electronic mail in this instance is defined as the directed transmission of electronic objects, of whatever internal form, between the filing systems of one computer system and another. The transmission is assumed to be non-synchronous in nature; i.e. the origination and destination systems do not have to be both up and communicating with each other on a real-time basis. The model for transfer of information is a "store and forward" network. The sending and receiving customers never see the transmission process directly -- it is all done in the background. The actual mechanism is a link between an electronic mail system on the LAN and a host mail server. One method for this is a synchronous communications adapter that can support SDLC/LU6.2 protocols using "program-to-program" communications. The prime candidate for use as the backbone mail mechanism is the SNA Distribution Services (SNADS), with cable formats being an alternative for the overseas environment where re-use of our The user interface to the entire system should be based on a graphical presentation. The migration path for achieving this has been identified by Microsoft and it is to use Windows now and later Windows 2 for DOS 3.x. When OS/2 1.1 with the presentation manager becomes desirable, code can migrate to it. The LAN enables a mix DOS and OS/2 machines so this choice can be deferred. The LAN has to provide the office environment for the customer -- the files, word processing, desk-top publishing, shared authorship/coordination, calendaring, printing, etc. The actual production files should be on a LAN file server, which provides virtual DOS disks with the advantage of being able to share them between customers. By the time this existing network facilities is required at least for transition. Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 environment goes into production, I would expect to have a Windows version of MS Word as the answer to both word processing and desktop publishing sufficient for the Agency's needs. A few offices may also want Aldus Pagemaker, but only for the specialists such as in CPAS. Some standards are emerging in the field of electronic printing, and it should be possible to transmit finished copy in electronic form from its origination to publication. Windows EXCEL should also be available to provide spread sheets compatible with the rest of the Windows suite, although some use of Lotus 1-2-3 will remain, along with plenty,of other non-Windows applications that can still be used on the same equipment. The critical new software is that which defines the precise nature of the user interface to the electronic mail backbone. The electronic mail interface has to support communication of documents and other electronic objects between people on different LANs, between AIM and the PC LANs, between departmental systems that are part of this environment at the interface level (SNADS), and between all of these and the cable systems, including the SAFE dissemination and retrospective search capabilities. The electronic mail products and interfaces on the hosts and between the hosts and departmental systems are already determined -- AIM for the VM interactive, "dumb terminal" customer, and SNADS mail services for the departmental systems, including an AIM Gateway. The missing piece to form the basis for these services in the new architecture is an electronic mail and filing environment on the LAN. It turns out that this requirement can largely met by just using DOS files and subdirectory structures along with conventions and a bit of software glue. A prototype of this sort of system is th " " project implemented for CPAS and the Intelligence Community by OIT/SAD&E. With relatively little effort (compared to most SAFE development at least), this could be expanded into a usable environment. However, there are commercially available electronic mail systems for PC LANs, and some of these merit investigation to see if they offer any functionality that customers desire. Potential candidates are such things as "The Coordinator", which offers an action tracking model of paper work flow; "3+Mail", which offers a SNADS gateway product; and "DaVinci", which offers a Windows-based presentation interface. Certainly, nothing evident in the market offers all the functionality for all customers in all of our unique environments -- especially not the overseas environment where interfaces may only be via cables, and none of these products does all that AIM does, for example. It is clear that to meet s requirements, some integration and development will be required. Fleshing out these interfaces is the bulk of the difficult work involved in even prototyping these systems with anything like the full-up interfaces. Due to the variety of customer interface needs and the variety in backbone transmission systems, development of a layered model for implementing the pieces independently is required. The recommended approach is to start with a simple Windows-based presentation interface, with a communications server process just picking up mail as DOS files from customers' libraries and doing the real transmission either via a commercial interface to a SNADS product or private protocols such as ca to a communications terminal (the access point to the cable network). Back on the mainframe side, the software effort consists of re-casting the necessary services into the form of background electronic mail. Almost any SECRET Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 service can be provided on a backbone of electronic mail, including data base updates and queries based on transactions. Some applications are more difficult to design in this fashion than others, and the turn around time required for a transaction is an critical design driver. Applications which can be designed to need slow turnaround can be made available across the widest range of networks and with high fault tolerance for temporary outages, while applications that insist on using instant response designs are much more restrictive and demand high availability, high speed networks. The most obvious service to be recast as background transactions is electronic mail itself, although OIT currently provides it as an interactive service on VM (AIM). Work is already in progress to connect the central-storage/interactive access model of electronic mail as provided by AIM to departmental computer systems with SNADS and some bridge software from a commercial vendor (Softswitch). This may well be the basis for connecting to PC LAN systems as well. But, there is a middle ground of PCs that are not on LANs but do have host connections, or small PC' LANs where dedicating a communications server may not be cost effective. Thus the design should allow an alternate connection scheme wherein solitary PCs can enjoy background electronic mail transfer. This design would be prototyped as a background link from a PC task (under Windows) to VM to get mail via AIM, with the customer just being prompted for passwords when necessary but never seeing the AIM interactive screens. Basic support for this sort of transaction-oriented interface to AIM is already beginning as part of the effort to make it easier to transfer documents and use 25X1 PC-based word processors with AIM. 25X1 25X1 Concept of Operation The following is a discussion of the concept of operation and the division of labor between the mainframes and PCs. One of the major services that has to be redesigned for this architecture is the delivery of cables, so this will be the illustration for the concept. There are actually several cable delivery environments, but the key for this discussion is that all of these environments are really amenable to treatment as electronic mail systems. The customer at the end of the process should receive and originate cables as one more form of electronic mail if this architecture is to be fully successful. The three communications and local processing environments to be discussed are overseas, on departmental systems, and on the SAFE-like systems. In the overseas environment, cable origination and receipt should look to the customer, to the extent possible, the same as for for all the other environments. Cables are sent through an authorization chain and eventually released by having a releasing authority "mail" them to the communications network. In practice today, that final step is usually done by printing a copy and conveying it to a communicator, although prototype direct electronic links (CRAFT to TERP) have been made. Conversely, cable traffic coming in to a station could be delivered electronically from the communications terminal to the file system in use for office automation in the station. Whether all the traffic would go to a records officer for distribution or be disseminated to a lower level automatically, at least sorted out between administrative and operational traffic, is a decision to be made by customers. The technology allows for such processing. 4FrRRT Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 within secure space. Other forms of encryption (CCEP encrypted Ethernet) are also likely to be available by the time this can be deployed, which is especially attractive given th DE MicroVax base for ET, the next generation 25X1 of communications terminals. For departmental computer systems, such as employed today within the DDS&T especially, another level of cable interfaces is part of the architecture. OIT/EG has in progress a project to support the DDS&T systems, specifically the new FBIS VAX systems (AFS) and some Wang VS systems. The goal is to supply cables electrically to these systems and to permit two-way exchange of electronic mail between their electronic mail networks and AIM over the same links and under the same basic architecture. This project employs the AIM SNADS gateway and a commercial store and forward mail system on MVS (Softswitch). Additional software is in progress to route incoming cables that CDS and Mfg' have marked as being for the DDS&T offices over to the Softswitch hub with appropriate routing indicators. Under this architecture, OIT systems have done only top level dissemination down to offices, and the departmental systems, under customer control, are responsible for any further handling and 25X1 for all local processing. For SAFE systems, OIT systems carry the dissemination process all the way down to the personal level. Each SAFE customer can specify interest profiles to serve as a filter against all incoming cables that the particular SAFE system sees. (The DI SAFE system sees a different selection of cables than the DO SAFE due to the top level dissemination done in CDS/MHF to separate operational traffic out for DO-only consumption.) In the current Delivery 3 SAFE, cables are disseminated to customers via mail files, which are created on MVS but accessed from VM by SAFE-specific software running as a context under AIM. The cables are also indexed by words and stored for retrospective retrievals. Regardless of what one thinks "SAFE" is or should become, under the proposed architecture, it is clear that one wants to profile and disseminate incoming cables and other intelligence source data down to individuals in their local computing environment. The simplest migration for the full cable dissemination process into the new architecture is that the MVS SAFE systems would continue to do the cable dissemination via profiling as is done today. No apparent need to re-host this process is evident, although a highly parallel processor could theoretically do it all faster. Likewise, the retrospective data base of cables is basically fine where it is today (in INQUIRE on the MVS processor), but could migrate to a back end data base machine (such as a Teradata) if the processing requirements continue beyond the cost effectiveness of the IBM architecture. The MVS processor can serve as the host for the store and 25X1 forward mail hub. The VM processor would continue to be the "personal computers" for people with simple interactive terminals (Delta Datas or 3270 devices when Delivery 3.5 is completed). For this population, SAFE Delivery 3.x code continues as is. VM continues to be the host for the AIM system for such people, and communicates with the other AIM systems in the Agency. The bridge between the AIM systems and the LANs and all other "departmental" sorts of systems would be via the planned AIM Gateway to the MVS server, an LU6.2 SNADS link. PC customers migrating to the new architecture, however, would start to receive both AIM 4Fr R FT Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 mail and cables disseminated from the MVS SAFE profiling systems on the PC LAN. This mail and cable traffic will have been forwarded to the LAN and reside on the LAN file server in the PC user's mailbox on a continuous, background basis. The distinction between AIM mail and cables should be largely eliminated, although they should have different "categories" or action types associated with them so the recipient can choose which he wants to review at any one time. Once the mail or AIM file has arrived on the LAN servers, it is deleted from the host side. The decision to retain things and provide the storage for them becomes the responsibility of the customer office entirely. Only the retrospective cable file and the AIM documents actively in use by AIM customers remain on the hosts along with other central data bases as needed. In actual implementation, the MVS dissemination process would still produce mail files of hits to be kept for 30 days. A new process would recognize that certain mailfiles are being followed by recipients who are served on LANs rather than as direct interactive customers. The new cables added to these mail files would be "mailed" down to the individuals via their LAN communications server, along with any AIM mail addressed to them and via the same links. Some optimization for multiple people on the same LAN getting a hit on the same cable is possible, but needn't be implemented for prototyping. The process of updating profiles is already based on electronic mail under AIM and can be migrated over to PC mail in a fairly obvious fashion. PC software to create, edit apd act e profiles would have to be developed, and tools to help do so exist. Retrospective searching of the combined document file (the set of all cables ever received from a certain date onwards), and even of the mail files (since they continue to exist on the host for 30 days) is an interesting design issue. In the interactive SAFE Delivery 3.1, search response is nearly immediate via direct connections to INQUIRE. In Delivery 2 SAFE and normal AIM, a different kind of SEARCH was was used for "SAVE" files. The AIM search process uses an "electronic mail" interface, with response coming back significantly later via a return message and a folder of hits. This interface of mailed-in queries and mailed-back responses could be the model for the proposed architecture, but there are problems to be resolved. In the new architecture, a retrospective search that produced a lot of hits would be a big problem if the hits had to come down the communications channel to be reviewed. Limiting the number of "hits" would be mandatory. An alternative is to establish a more interactive connection to a searching task and review the hits without "mailing" them down to the LAN. For example, one could have the analyst "log on" directly to an application like Delivery 1's "TEXT" that actually called INQUIRE under the covers to do retrospective search. The analyst could then request any given "hit" or list of "hits" to be be brought down to the PC for use in composing a report, for example. Choosing between these models, or finding others, is a area to be worked. Clearly for extension of the concepts into the overseas or other remote locations, the electronic mail model is adaptable where the interactive model is not. There many other data base functions that the architecture would allow to be handled as electronic mail requests, such as DO name traces if security constraints could be met. Likewise, there may be other needs to use direct interactive queries when transaction-oriented interfaces are less useful SECRET Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 Outgoing cables are another interesting area that the architecture needs to address. Presumably, all cable composition and branch-level coordination occurs on the LAN. However, the LANs and electronic mail interfaces can all be available well before all the issues of electronic cable origination can be worked out. The hardcopy channels for submitting outgoing cables should be maintained for some period, and installations of LANs shouldn't await resolution of the cable origination issues. Given the high desirability of a laser printer on the LAN anyway, one of the requirements for equipment selection of the actual printer hardware should be the ability to produce hard copy cables that can be accepted by the OIT cable systems. Even later, it should still be the case that one should never have to assume that ones mainframe interfaces are up in order to produce and get a cable out. However, if the mainframe interface is available, by the same token, one should never have to print a hard copy. The software that produces the cable locally should adapt to being able to address it out to the mail system and hence out to the cable network. The reason for caution in promising this capability in early implementations is that the process of coordinating, authenticating and releasing a cable is probably not commercially available on LAN-based mail system in a "trusted" way. Unlike AIM, sending a document through a train of people and being able to guarantee that it has gone through them is not a feature of any distributed mail system known. It may be possible to recognize safely that a single individual on the LAN is the one who actually forwarded the cable up to the host, but that is about all one can expect to get commercially. In instances where that individual has releasing authority, cables could be originated all electronically and actually sent out, but this needs to be investigated a great deal more before electronic cable origination from LANs, or any other departmental computer schemes, can be considered feasible. Stand-alone or Remote Use One of the main advantages of the new architecture is that, so long as applications stay away from requiring interactive 3270 access, it does not require that the mainframe systems be constantly available. They only have to be up long enough, often enough, to get the "mail" through in a timely fashion. If the LAN mail software has alternate routing capabilities for LAN-to-LAN transfer, the availability of the mainframes is further de-emphasized. Note that for the LAN-based customer, no VM availability at all is required in the long run. The link from the LAN to the mainframe mail server can be of relatively low bandwidth if it is available most of the 24 hour day. It need only keep up with the arrival rate of mail and cables (but does have to account for the retrospective search burst arrival possibility). Statistics on how many analysts are in a physically co-located area and how many cable hits they generate in total are needed to see how much bandwidth is required, but it would be surprising if more than a 9600 baud link per LAN were needed to provide "same hour" delivery as required by SAFE for cables. Thus the architecture is not limited to headquarters environments with high bandwidths to the hosts.F__~ As mentioned, it is even possible to use the same architecture where there are no host links at all. The LAN, the PCs, the cable authoring software, and the office coordination tasks all function independently of any mainframe services. The same systems, subject to EMI security criteria, could be installed in SECRET Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 headquarters, remote outbuildings and even the foreign field. The goal of skills portability and symmetry of systems as embodied in the DO's DOLPHIN concepts is met-by this architecture. The capacity of this architecture to replace CRAFT seems obvious. The installation problems are fundamentally the same for LANs as for an Alliance system, but the PCs and the LANs offer a more open architecture. This offers distinctly more possibilities for taking the next step and directly hooking the communications server to an interface to the narrative message network in the field in lieu of the MVS mail server in headquarters, but making it look basically the same to the end customer -- a mail interface. The problem of cable releasing authority still exists, but in the field environment may be more tractable where a single releasing authority, such as the Chief of Station,is more the rule. Over time, the mail metaphor may aid the eventual migration of the narrative networks and the data networks into integrated systems so that the headquarters and field customers really do have the same interfaces. Looking at mailed transactions for retrospective cable searches leads to thinking about such transactions for other data base queries such as name traces where the query might be sent not to a data base but to a person who could access data and rapidly transform the results back into a mailed response without compromising the security of the data base itself. Likewise, the objects being mailed should not be restricted to just narrative messages. Current PC technology allows mailing of images, for example, so the capacity to use electronic mail in lieu of facsimile is present. Putting in a network of PCs doing store and forward mail rather than fax machines with dedicated circuits seems quite 25X1 desirable. Similarly, whether for headquarters or remote customers, there is no reason to assume that there is just one central server for cable searches or anything else. The distributed model makes multiple back end systems more feasible and allows for east in or oration of new data base engines or even alternate 25X1 computer sites p Two Tiers vs. Three The proposed architecture can be characterized as "two tier" in that the processing resides in the PCs and on the mainframe. The file server on the LAN is just another PC providing shared disk access and maintenance. It is not a general purpose timesharing service, nor need it run any data base systems or multi-user software. It can be regarded as just a smart, more securable, disk drive in place of having disks on each PC. The electronic mail system doesn't really run on the server in the sense that customers log on and use it. It is the communications task that is doing the mail work -- the rest is done by software in each PC accessing shared files on the server. This is in contrast to the "three tier" departmental computing model, where there are significant applications running on the office-level system and customers log on to the departmental machine to use it as a computer. On a LAN, customers enter a password En hP ?hle to get to their disks, but that's the extent of the log on process. The architecture would certainly allow for a departmental computer as part of the LAN, but there appears to be no requirement for it when just considering the core services provided by OIT. If the level of office automation provided SECRET Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 by the combination of PCs and a mail system is not sufficient for some reason, then use of a "departmental" system as a file server plus local log on computing can be employed where necessary. However, the burden on the customer office in running a departmental system as opposed to a LAN alone is sufficiently high to design the future, commonly installed and supported OIT system to consist of only two tiers. One of the main features of the new architecture is that customer offices operate their local computing, including the LAN and its servers. A systems administrator, similar to the administrators now used for Wang Alliances, must be provided by the customer office. In the two tier model, the LAN and its servers are just more PCs and represent the minimum impact on the customer, whereas departmental computers are generally associated with higher skill levels and effort in systems administration. The philosophy in proposing a commodity architecture based on PCs and small LANs is to provide the most return with the least investment in manpower, equipment and support costs. If customer offices have multi-user applications or data bases that cannot run on PCs, then they can add departmental machines to their'LANs and use them as necessary.- The proposed architecture does have the attribute that IBM compatible workstations are presumed. Other workstations that could coexist on the same LAN and use the same file server and file structures and the same LAN-based mail package could be envisioned, but they do not exist in practice. Developing any code at all on the workstation (such a creating cables) or in the communications server will mean a lock in not to a particular piece of hardware, but to a particular operating system environment, namely DOS and, later, OS/2. Implementing the architecture for multiple workstation types is not a trivial, and perhaps even an impossible, task and is not envisioned. If the Agency cannot choose a single operating system environment for workstations that are to participate in future, widely applicable, OIT-supported systems and services, then a substantial delay in implementation is required, and a reduction in function to absolutely minimal interfaces is essentially unavoidable. Although cooperative processing models and transactions all may become standard commodities, once applications are designed at the workstation level to use these standardized interfaces, then the issue is not standards but program portability. And the portability of full scale, complex applications including communications, graphic user interfaces, mail systems and data bases from IBM (Windows) to Apple (Macintosh), for example, is essentially a matter starting over at the design phase, regardless of whether the code is written here or procured commercially. There can be no half measures at this point; making a choice and living with it are required. Data Bases So far in the discussion, the only data bases implied were the electronic mail files on the PCs (physically on the file server, but logically appearing as files to the PC), the retrospective cable file, and 30-day mail files (the latter two on the hosts). There are many many more data base requirements. Each of these requirements has to be examined in light of the new architecture proposed to see what makes sense to do and where to do it. Clearly, the sort of private data bases held today on VM minidisks are the easiest to envision as being on the PCs and LANs instead. At the other end of the spectrum, the corporate data program will continue to represent holdings that are of interest Agency wide as central data bases. Only the customer interfaces to these SECRET Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 systems is open to change, starting with 3270 interactive access and perhaps moving in some instances to mailing updates and getting back reports. These are issues for the corporate customers and dew rs to work, not fundamentally driven by the architecture. In the middle ground, however, there are no easy choices. Trends in technology point to rapid growth in data base capabilities, particularly in the area of relational data bases using the SQL interface, a common standard which has been embraced by OIT as a standard. One of the promises of this technology is distributed data bases, which implies that portions of the data needed by a customer can live on different machines at different levels in the architecture and yet be used as one resource, without the customer being involved in the details. Unfortunately, much of this is hyperbole and promise. Furthermore, it generally presumes high speed real-time links employing advanced program-to-program communications protocols which are unrealistic in many environments. Systems designed with distributed data bases at this time should be regarded as research and development and are not generally applicable as a commodity architecture. Eventually, this technology will offer substantial benefits, probably in viewing host data bases using user-friendly PC systems. These front-ending approaches already exist in some cases as ad hoc products, not part of a distributed data base architecture. Thus one has to design for the moment for either data bases held locally on the PCs or on the host and take as a given that integrating the two in any fashion takes applications development. As has been the case in design questions discussed previously, the issue of what data lives where and how one accesses it is one that should be addressed by customers and the applications developers. The general rule of the architecture is that data to be shared by more than a group with the same LAN access (i.e. the same security-defined group) will have to be on a host. The customer's interface to this data can be either 3270 interactive or controlled by applications programs, whether commercially procured or developed, using any SNA-defined suite of protocols. (At lower levels, the SNA links may transit Making these data base design decisions will not be easy. For example, the OIT systems on hosts provide data sharing in many ways -- particularly in the form of shared AIM folders and SAFE mail and private index files (PIFs). One of the goals of the new architecture is that users of it migrate off of the AIM system and off of VM in general, since the PCs should provide the personal computing and office automation functions. However, AIM shared folders that cross more than just an office cannot be easily mapped onto LANs since people from one office cannot generally have access to other offices' file servers where the local sharing can take place. Most commercial systems answer this problem very minimally -- sharing information with other branches is done by mailing them a copy. The only alternative is to make the AIM shared folders into a data base service that can be accessed by the PC users in some fashion. One could start by giving the PC users their mail on the PCs, but letting them access AIM interactively to peruse shared folders. A more complex development effort would allow PC users to view AIM folders and documents as extensions of their PC environment and not ever see AIM itself as an interactive service. In effect, AIM could migrate into being a file server. Over time, changes in data X.25 circuits such as provided by Mercury or go through any number of transmission stages independent of the applications level interfaces). SECRET Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 25X1 25X1 base technology could allow movement from AIM to other data base systems so long as the customer's interfaces to the data were preserved. The same sort of decisio -be made in regard to SAFE PIF files, and this is an area to be worked. Security and Records Management Among the problems with bringing in PCs to the Agency environment has been the change in security problems and records management problems due to the storage of data in compact, distributed and essentially unmanaged forms. The security problems and records management problems are quite different, but they are caused by the same technology -- portable magnetic media with classified or official records. A complete discussion of all these problems is far beyond the scope of this paper. Opinions on these subjects vary from "there is no problem; it's up to the people to maintain the information securely and personnel security is the answer" all the way to "PCs are inherently evil and can never be secure enough for' us to use without developing high technology computer security hardware and software." In truth, there are serious problems that OIT, given the mandate to protect information both by records management and computer security, has to insist on addressing. One of the jarring statistics used to emphasize the magnitude of the problem is that the OL Supply Room in Headquarters hands out over 5,000 floppy disks a month -- about 2 billion characters of data storage in a medium that is not under any official records management, accountability, or technical security control. A paper discussing one technology for essentially eliminating most problems has been presented by OIT to the Executive Director (memo of August 12, 1987). In brief, this paper recommended eliminating the use of floppy disks as much as possible and moving in the direction of LAN file servers to provide the needed PC filing capabilities. PCs with disk drives that cannot write are not a serious problem and can be used in very limited fashion as intelligent host terminals, or in full PC fashion when connected on LANs to more securable and manageable file servers. On a LAN, even PCs without any disk drives at all are fully usable and available commercially. In vaulted areas, internal hard disks are also an option, so long as compartmentation and records management policies are not ignored. In all cases, the key to full functionality and reasonable information control is to centralize important data on a file server where the security and management of it can be implemented to whatever degree the customers and the responsible Agency offices (OIT and OS) can agree upon. In the past, host computers were used to perform much of this centralized, manageable, access controlled, secure environment. Many applications requiring compartmentation were not suited for this environment, and the tremendous aggregation of data in one place was a problem in its own right. Distributing this central storage outward to file servers, but not all the way to the anarchy of individual PCs, offers a compromise that should be workable. The level of security obtainable should be about the same or slightly better than that available in the Wang Alliance architecture today, which should be sufficient. Requirements for mandatory access controls and audit trails can be SECRET Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 met. As with all commercial systems today, additional requirements such as mandatory data labeling cannot be met in general by PC file servers and have to be put aside for future developments. Given the direction to procure and use commercial software as much as possible on the PCs and the explosion in the variety of PC software, there is simply no feasible way to add additional requirements, even simple ones such as labeling of printouts. Classifying output will be, and really always has been, uo to the customer and not 25X1 something OIT can enforce through software. A separate issue from the disk usage issues is the security of the LAN itself. There may be some confusion between the assertion that the LANs proposed increase security while previous discussions have always ruled out LANs as not secure without encryption or other largely non-commercial expensive solutions. The general attribute of a LAN is that everybody's data transits past everybody else's workstation, hence making it technically feasible to tap in at any point and capture unauthorized data. LANs are also generally touted as connecting everyone to everything, which makes compartmentation and access control highly complicated, contradictory requirements on the LAN. The difference is in the scope of the proposed LANs and what they are used for. In this architecture, there is not a LAN running throughout the building into which everyone plugs PCs and enjoys instant, universal access to everything via that route. Attempting to install that sort of LAN on the scale of the headquarters building was actually envisioned once but never successful. Problems have plagued and will plague every such attempt for deep, intrinsic reasons. Successful projects, on the other hand, have been to install LANS interconnecting PCs on a very local level to enhance sharing of data and resources at that level, with either no connections or controlled connections to outside resources -- hosts or other segments of LANs, via gateways. Stand alone LANs in Central Cover Staff/DO, Polygraph Division/OS, and FBIS have been quite successful, although the latter may not conform to any proposed standards and should be reviewed when such standards are adopted. The latter kind of LANs, small LANs, are what is proposed. Keeping the LAN small enough and within physically secured space, among persons of essentially equivalent clearance, eliminates the need for encryption and complex technical security for the LAN medium. File access security sufficient for privacy protection 25X1 need-to-know compartmentation then suffices and is readily available. Relationship of LANs to Communications As there is no universal connectivity LAN proposed or considered feasible, terminal-to-host connectivity and point to point connections from place to place are provided by a backbone OIT network with its own security and access protections to keep customers' data separated. The current implementation of 25X1 this architecture in the Headquarters s a voice/data PBX, solving the connectivity problem for terminals and voice in one architecture. Extending this solution to as many points as it can be applied, extending over much of the metropolitan area, is the subject of important OIT initiatives in the coming years. For non-PBX equipped sites, use of communications protocols using SNA or interoperable with it (such as using Mercury for a transport mechanism when available) is the proposed architectural solution whenever host 25X1 access is required, including overseas access to systems. .gFrRF:T Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 There are higher speed requirements for communications than the voice/data switching can provide. In fact, between distributed PBX components themselves, high speed fiber optic links are required. The architecture chosen in these instances is to use leased/purchased fiber optic cable with Agency transmission equipment (including encryption) as needed. Unlike the telephone circuits used between buildings today, the transmission over the fiber is not from the Agency to a commercial concern's equipment, over their network and back to us at another point. OIT is actively acquiring "dark fiber", optical cables that can be put to any use, along various paths connecting Agency buildings and interests. These links will be there to support high speed connectivity requirements for decades to come. Links for video between Headquarters and 25X1 Fare already in place as a service to the DDS&T. With the advent of the PC LANs as proposed will come additional requirements to build bridges between LANs and high speed Gatewa s across wide areas. OIT is positioning itself to 25X1 support such requirements. One major piece of this overall fiber optic effort should be specifically emphasized. This is an OIT initiative referred to as the "fiber LAN" in Headquarters. It should be understood from reading this paper that this is not a universal connectivity LAN designed for plug-in-and-go operation as one might think. This initiative is designed to provide the backbone network of fiber optic cables within the buildings to support any and all high speed connectivity requirements as they arise. High speed connection requirements for LANs and all other applications will come in on a case by case basis, and the backbone of fiber, fiber connection panels, fiber distribution systems and network management systems have to be in place to accommodate this in a timely 25X1 manner. SECRET Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89G00643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 Actions The basic components for the new architecture are already available. OIT/EG proposes to expand its efforts to bring in, evaluate and adapt this technology 25X1 for use within the Agency. OIT/EG and CSPO should commence design of a migration path for SAFE to utilize the new architecture. Design and prototype efforts with the SAFE customers should begin at once to see how soon the new architecture can be deployed in DI and DO. Historical SAFE requirements and current DI and DO ADP requirements should be reviewed in light of the capabilities of the new architecture and determinations made as to what is feasible in the near term, what will take development, and what might have egone in order to enjoy other 25X1 benefits from the new technology. OIT should work with IMS in the DO to see to what extent this architecture can serve as a basis for DOLPHIN.' Joint effort is also required to migrate the cable creation and handling processes developed by IMS into the new environments offered by PCs and by SAFE and to consider the aoDlicability of 25X1 this technology in DO stations world wide via OC networks. An evolutionary migration of customers from the old systems to the new should then be planned, with investment in LANs and workstations planned as early as 1989. All OIT components have significant roles to play in such an effort, along with the ADP planners in other Agency offices. Contractual vehicles have to be put in place along with support systems for installation, maintenance, consulting, security evaluation, records management support and applications development. To be as successful as the Wang Alliance systems, which is a goal, OIT has to be able to accommodate hundreds of LAN installations a year in 25X1 the near future in order to support workstations. OIT's abilities to support PCs must expand and be able to cope with at least ten times today's volume of actions relating to PCs. Capabilities to fix PC software problems, distribute revisions and provide consulting are all required in more areas and in ten times the quantity than is possible today. OIT has to arrange that everything be done for the PCs that is done for Wangs, with levels of support and marketing expertise similar to those exercised by Wang itself directly to 25X1 customers. OIT and OS components concerned with computer security must come to terms with the PC environment and the proposed office-level LANs. Determination of an adequate and feasible set of security constraints within the capabilities commercial PCs and software must be made. Policy on how and when to use the password authentication mechanisms of LAN file servers needs to be established. The security characteristics of the proposed architecture should be acceptable, but need to be coordinated and reviewed as necessary to be deployed. The level of trust to be accorded electronic signatures of document/transactions between systems must beestab lished in order to pursue applications such as cable 25X1 origination. OIT has to continue to evolve the backbone services with initiatives such as the fiber LAN network, SNA installation (part of NEWS), and the many segments of the New Building Communications Project. While LANs represent alternative forms of communications capabilities, the need for core services does not 25X1 diminish and will probably grow in new and challenging ways. SECRET Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6 U?'CLASSIFIED MEMORANDUM FOR: Edward J. Maloney Director of Information Technology STAT FROM: Chief, Engineering Group SUBJECT: The "Diskless PC" Concept: Strategy and Implications REFERENCE: Your Memo, dtd 12 Aug 87, Same Subject 1. We are developing our clans with respect to Diskless PCs on several fronts. 2. Last Friday we held the first of what we plan to be monthly coordination meetings with IMS/DO. The subject of Friday's meeting was the software environment for Diskless PCs. EG and IMS personnel are now developing plans, including alternatives, for the development and deployment of this environment. These plans will include scope of the necessary efforts to be undertaken by the EG and IMS and will be briefed to EG and IMS management prior to finalization. 3. We have also formea a LAP: branch within EG/OPD, to be headed by Jim STAT Cne of the first orders of business of this branch is developing a plan for the development of a standard set of Agency LAN architectures, consonant with the LAN Statement of Direction now on the table. The plan will specifically accommodate Diskless PCs, a standard user graphical interface, and the Agency's security requirements. 4. As you know, we are also in the process of acquiring a basic ordering contract for the Agency for a new family of workstations. One of the "reference configurations" in this solicitation is the Diskless PC. We anticipate being in a position to confirm that our architectural presumptions concerning the Diskless PC are valid by the middle of November. 5. We plan to have developed a complete picture of the implications of Diskless PCs and the planning for their support about 30 November, and will be prepared to brief it within the office at a convenient subsequent date. STAT Declassified in Part - Sanitized Copy Approved for Release 2011/12/05: CIA-RDP89GO0643R000900130008-6