Skip to main content

Full text of "Exploring the Internet, A Technical Travelogue"

See other formats







oe: 


CARL MALAMUD 


EXPLORING 
THE INTERNET 


—=— A Technical Travelogue —= 
CARL MALAMUD 


Exploring the Internet is a travel book in the 
classic sense. In 3 trips around the world in 
6 months, Carl Malamud undertakes a voy- 
age of discovery, a look at the Internet and 
the emerging global village. In 21 countries 
and 56 cities, here are just a few of the 
stops in this technical travelogue: 





i TIE TIS 1 i ABTS = 


¢ In Tokyo, Malamud takes a behind-the- 
scenes look at the world’s most expensive 
building, the Tokyo City Hall, and intro- 
duces you to Jun Murai, the Internet 
Samurai, one of Japan’s leading 
researchers and the architect of the coun- 
try’s national network. 

¢ In Singapore, he digs into the govern- 
ment’s highly ambitious plans to make an 
Intelligent Island, a digital port for the net- 
work highways. 

¢ In Silicon Valley, he meets the man with 
the bike, a digital nomad who pedals 
around the country on a 500-pound bicycle 
equipped with a half-dozen computers and 
a head mouse. 

¢ In Geneva, Malamud wages battle with the 
international standards cartel in an effort to 
make standards documents more widely 
available. 


Designed to give professionals in the com- 
puter and communications fields an in-depth 
look at worldwide networking, this intriguing 
narrative helps you gain a unique technical 
perspective on the Internet and how it is 
built. 


About the Author 








Carl Malamud is the author of seven profes- 
sional reference books including STACKS 
and a three-volume series that includes 
Analyzing DECnet/OS! Phase V, and 
Analyzing Sun Networks. He has written for 
publications ranging from Communications 
Week to the Bangkok Post. 


(Continued on back flap) 





Digitized by the Internet Archive 
in 2022 with funding from 
Public. Resource.Org 


https://archive.org/details/exploringinterneOOcar! 





Exploring the Internet 





A Technical Travelogue 





ers ere} 
ee 4 <7) ths : re | 
se : JA / 










WN - i are a i y 7 ‘ : . 7 : a ss) To : Cn 
; i art ro t q 
| Ae a wkd ‘ae 
i] ale wt 


a a : —_ 
‘, 
ae 





siieainiieslbalialiatiniaiieal ' F alae : 
| x "2 
sigoloverl \ecietoat A | 


4 


5 ‘ s { 
i 


Exploring the Internet 





A Technical Travelogue 


Carl Malamud 





PTR Prentice Hall 
Englewood Cliffs, New Jersey 07632 


Library of Congress Cataloging-in-Publication Data 
Malamud, Carl, 1959- 
Exploring the Internet: a technical travelogue/Carl 
Malamud. 
cm. 


Includes bibliographical references and index. 
ISBN 0-13-296898-3 : $26.95 


1. Internet (Computer network) I. Title. 
TK5105.875.157M36 1993 
384.3—dc20 92-16450 


CIP 


Acquisitions editor: Mary Franz 
Jacket design: Bruce Kenselaar 
Cover design: Joe DiDomenico 
Prepress buyer: Mary E. McCartney 
Manufacturing buyer: Susan Brunke 


Copyright © 1993 by Carl Malamud 


Published by Prentice-Hall, Inc. 
A Simon & Schuster Company 
Englewood Cliffs, New Jersey 07632 





The publisher offers discounts on this book 
when ordered in bulk quantities. For more in- 
formation, write: Special Sales/ Professional 
Marketing, Professional & Technical Reference 


Division, Prentice Hall, Englewood Cliffs, NJ ii 
07632. 2 ISBN 0-13-29b858-3 


All products are the trademarks of their respec- | 90000 
tive manufacturers. Carl Malamud is a trade- 
mark of Carl Malamud. 

All rights reserved. No part of this book may 

be reproduced, in any form or by any means, 

without permission in writing from the publisher. 9°78013296898 


Printed in the United States of America 
iy GP TS 7h Te Sy eh sh pe 


ESB Ni Bebe rel bore one 


Prentice-Hall International (UK) Limited, London 
Prentice-Hall of Australia Pty. Limited, Sydney 
Prentice-Hall Canada Inc., Toronto 

Prentice-Hall Hispanoamericana, S.A., Mexico 
Prentice-Hall of India Private Limited, New Delhi 
Prentice Hall of Japan, Inc., Tokyo 

Simon & Schuster Asia Pte. Ltd., Singapore 

Editora Prentice-Hall do Brasil, Ltda., Rio de Janeiro 


Contents 


Foreword and Preface, in which we secure funding for a voyage which will 
take us three times around the world in six months and give new meaning to 
the phrase “many fine lunches and dinners.” 


Prologue: The Document Liberation Front, in which we delve into the 
abyss of international politics and wade through hordes of Jehovah’s 
Witnesses to examine a Bulgarian FEP. 


Geneva ¢ Prague e Zurich °¢ Geneva e Paris ¢ Boulder 


Round 1: From INTEROP to IETF, in which we meet the Internet Samurai 
and the Uncle of the NSFNet and go to the zoo to witness the birth of 
EBONE. 


San Jose ¢ Honolulu. ¢ Tokyo e¢ Fujisawa ¢ Akihabara 

Hong Kong e¢ Macau e Singapore ¢ Dublin) ¢ Amsterdam 
London e¢ Tampere ¢ Paris ¢ Geneva ¢ Nice ¢ Geneva 
Ithaca © New York ¢ Washington, D.C. ¢ Santa Fe e¢ Boulder 


Round 2: From Christmas to Cleveland, in which we encounter a massively 
parallel bicycle in Mt. View, find magic boxes in Oz, and go swimming in the 
Sea of Acronyms in Europe. 


Berkeley ¢ Mt. View @ San Francisco e¢ Moffet Field 

Wellington ¢ Dunedin e¢ Auckland ¢ Melbourne ¢ Sydney 
Canberra e¢ Adelaide ¢ Singapore e¢ KualaLumpur e Bangkok 
Amsterdam e¢ Utrecht ¢ Bonn ©e Brussels @ Paris 
Washington, D.C. ¢ Cleveland ¢ Chicago e¢ Boulder 


Round 3: In Search of a Standards Haven, in which we meet the world’s 
most intelligent building, try to convince people to do the bloody obvious, 
and learn the origins of the Internet. 


Marina del Rey ¢ San Francisco ¢ Tokyo e Seoul 
Taipei ¢ Hong Kong ¢ Bombay e Madison e¢ Boulder 


Index 

































™~ es ie 7 


ne ther o ew: 
‘Soke ye 


0 > an we 7 
i ite ™ ik 
ee 


» peal 


ois meena putea enttiindiiie | 
. . WH Lips 7 Sie! a a : 
i ’ an NYT raat i Tv ales - ee 
~. : , { } f 7 7 * 
rie *, se vas 


Hiw ditto aREVONG tot grits it jetta ‘ow Panes ni 
oO) gninkom Woe svig int atiniann vie wv. Bihsowe gielt be 
‘ardently: Gis aodortul ani y 


SF a 
a : - 


sloth WlSb-genik ithw et jn’ suveredth SesenuacKl & 
oa ais! Ve oot frail “T RAN in? oie , bine eoiliog ot 
| Cee lve gid) e-store 


wan 
ued. Be hems) .« AoOHaA * augers er: 2¥E 
fe 


Pas = 
= ” 


wend taetciodl aab een, oer Asi ni APA at BO CSV 
~ ; < Syren J4o) S. i af’ Oo! < OF ee 38 wien ni 


clea "i 4 é a of i = k Hy AUT + uiulonoH es 
ison leinterrath 4 twa. SQgeyale + veieM 7 
BSASe) = = iA y e'Pitiaicl arie4 eg SI meh 5. 
“4 < 


Woijoh * oa Alre?-* 2)O 9 aninenW . Pia 
ae tagle-ryy E teh) ve Sy Sate ae Bin. a a a ra q 
a) wa) 2; ee oe : a 


, — ) ny 
® K ¢ ) Po | 
- s ry chan 


OUEEieith & nee "Wait MeN? 

cual © lofty oo Abie * > pibsnu oe 
“Rodafsh » wey! slew © mogsgale « sibisisbA | a 
bt abeeuig not JSiostU. *  meby 

[Dh Qe ds a cowipid« basleveld « o  reate 


» 4 
ra 


baw Mi! jagin ay) eihiad pont chrveboanei2 an — ; 
jp AMIR O YBOGid ith, qb) av ent iL 

, ; ee uf ( 3 
an yy . nu ae 
ras , 7 » i‘ sy fe 


ae 4 { isi « rt = 
& in ; mia > omer 4 ke “ Ne vs ei we 


Foreword 


In July 1991, Carl Malamud flew out from Boulder, Colorado, a 
place he describes as “closer to Kansas than I’d like.” He had just 
finished writing STACKS, which we were distributing as The IN- 
TEROP Book to conference attendees, and wanted to present us his 
latest proposal. 

He met me at breakfast and presented me with a pith helmet 
plastered over with Interop logos. “What Interop Company really 
needs,” he explained, “is an Official Internet Explorer.” 

His proposal was to fly three times around the world, visit as 
many sites as possible, and write what he was calling “a technical 
travelogue.” The catch, of course, is he wanted me to foot the bill 
for travel expenses. 

Exploring the Internet is the result of this odyssey. This book 
demonstrates what many of us have long felt: the worldwide net- 
work is here. Interoperability is not some imaginary goal at vendor 
briefings, but a concrete part of networks all over the world. 

This book is more than just a series of case studies—it is truly a 
technical travelogue. As we read about the worldwide spread of the 
Internet, we get to appreciate its diversity and its usefulness to mil- 
lions. This is not some experimental research environment, some 
academic toy, it is a real tool used by real people. 

At that breakfast in 1991, Carl confided his hidden agenda. Af- 
ter going on about “global infrastructures” and other nice phrases 
designed to impress my senior managers, he turned to me and gave 
me the executive overview. “Actually, this is a very simple project,” 
he explained. “Buy my airplane tickets and I'll try to get into as 
much trouble as I can. Then I'll write a book.” 

Here it is. 


Dan Lynch 
Founder and President 
Interop Company 


Vil 
























a pbswist aabbuod due ous 
fetsi wrt oH oa b'l sugttt sian ot sop 
pil: oAT “es: Reidtutintel sow ay sloiviw MONS 
aint “i taser t) byltiw! brie anaes ener? ot 


Horsi] ry dit, A; itive oe hetnieern; bre sascha 4 36 mt 
ilnes pteqnieD coral jaf wogal qorotel Aliw 3 iy 
‘anvolgxttoasant tetiiO mms ei* Bb site na 
di tiely Dhow om Dagorg eoenit sori wi ot aew Ip a wr " a - 
tusicirioet 8° woille daw of detiw whew bins ldiazog eB ia. ¥ 
id arlt jag). od arty btn Sdial wean Yo ens oT 
4) Ee ea he _renage ie 
Adod ettT. wapeybo ei ig Hiravs wt at vorestend any 
ton sbivehiew ort. tie} pabh-wasd ep Yo reset taskwn ee 20. 
vabrey is baie eaphigee! orthoe Dewi xi Cilkdiseqoisial ”. 7 
Lihnow af? v0 Hs edzowien to hag MIIIAG a hed § 
8 eu at it—2olhnde sess 16 Rete 6 tend aed svar. a 
gat iat ¥ RIT fe abi aby hic ei eid Ipods feet ow ah. oar polovedl tg 
‘Sint Of eénpi oes aif bas ‘tieio vib: ati Sshetqqs al + a 
Sree. Jnanenivng dorseest Istasmizsqus smo Jon am 
atqaood Lesx yd beet loot [sat s ef iY 
4A \shboage debbict aid bobfires dos Teer ai ecole 
diane soln vllo bre “séurionientbal lacolg™ iwode # 
ores bas ato? bam! orl ategenaits reinsert easton 
“Jouponcy oleprie yey sel ere wilawntaa meni 
ar Ghat dos GF wa il bie pistol ITs 
| “dood & ahty 


ae, | a 


1 
VY 


OP an 


ey oon , 


er ee 





Preface 


The reason I visited 21 countries in six months, embarking on a 
technical voyage of discovery, can be traced back to an encounter I 
had with a platoon of bureaucrats. In June, 1991, I struck a deal 
with the Secretary-General of the International Telecommunication 
Union (ITU), coordinators of the very formal process which eventu- 
ally results in standards such as the Blue Book: 19,000 pages of in- 
ternational recommendations which define the operation of data 
networks, telephone systems, and other aspects of communication. 


The deal was that the ITU would give me a copy of the stand- 
ards in the antiquated online format they used for text processing 
and that I would convert the standards into something the rest of us 
could deal with and publish the standards on the global Internet. 
Instead of charging obscene amounts of money for this information, 
the standards would be available to anybody at no charge. 


Organizations, rhetoric notwithstanding, don’t work for such 
lofty goals as the dissemination of knowledge. The real reason for 
this breakthrough in standards distribution was that the ITU 
couldn’t figure out how to convert their own data from the proprie- 
tary box they had built around themselves. My offer to do the con- 
version seemed an easy way out of a job they had estimated at U.S. 
$3.2 million. In return for converting the data and giving them a 
copy, I could publish on this Internet thing, this academic toy. 


The ITU gave me half the data they promised and conveniently 
lost half the documentation to their Byzantine (both in age and in 
complexity) formatting system. Then, after a mere 90 days, the ITU 
abruptly cancelled distribution on the Internet. The academic toy, to 
the bureaucracy’s horror, turned out to have over seven million peo- 
ple. They were shocked to see hundreds of thousands of ITU docu- 
ments being accessed by thousands of people in dozens of 
countries. 


Despite their abrupt cancellation of the project, the ITU still de- 
manded a report. They wanted a certified bureaucracy document 


Exploring the Internet 


they could input into their process, analyzing possible scenarios and 
deliberating impacts. 


This is that report. 


At first glance, this report looks like it would get the bureau- 
cratic seal of approval. It is thick, for example. However, this book 
is something different than the bureaucrats might expect. My re- 
search methods were unorthodox: I spent most of my time talking 
to people. 


In fact, I talked to lots of people. In three trips around the 
world, I talked to people on the front lines: people who make com- 
puters, people who create networks, and people who use them. To 
explain to the bureaucracies facts that are painfully obvious to the 
rest of us, I had to leave the confines of meeting rooms and fancy 
hotels and go into the research laboratories, network operating cen- 
ters, and bars and restaurants where real work happens. 


This report is thus a travel book, a book of exploration in the 
tradition of classic writers ranging from Captain Sir Richard Francis 
Burton, author of over 50 books and master of 29 languages, to Dr. 
Hunter S. Thompson, author of careful documentaries about politi- 
cal campaigns and police conventions. 


Instead of exploring the Nile or Las Vegas, I looked at the 
emerging Global Village. This isn’t a comprehensive atlas, nor is ita 
definitive history. Exploring the Internet really is a technical trave- 
logue, a narrative description of the people and networks I encoun- 
tered during my travels. In my visits, | saw something the ITU and 
the rest of the standards bureaucracy seem to have missed. The In- 
ternet is here and it is not an academic toy. 


While I saw many people, I should add that even in three cir- 
cumnavigations, I couldn’t see everybody. This is one walk through 
the forest, and there are many trails one can take. This book is a 
selective look at some of the people, laboratories, and institutions 
that help illustrate the diversity and the scope of the Internet. 


This voyage would not have been possible without the support 
of Interop Company which helped finance my travel expenses. Be 
aware, though, that this book is mine, not theirs. There are many 
opinions which are not shared by Interop Company and it is a great 


Preface 


credit to Interop Company that they felt it important to finance this 
kind of work. 

This book would not have been possible without the help of the 
hundreds of people I talked to and particularly those who opened 
their laboratories, homes, and CPUs to me. The hospitality I en- 
countered was truly gratifying and I am thankful for the time given 
to me by the people you will read about throughout this book. 

This book owes a great deal to logistics, and I want to thank the 
Boulder office of United Airlines for their infinite patience. Infinite 
patience is an understatement when it comes to David Brandin, 
Stephanie Faul, Mary Franz, Ole Jacobsen, Martin Lucas, and Yvette 
Ozer, the editors who worked on this book, and it is to them that I 
give the biggest thanks. 


Carl Malamud 
Carl@Malamud.Com 


XI 




















on sui “ie he 


oe acatine wins Qc «eh 


ors i ate * ‘on Py verorklive ‘Adie ee ae jon bier we ak 


Seiial ad ee eRGeS Wralvaiined has.onbediet. 1,2 | 
a ‘ Cilstiqer (iol, opt ot aI Aaa gota} » ee 
eG 3 sant. mts cae: bats rvth Tee i Pox aside 
atovvd sist qoslgymAtaueds lysax, ripen ies 

exit. aby: ety) 03 inkw | bab won agol if isah Incig 8 eowo aox 
atiriinl @raibe sila aid fi ile tol eptisii ls belie! lo 

my. iv. ahd Weds eta ARS 
Mote 839) Span bi har. OF aly pO i r art ad Areaye aneleiol uy a sf 
gHovt bin ago a is Ne 3% ste: ved] at) met | ylae 


% » - “ ‘ 
+, (URDEE GF Gr a bes 400% ait | 9 baikic we oily BOF 
|. é Yo epeodtin a tema 
Ms! 
1 4 * i 
cy 
5 
dt 
- apt 
} 
bi phe! 
4 i 74 17% 
* ‘ 
f - ‘ @: 
4, 
{ 
she ha - i? * 
r <9," OP 
= +. ad 
f 52 ‘- he a a J ag 
: 
1 
eK id anh wit 
4 & é J i; Oey 
. or 


FF: ene 4 ey ead hd tint envvnty 
se), 3 ie eo CeeHhy Ths we comms Wi 
ihe! tres 4 GA hee, Onmety) eee ee emt. oy 
' | | Pie ct abel santa, isheotaheninels 
) ee mp meee 
ae i a koe pest promi Pe 
= ae . itt ier? i voy pe Nase by ey 
re ae oe st eka, 5 be oe pie 


Prologue 


The Document Liberation Front 





eee 4! = 


a = 
er | as 
t = | 
aii 
+ = 
t 
’ ‘ 
= v 
ve ts 






te + , Mis ie a De 
eat aa ee mae 


signi ee 


aie to +. 


Ynovl noitmadil inemuned oft 


q 
=} 


Geneva 


It was August 1991, and I was sitting in a café in Geneva, Switzer- 
land, having lunch with Tony Rutkowski, a man who was a senior 
official in the International Telecommunication Union (ITU) but 
whom nobody could seem to pin an exact title on. While many 
called him the General Counsel of the ITU (for reasons that will 
become apparent), Tony prefered to refer to himself as “Counsellor 
to the Secretary-General,” a title with enough ambiguity to serve his 
purposes. 


Tony and I were celebrating a minor palace coup, a year in the 
making and the result of a bizarre partnership. How all this came 
to be can be traced to my propensity to flame. 


For several years, I’ve been complaining about the high cost of 
international standards documents published by the ITU and other 
international standards groups. After all, I write professional refer- 
ence books for a living and these documents are my raw materials. 


At first the flames started as simple whining, but soon they 
grew to full-fledged diatribes in publications running the gamut of 
technical sophistication from Data Communications to ConneXions. I 
got lots of quotes from illustrious people like Jon Postel, Editor of 
the Internet Request for Comments (RFCs), who explained that 
keeping international standards away from “random people” was 
hurting their acceptance. The gestation time for software based on 
Open Systems Interconnection (OSI) serves as ample illustration of 
Postel’s point. 


The fabled power of the press produced an effect about as pro- 
nounced as, say, an editorial in favor of truth and beauty. An occa- 
sional nod from a passing reader, but no cries of outrage. 


As a sanity check, I posted a note on the Internet asking if any- 
body else thought that the inaccessibility of international standards 
was hindering technical progress. This hit a nerve. In fact, the re- 
sulting firestorm surprised even survivors of historically notable 
dialogues such as “should pornography be distributed on the net?” 


Exploring the Internet 


The Internet has a wide community of users, but a convenient 
taxonomy splits them into flamers and firefighters. Flaming is easy 
to explain. You send a message and bingo, you’ve made 1,000 peo- 
ple all hit the delete key in their mail readers. The power to make 
so many people twitch is seductive and some people occasionally 
succumb. In fact, some succumb all too often. 

The firefighters have a different motivation. Their happiness is 
inversely proportional to the size of their electronic inbox. Not eve- 
rybody was terribly happy when their inboxes started filling with 
“me too,” “T agree,” and “another minor yet trivial point” variants 
on the first wave of reaction. 

Dan Lynch, the founder of Interop Company, is a firefighter. He 
didn’t want to see this situation continue forever, so he sent me a 
copy of a memo written by Tony Rutkowski at the ITU. Turns out 
Tony was doing the same sort of complaining I was, but was direct- 
ing his comments internally to the huge ITU bureaucracy. 

Tony and I exchanged a few e-mail messages and found we 
were in violent agreement: standards have to be widely available or 
the standards are irrelevant. We started trying to figure out what 
could be done about it. 

Turns out that we agreed on another point. We both feel that 
the ITU has a fairly dubious basis for asserting copyright protection 
on standards, since a standard spends months (often years) wander- 
ing around the public domain as a working-group document before 
it ever becomes blessed as an official standard and is “published.” 

You can’t make a speech to a crowded room and then, one week 
later, tell people that your speech contained valuable trade secrets. 
You can’t publish a newspaper and then unpublish it. Once you 
give something away, it stays given away. 

The lack of valid copyright protection is one argument for mak- 
ing standards more widely available, but there is a much more im- 
portant one. If you believe, like Tony and I fervently did, that the 
ITU does valuable work, then the standards are an essential public 
good. Standards are laws and laws must be known to be observed. 

Failing to make the standards widely available was, in the long 
run, going to make the work of the ITU irrelevant. Other standards- 
making bodies were promulgating standards, and despite its official 


Geneva 


United Nations treaty status, the ITU had to compete with other 
groups for the attention of implementors and users. 

I sent Tony a note and suggested that since we both agreed that 
the ITU really had an indeterminate legal basis for asserting copy- 
right, I would simply take all 19,000 pages of the Blue Book, scan it, 
run it through OCR software, and post it on the Internet for distri- 
bution by anonymous FIP, a service that allows a site to give the 
public access to file archives using the File Transfer Protocol to any 
user who logs in as “anonymous.” (The Blue Book is the massive 
set of 1988 standards developed by the ITU’s Consultative Commit- 
tee on International Telephone and Telegraph to govern the opera- 
tion of everything from telephone signalling systems to packet data 
networks to ISDN to high-speed modems.) 

Now, there are a couple of points worth keeping in mind. Tony 
was a senior lawyer for a powerful United Nations group that made 
lots of money selling these documents. While Tony certainly sym- 
pathized with my goals, I wasn’t quite sure how he was going to 
react to this form of standards terrorism. Putting a lawyer on notice 
that you plan to relabel his corporate assets with a $0 price tag is 
kind of like putting Honda stickers on the motorcycles parked out- 
side a Harley bar. 

The other point is that the Blue Book is over 19,000 pages long. 
Scanners and OCR are great technology, but it would take an aw- 
fully long time to carry out such a project on my little home PC. In 
fact, in a world of finite resources, you might even call my plan an 
idle threat. 

Idle threat or no, this message caught the ITU’s attention. One 
year later, in June of 1991, after endless messages back and forth to 
Tony, I had received a fax from the Secretary-General asking me to 
post all ITU standards on the Internet on an “experimental” basis. | 
promptly booked a plane ticket to Geneva for August to pry the 
data out of the cold, clammy hands of the bureaucracy. Next thing I 
knew, I was in Geneva, ready to go to work. 


0 


Exploring the Internet 


I was sitting in Tony’s office reading a book while he went off to 
clear political barriers. In the other room, Julie Butterfield, his assis- 
tant, was busy typing away when the phone rang. Julie raced in 
with a pad of paper and answered the phone. 


“Mr. Rutkowski’s office.” She scribbled some notes on a pad. 

“T’ll give him the message,” Julie said, hanging up the phone. 

Something wasn’t right with this picture. As she walked out, I 
inquired why she didn’t just have the phone roll over to her desk if 
Tony doesn’t pick it up. 

“We have nothing that sophisticated here at the ITU,” she re- 
sponded with a smile and a strong dose of sarcasm. 


A few minutes later, Tony came back and we started talking 
while Julie ran some errands. Her phone rang and Tony sprinted 
out to the outer office to take the call. 


The ITU was using a very old donated Siemens PBX. This PBX 
was actually quite advanced for its time, but its time had long 
passed. This was a feature-rich PBX, but most of the features were 
so difficult to use that people didn’t use them. Tony brought in his 
AT&T phone from home just so he could have a few stored num- 
bers. 


Until recently, in fact, the entire ITU had one fax machine for 
over 900 employees. A single fax machine was more the result of 
bureaucratic desire to limit outside communications than a cost fac- 
tor. The fax machine was in the Secretary-General’s office. This 
meant that sending a fax could require approval right up to the Sec- 
retary-General. To get the Secretary-General’s approval, you had to 
go through the Deputy Secretary-General, which would require re- 
cursive approval right on down the food chain. Needless to say, to 
communicate through this medium you would have to be pretty 
strongly motivated. 


What is really funny about all this is that ITU, as part of its ena- 
bling treaty, has the right to free telecommunications throughout the 
world. This perk is meant to allow easy communication to the 160 
member countries, and even goes so far as to allow the ITU to set 
up terminal clusters at off-site meetings with X.25-based links back 
to Geneva. 


Geneva 


I’m not quite sure what I expected at the ITU, but I kind of fig- 
ured a modicum of computer literacy. Nothing fancy, mind you, 
but at least things like basic phone tricks, fax machines, and maybe 
even electronic mail. After all, this is the home of X.400, the mes- 
sage handling system to end all message handling systems. Was the 
ITU using X.400, though? Not a chance! They had Digital’s proprie- 
tary Message Router and the infamous All-in-(N)One as a user in- 
terface. X.400 connectivity was achieved by a poorly functioning 
gateway. 


This lack of computer literacy at the ITU was what made Tony 
Rutkowski such an odd duck. When he came to Geneva he saw 
that none of the international bureaucracies had Internet hookups. 
So, Tony did what any self respecting technocrat would do and 
called up the nearest Internet provider, in this case the CERN phys- 
ics laboratory, and asked for a guest account. Several years later, 
Tony was still the only ITU employee with access to the Internet. 


Tony had taken a rather strange career path to his position at the 
ITU (a position he left at the end of 1991). After studying engineer- 
ing at the Florida Institute of Technology, he became quite active in 
civil rights. Eventually, he landed himself a seat on the city council, 
getting further involved in policy and politics. 


From there, through a roundabout road, his interest in telecom- 
munications drew him to Washington, D.C., where he went to work 
for the chief scientist at the FCC. The chief scientist was also an 
Internet old boy, and the FCC was promptly installed as part of the 
Internet. While working at the FCC by day, Tony put himself 
through law school at night at American University. 


Eventually, Tony went up to Boston to become the publisher of 
Telecommunications. In Boston, he alleviated the drudgery of punch- 
ing out a magazine by working as a Research Associate at MIT's 
Media Laboratory. 


Altogether, this mix of lawyer, regulator, and engineer was just- 
the combination needed when Pekka Tarjanne took over the helm of 
the ITU. A physicist by training, Tarjanne was determined to bring 
the ITU into the telecommunications age and asked Tony to work as 
his personal assistant. 


Exploring the Internet 


0 


My first face-to-face meeting with Tony, after countless e-mail mes- 
sages, was in August when I took the train in from Paris and went 
to the twelfth floor of the ITU tower. As I got off the elevator, a 
short man with a beard darted in after me, posted a piece of paper 
in the elevator and jumped back out again just as the doors 
slammed shut. 

This was Tony. He was trying to get into every elevator to post 
a notice of my lecture the next day. The lecture was news to me, so 
I read the notice. Along with the obligatory hype, the notice ex- 
plained that I would be lecturing about a host of topics ranging 
from the future of networking in the civilized world to how more 
bandwidth would lead to world peace. 

After catching the last elevator, Tony and I wandered across the 
street to the International Organization for Standardization (ISO). It 
is ironic that the acronym used by this global standards organization 
is a dyslexic variant of its real name. 

ISO is a rather strange group. Unlike the ITU, ISO is a private 
organization. Like ANSI in the U.S., ISO’s lack of real legitimacy to 
carry out its quasi-governmental functions makes the organization a 
bit insular and very conservative. Located in a squat, drab building, 
ISO occupies the dimly lit corridors of the third and fourth floors. 
The halls are almost always empty, but occasionally one can see a 
functionary dart out of one office and flit into another. 

Tony and I wandered around the halls to find people to invite to 
my lecture. The purpose of our visit was to make sure everybody at 
ISO knew about the ITU experiment. I was a bit worried that put- 
ting ISO on notice would be considered confrontational, but Tony 
assured me that there was “nothing wrong with pushing forward 
the state-of-the-art a bit.” 

My lecture, by the standards of public bureaucracies, was a stun- 
ning success. Aside from the obligatory ITU contingent trying to 
figure out what their management was up to, there was a large 
crowd of functionaries from diverse UN contingencies interested in 
the Internet. Only a few people fell asleep, and a few even asked 


Geneva 


questions. This was described by several people as a “dynamic” 
performance. 

I described how the standards would be posted on the network, 
how different access protocols would be used, and how making 
standards widely available had been so successful for the TCP/IP 
protocols. I explained how, once the data was digital, we could all 
start using advanced services, write better code and how, when all 
was said and done, we would enter a state of standards equilib- 
rium, a nirvana of documentation. 

Unbeknown to us at the time, the audience included an opera- 
tive from ISO, sent over to keep tabs on the radical goings-on across 
the street. When my own spies informed me of this the next morn- 
ing, I placed a call to Dr. Zakharov, head of the ISO computer 
group. I explained who I was and said that, at the request of ITU 
management, I would be happy to come over and give them a cour- 
tesy briefing on our little project. 

“That sounds mighty exalted. Come over Thursday morning.” 


0 


Two days later, I donned my suit and dashed through the rain to the 
other side of Rue Varembé. I bypassed the obligatory visit to ISO 
reception and went straight to the third floor and back through a 
warren of offices, where I was ushered into the inner sanctum of Dr. 
Zakharov. 

Walking in, I saw an older man behind the desk wearing the sort 
of safari suit that the British favor. “You are Malamud?” he asked. 
“I have asked McKenzie to join us” he said, beckoning to a young 
man wearing a shirt and tie who nodded at me with a glum gaze. 

“McKenzie is our database expert. I have asked him to be here 
because what we have here is a database issue, not a network is- 
sue.” 

“Let me first say that I know all about this Internet of yours,” he 
continued. “I used the Internet even before it was the Internet. In 
fact, before it was the ARPANET. This Internet of yours may be fine 
for researchers, but here at ISO we have real clients to serve, so 
enough about this Internet.” 


Exploring the Internet 


I was still standing. A pause introduced itself, so it seemed an 
appropriate moment for a few formalities. 

“Glad to meet you,” I said, holding out my hand. 

McKenzie continued to glance at the floor and Dr. Zakharov 
grunted in what I took to be an amiable fashion so I gathered my 
courage and made a little speech about how my efforts with the ITU 
were experimental, provisional, something. we could learn from, 
temporary, and any other non-threatening platitudes I could think 
of. 


My little speech contained a fatal flaw. I had used the pronoun 
“we.” Now, “we” is not totally inappropriate as this effort was 
based on the efforts of several interested parties, but I must admit 
that the corporate offices of Me, Inc. do not actually teem with cor- 
porate retainers. 

“We?” Zakharov pounced. “Who is ‘we’?” he demanded. 
“How many members are on your team, anyway?” 

Like many corporate types, my lack of a formal institutional af- 
filiation did not sit well with him. I sidestepped his question and 
explained that, in my view, the question of publishing standards 
was, rhetoric notwithstanding, just not that hard. After all, there 
were hundreds of ways to get data on-line, ranging from Wordstar 
to bitmaps to SGML (an ISO standard). 

To say that ISO viewed my little project as a threat was an un- 
derstatement. Zakharov let slip that the Secretary-General of ISO 
had sent a letter to his counterpart at the ITU protesting the experi- 
ment. Zakharov made it quite clear that he viewed my approach as 
simplistic, misguided, and naive. 

I gently tried to make the point that there were positive aspects 
to this project that should not be overlooked, such as increasing the 
public awareness of the vital work that groups like ISO were under- 
taking by making primary resource documents available to a wider 
audience. 

Once again, my diplomatic efforts seemed less than successful. 
“People don’t need to read the standards,” Dr. Zakharov snapped. 
Indeed, he felt that ISO standards were basically unreadable and 
that normal people shouldn’t even bother to try. What was appar- 
ently needed was some guru to write a book, and that these second 


10 


Geneva 


or third-generation digested versions of standards were more appro- 
priate for the general public. Turns out that Zakharov had himself 
written such a book (“a monograph, actually”) on some long-forgot- 
ten CAD standard. 

I’m all in favor of promoting book sales, but there is still no 
substitute for the original documents. A programmer working on 
an implementation should be required to RTFM (“Read the F***ing 
Manual” or, in the staid company of standards potatoes, “Read the 
FTAM Manual”). There is no excuse for second-hand knowledge of 
something as vital as international standards. 


So far, we had spent 45 minutes of a one-hour meeting about 
databases, and the subject of databases still had not come up. It 
didn’t look like it was going to. McKenzie still hadn’t said anything 
and didn’t appear to be about to burst into action. 


As | paused to gather my forces, Zakharov jumped in. “Another 
thing, young man. Do the people in charge of the Internet know 
about your efforts?” 


He seemed convinced that when some appropriate official 
learned that I would be distributing documents—“with graphics, no 
less’—on the network, my renegade activities would be quickly 
stopped. 


(Let’s put this into perspective. The NSFNET backbone transfers 
well over 14 billion packets per month. Even if my server was 
wildly popular, the backbone could handle it. Just to be sure, I was 
going to send the big computer companies archive tapes so they 
didn’t need to FIP the entire file store into their internal networks.) 


I told him that indeed my activities were supported by appro- 
priate officials. The chairman of the Internet Activities Board (IAB), 
for example, had offered to be one of the anonymous FIP sites for 
the standards. I didn’t tell Zakharov that the incoming chair of the 
IAB, who had also chaired several ISO committees, had on his home 
computer many ISO documents and had half-seriously offered them 
to be posted along with the Blue Book. 


“It’s not that we’re against the Internet,” Zakharov explained. 
“We just want to make sure that all the issues are properly consid- 
ered. In fact, we are using the TCP/IP protocols here at ISO.” ISO 


11 


Exploring the Internet 


had been unable to find enough OSI software to keep their internal 
network going, so they used a combination of Novell and TCP/IP. 

My allotted hour was nearing the end, so I once again began 
mumbling conciliatory phrases about experiments, cooperation, and 
similar appropriate fin-de-meeting noises. 

“So what do you want from us?” Dr. Zakharov cut in, ever the 
diplomat. 

I pulled out my extra large shovel and explained that since ISO 
obviously had concerns about the experiment, I was simply here to 
explain my efforts. “By the way,” I continued, “ISO is welcome to 
join in our little experiment. I have plenty of disk space left.” 

Zakharov grunted. McKenzie sat. 

Zakharov rose. McKenzie rose. 

Our little meeting was over. 

Back at the ITU, the machinery had swung into action and, with 
a few false starts, my tapes were being cut. 


12 


Pra gue 


With a week to kill before my plane left to go back to the States, I 
decided to try and get in a little fun. Sitting in Tony’s office using 
Telnet to read my mail in Boulder, I looked next to his mouse pad 
and saw a disorderly stack of business cards. On top was the card 
of one Jan Gruntorad, head of data communications at the Czech 
Technical University in Prague. 

With the opening of Eastern Europe, this seemed an appropriate 
omen. I picked up the phone and gave him a call. On Sunday 
morning, after an all-night train ride, I arrived in Prague. In addi- 
tion to the usually high ratio of tourists to infrastructure, I had 
timed my visit to coincide with an international congress of 100,000 
Jehovah's Witnesses. Every hotel was full. Each clerk in an endless 
parade of hotels grunted the same explanation: ““We have Jehovah 
Congress today.” 

“They've always caused me problems, too” I cracked to one 
surly reservations clerk, attempting to inject a little levity into my 
fruitless tour of hotels. The clerk stared at me, giving me the same 
blank look she would give a moldy potato. My sense of humor was 
evidently not appreciated. 

Most hotels in Prague are privately run, but Cedok, the state 
tourist agency, still books most of the rooms. In one hotel, for exam- 
ple, 80 percent of the rooms were controlled by Cedok. Cedok, 
which advertises itself as “the biggest travel agency in Czechoslova- 
kia” (until recently the only travel agency, so it had a long head 
start), doesn’t believe in reservations. When I asked to make a res- 
ervation for the next day, they told me to come back the next day 
and they would see what they could do. 

After 8 different hotels, I found a room. No wonder. The Pra- 
gue Palace, at U.S. $230 per night (payable in foreign exchange) 
would be no bargain in London or New York. In Prague, it might 
be considered extortionate. 

I had the day off, so I slipped into the mob of Jehovah's Wit- 
nesses and set off to see the sights. For lunch, I stopped at one of 


13 


Exploring the Internet 


the overcrowded, spartan restaurants and ordered the house special, 
a pizza topped with ham, eggs, and peas. The beverage menu also 
featured “Bois Avocat,” a French drink which could be translated 
either as the blood of a lawyer or some form of avocado nectar. | 
had a beer. 

With relief, I finished my sightseeing and went back to my 
room. The number of tourists in Prague was staggering, but they 
didn’t seem to have anything to do. With few restaurants, most 
milled around in the streets. The Jehovah’s Witnesses smiled a lot. 
It was as if Walt Disney had taken over the country, but had named 
Kafka managing director. 

The next day, I went over to the Czech Technical University. Jan 
Gruntorad ushered me into his office wearing a Hawaiian shirt, 
having come in from his holiday a day early to see me. His office 
was piled high with papers, computer boxes, a huge 3270 terminal, 
and books. An ancient TV was on top of one cabinet, and on the 
other were dozens of empty bottles of various kinds. In other 
words, my kind of office. 

For many years, Czechoslovakia had suffered a technology em- 
bargo due to COCOM regulations and, like other Eastern bloc coun- 
tries, concentrated on reverse-engineering IBM mainframes. Jan 
took me into their computer room and showed me a Russian main- 
frame clone, together with a Bulgarian-made front end processor 
(FEP). The MVS-like operating system had been written locally and 
it had taken two years to integrate it all into a semi-working system. 

The Bulgarian FEP and the Russian mainframe were right out of 
~ an episode of “Lost in Space.” Full of knobs and mechanical regis- 
ters, it reminded me of early computers like the ENIAC, which can 
be seen at the Smithonian’s American History Museum in Washing- 
ton, D.C. In a corner were a pile of removable disk packs, each the 
size of a keg of beer. 

Forcing designers to reverse-engineer systems and to serve as 
super-systems integrators had produced one positive effect. Many 
of the engineers at the school were quite sophisticated. Unfortu- 
nately, however, the operating system had never quite run right and 
the users never had enough confidence to invest their time learning 
to do useful work. 


14 


Prague 


In 1989, with the revolution, things changed dramatically. 
Czechoslovakia was able to put in a 9,600 bps leased line to Linz in 
Austria and join the European Academic Research Network 
(EARN), the European BITNET. In Bratislava, another school 
started using UUCP links over dial-up lines to Vienna and became 
part of EUnet. 

An important breakthrough for Gruntorad came in 1990, when 
IBM donated a 3090 mainframe as part of the IBM Academic Initia- 
tive. Starting with Czechoslovakia, but later including other coun- 
tries such as Hungary and Poland, plunking supercomputers down 
in key locations gave an important boost to Gruntorad’s networking 
efforts (you can’t build a shopping mall without upgrading the 
roads around it). 

EARN had expanded to include seven other facilities in Prague. 
Efforts were underway to extend the national backbone to Bratslava 
and other cities. From zero users in 1989, the system grew to over 
1,500 users by the summer of 1991. 

Gruntorad is much more than just the BITNET manager, how- 
ever. He was leading the effort to install a national networking in- 
frastructure. He wanted to see UUCP, NJE (for BITNET), and 
TCP/IP protocols all sharing an infrastructure of leased lines. 

Leased lines, as in many European countries, are quite expensive 
in Czechoslovakia. A 9,600 bps line from Prague to Brno, for exam- 
ple, costs 36,000 crowns per month (U.S. $1,242/month). With 
monthly salaries averaging 3,000 crowns, a leased line becomes a 
major line item in the budget. The PTT didn’t have the infrastruc- 
ture in place to properly support digital lines, so a 64 kbps line 
would be provided by ganging up six 9,600 bps line. 

Although I managed to time my departure with what appeared 
to be the majority of the Jehovah’s Witnesses, some other deity must 
have been on my side. Not having bought a ticket allowed me, 
through some mysterious bureaucratic rule, to bypass the hundreds 
of people waiting to check in and report to the excess baggage win- 
dow. 

The burly representative from Czechoslovakian State Airlines 
who sold me my Swissair ticket even smiled when I suggested she 
should feel free to close the airport after I had gone—a sure solution 


15 


Exploring the Internet 
to overcrowding. They even allowed me to change my crowns back 


into dollars without the obligatory official receipt proving that I 
hadn’t used the black market. 


16 


Zurich was a real contrast to Prague. I settled into an expensive 
hotel with small rooms and crossed the street to a beer house, where 
I feasted on three kinds of sausages, each accompanied by a large 
frothy mug of local beer. 

The next day, I went to meet Urs Eppenberger, a technical man- 
ager at SWITCH who explained how the Swiss research network 
was being established. SWITCH, which stands for Swiss Telecom- 
munication System for Higher Education and Research, was estab- 
lished six years ago by the federal government and the cantons of 
Switzerland to start and maintain a university research network and 
a national supercomputer center. 

Urs works in the SWITCH network office, which consists of 
eight engineers, an administrator, and lots of computers. SWITCH 
is a network infrastructure with services like e-mail. The infrastruc- 
ture consists simply of leased lines and Cisco boxes installed at 11 
sites around the country, plus links into the X.25 Telepac network. 
The interface between the campus and SWITCH is clearly defined at 
the Ethernet plug. SWITCH maintains its own system, including 
configuring the routers. 

Originally, the network was going to be religiously OSI, using 
services such as X.400, FTAM, VIP, and any other OSI services 
available. The system quickly switched over to a more pragmatic 
approach, supporting TCP/IP, X.400 over OSI, and even DECnet. 

The network is very Swiss. It is carefully planned and carefully 
implemented. Impeccably engineered, not too adventurous, and fo- 
cusing on offering a reliable production service, SWITCH is an or- 
derly addition to the carefully manicured Swiss landscape. 


17 


Geneva 


I took the train back through the rolling hills of the Bernese Ober- 
land and Fribourg to Geneva. There, I went to see Brian Carpenter, 
head of networking for CERN, the European physics laboratory. 

CERN is one of the major centers for the study of high-energy 
physics in the world. The laboratory has over 5,000 visiting scien- 
tists, plus another 3,000 permanent staff members. CERN is funded 
by 17 European countries, including a substantial East European 
membership. The laboratory is mission oriented, a place to do seri- 
ous, world-class research. It has, as have many other physics labo- 
ratories such as Fermilab in Chicago, been on the forefront of 
networking as a way of allowing physicists to exchange data. 

A typical CERN experiment in high-energy physics might in- 
volve 400 scientific staff from 20 to 40 different institutions. For ex- 
ample, one of the experiments on the Large Electron-Positron (LEP), 
the new 27-km accelerator, involves physicists from seven CERN 
members working alongside scientists from China, India, Israel, 
Hungary, the U.S., and Russia. | 

Because of CERN’s constituency, it has become one of the global 
Internet hubs. Much of the connectivity to Eastern Europe funnels 
through CERN. The CERN mail gateway routes messages for hun- 
dreds of networks. 

Internally, the CERN network runs the usual motley assortment 
of technologies, including gigabit Ultra networks, FDDI, and over 
3,500 stations on 60 different Ethernets. Over 400 gigabytes per 
month are transferred on the FDDI backbone alone. Over 1,000 sta- 
tions on a 4 Mbps token ring are used to control the accelerator. 

WAN links at CERN are equally impressive. Over 150 gigabytes 
per month are transferred out of the laboratory over wide area net- 
works. The laboratory has a 384 kbps link to MIT, a T1 line to Cor- 
nell, an El line to Bologna, and an 8 Mbps feed to the CHEOPS 
satellite. Francois Fliickiger, deputy head of networking, estimated 
that of the total 15 Mbps of international bandwidth devoted to re- 
search networking, 11 Mbps terminate at CERN. 


18 


Paris 


I went back to Paris to accomplish the more serious business of eat- 
ing and drinking until my plane left to take me back to the U.S. In 
August, Paris transforms itself. The French all leave on their annual 
four- to six-week holidays. The absence of Frenchmen contrasted 
sharply with the surge in the American presence. 


It seemed like the entire population of New Jersey had come to 
see the Eiffel Tower. They had brought with them a large portion of 
Sony's Camcorder output for the past few years. This called for 
guerilla tourism on my part, avoiding the Champs Elysées and con- 
centrating instead on seedy cafés on the Left Bank. Before leaving, 
however, there was one bit of business I wanted to accomplish. 


On my last day in Paris, I called Gerard Poireau and arranged to 
visit his office, located in the shadows of what used to be the Bas- 
tille. Poireau is an evangelist for videotex. One of the original mar- 
keting managers for the French Minitel system, he is active in efforts 
to spread this underrated technology into the U.S. 


When you get a telephone, France Telecom gives you the choice 
of a phonebook or a computer terminal. As a result, over 3 million 
people have, free of charge, one of the squat brown Minitel termi- 
nals in their home. Of these 3 million terminals, France Telecom 
estimates 80 percent are actually used. Even if the number is in- 
flated, this was still, until very recently, the largest single network in 
the world. 


The core of Minitel is directory assistance, however. Poireau 
had a formidable memory, rattling over a dozen phone numbers off 
the tip of his tongue. When his memory failed, however, he reached 
over to his Minitel terminal and tapped the two digits to connect 
him to directory assistance. He typed in the last name and the city, 
and the fax, voice, and audiotext numbers all appeared on the 
screen. (Audiotext is the French word for phone-based services like 
stock reports or voice mail.) Gerard picked the menu item for the 
voice line, and the number was automatically dialed for him. 


19 


Exploring the Internet 


Minitel is much more than just directory assistance. The usual 
bulletin board services—pornography, dating services, IQ tests, and 
sports results—were all present, but with a few additional surprises. 

For example, Nynex had the New York Yellow Pages up on 
Minitel. Prohibited from offering electronic yellow pages services in 
the U.S. by Judge Greene’s restraining order, Nynex had no such 
restraint in France and was evidently testing their U.S. system for 
future deployment. Gerard and I looked up the names of all Ban- 
gladeshi cafés in Manhattan and jotted down their locations for ref- 
erence on subsequent trips to the Big Apple. 

Most access to Minitel was based on the French X.25 network, 
Transpac. With over 300 X.25 switches connected at speeds of up to 
2.048 (E1), Transpac and Minitel have a symbiotic relationship. A 
service like Minitel does no good if there is no access path to it. 
Likewise, an X.25 network is a road to nowhere without useful serv- 
ices on it. 

Minitel was a case study in providing useful information serv- 
ices. By the beginning of 1990, Minitel had over 12,000 service 
providers. Even intra-company transactions, incuding banking, in- 
surance, and order processing, occurred on the network. The direc- 
tory service alone received well over 10 million calls per day and 
train reservations received over 1.5 million calls per day. 

Leaving Gerard Poireau, I went to catch my plane back to the 
U.S. Through some fast talking, I managed to get my no-refund, 
nochange, economy ticket upgraded to a first class seat. It’s amaz- 
ing what you can get, if you just ask. 

I sat munching my Beluga caviar and drinking my Dom 
Perignon champagne and decided that travel wasn’t so bad if you 
just get the right seat. By the time the single malt scotch, the vin- 
tage port, and the freshly-peeled kiwi fruits had come and gone, I 
even became optimistic about the weeks ahead converting ITU data. 
Drink can certainly cloud your judgment. 


20 


Boulder 


At the New York airport on the way back to Denver, I sat in the bar. 
Over in the corner was a motley assortment of people that could 
only be a rock and roll band on tour. Leather pants, nose rings, 
orange hair, and a half-dozen drinks in front of each person were 
just a few of my clues. 

At the check-in counter, the band members stood around mak- 
ing the agents nervous. Evidently, they had booked their seats late 
and were not pleased with their assignments of middle seats. As I 
was in the same boat, I stood with this crew harassing the ticket 
agent. I surreptitiously flashed my frequent flier card and she took 
my ticket and gave me an aisle seat. 

Getting on the plane, I saw that I was next to one of the disgrun- 
tled musicians, this one adorned with shoulder length hair and vari- 
ous martial adornments on his leather jacket. He squeezed over me 
and sat down. 

“You have to be with a rock and roll band,” I ventured. 

He grunted, presumably in confirmation. 

When we got into the air, he called the flight attendent over and 
ordered two double screwdrivers (“hold the orange juice”) and be- 
gan methodically going at them. I drank a beer and started reading 
The Chinese Screen. 

To my great surprise, he leaned over and asked “Is that Somer- 
set Maugham?” I said it was, and we sat there discussing late nine- 
teenth century English literature. 

His name was Wurzel and he was in Motorhead, the quintessen- 
tial British loud rock band. They were on tour with Judas Priest 
and Alice Cooper in a heavy metal extravaganza. Wurzel’s job was 
lead guitarist. 

“Basically, I try and play as loud as I can,” he said, explaining 
his job. 

“Well, somebody’s got to do it,” I replied. 

This comment pleased Wiirzel so much he waved to the flight 
attendent to bring two more double vodkas for himself and a beer 


21 


Exploring the Internet 


for me, simultaneously repeating my new rationale for his existence 
to his mates scattered a few rows up. The flight attendent was treat- 
ing this crew quite gingerly lest they mistake the plane for one of 
their hotel rooms, and promptly brought the drinks. 

Before landing, Wiirzel handed me his business card and invited 
me to the big show at some location he couldn’t remember. Alas, I 
was still reading my mail by that evening and let this opportunity 
for cultural enrichment pass me by. 


0 


Although I got back in late August, it was into the second week of 
September before my tapes from the ITU finally arrived, leaving us 
about 20 days to convert the tapes before the hooptedoodle began. 

At INTEROP 91 Fall, on October 11, a live video link to Geneva 
had been arranged. Pekka Tarjanne and Tony Rutkowski would 
make the big announcement about the newly freed Blue Book to a 
packed and hushed audience in San Jose. 

My job was to get the standards converted and on the network 
before the announcement so there would be no turning back. Until 
we actually let the documents loose on the Internet, there was al- 
ways the possibility that the bureaucrats would somehow gain the 
upper hand and stop the experiment. 

A week spent trolling the halls of the ITU had produced docu- 
mentation on about half of the proprietary, in-house text formatting 
system they had developed many years ago on a Siemens main- 
frame. The computer division had given me nine magnetic tapes, 
containing the Blue Book in all three languages. Despite repeated 
tries, we had gotten nowhere on trying to also get the CCIR radio 
recommendations and reports, even though the Secretary-General 
and the head of the CCIR had both appeared anxious to see this 
data online. 

Along with the magnetic tapes, we had half a dozen TK50 and 
TK70 cartridges from the ITU VAXen. The cartridges contained PC 
files that were stored on a VAX using DEC’s PC networking prod- 
ucts. We had two types of files, one of which was known to be 
totally useless. 


p44 


Boulder 


The useless batch was several hundred megabytes of AUTO- 
CAD drawings, furnished by the draftsmen who did the CCITT il- 
lustrations. Diagrams for the Blue Book were done in AUTOCAD, 
then manually assembled into the output from the proprietary text 
formatting system. The draftsmen were very helpful and quickly 
said I could have any data I needed. 


On my way out of meeting with the draftsmen, however, one of 
them starting asking some questions about scanners and babbling 
on about TIFF files. I was puzzled. Why should I care about scan- 
ners and TIFF files when I had the diagrams in the original formats? 


Turned out that AUTOCAD was indeed used for the diagrams, 
with the exception of any text in the illustrations. The textless dia- 
grams were sent over to the typing pool, where people typed on 
little pieces of paper ribbon and pasted the itsy-bitsy fragments onto 
the illustrations. Come publication time, the whole process would 
be repeated, substituting typeset ribbons for typed ribbons. A nice 
production technique, but the AUTOCAD files were useless. 


The rationale for this bizarre document production technique 
was that each diagram needed text in each of the three official lan- 
guages that the ITU published. While AUTOCAD (and typing) was 
still being used, the ITU was slowly moving over to another tool, 
MicroGrafix Designer. There, using the magical concept of layers, 
they were proudly doing “integrated text and graphics.” 


The second batch of DOS files looked more promising. Modern 
documents, such as the new X.800 recommendations, were being 
produced in Microsoft Word for Windows. My second batch of 
tapes had all the files that were available in the Word for Windows 
format, the new ITU publishing standard. 


To do the conversion, I was quite lucky to be working with Sun 
Microsystems on a research grant. They had sent over two large 
servers for a research program I was participating in and graciously 
agreed to allow us to use one server to post standards on the net- 
work. Without their help, we wouldn’t have had the resources to 
do anything. 


0 


23 


Exploring the Internet 


Step one was to begin tackling TPS, the ITU wonder program devel- 
oped years ago. I brought the tapes over to Mike Schwartz, a pro- 
fessor at the University of Colorado and my partner on the Sun 
research grant. 

The ITU had documented the format we could expect the tapes 
to be in. Each file had a header written in the EBCDIC character set. 
The file itself used a character set seemingly invented by the ITU, 
known by the bizarre name of Zentec. The only problem was that 
the header format wasn’t EBCDIC and the structure the ITU had 
told us would be on the tape wasn’t present. 

Using Captain Crunch Decoder Rings, we finally figured out a 
collating table for the mystery header character set and managed to 
hack the files off the tape. There were large amounts of data at the 
beginning and end of files which seemed useless and was simply 
deleted. We crossed our fingers that the deleted information would 
not be needed later and indeed, it wasn’t. 

Next, we had to tackle TPS. This text formatting language was 
as complicated as any one could imagine. Developed without the 
desire for clarity and simplicity I had come to expect from the UNIX 
operating system and its tools, I was lost with the Byzantine, un- 
documented TPS. | 

The solution was to take several physical volumes of the Blue 
Book and compare the text to hexadecimal dumps of the files. I 
then went to the Trident Café and spent a week drinking coffee try- 
ing to make sense of the data I had, flipping between the four files 
that might be used on any given page of text trying to map events 
in the one-dimensional HexWorld to two-dimensional events in the 
paper output. 

Inbetween trips to the coffee house, I was trying to take care of 
diagrams and the PC files. Diagrams were simple: I sat down every 
morning for a few hours and scanned in diagrams. The diagrams 
were saved as TIFF and EPS files, then uploaded to our Sun server. 

The PC files were all unloaded onto a VAX, then moved over to 
the Sun, then downloaded at 9,600 bps to my home network. There, 
the files were loaded into Word for Windows, and then exported as 
Rich Text Format, the Microsoft proprietary standard for open docu- 
ment interchange. The RIF files were then converted to Word Per- 


24 


Boulder 


fect and ASCII, and all four file formats were sent back up to the 
Sun. 

All told, it wasn’t unusual to be downloading and then upload- 
ing 10 to 20 megabytes per day, all using a 9,600 bps modem. Still, 
this was the easy part. It was TPS that almost killed us. 

Finally, after pages and pages of PERL code, we had the begin- 
nings of a conversion program. We had tried to use the software 
developed at the ITU to convert from TPS into RTF, but the code 
had been worse than useless. 

The day before leaving for INTEROP, I was still working desper- 
ately away on the conversion program. Tables and equations were 
still not coming out the way I had wanted them to, but finally, it 
came time to start hand editing. Any tables that couldn’t convert 
properly were thrown out. Same with equations. 

At 2 AM., with the SuperShuttle coming at 6 A.M., it was finally 
time to pack for INTEROP (and the six weeks of travel that would 
immediately follow INTEROP). The data wasn’t perfect, by any 
means, but the Blue Book was on the Internet ready to be distrib- 
uted. The Bruno project was ready to roll. 

As I packed, I reflected on what had been an awful 20 days, 
programming like a madman to do the conversion. It was amazing 
how the ITU had been doing a conversion, with lots of people avail- 
able, but had reportedly estimated that it would take a total of 10 
years, and roughly U.S. $3.2 million, to complete the job. By my 
calculations, if it would have taken 40 days to make the conversion 
perfect, my time would have been worth, on the ITU scale of reality, 
U.S. $10,000 per hour. My only hope was that I might be able to use 
this data to justify an increase in my consulting rates. 

As I was going to sleep, I tried to figure out how bad a case of 
bureausclerosis one would have to have to in order to turn a 20 day 
(40 to make it perfect) conversion effort into 10 years of agony. 
Over the next few months, as I visited Geneva again and saw the 
experiment run into the famed international bureaucracy, I was to 
learn how it could easily take 10 years, or, more likely, never get 
done at all. 


Das 


ae, we ay a ) Oe 
Se ars . A ner oe i eid we p . 
| : oe a ae ch! a 
Gpaongneiean bite 6 fort 
oH 1 yiters dept” | semana area et bk ie 
its sini ribris bk: pol wtleoth do ein may. 
vihercnghurh eqd 008.2 a gritas ee aq ¢ 
Che TY Gayest teeta sted 
jn tyedtis vert iia enh vibe ae Yen ag ey. btie 2 
otavilostiadt! oeu-dtabelesr del os. | maka 
“ytaaem ure TP teieBat abot sea iT OSE, 
a @ r PALI ‘i “ ih wel 1 it "3 Af Pi a veenedt meee ner : - 
Lave en yoni, Utekews PORE Laotenivest incied 
Sted verre pote Reeth. eae wad antes asovifngie Nn! soit ti — 
do lata buds air # = hye: pear lus 1 Afusnn leat Nae RT 
bik os | ee yi cag aidid eh ne reise besirh inate atte Ate? ae 
toot ” act ay va Pw gees sud ace te ale, i | 
Yiloritl voltit hone 3 da gitar ebtiagsiie appa cifveng sii Ay 
| tlaiett toreiansawik Gildea) 9 nr TT 701 
(rie wet aha aia Sony eit TOF AAR, wollojas 
inte tdact, yk en korragtess onli! agi enue autlfobhd — 




































i 2 
sed 7 
's 


lieth thee ob nisi honce ng bearnnanangy a ASU 
eR RTs, helaetia cB eR rf tor he rsp" Kaine MN ioe dtp : BY shih sil 
Dassen mee: it ibe ney wit ob of runt een § sail S aes iene 
lis yh Al qoasiee abot tty yA RAEN RM (2% % BO rota ma sic 
0 Jocleloi.5 iat bigow, di ted Perrin vie 
fan, Vhtheh gel Thales eer pours tet.) baie aul 
"pags antago pene AKAD OP ae hepesel bheowiodicg! 
GNA, 20 eisna LT! ot oe Lt FMI ey adh, ieee 
rig! Gxt thet Faerie jack} ae eh Ay’ view eMac ti Af ap" eo 
cutpik . estes gs snitias WO? ite es species (0 
it Jeph | EP WOG, BiG ere yt § Joh be itd ek: 34 
wa Ket Tad eee RM ape 
LApgs Jonge ehay, tea alRayno MD, 
ad Neg hay Sy ERS PET om Retin AP 
o) ene fr OPAC IAGO! ara ae 
2 AA, ee Ua “6 
wey ives wine daecied bebe 
~ Rich Teat Speman, the Mien “ah 
“rhant interchange.” Tie Es 
> he | i ei ie yr 
7 a a “te ; 


Ay 4 





Round 1 


From INTEROP to IETF 









7 ny 
a el 

¥ bro 
LTV Re 






| VN eg te 


TA of GOGAT 
aS : Cat Al oy athe 7 


San Jose 


When people ask me to explain how INTEROP is different from 
other trade shows and conferences, I like to describe it as resem- 
bling a circus, but not a zoo. A circus appears to be all chaos, but it 
is carefully managed chaos. A zoo, on the other hand, puts the ani- 
mals into cages and lets them do what they want. 

Networld—referred to by one wag as “Notworld’’—is the trade 
show equivalent of a zoo. Each little cage has its own independent 
little show. In some cages, exuberant marketing types reach out to 
touch you with their brochures. In others, they stand listlessly 
around. ‘The visitors to Networld stroll from one cage to another, 
feeding their name tags to the animals, hoping that one of them will 
do something interesting. 

INTEROP, on the other hand, is a show. Granted, there are also 
cages, but those are a small part of what is going on. There are 
tutorials, a conference, and, most importantly, a huge, operational 
network. 

When I arrived on Saturday, October, 5, 1991, people were just 
beginning to descend on San Jose. After checking into the luxurious 
Holiday Inn, I wandered over to the Fairmont Hotel. In a meeting 
room, about 50 volunteers, engineers from all over Silicon Valley 
and from around the world, were gathering. 

All were quite bleary-eyed. Most of them had been up all night 
stringing cable in the Diamond Pavilion, one of the auxiliary exhibit 
halls being used by INTEROP. This gathering was getting ready for 
the real work that lay ahead that night: installing the network at the 
San Jose Convention Center. 

All of the vendors (with a couple of minor exceptions like my 
publisher) were connected to a real operational show network, 
which in turn was connected to the Internet. This was no coaxial 
cable down the center of an exhibit hall. The network used over 35 
miles of cable and connected 300 vendors together with what one 
observer estimated would be the equivalent of the components 
needed to wire a 20-story high-tech skyscraper. 


29 


Exploring the Internet 


The organizing principle for the network was a series of ribs. 
Each rib ran through a physical area, such as an aisle in the conven- 
tion center or the Diamond Pavilion. Each rib had an Ethernet 
based on unshielded twisted pair and a 16-Mbps token ring. Each 
of the 25 ribs had a 19-inch equipment rack at the end with the 
electronics to drive the subnets and routers to be connected to the 
backbones. 

Two different backbones connected the 50 subnets, one based on 
FDDI, the other on Ethernet. A T1 line connected the Diamond Pa- 
vilion to the Convention Center. A microwave link went to two ter- 
minal clusters nearby in the Fairmont Hotel. Yet another T1 link 
linked the show network to the NASA-Ames Research Center, 
which in turn provided links to the Bay Area Research Network and 
out to the NSFNET backbone. 

This entire network was put in by a semifanatical team of volun- 
teers, overseen by two INTEROP staff members frantically trying to 
keep some sense of order. The challenge to this network is that you 
don’t get convention centers a month ahead of time to put in your 
network. In fact, as we met Saturday afternoon, they were still tear- 
ing down the booths from the previous week’s Seybold Publishing 
Conference. 

At midnight, the Convention Center would be turned over to 
the Interop Company. At 8 AM, just eight hours later, dozens of 
18-wheel tractor trailers would roll onto the convention floor to start 
setting up the vendor exhibits. By that time, all the cable needed to 
be off the floor: try telling a teamster on a forklift to take the long 
way around because he might crush the fiber. 

Between midnight and 8 A.M., 35 miles of cable had to be rolled 
out and hung from the ceiling with cherry pickers. Equipment 
racks had to be moved safely into place, and equipment for the Net- 
work Operations Center (NOC) had to be moved up into the control 
booth overlooking the convention floor. 

To make this all happen, a core team of a half-dozen volunteers 
met with Interop all year to plan the network. In July, the company 
got the convention center for a day and hosted a cable laying party. 
All the cable was laid out and connectors added. Then, the cables 
were tied together and carefully rolled onto drums and moved into 


30 


San Jose 


a warehouse. Before the show, there was a hotstaging in the ware- 
house, where the cables were connected to equipment racks to be 
tested. Then, everything was packed up onto pallets to await the 
teamsters. 


At midnight, a group of about 50 had gathered in the lobby of 
the convention center. Each member of the core team had a differ- 
ent colored shirt, each with the words “Do Not Disturb” stencilled 
on the back. 


I was assigned to the teal team, under the leadership of Karl 
Auerbach. Karl was one of the founders of Epilogue Technology 
and a long-time participant in the INTEROP ShowNet. He’s also a 
lawyer, which makes him a formidable rabble rouser at IETF meet- 
ings. 

With a loud bellow, we were all called over for a briefing by 
Stev Knowles. (The ending “e” in “Steve” got left off of a mail mes- 
sage once, and Stev decided he preferred it that way.) Stev is vice 
president of engineering at FIP Software and is widely acknow- 
ledged as the loudest member of the ShowNet team. 


Stev’s briefing was, as usual, direct and to the point. “Do what 
you re told and if you have a question, ask.” 


Stev is an interesting character. Rumor is that he got involved in 
the very first ShowNet because he couldn’t read his mail. The net- 
work wasn’t working, so he marched into the show and comman- 
deered the ShowNet team until things started working. 


By sheer force of will, he and the other core team members do 
this every year, staying up for several days straight to get the net- 
work up and running. For this, everybody gets a t-shirt. Of course, 
the core team got put up by INTEROP at the Fairmont, but even the 
impressive bar bills they ran up didn’t quite explain why they did 
this. 

A few minutes after midnight, the doors opened and we all 
stood on the cavernous convention floor, clustered around our lead- 
ers. Two tractor-trailers were driven into the center of the floor and 
began to dump their contents. Equipment racks, spools of cable, 
and various other network paraphernalia were all hustled to their 
proper locations. 


31 


Exploring the Internet 


The barrels of cable began to be unspooled. Teams of volun- 
teers, spaced every few feet, would march a string of cable across 
the hall. A few ties holding cable were cut and the feeds that would 
hang down from the ceiling were separated from the main rib. 

Then, five cherry pickers started a slow march down the conven- 
tion floor. At each rib, the cherry pickers descended, then in unison 
(or some ragged semblance of unison) lifted the cables to the rafters. 

Hanging down at intervals were coils of cable. These feeds were 
left about 16 feet off the ground, high enough to clear the semis 
coming in the next morning but low enough to reach without a 
cherry picker. 

By 5:30 A.M., most of the ribs were successfully up, so I went 
back to the luxurious Holiday Inn for two hours sleep before I 
started my day of meetings. The volunteers were still working 
when I left and would continue to do so for the next two days 
straight. Getting the cables up was the most time-critical task, but 
plenty of work still remained. Cables had to be connected to equip- 
ment racks, connectors tested, the backbone had to be tested, ven- 
dors had a million questions, the Internet link needed to be 
initialized, and a million other details had to be finished before the 
show opened on Wednesday. | 

The volunteers that put in this network are an amazing bunch. 
Some of the best network managers from all over the country come 
just to help out. When they are done, they have a complex internet- 
work up and running and connected to the rest of the global mesh. 
Three days later, it is torn down. 

While the ShowNet is operational, it supports some fairly heavy- 
duty applications. Groups of vendors get together to demonstrate 
the interoperability of standards such as Frame Relay, SMDS, X.400, 
SNMP, and many others. In marketing-speak, these are called Solu- 
tions Showcases. As you walk through the exhibits on the conven- 
tion floor, different booths have little signs indicating which 
showcases they are part of. 

The Solutions Showcases are certainly useful as a marketing 
tool. Lots of users come to the show to see what works and who 
sells the equipment. However, the showcases are equally important 
to the engineers that design and make the technology. 


32 


San Jose 


I spoke to one engineer who says he gets more bugs worked out 
in one week at INTEROP than he can in six months in the lab. By 
testing his implementation with those of other vendors, he can 
quickly hone in on ambiguities in the standards and figure out what 
to do to make the standard an interoperable reality. 


0 


The INTEROP week passed by quickly. The first two days, I sat in 
on a few of the tutorials, hearing people like Craig Partridge talk 
about gigabit networks or MIT’s Jeffrey Schiller talk about network 
security and Kerberos. On Wednesday, the show officially began 
and the pace picked up. The plenary address was via T1 video link 
from Geneva. I was particularly interested in this address since I 
was going to need the same satellite link on Friday. 

Things went smoothly Wednesday morning, mostly because the 
previous two days had been spent in frantic preparation. The video 
link was donated by Sprint. Coordination of this part of the show 
at INTEROP was handed to Ole Jacobsen. Ole had worked long 
hours with Sprint technicians, watching the line go from Geneva to 
Atlanta until, the day before, it had reached Kansas City. By Tues- 
day night, video was finally making it all the way from Geneva to 
San Jose. 

Ole was the perfect choice to handle anything telephone related. 
Officially, he is editor and publisher of the ConneXions journal. Un- 
officially, he is a phone junkie. For example, he has a PBX in his 
house. Of course, the PBX is a small one with only 6 lines and 16 
extensions, but how many houses do you know with their own 
PBX? His wife Susan still can’t get used to dialing “9” for an out- 
side line. 

After the plenary, I dove into the exhibition and conference. 
Most people were in high-speed data acquisition mode, trying to 
work out optimal patterns for navigation of the floor, or flitting 
from one conference session to another hoping that time division 
multiplexing would enhance their information intake. 

My personal favorite, as it had been the year before, were the 
SNMP demonstrations. In 1990, John Romkey had developed the 


33 


Exploring the Internet 


Internet toaster. The toaster was hooked up to the ShowNet with a 
PC running TCP/IP and SNMP software. Workstations around the 
show floor had network management software, complete with a 
toaster Management Information Base (MIB). By setting variables 
on the toaster MIB from a network management station, people 
could make the toaster start toasting. 

The problem everybody immediately saw with the 1990 demon- 
stration was that you had to put the toast into the toaster. This was 
suboptimal from the point of view of the network engineer, who 
wanted to stay in bed while breakfast was made. 

This year, the FIP Software booth sported the new, enhanced 
Internet toaster. Using the latest Lego technology, they built a little 
crane that would pick up a piece of bread and deposit it into the 
toaster slot. 

What made this demonstration especially funny is a bit of an 
inside joke. If you read Marshall T. Rose’s The Simple Book, you will 
see that he feels strongly that people should make better use of the 
get-next operator for efficiently using the network and the remote 
management agent. 

To get his point across, Marshall always refers to the get-next 
operator as the “powerful get-next operator.” The INTEROP audi- 
ence was truly impressed that the powerful get-next operator was 
being used to make toast. 


0 


Friday morning was the official unveiling of the activities of the 
Document Liberation Front. I got up early and went over to the 
Center for the Performing Arts, the biggest hall at the INTEROP 
show, seating 2,701 people. This hall is so big that it even has 
enough room to hold the hundreds of students that show up for the 
tutorial taught by Doug Comer of Purdue, a researcher well known 
for his explanations of TCP/IP fundamentals through his tutorials 
and books. 

The members of the panel started to show up. Dr. Vinton Cerf, 
chairman of the Internet Activities Board, was there to lend his sup- 
port to the announcement. Richard desJardins, head of a training 


34 


San Jose 


group called The GOSIP Institute, was there to provide his commen- 
tary on the different models of standards making. 

We finally got through to Geneva. Although neither Tony 
Rutkowski nor Dr. Tarjanne was present yet, we held our breath and 
got ready to start the session. Looking out into the audience, which 
contained no more than 50 people who had bothered to get up for 
the early morning session, I was very glad that the cameras couldn’t 
beam back to Geneva. 

We made our announcement and the one member of the press to 
show up furiously took notes. The announcement went well, but I 
was worried that nobody would care and that all this effort had 
been in vain. 

Over the next two months, I was to discover how wrong I was. 
Leaving INTEROP and travelling around the world, I got more 
news at every stop on how popular Bruno and the Sons of Bruno 
had become. I thought the choice of Giordano Bruno (1548-1600) as 
the namesake for my server in Colorado had been an appropriate 
one. 

The Greeks, in those days before the printing press, used a mne- 
monic method for remembering verse or other forms of knowledge. 
The Dominican order had kept alive these secrets during the dark 
middle ages, but had kept them tightly guarded. Bruno joined the 
Dominican order in 1565 and mastered the Dominican secrets. 
Then, he revealed the secrets to the rest of the world in his classic, 
Shadow of Ideas (1582). 

Bruno was expelled from the Dominican order, and was later 
denounced to the Inquisition in Venice for acts of heresy, including 
telling jokes in poor taste about God. He was burned at the stake in 
1600. 

Would Bruno’s secrets help the world? Would the ITU Inquisi- 
tion kill our server? These and other questions were on my mind as 
I boarded a plane Sunday, bound for Hawaii and then onwards, 
three times around the world in the next six months. 


35 


Honolulu 


I came to Hawaii to learn more about packet radio. Really. 


The fact that I spent most of my time on the beach drinking Mai 
‘Tais was an accident. 

Honolulu is the home of Torben Nielsen, a man who has played 
an important role in helping to spread the Internet into the Pacific 
Rim. The University of Hawaii provides the Internet link for several 
Asian countries, particularly Korea and Japan. 


He is also known for starting up the University of Hawaii net- 
work. Networking was not originally considered to be a high prior- 
ity at the University. In fact, it was such a low priority that nothing 
was happening. Torben enlisted a few of his colleagues (including 
four department chairmen), rented power tools, and started digging 
trenches. 

For a total of U.S. $1,500, lots of hard work, and the extreme 
displeasure of the facilities management group, the renegade profes- 
sors managed to get four buildings linked together in a network. 
The project was done so cheaply that they even salvaged refueling 
lines from military aircraft to use as conduit. 

Nielsen’s laboratory is a windowless room lined with foam pad- 
ding and absolutely stuffed with computers. The Blue Book, Sun 
documentation, and various other books line the wall. Sitting inside 
this room, it is hard to imagine that nearby is a world of beaches 
and drinks decorated with paper umbrellas. 


I arrived at 8:30 A.M. and Torben had already been there for two 
and a half hours. When he mentioned this, I made the appropriate 
polite noises of amazement. Torben looked at me like some shirker. 
“T’ll be here till 9:00 tonight and we do this seven days a week,” he 
patiently explained to me. 

Needless to say, a leisurely lunch was probably not going to be 
in the works here. I realized that my time slot in Torben’s schedul- 
ing algorithm was going to be limited, so I tried to learn quickly 
what I could about his work. 


36 


Honolulu 


Getting lines up and running is what Torben is best known for, 
but he is rapidly tiring of keeping pipes open and bits flowing. In- 
stead, his interests are higher up the stack in areas like videoconfer- 
encing, the Andrew File System (AFS), interactive books, and a wide 
variety of other applications. 

The topic of the day appeared to be SGML and ODA, so we 
talked about revisable form document architectures. In Torben’s 
view, the Office Document Architecture is basically useless. To him, 
SGML tagging is the appropriate internal format for a document. 

As evidence he cites a commercial program that uses SGML as 
the internal representation of documents. The SGML document is 
then moved through TeX, which processes the tags. TeX is thus a 
formatting engine for SGML, which in turn produces output in a 
language such as PostScript for final form representation. 

In Torben’s view, ODA fills the same intermediate role as TeX. 
You can use SGML source and use it to produce ODA, which is then 
sent to some ODA reader for display on the screen or the printer. 

After this brief flurry of discussion on revisable form formats, 
Torben dismissed me and switched context to some other work. | 
borrowed a terminal to read my mail. 

When I left the cocoon of Nielsen’s lab, it was still only 10 AM, 
much too early to return to the Waikiki tourist ghetto. I swung my 
car over the mountains to the other side of the island. 

After driving around the sugar plantations, I arrived in the little 
town of Haleiwa. There, I spotted a sign saying “Best Lunch in 
Haleiwa.” Afraid that this might also well be the only lunch in 
Haleiwa, I pulled onto the back lawn of the building, almost ran 
over a dozen cats and parked next to the outhouse. 

After a wonder lunch of Mahi Mahi and eggs smothered in a hot 
sauce made with lilikoi flowers, I felt much better. I spent the rest 
of the day in exhaustive research looking for the perfect Mai Tai. 


37 


Tokyo 


Arriving at Tokyo’s Narita airport ahead of schedule, I waited two 
hours for my bus into town. After an hour on the bus, we were still 
wending our way through the Tokyo suburbs, passing Disneyland, 
the docks, and threading through ever larger mazes of freeways. 

Looking down, I realized the freeway was built on top of a river. 
Next to us, only a few feet away, were rows and rows of office 
buildings. Looking inside each, I could see rooms and rooms filled 
with row after row of desks all crowded together. Below us, but 
above the river, ran the railway tracks, above us another freeway. 

The next morning, I ventured forth on the subway system to 
find the University of Tokyo, known as Todai. There, I met Profes- 
sor Haruhisa Ishida, a professor at the Computer Centre. Professor 
Ishida proceeded to give me an excellent introduction to networks 
in Japan. 

Japan, like the U.S., has many different networks. BITNET, as in 
most countries, was initially funded by IBM, but is now member 
supported. What membership fees don’t cover is provided by the 
main sponsor, the Science University of Tokyo. Japan’s BITNET has 
a 56 kbps link to CUNY and provides tail links to Korea and Tai- 
wan. 

N-Inet is an older, proprietary network to tie together main- 
frame systems with services like remote job entry and remote login. 
N-Inet was managed by the National Center for Science Information 
Systems (NACSIS). NACSIS, a research institute funded by the 
Ministry of Education, also maintains a link to FIX-West, with two 
other links continuing on to NSF and in Washington and the British 
Library. 

NSF uses a portion of the line to search several large databases 
maintained by NACSIS. A small part of the line is available for BIT- 
NET and TCP transfers and is used mostly for mail exchange from 
their X.400 messaging system. NACSIS plans to upgrade the U.S. 
link to 192 kbps in 1992, at which time it will become one of the key 
international links for Japan. 


38 


Tokyo 


A third network is the Todai International Science Network 
(TISN, pronounced “Tyson”). TISN uses the DECnet protocol suite 
and is used by physicists and chemists. TISN maintains a 128 kbps 
link between Todai and the University of Hawaii. Due to political 
walls between organizational fiefdoms, Japan also maintains HEP- 
net connectivity at the High Energy Physics Laboratory (KEK) to the 
Lawrence Berkeley Laboratory in California. 

One last network is JAIN, a TCP/IP-based university network 
that links the university LANs together. This whole plethora of net- 
works is tied together by JUNET, based on UUCP, and WIDE 
(Widely Integrated Distributed Environment), the Japanese Internet. 

There are two paths between the Japanese Internet and the rest 
of the Internet. WIDE maintains a 192 kbps link from Keio Univer- 
sity in Fujisawa to the University of Hawaii. In addition, the 128 
kbps link between Todai and Hawaii, used primarily for DECnet 
traffic, acts as an automatic backup in case the 192 kbps link has 
problems. 

WIDE is an interesting network in the Japanese system. All the 
other networks are funded by the Ministry of Education or another 
group. Officially, WIDE doesn’t exist. Even more amazing, in the 
tightly segmented world of Japanese politics, commercial and edu- 
cational users are all mixed together. 

I asked Professor Ishida how such a situation could come to be. 
His answer was quite simple. 

“Jun Murai.” 

Jun Murai used to be a research associate at Todai, working with 
Ishida, but recently moved south to his alma mater, Keio University. 
In the staid world of academics, Jun is a fairly remarkable character. 

Just for starters, he wears blue jeans. Failing to dress in the 
regulation dark blue suit has caused no small amount of comment 
among senior faculty members. Jun gets away with it because he 
really knows what he is doing. He commands a loyal following 
among students, has the respect of all his peers, and has even won 
the grudging respect of his seniors. 

The WIDE network is based on donations of money from corpo- 
rations and labor from graduate students. The network lives almost 
hand to mouth. Money is funnelled into Murai’s “research pro- 


39 


Exploring the Internet 


gramme” and is used to pay for the network. It was not unusual at 
times to have the coffers get down to 1 or 2 months of operating 
costs, forcing Murai into perpetual fundraising. 

After this introduction to Japanese networks, Professor Ishida 
gave me a tour of the Todai facilities. The main campus is wired 
with three FDDI backbones, one for TCP/IP, one for DECnet, and a 
third for administrative computing. A fourth 400 Mbps backbone is 
used for video. Fanning out from each of the backbones are UTP- 
based Ethernets. These local networks form the point of connection 
for terminal clusters, workstations, and even the supercomputers. 

Professor Ishida led me past a peopleless room stuffed with Hi- 
tachi mainframes and supercomputers into a terminal cluster. The 
cluster was divided up into cubicles and was dead quiet. At the 
entrance was a color video display with a map of the cluster. The 
occupied cubicles had red dots inside and the empty cubicles were 
marked in green, allowing people to find an available workstation 
or terminal without disturbing the people already working. 

Off to the side was a glass-lined room with 9-track tape and car- 
tridge drives. Each drive had a terminal in front of it with a menu 
system to help users do their own tape work. 

Another room was filled with printers. When a user prints a job 
at Todai, it automatically spools to disk. Each printer has a card 
reader attached to it (magnetic card, not punch card, that is). A user 
walks up to the reader, slides an ID card through, and the job is 
retrieved from disk and printed. A terminal in front of each printer 
indicates how long the current queue is. 

Leaving the cluster, we went down to the first floor where Pro- 
fessor Ishida pointed to a large electronic signboard on the wall. 
The board displayed the current status of the mainframes, including 
the number of jobs and the expected delay before a new job would 
begin processing. No need to walk upstairs and log in if the system 
is slow. 

Walking outside, I felt a little whir under my feet as the auto- 
matic brushes on the doormat came to life, cleaning my shoes. I 
headed down to the subway. 


0 


40 


Tokyo 


Coming off the subway, I ducked into a tiny, dark noodle shop 
where a line of salary men all sat hunched over the counter slurping 
noodles. Hoping my neighbor hadn’t chosen chicken lips, I pointed 
to his dish and was promptly handed a steaming bow] of delicious 
miso soup. 

Feeling refreshed and refurbished, I went back to my hotel, en- 
tering at the same time as LaToya Jackson and a very large entou- 
rage. I fell in with the entourage and smiled graciously at the hotel 
reception committee. 

On the way to the elevators, we were waylaid by a group of six 
American tourists all bearing labels to identify their tour group and 
all armed with cameras. Figuring LaToya could handle this one 
alone, I slipped into the elevator that three hotel staff members had 
been guarding for her. Before they could say anything, I punched 
my floor number and the startled attendants went jumping out in 
search of another elevator. 

I spent the afternoon in the Pub Misamu, waiting for an evening 
dinner engagement with Tomoo Okada, general manager of Fu- 
jitsu’s Value Added Group. My appointment with Tomoo Okada 
was at 7 PM. At precisely 7:01, my phone rang. I descended to the 
lobby to meet what was obviously a very senior manager, a distin- 
guished-looking executive in his early 50s. Okada supervised more 
than 700 people, including Fujitsu’s Value Added Network division, 
two wholly owned subsidiaries, and a collection of divisions of 
other subsidiaries. His main responsibility was running a network 
used by both Fujitsu and its customers. 

The network is essentially an X.25 network with 144 local access 
nodes spread throughout Japan. Over 250 leased lines running at 
speeds from 128 kbps to 6 Mbps form the network backbone. Run- 
ning on the network are classic protocols for asynchronous termi- 
nals, such as X.28 and X.29, and synchronous protocols for 3270 and 
Fujitsu terminals. As a general rule, full protocol stacks aren’t run 
on the network, although an insurance company has begun deploy- 
ing an OSI CONS-based service over X.25. International links in- 
clude 64 kbps lines to Sydney, Singapore, Korea, Hong Kong, and 
Malaysia. Higher-speed links are available to the U.K., the U.S., and 
Germany. 


41 


Exploring the Internet 


Perhaps the most interesting project Okada supervised is 
NiftyServe, a wholly owned subsidiary that acts as the licensee to 
the U.S. CompuServe. NiftyServe preserves the famous Com- 
puServe user interface, but the software was entirely rewritten to 
run on a UNIX platform and to support Kanji characters. 

To make NiftyServe start off with a bang, 32,000 Fujitsu employ- 
ees were given accounts. Over 70 percent of those accounts are ac- 
tive users. The reason for this high utilization is quite 
simple—important meetings, such as promotion reviews, are posted 
there. 

Some of the most devoted users are overseas Japanese employ- 
ees. In addition to providing things like daily Japanese language 
news, the service has proved important in another respect. In Ja- 
pan, when family or friends die, it is considered very important to 
immediately express condolences. With Fujitsu or any large corpora- 
tion, of course, fellow employees are family. Before the bulletin 
board service started, it could take days for the postal service to 
deliver the news overseas, forcing Fujitsu employees into the un- 
willing position of appearing impolite. 

NiftyServe has added a few other interesting twists to the classic 
bulletin board. For example, you can instruct the system to redirect 
your mail to a fax machine. You can even go to a pay phone and 
have your mail read to you. 

All this information about Fujitsu was imparted to me with 
rapid-fire delivery over a seemingly infinite parade of dishes in a 
dim sum restaurant. After polishing off a half-dozen large bottles of 
beer, Okada suggested we switch to a Chinese aged wine, similar to 
sake, but darker in color (and at least as potent). 

Even with all these drinks, Tomoo Okada kept up a steady de- 
livery of information on Fujitsu. With my head swimming and my 
stomach stuffed, I stumbled back to my hotel to await the next day’s 
pilgrimage to Fujisawa to visit Jun Murai, the Internet Samurai. 


42 


Fujisawa 


The next morning I was up early, having heard horror stories of 
how hard it would be to navigate the succession of subways and 
trains in the middle of rush hour. 

Yes, there were packers to get more people into the subways. 
Since the density was only about equivalent to a crowd leaving a 
football game, however, the packers weren’t yet needed. They sat 
watchfully by, wearing white gloves and ready to jump into action 
when the time came. 

The density of the crowds was amazing. Passing the Tokyo sub- 
urbs, I expected the crowds to disperse, but the Yokohama commute 
brought even more people onto the trains. Even outside of Yoko- 
hama in Fujisawa, the density remained constant. 

Arriving at Tsujido station, I waded through huge crowds until I 
got outside the station. There, I started waving Jun Murai’s card 
around and mispronouncing “Keio,” my destination, until a kindly 
old gentleman in an indeterminate uniform pointed me to the stop 
for bus number zero. 

I queued up and boarded. We passed through Fujisawa and 
started to head into the countryside. Throughout the ride, every 
time we passed a cluster of university-like buildings, I would accost 
some hapless passenger, mumble “Keio,” and wave the business 
card around. One by one, the passengers waved for me to sit down. 

Finally, we reached the end of the line. Rising out of the coun- 
tryside, sitting on a hill, was a futuristic clump of buildings, sur- 
rounded by empty fields. I made my way up a long set of stairs 
into the central courtyard. In marked contrast to the subways, 
trains, and streets, constantly teeming with people, the Fujisawa 
campus of Keio University, Japan’s best private university, was ab- 
solutely deserted. 

Feeling like I was in some futuristic ghost town, I wandered 
around random buildings until I chanced upon a group of adminis- 
trators hidden away in a back office. Waving Jun’s business card 
produced a flurry of whispered consultations until a map of the 


43 


Exploring the Internet 


campus suddenly appeared and I was pointed towards building 
number zero. 

Going to the third floor, I knew I was in the right place when I 
saw an office with a pile of empty computer boxes piled outside. I 
parked myself on the boxes and waited for Jun. It was an eerie 
feeling, sitting there in this deserted building on this deserted cam- 
pus listening to the building creak and groan. Occasionally, a door 
would open and a person would scoot out of a room and scamper 
away, leaving only the echoes of their footsteps. 

I was to find later that the deserted campus was merely an illu- 
sion. Being a self-employed idler, I had arrived well past 9, by 
which time everybody was already hard at work. 

Jun Murai’s secretary soon arrived. Known worldwide as “Jun- 
sec, her e-mail address appears on all WIDE literature, posters, 
stickers, and the like. Junsec let me onto an X terminal to read the 
several hundred mail messages that had accumulated since Hono- 
lulu. Most of the mail was about Bruno, the standards server. 

Evidently, word had gotten out. Bruno was running 24 hours a 
day, with load averages of 35 packets per second not uncommon. 
So many mail requests had come into the infoserver software that 
the batch queue had over 150 unfulfilled jobs. The amount of FIP 
traffic was so heavy that we had become a serious user of band- 
width on the transatlantic links. 

This posed a delicate problem. On the one hand, we wanted 
lots of people to use the server in Colorado so that we could prove 
to the ITU that the service was needed. On the other hand, being 
good network citizens meant setting up mirrored servers, putting 
replicas of the data on other machines to avoid having too much 
redundent traffic cross the backbone. 

Offers to provide mirrored servers were pouring in from all over 
the world. Comparing notes with Tony Rutkowski, it appeared that 
every country in Europe had volunteered to maintain a set of the 
standards. Several hundred hosts had already received files from 
Bruno and it looked like we were getting FIP traffic from over 25 
countries. 


0 


4a 


Fujisawa 


When I was almost done plowing through my mail, Jun Murai came 
bursting in. Disheveled, animated, and wearing his trademark blue 
jeans, he greeted me enthusiastically. Taking me into the obligatory 
conference room, we began talking while Junsec brought in cups of 
tea (she had already brought me two cups of coffee). 

I presented Jun with a copy of STACKS for his boss, Dean Aiso. 
He presented me with a handsomely bound copy of the WIDE an- 
nual report, several hundred pages of kanji with gold-embossed let- 
tering on the cover. My manners being better than my Japanese, I 
thanked him while mentally trying to figure out how to get this 
heavy and, to me at least, cryptic tome back to the States. 

Formalities duly dispensed with, we started talking about 
WIDE. Jun is only 36 years old and I was curious how, in a strati- 
fied society like Japan, somebody like him had ended up running 
the Japanese Internet. 

In 1984, NTT still had a throttle on all telecommunications. Put- 
ting alien devices (e.g., modems) on the telephone lines would be 
considered about as proper as greeting the Emperor by slapping 
him on the back. However, it was widely known that in April, 1985, 
NTT would deregulate. 

All the senior researchers had been debating how to take advan- 
tage of deregulation to put in networks. Meetings were held to de- 
bate the subtleties of various OSI architectures. To Jun, this was a 
waste of time. As he puts it, “I was young and that was boring.” 

He took two modems, scammed a phone line from university 
administrators (no easy feat), and started running UUCP transfers. 
That was the start of JUNET. While the establishment continued to 
attend OSI meetings, JUNET continued to grow. Links were set up 
to a machine named mcvax in Amsterdam (the precursor to EUnet) 
and to seismo in Washington, D.C. (the precursor to UUnet). By 
1986, a domestic IP network had started and by 1989, Jun Murai and 
Torben Nielsen had established a link to Hawaii. Larry Landweber 
helped to hook up Japan to CSNET. 

Meanwhile, the powers that be continued to debate OSI. When 
they finally looked up from their deliberations, Jun already had sev- 
eral hundred nodes on his network. As in much of the world, while 
committees waited for OSI, a few people turned TCP/IP networks 


45 


Exploring the Internet 


into a reality. Japan, like other countries, had many people trying to 
legislate networks into existence while a few people rolled up their 
sleeves and installed cable. 

By the 1991 school year, WIDE had grown to the point where it 
had an annual budget of U.S. $1 million raised totally by donations. 
WIDE was officially a research project, involving 57 researchers, 
roughly half from the university community. The operational re- 
quirements of WIDE became so demanding that Jun was actually 
turning away requests to be connected until a suitable infrastructure 
could be set up to run the net. 

During our conversation, Jun repeatedly referred to a desire to 
stop running networks and get back to his real research. Even with 
the demands of running WIDE, he has compiled an impressive re- 
cord. 

When JUNET was first being put into place, Jun noticed “we 
had a network but nobody was using it.” Networks are like a fine 
dinner: the whole effort is wasted if nobody comes. The reason in 
the case of JUNET was quite simply that e-mail and USENET used 
the Roman alphabet and Japan uses kanji characters. Jun changed 
that. He and others added kanji support to the X Window System, 
kanji character handling for RFC 822 mail, and multibyte character 
handling for the C programming language. 

He also helped design a font server. This software lets users 
start spelling out characters in romanized Japanese. As the words 
begin to be formed, Kanji characters start appearing on the screen. 
When the right character shows up, the user points to it and pro- 
ceeds to the next word. 

When I visited Fujisawa, Jun was involved in fascinating pro- 
jects to support mobile hosts and mobile people. One of the more 
interesting projects was the Phone Shell. The Phone Shell is a fully 
functional UNIX shell which takes input from a 12-key telephone 
pad instead of a keyboard or a mouse. Typically, users execute 
scripts, such as having mail messages redirected into a voice synthe- 
sizer. 

As Jun explains it, “I can go to the bar and drink beer. I go toa 
phone and ping my routers, and if they are still working, I go back 
and drink more beer.” 


46 


Fujisawa 


Another project brought ISDN into the TCP/IP protocol suite. 
Unlike other countries, which are still demonstrating the viability of 
demos, Japan has deployed ISDN as an operational service. In fact, 
WIDE uses ISDN lines to supplement leased lines in case of conges- 
tion or failure. 


The WIDE ISDN module is fully integrated into TCP/IP. When 
a datagram for an ISDN-reachable source is encountered, a call is 
placed. The delay to set up the circuit ranges from 800 ms to 3 
seconds. Once established, the line stays up until it has been idle 
for a user-configurable period, at which point it is taken down. 


ISDN can be used for more than just routers, however. Jun has 
TCP/IP on his laptop. Tokyo has ISDN pay phones. He can bring a 
laptop into a phone booth and be a fully functioning member of the 
Internet. Even Superman would be jealous. 


Another project close to operation when I visited was the use of 
satellite circuits for home PCs. Japan has deployed satellites as an 
alternative to cable TV. Dishes cost as little as U.S. $100 each. Satel- 
lites for TV signals are a one-way data channel, but they operate at 
high bandwidth. A PC with an ISDN card can use 64-kbps “B” 
channels to send commands. Data coming back to the PC can use 
up to the 8 Mbps wide-area bandwidth of the satellite dish. 


Ethernet cards are used to give the PC a 10 Mbps interface in a 
LAN environment. Jun and his staff had linked the Ethernet card to 
the satellite receiver to give the home user the ability to do WAN- 
based multimedia, large file transfers, and other operations requir- 
ing large amounts of bandwidth. 


We went from Jun’s laboratories to tour the campus. Fujisawa 
was a brand new campus of Keio University. In sharp contrast to 
other Japanese (and most U.S.) universities, senior researchers at 
Keio teach freshmen and sophomores. Jun delighted in telling how 
he would instruct a class of freshmen, “now we will ping Switzer- 
land.” 


At the Fujisawa campus, all entering freshmen are required to 
learn UNIX, to operate workstations, and to acquire other basic 
skills. Although laptops are not required, they are very strongly en- 
couraged. 


47 


Exploring the Internet 


We walked into the library where students run an ID card 
through a reader to enter. Of course, Jun forgot his card, so we 
crawled over the barriers. We walked into a lounge area where 
groups of students sat clustered around HDTV sets watching assign- 
ments. 

Around them, students were at workstations, each equipped 
with a cassette tape drive and a headphone, doing language exer- 
cises. Other students were debugging programs. 

Finally, it dawned on me. 

“Jun, there are no books in here.” 

“You still have books?” he asked with a smile. The books were 
up one floor, but it still gave the library a strange feeling. 

Walking outside, we spotted Junsec patiently waiting for us ina 
car. We all went into Fujisawa where we were ushered into a pri- 
vate tatami room for an exquisite lunch of many courses, each beau- 
tifully arranged and delightfully prepared. 

As I was gulping down the tenth course, a delicate broth with a 
single tiny mushroom and a little piece of fish, Jun started explain- 
ing to me how the spindly little mushroom I had just inhaled was 
handpicked in the forests and only available for a few weeks each 
year. Each mushroom cost as much as 5,000 yen (U.S. $35). I puffed 
out my cheeks as if I were still rolling the mushroom in my mouth 
to savor the delicate flavor, while Jun went on to explain how rare 
the fish was. 


48 


Akihabara 


Akihabara is a district of Tokyo devoted to consumer electronics, 
where building after building is stuffed with everything from 2 by 2 
foot stalls specializing in diodes or resistors to full-fledged, multi- 
floor shops, each so full of devices that Marconi would have 
thought he was hallucinating. 

I knew I had reached Akihabara proper when I looked down on 
the sidewalk and saw a street vendor selling oscilloscopes and mi- 
crochips. In a stall behind him, 60 different kinds of laptops were 
on sale, ranging from plain vanilla clones to full-fledged 80386, 60 
Mbyte, 6-pound notebooks. 

Thinking I must have died and gone to geek heaven, I knew that 
this district was going to take a while to visit. I ducked into a noo- 
dle stand and used my two-word Japanese vocabulary to order a 
beer and a bowl of miso soup. As I noisily slurped my noodles, I 
could hear dozens of stereo systems, all playing different brands of 
disco at full volume. 

Suitably fortified, I spent the next two hours trooping up and 
down stairs in building after building. I had to keep reminding my- 
self that I had many more weeks on the road, lest I yield to the 
temptation to buy a home satellite dish (only $100) or a personal 
computer that weighed only 980 grams and ran on AA batteries. 
The computer was only available in a kanji model, but I figured I 
could always learn. Even more tempting were DAT drives, high- 
definition TVs, global positioning system receivers, and three-inch 
color televisions. 

Feeling somehow unsatisfied, yet still solvent, I tore myself 
away and headed back towards the subway. On the way, I passed a 
group of young women all dressed up in natty uniforms bearing the 
somewhat cryptic label “With Me” and all walking in a line. The 
women at the head and tail of the column carried banners which 
matched their uniforms. The rest of the “With Me” girls each jaun- 
tily carried the new two-pound Hitachi notebook, shamelessly dis- 
playing their VDTs for all to see. 


49 


Exploring the Internet 


Every ten minutes or so, the conga line would go out into Aki- 
habara and walk for a few blocks, dragging along a sound system 
guaranteed to attract lots of attention. They would wend their way 
back towards the With Me store and disappear inside, luring a por- 
tion of the mob in with them. Somehow, I suspected the short skirts 
had more to do with the crowd’s loyalty than any desire to purchase 
Hitachi's latest and greatest. 


50 


Hong Kong 


I arrived at 11 PM. at Hong Kong’s Kai Tak airport, thinking that the 
God of Aviation must have been guarding me. A new gate opened 
up at customs just as | walked up, and my luggage was the first off 
the chute. 

But, this apparent good fortunate was only to set me up for a 
cruel joke by the Aviation Deity. Once outside the airport terminal, I 
saw a line of several hundred people at the taxi stand. It was the 
end of the long weekend that marks Ching Ming, the Grave Sweep- 
ing Ceremony, and all the planes from the mainland had just re- 
turned. 

] jumped the barrier to get out of line and walked up the road to 
where taxis were letting off customers. Standing with my baggage, 
the temptation proved too much for one driver. We both looked 
furtively around for police and I jumped in. 

There were only two problems. He knew no English and he 
looked like he had been driving for at least 48 hours. We circled the 
freeways for 20 minutes until it was established that I was going to 
“Number One Hotel, Happy Valley.” Actually, Happy Valley had 
only one hotel, so number one didn’t mean much, but it did get us 
heading the right direction. 

The sleep problem was a bit scarier. Every time his head would 
start to nod, he would jerk up suddenly and then wave his arms 
around in spasmodic circles, presumably to get the circulation go- 
ing. I know it certainly kept me awake. 


0 


The next morning, I strolled over to see Edwin Yeung, an MIS man- 
ager at the Royal Hong Kong Jockey Club. The Jockey Club is to 
Hong Kong what the Louvre is to Paris. Gambling is the national 
pastime and the Jockey Club is the national icon. 

Officially, the Jockey Club is the only place you can bet in Hong 
Kong. In practice, of course, all sorts of other gambling takes place 


51 


Exploring the Internet 


ranging from bookies to mahjong parlors. In theory, though, if you 
want to gamble you go to the neighboring island of Macau. If you 
want to bet you go to the Jockey Club. 

Founded in 1884, the club is run as a non-profit organization. It 
makes so much of a non-profit that it is, by far, the largest charity in 
Hong Kong. In the 1990-91 season, for example, the club handed 
over HK $1.04 billion (U.S. $138 million) to charity. 

The club conducts 67 racing days a year, either in Happy Valley 
or at the mammoth new Shah Tin racetrack. A Diamond Vision sys- 
tem, like that used in U.S. football stadiums, shows the race at the 
track not being used, allowing overflow crowds to go to the alter- 
nate location to watch the races and, of course, place bets. 

This is what you might call a serious transaction processing ap- 
plication. In the 1990-1991 season, over 187 million bets were placed 
for over HK $47 billion (roughly U.S. $8 billion). On a typical race 
day, 2.8 million bets were placed. To make this especially challeng- 
ing, the vast majority of bets were placed within the last 10 minutes 
before a race, yielding a transaction processing rate of over 600 per 
second. 

Like a bank, this is a system that better not make mistakes. Un- 
like a bank, this was a system that you really don’t want going 
down (or even slow) right before a race. A bank can afford a few 
minutes’ delay, but bettors don’t appreciate having to wait until the 
race has started to have their money refused. 

To funnel these bets into their coffers, the Jockey Club uses two 
main systems. Cashbet is for people handing over cash, and Telebet 
handles people who maintain accounts with the club. 

Cashbet consists of terminals that accept money, or debit cards 
which lift money right out of a bank account using electronic funds 
transfer. The Jockey Club operates 127 off-course betting counters. 
These have roughly 2,900 terminals staffed by operators. Another 
2,900 operator-staffed terminals are at the two race tracks. In loca- 
tions throughout the city, people can place their own bets at 144 
Electronic Funds Transfer (EFT) terminals and 700 cash-based termi- 
nals. 


52 


Hong Kong 


Off-course centers use 275 leased lines to connect to a series of 
12 PDP 11/44s that act as front-end processors. Another 16 PDPs 
handle the terminals at the race tracks. 


The Telebet system allows customers who maintain an account 
with the club to place their bets remotely. Bettors can place bets 


using a telephone or using a special custom terminal developed by 
the club. 


The telephone system is quite simple. You place a call and are 
routed to one of 1,600 operators at Sha Tin or 388 operators at an 
off-site facility on Tsing Yi island. The incoming lines are all con- 
nected to a bank of over 2,000 voice recording lines to resolve any 
later disputes. An average of ten times each race day, a particular 
conversation has to be located. 


Each operator on the Telebet system has a terminal which is con- 
nected to a series of VAX 3100s and PDP 11/44s. Operators enter 
the bets into the system and the bets make their way through the 
Jockey Club network. 


Rather than continuing to add operators to service increased de- 
mand, the Club decided to design a custom portable betting termi- 
nal, known as the Customer Information Terminal (CIT). Bets are 
entered using a series of menus on a touch screen. Then, the device 
is plugged into a nearby phone jack where it autodials the Jockey 
Club network, using banking-standard cryptographic security to 
protect the line. The bet is placed, the customer’s account debited, 
and the line cleared, all in a few seconds. A voice transaction could 
easily take a minute. 


The amount of time per transaction is a real issue for this appli- 
cation. Ten minutes before race time, the number of calls completed 
on the phone network spikes to 20 to 30 times over normal levels. 
In fact, the telephone system was so overloaded that it was esti- 
mated that only one in eleven call attempts actually got through to 
an operator queue. In other words, to handle the Jockey Club load 
at race time would require a telephone network designed to handle 
more than 200 times the normal load. 


To alleviate the load, a dollar minimum on bets was imposed 
five minutes before race time, but even this didn’t solve the prob- 


53 


Exploring the Internet 


lem. The key was reducing the connect time per transaction to fun- 
nel more transactions into the available capacity. 


The typical CIT customer could be described as a Hong Kong 
Yuppie. The devices requires a deposit (the interest from the de- 
posit covers the unit cost in five years) and a service fee. Over 
30,000 CIT terminals are in the field. Higher numbers had not been 
shipped, the Jockey Club said, because of a bottleneck in manufac- 
turing which had limited production to only 400 units per month. 


Once a bet makes it through the front-end systems, it hits the 
Jockey Club back-end network, based on lots of VAXen. In fact, the 
Jockey Club is Digital’s largest customer in Asia. It has struck quite 
a few people as ironic that such a major customer for the straight- 
laced Digital should be a major betting operation. 


The club maintains 10 VAX Clusters at the two race tracks, with 
a total of over 30 large systems, 22 HSC controllers, and 100 Gbytes 
of disk space. In addition to the VAXen, special data security mod- 
ules on the network provides authentication for Telebet based on a 
6-digit PIN code. Other systems control the video display and pro- 
vide links to disseminate race results to other networks, including a 
paging system, newspapers, X.25 networks, and Hutchison Mobile 
Data’s packet radio network. 


On race day, the two sites share processing and back each other 
up in case of failure. Transactions are logged at both sites. Connect- 
ing all this together are dual Ethernets at each site and an FDDI 
backbone that spans more than 20 km, using single-mode fiber pro- 
vided by the telephone company. 


The club has an aggressive policy towards vendors and technol- 
ogy, often telling the vendors what to make instead of being content 
to choose from glossy brochures. When their first network went in, 
John Markwell who would later become the Head of Information 
Technology (the senior MIS position), designed a custom data link 
protocol. For the CIT terminal, the Club participated heavily in the 
design. 


While this heavy involvement caused occasional grumbles from 
vendors and caused the staff to have a bit of NIH (Not Invented 
Here) syndrome, you couldn’t argue with success. The system 


54 


Hong Kong 


worked, and worked well enough that it has been licensed to simi- 
lar operations in eight countries. 

After my briefing, I was taken on a tour of the facilities. In the 
machine room, I was asked to put on a white lab coat. Lots of tech- 
nicians with windbreakers, baseball caps, and tennis shoes were 
walking around inside the machine room, making my medical outfit 
a bit superfluous, kind of like smoking a cigarette in the clean room 
of a semiconductor factory. 

After the tour, I suggested that we all go out to lunch. I sug- 
gested (rather strongly in fact) that Chinese food was in order. A 
worried look crossed my hosts’ faces who had evidently been plan- 
ning on taking me out for Western food just to be safe, but they led 
me through the lunchtime throngs to a place jammed with people. 
We had a nice lunch of noodles, sesame shrimp cakes, and Peking- 
style chicken, and I grabbed a pair of chopsticks and dived in, to the 
evident relief of my hosts. 


0 


After lunch, I left the Jockey Club and boarded the subway to Sham 
Shui Po to visit the Golden Shopping Center, the red-light district of 
the computer industry. The Golden Shopping Center is like a sleazy 
version of Akihabara, all packed into three floors of an immense 
building crammed with warrens of shops. There are three reasons 
to go to the Golden Shopping Center: cheap hardware, pirated soft- 
ware, and counterfeit books. Whenever I go, I make three passes 
through the place. 

First, I look to see if any of my books have been pirated into 
Chinese. Figuring that my descriptions of DECnet Phase V (a book 
I like to think of as “paperware about vaporware”) wouldn’t be any 
more popular in Chinese than in English, I searched instead for my 
Novell book. 

To tell the truth, I always kind of hope to see my books. Van 
Nostrand Reinhold, the legitimate publisher, had kept my books 
such a tightly guarded secret that I would have welcomed having 
somebody read them, even at the cost of no royalties. 


55 


Exploring the Internet 


I soon became convinced that I was not a celebrity in this dis- 
trict, so I made my second pass to look at software piracy. Stopping 
in stalls with names like Dream Maker and Ultimate System Com- 
pany, I perused the lists. Each shop maintained a master list, a 
menu du jour of illicit data, if you will. 

Software here was priced by the disk. Low-density disks were 
HK $15 (U.S. $2) each, high-density disks are HK $25 (U.S. $3). To 
see how much your favorite software would cost, simply count how 
many disks it is distributed on. Each list had several hundred soft- 
ware titles, each title with the number of disks written next to it. In 
the U.S., I had just purchased Microsoft Word for Windows under 
an extra-special rebate program for U.S. $129. The Golden Shop- 
ping Center was having a special sale for U.S. $12.50. 

Particularly impressive were programs like AUTOCAD (15 high 
density disks) or even a full distribution of SCO’s Open Desktop, a 
wonderful combination of UNIX, Ingres, Motif, and a DOS emula- 
tor, available on 46 high density disks for U.S. $138. In the U.S., the 
price was U.S. $1,000 and was, quite frankly, a great deal even at 
that price. In Hong Kong, it was literally a steal. 

As I walked from shop to shop, I watched locals and foreigners 
queuing up. Business was booming, despite the Hong Kong gov- 
ernment’s assurances that piracy had been stopped. A year ago, 
there had been a crackdown of sorts. Then, you could buy your 
software at the flat rate of U.S. $2 per disk, but the goods had to be 
delivered to your hotel in a brown paper bag. Things were back to 
normal now, and you only had to wait for “copy a: b:” to complete 
its magic. 

Going from stall to stall, I turned the corner to face a 3 by 9 foot 
stall called Macrosoft. It featured a sign that caught my attention: 
“Licensed Software Available Here.” This was highly unusual. In 
fact, it was downright miraculous. 

Crowded in this booth were three young men, several dozen 
PCs, and an attractive display of shrinkwrapped software. The spe- 
cialty of the stall was “Booky,” a three-pound computer with a 40 
Mbyte drive and a 9 inch VGA monitor, all packaged in a box small 
enough to fit under an airplane seat. It was a desktop system, but 
the unit was smaller (and much more useful) than my DECnet book. 


56 


Hong Kong 


There was a bit of a language barrier, so I spent 10 minutes es- 
tablishing the fact that I didn’t want to make copies of their legiti- 
mate software. I wanted to know if they sold many copies, and 
they kept insisting that I couldn’t make copies, sorry, please. 

Finally, the boss, who couldn’t have been more than 18 years old 
got off his mobile phone. We talked for a while, and I delicately 
brought up the fact that he was selling software for an order of 
magnitude more than his neighbors. 

“Do you sell much software?” I asked. 

A long pause. 

“No,” he said. 

“Why don’t you make copies like other stores?” 

Another pause. 

“Some things are right, some things are not.” 

As he said this, I noticed a beatific glow arising from him and 
realized that I was looking at one of the first computer engineers 
destined for sainthood. 

Leaving the hallowed grounds of Macrosoft, I turned the corner 
to find myself at the administrative offices of the Golden Shopping 
Center. Inside, two very large men sat smoking cigarettes and 
drinking tea. Outside the office were posted the financial reports of 
the center, detailing gross rentals, overhead, and other items of in- 
terest to the pirates that ran the stalls. I took out my camera and 
started snapping pictures of the financial reports, feeling a bit like a 
Spy. 

As I was snapping the last picture, I noticed one of the secretar- 
ies who had come back from lunch, standing there and staring at 
me. She scurried inside, yelling something I couldn’t understand 
(but could guess). It was evidently time to explore other areas, so I 
made myself as inconspicuous as a foreigner wearing a suit can be 
in such a situation. I felt a bit like a marketing executive trying to 
hide at an IETF meeting. 

I then started my third pass through the center, looking at hard- 
ware. This is always the most enjoyable part. I put my self right- 
eousness aside, put away my investigative cloak, and became just 
another digital tourist. 


57 


Exploring the Internet 


The selection is not as unusual as in Japan, but the prices cer- 
tainly were wonderful. This is the place to come if you are looking 
for the latest 486 motherboards, fax modems, cheap disk drives, or 
other components. My favorites are the little shops that sell com- 
modities at good prices, perfect for people building clones. 

One shop, for example, featured a box of XT motherboards for 
U.S. $12 each. Inside the store was every conceivable part from so- 
lenoids to keys to keyboards. Definitely the place to come if you 
wanted to make your own generic PC. 


0 


Leaving the bowels of the Golden Shopping Center, I decided it was 
time for a beer. I threaded my way through the noodle stands and 
incense vendors and bought a can of San Miguel in a nearby phar- 
macy. 

I tried to sit at a table next to a noodle stand, but quickly discov- 
ered no noodle, no chair. I perched atop a crate of empty bottles 
and watched the vendors cut up chicken giblets and toss them over 
bowls of steaming noodles. It reminded me of when I lived in 
Bangkok, where I would have one of these bowls everyday for 
lunch. 

Wearing my going-to-meeting clothes and sitting on a box furi- 
ously scribbling notes, I fit in about as well as an Elvis impersonator 
in the Senate Caucus Room, but I met the bemused stares of the 
noodle cooks with my own noncommittal look. Finishing my beer, I 
went back up Fuk Wing street, past the snake shop (great for soups) 
to the subway. One interesting attribute of the Sham Shui Po area, 
where the Golden Shopping Center is located, is its proximity to the 
Hong Kong airport landing pattern. As you walk along, it is not at 
all unusual to look up and see a Boeing 747 appear to be landing on 
the building in front of you. 

I took the subway to Tsim Sha Tsui, right on the edge of the 
Kowloon side of the bay. It was still too early for my dinner ap- 
pointment, so I strolled by the bay and watched dozens of boats 
scurrying about their business, then went to the lobby of the Penin- 
sula Hotel to await my friends. 


58 


Hong Kong 


The Peninsula is one of those grand old hotels of the Orient. It 
is the kind of place that sends a Rolls Royce Silver Shadow to meet 
you at the airport and has the chauffeur phone ahead with your 
cocktail order so it is waiting for you when you alight. 

The lobby is a place where you can nurse a gin and tonic (or a 
beer if you happen to be uncivilized) and watch the beautiful peo- 
ple act genteel. The thirty-foot ceiling is ornately decorated with 
golden ceiling ornaments, angels, and other remnants of the 1920s. 

Going up to the concierge, I asked if I could borrow the display 
copy of “The Peninsula, Grand Old Lady of the Orient,” explaining 
that I was a journalist and wished to include some information 
about his establishment in a story I was writing. 

“Could I borrow the book for a few minutes for a story I’m 
working on? I'll be at that table right over there,” I said, pointing 
three feet away. 

“$160,” he said without looking up. My journalist disguise evi- 
dently was not working. 


0 


Tuesday morning, my assignment was to meet Dr. Nam Ng (pro- 
nounced just as it looks), director of Hong Kong University’s com- 
puter center. The university is one of six in Hong Kong and I had 
gotten Dr. Ng’s name out of John Quarterman’s classic guide for the 
digital tourist, The Matrix. 

To get to Hong Kong University, you go up winding streets 
steep enough to make San Francisco look like Kansas. Not an inch 
of space is wasted in Hong Kong, a city with one of the highest 
population densities in the world and built on islands that are noth- 
ing more than the tops of submerged mountains. The university is 
no exception, carved into a hill that most countries would call a cliff. 

After a 45-minute expedition from my hotel, I ended up spend- 
ing only 20 minutes with Dr. Ng. Yes, they had a 9,600 bps BITNET 
link. No, they didn’t connect to the Internet. The PCs were based 
on Novell’s Netware. 

All this was obviously useful to the students (the microcomputer 
labs were well equipped and full of intent-looking undergraduates), 


59 


Exploring the Internet 


but this didn’t fulfill my dual aims for the day: finding material 
worthy of a technical travelogue and reading my mail, which was 
accumulating at the rate of fifty messages per day back in Colorado. 

It was still early in the day, so I called over to the Chinese Uni- 
versity in the New Territories. I started with the operator, and after 
several false starts, ended up connected to Michael Chang, a lecturer 
in Information Engineering (lecturers are the equivalent of U.S. as- 
sistant and associate professors). He offered to let me dial in from 
Wanchai on the main island, but I didn’t relish the idea of reading 
200 messages at 2,400 bps on my prehistoric excuse for a notebook. 
Besides, I’d never been over to the New Territories, having confined 
myself on previous visits to Kowloon and Wanchai. 

I tumbled down the hill from Hong Kong University, crossed 
under the bay on the MTR subway, and boarded a train for the New 
Territories. I passed the huge Shah Tin racetrack and got off at the 
stop for Chinese University. There, I took a shuttle bus up an even 
steeper hill, finally stopping at the Lady Shaw building, right across 
from the Run Run Shaw Building. I asked a couple of students on 
the bus who the Shaws were, but nobody seemed to know. (I found 
out later that Run Run Shaw produced kung fu movies and was the 
man who brought Bruce Lee to America.) 

Michael Chang turned out to be young, competent, and very 
friendly. He ushered me into a room full of DECstations and PCs, 
and started up a guest account for me. As I plowed through my 
mail, I noticed students around me confidently working their way 
through the Internet, reconfiguring systems, and otherwise acting 
like normal undergraduates. I found out a little later over lunch 
that Chinese University had only received its Internet link two 
months previously. 


0 


After lunch, I crossed back over the bay to find Waleed Hanafi, 
Managing Director of Hutchison Mobile Data. Hong Kong has the 
highest concentration of mobile phones in the world. It is not sur- 
prising, therefore, that this is where the world’s first public radio 
data network sprang up. 


60 


Hong Kong 


Waleed started the company, a subsidiary of the Hutchison con- 
glomerate, in 1987, and by 1989 Hutchison had fielded its first net- 
work. When Federal Express contracted with Hutchison for 
communication with its trucks, the network achieved a firm finan- 
cial footing. 

Hutchinson’s network is based on 35 transmitters, strategically 
posted around Hong Kong using 20 different channels of the radio 
spectrum. The architecture of 20 channels and 35 stations allow ex- 
pansion by stacking. In the financial district, one site already had 
two transmitter/receivers. There is no reason why 20 couldn’t be 
stacked up at one site. 

When a radio modem powers up, it checks the 20 different chan- 
nels. Each transmitting site continually transmits a signal and the 
modem scans until it receives a signal with an acceptable bit error 
rate, set at the time I visited at 0 percent. 

At that point, the modem sends a “here I am” message to the 
transmitter/receiver, which logs the unit ID. All units sharing a 
channel with a particular station use an arbitration scheme to decide 
when to send data. When the receiver is occupied, the transmitter 
sends a busy bit. When the channel clears (i.e., a modem is done 
sending a packet), the busy bit is dropped. 

At this point, each modem backs off for a random period of 
time, then listens again. If the signal is still free, that modem gets to 
send. Otherwise, somebody else got the channel. 

Collisions are theoretically possible, though highly unlikely be- 
cause of the short packet transmission time. The key to this arbitra- 
tion scheme is a very fast attack time by the modem—f the line is 
available after the backoff, the modem sends very quickly. 

One thing that makes radio modems much simpler than cellular 
phones is the fact that handoff from one cell to another is not an 
issue. A packet is sent to one station. When necessary, the modem 
simply gives a “here I am” message to a new station, and the ID for 
the unit is moved. There is no need to keep a continuous circuit 
going as there would be for isochronous voice traffic. 

Once a packet hits a transmitter/receiver, it is then routed into 
the Hutchison computer systems, which are simply two pVAX 3500s 
running the Ultrix operating system. The two pVAXen keep track of 


61 


Exploring the Internet 


individual units and routed packets out to other sites. For example, 
Federal Express packets go back out via an X.25 link to the Federal 
Express host system. 

A unit called a Develnet acts as a sort of LAN bridge, taking a 
radio packet and translating it into X.25, Ethernet, or Asynch-based 
formats. The Ethernet packets could go over a Hughes WAN bridge 
into a Novell LAN; the X.25 packets out over the Hong Kong public 
data network called Datapak, or even out via X.75 links from 
Hutchison’s network to reach Sprint’s X.25 network. 

The biggest problem with a service like this is convincing people 
that it is worth using. “Great features” doesn’t usually convince 
procurement agents. To spur demand, Hutchison took an 80386 and 
made it into a fancy BBS. Waleed founded the first Hong Kong BBS 
in 1982, so this was certainly a natural tack to take. The system on 
Hutchison’s network links to several information sources, including 
weather servers and the Knight-Ridder news service. 

Using your radio modem and a laptop, you could sit in your car 
and read the news wires. More importantly, in Hong Kong at least, 
you could check out stock prices. 

One other link on the network which has proven quite popular 
is connection to the Royal Hong Kong Jockey Club’s Telebet system. 
Customers hooking a CIT portable betting terminal up to a 
Hutchison radio modem can place bets from anywhere in Hong 
Kong. 

For the outlying islands, this is often how bets are placed on 
race day. One old gentleman on the island of Ping Chau habitually 
sets up a unit next to the ferry depot. Islanders come to him to 
place their bets. At construction sites, the foreman often sits in a 
minivan and places bets on race days, thus keeping his crew from 
disappearing. 

Mobile radio networks are big business. Hutchison is a world- 
wide conglomerate and hopes to expand the data network into 
other countries. Hutchinson is putting a network into England and 
several other companies are putting in systems in other countries. 
In the U.S., IBM and Motorola have joined forces to put in the Ardis 
public data network. In Sweden, Ericson is putting its own Mobitex 
system in. 


62 


Hong Kong 


Although the service has potential, it is taking a while to get 
started with consumers. Hong Kong, with the high concentration of 
cellular phones and small area, is certainly an ideal place to start. 
Yet, even in Hong Kong, less than 1,000 radio modems are being 
used. 


0 


I left Waleed’s office and took the subway back to Happy Valley. 
Actually, that’s not quite true. I took the subway to the wrong stop, 
walked around lost for 30 minutes, and then, after asking directions 
several times, took a taxi to Happy Valley. 

There, I strolled through the market past piles of smoked oys- 
ters, dried mushrooms, fish heads, and jackfruit, and finally parked 
myself on a stool at a duck stand. After a few minutes of panto- 
mime, a cold beer was produced and I spent the next few hours 
eating duck giblets smothered in chili sauce and drinking San 
Miguel. The cooks couldn’t figure out why I was scribbling frantic- 
ally in a notebook, but decided after a while that anybody who 
liked duck innards couldn’t be all bad. 

One interesting thing I noticed, between bites of giblets, was that 
people would come in off the street and, without asking, pick up 
the phone and place a call. Hong Kong Telephone has a flat 
monthly fee throughout the islands, so it is not considered at all 
rude to just walk in and pick up a phone. Try that in your average 
New York deli. 

An outgrowth of the flat fee has been some interesting value- 
added services. Datapak, for example, offered a free ASCII-Fax 
service to its customers, since the marginal cost of doing so was 
zero. Flat-rate pricing, if properly designed, can be an ideal way to 
spur emerging industries. Commercial IP service providers in the 
U.S., for example, often used this strategy to encourage customers 
who might be scared of per-packet, per-hour, or other volume-based 
pricing schemes. Waleed Hanafi was using the same strategy to get 
his radio modem service off the ground. 

Once an industry matures, more sophisticated pricing structures 
become possible. At first, however, customers don’t have any idea 


63 


Exploring the Internet 


what their use of a new service might be and don’t want to assume 
the risk that their users might accumulate infinite service fees. Set- 
ting engineers loose on a volume-priced Internet is equivalent to 
leaving a dozen teenagers in a room with a list of 976 numbers 
posted next to the phone. 

I finished my duck guts, drank up my last beer, and returned to 
my hotel. 


64 


Macau 


Wednesday morning, with the day to kill before the flight down to 
Singapore, I took the hydrofoil down to the island of Macau. Set- 
tled by the Portuguese in 1554, Macau is now known for its casinos. 
It is also one of the few places that the government of North Korea 
maintains contact with the western world. 

I took a cab down the stately Rua da Praia Grande to the Com- 
mercial Building. On the 23rd floor, I got off at the Talented Dragon 
Investment Company, Ltd., where I asked for Mr. Cho. 

I ended up in this situation as a result of my dinner the previous 
evening with my friend Harry Rolnick, a writer who, among his 
many other accomplishments, is the music critic for the South China 
Morning Post. 

“What's new?” I asked. 

“Nothing much,” Harry responded. He paused and took a 
drink of his Mekong whiskey. 

“Oh,” he added, “I’m writing a tourism guide to North Korea.” 

I laughed. Harry has a great sense of humor. 

“Really, I am,” he insisted. 

The week before, he had noticed a small want ad in the Post 
which read “Tours to DPR Korea - Inquire Mr. Gpu.” So he in- 
quired. 

Over a long lunch of rice wine and kim chi, Mr. Gpu had told 
Harry that of course Americans were welcome in North Korea. He 
could issue a visa on the spot. And, by the way, did Harry know 
perchance where to get large quantities of American cigarettes? 

Harry had introduced Mr Gpu to a distributor in Hong Kong 
and presumably somebody is now smuggling cigarettes into North 
Korea, because Harry got his visa. I figured nothing ventured, 
nothing gained, so I asked Harry to tell Mr. Gpu that I would pay 
him a visit. 

I was ushered into a paneled conference room and presented Mr. 
GPU with a copy of STACKS, dutifully inscribed “To the Democratic 


65 


Exploring the Internet 


People’s Republic of Korea, with best wishes.” I had never in- 
scribed a book to a country before. 

I explained the idea behind Exploring the Internet and my desire 
to visit Kim Il Sung University in Pyongyang to see the status of 
networking under the Great/Dear Leaders. I had heard that the 
complete works of Kim I] Sung, the Great Leader, were available in 
digital form and wished to meet the people behind the software. 

Mr. Gpu abruptly got up and left the room. I wondered if he 
Was going to get my visa. He returned a few minutes later with a 
shopping list of equipment which included a strange device called a 
“down converter” which, as best as I could make out, translated 
radio waves from one frequency to another. I confessed I had no 
idea what a down converter did, let alone why anybody would 
want one. I had this funny feeling that I didn’t really want to know. 

My ignorance appeared to have blown my credibility as a com- 
puter expert. The interview quickly ended. No offers of rice wine 
or kim chi. No visa. 

I strolled back on the Avenida Do Doutor Rodrigo Rodrigues, 
stopping on the way for a fine lunch of Galinka Piri-Piri, a grilled 
chicken Macanese style smothered in spices. 

The hydrofoil on the way back to Hong Kong was almost empty, 
with no tourists taking snaps of the boat floor or pointing to each 
island and asking “is that China?” 

The tourists must have known something. We hit rough seas 
and the hydrofoil started to resemble a rollercoaster ride. I closed 
my eyes and hung on tight, finally arriving at the hydrofoil dock. I 
collected my bags from Harry’s friends at the Macau Tourist Office 
and headed across the bay to the airport. 


66 


Singapore 


My plane arrived after 1 A.M. in the morning at Changi airport and I 
steeled myself for waiting in long lines while customs officials woke 
up and ambled over. To my amazement, from the time I came off 
the plane to the time I got into a taxi, including clearing customs 
and getting my bags, a total of seven minutes passed. 

My taxi hurtled into town on a wide, immaculate freeway lined 
with flowers and trees. We passed a Pizza Hut and a bowling alley. 
This is Asia? Cars even pulled over to the side of the road to let an 
ambulance through. 

Getting to the hotel, I found that the five copies of STACKS sent 
over by Interop had not arrived. I placed a call to David Brandin, 
the Vice President for Programs, who assured me they had been 
sent over a week ago by Federal Express. 

The next morning, we found out that the books had in fact ar- 
rived five days earlier, but had been intercepted by the Undesirable 
Propagation Unit, one of the government censors. I knew that por- 
nography and communism were not welcome, but I hadn’t figured 
my descriptions of SMDS would offend anyone other than Frame 
Relay manufacturers. After pointing out that the books were engi- 
neering manuals, Federal Express eventually sprang them loose. 

I spent the morning at the National University of Singapore 
(NUS) talking to Dr. Thio Hoe Tong, director of the computer center. 
NUS, with 17,000 students, is the largest university in Singapore. 
The university had just installed a 64 kbps link to JVNCnet in 
Princeton and joined the Internet. 

The campus internet had recently caught the attention of the Na- 
tional Science and Technology Board (NSTB), which decided that 
the experiment should be expanded. Dr. Thio’s deputy, Tommi 
Chen, had been delegated to develop TECHnet, a project with the 
aim of developing a national research IP network. 

Technically, TECHnet was simple. For SG $300 per month, an 
organization got a port on the NUS router. Politically, however, it 
was a big step forward. TECHnet involved both commercial and 


67 


Exploring the Internet 


educational users. As long as the NSTB determined that a company 
is a “bona fide” research and development group, it could join the 
network. 

This may seem a bit pale to some readers, but the idea of multi- 
ple users sharing a single leased line (which is what TCP/IP does), 
runs contrary to a long-established tenet of international communi- 
cations, the infamous Recommendation D.1. 


Recommendation D.1 of the CCITT established the principle that 
multiplexing multiple users over a single international line should 
be the province of the “network provider,” a code word signifying 
the single monopoly, the PTT. In this parlance, a “value-added net- 
work” was anybody who was forced to buy services from the tele- 
phone company. By defining multiplexing over international lines 
as the proper function of the network, not the value-added network, 
competition never even got out of the gates. 


Recommendation D.1 has been defanged for most of the world. 
When you think about it, D.1 and similar barriers to entry run 
counter to the Treaty of Rome, the GATT, and any other principles 
of fair trade and antitrust ever promulgated in international law. 
While most organizations and some countries ignore it, there are a 
few places where D.1 still rears its ugly head. Although the recom- 
mendation itself is rarely cited specifically, it has certainly estab- 
lished itself as part of the telephone company mentality. 


Rumors were that Singapore Telecom was not pleased by the 
idea of TECHnet. After all, if a company uses the Internet to com- 
municate with the U.S., the reasoning went, they wouldn't be plac- 
ing phone calls. 


This reasoning had been applied before to networks. In Singa- 
pore, BITNET was not available to undergraduates. The rumor was 
that Singapore Telecom objected because if undergraduates could 
use electronic mail to reach brothers and sisters studying in the U.S., 
they wouldn't place international voice calls. 


In the case of TECHnet, the government had exerted enough 
pressure so that the system moved forward despite the objections of 
more conservative elements. However, as a safety check, CEOs of 
companies joining TECHnet had to sign a certification that the em- 


68 


Singapore 


ployees of a company would only use the network for R&D, strenu- 
ously avoiding commercialistic or even (save us) personal purposes. 

After describing TECHnet, Dr. Thio explained the rather un- 
usual approach to campus networking at NUS. A mere 18 months 
before, several thousand PCs and Macintoshes had been isolated is- 
lands with no connectivity. Rather than phase in networks over a 
long period of time, NU.S. adopted a “big bang” theory of network 
design. 

An RFP was issued which was won by a consortium that in- 
cluded Hewlett Packard and Fibronics. In two stages, six months 
apart, 3,000 machines went on the network. Most of the network 
was based on HP9000s and PS/2s acting as LAN Manager servers. 
An FDDI backbone and Ethernet subnets tied it all together. 

Needless to say, with several thousand users going live at the 
same time, training and support became, as Dr. Thio put it, “an is- 
sue.” 

That night, I was scheduled to give a talk to the local IEEE chap- 
ter. I gave my usual rambling discourse on “our friend, the In- 
ternet.” Afterwards, I was presented with an attractive pewter dish 
and we went out for a dinner of hairy crabs and garlic prawns. 


0 


I had agreed to be a guest lecturer Friday morning at the Informa- 
tion Communication Institute of Singapore (ICIS). ICIS, a coopera- 
tive program between AT&T and the Singapore government, offered 
a postgraduate degree in telecommunications. 

I was picked up by Don Stanwyck, an ICIS faculty member and 
AT&T employee. Don had been one of AT&Ts representatives to 
various CCITT and ANSI study groups and had served as editor for 
several key ISDN recommendations. 

Don took me down to Little India, where we had a breakfast of 
roti prata, Indian fried bread which you dip into a bowl of spicy 
mutton curry. Don explained how he had ended up on the expatri- 
ate circuit in Singapore. As a CCITT delegate, he had logged well 
over a million frequent flier miles, travelling 70 to 80 percent of the 
time. He finally decided “enough is enough,” and told AT&T he 


69 


Exploring the Internet 


wanted to live in Singapore. In addition to Singapore, Don had 
lived in Japan, and speaks proficient Mandarin and UUCP. 

With a love-hate relationship to Singapore, he was typical of 
many of the expats who live in Asia. He knew more about Singa- 
pore than many locals, yet remained very much a visitor here. After 
two years, he had kept an intellectual detachment and alternated 
between wild praise and cynical criticism. 

At ICIS, I lectured to a packed room with several classes meet- 
ing together. It was a typical lecture in some ways. The students 
laughed at my jokes and seemed to enjoy the talk. Yet, when I was 
done and asked for questions, not a single person raised their hand. 

I had experienced this in the past, so was not as disconcerted as 
I might have been. In many Asian countries, it is considered bad 
manners to ask a question. To do so implies either that the teacher 
did a bad job explaining or that the student wasn’t paying attention. 
Risking either implication would be a loss of face for somebody. 

Instead, questions are best asked in a more informal setting. Af- 
ter the lecture, sitting in the lounge, I spent a half-hour answering 
detailed questions on everything from namespace administration to 
exhaustion of the 32-bit address space. 


0 


I spent Friday afternoon with Singapore Telecom. Singapore Tele- 
com: is one of the classic PTTs, controlling every aspect of telecom- 
munications, as well as the postal system. For many years, local 
telephone service in Singapore had been essentially free, with a flat 
annual equipment rental of SG $190 for homes and SG $250 for 
businesses. (The Singapore dollar was trading at 1.694 to the U.S. 
dollar at the time.) 

When I arrived in Singapore, the flat rate was about to be abol- 
ished in favor of a straight usage-based system of 1.4 cents per min- 
ute during peak periods and 0.7 cents per minute during off-peak 
periods. “Rentals” would decrease to SG $100 for homes and SG 
$150 for businesses. 

This change was causing such an uproar that the Prime Minister, 
travelling in Zimbabwe, had called a press conference to discuss the 


70 


Singapore 


subject, and his comments were front page news in the Singapore 
Straits Times. For Singapore, this was a major political flap. A 
newspaper columnist felt compelled to write a piece debunking the 
theory that the entire social fabric would disintegrate because chil- 
dren would place fewer calls to their mothers. Singapore Telecom 
issued a study saying that 66 percent of bills would go down and 
that the scheme would be revenue-neutral. Of course, recent year- 
end results by Singapore Telecom of profits of SG $1.2 billion didn’t 
help matters. 

In order for a residential bill to go down, a residential customer 
had to make less than 107 hours per year of peak, or 214 of off-peak, 
calls. It boiled down to a situation where families with teenagers 
and modems were going to face higher bills. 

Singapore Telecom contended that the previous flat rate policies 
had made it difficult to sell some new services. ISDN was a key 
example. Singapore was quite proud in 1989 of being the first coun- 
try to have nation-wide availability of ISDN. 

ISDN cost 10 cents per minute in Singapore. With variable pric- 
ing on regular phone lines, Singapore Telecom hoped to increase the 
demand for data services. I asked Chew Mun Chun, manager of the 
Network Technology Group at Singapore Telecom how successful 
ISDN had been. He smiled bravely and said, with all the positive 
spin he could muster, “today we have close to 300 subscribers.” 
Needless to say, most businesses had found it simpler to use high- 
speed modems on dialup lines. 

While ISDN had not been a raging success, Singapore Telecom 
had been more successful in other areas. It teamed up with British 
Telecom and the Norwegian Telecom to offer Skyphone, a service 
that allowed airplanes anywhere in the world to place calls. Each of 
the three telephone companies provides a ground station that cov- 
ered a certain geographic area: Norway covered the Indian Ocean, 
Singapore the Pacific, and British Telecom the Atlantic. 

Skyphone is built on top of a network of eight satellites run by 
INMARSAT, a consortium headquartered in London and sponsored 
by 60 member countries. INMARSAT provides a generic satellite 
service which members then use to build value-added services such 
as Skyphone. An airborne user communicating with an INMARSAT 


7 


Exploring the Internet 


satellite indicates which service she is trying to use. When a call 
reaches one of the earth stations, such as the one that Singapore 
Telecom operates on Sentosa island, it is routed through the local 
telephone network and then out to the International Direct Dial 
(IDD) links. Since Skyphone is a telephone link like any other (al- 
beit, an expensive one at U.S. $6.70 per minute), it can be used for 
fax and data as well as voice traffic. It is even possible to place 
ground-to-air calls, although the caller would need to know the air- 
craft ID in order to do so. 

The first customer for Skyphone was the Sultan of Brunei. Sin- 
gapore Air was the first commercial airline to install the service. 
Other airlines quickly followed suit. 


0 


Another interesting Singapore Telecom project I saw was Teleview, a 
videotex system that went into field trials in 1988 and went public 
in 1990. The government had very ambitious plans for the system, 
but by late 1991 there were only 6,500 subscribers. 

Teleview was an unusual videotex system in that it supported 
high-quality photographic images. Commands to Teleview went in 
via normal asynchronous dialup lines. Photos returned at 2,400 bps 
would not be very effective, however, so a return data path was 
provided via a television channel dedicated to Teleview. 

Each frame on the television channel had a subscriber ID on it, 
directing it to the appropriate system. The signal had a 4.5 Mbps 
data throughput rate, allowing frames for lots of users to share the 
single television channel. 

Your average PC is not set up to handle either photographic 
quality displays or to receive RF signals. To provide these capabili- 
ties, the original Teleview terminal was a specially developed device 
which could be seen in many shopping centers and public facilities. 

Dedicated terminals, especially fairly expensive, single-purpose 
terminals, were not an ideal way to penetrate the home market. PC 
users were able to access Teleview by adding an RE card for receiv- 
ing data, a modem for sending commands, and a photo display card 


72 


Singapore 


to drive a monitor at 480 by 280 pixels with 18 bits per pixel for a 
total of 256,000 simultaneous colors. 

While photographic display was a unique feature of Teleview, it 
was possible to bypass the feature and access the system simply 
with a modem for an 80 by 40 character display. It appeared that 
many, if not most, of the users were content with the character-only 
displays and used the system for things like stock quotes. | 

As videotex systems went, Teleview had a fairly good selection 
of information available. In addition to the obligatory stock prices, 
it also had the Reuters news service, airline information, real estate 
listings, and even record and book shops. 

Some of the more unusual applications reflected the influence of 
a strong government involvement. Mandarin tutorials, for example, 
proved quite popular as an instructional tool. Always sensitive to 
the cultural makeup of the island, the government added Malay les- 
sons soon after the Chinese. 

The initial architecture for the system was a single proprietary 
computer system with X.25 links to service providers and asynchro- 
nous and RF links to users. The next generation system was an at- 
tempt to vastly expand the functionality (or at least the capacity). 
Teleview officials were still in the middle of the procurement proc- 
ess and could not discuss details, but interviews with an anony- 
mous source established that the contract for the system had been 
won by Digital. 

The front-end to the new network was going to be a series of 
modem racks, presumably connected to VAXen, which are in turn 
connected to a series of front-end Ethernets. Each front-end Eth- 
ernet would then be connected, via a bridge, to an FDDI backbone. 
Other bridges would connect to a back-end Ethernet. On the back- 
end Ethernet would be another series of VAXen, which would con- 
tain a cache of recently accessed frames. 

The cache VAXen would be connected by a mystery net (pre- 
sumably Ethernet and LAT) to a series of VAX Clusters, which 
would serve as data repositories. Other VAXen would act as X.25 
links to other information sources. 

As one of my anonymous sources said, “they’re throwing VAXes 
around like water.” Singapore had, as of October 1990, invested SG 


73 


Exploring the Internet 


$50 million in the system and it was likely that current investment 
was an order of magnitude higher. 

The government placed great importance in Teleview. When it 
was deployed commercially, Yeo Ning Hong, the Minister for Com- 
munications and Information said “beginning today, Teleview will 
bring the Information Age into every home and workplace.” Like 
France, Singapore saw videotex as the way to bring widespread 
computing into every home. 


0 


Saturday morning, I went back to Science Park and entered yet an- 
other ultra-modern office building, this one housing the offices of 
Singapore Network Services, developers of the Tradenet EDI system. 

I was met by two individuals wearing the international market- 
ing uniform of business suits, business cards, and business-like 
smiles. They whisked me into the board room and sat me down at 
a table the size of a golf course. They sat down far away on the 
other side of the table, yet still close enough that I could see them. 

I knew I was in trouble when the slide projector came out. The 
junior of the team, bearing the title of “Executive Marketing” got up 
and started smiling broadly and talking about “increasing produc- 
tivity” and similar concepts that we could all agree on as being posi- 
tive. 

Singapore Network Services (SNS) was formed with very strong 
government support as a joint venture between the Civil Aviation 
Authority of Singapore, the Port of Singapore Authority, the tele- 
phone company, and the government. 

Although Tradenet, designed to clear cargo through customs by 
using EDI, was the first application, SNS was branching out into 
other EDI applications. The slide presentation was meant to illus- 
trate a grand vision of the world, and words like “network hub” 
and “information services” kept getting tossed out. 

A bit of inquiry established the fact that the “network hub” was 
in fact an IBM 9000 which traders accessed via dialup or leased 
lines. Not being familiar with the IBM 9000, I naively asked what 
operating system was being used. 


74 


Singapore 


“That is a very technical question,” my presenter responded. 
“We were not told you would want such technical information.” 


It is the bane of marketing the world over that successful pro- 
jects, such as a massive application of EDI in Tradenet, gets papered 
over with superficial nonsense like “information services for pro- 
ductivity.” Instead of simply describing the success and how it 
came to be, which would certainly be very impressive, marketing 
feels compelled to invent silly catch phrases. 


Tradenet had in fact been quite a successful system. Traders 
used the EDIFACT standard to format documents which were 
uploaded to the IBM 9000. SNS didn’t use X.400 to transfer the 
document, although Executive Marketing agreed with me that X.400 
was a good thing. Once the files were uploaded OfficeVision mail 
was used to move the documents between different groups. 


The system linked traders in Singapore to customs, the Trade 
Development Board (TDB), and to what was euphemistically re- 
ferred to as “other controlling agencies.” An example of the latter 
was the Undesirable Propagation Unit, the government agency that 
had held my books for inspection. 


Typical transactions were import/export declarations, certificates 
of origin, and other documents. Many of these operations, such as 
customs clearance for a shipment, were semi-automated. An an- 
swer from customs on whether clearance is automatically granted or 
an inspection is needed, could be returned in a few hours instead of 
the few days required in a manual system. 


Tradenet was launched in 1989 and at the time the government 
had hoped that by 1993, 90 percent of the traders would be using 
the system, at which time it would become mandatory. By 1990, 90 
percent of traders were already on the system and it became manda- 
tory in 1991. 


After Tradenet, Singapore Network Services started branching 
out into other EDI applications. Medinet was used for automated 
processing of medical claims. $Link was an electronic funds trans- 
fer application. OrderLink was a system developed to allow the 
government to issue Requests for Quotation and receive bids from 
suppliers. 


75 


Exploring the Internet 


Executive Marketing finished his slides and I escaped the plush 
confines of the Singapore Network Services board room into the re- 
freshing humidity of the street. I flagged down a taxi, which man- 
aged to decelerate from 50 mph to 0 in a little under 1 second. I 
jumped in with a bit of trepidation and the tires squealed as he took 
off. 

“Where you from?” the cabbie asked. 

“Colorado, U.S.A.,” I replied. 

“Ah, Chicago!” he replied. He seemed to find this hilarious and 
laughed furiously. After laughing for a few minutes, he would 
quiet down, then repeat the word “Chicago” again and start laugh- 
ing. I occupied myself with pressing my foot against an imaginary 
brake pedal. 


0 


Saturday night, Michael Yap from the National Computer Board 
picked me up for drinks. After a couple of beers in a generic pub in 
one of Singapore’s huge entertainment developments, we went for a 
ride and ended up in Chinatown. 

There, we went into a traditional tea house, Tea Chapter. After 
taking off our shoes, we walked up narrow stairs two stories into a 
large room filled with low tables and pillows. 

“This is a Singapore Chinese Yuppie joint,” Michael explained. 
It had been started a few years ago by a few friends as a place peo- 
ple could sit and relax. Around the room, people were sitting at 
tables. At a corner, a young couple sat on cushions on the floor 
while their two young children bounced off the walls. 

Tea Chapter was part of a growing trend in Singapore to redis- 
cover ethnic roots and to allow ethnic diversity. Originally, the 
country pursued an aggressive melting pot strategy, but it had since 
taken an about face. Malays, Indians, and Chinese all have distinct 
ethnic communities in Singapore. 

Tea arrived with an elaborate array of devices. A big pot of boil- 
ing water was used to feed another tiny pot where the tea steeped 
for a few minutes. The tea from the first batch was thrown away 
and more water added. Then, a few batches from the tiny pot were 


76 


Singapore 


used to fill a medium-sized serving pot. From there, the tea was 
poured into teacups so small they held only a swallow. The tea was 
accompanied by eggs which had been preserved in green tea leaves, 
a delicious snack. 

Along with the teapots was a container filled with mysterious 
implements: miniature shovels, tongs, picks and the like. I asked 
Michael to explain the purpose of all these devices. 

“I’m not quite sure,” he confessed sheepishly. 

Michael Yap is typical of the technocrats who run Singapore. 
His education at the University of Maryland was paid for by the 
government as part of an elite scholars program for fast-trackers. In 
return, he is bonded for eight years of government service, although 
it is likely that he will stay much longer. 

Michael is passionately devoted to the joint causes of technology 
and Singapore. He continually steers the conversation back to one 
of the two topics (and preferably both at once), always accentuating 
the positive aspects of Singapore society. 

Michael's job is Programme Manager for IT2000, Singapore's ef- 
fort to build an “intelligent island” by the year 2000. The scope of 
IT2000 is vast, one of the most encompassing visions ever formu- 
lated by a government to build a network infrastructure for a soci- 
ety. 

First and foremost, IT2000 is a symbolic commitment by the 
government to use technology. It is an effort to find a way to main- 
tain the stunning economic growth that Singapore has managed in 
the last 20 years through shipping, finance, and hi-tech manufactur- 
ing. 

As a vision, it starts with high-level goals, such as increasing 
productivity and well-being. At the next level down, it moves on to 
the applications that can help achieve these goals. Only at the very 
end is specific technology considered. 

Thus, unlike many national plans, fiber to the home or use of 
ISDN are not the goals. Instead, the vision of IT2000 is to maintain 
productivity increases of 3 to 4 percent per year for a population of 
2.65 million people for a sustainable period of time. 

Singapore is one of the few countries that could seriously ad- 
vance such a goal. Known as Singapore, Inc. to the financial press, 


77 


Exploring the Internet 


the country is run much like a big corporation. It is not unusual for 
senior management (i.e., government ministers) to give direction to 
corporations, citizens, and the civil service. 

Throughout its history, Singapore has been run with this combi- 
nation of broad consensus and top-down direction. IT2000 is not 
the first large scale plan. In 1984, there was “Vision 1999,” in 1986, 
the “Agenda for Action.” In 1990, the government issued a beauti- 
ful coffee-table book produced by Times Editions called Singapore— 
the Next Lap. The book contained a series of broad goals, such as the 
following: 


“we must encourage more Singaporeans to 
marry, to do so earlier, and to have three chil- 
dren, and more if they can afford it.” 


Pictures of smiling children and happy families were accompa- 
nied by specific goals, in this case a target population of 4 million 
people. These goals were then used to guide government policies, 
such as tax policies, or even housing assignments. 

In the area of information technology, which the Singapore gov- 
ernment refers to as IT, policy was spearheaded by the National 
Computer Board (NCB). The NCB coordinates government comput- 
erization efforts, and is also charged with creating a “National IT 
Plan.” In consensual Singapore, the NCB shuns the term “create,” 
preferring instead to “lead to the realization” of a National IT Plan. 

In the civil service computerization area, NCB had deployed 
over 800 of its staffers into government offices. An example of a 
system developed by the NCB is the immigration system, which 
claims to be able to check passports for foreigners in 30 seconds and 
residents in 15. My own experience at the airport, even though in 
the middle of the night, certainly bore this out. 

Other examples of government automation efforts are an auto- 
mated card catalogue for the national library, a computerized regis- 
try of companies, and automated production of birth certificates. 
No one of these applications was particularly unique; what was in- 
teresting was the breadth and focus of the computerization effort. 

NCB had been slowly trying to tie these different systems to- 
gether to allow data sharing among government bodies, an effort 


78 


Singapore 


known as IDNet. I met with employees of NCB to learn more about 
IDNet. The meeting took place in the vast NCB headquarters lo- 
cated in Science Park. On the walls were posters of people looking 
very modern, sporting slogans like “Success Through Partnership” 
and “Fulfillment Through People Orientation.” 

I was met by an NCB public relations officer and ushered into a 
conference room. “Help yourself to coffee,” she said, pointing to a 
device called the Café Bar and leaving to get the people I would be 
meeting with. 


The strange looking contraption had different buttons you 
pushed to dispense various powders (coffee, milk, soup) into a cup. 
You then pressed the water dispensing bar to put hot water into 
your own personal mix of soluble powders. After a few false starts, 
I figured out the apparatus and made myself a cup of fresh, steam- 
ing Nescafé. 

Being the curious type, I had the cover off the Café Bar and my 
head buried inside when the door opened and a group of NCBians 
(as the posters downstairs referred to employees) were ushered in 
by the PR officer. I slammed the cover on my finger and sat down 
to learn about IDNet. 


The network is fairly simple. It consists of an IBM 3090 at the 
Ministry of Finance acting as the hub for a multidomain SNA net- 
work. The basic service allows a user on one net to send and re- 
ceive 3270 data streams to another net. A few custom applications 
are also available. 


To use cross domain services requires a special ID. One thou- 
sand IDs had been granted, each tied to a user profile detailing 
which services that particular user could access. IDNet has 31 sites, 
90 machines, and 40 applications. 


The IDNet architects didn’t seem particularly adventuresome 
technically, as is often the case with people whose job is to keep a 
network running. They grudgingly acknowledged that token ring 
networks might play a role in the future, but more for terminal ac- 
cess based on PCs than for peer-to-peer networks. Protocols like 
TCP/IP and OSI were acknowledged, but with a notable lack of en- 
thusiasm. 


hs 


Exploring the Internet 


In a distinct twist from many large organizations, NCB was cen- 
tralizing its servers into four very large data hubs, each devoted to a 
particular type of data. Centralizing the location of computers 
would, hopefully, save on overhead and permit better control over 
operations. The four centers would have data about land, people, 
legal establishments, and finance. While each data center might 
have many computers, the NCB staffers didn’t rule out the possibil- 
ity of replacing many systems with a single mega 3090 running DB2. 


The guiding principle for computerization of government was 
the slogan “one stop, non stop.” This meant that a citizen ought to 
be able to go anyplace and do all government business at once (and 
quickly). As one official pointed out, no matter how comfortable 
you make the chairs in a government waiting room, people will still 
want to leave. Of course, it is worth pointing out that reality does 
not always meet the lofty goals of slogans, but it was encouraging to 
see that Singapore policy makers had a policy they were trying to 
communicate. 


Data sharing among government agencies was one aspect of one 
stop, non stop. The other was delivery of services. Systems like 
Teleview videotex were envisioned as the delivery vehicle for many 
government services. Some services were already available on 
Teleview, such as listing of government tender notices and awards. 


Other systems were not on Teleview but did show the effects of 
data sharing. For example, the census bureau tapped into existing 
databases and preprinted census forms, allowing people to verify 
data instead of reentering it. 


One stop, non stop was part of the broader vision of IT2000. 
Singapore had had a national IT plan for several years, but in 1990, 
Dr. Tay Eng Son, the Senior Minister of State for Education unveiled 
the IT2000 concept which greatly increased the scope (and the 
stakes). 


IT2000 is being called a “national masterplan for an information 
infrastructure.” When I talked to Michael Yap in late October 1991, 
the NCB had just finished the first phase of feasibility studies. 
Based on that first phase, NCB had received significant government 
funds to develop an architecture to make it all happen. 


80 


Singapore 


The feasibility phase divided the economy into 11 sectors, rang- 
ing from construction to health care to transportation. Each sectoral 
study group was chaired by a “captain of industry.” 

NCB staffers assisted each study group. The staffers led the 
groups through top-down analyses such as trends analysis and wish 
lists and through bottom-up planning procedures such as depend- 
ency graphs and functional decomposition. 

The goal was a set of strategic applications: things that people 
should be able to do on an intelligent island. Many of the projects 
that fell out of this planning are truly ambitious, ranging from a 
national multi-function smart card and an intelligent vehicle high- 
way system, to a queueless, counterless government services sys- 
tem. 

Altogether, the planning process involved 200 industry leaders 
and 50 NCB staffers. This resulted in the goals for IT2000. The next 
step will be to begin defining a series of target applications. Under- 
lying the applications will be a set of common network services 
(e.g., authentication) which in turn use the national telecommunica- 
tion network. ‘Tying all this together is a series of technical stand- 
ards and a legal framework. 

Defining each of these pieces is the challenge. When Michael 
Yap talks about a legal framework, for example, he includes such 
difficult issues as copyright for intellectual property. When he talks 
of common network services he means everything from transport 
connections to “look and feel” to application tool kits. 

Will it work? When NCB decides an item is a priority, it can 
achieve impressive results. For example, it developed a ship plan- 
ning system for the Port of Singapore Authority that reduces the 
planning time for each ship by half. Together with the massive use 
of EDI in TradeNet, there is no doubt that the port is a highly effi- 
cient, automated enterprise. 

The real challenges will be the common network infrastructure 
and the legal framework. In the U.S., such issues are still in the 
very early conceptual stages. The Corporation for National Re- 
search Initiatives has attempted to address both issues in their 
Knowbot architecture, but Knowbots are still at the early prototype 
stage. 


81 


Exploring the Internet 


Michael and I finished our tea and he dropped me off at my 
hotel. I was off the next day to Dublin to learn more about a key 
U.S. infrastructure, the NSFNET, which had come into being be- 
cause of an Irishman. 

The next morning, I stood in long lines at the Singapore airport 
and read the Singapore Straits Times. I noticed a story that had an 
interesting mix of old Asia and high-tech. In the Taoist religion, 
when people die, paper models of important things in their life are 
burned in a ceremony, allowing the newly departed to take the good 
things they enjoyed in life with them. Typically, these paper models 
are things like houses and cars. On Sin Ming Drive, however, paper 
models of portable phones, VCRs, and even karaoke sets were avail- 
able. No ISDN handsets were on sale yet, though. 


82 


Dublin 


I arrived in Dublin on Monday. I had heard that it was a holiday, so 
I asked the cabbie what the occasion was. 

“Nobody knows,” he replied. 

And there goes your tip, I thought to myself. 

Checking into my hotel, I caught a bus into town to find a true 
Irish pub. I must have walked five miles before I found one that 
was open. 

“Never thought I’d have trouble finding an open pub in Dub- 
lin,” I remarked to the bartender. 

“Ah, it’s the holiday, you know,” he replied. 

“What's the occasion?” I asked. 

“Nobody knows,” he replied. 

I left him a tip. Always tip your bartender is what my mother 
told me as I left home, and the advice has never failed to serve me. 

The next morning, feeling a combination of Guinness and jet lag, 
I met Dennis Jennings, who picked me up in an ancient BMW and 
drove me across the street to University College, Dublin, where he 
runs the Computer Centre. 

A tall, affable Irishman, Dennis set me down in his office, filled 
with mountains of paper and wall-to-wall binders on a wide range 
of networking topics. 

“I understand you’re the father of NSFNET?” I asked. 

He laughed. 

“More like an uncle,” he said. For the rest of the morning he 
proceeded to tell me the story of how the NSFNET was born. 

When all is said and done, Jennings certainly qualifies as the 
father (or at least one of several fathers) of the NSFNET. One must 
ask, of course, if the child turned out as hoped, but that is a differ- 
ent issue from its paternity. 

Jennings started working on research networks in 1979 when he 
started the Irish Universities Network linking the two major Dublin 
schools. At the time, X.25 was considered a network and for two 


83 


Exploring the Internet 


years, from 1979 to 1981, the Irish Universities Network consisted of 
X.25 and “higher level” protocols such as X.28 and X.29. 

In 1982, he proposed a national star-based network centered 
around University College Dublin. After a year of discussion, nego- 
tiation, and consideration, the Higher Education Authority funded 
HEAnet. 

The original HEAnet was based on the JANET Coloured Book 
protocols. When I visited Jennings at the end of October 1991, 
HEAnet 2 was beginning to be operational. Based on X.25 with a 64 
kbps backbone and multiprotocol routers, the network was rapidly 
becoming TCP/IP-based. 

In 1983, with funding for HEAnet approved, Jennings heard a 
rumor at Yale that IBM would be bringing BITNET to Europe. Al- 
though the European Academic Research Network (EARN) was go- 
ing to be based on the big six European players, Jennings managed 
to turn that into seven countries. 

The initial EARN meetings were chaotic and, as I found out over 
the next couple of days, Dennis Jennings is not shy about grabbing 
the white board and jumping in. He did, and ended up becoming 
the first president of the EARN board. 

The EARN position started bringing him to the continent on a 
frequent basis. On one trip, he attended a Landweber networking 
symposium. At the symposium, Jennings and his wife had dinner 
with many of the participants. Jennings’ wife mentioned to Larry 
Landweber that Dennis had always wanted to work in the States. 
You know, one of those polite things you say over dinner. 

“Would you like to be director of CSNET?” Landweber asked, 
not one to let such offers pass idly by. 

Dennis had a trip scheduled to California anyway. While he 
was in California, he phoned Larry Landweber. Next thing Dennis 
Jennings knew, he was flying to Washington, D.C. to meet with the 
head of the CSNET board. 

“By the way,” Larry added, “I’m also going to Washington. The 
NSF is considering a new initiative. Want to sit in?” 

Landing in Washington after a red-eye flight, Dennis took a cab 
straight to the NSE, where he meekly took a seat in the back while 
network luminaries like Dave Farber, Ira Fuchs, and Vint Cerf came 


84 


Dublin 


in. “Frankly,” Dennis explained, “I was a bit awed. After all, this 
was America.” Among some Europeans at the time, America had 
the reputation as some sort of super technology haven. 

He didn’t stay awed for too long. In fact, he soon found himself 
at the white board again. 

Eventually, he was offered two jobs: Director of CSNET and the 
NSF Program Director in charge of networking. He played hard to 
get for a bit, until NSF upped its offer to include considerably more 
money. 

Back in Dublin, he was sorting out his affairs when NSF called. 

“Any chance you can be English?” 

Asking an Irishman to be English is a bit like asking an IBM 
account executive to sell camels. 

“I beg your pardon?” 

In order to work for NSE, you had to be a citizen of an allied 
nation. Ireland didn’t cut it. Luckily, Dennis had been born in Eng- 
land. He got an English passport, and on January 2, 1985 he started 
work at NSF. 

At the time, NSF wasn’t thinking in terms of building a national 
network. It had funded four supercomputer centers and merely 
wanted to give scientists access to them. The original thinking, in 
fact, was to have four networks, one for each of the centers. 

A technical advisory group was formed, chaired by Dave Farber 
and including such people as the ubiquitous Larry Landweber, Tony 
Lauck (head of the DECnet architecture group), Frank Kuo from 
SRI, and several others. 

The first big issue to tackle was standards. The computer scien- 
tists quickly honed in on TCP/IP. Others were not so sure. At the 
time, there were several higher-performance proprietary networks 
such as DECnet and MFEnet (sardonically referred to by some as 
MuffyNet). 

The argument was framed in terms of openness versus effi- 
ciency. Protocol suites like DECnet or MFEnet were thought to be 
significantly more efficient than TCP/IP. Another issue was free- 
dom of choice. Some supercomputer center directors didn’t want to 
be constrained. Significant populations of users, especially in the 
physics community, preferred DECnet. 


85 


Exploring the Internet 


Eventually, TCP/IP won out. It was decided, however, that a 
network could start out as something else as long as it would mi- 
grate to TCP/IP. An interesting side note was the role of OSI. Eve- 
ryone envisioned that OSI was five years away and would provide 
a migration path to a world of openness, truth, and beauty. More 
than five years later, OSI was still five years away and had become 
the canonical example of the sliding window. 

Even more fundamental a choice than the protocol suite was the 
structure of the network. Jennings felt very strongly that this 
should be a general purpose internetwork. General-purpose meant 
that it was not specifically aimed at the current supercomputer user. 

The argument was made that a general-purpose internetwork 
would best serve the goal of promoting science and engineering, the 
mandate of the NSF. The internetwork part of the structure was 
fundamental: this would be a network of networks. The lowest unit 
was the campus network. 

From the present vantage point, this doesn’t sound like a radical 
requirement, but at the time there were many major universities 
without campus networks. As Jennings explained it, “networking 
was the private domain of individual researchers.” By refusing to 
extend the internetwork to the desk or the department, Jennings 
hoped to help fuel an expansion of the internet. 

In 1985, many of today’s mid-level networks got their start. 
Some, like the San Diego Supercomputer Center’s SDSCnet, were 
run by the centers. Others, like the Bay Area Regional Research net- 
work (BARRnet) were independently formed. 

Looking back, one thing that Jennings regrets is that the NSF did 
not make a long-term funding plan explicit to these regional net- 
works. Funding was based on a simple year-to-year allotment. A 
better model would have told the regionals that they would be 
funded at 100 percent for three years, with a two-year falloff. This 
is the same model, of course, that IBM used with BITNET and 
EARN. 

Making the funding model explicit would have had two bene- 
fits. First, NSF would have been freed from continuing funding ob- 
ligations with the regionals, allowing NSF to move on to other 
infrastructure projects. Second, and more important, the regionals 


86 


Dublin 


would have had a very strong incentive to find alternative funding, 
from their members, consortiums, or the states in which they did 
business. The Jennings model of infrastructure is thus to have gov- 
ernment start off the project and then have the users take it over. 
This leaves the government free to move on to the next building 
block. 

In addition to funding the regionals, NSF ended up putting ina 
backbone, the NSFNET. In August of 1985, Jennings attended a 
two-day meeting in Boulder, Colorado with the directors of the four 
supercomputer centers and the director of the National Center for 
Atmospheric Research (NCAR). 

Jennings presented his model of regional networks connected by 
a national backbone. The directors were not pleased. After all, this 
was a way for one of their local researchers to use the facilities of 
another center. 

The next morning, however, the directors did an about face. 
True, their local researchers could use somebody else’s system, but 
the converse was also true. An Internet would make one center’s 
services available to the entire country. If you think your center is 
better than the others (and all the directors did), a backbone is a 
wonderful idea. 

As Jennings related the story, not only did the directors change 
their minds, they started pounding the table asking why this wasn’t 
already in place. The group adjourned to a picnic table up on Table 
Mesa, in the shadow of the Rocky Mountains, and sketched out the 
backbone on a piece of paper. Jennings still has the piece of paper, 
dated September 17, 1985. He had been on the job nine and a half 
months. 

The backbone would consist of 56 kbps lines linking NCAR and 
the four centers. It was immediately labeled the “interim backbone” 
since everyone agreed a T1 network would soon be needed. 

Events were moving very quickly. At times, Jennings was cau- 
tioned by the NSF bureaucracy that he was “sailing close to the 
wind.” For example, Bill Schrader and others at Cornell went ahead 
and ordered all the 56 kbps lines before NSF had formally approved 
the project. Cornell then took the lead in putting in the interim sys- 
tem. 


87 


Exploring the Internet 


In addition to lines, there was a crucial decision on the selection 
of routers. Major and minor router vendors were asked to make 
presentations. BBN had a wonderful system, but their routers cost 
U.S. $180,000 each. Cisco and Proteon came close, but didn’t have 
nationwide support structures in place. 

Ultimately, attention focused on the Fuzzball, a device based on 
the PDP-11 and developed by David Mills. Everybody was reluc- 
tant to depend on a homegrown system developed and maintained 
by one person. As reluctant as anybody to have the national net- 
work based on the Fuzzball was David Mills himself. 

David ended up spending the next two years maintaining and 
modifying his Fuzzball. Some of the changes were simple bug fixes, 
but others reflected some significant architectural flaws in the origi- 
nal TCP/IP. 

For example, the TCP/IP protocol suite implied a single back- 
bone: the ARPANET. Now, with the addition of the NSFNET, there 
were two backbones and the Exterior Gateway Protocol (EGP) 
broke. Mills was forced to periodically hack up his Fuzzballs to 
handle this, and other, situations. 

Jennings felt that the decision to go with the Fuzzball was one of 
the major successes of the NSFNET project. It forced the Internet 
community into a formal examination of routing, leading to specifi- 
cations of router requirements and the development of new proto- 
cols such as the Border Gateway Protocol (BGP). 

Common, open specifications for routing in turn led to the im- 
mense growth of companies like Cisco, Proteon, and Wellfleet, as 
well as substantial product lines for larger companies such as DEC 
and Sun Microsystems. Low-cost routers allowed the creation of ad 
hoc internetworks, which in turn led to the creation of companies 
like PSI and AlterNet. 

In March 1986, Dennis Jennings brought to a.close his 15 months 
at NSF. Just 15 days later, the 56 kbps backbone went live. Jennings 
was replaced at NSF by Steve Wolff, who began the difficult job of 
formulating the solicitation for the T1 backbone and then later, a T3 
backbone. 

If Dennis Jennings is the uncle of NSFNET, then Steve Wolff 
would qualify as the nanny, expanding the network from an ad hoc, 


88 


Dublin 


interim system into a mature, production network transferring over 
14 billion packets per month. Wolff deserves a great deal of the 
credit for the rapid growth of the Internet by agressively expanding 
the backbone, funding international links, and encouraging the 
growth of the regional and campus networks. 

After a morning learning the history of NSFNET and a chance to 
view the tattered piece of paper that served as the original architec- 
ture document, we went out to lunch with the directors of the other 
two university computer centers. Over a glass of wine, the conver- 
sation turned to the question of European backbones. How would 
Dennis, if he had the power, accomplish the same thing in Europe 
that he did in the U.S.? 

Dennis quoted a classic Irish proverb given when a tourist asks 
a farmer for directions: “I don’t know, but if I were going there, I 
certainly wouldn't be starting from here.” 

In the United States, a government agency, the NSF, was charged 
with promoting research and education. Within the European Com- 
mission, however, there was no such group. There was no mention 
of education in the Treaty of Rome, the enabling legislation for the 
European Community. Instead, funding for research networks was 
funnelled through groups like the infamous 13th directorate. 

DG XIII was responsible for promoting things like competitive- 
ness and standards. In practice, this led to a strong focus on the 
PTTIs and OSI. What it did not lead to was an operational, pan- 
European backbone, either commercial or research. Everybody was 
waiting for the Commission to act and the Commission was waiting 
for OSI to be commercially available. 

After lunch, Dennis told me about an extraordinary meeting that 
was to be held the next day to try and bootstrap a European Back- 
bone (EBONE). We quickly rearranged my plane tickets to route me 
to Amsterdam and Dennis drove me back to my hotel for a glass of 
Guiness. 


89 


Amsterdam 


My wakeup call came at 5 AM. I found my way into a cab, met 
Dennis at the airport, and flew to Amsterdam. We hailed a cab to 
the EBONE meeting being held in the Tiger Room at the Artis Zoo. 
En route, our cabbie regaled us with obscene animal jokes. 

When we arrived at the Tiger Room, the meeting had started 
already, with 35 deadly serious people sitting around a large square 
formed by long tables. Kees Neggers, co-managing director of 
SURFnet, chaired the meeting, which included most of the major 
networking players in Europe. 

The idea behind EBONE was quite simple. Until the Commis- 
sion got its act together, people would pool existing resources and 
form a voluntary, interim consortium. If and when the EC or some 
other body started operating a more formal backbone, the consor- 
tium would disband. 

A consortium like this was an incredible balancing act. Deep 
religious barriers divide Europe. Some people insisted that any 
workable network must be based on OSI, the Connection Oriented 
Network Service (CONS), and X.25. Others prefered TCP/IP and 
leased lines. To make a workable backbone, enough of these players 
had to be convinced to sign up to the EBONE concept. 

Kees Neggers and a few others had formulated a memorandum 
of understanding which would form the “gentlemen’s agreement” 
to put EBONE into being (the word “gentlemen” being appropriate 
for this almost exclusively male enclave). The gentlemen were 
walking through the draft word by word. 

The basic concept behind EBONE was that all organizations 
signing the memorandum would make some form of contribution in 
return for being able to use the backbone. Some would contribute 
lines or routers, others would contribute people, and a few would 
even contribute money. 

All the resources would be a loan to EBONE. At the end of 
1992, everything (except the money, of course) would revert back to 
the contributors. The hope was that by the beginning of 1993 some 


90 


Amsterdam 


formal group would be in place to handle the pan-European back- 
bone and EBONE would be unnecessary. 

One of the biggest items of debate was who would or should be 
the parent organization that would replace EBONE in 1993. Some 
wanted the Réseaux Associés pour la Recherche Européenne 
(RARE), the association of research networking groups in Europe, to 
play a role. Others wanted no such thing. Kees Neggers continu- 
ally refocused the discussion on 1992, emphasizing that EBONE was 
making no decisions about anything past the one-year interim ad 
hoc network. 

The EBONE backbone, like the NSFNET, would have no directly 
attached users. It would be connected to regional systems, such as 
SURFnet, which in turn would be connected to users. The backbone 
would be a diamond, connecting four major European cities. On at 
least two points on the diamond there would be links to the U.S. (A 
few months later, the initial 1992 topology was finally determined to 
be five major hubs—London, Montpellier, CERN, Amsterdam, and 
Stockholm—connected with 256 kbps to 512 kbps links and with 
three links to the U.S.) 

The network, unlike NSFNET, would have no restrictions on the 
content of traffic. Although targeted for the benefit of academic and 
research use, commercial traffic could pass over the backbone and it 
was up to each regional network to determine an appropriate use 
policy. Likewise, although EBONE was envisioned primarily as a 
TCP/IP backbone, it was explicitly multiprotocol. An OSI “pilot 
service’ was listed in the draft memo as one type of traffic, and 
others were alluded to. 

Much of the wording of the memo was quite delicate. For ex- 
ample, EBONE was described as providing “value-added open net- 
working services.” Why these particular words? 

Well, networks are the domain of PTTs in Europe. If you leave 
out the word “value-added,” you tread on the turf of the PTT. Like- 
wise with the word “open.” Many countries had decided that open 
networks (i.e., OSI) were crucial and they would not participate in 
EBONE unless the word open was used. 

Other types of wordsmithing at the meeting reflected the cul- 
tural differences of the 35 participants. For example, the backbone 


91 


Exploring the Internet 


had been described as being “redundant.” In England, when you 
fire somebody, you “make them redundant.” “Resilient” proved to 
be a better word. 

Lunch at the zoo consisted of frantic huddles among various fac- 
tions. While I enjoyed a delightful buffet of eel and paté, others 
were desperately trying to forge a consensus. 


Issues like the role of DECnet proved to be especially tough. 
Some people wanted to allow DECnet Phase IV traffic across the 
backbone. Others said that this wasn’t necessary as DECnet Phase 
V would be able to use the ISO CLNS service. It was finally de- 
cided not to decide. DECnet traffic could cross the backbone if the 
two ends of a link decided it was allowed and it didn’t adversely 
impact the operation of the backbone. 


Carrying DECnet traffic was in some ways a foregone conclu- 
sion. Some of the links being contributed to EBONE were multi- 
plexed into underlying lines. These underlying lines were not an 
EBONE issue and could carry DECnet, SNA, and any other kinds of 
traffic. 


EBONE was clearly a chicken-and-egg situation. Many organi- 
zations would be unable to persuade their management to join until 
the consortium existed. The consortium wouldn’t exist until enough 
organizations joined. 

At the end of the day, with all the words finalized, Kees Neggers 
went around the table and asked people to tell the group if they 
would join, and, if so, what their contribution would be. To start 
things off, SURFnet would donate ECU 300,000 (U.S. $369,000) 
worth of lines, routers, and people. 


Others joined in. The Spanish network would help the line costs 
of the backbone and would donate 35 percent of a person. Telecom 
Netherlands, if the EC approved, would provide a gateway to IXI, 
the large European X.25 network funded by the Commission. 


Dennis Jennings at UCD would use the IXI links to reach 
EBONE, as would many of the smaller countries. Dennis also had 
an unusual contribution of money. He offered ECU 10 per full time 
academic staff member at University College Dublin, for a total of 
ECU 8,000 (U.S. $9,840). Not a huge sum, but Dennis pointed out 


92 


Amsterdam 


that if every university in Europe adopted his formula, the network 
would have a budget of ECU 10 million per year. 

Many groups were unable to commit immediately. Brian Car- 
penter, head of networking at CERN, the international physics labo- 
ratory, had to get approval from all his member countries and 
would ultimately end up “supporting” EBONE instead of formally 
signing the memorandum. The European BITNET, EARN, wanted 
to commit a line to CUNY in New York, but had to wait until its 
board met to commit formally. 


On the opposite side of the room from Kees Neggers was Harry 
Clasper, the representative from IBM. IBM ran EASInet, a large 
European network. Its contribution of lines would be a significant 
addition to EBONE. 


Throughout the day, Harry Clasper had been a vocal participant. 
Dressed in a regulation IBM pinstripe suit, he had been carefully 
tracking the proceedings. When the question of contributions 
reached him, he began speaking in a quiet voice and the room 
strained to hear him. 


“ Y'm disappointed that this is not as open as it could be, and 
therefore IBM Europe is reserving its position at this time.” IBM 
had substantial SNA traffic in EASInet and was clearly worried that 
if they joined the EASInet, sites might have problems. 


Even with IBM sitting on the fence, however, it was clear that 
there was enough to make EBONE work. After IBM, groups like 
EUnet and NORDUnet added substantial contributions. 

Finally, the end of the table was reached. The last person to 
speak was Bernhard Stockman from NORDUnet, also an active par- 
ticipant in the IETF. NORDUnet had already made known its con- 
tribution, but Bernhard had one thing to add. 

“I will take everything you contribute and turn it into something 
that works.” Bernhard would help form the Ebone Action Team, 
the engineers who would try to rationalize the contributions into a 
network. 

With EBONE becoming a virtual reality (it would still take sev- 
eral months to get all the pieces in order), Kees Neggers made one 
more round around the table to see if anybody would be interested 


93 


Exploring the Internet 


in being on the management committee. Harry Clasper from IBM 
raised his hand. 

“If IBM were to commit, I would like to be on the management 
committee.” 

Everybody laughed and the meeting was adjourned. A half- 
dozen of us took a tram to the railway station to have a few beers 
and conduct a post mortem. Kees Neggers, Harry Clasper, Dennis 
Jennings, and myself sat with some beers while Kees and Dennis 
worked on the IBM position. Harry Clasper, like some pin-striped 
corporate Buddha, sat quietly and drank his beer. 

Finally, Kees left to catch his train to Belgium and Harry, Dennis 
and I all boarded the express train to the Schiphol airport. We were 
cutting it a bit close, but the 18:26 train left us just enough time. 

“Don’t worry,” Dennis reassured us, “you can set your watch by 
the Dutch trains.” 

I looked out the window as 18:26 came and went. Finally, ten 
minutes later, an announcement came across the intercom in Dutch 
and people start gathering things and got off the train. 

A mob of 100 or so people all sprinted over to another track to 
catch the local train. On the local, we began doing mental arithme- 
tic. The conversation quickly went from European infrastructure to 
travel horror stories then to nervous silence. 

Arriving at the airport train station at 7:10 for 7:30 flights, the 
three of us took off in three separate directions, each of us doing an 
O.J. Simpson imitation. Despite an airline clerk who gave new 
meaning to the term lethargic (although that was certainly not the 
word I used at the time), I made it to my plane for London. 


94 


London 


Thursday morning I strolled from my seedy hotel room through 
soot-blackened streets to University College London to meet Steve 
Hardcastle-Kille. Steve is one of the two guiding lights behind the 
ISO Development Environment (ISODE), the other of course being 
the eminent Dr. Marshall T. Rose. 

While Marshall concentrated on making a public-domain OSI 
implementation of the middle layers that can run over both TCP/IP 
and OSI stacks, Steve focused on the application layer. Through a 
prodigious string of Internet Drafts and RFCs, Steve helped to turn 
the X.400 and X.500 standards into workable services. 

It is somewhat ironic that some of the best work on ISO stand- 
ards (and the most popular implementation) should have come out 
of the TCP/IP world. By providing public-domain OSI code, Hard- 
castle-Kille and Rose had pushed these standards from paper and 
theory to things that people use in their day-to-day work. 

If you want a standard that works in the real world, it needs to 
interact with the existing base of services. Some of the early work 
Steve did was to define the functionality for X.400/SMTP gateways. 
Later, Steve focused on X.500. 

UCL, under Steve’s leadership, integrated X.500 into ISODE in 
an implementation known as Quipu, after the fringes of knotted 
cords used to keep numerical records by the Quechuan Indians of 
the Incan empire. It was traditional to name each country’s master 
Directory Service Agent after an animal, preferably one found in 
South America. Finland’s DSA is the jaguar, Germany the puma, 
and Marshall T. Rose contributed the alpaca for the U.S. In a his- 
toric decision, however, as a tribute to X.500’s growing maturity, 
South American animal names were abandoned in favor of moni- 
kers marketing could pronounce. 

X.500 directories are structured as a tree. Each part of the tree is 
managed by a DSA (although it is important to note that the direc- 
tory and the DSA are carefully defined as separate concepts allow- 
ing a particular part of the tree to be provided by multiple vendors). 


95 


Exploring the Internet 


The root for the world is the Giant Tortoise at UCL. In addition to 
being the world root, this DSA is also the root DSA for the United 
Kingdom. 

The United Kingdom had been aggressively deploying X.500. 
The Joint Network Team (JNT) began funding X.500 by giving uni- 
versities a Sun/4 to act as a DSA. By November 1991, 40 organiza- 
tions in the U.K. had DSAs serving them with a total of 54,387 
registered entries. By the end of 1991, all 55 universities in the U.K. 
were scheduled to have their Sun workstations. 


UCL also functions as the coordinator for the PARADISE ES- 
PRIT project. PARADISE stands for Piloting an International Direc- 
tory Service. (A cute acronym is one of the prerequisites for 
European Commission funding.) 


Under the coordination of PARADISE in Europe and similar 
projects in the U.S., the global directory had grown by November 
1991 to reach 1,212 organizations, 144 DSAs, and 421,552 directory 
entries. 


The DSA is the X.500 component responsible for some part of 
the directory tree. To access X.500, users have a Directory User 
Agent (DUA). A couple of dozen user interfaces have been defined 
to interact with Quipu, ranging from a simple white pages lookup 
utility (FRED) to a full-fledged management interface (DISH) to 
Macintosh and X-Windows based graphical interfaces. 


To make X.500 work in the real world, several extensions were 
needed from the standards as originally defined. The X.500 specifi- 
cation assumes a homogenous OSI-based network where any DUA 
can set up an application layer association over a worldwide net- 
work to reach any DSA. 


In many places, a homogenous network is not realistic. The 
U.K., for example, had long supported the Coloured Book protocols, 
although TCP/IP support had recently been added. Many ISODE 
implementations run on top of TCP/IP, adding another important 
environment. It is interesting to note that many places that use 
ISODE on top of TCP/IP still have as an official policy a “migra- 
tion” to true OSI. They have yet to learn that birds migrate, not 
corporations. 


96 


London 


One of the first requirements for the deployment of X.500 was a 
relaying mechanism. If a DUA in the TCP/IP world needs to reach 
a DSA in the OSI world, it can ask a DSA connected to both worlds 
to relay the request. 

A second key area addressed was replication. X.500 assumes 
one DSA is responsible for one piece of data. If a DUA needs to 
reach a DSA in another country, it is possible that many intermedi- 
ate DSAs must be contacted as the user climbs the name tree to the 
root and then back down towards the target (although an intelligent 
DSA implementation would presumably cache some of this infor- 
mation). Replicating some of that upper-level information makes it 
much easier to find target organizations and is a significant per- 
formance enhancement. 

In addition to replication and relaying, Steve has been especially 
active in helping to forge a consensus on a common schema for the 
directory. After all, it doesn’t do much good to find an organization 
if the information it keeps is non-standard. A common schema con- 
tains the definition for standard objects, such as a person, and 
standard attributes common to those objects, such as a person's fa- 
vorite drink or e-mail address. 

Just before I arrived in London, the Internet Activities board had 
issued a carefully drafted RFC endorsing X.500 as a strategic direc- 
tion for the Internet community. If that stragtegy took hold, it 
would be a significant shift away from the Domain Name System 
(DNS). 

The transition between older name systems, such as DNS and 
the venerable WHOIS service, would certainly be the key to the suc- 
cess or failure of X.500 on the Internet. DNS adherents cite two 
problems with X.500: the complexity of the namespace and the 
slowness of implementations. 

X.500 structures names in a well-defined tree, with objects typi- 
cally going from country to management domain to organization to 
organizational unit to name. Some feel that a rigid hierarchy is a 
key flaw. Steve argues strongly that the opposite is true. 

One rigid hierarchy is indeed the basis for X.500; however, alter- 
native hierarchies can be defined on a local or regional basis with 
pointers into the basic tree. An alternative tree, based on the Do- 


97 


Exploring the Internet 


main Name System, for example, can be used to point to X.500 ob- 
jects. 

A single rigid hierarchy does have some advantages, particularly 
in the area of management. With a well-defined schema, people 
know exactly where to put an object, making management of the 
namespace similar in different areas. 

Before X.500 can operate as a truly global directory, it needs 
much better performance. One of the major problems for perform- 
ance is that X.500 implementations must carry around the baggage 
of the fully general middle layers of OSI. Although a skinny stack 
has been defined, most X.500 implementations support all the fea- 
tures of the session, presentation, and ACSE services, including 
those developed for other networking paradigms such as transac- 
tions processing. For example, X.500 makes no use of the check- 
pointing and synchronization features of the session layer. 

A light-weight Directory Access Protocol could go a long way 
towards providing faster DSAs. The lightweight protocol would 
map OSI down to a needed subset. If you need full generality, as in 
the case of communicating with a DUA or DSA that doesn’t support 
the lightweight protocol, a separate process can provide the transla- 
tion. | 

After spending a morning with Steve, I started making the 
rounds at UCL. UCL is highly unusual among computer science 
departments in that it emphasizes networks as a valid area of re- 
search. In fact, networking takes prominence at UCL (the school 
was the first international member of the ARPANET). 

UCL’s prominence is due in no small part to the influence of the 
department chairman, Peter T. Kirstein, known around the world by 
his login name of PTK. An old joke in the networking community is 
that when in Europe you have to deal with the PTTs, but in Eng- 
land, you have to deal with the PTK. 

No visit to UCL would be complete without a courtesy call to 
Peter, so I left Steve’s office at one end of the building to pay my 
visit to Peter Kirstein. Peter’s current passion (and a source of sub- 
stantial funding) was the Office Document Architecture (ODA), so 
we spent a half-hour talking about his testing of ODA packages, and 
his cooperative projects with groups like Bellcore and the American 


98 


London 


Chemical Abstracts to convert large databases into ODA to help 
spur the standard forward. 

UCL is also active in many other areas of networking. Jon 
Crowcroft described his efforts to run video conferencing over the 
Internet. One researcher showed me his work on ISDN Primary 
Rate interfaces; another showed me new X.500 user interfaces run- 
ning on soot-blackened terminals. 

With my head swimming from networking vertigo, I left UCL to 
get a drink. I stepped into an old pub near the university, with 
some appropriately quaint name like The Queen’s Foot or the Tam 
and Mutton. Settling down with my pint of bitter, I looked up to 
see that a karaoke competition was scheduled to start soon. Feeling 
that I could miss this particular event, I finished my pint in record 
time and went off for some Indian food. 


99 


vaimpene 


Friday morning, I headed north to Tampere in Finland. With three 
hours to kill in the Helsinki airport before my plane left, I idled 
away the time trying to decide between the sauteed reindeer with 
lingonberries and the elk pate with rowanberry gelatin. It was 4 PM. 
and the sun had just set. 

I was met at the Tampere airport by Vesa Parkkari, a man I often 
refer to as the Finnish Bill Gates. Of course, Vesa has a much more 
effusive personality than Bill Gates, although I confess my only con- 
tact with Mr. Bill has been through interviews in the trade press, 
which could make anybody look boring. 

The next morning, I got up early enough to watch the sun rise at 
7:30, then had a leisurely breakfast of pickled herring and brown 
bread. It was Saturday morning and evidently some sort of holiday 
in Finland. Of course, nobody had any idea what the holiday was 
for, but it was enough to close most of the shops in town. 

It wasn’t enough, though, to slow down Vesa. At 10 AM., he 
brought me down to the company he founded, Mikrokonsultit Oy. 
The name is a bit of a misnomer, as they didn’t have anything to do 
with microcomputers and didn’t do any consulting. (Since my visit, 
they changed the name of the company to Relevantum Oy.) 

In the late 1970s, however, Vesa was heavily involved with both 
microcomputers and consulting. He took early Motorola chips, 
made them into microcomputers, and then used the systems to de- 
sign custom applications. One system was developed by Vesa for 
NESTE, the state monopoly oil company. Involving 2 square meters 
of electronics (and lots and lots of assembly language programs), the 
system coordinated the weighing of all lorries coming into the refin- 
ery to load oil, printing all the necessary lists and other documents. 

Another, system, developed by Raimo Harju, his copartner, was 
still being used. The system takes raw timber and figures out the 
most efficient way to saw up the log to produce the most lumber. 
In an economy where 30 to 40 percent of GNP is based on forestry, 
this system proved quite popular. 


100 


Tampere 


Vesa had the same problem with consulting that others all over 
the world face. He did the programming, and thus bore the risk 
when a job took an order of magnitude more time to complete than 
planned. A fact of consulting, however, is that you often end up 
several subcontracts deep in order to get a job. Vesa bore the risks, 
but others higher in the food chain were making all the money. 

Vesa decided instead to give seminars about putting microcom- 
puters together. He gave a few at the Tampere Institute of Technol- 
ogy, and the demand quickly overwhelmed the university facilities. 
This was obviously a worthwhile business to be in. 

Vesa and his colleague Raimo Harju went into business. At first 
there was no company, just a couple of guys in a hotel conference 
room. The hotel couldn’t handle the idea of a meeting without a 
company name, so they made one up: Mikroboys. 

Mikroboys became the more dignified Mikrokonsultit and busi- 
ness flourished. In the early 80s, however, the prepackaged PC 
came into being and Vesa saw that there would be a limited future 
for very low-level courses like his. In 1982, they switched the com- 
pany to an exclusive focus on data communications seminars. 

Seminars are a funny business. Almost everything is a fixed 
cost. You spend a month or two (or more) to develop the seminar. 
Then you print and mail brochures. Then you wait. 

If enough people sign up, usually something like 15 to 20, you 
break even. Everything after that is gravy. Well, in 1983, the gravy 
began for Vesa. Finland had just started up two different public 
X.25 networks and Mikrokonsultit had a hands-on practical X.25 
course. They began teaching seminars to 70 people or more on a 
regular basis. 

Based on the early success, the company expanded and now has 
13 different seminars. Finland, with a population of 5 million peo- 
ple, is a small country. Yet it is big enough to support Mikrokonsul- 
tit. 

There are two keys to the early X.25 seminar success, and both 
factors hold for the later courses. First, courses are based on tech- 
nology that is available and cost effective. In the X.25 realm, for 
example, Finland has two public data networks in heavy competi- 
tion with each other supporting over 3,000 hosts. Leased lines are 


101 


Exploring the Internet 


cheap enough in Finland that it is estimated that there are another 
3,000 hosts on private X.25 networks. 

The second key to Mikrokonsultit’s success is that the seminars 
are hands-on. In a 5-day X.25 course, for example, users not only 
learn the theory of X.25 but how to configure Packet Assem- 
bler/Disassemblers (PADs) and hosts and how to run applications. 

Vesa took me through some of the exercises that the instructor 
does in the X.25 class. We took a PC X.25 card, installed it, config- 
ured it, then loaded up the X.25 and PAD software. We then set up 
links to Russia, China, the U.S., and the United Arab Emirates. We 
looked at a network analyzer to analyze PAD and X.25 parameters. 
We looked at tariff tables and calculated breakeven points for leased 
lines versus packet networks. We ran SNA 3270 and X.400 over 
X.25 to real hosts. 

Other courses on subjects such as X.400, TCP/IP, internetworks 
and routers, and SNA all take the same hands-on approach. Drag- 
ging Cisco routers, PCs, analyzers, and other equipment along 
means that you can’t just slap an instructor on a plane and have him 
read the words on slides to the class. You need people who can 
both teach and use the technology and, in the case of Mikrokonsul- 
tit, are fluent in Finnish. | 

All day Vesa led me from one room to another and from one 
topic to another. 

“Now we will do X.25 demonstration.” 

“Now we will discuss DECnet Phase V.” 

“Now you can use the Internet to read your mail.” 

At the end of the day, with my eyes glazing over, he had a new 
assignment. 

“Now we will go to my castle and do Finnish sauna.” 

The training market had been kind to Vesa and he had recently 
bought a castle. Much as I wanted to see this castle, I was torn. I 
had visions of being thrown naked out of a scalding sauna into a 
moat filled with ice. 

We arrived at the Parkkari castle, and Vesa showed me around 
from room to room. While his wife Pirjo Sistola and their three year 
old daughter took their sauna, we polished off a bottle of cham- 
pagne. Finally, the fateful moment arrived. 


102 


Tampere 


“Now we will do Finnish sauna.” 

I tried to demur, but Vesa made it quite clear that failing to par- 
ticipate would be considered a grave form of national insult. After 
a shower, I entered a very, very hot room. 

Vesa picked up a bucket and threw ladles of water onto the 
stones, producing blasts of steam. What I had thought of as very, 
very hot became an order of magnitude hotter. While Vesa kept 
throwing ladles of water onto the rocks, he explained the seven lev- 
els of the Finnish Sauna Reference Model. 

I was experiencing level 1. Level 2 seemed to have something to 
do with more water on the coals. In level 3, you exit the sauna 
periodically and rub ice cubes over your body, then jump back in. 
Level 4 consists of whipping yourself with strips of birch bark to 
stimulate the skin. In level 5, you leave the sauna and run outside 
to the lake. Level 6 has you roll around in the snow. Level 7 was 
some form of Finnish national secret and, quite frankly, I didn’t re- 
ally feel I needed to know. 


0 


Sunday morning was spent discussing the Internet with Vesa’s staff. 
We speculated on the motives of ANS and the fate of the NREN, 
after which I spent the afternoon taking a walk around the Tampere 
lake. 

That evening, I was met by Juha Heindnen, one of the creators of 
the Finnish Internet and an important technical influence for the 
whole Nordic region. Juha took me to “Salud,” a Spanish restau- 
rant, where we feasted on a carpaccio of wild boar and an entree of 
alligator served with a coconut and papaya sauce. 

Juha began setting up UUCP links in Finland in 1982. At the 
time, Finland had a large X.25 network for connecting the Univer- 
sity VAXen, and UUCP was used to transfer mail and news over 
phone lines within the computer science community. 

In 1984, having finished his doctorate, he went to the University 
of Southwestern Louisiana for a postdoctoral fellowship. While 
there, he helped set up a TCP/IP network for Louisiana and, as he 
tells it, enjoyed many Cajun parties. 


103 


Exploring the Internet 


Coming back to Tampere, he spent four years as an Associate 
Professor at the Tampere University of Technology. At the Univer- 
sity, he was asked to join the steering committee for FUNET, the 
Finnish University Network. 

There was a problem, though. FUNET was basically DECnet 
running on X.25 and Juha had a Sun workstation. He persuaded 
FUNET that their role should be to connect LANs together, not 
VAXen. 

At the time, there were no multiprotocol routers, so FUNET be- 
came a network based on wide-area bridges. A year later, however, 
Juha went to a USENIX conference and saw a couple of guys stand- 
ing behind a small table. 

This was the Cisco booth and the company had just added DEC- 
net support to their boxes. Juha came back to Finland ready to buy 
Cisco boxes, but couldn’t find a distributor. He convinced a sales- 
man at a local company to start carrying Cisco and two months later 
FUNET had become a multiprotocol network based on routers. 

After his success with the University network, Juha became a 
consultant. His clients include FUNET, as well as Telecom Finland, 
the country’s nominal PTT. 

Finland, unlike most European countries, has considerable com- 
petition in telecommunications. At one point, in fact, there were 
over 700 telephone companies. In 1991, there were over 50, each 
serving a small area. In addition, there was Telecom Finland. 

Telecom Finland was state owned when I visited, but was soon 
to be incorporated. It had two functions. It served as the local tele- 
phone company in areas where there are no others. It also func- 
tioned as the long distance telephone company. Even in the long 
distance market, it already had competition in data and would soon 
have so for voice traffic. 

In all cases, Telecom Finland received no special treatment and 
competition was encouraged by the Ministry. Data networking was 
especially competitive. Finland had two commercial IP networks: 
Datanet, run by Telecom Finland, and Lanlink, run by a consortium 
of the smaller companies. 

Both Datanet and Lanlink had connections to FUNET. FUNET, 
in turn, was part of NORDUnet, the regional academic network 


104 


Tampere 


linking five Nordic countries. Datanet had another link into Infolan, 
an international IP service owned by a consortium of PTTs. Infolan, 
in turn, was connected to PSI’s commercial network in the U.S. 

All told, Finland had over 10,000 Internet hosts. This was 10 
percent of all European hosts on the Internet, far in excess of Fin- 
land’s proportion of the European population. 

Both Datanet and Lanlink differed from their commercial Ameri- 
can cousins in a very important respect. PSInet, CERFnet, and other 
U.S. networks were open networks. When you joined, you could 
talk to any other IP host. Of course, that host might not want to talk 
to you, but the backbone delivered packets up to the customer 
router or host. 

In the Finnish commercial networks, access was explicitly con- 
trolled in the backbone. When a customer started up service they 
explicitly identified a set of hosts. Routers at the edge of the back- 
bone enforced the policy with access control lists. 

Datanet and Lanlink were thus more than just IP networks. 
They actually formed a sort of multiprotocol, LAN interconnection 
service. When I went to talk to Juha, Datanet was in transition. It 
was just beginning to provide the generic LAN interconnection serv- 
ice in a different way. 

The old model consisted of a border router at the edge of the 
backbone, which in turn was connected to a router at the customer 
site. The backbone itself consisted of a large number of E1 lines 
running at 2 Mbps. As Juha explained it, “no need to scrimp on 
backbone capacity. After all, we are the telephone company.” 

The new model of Datanet was based on Frame Relay. The 
Cisco router at the customer site, equipped with a Frame Relay in- 
terface, established a permanent virtual circuit (PVC) to another 
router on the edge of the network. If a user wanted to send TCP/IP 
traffic onto the Internet, for example, a permanent virtual circuit 
would be set up to either the FUNET or Infolan router. Traffic from 
Novell, DECnet, or any other protocol could use the same PVC to 
send data. 

Juha saw a number of advantages in moving the public network 
down from the network layer into a level 2 data-link service. First, 
bridges can be supported on a multi-user network. Bridges broad- 


105 


Exploring the Internet 


cast all packets to the other side. Since Datanet supports multiple 
private virtual networks, in the old model there was always the 
question of where to broadcast the packets. With permanent virtual 
circuits, the customer answers that question. 

Subnetworks are equally difficult to support in a general-pur- 
pose Internet, like the old model. If a customer had a single class B 
address split over multiple sites, an IP-based internetwork would 
not be able to figure where to route the packets. 

There is an even more difficult problem with a level 3 network, 
the question of policy routing. Let’s say that there are two Datanet 
customers, one commercial and one a researcher, wishing to set up a 
connection to the same destination in the U.S. The researcher would 
want to use the FUNET route and, in theory, the commercial user 
would need to go over the Infolan path. 

When a packet from the first user comes in, a route to the desti- 
nation would be cached in a router. Subsequent packets, regardless 
of the source address, would all go by the same route. Under the 
Frame Relay model, the user would set up a permanent virtual cir- 
cuit to the edge of either FUNET or Infolan. Note that the policy 
routing dilemma may show up further down the road, but as far as 
the local (or national) data network is concerned, policy routing de- 
cisions have been eliminated. 

Policy routing protocols are one of the most difficult issues in 
the Internet. Many are advocating the solution that Juha chose of 
simplifying the network layer topology in favor of a general, public 
data link service such as Frame Relay or SMDS. Others would ar- 
gue that moving the public network down to the data link solves 
problems today, but is a solution that will not scale well as the scope 
of the network increases. 

For Juha’s employers, Frame Relay certainly solved several im- 
mediate needs. It avoided the policy routing dilemna for TCP/IP, it 
supported a variety of non-TCP protocols over the same infrastruc- 
ture, and it did away with access control lists. 

Monday morning, I stopped by Juha’s laboratory at Telecom Fin- 
land to see the network and read my mail. Finland is so well con- 
nected that I got better response time reading my mail on a Telnet 
session back to Colorado than I got when I went in locally over a 


106 


Tampere 


9,600 bps dialup line. In fact, Vesa Parkkari had demonstrated 
FTAM file transfers on top of TP4 and the CLNS providing end-to- 
end performance from California to Tampere of 38,000 bytes per sec- 
ond. 

I then spent the rest of Monday making my way from Tampere 
to Helsinki to London to Paris, with the obligatory many-hour lay- 
over at London Heathrow. It was a relief to arrive at my familiar 
hotel in Paris. 


107 


Paris 


Tuesday morning, I took the Paris Métro over to the offices of Com- 
munications Week International. The one editor I knew let me in, 
showed me his boss's office, then promptly left for the U.S. The rest 
of the morning, I furiously banged away at a PC, trying to get 
enough columns written to stave off my editors in New York (and 
pay for some dinners in Paris). 

After finishing enough pithy columns to pay the Maitre d’, I 
went to the nearby bistro for a lunch of chicken Riesling, ratatouille, 
and a bit of wine. Sauntering back to the office, I had only to figure 
out how to submit the columns to the head office. 

Of course, the menu option on the PC labeled “MCI Mail” did 
absolutely nothing. I knocked on a few random editor’s doors, but 
was met by frantic stares and hurried brushoffs. My problem, of 
course, was that I was wearing a suit and was thus mistaken for one 
of the all-too-frequent employees from the U.S. that came in to use 
the office for a day in order to write off their trip to Paris on their 
income taxes. 3 

Needless to say, the editor with a deadline to meet has no time 
to work with these corporate junketeers who come in to do some 
“work.” The only work these visits involved would be for the lo- 
cals. Finally, I convinced an editor that I was only masquerading as 
a respectable person and actually did write for a living. I couldn’t 
quite bring myself to take on the identity of “trade press” or “jour- 
nalist” but it was finally established that I was a “guest colum- 
nist/consultant.” 

The editor became quite helpful and took my disk and disap- 
peared into her office to perform some magic submission ritual into 
the Atex system in New York. I asked her why any PC couldn't 
perform the same operation. 

She explained that a team of consultants had been working as- 
siduously on the problem, but some mysterious incompatibilty 
problem had prevented fully operational capabilities from being at- 
tained. Since I had a couple of hours to kill while waiting for a call 


108 


Paris 


from London, I decided to take a look at this mysterious modem 
malady. 

I went back to the PC I had been working on and started up 
Procomm. It seemed to be installed correctly, although, frankly, it is 
just about impossible to install it incorrectly. I then pulled up the 
dialing menu and picked MCI from the directory. 

Nothing. Next step was to pull up a simple terminal emulation 
screen and type “AT.” 


“OK,” the modem responded. 


Hmm. Obviously there was either a fully functioning modem or 
a pretty good modem emulator on this system. 


Walking around to the back of the desk, my highly trained eye 
spotted the problem. The modem wasn’t plugged into the wall. 
Sure enough, a few minutes later, I was reading my MCI mail. 


Why would an Internet explorer keep an MCI Mail account? 
There are two reasons. First, the telex gateway on MCI Mail is won- 
derful. It allows me to communicate with people in countries like 
China, which have very limited e-mail capabilities. The telex gate- 
way actually allows me to send and receive telexes. 


There is a more important reason, however. There are a few 
people with whom I correspond, mostly members of the trade press 
who haven't figured out how to reach my Internet mailbox from 
their MCI Mail accounts. If I don’t keep an MCI Mail account, I’m 
reduced to sending faxes back and forth to these people. 


It has often puzzled me how people who spend their life cover- 
ing computers can know so little about how they work. There are 
some exceptions of course. The editor of Communications Week, for 
example, has both Internet and MCI mailboxes, and knows the dif- 
ference between them. 


People like him are, unfortunately, very much the exception in 
the trade press. The features editor of one prominent networking 
newspaper, for example, was unable to figure out how to use MCI 
Mail, yet persisted in editing “in-depth” articles about Broadband 
ISDN, NFS, and a host of other technically sophisticated issues. 


So how does the trade press write in-depth pieces? All too 
often, the articles are simply a rehash of brochures and briefings. I 


109 


Exploring the Internet 


remember a time I did a feature piece on DECnet Phase V for one of 
the monthly publications. 

I met the senior editor assigned to “work with me” in Boston. 
Wearing a yellow power tie and driving a Detroit muscle car, he 
told me that the piece lacked “punch.” So he rewrote it. Close to 
deadline, somebody decided I ought to have a look at it. The new 
and improved lead explained how DECnet Phase V would be avail- 
able on systems ranging from VMS and Ultrix to the Macintosh and 
PDP. 


Macintosh and PDP? 


Running DECnet Phase V on a PDP is kind of like trying to 
simulate the weather on a PC/AT. Running on a Macintosh, though 
highly unlikely, was theoretically possible, but in my stacks and 
stacks of reading on the subject, I had not heard of any such project. 


In a not so gentle manner, I explained to my senior editor that 
having read a stack of functional specifications five feet high, it was 
my considered technical opinion that running on a PDP was un- 
likely if not impossible. Did my esteemed editor have a source for 
his information. 


“I was briefed by marketing,” he replied. 


I called up the Senior Executive Technology Editor and told him 
he was free to run the DECnet piece, but I would prefer, indeed 
insist, that my name not be on it. 


So he fired me and killed the piece. 


Technical knowledge is considered to be of minimal importance, 
indeed often a liability by the computer and communications trade 
press. Again, there are exceptions. For example, Kelly Jackson, for- 
merly with Communications Week, is known for insightful coverage 
of data communications issues. There are others, but they are too 
rare. 


People with degrees in journalism are often hired straight out of 
school, and are given no time to acquire any technical knowledge. 
Frequent contact with senior executives gives junior journalists. a 
feeling that they are “part of the scene.” All too often, though, they 
are simply manipulated and fed a carefully composted salmagundi 
of marketing manure. 


110 


Paris 


The cycle feeds itself. The executives get used to getting good 
press based on marketing hype instead of real information. The 
journalists keep feeling like they are getting the real story and feel 
increasingly confident and powerful. 

There are two solutions to this quandary. First, technically as- 
tute people need to write more. People like Marshall T. Rose, who 
devotes part of his time to writing books, are all too rare. The tech- 
nology does no good if people don’t know how it works and it is 
the responsibility of the developers to document their work. 

The second answer is for the trade press to acquire a bit more 
knowledge. Being able to use electronic mail, for example, should 
be a prerequisite to getting a piece published and certainly won't 
cause a writer to transform into a technogeek. 


0 


Wednesday morning, I sat outside my hotel and waited to be picked 
up by Pascal Renaud, head of the computer group at ORSTOM, a 
national research institution in France. 

ORSTOM’s mission is to work with researchers in developing 
countries. It is an unusual institution in that half of its permanent 
staff are outside France, scattered over 41 sites around the world. 

Twenty minutes late, early for Paris, a tiny car zipped up on the 
sidewalk outside of my hotel. Pascal jumped out and we intro- 
duced ourselves. As we darted through the streets of Paris, | 
handed him a copy of STACKS. He was pleased. 

He was so pleased, in fact, he commenced to leaf through the 
book as he drove. I had visions of my own book causing my death. 
While this sort of untimely morbid vision had certainly occurred to 
me before, I had always assumed I would meet my end at the hands 
of an OSF hit squad, not in a ten horsepower Renault. Of course, 
the OSF would use different tactics, probably boring me to death. 

As we passed the Louvre, Pascal finished my book and we 
started talking about ORSTOM. ORSTOM was founded right after 
World War II as a think tank devoted to the French colonies. While 
much of the research concerns questions such as agriculture and 
health, it is nonetheless not a development agency. It focuses in- 


111 


Exploring the Internet 


stead on basic research issues, such as how to stop the spread of 
diseases like malaria and sleeping sickness. 

Many of the ORSTOM research centers are located in former 
French colonies. For example, most of the 17 African centers are 
located in French West Africa, in countries like Niger and the Ivory 
Coast. A typical research center, such as the ones in Niamey, Niger, 
and Lomé, Benin, employs 50 people. Others, such as the center in 
Dakar, Senegal, employs 100 French and 200 African researchers. 
All told, the institute has a budget of FF 900 million (U.S. $150 mil- 
lion), employs 880 researchers and 720 support staff, and has offices 
in Africa, South America, Asia, and Oceania. 


So how do you provide computing support to such a group? In 
1985, Pascal Renaud was brought in to head the computer support 
group. At the time, resources consisted of a motley assortment of 
systems like an HP1000 and a Honeywell mini. 


“I tossed out everything,” Pascal said with a smile. “It was a bit 
of a fight, but I got rid of it all.” 


The basic applications needed for ORSTOM were typical of 
many scientific institutions, including statistical analysis, a bibliog- 
raphic database, and analysis of satellite images. There were, how- 
ever, two quite unusual requirements. First, with 41 locations all 
over the world, communication was vital. 


To make the communication issue even more important was the 
issue of support. Many ORSTOM sites were located in places with 
some of the world’s worst telecommunications. In addition, most 
sites didn’t have trained personnel. Setting up and maintaining 
equipment in such locations was a real challenge. 


After a bit of digging around, ORSTOM settled on Sun worksta- 
tions. Within France, the systems were hooked together using 
TCP/IP over X.25 and were part of the French Internet. 


Keeping links up 24 hours a day to Africa would not be practi- 
cal. Some countries turned off electricity at night. In addition, tar- 
iffs were high enough that a call to Paris 24 hours per day would be 
prohibitive. TCP/IP also had some problems in such an environ- 
ment. Running TCP/IP over a 2,400 bps link, the wizardry of Van 
Jacobson notwithstanding, just doesn’t work. 


112 


Paris 


The solution was UUCP. In some countries, such as Togo, X.25 
networks were available and were often much newer than the voice 
network. A SunLink board connected the workstation to Togopac at 
1,200 bps. An X.75 link hooked Togopac to the French Transpac. 
The UUCP F protocol ran on top of X.25 and calls were placed once 
or twice a day to transfer mail. 


The normal UUCP G protocol, designed for very bad lines, is 
highly resilient but also inefficient. The F protocol has one check- 
sum per file and is thus more appropriate for the relatively high- 
cost, high-quality X.25 links. 

Other places didn’t have X.25. In Ouagadougou, for example, 
ORSTOM simply placed a daily call to the Montpellier hub in 
France. The UUCP G protocol was used to transfer mail over the 
dialup link. 

This network was called RIO, which stood alternatively for 
Réseau Informatique de l‘ORSTOM or Réseau Intertropical d’Ordi- 
nateurs. Connectivity to the rest of the Internet was provided 
through a TCP/IP link into France’s FNET and UUCP links to 
EUnet. 


The service on the network (at least the UUCP portions) was 
simply e-mail. A pre- and post-processor for mail allowed accents 
to be included in 7-bit ASCII]. UUENCODE allowed transfer of PC 
and Macintosh binary files. 


When a new site was added to the network, Pascal Renaud and 
local researchers would host a conference. Conferences were typi- 
cally well attended and typically included government officials, PTT 
staff, any local non-governmental organizations (e.g., the UN), and 
university researchers. 

ORSTOM had a policy of allowing any of these people to use 
RIO. This open policy helped make ORSTOM part of the local com- 
munity and helped spread mail access to many new parts of the 
world. 

Invariably, Pascal relates, somebody at one of these conferences 
would want to know if they could access RIO from the PC in their 
office instead of walking over to the ORSTOM offices. As far as 
Renaud was concerned, he had no problem with remote access. 


113 


Exploring the Internet 


Unfortunately, placing a telephone call in many of these coun- 
tries can be a torturous experience. After Pascal would explain that 
remote access was possible, but would involve a modem and a call, 
most researchers would shrug their shoulders and say “thanks any- 
way, I'll walk in.” 


Supporting scientific computing in such a far-flung network is 
quite a challenge. Only a few sites had real computer support peo- 
ple. Dakar, for example, had one staffer to support the 15 Suns at 
that site. For other facilities, ORSTOM had an interesting support 
structure. 


In France, military service is compulsory. An alternative, how- 
ever is a system somewhat like the U.S. Peace Corps. ORSTOM, as 
a national laboratory, receives an annual quota of young engineers 
and puts them to work maintaining computers in far-away places. 


With several hundred users and an open-door policy, RIO is evi- 
dence that some of the most important work in the Internet commu- 
nity is done far on the periphery, removed even from the TCP/IP 
protocols that many use to define the core. 


At the core of the Internet, the issue is one of adding new classes 
of users, such as recent K-12 initiatives. RIO serves an equally vital, 
if not more important role of adding new countries to the global 
village. 

Leaving Pascal, I went to a café near my hotel and had a fine 
cassoulet of snails for lunch. There, over a half bottle of Beaujolais 
Villages, I pondered the immense difficulty of spreading the Internet 
into some of the places Renaud had to work. 


A few years ago, I travelled to a some of these sites: Niamey in 
Niger, Lomé in Benin, and Abidjan in the Ivory Coast. In the cities, 
such as Niamey, there is a passable infrastructure. Phones work 
much of the time and with a UPS, power regulators, and security 
guards you can keep a computer system going much of the day. In 
regional cities in Niger, however, things were much tougher. Yet, 
these regional cities have universities, international aid groups, hos- 
pitals, and research centers. 


Some would argue that high technology, such as computer net- 
works, are inappropriate in countries where per capita income is 


114 


Paris 


measured in the hundreds of dollars and the basic infrastructure, 
like roads, is crumbling. 

In such an environment, technology should be appropriately 
used, not avoided. Agricultural aid workers, for example, need to 
consult their colleagues overseas. Likewise, doctors should be able 
to work as part of a global community instead of being left alone in 
an isolated outpost. 

Voice communication over a telephone system is not an effective 
technology in these circumstances. International telephone calls 
take a very long time to place and are often terminated abruptly. 
Calls are expensive, and you never know if your party will be there. 
Voice calls are a point-to-point communications technique and do 
not allow appeals to large groups. 

It is precisely in these outlying areas that the Internet is most 
needed. Messages can be prepared at any time and then batched for 
transmission. In many countries, the X.25 networks are far superior 
(i.e., far newer) than their voice counterparts. 

Technologies like electronic mail are important in the developed 
countries by helping us do better research or provide better educa- 
tion to children. In countries like Niger, electronic mail can support 
education and research, but it can also do something much more 
important. It can help save lives. 


115 


Geneva 


Thursday morning, I got up early so I could reach the Gare de Lyon 
in time to take the 7:25 Train 4 Grande Vitesse (TGV) to Geneva. 
The TGV is the French high-speed train, taking only three hours to 
get to Geneva, compared to six hours on a normal train and four on 
a plane (by the time you get to and from airports). 

I soon found myself on the Rue de Mont Blanc in Geneva with 
plenty of time to spare before my long-awaited audience with Dr. 
Pekka Tarjanne, Secretary-General of the ITU. The purpose of my 
meeting was two-fold: to keep the standards server alive and lobby 
for further changes. This was the only day of the month he would 
be able to see me, hence the special visit. 

Calling on people like the Secretary-General is a funny kind of 
affair. You typically get only a few minutes, most of which is spent 
in pleasantries, and I don’t ever expect much to be decided. Yet, it 
is a vital step to take in an international bureaucracy like the ITU. 

First, I went up to the 12th floor to see Tony Rutkowski. While 
he finished sending out some mail messages, I wandered around his 
office looking at the stacks of paper lying all over the place. Occa- 
sionally, I would see multiple copies of some interesting report and 
grab a copy. 

Meanwhile, Tony had assembled his own stack of paper for me, 
including copies of the slickly produced “Friends of Bruno” news- 
letter. The newsletter was rife with references to the Digital Re- 
source Institute and “Project Leader Malamud.” This institute thing 
was certainly taking on a life of its own. Even worse, I had been 
stuck with a title. The only title I usually get is “Mister” (and even 
that is somewhat rarely employed). 

Finally, the time came for the meeting with Dr. Tarjanne. Tony 
ushered me up to the 14th floor. Now, I’ve been in some impressive 
offices before, but this one certainly took the cake. 

The secretary’s office and adjacent waiting rooms could easily 
have rented as a SF 15,000 (U.S. $10,000) per month apartment. The 
main office had a beautiful view of Lake Geneva and the Alps. It 


116 


Geneva 


was lined with Persian rugs and was big enough to fit all 400 atten- 
dees at an IETF meeting. 

Dr. Tarjanne came striding over from the other side of the office. 
While he walked over, I did mental calculations trying to figure out 
how many miles per day he must put in simply greeting visitors at 
each meeting. 


Dr. ‘Tarjanne was trained as a Finnish physicist. Active in poli- 
tics, he rose to become head of the liberal party in Finland. As a 
member of the coalition government, he secured the appointment as 
head of Telecom Finland, the Finnish PTT and he was able, through 
an adroit political sense, to parlay that into his position at the ITU. 

After reviewing the progress of Bruno and the 21 Sons of Bruno 
servers, we talked about the steps that would be needed to realize a 
truly global network that included developing countries and had a 
solid, well-managed infrastructure. Perhaps the ITU could play a 
role in helping that come about? 


Tony and I then paid a similar visit to the Deputy Secretary- 
General to brief him on our visit with the Secretary-General. Mr. 
Jipguep, a former high official in Cameroon and considered the 
dean of the African telecommunications community, appeared to 
support the Bruno experiment. 

Returning to Tony’s office, we discussed who I should meet and 
brief on my return visit back to the ITU the next week. I suggested 
to Tony that he call across the street and extend an offer to have me 
brief them on the “experiment.” 

He called Mike Smith, an Irishman who heads up the informa- 
tion systems area. Tony relayed my offer, and hung up. 

About five minutes later, Mike Smith called back. Tony listened 
for a minute and hung up the phone laughing. 

“Larry Eicher very much wants to talk to you,” he said, “I said 
you'd be delighted.” Eicher was Secretary-General of ISO. 1 
laughed and asked if I should bring my bulletproof tie. 

I left Tony to take care of an important personal matter. No visit 
to Switzerland is ever complete without a stop at the Mercure 
chocolate shop. Picking up a nice assortment of champagne truffles, 
bittersweet bars filled with 90-proof Cognac, and various other 


117 


Exploring the Internet 


forms of adult candy, I resisted the temptation to buy the 4.5 kilo- 
gram bar of Toblerone. 

With the chocolate safely mailed back to the U.S., I took the TGV 
back to Paris, arriving after midnight at my hotel in Montparnasse. 
I ordered a taxi for 6, set my alarm for 5, packed my things, and 
went to sleep. 


118 


Nice 


Friday morning, I took the first plane down to Nice to meet Chris- 
tian Huitema, the first European member of the Internet Activities 
Board. One parochial American had referred to him as the first 
“alien” on the IAB, but in my view that title had long since been 
taken by one of the American members. 

In Nice, I picked up my rental car and joined the morning grand 
prix doing at least double all posted speed limits. In Antibes, I took 
the turnoff for Sophia-Antipolis, the “French Silicon Valley.” So- 
phia-Antipolis was founded 20 years ago as a joint venture between 
nine local towns, a regional government, and the Nice chamber of 
commerce. The regional group, the Departement des Alpes-Mari- 
times, contributes over half the money. 


By 1991, the park had grown to over 700 firms, the majority in 
computers and communications. Air France keeps its central reser- 
vation system here, Digital keeps a major research center, and the 
EEC has the European Telecommunications Standards Institute 
MENS. 

Sophia-Antipolis is also the site of one of the major centers of 
the Institut National de la Recherche en Informatique et Automat- 
ique (INRIA), the premier French computer science research insti- 
tute and the home base of Christian Huitema. 


Travelling too fast, I zoomed out of a roundabout and didn’t see 
the INRIA sign. A few kilometers later, I saw a sign for INRA and 
turned in. The place was full of greenhouses. I had arrived at the 
Institut National de la Recherche Agronomique. Woops. 


After a few more diversions, I found INRIA. INRIA, like OR- 
STOM, is a national research institution. It specializes in computer 
science and numerical methods and employs 900 staff in 5 locations. 
Each location is organized into a series of research projects. 


At the Sophia-Antipolis site, there were a couple of dozen pro- 
jects employing a little over 300 staff members. Three projects were 
in robotics, including work for the European Space Agency’s Mars 


119 


Exploring the Internet 


mission. Occasionally, the robot would take a tour around the 
building to test its navigation skills. 

Christian headed a project in computer networks. When I fi- 
nally made it into his office, he was explaining his work to a young 
German who was considering starting a Ph.D. at a nearby university 
and working at INRIA to do his research. 

I spent the day with Christian, and by the end of the day I be- 
gan to see why he had been named to the JAB. At the age of 22, 
Christian had no definite career plans, so he became a consultant. 
He did quite well, but found he was always doing the same thing 
and got bored. 

He then joined the Centre National d’Etudes de Telecommunica- 
tions (CNET). By 1985, he had received the Doctorate d’Etat, 
roughly equivalent to an assistant professor at a U.S. university. His 
thesis, part of the NADIR project, dealt with transport protocols for 
satellite links. 

He had by then moved on to GIPSI, a French effort to build a 
workstation. CNET made the hardware, there was a port of UNIX, 
and the system even sported a graphical interface. 

As part of the team working on GIPSI, Christian concentrated on 
networking. He invented an NFS-like remote disk protocol that 
worked directly on Ethernet. He also designed a version of X.25 
that ran over Ethernet. 

This modified X.25 was implemented by removing HDLC, since 
802.3 already provided a satisfactory data link. Any transmission 
necessary was moved up into the link layer of X.25. The software 
even did call setup using an ARP-like mechanism. The calling sta- 
tion broadcast a call setup and the target station would respond. 

The result was an X.25 running at over 500 kbps, matching the 
performance of TCP on the test platform, a Motorola 68010. Not 
bad, to say the least. Christian, backed by the French PTT, brought 
this idea to the international standards table. This was his first, but 
certainly not his last, encounter with what he sardonically calls the 
“classical” standards process. 

The opposition camp, led by the English and the Germans, felt 
that if you did X.25, you should do so by the book. This meant that 
sending datagrams into the ether was out. Instead, they wanted the 


120 


Nice 


use of Logical Link Control class II, a connection-oriented version of 
Ethernet which has been widely standardized but rarely used. 

The whole thing degenerated into a religious stalemate. As with 
many talented people, this encounter with the standards world 
moved Christian more firmly into the TCP/IP camp. 

In 1986, Christian was brought on as an INRIA staff member. In 
an unusual move, INRIA immediately named him a project leader. 
One of the first projects in Christian’s group was an X.400 over X.25 
implementation. Christian’s work on X.400 led to other projects 
such as an X.400/SMTP gateway. That gateway is still up and run- 
ning at INRIA and is used by several groups. SWITCH, the Swiss 
Research Network, used a leased line to INRIA to link their X.400 
services to the Internet SMTP base for several months. Over time, 
that mail link migrated into a 64 kbps IP line from SWITCH to IN- 
RIA. 

Related to the X.400 project was an X.500 project called The Ob- 
viously Required Name Server (THORN), run under the auspices of 
the European Community Esprit project. THORN led to a DSA im- 
plementation called Pizarro. Naming it after the Spanish conqueror 
was a takeoff on the UCL’s Quipu, an Incan name. 

Working on all these OSI-based systems gave Christian’s group 
considerable experience in coding the OSI middle layers. One out- 
growth of that experience was an ASN.1 compiler. 

ASN.1 is a very powerful, very general specification for the 
presentation layer in OSI. The problem is that most people write 
programs in C, not ASN.1. 

When an application receives data from an OSI network, as in 
the case of an incoming X.400 message, that message is encoded in 
ASN.1. An ASN.1 compiler starts with the ASN.1 specification for a 
message and generates the encoding and decoding routines that al- 
low an application to interact with the network. 

The INRIA compiler, known as MAVROS, was a fully general 
system, accepting any ASN.1 specification. It also handled variants 
of ASN.1, such as the X.509 standard used for digital signatures. It 
supported a lightweight version of the presentation layer, quite use- 
ful when similar machines send lots of integers and floating point 
numbers back and forth. 


121 


Exploring the Internet 


An outgrowth of the compiler effort was an ASN.1 benchmark. 
To test the compiler, and to compare ASN.1 to other presentation 
paradigms such as the Sun XDR specification, the benchmark pro- 
vides a basis for measuring performance. 

Christian’s group started by examining a typical X.400 message. 
Based on that message, a tree was developed with a depth of 8 and 
a total of 400 ASN.1 elements. As per the typical X.400 message, 80 
percent of the elements were octet strings, 10 percent strings, and 10 
percent integers. 

Next, they started comparing the code generated by the ASN.1 
compiler with basic lightweight methods. They looked at the 
amount of time to encode and decode data as well as the amount of 
data transferred on the network. 

Needless to say, the initial performance was slow. The results 
from the benchmark were used to start optimizing the compiler. For 
example, decoding is slow in ASN.1 because of the tag, length, and 
value encoding for each element. In a technique similar to Van Ja- 
cobson’s TCP work, the ASN.1 routines began using header predic- 
tion techniques. If the next tag can be predicted from the current 
context, header prediction can greatly speed up decoding. 

Running the ISO layers over TCP/IP and FDDI on two DEC 
5000s, the INRIA group was able to achieve presentation layer 
throughput of 8 Mbps. By contrast, TCP throughput on the same 
configuration was 17 Mbps, UDP 25 Mbps. The bottleneck in all 
three cases appeared to be the CPU. 

In addition to his research efforts, Christian has been active in 
helping to link the French infrastructure to the Internet. As with 
many international connections, this one can be traced back to the 
ubiquitous Larry Landweber. Christian was invited to attend one of 
Landweber’s networking conferences, this one hosted by Dennis 
Jennings in Dublin in December 1986. 

Larry and Christian started talking and decided that INRIA 
should be linked to the Internet. Larry went to NSF, Christian to 
INRIA and each got half the link funded. Before the link was up, 
UUCP mail to the U.S. could take anywhere from hours to days. 
With an initial link speed of 56 kbps, mail started taking just min- 
utes, or less. The INRIA link to the. U.S. gave Christian more in- 


122 


Nice 


volvement with the Internet community and led to his appointment 
to the IAB. 

I had a wonderful meal of foie gras and veal, hoping there were 
no animal rights activists lurking outside. To drink, we had a nice 
Bordeaux followed by an even better Beaujolais. One thing I’ve no- 
ticed is that one of the qualifications for membership on the IAB 
seems to be a exquisite taste in wines (many of which come with 
exquisite prices). IAB members such as Stephen Kent, Vinton Cerf, 
Lyman Chapin, Dan Lynch, and Christian Huitema are all renowned 
in the Internet community for their technical abilities in this area. 

Saturday morning, I retrieved my car and drove along the coast 
of the Mediterranean back to the Nice airport. Arriving back at 
Hertz 26 hours after I had picked up my keys, I was handed an 
invoice for U.S. $300. 

“Thank you very much,” I said, picking up my bags and head- 
ing towards the terminal. You know you've been travelling too long 
when a U.S. $300 bill for one day in a Renault “Junior” seems ac- 
ceptable, even if only momentarily. 

By the time I got to the terminal, my currency conversion proc- 
ess got swapped into memory and I promptly turned around and 
walked back to Hertz. Using a few choice words remembered from 
my high school days in Switzerland, along with some universally 
understood hand gestures, I convinced the station chief that I felt 
that a fee of $300 was not totally appropriate. Through some hard 
negotiating, I got the rate down to U.S. $125. What a bargain. 


123 


Geneva 


Sunday night, I took the TGV back to Geneva. Feeling refreshed 
after a day in the south of France and a weekend in Paris, I was. 
ready to sink into the bureaucratic abyss of Geneva. 

Sink I did. I spent the next three days battling the ITU bureauc- 
racy, trying to stop a rear guard action that was threatening to kill 
the Bruno project. 

In four weeks, the Bruno server had been a remarkable success. 
Twenty-one servers on four continents had cloned the file system 
and were distributing the Blue Book. Bruno was getting as many as 
35 packets per second. Over 500 hosts in 27 countries had retrieved 
over 65,000 files. We had no statistics from the other servers, but it 
was not unreasonable to think that several hundred thousand files 
of the Blue Book had made their way out to people who were actu- 
ally reading them. 

How did this compare with paper copies? This was hard to say, 
as profits from documents had served as a sort of discretionary fund 
for the previous Secretary-General of the ITU. Knowledge of publi- 
cations was highly dispersed; only finance seemed to have sales 
data, and they kept this information closely guarded. 

Nonetheless, it appeared that the Bruno experiment had in- 
creased the distribution of the Blue Book by at least one order of 
magnitude, and probably two or more. Tony had documented all 
this in his “Friends of Bruno” newsletter and had papered the 
[TU—paper being the only medium that appeared to work there. 

Yet, despite all this, the high-level Information Systems Steering 
Group had met the previous Friday to decide the future of Bruno. 
Rumor had it that the outcome of the policy group was that the 
experiment had not been successful and was over. 

Stopping the experiment was, of course, not an option. The 
server was in Colorado in a locked room and I had no intention of 
stopping operation. Besides, twenty-one other servers had the data. 
Tony and I had carefully structured this project so there would be 
no turning back. 


124 


Geneva 


There were, however, some important factors at stake. I had 
hoped to begin putting other ITU documents on the servers. A pol- 
icy decision that the experiment was over would mean that we 
might have to bypass the ITU and start scanning paper copies. 

More importantly was the role of the ITU in dissemination of 
standards over the network. The logical outcome of the Bruno ex- 
periment was to have the ITU put itself on the Internet and take 
over this function. 

Tony had set me up for three days packed with meetings. Many 
of these people were division directors or other Very Important Bu- 
reaucrats (VIBs) who sat on the Information Systems Steering 
Group. 

One meeting, in particular, stood out over all the rest. I was 
scheduled to meet with Walter Richter, director of something impor- 
tant. He was 45 minutes late, so I spent the time looking at the 
stacks of file folders on his secretary’s wall-to-wall bookcase. 

They had wonderful labels such as “The Preparatory Committee 
on Restructuring of Subsidiary Machinery” or “The Administrative 
Committee on Coordination.” One was simply labeled “High Level 
Committee” and took up several folders high up on the top shelf. 
The committee that seemed to take the most wall space was the 
“Consultative Committee on Substantive Questions.” 

Finally, Richter strode in. Speaking with a heavy Austrian ac- 
cent, he preceded to tell me how my experiment “was not a success 
and has been terminated.” 

He seemed very certain that the experiment had not been a suc- 
cess, so I asked why. It appeared that this Internet of mine (the ITU 
considered the Internet to be some private project run by Tony 
Rutkowski and myself) just didn’t reach the right sort of people. By 
the right people, he seemed to mean those who were on the Admin- 
istrative Council of the ITU or those that worked on the consultative 
committees like the CCITT or the CCIR. 

The conclusion that the Internet had the wrong sort of people 
was Odd, since I had not analyzed the data on who was accessing 
my server. In fact, anecdotal evidence was pointing to just the op- 
posite conclusion. I had received personal messages from places 
like AT&T, Bell Labs, and Telecom Finland. 


125 


Exploring the Internet 


I found out later how Richter came to this view. Richter had a 
buddy on the radio side of the ITU, the CCIR. His buddy had a pal 
in Canada to whom he had spoken. 

“Ever hear of this Bruno thing?” 

“Nope.” 

“Ever hear of this Internet business?” 

“Yeah, but we checked it out a few years ago and it was too 
expensive.” 

Well, there you go. Can’t argue with a few personal anecdotes 
when making a high-level policy decision. I tried trotting out a few 
of my own anecdotes, but Richter had already assembled the data 
he needed. 

Richter had something in common with most of the other VIBs 
that I met in three days at the ITU. He was very, very sure of him- 
self. For example, he was absolutely convinced that the entire ITU 
network architecture was fatally flawed. 

I must confess, this was certainly my working assumption when 
starting to deal with the ITU computer group, but the reality turned 
out to be that they had a fairly decent network architecture in place. 
Not what I would have chosen, but adequate for the job. 

I asked Richter to tell me what was wrong. 

“The Ethernet,” he replied. When his PC had first been in- 
stalled, it was a diskless machine. A mistake, of course, but it had 
been fixed. He was convinced that all ITU network problems had at 
their root Ethernet saturation, because it had once taken several 
hours after pressing a key to see the character appear on his screen. 

Based on this anecdote, he was ready to completely microman- 
age some fairly talented engineers that worked at the ITU computer 
department. Rather than set broad policy (an area that had been 
sorely lacking), he was convinced that the answer was to roll up his 
sleeves and dig into the bits and bytes. 

Another curious aspect of the three days of meetings was this 
idea of the Internet as some academic toy that real people didn’t 
use. I met with one staff member who expressed this view and 
waved a piece of paper at me that had the names of delegates he 
was working with as proof. 


126 


Geneva 


I picked up the piece of paper and started going through the list. 
Many of the places, such as the Centre National des Etudes de Tele- 
communications in Paris, were clearly on the Internet. In fact, the 
vast majority of institutions on the list appeared to be connected in 
one form or another. 

There was another more fundamental issue that started to focus 
and helped explain this reluctance among the VIBs. Printing docu- 
ments was a big empire at the ITU, and building empires was the 
name of game. My project was not a good way to build big empires 
(efficiency never is). 

The printing department at the ITU was truly an impressive 
place. I walked past the “keep out” signs and gave myself a private 
tour. There were seven offset presses, four state-of-the-art, top-of- 
the-line Xerox 5090 copiers, and a dozen or so other large copiers. 
The ITU’s own facility generated only a fraction of the total output. 
Swiss printers had a long and cozy relationship with the ITU bu- 
reaucracy. 

Things would be printed with no relationship to demand under 
the assumption that larger print runs meant a lower per-unit cost. 
True, of course, but if you throw away most of the units, your aver- 
age costs can be considerable. 

One of my underground sources gave me an example. For sev- 
eral years, the ITU had produced a beautiful four-color “charts in 
profile” document. Each time, 10,000 copies would be printed at a 
cost of several hundred thousand dollars. 

Of this print run, 2,000 copies would be given away and roughly 
100 sold. Yet, every few years, a new edition would be put together 
and 10,000 new copies would be printed. Strolling around base- 
ments and subbasements, I saw enough paper to start a firestorm. 
Pallet after pallet was loaded with boxes and boxes of documents 
that nobody would read. 

This being the decade of the environment (or was it the chil- 
dren?), I naively asked about the ITU recycling program. Needless 
to say, one didn’t exist. 

The Bruno experiment directly threatened this paper empire. 
The bureaucracy had framed its argument very cleverly. Every year, 
the ITU had received several million Swiss Francs in revenue from 


127 


Exploring the Internet 


selling documents. The official “profit” from the Blue Book had 
gone to fund programs in the developing world. 

In other words, Bruno was depriving the ITU of revenues that 
would fund vital infrastructure. My selfish little project meant that 
people who needed to call a doctor wouldn’t be able to. Project 
Bruno, baby killer. 


Nobody actually accused me explicitly of killing babies, but I 
certainly felt that undercurrent. After donating several months and 
several thousand dollars to putting ITU standards online, I had 
somehow not expected this type of reaction. 


The donation was the single most difficult concept for the VIBs 
to understand. Why was I doing this? What was my motive? 
What was in it for me? 


Of course, donations to the common infrastructure are how the 
Internet was built. Even formal standards bodies like the ITU run 
on donations. Corporations work in the standards process as a vol- 
unteer effort. 


In the Internet community, volunteer efforts are the norm. The 
IETF has many people who attend as private citizens, paying for the 
privilege three times per year out of their own pockets. Paying for 
the privilege of getting the Blue Book online was not remarkable, 
but VIBs didn’t know what to make of it. 


The “Bruno, baby killer” aspect was a difficult one. Profits from 
document sales were virtual at best, and the simplest solution 
would be to redo the accounting system to look at the total costs of 
the inefficient document production process, but that proved to be 
dangerous. 


I thus attacked the widespread unease with giving away copies 
on the Internet. Tony was advancing the novel theory that by giv- 
ing copies away, you increased the market and thus increased sales. 
Such an argument, although bearing a few logical flaws, seemed to 
stop the VIBs, at least for a few minutes. 

While the ITU was criticizing the Bruno experiment, they were 
attempting to move forward on their own electronic document han- 
dling system. Evidently, the Bruno situation had impressed the Sec- 
retary-General enough that he had presented himself at the meeting 


128 


Geneva 


of the Information Systems Steering Group and suggested that they 
should do something. 

The committee had thus spawned a task force. The task force 
had formed a small working group. Their initial inclination was to 
start using X.400 as a way to send out working documents, but only 
to members of the committees. 

Tony and I tried valiantly to switch the focus to getting the ITU 
on the Internet and sending the documents out to as wide an audi- 
ence as possible. This was not meeting with much success. The 
computer department was worried about the resource implications 
of such a move and wanted two additional staff members (in addi- 
tion to their current network staff) to support the effort. 

Basically, the bureaucracy desperately wanted to get back to a 
world they could control. In order to control documents, however, 
you need to own them. Nobody at the ITU wanted to admit that 
there was a possibility that the ITU didn’t own its own documents. 

Tony Rutkowski had made an analysis of the issue of copyright 
and had come to the conclusion that the ITU didn’t have a sustain- 
able basis for asserting copyright protection. Many of the other 
VIBs, however, felt that the issue was cut and dried. 

There are no apparent legal cases in which somebody has chal- 
lenged copyright on a standards document. There are many factors 
that must be weighed before a court will uphold a copyright claim, 
and it was naive to think that the issues are so simple that the ITU 
could confidently claim they would win in a court of law. 

In order for a document to have a copyright applied to it, it 
must, among other criteria, be original and not previously publish- 
ed. Since almost all standards start out as public domain working 
documents, even this fundamental requirement is not often met. 

Many jurisdictions do not allow protection to be granted on offi- 
cial or governmental works. Even a private standards body might 
be considered by the courts to be quasi-governmental. Many places, 
such as the U.S., make standards a procurement requirement, mak- 
ing copyright enforcement questionable at best. 

Even if standards are copyrightable, only the representation of 
the standard, not the contents, can be protected. Tony’s conclusion 
was that in almost any jurisdiction, running the paper through a 


129 


Exploring the Internet 


scanner and OCR software and posting ASCII text would be defen- 
sible. 

Many standards do have graphics, of course. The graphics have 
a stronger basis for copyright, since the representation is everything. 
As we had seen with the Blue Book, though, in many cases the 
graphics were not absolutely essential, at least for getting a rudi- 
mentary understanding of the standard. 

With these factors in mind, Tony and I walked across the street 
to meet Larry Eicher, Secretary-General of ISO. My feeling was that 
even if there was no copyright on standards, it was certainly easier 
to work with ISO than against them. 

The fact that Tony accompanied me was meant to send the mes- 
sage that my efforts enjoyed at least some support from the ITU. I 
brought along a copy of STACKS; Tony brought the slides from his 
presentation to INTEROP in which he concluded that it was un- 
likely that any standards organization could assert copyright on 
documents. 

“Do you think that’s diplomatic?” I asked. 

“Nothing wrong with pushing forward the state of the art,” he 
said with a smile. 

We met Eicher and Mike Smith, one of the leaders of the task 
force which supports the OSI effort. Both turned out to be very rea- 
sonable people. 

I gave a little speech about the moral necessity of disseminating 
standards. I advanced the view that the reason that OSI had taken 
so long to come to market was simply because it cost so much to 
find out about it. 

We then started talking about applying Bruno to the ISO world. 
Eicher was quite frank: 25 percent of ISO revenues came from the 
sales of standards documents. How did I propose to replace that 
revenue? Even more importantly, ISO was controlled by its member 
organizations, which also made much money from standards sales. 
How did I propose to convince groups like ANSI that posting stand- 
ards for free would help them? 

Simply put, it was a question of financial survival. Interestingly 
enough, Eicher was clearly unwilling to argue his case on copyright 
grounds. When I ventured the theory that copyright protection for 


130 


Geneva 


ISO documents was legally weak and that some radical might just 
go ahead and post the standards, Eicher said “it’s not a question of 
copyright protection, it’s a question of fair business practices.” 

We began searching for a potential solution. I proposed my 
high resolution/low resolution compromise. The plan would post 
low resolution versions of documents for free on the network and 
allow ISO and ANSI to continue to sell the high resolution versions, 
either on paper or electronically. 


Low resolution might mean ASCII text and 200 DPI bitmaps of 
graphics, formulas, and other elements not well suited to repre- 
sentation as ASCII text. Some document format such as ODA could 
be used to tie the pieces together. Using ODA would help ISO by 
spurring the development of the standard by giving people a sub- 
stantial base of documents worth reading. 


The crucial assumption was that people with the free version 
would then pay for documents. I argued that free distribution of 
standards would increase the base of people who read documents 
by at least a factor of 10, maybe even more. Many of these would 
want the paper documents. Giving away standards would lead to 
increased revenues. 


I then offered to test this theory on Bruno at no cost to ISO. 
Eicher agreed to at least consider a formal proposal, so we went 
back to the ITU and dashed off a formal letter. Kind of a long shot, 
I figured, but certainly a first step. (I never received a response to 
my letter, but that was no suprise. I did, however, publish the offer 
in Communications Week just in case ISO had misplaced my letter 
and needed a reminder.) 


Tony and I had one more item of business to attend to. A semi- 
nar had been scheduled for Monday morning to give people at the 
ITU a briefing on Bruno. Tony had sent electronic mail on Friday, 
but by Monday, none of the mail had arrived and therefore nobody 
showed up at my lecture. 


Turned out that the entire ITU mail system was running off a 
VAXmate with a very limited amount of memory. If you sent mail 
to everybody at the ITU (only a few hundred people), the system 
crashed. 


131 


Exploring the Internet 


Rather than remove the offending mailing list or even move the 
message handling system up to an appropriate host, the issue of the 
“mail server situation” had entered the bureaucracy and a heated 
debate had begun, focusing on whether or not to expand memory 
on the VAXmate. I was a bit incredulous. Running a mail system 
for 900 professional bureaucrats off a VAXmate is kind of like using 
a Volkswagen Beetle to haul timber out of the Amazon jungle. 

We rescheduled the seminar, booking Tarjanne’s personal confer- 
ence room for the occasion. The secretaries were worried that the 
room would be too small (it could only hold 50 people or so), but 
Tony and I insisted that the venue had the appropriate symbolism 
and that having to turn away people wouldn't be all bad. 

Since electronic mail wasn’t going to do the trick, we had only 
one alternative: ElevatorNET. Posting notices in the elevators was 
about the only effective means of communication at the ITU, the 
organization that invented X.400. 

The ITU has some of the strangest elevator manners in the 
world. When you enter a lift, custom requires you to greet every- 
one. Everybody then choruses back a hearty “bon jour.” 

When you leave, you say goodbye and everyone responds with 
their own “au revoir.” Nice custom, but what it means is that dur- 
ing a busy period, it can cost you a dozen hellos and goodbyes to go 
up just a few floors. 

Tony and I pushed the button for the elevator and caught the 
first one, respecting the elevator protocol. Every time we caught an 
elevator, we rode a few floors, long enough to post the notice. We 
then got off, pushed the button again, and hoped that a different 
elevator would start. Finally, dozens of bon jours later, we had 
caught the last elevator and posted the last notice. 

Wednesday morning, Tony had prepared all sorts of handouts 
for the eager crowds. I nervously sat in the corner and prepared my 
talk. 

Two people came. One was our ally in the computer depart- 
ment, another a gentleman I had already briefed. Nobody else both- 
ered to show up. 

We all chatted for a few minutes, had a cup of coffee, then went 
back to Tony’s office. I bid Tony goodbye. 


132 


Geneva 


Thursday, I took a series of four flights from Paris to London to 
New York to Ithaca, home of Cornell University. Sitting on the 
planes, I had plenty of time to reflect in wonder at the ITU. Many 
people were grateful that Tony Rutkowski had put the time into the 
bureaucracy, but you had to wonder how somebody that talented 
could survive in such a labyrinth. (He didn’t for very long. Tony is 
now an employee of Sprint International and Vice President of the 
Internet Society.) 


133 


Ithaca 


Thursday night, I arrived at New York’s Kennedy Airport and took 
a commuter flight to Ithaca. USAir decided that 15 cities with no 
luggage lost was tempting the fates and obliged me by sending my 
bags to Syracuse. My request for extra frequent flier miles, based on 
the route my bags took, was greeted with a blank stare. 

While negotiating with the lost luggage functionary, H. David 
Lambert, my host in Ithaca, arrived to pick me up. He smiled 
knowingly when he saw that I was looking for my bags. Evidently, 
USAir uses some stochastic routing algorithm for luggage in upper 
New York state. 


Dave brought me to his house, with a stop en route for massive 
quantities of Chinese take-out. There, David, his wife Carol, and I 
caught up on old times. 


Dave Lambert operates on the front lines of computing: he man- 
ages academic computing centers. I got to know him when I was a 
graduate student at Indiana University and Dave was Assistant Di- 
rector of the Academic Computing Services. 


In those days, Academic Computing meant a CDC 6000, punch 
cards, and two terminals for the entire campus. My first word proc- 
essor was on that machine. We would use punch cards and a home- 
grown text formatter written in FORTRAN to input our formatting 
directives, with the results sent to a line printer. 


Dave brought me into the student consulting pools, rescuing me 
from yet another semester teaching a required class in economics to 
drooling undergraduates. My job was to sit in a cubicle and answer 
any and all questions. In the summer, I continued to do my consult- 
ing, but we had only a few students and most of them spent their 
time at the abandoned quarries swimming. 

We did, however, have 6 VAX 11/780s that had just been deliv- 
ered. My consulting cubicle was a designated receptacle for one of 
the sets of documentation, which filled up most of a wall. Having 
nothing else to do, I started at one end of the wall and read manu- 


134 


Ithaca 


als. It was then that I learned the key to a successful consulting 
practice was to Read The FMS Manual (RTFM). 

Under Dave's leadership, the Indiana University network grew 
from a few hundred to several tens of thousands of active users. He 
introduced a wide variety of programs that dramatically changed 
how computers were used on campus. An example was the so- 
called MBA Experiment. 

The word “experiment” is a way of labelling some project to get 
over strenuous objections from people opposed to anything new 
(hence the use of the word “experiment” at the ITU). The experi- 
ment gave permanent accounts to all MBA students, instead of dol- 
ing out resources as part of some specific class, as had been the case 
previously. 

A single, over-worked VAX was loaded up with 1,200 students, 
along with tools to do e-mail, financial modelling, and even access 
external data sources such as the Dow Jones News Service. Non- 
credit seminars were held to familiarize students with the tools, and 
a consulting cubicle and terminal room were put into the business 
school. 

The project met strong resistance from two places. First, the sys- 
tems group in the computing center were aghast at this wild, uncon- 
trolled use of resources. What if everybody started using the system 
at once? One system manager actually went so far as to say putting 
users onto the system would make it run inefficiently. 

The second source of opposition was the business school faculty, 
who felt all this new-fangled nonsense would take away from a seri- 
ous academic atmosphere. Behind the scenes, of course, was the 
unspoken fact that if the students learned the tools, the faculty 
would have to also. 

Despite these objections, the experiment started up. The results 
were dramatic. Students started using sophisticated modelling tools 
to solve case studies, forcing the professors to learn the same tools 
in order to grade the assignments. Electronic mail became such a 
part of the culture that one professor even gave his exams by mail. 

Eventually, the entire nature of the MBA Program changed. The 
obligatory Fortran class was dropped in favor of a computer skills 
seminar emphasizing tools like e-mail and Lotus. Many other 


135 


Exploring the Internet 


classes in the curriculum were radically changed. Students left the 
program computer literate, with a noticeable change in placement 
SUCCESS. 

The MBA Experiment was one of dozens of projects that Dave 
Lambert started, usually over the strenuous objections of one or 
more factions. He helped wire dormitories, develop educational 
software in fields like English, obtain cheap PCs for students, and 
hooked the campus to the Internet. 

What Dave started, Carol Lambert had to help finish. Carol spe- 
cializes in setting up support structures for computing services. At 
Indiana University, this originally meant writing the reports on how 
to use the CDC mainframe. This matured over time to a highly 
trained, highly service-oriented operation, providing everything 
from a help desk (with people who had answers) to a problem 
tracking and escalation system, extensive user documentation and 
classes, and standardized procedures for obtaining resources. 

The computing service that Dave and Carol helped build was so 
successful that it won the first INTEROP Achievement Award for 
excellence in education. By then, Dave and Carol had moved on to 
Ithaca, where they were part of a team trying to expand and de- 
velop the Cornell campus network. 

Cornell is the largest Ivy League school, with a population of 
17,000 undergraduates. It is also one of the key Internet hubs. The 
Cornell Theory Center was one of the original NSF supercomputer 
centers. Cornell is also the site of the Network Operations Center, 
supporting Sprint's role as international connection manager for the 
NSFNET. Cornell monitors international links to NORDUnet and 
INRIA in France and is part of both the T1 and T3 backbones. 

Cornell is also one of the key sites in the Internet for work on 
routing protocols. In fact, the campus network is run over routers 
developed at Cornell and running on a PC/AT. These multiprotocol 
routers support, along with many other networks, over 284 separate 
AppleTalk networks. The Cornell routers are managed by a set of 
bootservers. When new software is developed, Trivial FIP is used 
to send the new boot images down to over 100 routers. 

Some of the more interesting routing work at Cornell was done 
by the team of Scott Brim and Jeff Honig. Scott, quiet by nature, is a 


136 


Ithaca 


bit of an anomaly in the raucous world of routing. Meetings about 
routing protocols at places like the IETF tend to be full of histrionics 
and hysterics, routing being the original religious issue in the In- 
ternet, but Scott talks in a whisper. 

Scott and Jeff are the developers of the Gateway Daemon (gated), 
a widely available piece of routing software for UNIX and other op- 
erating systems. The gated software has its origins in the period 
when regional networks started coming into being and hooking 
themselves up to the NSFNET. 


TCP/IP has two kinds of routing protocols. Interior protocols 
are used to communicate reachability information within a routing 
domain. On UNIX systems, the Routing Information Protocol (RIP) 
was the quintessential interior protocol and was implemented in a 
software module called the Route Daemon (routed). 


Reachability between routing domains, as in the case of a re- 
gional announcing its networks to the backbone NSFNET, uses a 
protocol such as the Exterior Gateway Protocol (EGP), or its more 
modern successor, the Border Gateway Protocol (BGP). 


In the early days, both routed and EGP received reachability in- 
formation. Each would take that information and update a master 
routing table in the UNIX kernel. As long as each routing protocol 
handles a separate set of target networks, having two modules up- 
date a single routing table sort of works. 


What started happening, however, was that a target network 
might be reachable through two different routes. Information about 
one might arrive via RIP, the other via EGP. The update by one 
protocol would be walked all over by the other. 


The gated software took the two separate modules and put them 
into a single daemon, allowing coordinated updates to the routing 
table in the kernel. Over time, gated was revised to make it very 
modular, allowing new routing protocols to be quickly added. 


The gated software has become one of the standard platforms for 
prototyping new routing protocols. Current gated modules include 
the OSI IS-IS and its TCP/IP cousin OSPF, the Border Gateway Pro- 
tocol (BGP), the old RIP-like Hello protocol, and the policy routing 
twins, IDPR and IDRP. 


137 


Exploring the Internet 


An interesting aspect of gated is the way it is distributed. Cor- 
nell maintains the reference implementation, which people can 
download from anyplace in the Internet. This makes it perfect for 
small organizations that have a UNIX box and want to connect to 
the Internet. 

Vendors that incorporate gated in their products sign a redistri- 
bution agreement. This agreement requires the vendor to feed any 
enhancements to gated back into the reference implementation, mak- 
ing any improvements available to the entire community. 


0 


Next, I met Steve Worona, who escorted me through the gorges of 
Ithaca to find some lunch while he told me about CUINFO. In the 
world of Cornell, replete with supercomputers, optical disk juke 
boxes, and other paraphernalia of high technology, CUINFO is cer- 
tainly one of more impressive services on campus. 

CUINFO is a low-tech information service. It started nine years 
ago when Steve was an IBM systems programmer working on spe- 
cial projects for the academic computing group. He noticed that 
there were exam schedules and class rosters available online to ad- 
ministrators. 

Why not make this information available to students? He wrote 
a program and put a terminal in the lobby of the administration 
building and CUINFO was born. 

Pretty soon, somebody suggested they put up the daily head- 
lines from the campus paper. Sounded good, so that was added. 
Pretty soon, the information on the system started growing expo- 
nentially. 

Perhaps the best known service is “Dear Uncle Ezra,” started by 
Worona and Jerry Feist, the head of counseling services at Cornell. 
Uncle Ezra is a Dear Abby-like service named after Ezra Cornell, the 
founder of the school. It provides a way for students to ask ques- 
tions, anonymously if they wish, of counselors. : 

Answers to questions are usually posted in a bulletin board for- 
mat, allowing everyone to benefit. Individual responses are often 
sent directly to the student for more serious inquiries. 


138 


Ithaca 


Questions range from the very serious, such as suicide counsel- 
ing, to the inane. My favorite question, of course, is on the inane 
side of the spectrum: ‘Dear Uncle Ezra, I always wonder why Carl 
Sagan is so famous. I mean he doesn’t have any personality and he 
speaks funny.” 

Contrary to the well-written, precise, to-the-point answers usu- 
ally provided by counseling services, this one got a fairly evasive, 
noncommittal response. 

Uncle Ezra has spawned a host of other answer-line services. 
The Career Services group started Auntie Em, Mr. Chips handles 
issues related to instruction, and NutriQuest provides information 
on nutrition and food. 

All of these services run on an IBM using the VM operating sys- 
tem. TCP/IP support on the IBM extends the services to the cam- 
pus network and out to the rest of the Internet. Users can access the 
service by using Telnet to CUINFO.cornell.edu, specifying that port 
300 should be used instead of the default Telnet port. 

CUINFO has grown to the point where it receives over 100,000 
accesses per month. It contains information on local restaurants and 
a wide variety of the other types of information you might expect 
from a high-tech videotex service. It proves that if you give people 
very simple tools to publish information and a bit of support, a 
videotex system can be quite successful at very low cost. 


0 


That night, Dave and Carol Lambert and I started swapping user 
services horror stories. We started with the simple ones, like the 
IBM staffer who couldn’t figure out how to get the command 
prompt on his Macintosh. Carol brought out the old war horse of 
the PC user who transformed a 5.25-inch disk in to a 3.5-inch disk 
using scissors so it would fit into the slot. 

Finally, Dave trotted out the ultimate user story, attributed to 
Ken King, former Vice Provost at Cornell and then President of 
EDUCOM. 

Ken King was sitting in his office at Cornell one day when he 
got a call from the machine room. There was a crazy man down 


139 


Exploring the Internet 


there waving a knife around and threatening operators. Some For- 
tran bug or something. 

King promptly called security then went sprinting down the hall 
towards the machine room. Halfway down the hall, his secretary 
shouted after him that he had an important call. Thinking it might 
be security, he raced back to take the call. 

It wasn’t security. It was an irate user who proceeded to yam- 
mer on about some problem with the service he was getting. Ken 
tried to cut in and finally succeeded. 

“I'm sorry, but I have to run. There’s a crazy man in the ma- 
chine room waving a knife around,” he explained. 

“Oh,” the user replied, “but this will just take a minute.” 


140 


Monday morning, my publisher Paul Becker got up at an ungodly 
hour to pick me up at 7 AM. and bring me to breakfast. One of the 
secrets to supporting yourself as a writer is to get your publisher to 
buy you as many meals as possible, although with Prentice Hall this 
is certainly no guarantee of fine dining. 

Paul drove me up towards Harlem, near my first appointment at 
Columbia University. We found a cheap diner and I had my first 
American breakfast in weeks, greasy eggs and limp bacon. 

I grabbed my bags and carried them across the street to the 
Seeley W. Mudd building, home of Columbia’s Center for Telecom- 
munications Research (CTR). CTR is one of six NSF-sponsored En- 
gineering Research Centers and specializes in optical networks. 


The main CTR project is called Acorn or Terabit, depending on 
whom you ask. The Terabit name aptly summarizes the goal of the 
project, to develop a scalable optical network providing gigabits to 
the user and terabits of aggregate bandwidth by exploiting the full 
capacity of optical fiber. 

I rode up to the 12th floor of the Mudd building, thinking what 
a silly ring the name had, and reminding myself never to allow a 
building to be named after me. Not that the subject has come up 
frequently. 

Since I was early, I went into the office of W. Clayton Andrews 
to wait for him, resisting the temptation to walk over to the work- 
station and Telnet to Boulder to read my mail. A few minutes later, 
Clayton Andrews came in. 

A distinguished-looking professor, Andrews was formerly direc- 
tor of an important IBM laboratory in Switzerland. He had joined 
CTR as an associate director, working alongside such optical lumi- 
naries as founder Mischa Schwartz and the current director, An- 
thony Acampora. 

Acorn had been successfully deployed in the laboratory when I 
visited, and Andrews and others were making plans for further de- 


141 


Exploring the Internet 


ployment into the real world. They were pursuing two different 
sites to test the hardware and software. 

One would use the dark fiber that Teleport had deployed in 
lower Manhattan. The other use was on the Columbia campus net- 
work, which was getting ready to lay multimode fiber around cam- 
pus. CTR was trying to get some single-mode fiber pulled at the 
same time, because of the minuscule marginal cost. 

Acorn is based on the linear lightwave network (LLN) concept 
developed by Thomas Stern, another Columbia professor. The LLN 
uses different wavelengths of the fiber for different signals. By com- 
bining wavelength multiplexing with a star-like topology, circuits 
can be set up between different nodes on the LLN. 

The architecture is scalable, allowing stars of stars to be built, 
potentially supporting a network of a million or more nodes. Cir- 
cuit establishment is provided by electro-optical filters located 
throughout the LLN which establish a path from a source to the 
destination. 

Networks that actually do something are certainly more useful 
than those that run test patterns, so Acorn is pursuing a half-dozen 
test applications to help shake out the network. At the edge of the 
LLN network is a Network Interface Unit (NIU). The NIU links up 
to the user workstation using local interfaces such as HIPPI. 

Andrews brought me into the laboratory to see the prototype 
network. The entire network was on a Single laboratory table, with 
a few racks of electronics located nearby to test and drive the net- 
work. The system had been tested with the transmission of High 
Definition TV over the network, using ATM cells to move data at 
800 Mbps. The network has also been tested at the full speed of 1 
Gbps. 

The Acorn project would deliver this gigabit capacity to the door 
of several organizations on campus, who would then work with 
CTR to try and exploit the bandwidth to do something useful. 

The applications included classical gigabit projects such as medi- 
cal imaging and quantum chemistry. It would also bring bandwidth 
to places like the law school, which was trying to move large 
amounts of data around for full text search and retrieval. Of course, 
the bottleneck in the law school application would probably be the 


142 


New York 


complicated keyword searching of large optical jukeboxes, not the 
network. 

Another application, possibly the most useful, was a proposal by 
the Teacher’s College at Columbia University to use computers 
more in K-12 programs. Teachers College hoped to link two schools 
in New York, one in the inner city and the other an exclusive private 
school, to multimedia resources. 

In 1990-91, a prototype of the system was put in at the private 
school, allowing sixth-graders to communicate with a CD-ROM con- 
taining a data base on ancient Greek culture called the Perseus Pro- 
ject. The software allows groups of students to perform a group 
excavation of a hypothetical site in Greece. 

The Acorn project would set up a library of resources at Colum- 
bia and make them available to students at the schools. The project 
would buy as many off-the-shelf resources as possible and store 
them in the library. When a user wanted to access a resource, the 
data would be retrieved, compressed, and sent over the network to 
the user’s workstation. 

Throughout the twelfth floor, we saw laboratories filled with 
esoteric-looking hardware. This was definitely a hands-on research 
center. In one room was a molecular beam epitaxy system, in an- 
other a testing laboratory for HDTV, and in a third an experiment to 
provide different guaranteed classes of service on complex, high- 
speed networks. 


0 


The real, operational nature of CTR was a sharp contrast to many 
computer laboratories, where hands-on usually meant typing on a 
keyboard. It was an even sharper contrast to my afternoon appoint- 
ment at the Columbia Institute for Tele-Information (CITI), located 
in the Business School. 

CITI, as you might guess from a place with Tele-Information in 
the name, is not the kind of place with lots of computers. Instead, 
the offices are stuffed with paper, books, and loads and loads of 
reprints of CITI publications. 


143 


Exploring the Internet 


CITI is an economist think tank about networks. The founder is 
Eli Noam, a lawyer and an economist. A former member of the 
New York State Public Service Commission, his is one of those ubiq- 
uitous figures in the discussions that hover around the FCC and set 
much of our policies for public networks. 

CITI had been trying to drag me into one of their policy studies, 
a grandiose project called Private Networks and Public Objectives. 
My contact was an ebullient young Irish Marxist, Aine M. Ni 
Shuilleabhain, an able policy analyst putting in time at CITI to pay 
the rent. 

Public Networks and Private Objectives is characteristic of the 
studies conducted at think tanks like CITI. Lots of people attend a 
few conferences and seminars and some papers are prepared. The 
papers are then sold as part of the huge Working Papers series. 
Then, after a little massaging, some of the papers are collected to- 
gether and published as a book. 

This particular study was going to look at a taxonomy of net- 
works, develop a general research framework, turn that into a con- 
ceptual model of networks, and finally come up with a policy 
agenda for the future. 

The problem CITI was having was that they were getting lots of 
speakers, but very few of them knew much about networks. 
Granted, many were specialists in networks, but most were econo- 
mists specializing in issues like public utility pricing models. Occa- 
sional terms like “star topology” or “coaxial-fiber hybrid system” 
would enter the conversation, but the general discussion was a bit 
removed from reality. 

Aine was certainly aware that in discussing the policy fate of 
technical networks, it helped to know a bit about the technical na- 
ture of those networks. She had been trying hard to recruit some 
more technical people to participate and help lend a note of reality 
to the process. 

I ended up waffling out of the study. Having been trained as an 
economist and then escaped, I was not anxious to get back into the 
world of simplistic theoretical models based on unrealistic assump- 
tions. Besides, I had to finish my trip and then get ready for two 
more circuits around the world. 


144 


Washington, D.C. 


Tuesday morning, I got up early for a D.C. power breakfast of the 
Washington Post and black coffee. The black coffee on an empty 
stomach helps counteract the nausea you get reading the latest go- 
ings-on on Capital Hill, a subject the Post covers in excruciating de- 
tail. 

I then strolled down 16th Street, past the White House and the 
Old Executive Office Building to the nondescript, generic federal-is- 
sue offices of the National Science Foundation. There, I went up to 
the 4th floor to find Steve Wolff, the Director of the Division of Net- 
working and Communications Research and Infrastructure. 

I was shown into a dark office. Steve strode over out of the 
shadows and introduced himself. 

“T hate fluorescent lights. If you want, I can turn them on.” 

I demurred and groped around for my notepad. There was just 
enough light coming in from the hall to take notes. 

Steve Wolff took over the position of program manager from 
Dennis Jennings, the Irishman. Wolff helped formalize the NSFNET, 
supervising the shift from an interim 56 kbps backbone to a profes- 
sionally managed T1, and later T3, network. 

The solicitation for the T1 network had been won by a group 
that included the Michigan state network (Merit), IBM, and MCI. 
Later, a non-profit company was founded by MCI and IBM. This 
company, Advanced Network and Services (ANS), built a T3 nation- 
wide network. ANS was inserted into the organizational chain with 
NSF and Merit. 

When Steve Wolff and I talked in November, these organiza- 
tional details had been ironed out and a nationwide T3 network, 
run in parallel with the older T1 network, was slowly becoming op- 
erational. Wolff was turning his attention to the next phase. 

After numerous public hearings, Wolff was about to recommend 
to the National Science Board what the next phase of the network 
should look like. Needless to say, Wolff was not going to give me 
his formal recommendations before he told his bosses. Since I 


145 


Exploring the Internet 


wasn’t trying to scoop Network World, we discussed more general 
issues. 

Wolff explained the theory of network infrastructure as a pyra- 
mid. You could grow it by adding to the top or by broadening the 
base. Adding to the top was being done in areas like the national 
gigabit testbeds, intended to make the core run faster. Gigabit net- 
works were still being tested, but it was evident that in some form 
they would soon allow researchers to start using higher bandwidth. 

Adding to the base of the pyramid was equally important. 
Every year, NSF helped another 100 schools get on the Internet. 
This connections program was really quite simple. The school re- 
ceived U.S. $20,000, enough money to buy a router, pay for some 
telephone calls, and enslave part of a graduate student. After the 
initial U.S. $20,000, the school was on its own. To Wolff’s knowl- 
edge, not a single school had dropped off the network after the in- 
itial money ran out. 

Seeding activities and leveraging investment are the fundamen- 
tal strategies the NSF uses. They view their job as one of getting 
things started, not providing ongoing support. Most of the regional 
networks, for example, started off with exclusive or extensive NSF 
funding. By 1991, many of the regionals were self-sufficient. Even 
the core, NSFNET, received only a portion of its funds from the fed- 
eral government. 

My next stop that day was the Office of Technology Assessment 
Where I raided the document room and even found a copy of a 
study I had contributed to several years ago, but had never seen the 
final results. I then headed out to Dulles Airport for my last stop of 
the trip, the Internet Engineering Task Force meeting in Sante Fe, 
New Mexico. 


146 


Santa Fe 


Late Tuesday night, I arrived in Santa Fe. I checked in and 
walked down to the terminal room that had been set up for the 
IETF. After reading several dozen mail messages, and with over 100 
still left to wade through, I didn’t have the heart to continue and 
called it quits. 

Standing in the hall was Paul Mockapetris, the inventor of the 
Domain Name System. Paul and I left the hotel to go find some 
dinner, choosing a restaurant stochastically. The waitress came over, 
and gave us the introduction obligatory in such chi-chi places. 

“Hi, I’m Foo and I'll be your waitress this evening.” 

She handed us each a flimsy little card. On the card were the 
words “fish,” “chicken,” “beef,” and “lamb.” A little icon was next 
to each word. There were a couple of other icons signifying potato 
and onion ring. No prices. No prose. 

“What is this,” Paul asked, “a RISC menu?” 

I decided to see what the wine list would look like in a place 
like this. Foo came back a few minutes later carrying four bottles of 
Chardonnay and plopped them on the table. We pointed to our de- 
sired icons, Paul pointed at a bottle of wine, and our point-and-click 
supper was on its way. 


0 


The next morning, suitably fortified with a breakfast of a burrito 
stuffed with Chipolte cactus and eggs, I followed a stream of what 
were obviously computer engineers to the morning plenary. 

The IETF differs from most other industry meetings in that it is 
not a show or a conference. It is a place where people come to 
work. The plenary was very short and consisted of a technical pres- 
entation on ATM. Then, people went off to their working groups. 
Working groups are the main business of the IETF. It is in these 
meetings that people get together to develop the standards that 
make the Internet work. 


147 


Exploring the Internet 


The standards that have come out of the IETF have been impres- 
sive. They are produced quickly, and they work. In the area of net- 
work management, for example, the IETF produced an object 
identification hierarchy, management information bases for a wide 
variety of modules, and the Simple Network Management Protocol. 

The IETF has been remarkably successful, but as it grows in size, 
its ability to accomplish work appears to diminish. Veterans of the 
IETF, like Marshall T. Rose, are vocal about the negative impact of 
success on the ability to accomplish real work. Marshall likes to 
distinguish between two types of attendees: the “goers” and the 
“doers.” The goers are those who like to go to conferences, forget- 
ting that the IETF is a working group, not a conference. 

The basic difference is one of self-definition. Somebody like 
Marshall T. Rose defines himself in terms of accomplishments: “the 
father of ISODE” or “a leader in the development of SNMP.” Oth- 
ers, however, define themselves by position: “head of a working 
group’ or “member of the ACM.” 

This conflict has a fundamental impact on groups like the IETF. 
The goers try to get themselves named as working group chairs, 
and all of a sudden committees for the sake of committees start to 
flourish. The number of working groups topped 60 by the time of 
the Atlanta meeting in Summer, 1991. Stev Knowles, the most vocal 
minority of the IETF, suggested a working group be formed with 
the purpose of reducing working groups. Somebody else suggested 
that a working group be formed to study the question. 

Meanwhile, it keeps getting harder to get real work done. Peo- 
ple attend meetings who have not done the preliminary reading. 
Working group sessions get stalled with naive questions. Even post- 
ing required reading lists to the net doesn’t seem to get people to do 
their homework (or to attend and keep quiet if they hadn’t done the 
reading). 

Marshall T. Rose grew tired enough of the “goers” that, over a 
drink, he suggested a radical system of Certified Protocol Engineers. 
By Marshall's scheme, in order to attend a working group meeting 
and participate, you must be certified by a board of your peers in 
that area. Network management, routing, and mail systems, are all 
examples of possible areas. 


148 


Santa Fe 


The board in an area would be bootstrapped by two people of 
unassailable quality, who would draft the oral and written exams. 
Once certified in the area, you would be part of the governing 
group. The system would be quite similar to that used in the medi- 
cal profession. 

Working group participation would thus be limited to certified 
protocol engineers. Anybody could attend a meeting, but to partici- 
pate you must either be certified or be invited by the chair. This 
fairly radical proposal would probably never get passed—and was 
certainly proposed with tongue planted firmly in cheek—but it 
makes one think about how such a technocratic priesthood might 
function. 


0 


Aside from the usual work of readying router requirements and 
massaging management information bases (MIBs), the IETF has a 
ritual bloodletting plenary session on the penultimate day. The ple- 
nary always starts very slowly, with IETF chair Phill Gross uttering 
the obligatory platitudes of introduction. 

While he is speaking however, you can look around the room 
and see people positioning themselves at the microphones, waiting 
for the meeting to open to the floor. Usually, if the controversy will 
be especially loud, you can hear rumors in the halls in the days 
before the plenary. 

The Sante Fe meeting, however, had seemed fairly quiet and no- 
body was expecting a major controversy. Lack of real issues, how- 
ever, will not always stop people from speaking. 

As soon as Phill Gross stopped speaking, one engineer stepped 
to the mike and started raving about the Internet Activities Board. 
His proposal was to abolish the board as superfluous. 

I was sitting in the back of the room, looking over the shoulder 
of Jon Postel, editor of the RFCs and a long-time member of the 
IAB. Jon has a habit of scrunching down in his seat as he gets more 
and more disgusted. As the engineer continued to rave, Jon was 
almost sitting on the floor. 


149 


Exploring the Internet 


Finally, people started to chime in with the monologue, inter- 
rupting the mad ravings of the lunatic engineer and reminding him 
that the IAB may have problems but it certainly had played a valu- 
able role in the development of the Internet. Jon Postel slowly 
started sitting up in his seat. 

The IAB doesn’t always get accolades at the IETF meetings. The 
role of the IETF is technical advisor to the IAB, which goes ahead 
and makes policy decisions. In the previous IETF meeting, held in 
Atlanta in July, tempers had flared as high as the humidity. 

The story of that firestorm helps illustrate some of the inherent 
conflicts in the process. The IETF had developed an MIB for SNMP- 
based management of Ethernet modules. The working group that 
developed the MIB included many of the standard IEEE-developed 
management variables, but also included a few optional variables 
that the group felt were necessary. 

After several meetings and much e-mail correspondence, the 
working group forwarded the MIB to the general IETF. At a ple- 
nary meeting, the MIB was put on the table and no objections were 
voiced. It then went to the IETF Steering Group (IESG), composed 
of leaders from each of the main areas the IETF works in. 

The IESG examined the MIB, saw no objections, and forwarded 
the document up to the IAB with a recommendation for approval. 
This is the normal process that any recommended standard origi- 
nated by the IETF takes. 

Once the document hit the IAB however, it sat. People were 
busy and had lots of things to do. Finally, it came time to act on the 
document. Tony Lauck, the chief network architect for Digital 
Equipment Corporation and a member of the IAB, looked at the 
MIB and thought that some existing Ethernet vendors would not be 
able to easily implement the standard. He felt that it was different 
from the IEEE standard and that this was not necessarily a good 
thing. 

This is all well and good. The role of the IAB is technical arbiter 
of the TCP/IP protocol suite and Tony Lauck had identified what he 
saw as technical issues. He marked up the document, crossing out 
some variables and adding detailed instructions for revision of the 
MIB. The IAB then sent it back down to the working group. 


150 


Santa Fe 


The working group exploded. They felt that there had been 
many opportunities to provide technical input into the process and 
that the MIB reflected a technical consensus consistent with the net- 
work management framework that had become an Internet stand- 
ard. They saw the IAB as making a crassly commercial decision, 
caving in to the wishes of a few vendors instead of providing lead- 
ership in the standards arena. 


In Atlanta, everybody came to the microphone and started giv- 
ing their views. Why hadn’t the IAB attended the working group 
meeting if they had concerns? Why had the IAB made technical 
edits instead of providing policy guidance? 


Karl Auerbach of Sun Microsystems got up to speak. A lawyer 
by training and an accomplished engineer, he is a vocal participant 
in the IETF and an active SNMP developer. The rewritten MIB had 
been discussed at an unscheduled working group meeting the pre- 
vious evening, and Karl was concerned that this violated the open, 
consensual nature of the IETF. 


Others got up and complained that the IAB had issued several 
different explanations of what had happened, each different. Others 
were concerned that the IAB had tried not to tread on the IEEE turf, 
neglecting technical leadership for politics. 


Finally, members of the IAB admitted they had fumbled the 
question. The issue was not technical, it was procedural. How to 
run an informal standards process like the IETF, yet preserve due 
process safeguards, has been a continuing problem as the body 
grew in size from the original 13 participants to the several hundred 
attending at Atlanta. 


The issue of due process was certainly a crucial one. It appeared 
to some members of the IETF that Digital Equipment had sabotaged 
a standards action on commercial grounds. Karl Auerbach raised 
the question of the potential legal liability of the group. 


The questions of accountability and liability had not escaped the 
attention of people like Vint Cerf, then chair of the IAB. He was 
actively working to promote a new professional society, the Internet 
Society, which would sponsor the activities of the IAB and appoint 
the members. 


151 


Exploring the Internet 


The IETF was fun, but by the time an angry mob got around to 
putting Jordan Becker, vice president of ANS, on the grill about the 
transition from the T1 to the T3 NSFNET backbone, I was ready to 
leave. Seven weeks on the road had certainly been enough for me. 


152 


Boulder 


Getting off the plane in Denver, I found myself in the middle of a 
minor blizzard. I collected my bags and fought my way through 
the snow to find the shuttle bus back to Boulder. 

On the bus, I struck up a conversation with the clean-cut young 
man sitting next to me. 

“What do you do?” I asked with some apprehension. 

“I install custom industrial equipment,” he replied. 

Well, I thought to myself, that’s not too bad. In Boulder, I hesi- 
tate to ask that question because more often than not the person is a 
professional aromatherapist, an astrologer, or a trance-channeler for 
mythical beings. 

“What kind of equipment?” I asked. 

“Large-scale bean sprout growing machines,” he replied. 

The Boulder version of heavy industry. At least he didn’t work 
for Wholebrain Technology, the prototypical Boulder boutique, a 
business establishment specializing in “light and sound technology 
for mind expansion and brain development.” 

The next four weeks were spent reading mail, paying bills, and 
sorting out hotel reservations in 43 cities. About half-way through 
my stay at home, I came home from the travel agent to find a fax 
from Pekka Tarjanne of the ITU. 

The letter congratulated me for the wonderful work I had done 
and terminated the Bruno experiment as of December 31, 1991, a 
mere 90 days after it went operational. 

The letter disingenously said that although the experiment was 
terminated, “measures are in progress for a similar service to be 
made available under ITU auspices.” 

I had talked in Geneva to Robert Shaw, the technical staff mem- 
ber working on an Electronic Document Handling System. His vi- 
sion, still very much in the conceptual stage, was to put a PC with 
X.400 software on the ITU network and offer only working docu- 
ments to a tightly controlled group of people. 


153 


Exploring the Internet 


The letter from Tarjanne also insisted that I somehow convey to 
“all those who are operating info-servers with copies of the ITU 
standards that IT’s authorization for distribution of this material 
ceases after December 1991.” 

Kind of like publishing a newspaper and then asking people to 
return the copies. Even worse, many of the 21 sites around the 
world had invested money in upgrading their equipment to handle 
the ITU standards. A 90 day experiment was a farce. Pekka Tar- 
janne, despite his good intentions, had finally been beaten down by 
the bureaucracy. 

I tried to find out what had happened from Tony Rutkowski. 
He had been called in (but only after the letter was dispatched to 
me), sat down at a table, and read the letter. He had protested 
vainly that once the cat is out of the bag, there is not much you can 
do, but his arguments fell on the unwilling ears of a bureaucracy 
threatened by any sign of innovation. 

Meanwhile, I sent out notes to the Internet community, inform- 
ing them of the ITU’s decision. Even if the ITU had not kept its 
commitment, we didn’t want to expose any of the other sites to an 
unwitting legal liability. 

Of course, chances were highly unlikely that the ITU would sue 
anybody. A strong legal argument could be made that by allowing 
uncontrolled dissemination of its standards, the ITU had given up 
any claim to a copyright it might have once had. 

One problem with undoing distribution on the Internet was that 
I had no idea where all the copies were. Just to make sure that I 
reached all the servers, I dashed off a piece for Communications Week, 
letting Tarjanne’s office know that I was performing this service for 
him. 


154 


Round 2 


From Christmas to Chicago 




























a5) mone pao ate 
standuxds that IT's coronene he 4 fisirily 
Cases after Decembeg 1992.” = 
Kind of ike poblishiog! « newspaper aud 
Qwerty ropies.: Emer wormd: tamny/ot' tee Oh it 
we rid had inwersted pinney in apgrtding viele ex ‘ 
the ITU standards, A: Sd day’ experiment “as. a: farce 


wert iw nie ant Siow, by aes a qt oy 
Oger ..ah sé meds MOM ee 


Pe 8 : 

’ Vis: 
rote as 
. | - emis 


1 


i tried { e. qul Wht ha id { happens di fro Sony, ats tke 
Me had been walled in That ¢ mty attnr the lettes WS) CAN patch F 
‘tt | i, and read the leties: fie had, . tes 
iniy that once ye cat ont oF tne} ag, there in. not Gy Rit 
at his argamnents fell an the unwilling pers of a F reg 
' y any Sen of winds atic fi. i a Poe 
a wre, 1 2 mt ou moins to the intervie community, i R 

ine treat cf ee (Tle cledisiorn@ Byven if thu: TTY nad nov x 
+ get! be yp OF i wliessatte ite 


a 


Ss 


witiaslon 
2pies Watt, 
é off a piece fork: 






Berkeley 


I didn’t realize that traveling on Christmas day would be such a 
novelty, but it was in the Wonderbread world of Boulder. Being 
Jewish, I long ago learned that travel was optimal on Christian holi- 
days. While the silent majority practiced their rituals, I was able to 
travel in peace. The flight attendants feel sorry for you and feed 
you champagne, which you can enjoy with plenty of elbow room. 

In Boulder, though, the news that I would be traveling on 
Christmas was inevitably met with great remonstrations of pity. 

“It’s OK, I’m Jewish,” I would try to explain. 

“Oh, but still,” they would sigh. 

Boulder is a cowboy version of California. It sports an uneasy 
mix of starry-eyed new-agers and redneck wannabees, with an odd 
combination of the intensely mellow and the highly midwestern. 
This is the kind of place where, when you tell a joke, people thank 
you for sharing it with them. It’s the kind of place where every- 
body eats organic sprouted bran breads, but they go to mini-malls 
to get it. Its the kind of place that thinks it’s the center of the world, 
but in reality is simply too close to Kansas and not nearly far 
enough away from Marin County. 


0 


You know you've come from an island when Berkeley seems real 
and down-to-earth. I picked up my car from the airport and drove 
up the Bay, past the hole where the Embarcadero Freeway had been 
torn down, and over the Bay Bridge to Berkeley. 

Thursday morning, with a day to kill, 1 walked down to Tele- 
graph Avenue. Although increasingly littered with junkies and wi- 
nos, the street still has some charm left from its heyday in the 60s. 

First stop was the Café Mediterraneum, a cavernous coffee shop 
where you can sit for hours nursing a café latte and watching the 
passing parade of residents sporting “proud to be weird” buttons 
and teenagers dressed like Hippies. On the wall of the Café Med is 


157 


Exploring the Internet 


a “no soliciting or dealing” sign. It was on the second-floor terrace 
of this café that I wrote two of my books, typing every day until my 
café latte and laptop batteries ran out. 

The only problem with typing in Bay Area cafés is the questions 
you must periodically field. At the Café Med, every day that I 
typed I would receive several inquiries about the feasibility of calcu- 
lating astrology charts on my device. 

The astrologically-inclined would-be cyberpunks were an inter- 
esting diversion from trying to decipher vendor manuals. Some of 
the queries were even more basic, such as the one I received while 
working on another book in the Café Picarro, located in the heart of 
San Francisco’s Mission district. I was busily typing away, trying to 
wax poetic on master-slave replication when I realized that some- 
body had been standing staring at me for a good ten minutes. | 
looked up and saw one of the local bums, a benign psychotic who 
wrote random ravings on a piece of paper, xeroxed a dozen copies, 
and sold them as a newsletter to buy a U.S. $1 bottle of wine. Feel- 
ing that we had something in common, I always tried to be nice to 
him. 

He had a very puzzled look on his face, staring at my notebook 
computer. Seeing me look up, he seized his chance. 

“Uh, excuse me, but, like, how do you print on this thing?” 

“You don’t,” I replied in a matter-of-fact tone of voice, and went 
back to typing. 

He stood there for another ten minutes watching me and 
scratching his head, trying to figure out what the point was to this 
write-only memory device. 

I wasn’t sitting in the Café Med, however, to answer any existen- 
tial questions. I had been gone from the Bay Area for several 
months and I was stoking up on caffeine to get myself ready for a 
tour of the bookstores. 

My standard tour has three stops and takes all day. It starts 
with Cody’s in Berkeley, one of the best general purpose bookstores 
in the country and one of the places bombed for selling Salman 
Rushdie’s Satanic Verses. 

After stocking up on obscure travel literature (and making sure 
my own books were in stock), I headed out of the Berkeley sun, 


158 


Berkeley 


over the Bay Bridge, and into the mist of San Francisco. The city 
hadn’t yet fully recovered from the earthquake yet and instead of 
being dumped in the middle of North Beach, I took a round-about 
route through the warehouses and the financial district. 

In previous years, I had taken this route every day, but on a 
scooter instead of in a car. Then, I had blasted through traffic, doing 
the messenger slalom across the lanes. This time, I had a rental car 
and had to resist the temptation to treat the gas pedal as a digital 
device. 

Finally, I found myself on Columbus avenue and darted into a 
parking space across from the City Lights bookstore. On the top 
floor is the publishing house that, in 1953, became become famous 
for being the only house willing to publish beat authors like Jack 
Kerouac. The first floor and the basement are stuffed with a won- 
derful collection of literature, communist propaganda, and the like. 

After spending my allowance, I walked up into North Beach. 
First stop was Molinari’s deli. In a few weeks, I would be in Bang- 
kok visiting the restaurant critic of The Bangkok Post and it was un- 
thinkable to arrive without an appropriate sausage. I debated the 
merits of diverse salamis with the clerks, purchased a few of the 
better specimens, popped a few prosciutto-and-mozzarella stuffed 
peppers into my mouth, then headed back to the car for the trip to 
the South Bay. On the way, though, I received a shock. The Con- 
dor, San Francisco’s first topless bar and a sleaze magnet for the 
entire state, had become the Condor Bistro, a fern-and-cappucino 
establishment. 

On the way to the South Bay, I made a diversion to the Mission 
for lunch. La Tacqueria Menudo is named after their specialty, tripe 
tacos. No tripe tacos for me, though. I prefer lengua, beef tongue. 

La Menudo is no ersatz chimichanga joint. Tacos are the real 
thing here, served on soft tortillas with lots of salsa and cilantro, 
washed down with a can of Tecate beer. Rubbermaid containers on 
the tables hold fresh radishes, pickled hot peppers, and more salsas. 
Mexican MTV booms out over the speakers, unless a soccer match is 
on. 

Suitably refurbished, I took the I-280 freeway down to the South 
Bay to Computer Literacy, the largest and definitely the best com- 


159 


Exploring the Internet 


puter bookstore in the world. With 20,000 different titles, this store 
is a mecca for the computer literate. For the first two years | wrote, 
I calculated that I spent as much money buying books here as I 
earned from writing them. 

With a new collection of reading matter, I continued playing the 
digital tourist and headed up to Fry’s. Fry’s is to Silicon Valley 
What the Louvre is to Paris. This is a supermarket for hackers. 

The doors to this store are labeled Enter and Escape. Over 20 
full-duplex aisles, each 100 feet long, are stacked with every con- 
ceivable piece of software, peripheral, chip, and cable. People wield 
shopping carts up and down the aisles and then report to 35 check- 
out stands that can easily process several thousand people per day. 
On your way out with your new peripherals, you can pick up 
twinkies and Jolt to fuel the creative process. 

After picking up a new fax modem, I headed next door to 
browse in the Weird Stuff Warehouse, a store that specializes in 
used and surplus equipment. This is the kind of place where you 
can pick up a VAX 11/750 for $50 or a Symbolics 3600 for $125, 
always useful if you are remodelling your recreation room and want 
to put in a bar. 

After a stop in Los Altos Hills for the best wine I’ve ever tasted, 
courtesy of Dan Lynch of Interop, I headed back to the hotel to sort 
out my modems, books, and salamis. 


160 


Mountain View 


Saturday afternoon, I headed down to Mountain View, the home of 
Sun Microsystems. I was going to visit Steve Roberts, better known 
as “the guy with the bike.” 

In 1983, Steve decided that a life of consulting and writing books 
on the subject of microprocessors was not for him. He tallied up the 
things he liked to do, and decided on a short list of writing, meeting 
people, and riding bikes. He sold his home in Columbus, Ohio, and 
invested everything he had in a recumbent bicycle, an early laptop, 
solar panels to power his ham radio and other devices, and then hit 
the road. 

For 10,000 miles, he kept on pedaling, going through Florida, the 
Rockies, the deserts of Utah and California, and the bleak desolation 
of San Clemente. On the way, he used CompuServe as his elec- 
tronic mailbox and wrote articles for any publication that would 
send him money. The bike was certainly a natural conversation 
opener, helping to fulfill his most important ambition of meeting 
lots of people. 

The original “Winnebiko” was only a couple of hundred pounds 
and had 18 gears. Over time, that original frame has grown to sup- 
port 105 gears, 580 pounds, and an incredibly sophisticated collec- 
tion of on-board computers. 

Sun Labs lent space to Steve to let him work on the latest incar- 
nation of the Bike, called the Big Electronic Human-Energized Ma- 
chine... Only Too Heavy (Behemoth). I reported to Sun’s Building 
4, and was met by Steve, a tall bearded man in his late thirties, 
wearing a “Peace” T-shirt. He led me through dark empty corridors 
to a locked door bearing a neatly labeled sign which read “Nomadic 
Research Labs.” 

“Labs” was an understatement in this case. Under one of the 
desks was a futon and scattered throughout were other signs that 
the lab doubled as a home. Walking in the first time, though, I 
didn’t immediately notice the futon, the flute, or the cereal bowl. 
My eye naturally turned to the huge bike in the middle of the floor. 


161 


Exploring the Internet 


At first glance, I saw a recumbent bicycle with a storage unit 
mounted behind the seat and an aerodynamic hood up front. Be- 
hind the bike is a trailer, covered with 72 watts of solar panels used 
to charge 45 amp-hours worth of batteries. 


Sticking up from the rear of the trailer is a big yellow pole con- 
taining ham radio antennas. The pole is six feet tall and can be ex- 
tended to 12 feet for even better reception. Another antenna on the 
back is a little Qualcomm satellite dish, similar to what you would 
use on a delivery truck. Roberts keeps a Sun 4/260 at Qualcomm 
headquarters and runs 165 bps UUCP-based transfers into the bike. 


The satellite dish provides coverage anywhere, but 165 bps isn’t 
really optimal for true connectivity. A high-speed modem and a cel- 
lular phone allows high-speed IP access to a server located at Sun. 


The bike has a variety of different computers. A Sparcstation, a 
Macintosh portable, and a DOS portable had all been ripped apart 
and mounted onto the bike. The screens were mounted on the bike 
console, with one screen flipping up to expose another. 


Another laptop is in a removable carrying case, allowing Steve 
to compute in diners and other places where the bike is not wel- 
come. The carrying case is, of course, in constant communication 


with the bike. 


Input to computers while riding is provided by a handlebar key- 
board and a head mouse. The handlebar device is based on an In- 
fogrip BAT chord keyboard which has 7 keys. Force-sensing 
resistors are built into the handlebar grips and are linked to the BAT 
keyboard controller. 


The chord keyboard allows Steve to type at roughly 35 words 
per minute, not an optimal rate when you make your living being 
paid by the word. Once the keyboard controller generates charac- 
ters, the data is sent to a macro package on a DOS machine that 
expands the data. Through careful use of macros, the data hitting 
the target computer appears to be a typist working at 100 words per 
minute. 


The head mouse is the other major form of input. Three 
transducers are mounted on Steve’s helmet and they are used to 
sense an ultrasonic beam generated from the console. The resulting 


162 


Mountain View 


motion detected is fed into the controller of a Macintosh ADB 
mouse. 

The helmet has a few other features to help the digital nomad. 
A 720 x 280 pixel red image floats in front of him on a little display 
mounted on the helmet and acts as a console. A heat exchange sys- 
tem built into an inner liner for the helmet acts as an air conditioner, 
using the refrigeration unit on the bike to cool fluids which travel 
up and remove heat from the helmet. 

The helmet also has a little microphone on it which connects to a 
serial cross-connect bus. The bus can set up connections to cellular 
phones, the ham radio, or even the voice recognition unit on the 
bike. The cross-connect bus also links modems to serial ports and 
any other serial links that need to be established. The audio bus can 
handle up to 8 simultaneous events and the serial bus can handle 
up to 4 simultaneous events. 

Just as the serial bus goes throughout the bike, so does a power 
bus. Power is distributed in a series of batteries. The main power 
source is three 15 amp-hour batteries, plus there are various other 
special purpose batteries scattered about. 

On sunny days, photovoltaic cells recharge the system. Addi- 
tional power is provided by a regenerative braking controller, which 
transforms the heat generated by braking into power. If there are 
no hills and no sun, a cable connected to a car’s cigarette lighter will 
do the trick. 

A Motorola 68HC11, programmed in Forth, acts as the power 
controller, sending power where needed and monitoring usage. The 
controller signals the main bicycle control unit when power is low, 
which in turn tells Steve so he can take corrective action. Two other 
68HC11 controllers handle the serial and audio buses. 

The audio bus allow sound output from many sources to be 
mixed. Two 4 inch Blaupunkt speakers are mounted behind the 
driver and connected to an automotive stereo amp. Data from the 
CD player, the cellular phone, the ham radio, or the speech synthe- 
sizer can all be mixed. Steve carries over 100 CDs with him on the 
road, removed from their original packaging to save space. 


163 


Exploring the Internet 


This entire contraption is worth over $300,000 in parts alone. If 
you added in time, it is easily worth over $1 million. Security natu- 
rally becomes an issue with an asset of this magnitude. 


Security for the Behemoth is provided on several levels. At the 
most basic level, a microwave doppler motion detector reports any 
motion within 8 to 10 feet. Other detectors signal when a person 
touches the bike or sits on the seat. A Global Positioning System 
(GPS) receiver on the bike hood reports bike movement and speed. 


Different responses can be set to security events depending on 
the circumstances. The voice synthesizer can use the speakers to 
utter an appropriate phrase if somebody touches the bike, such as 
“do not touch, or you will be vaporized by a laser beam!” A siren 
can be activated, or Steve can be paged. 


If the bike starts moving without a password, more drastic ac- 
tions are possible. The wheel can lock, a call can be placed to 911 
and the speech synthesizer can request help, the siren can be acti- 
vated, and, most effective of all, a wild-eyed digital nomad is pro- 
grammed to come automatically bursting out of his tent in a mad 
frenzy. 


The Behemoth and its previous incarnations attracted the media 
from the word go. CBS, USA Today, and even the trade press 
quickly realized that this was a story. Being “the guy with the bike” 
has made Steve instantly recognizable throughout the U.S. 


For the first 17,000 miles of journeys, Steve simply wandered. 
An office manager at home base took care of things in return for a 
cut of the revenue. Over time, though, Nomadic Research Labs has 
grown into quite a business. Steve publishes a somewhat quarterly 
journal called Nomadness and is in frequent demand on the lecture 
circuit, providing an interesting alternative for groups that can’t af- 
ford Oliver North. 


To meet the demands of speaking engagements and trade 
shows, the bike had just added a mother ship, a large trailer pulled 
by a nice van. The bike went inside the mother ship and hooked up 
to the antennas in the trailer and a console in the van. The bike 
continued to operate as the communications hub, even though it 
was inside a trailer. 


164 


Mountain View 


I thought that my three round-the-world trips for this book were 
quite a journey, but I felt like a digital dilettante compared to Steve's 
wholehearted commitment. His lifestyle was different from that of 
your usual commute-to-cubicle engineer, but he has certainly 
proved that you can have fun and put together a technical tour de 
force at the same time. 

I left Steve to drive up the peninsula to meet Ole Jacobsen, my 
editor at ConneXions. Over a dinner of pasta with garlic, olive oil, 
and anchovies, we plotted how we could get Steve Roberts to pedal 
around the INTEROP show floor, hooking, of course, into the 
ShowNet. How about remote SNMP bike management? A Behe- 
moth MIB? The possibilities were endless. 


165 


San Francisco 


Monday morning, I headed into the Mission district. With an hour 
to kill, I walked past El Pollo Loco and the Carlos Club (“commut- 
ers welcome”), to the Café La Bohéme, one of my old haunts. I 
threaded my way through the couches and tables with derelicts 
playing chess to get a cup of coffee. 

In the corner of the café, I spotted something new. There was a 
computer terminal with a sign saying “SF Net” and a message on 
the screen indicating I should inquire at the counter. I paid a dollar 
and received a ticket with a code on the back that entitled me to 
fifteen minutes. 

SF Net had the usual PC-based access, but decided to add bul- 
let-proofed terminals in places like La Bohéme and the Brain Wash, 
a combination laundromat, diner, and bar. The terminals had a 
screen built under a glass table top and the keyboard was covered 
with plastic. 

This was your basic BBS, but with a California twist. After en- 
tering the code for time, you were asked for a handle. I chose 
“Carl.” You could then chat with online users, post messages to 
bulletin boards, send mail, or even buy and sell used CDs. 

Aside from the obligatory Love Chat, a digital singles bar, SF 
Net boasted a large Metaphysics and Astrology area. Messages 
from people like Spud Muffin and Venus Anemone examined the 
relative merits of Jupiter and Mars to our daily lives. 

Finishing my coffee, I walked through the Mission, past a man 
piling whole butchered hogs into the back seat of his station wagon, 
and cut over to 23rd street to Brewster Kahle’s gingerbread Victo- 
rian house. Brewster was the architect of the CPU of the Thinking 
Machines’ CM2, one of the most innovative computers on the mar- 
ket. He was also a former member of the Artificial Intelligence 
Laboratory at MIT, home of Marvin Minsky. 

After delving into the arcana of message-passing protocols for 
massively parallel processors, Brewster turned his attention to the 
much more difficult problem of finding and using information on 


166 


San Francisco 


networks. The result was the Wide Area Information Servers 
(WAIS). 

The living room of Brewster’s house was packed full of books 
on subjects ranging from the works of Goya to those of Marvin Min- 
sky. This was not surprising, since Brewster viewed himself as a 
publisher and WAIS as the ultimate publishing platform. 


WAIS has three pieces. A server has documents and makes 
them available to the world, perhaps for free and perhaps charging 
for access. A client gets these documents from one or many servers. 
Clients and servers communicate using an enhanced version of the 
239.50 protocol, originally developed to search online card catalogs. 


Brewster ushered me into his office, where he sat down on a 
beat-up old easy chair and balanced a keyboard on his lap. The 
screen and rollerball mouse were conveniently nearby, making this a 
highly comfortable work or play station. 


There was no need to start up his WAIS client since it was al- 
ready up and running. Deployed for only a few months on the In- 
ternet, WAIS was quickly becoming a part of people’s routines, and 
had certainly been integrated into Brewster’s daily work. 


Brewster typed in a query: “Is there any information about Biol- 
ogy?’ The query was sent, in its entirety, to the server of servers 
that Brewster maintained, quake.think.com. Servers of servers were 
no different than document servers, they simply kept a list of other 
servers and a description of the information they maintained. 


We got back a list of servers throughout the world that had in- 
formation on biology, such as a database of 981 metabolic intermedi- 
ate compounds maintained in the Netherlands. At this point, we 
refined our query and sent it out to many servers simply by point- 
ing to them on the screen. Servers returned lists of document de- 
scriptions; pointing to those documents retrieved the full text. 


WAIS makes very few assumptions about servers or clients. In 
our query, we used natural English. The server has indexed docu- 
ments by keyword and parsed our query to form the lookup. There 
is no requirement that a WAIS server handle natural English, it can 
simply take keywords, SQL queries, and even do fuzzy matches to 
correct for poor spelling. 


167 


Exploring the Internet 


The documents stored in the server can also vary. They can be 
simple ASCII text, as in the case of things like the RFCs. Or, the 
documents can be in the Macintosh PICT format, PostScript, or 
might even be some virtual document, dynamically generated from 
a database at query time. 

Likewise, the clients can range from simple to complex. At the 
most basic, the client used Telnet and VT100 emulation, an interface 
known as simple WAIS (SWAIS). Clients can be much more intelli- 
gent. On a Macintosh or NeXT, complex queries on multiple servers 
can be monitored in a simple intuitive manner. Queries can be saved 
and periodically reexecuted, allowing updates to information to be 
periodically generated. 

Most users of WAIS use a Macintosh interface called WAISta- 
tion, not surprising since Apple worked with Thinking Machines on 
the initial prototype of the system that was tested at Peat Marwick. 

WAIStation uses two metaphors to structure the user interface: 
storage in folders and searching as a conversation. You started a 
search by asking a question. You get back document descriptions, 
and those results are used to refine the query. Eventually, the query 
returns the information the user wants. The query can then be 
stored in a folder where it can be pulled up later and reexecuted. | 

Queries in WAIStation can also be passed by looking for docu- 
ments “similar to” those already found. The conversation thus con- 
sists of asking for documents by a query or by example and 
pointing to one or more servers. Servers can be remote, or can be 
local document stores such as the entire hard disk or a folder con- 
taining all e-mail ever sent or received by the client. 

WAIS, with over 10,000 users in 24 countries by the end of 1991, 
requires, for decent performance, at least a 9,600 bps connection into 
the network. A local WAIS environment can easily be put together 
using Ethernet, either as an alternative or a supplement to the In- 
ternet-based servers, useful in places where Internet connectivity 
had not yet achieved the necessary bandwidth. 

When I talked to Brewster, he was working with Apple’s Ad- 
vanced Technology Group on an even fancier interface called Rose- 
bud, named after the sled in Citizen Kane. Rosebud would use a 
newsroom metaphor for the user interface. 


168 


San Francisco 


Users would give assignments to reporters, a process like the 
WA\IStation query dispatch. Different reporters can specialize in dif- 
ferent assignments. The user would then look at the results from a 
“newspaper” window, which would show the documents recovered 
by different reporters. Reporters can be instructed to reexecute their 
tasks on a periodic basis, allowing the newspaper to be dynamic. 


Several other client interfaces also exists. NeXT would be ship- 
ping one with every workstation. XWAIS uses the X Window Sys- 
tem and was similar to the WAIStation. Other interfaces are 
available for GNU Emacs and DOS platforms. 


The number of WAIS servers that had emerged in a few months 
on the Internet was truly incredible. It started with a couple of da- 
tabases from Thinking Machines, holding things like manuals and 
bug reports. Thinking Machines also uses WAIS as a corporate in- 
formation system and even saved all messages from all mailing lists 
for future queries. 


Other databases that had emerged ranged from CERT advisories 
to weather maps to archives of USENET bulletin boards to the en- 
tire text of the Koran, the Bible, and the Book of Mormon. Three 
cookbooks, a huge poetry database, Supreme Court opinions, and 
even the CIA’s World Factbook were online. 


Between June 1991 and the end of the year, WAIS spread to in- 
clude over 160 databases in 8 countries, including (of course) Fin- 
land, Norway, and Australia. Brewster described WAIS as 
“uncontrolled and uncontrollable,” as any good service should be. 
For example, Finland had started keeping a server of servers and 
soon it might be necessary to dispatch queries looking for servers to 
several different places. 


Brewster’s goal was to enable anybody with a computer, even a 
lowly PC, to become a publisher. The first PC-based WAIS server 
had recently gone online, running in somebody’s basement, and 
Brewster was quite excited by the prospect. 


Brewster’s interest in publishing was personal as well as profes- 
sional. His fianceé ran a printing museum and in the basement was 
an old printing press. For entertainment, friends went downstairs 
and made calling cards. The only requirement was that they leave 


169 


Exploring the Internet 


one on the wall. Cards from people like John Quarterman and Mi- 
chael Schwartz adorned the walls of the basement. 

After a Salvadorean lunch of pupusas and empanadas, I bid 
Brewster goodbye and went down to the South Bay to thank Sun 
Labs for the use of their machines and inform them of the ITU’s 
imminent assassination of Bruno. 


170 


Moffet Field 


Milo Medin is best known in the Internet community as one of the 
developers of Open Shortest Path First (OSPF), the new and im- 
proved dynamic routing protocol. He also runs the NASA Science 
Internet (NSI), one of the largest operational networks and one of 
the core backbones for the Internet. 

NASA Ames Research Center, where Milo worked, is located at 
the Moffet Naval Air Station near Mountain View, the site of an im- 
pressive collection of wind tunnels that includes one big enough to 
fit a full-size Boeing 727. Another tunnel can achieve hypersonic 
speeds of Mach 9. The big tunnel is powered by six 28,000 horse- 
power engines and takes so much power that it can only be run at 
night (after first warning the power company). 

NSI links all the big NASA laboratories, such as Ames, the Jet 
Propulsion Laboratory, Goddard in Maryland, and the Kennedy 
Space Center in Florida. It also links scientists in universities and at 
research facilities in locations as diverse as the Antarctic, Greenland, 
and Easter Island. 

NSI is both a general-purpose Internet and a mission-oriented 
operational network. As a mission-oriented network, NSI has some 
fascinating applications with demanding resource requirements. 

For example, a telescope at Owens Valley is connected to NSI, 
allowing astronomers to reposition the telescope remotely. Another 
set of applications distribute data from the Upper Atmospheric Re- 
search Satellite, moving telemetry data from the satellite to White 
Sands. From there, the data are moved to Goddard’s Consolidated 
Data Handling Facility, where they are distributed over NSI to re- 
mote analysis centers. 

Perhaps the most unusual application I saw was a C141 airplane 
used for infra-red data collection. The plane regularly flies between 
Ames and Christchurch, New Zealand. The plane has its own Class 
C network address and is filled with Sparcstations on an Ethernet. 

The plane flies its route and collects data along the way. When 
it lands, a thinwire BNC connection drops out of the back and con- 


171 


Exploring the Internet 


nects to a cable in the hanger, making the plane a part, once again, 
of NSI. The movement of the plane from one facility to another is 
transparent to users. Routing protocols, such as OSPF and EGP, are 
used to announce the availability of the plane network to the rest of 
the Internet. 

Keeping 70 routers, plus underwater fiber, satellite, and dozens 
of high-bandwidth terrestrial links up and running is quite a chal- 
lenge. In many cases, the links not only have to be up but also need 
to provide adequate performance for the transfer of large images or 
low latency delivery of operational commands. 

The network is managed from within a Network Control Center 
at Ames. The current status of the network is shown on a wall dis- 
play, with bad links in red and good ones in green. Operators at 
workstations monitor these links 24 hours per day. 

Given Milo’s active IETF involvement, it is not surprising that 
SNMP is used extensively to monitor network status. SNMP, how- 
ever, provides in-band network management and does not help very 
much when the network was down. To supplement SNMP, each of 
the routers in the NSI network has a modem on the console port, 
allowing operators at the Network Control Center to dial in and di- 
agnose problems, often while the users on-site sleep. 

While TCP/IP is the main protocol suite in NSI, there is also a 
heavy DECnet contingent. Unlike TCP/IP, DECnet Phase IV has no 
globally administered address space. The architecture assumes a 
single network which has up to 63 areas, each area under some 
management entity. 

When a global community starts to interconnect, as in the case 
of space sciences or physics, you quickly get many more than 63 
areas. DEC had a hard time believing that physicists would need 
more than 63 areas. “Just get organized,” they would say. 

“Just get expletized,” the physicists would respond. 

To solve the problem, groups like NSI and HEPnet have been 
forced to resort to hidden areas. NSI and HEPnet agreed to make 
areas 1 to 46 globally administered areas, available to the entire 
physics and space sciences DECnet communities. These areas mean 
the same thing to all routers in NSI. CERN, for example, used area 
22 under DECnet Phase IV and area 23 for Phase V migration. 


172 


Moffet Field 


Areas between 47 and 63 are reusable. A particular DECnet 
router would know about one of these areas, but another router in 
the network might use that same area number for a totally different 
network. 

On many links, DECnet and TCP/IP had equal status, being 
sent across by multiprotocol routers. Occasionally, for political or 
technical reasons, the underlying link could only transfer TCP/IP 
traffic. A process known as “tunnelling” encapsulates DECnet traf- 
fic inside of IP packets, making two DECnet routers appear to be 
next to each other. 

NSI is both a special-purpose network and a general-purpose 
Internet. Owning the links means that NSI is able to control them, 
helping to tune the network for the bandwidth and latency require- 
ments of specific end-to-end requirements. This doesn’t mean that 
the network is isolated, only that NSI planners have a fairly good 
idea of what is happening on their part of the Internet. 

NSI also acts as one of the Internet backbones. Links to New 
Zealand, Hong Kong, Australia, Hawaii, London, and many other 
sites come in at NASA Ames, Goddard, or other NSI sites. The data 
from these sites is routed on through to its final destination, which 
might well be outside of NSI. 

One of the key links into the rest of the Internet, indeed one of 
the two key hubs in the entire internetwork, is at Ames. This is the 
Federal Internet Exchange for the West coast, known as FIX West. 
The other FIX is in College Park, Maryland, and is called Fix East. 

FIX West is located in a small squat building in the middle of a 
sweet potato patch on the edge of Ames. The building is shared by 
NSI and the NASA Telephone Company, which maintains the un- 
derlying bandwidth on which NSI runs. 

Inside the windowless building, Pacific Bell has the termination 
for 12 fiber optic cables. Two other sets of 12 fibers terminate at 
other locations on site to provide redundancy. The fiber provides 30 
to 40 T1 links, but could easily provide as much as a dozen OC-3 
links running at 155 Mbps each. 

The room is packed with termination equipment, patch panels, 
and other telesoterica. In a locked wire cage are all the routers for 
NSI. One 19 inch rack holds routers for the Bay Area Research Net- 


173 


Exploring the Internet 


work (BARRnet). Another has NSS routers for the NSFnet. Other 
racks hold equipment for local networks, such as the link to the 
huge National Aerodynamic Simulation center at Ames. Yet more 
racks have routers for the Energy Sciences network (ESnet), NSI, 
and many others. 

In a corner is a huge, antique piece of equipment, known as a 
Butterfly. The Butterfly is made by BBN and is still used by MIL- 
NET as a “Mailbridge” to the outside world. Prying off the top of 
this ancient-looking device, Milo showed me the Macintosh hidden 
inside which is used as the console. 

Also located in this building are the electronics for two complete 
C band satellite earth stations, not to mention videoconferencing 
equipment, racks for the experimental Terrestrial Wideband net- 
work, time servers, and a host of other equipment needed to pro- 
vide the gateway for the west coast, the Pacific Rim, and much of 
the rest of the Internet. 

Finishing what Milo called the “cheap tour,” we drove by the 
huge hangers of Moffet Field, originally built to house dirigibles and 
so immense that clouds form inside when the doors are closed. 
Milo stopped at another hanger, where we saw Harriers, Hornets, 
U2s, and many other NASA aircraft being worked on. The U2s 
were used to pinpoint firestorm centers during the Yellowstone 
fires, helping the firefighters to identify targets. 

After a nice lunch of generic Chinese food, I borrowed a termi- 
nal to read my mail. Being in the center of the world, I figured my 
response time ought to be good, and it certainly was. 

Heading out, I stopped first at the visitors center. Here you can 
get all sorts of educational books on atmospheric sciences and scale 
models of historic aircraft. I headed straight for the astronaut food, 
Where I bought five pouches of freeze-dried, vacuum-packed ice 
cream, a chalky, marshmallow-like bar that sort of resembles ice 
cream if you freeze it and squint your eyes. 


174 


Wellin gton 


Tuesday night, New Year’s Eve, I boarded the plane for New Zea- 
land. Travelling west on New Year’s Eve gives you at least two 
excuses to celebrate, provided you cross the international date line 
after midnight. If you cross before, you get no chances unless, of 
course, you don’t tie your celebrations to arbitrary chronometric in- 
dicators. 

Twenty hours later, I landed in Auckland to await my flight to 
Wellington. Customs impounded the salami I had bought as an of- 
fering for the restaurant critic of The Bangkok Post and told me that if 
I did not reclaim my links within 28 days they would be destroyed. 
Not wishing to be responsible for the wanton destruction of four 
innocent salamis, I paid my NZ $5 fee for a sausage hotel at the 
Ministry of Agriculture and Finance, and assured the officer that I 
would return as soon as I could. 

I must admit that in the course of travelling, I’ve gotten a bit 
jaded about waiting lounges, but the Air New Zealand Koru Club in 
Auckland was a refreshing change. After a breakfast of fresh kiwi 
salad and coffee, I was offered the use of a shower, razors, and the 
daily newspaper. Computers, Xerox and fax machines, and other 
office equipment were warmed up and waiting. 

Arriving in Wellington, I was met by Richard Naylor and his 
two sons, Jeremy and Chris. Richard runs the computer department 
for the city of Wellington; I had come to learn about City Net. 

Even though it was the middle of summer vacation, a “south- 
erly” had blown in and it was cool and windy. Richard dropped 
me off at the St. George hotel for a nap. Before going to sleep, 
though, I had to flush the toilet a few times just to watch the water 
swirl down in the opposite direction from what I was accustomed 
to. Having empirically narrowed my geographical coordinates to 
the Southern Hemisphere, I went to sleep. 

Two hours later, Richard and the kids picked me up for a tour of 
New Zealand’s capital. We went first to the new NZ $150-million 
city complex just being finished on the edge of Lambton harbor. 


175 


Exploring the Internet 


The complex includes not only the city offices, but a hands-on sci- 
ence museum for children, an art gallery, a huge library, and many 
other facilities for the public. 

The Council in Wellington used to own everything from a milk 
bottling company to the bus service and the power company. Al- 
though many of these functions have been privatized, Richard’s 
group still provides computing services to many of them. The col- 
lection of computers is known as City Net. 

Most of the computing power comes from a large DEC installa- 
tion, including nine big VAXen and a dozen pVAXen. Over 60 giga- 
bytes of disk space are available, most of it in a VAX Cluster. The 
cluster provides disk striping, volume shadowing, and dual porting 
of disks, all facilities that help ensure good performance and reli- 
ability. In addition to the DEC equipment, there is an AS400 used to 
automate the library, as well as 50 PCs, a Honeywell, and an IBM RS 
6000. 

Since the city used to own the tram service, Richard was able to 
pull fiber throughout the downtown area, stringing it above the 
tram lines. Inside the buildings, unshielded twisted pair was used 
to wire the individual offices. Both voice and data went over this 
common infrastructure. 

With a staff of 55, the computer dearth is able to deploy an 
impressive number of applications. A layered mapping database 
has the entire city of Wellington in it, including everything from 
sewers to phone lines to all roads and buildings. The mapping sys- 
tem is extensively used by city employees ranging from planners to 
mechanical engineers, and is even available to the general public 
through terminals in the library. 

What is most interesting about City Net is its open philosophy. 
An Ultrix machine on the edge of the network is on the Internet and 
city employees have access to the full range of Internet services. 
City Net even provides accounts to the general public on the gate- 
way system. Over 500 citizens of Wellington use the machine at no 
charge. 

Wellington has a very active bulletin board community with 
over 35 boards in a city of only 150,000 people. Many of these 
boards use the Waffle BBS software, which includes support for the 


176 


Wellington 


UUCP protocols, making integration of the bulletin board commu- 
nity into the Internet as simple as dialing up the City Net hub. That 
night, I watched 9-year old Jeremy composing messages for a pen 
pal in Pittsburgh on a little Toshiba laptop running the BBS soft- 
ware. The minute Jeremy was done, his older brother grabbed the 
machine. Periodically, the laptop would be plugged into an RJ11 
jack and mail exchanged with the central system. 

Everything from a World Wildlife Fund training center to the 
children’s museum to the milk company accessed City Net. Richard 
even wanted to put a hospitality database on the Internet to allow 
tourists to Telnet in and plan their vacations. 

City Net is one of the best examples of a network as a truly 
public infrastructure I have seen. Extensive use of e-mail by chil- 
dren as part of Kids Net, the Discovery Museum, or just individual 
correspondence with pen pals helps to ensure that there will be a 
new generation of computer-literate children. 

Providing a public utility to organizations like the milk company 
or the general public is done at very little marginal cost to the city. 
Many of the resources, such as the Internet gateway, are viewed as 
necessary for the city to do its job. Extending that service to the 
public or to commercial enterprises helps the city as a whole, as 
well as the direct users. 

Invited for dinner to Richard’s house, I brought two packets of 
Astronaut Ice Cream, which turned out to be the perfect gift. Chris 
was heavily involved in the local chapter of the Astronautics Asso- 
ciation of New Zealand and had heard of this astronomical delicacy 
only through rumors. Chris wanted more information for his club, 
so his dad suggested that he Telnet into the NASA public server or 
send e-mail to some of the online PR hacks. Chris wanted my e- 
mail address so he could ask me questions later. 

After a delicious dinner with a truly computer-literate family, 
Richard dropped me off back at my hotel. I had a Steinlager beer 
and watched steer wrestling from Montana in the bar before going 
up to pack for the next day’s trip. 


177 


Dunedin 


Saturday morning, I gulped down some fresh strawberries and a 
savory and took the plane down to Dunedin, on the southern tip of 
the South Island. The plane flew by the Southern Alps, then headed 
into the white-speckled hills of sheep country. New Zealand has 65 
million sheep and 3 million people, and the South Island is the site 
of huge farms. 


In Dunedin, I met Ian Forrester, Chief Scientist of the Ministry of 
Research, Science, and Technology. A former professor at Otago 
University in Dunedin, he keeps a house there even though he lives 
most of the time in Wellington. 


The house was an old farm house, honeycombed with gardens 
and pastures for the horses and sheep. Ian’s son, a medical student 
at Otago, lives there year round and Ian had come down for the 
summer holidays. We sat in a rose garden and drank Speight’s Beer 
(“Pride of the South” as the label reads, though in much the same 
sense as Stroh’s would be considered the pride of Detroit) while 
Ian’s son cooked up some artichokes from the garden. 


Ian started at Otago as a biochemistry professor. He was mar- 
ginally interested in computers, using tools like Medline to search 
databases and using an early Apple computer. His main interests, 
though, were medicine and agriculture. Agriculture is the key in- 
dustry in New Zealand and Ian was studying problems related to 
livestock. 


Although bats were the only native mammal to the country, 
deer, elk (brought in by Teddy Roosevelt), and lots and lots of sheep 
had taken root. Ian’s interest was in helping find ways to keep the 
population of animals genetically healthy. On a Ford Foundation 
fellowship in Laramie, Wyoming, he looked at topics like how to 
freeze elk semen to increase the diversity of the genetic pool. 
Throughout the 1980’s, Ian continued this line of research. He spent 
a few more years at Otago, got interested in biotechnology, and 
went to Madison, Wisconsin for a few years. 


178 


Dunedin 


Meanwhile, New Zealand was undergoing a revolution. The 
1987 stock market crash had reduced the stock index by one-third 
and recovery was only marginal. GDP was growing by only a frac- 
tion of a percent. 

In this dismal economic climate, and with a bloated government 
bureaucracy, New Zealand initiated a drastic deregulation cam- 
paign. Many large government departments became state-owned 
enterprises and many were then sold off. The telephone company, 
for example, was sold to Ameritech and Bell Atlantic. 

Even traditional government departments began to be run like 
businesses. Heads of government departments were called chief ex- 
ecutives. These executives negotiated contracts with specific output 
goals with the cabinet ministers for the area. Government employ- 
ees were put under contracts. 

Change was equally drastic in the area of government-spon- 
sored research. New Zealand had long emphasized government 
laboratories over university efforts for research. The government re- 
searchers were spread out in different ministries, such as agriculture 
and forestry. 

A small ministry of 30 people, to which Ian belongs, was formed 
to advise the cabinet on national research policies. Once the cabinet 
decided on national policy, money was funneled into a Public Good 
Science Fund, administered by a foundation. Researchers who 
wanted money submitted bids and, if they were awarded, signed 
contracts. Researchers were no longer guaranteed money if their 
work did not meet the strategic directions set out by the cabinet. 

The next step was to remove the research efforts from the opera- 
tional arms of the government. Ian and others worked as part of a 
committee which recommended that 10 independent research insti- 
tutes be established, each headed by a chief executive. This plan 
was approved in June 1991 and had been implemented so quickly 
that the institutes were opening their doors a mere one year later. 

As Chief Scientist, Ian was both scientific advisor to the govern- 
ment and an advocate for researchers. In going around and talking 
to people, he quickly saw that getting computers and communica- 
tions onto the desks of researchers was a way to help the entire 
scientific community. 


179 


Exploring the Internet 


Although there was a university network in place, linked to 
PACCOM, each of the government research groups also had their 
own networks. The technical level of networking was uneven 
throughout the country and interconnection was sporadic. 

With independent research institutes being formed, it was evi- 
dent that some form of unified research network was needed. As 
part of the proposal to form the Crown Research Institutes, a recom- 
mendation was inserted to make a national research network a stra- 
tegic direction. When the cabinet approved the divestiture plan for 
the institutes, a side benefit was approval for the national net. 

Working out the mechanics for institutes and networks kept Ian 
busy most of the time, but as the first occupant of the post of Chief 
Scientist, he also had some freedom to help define his job. Looking 
at a national research network exposed Ian to topics like broadband 
networks. If this was the wave of the future, was there some way to 
speed up the future? 

This was the genesis for the idea of making New Zealand into a 
world communications laboratory. Ian started to push the idea that 
the country could become a testbed for new technologies. Massive 
deregulation, small size, and an educated workforce would all make 
New Zealand an attractive place for large corporations to deploy 
and tune new technologies. 

With unemployment at 10 percent and GDP flat, this also might 
be a way out of New Zealand’s economic doldrums. Applications 
could be deployed to make industry more competitive and the 
workforce could be trained in high technology. He prepared a pa- 
per on the idea for the cabinet which authorized an in-depth study. 
When the second briefing paper was submitted, the cabinet asked 
Ian to start working with the private sector to develop a business 
plan. 

In New Zealand’s climate of deregulation, the World Communi- 
cations Laboratory was certainly not going to be a large government 
project. Instead, lan was trying to form a coalition, led by govern- 
ment but working with industry. 

How could New Zealand get a state-of-the-art telecommunica- 
tions system, the prerequisite to becoming a world testbed? Ian was 
hoping to follow the example set by the State of Connecticut. By 


180 


Dunedin 


pooling the purchasing power for telecommunications services and 
promising a long-term commitment, the state was able to convince 
Southern New England Bell that it was a sound business decision to 
invest in a large fiber network. 

When I spoke to Ian, many of the details of the World Commu- 
nications Laboratory were vague; the project was long on vision and 
short on substance. However, an active campaign was being waged 
to convince large corporations inside and outside of New Zealand 
as well as the general population that the project was viable. 

The project was publicly unveiled to people in New Zealand in 
November 1991. To help build a constituency, Ian emphasized the 
benefits of high technology to traditional industries such as agricul- 
ture. He painted a picture of food stores in England using interac- 
tive video to decide how they wanted lamb chops cut. The 
specifications would go straight to the meat packing plant, which 
would scan the carcasses and make the optimal cuts. Just-in-time 
inventory management for the meat-packing industry. 

At the same time, he was trying to drum up support from large 
multinational corporations for the project. He held a telephone con- 
ference with participants from groups like American Airlines and 
Citicorp to brief them on his vision. 

Ian had adopted the “highways of the future” metaphor of Sena- 
tor Gore with a vengeance. He saw the ports of the information age 
being established, and he wanted New Zealand to be one of those 
ports. The challenge would be building a political consensus and 
then performing the hard technical work to turn the vision into real- 
ity. 

Ian Forrestor’s World Communications Laboratory might or 
might not get off the ground, but this high-level policy focus on 
information technology was an important first step. Even if the 
only result turned out to be a good national research network, Ian's 
efforts would have paid off handsomely. 


181 


Auckland 


Saturday morning, I flew up to Auckland. With the whole weekend 
to kill, the largest city in New Zealand seemed to be a likely hunting 
range. Unfortunately, Auckland in January is kind of like Paris in 
August. A one-hour walk through town uncovered various flavors 
of tour groups but no Kiwis. 

It was time for guerilla tourism. I reported to my local Hertz 
dealer and negotiated a rental. Lacking any knowledge of New 
Zealand, I flipped a coin and headed North. One hour later, I had 
successfully managed to stay on the left side of the road and hadn’t 
run over any of the locals, so I left the motorway and got onto a 
sometimes-paved road down the Western shore. 

I ended up at Muriwai beach, one of the few nesting sites for the 
gannet. After watching mama gannets regurgitating fish into their 
offspring, it felt like dinner time so I headed back into Auckland. 

The pretty attendant at the Quality Inn suggested three restau- 
rants for me. At the first, located right on the water, the maitre d’ 
sniffed when I admitted to not having reservations and I was 
grudgingly shown to a table with a view of the wall next to several 
screaming infants. I declined. 

At the second restaurant, I was summarily dismissed for not be- 
ing a member of a tour group. At the third, I was told I could have 
a table, but would have to vacate it within the hour for the next 
booking. 

With visions of being tossed onto the street in mid-potato, I hit 
the streets to go hunting. Ten minutes later, I spied a hip-looking 
couple dashing into a nondescript door. I followed them into a 
funky little place that called itself Four Steps to Heaven. 

Four Steps to Heaven had a half-dozen tables and menus writ- 
ten on chalk boards. The grizzled cook in a white chef’s hat peered 
out from behind his counter to see if customers were enjoying them- 
selves. The waiter had a long spiel about the menu prepared and 
insisted on going through the talk in its entirety (despite the fact 
that I had heard three other tables receive the identical lecture). 


182 


Auckland 


The cuisine was absolutely first rate. I started with smoked 
salmon from the South Islands, served with a mustard sauce dusted 
with paprika, nestled in a sea shell. My main course was the most 
impressive rack of lamb I’ve ever seen served with a piquant mint 
sauce. My table was so small I kept kicking my laptop in the case at 
my feet, hoping not to damage my rack of RAM. 

Accompanying the lamb was a large platter of vegetables. The 
cauliflower was steamed and covered with a delicate cheese sauce. 
The potatoes were gratineed with onions. The piece de resistance, 
though, was zucchini, doused with ouzo, tomato juice, and hot pep- 
pers, and cooked with sesame oil. 

The next day, I drove south to the harbors and bays on the east- 
ern coast, cutting through farm land and country homes. Refreshed 
and ready to work, I dropped my car off and went home to pack for 
the next day’s trip to Australia. 


183 


Melbourne 


Sitting in the Auckland airport lounge, the power went out. The 
two ladies next to me immediately blamed the outage on computers 
and spent the next ten minutes yammering on about how comput- 
ers had ruined everything and had given rise to a younger genera- 
tion devoid of any useful skills. 

“They can’t even add without a calculator,” one sighed. I re- 
strained myself from commenting that she probably couldn't pro- 
gram a bubble sort to save her life. The large umbrella she kept in 
readiness at her side contributed to my reticence. 

Arriving in Melbourne amidst a spate of “g’days,” I presented 
my gift salamis at customs for inspection. Despite my pleas, the 
Sausages were impounded and destroyed, leaving me without a 
food offering for my upcoming visit to Bangkok. Without a food 
offering, I had no bribe to motivate my friend the restauraunt critic 
and I had visions of him exacting his revenge by taking me out for 
Swiss steak and succotash. 

I deposited my bags at my hotel and set off to try and read my 
e-mail. I took a tram towards the city, crossed over the Yarra River 
and Batman Avenue and headed up the hill to the University of 
Melbourne. There, I found the location of the Information Technol- 
ogy Center on the map and sat myself down in a large room filled 
with PCs and Macs. I picked a likely looking 386 and typed “‘tel- 
net,” and sure enough, a few seconds later I was happily deleting 
messages. 

Since I wasn’t expected until the next day, I walked back down 
the hill to find the world famous Royal Botanical Gardens. Both a 
formal garden and an arboretum, this is the kind of place you find 
written up in coffee table books and issues of the National Geo- 
graphic. 

The gardens certainly deserve their reputation. I walked past a 
cluster of Hoop pines, past a huge Monterey cypress planted by 
Prince Leopold in 1910, and through a grove of small but pungent 
Bhutan cypress. Next to all these evergreens was the Canary Island 


184 


Melbourne 


Bed, with a rare arrow-wood tree surrounded by cactus-like succu- 
lents and asteraceae. 

Further down the path was a row of aloe plants ranging from a 
few inches tall to huge bushes. Spiny agave and Mexican Yucca 
were mixed in, giving the desert-like setting a sharp contrast to the 
California air of the evergreens. 

Below the beds was an intricate ornamental lake filled with 
ducks and black swans, edged with English Elms, Irish Strawberry 
trees, and groves of bamboo and Brazilian Pampas grass. To my 
disappointment, that evening’s showing of A Midsummer Night's 
Dream was sold out, so I set out to find some dinner. 

The closest I could find to local food was an Aussie Burger, a 
nice hamburger topped with the traditional bacon, egg, and beets. | 
headed instead up to Toorak Road for some Italian food. 

Most of the restaurants were BYOs, so I went into the bottle 
shop and picked up a half bottle of local Cabernet Sauvignon, then 
went into Molina’s Bistro, truly a fortuitous find. The appetizer was 
a Cervello alla Grenoblaise, lamb brains coated in beer batter and 
served with a delicate sauce of chives, capers, and lemon wedges, 
garnished with sprigs of fresh basil and fennel. It was accompanied 
by fresh, warm bread, dusted with basil and oregano from the herb 
garden out back. 

My main dish was Saltimbocca a la Romano, baby veal in a 
sauce of sage and white wine, and served with a timbale of potato, 
onions, mushrooms, and cheese. Dessert was a home-made liqueur 
ice cream. Stuffed, I walked back to the hotel to get ready for my 
meetings the next day. 


0 


Tuesday morning, I went back up the hill to find Chris Chaundy, 
Networks Manager for the University of Melbourne. The university 
network connected 74 buildings with a mix of fiber, unshielded 
twisted pair, microwave, and leased lines. Originally a massively 
bridged network, the university was rapidly completing the transi- 
tion to a network based on routers. 


185 


Exploring the Internet 


The university is split into Mac and PC camps. The Macs used 
AppleTalk and 53 Banyan Vines servers take care of the PCs. The 
backbone network is mainly TCP/IP, although large DECnet and 
CDCNET applications are still running. 


AppleTalk clients access the TCP/IP world using a Webster mul- 
tiport gateway, a device similar to the Kinetics Fastpath. The mul- 
tiport gateway was developed on campus. before being 
commercialized by Webster. 


All told, the network is your basic professionally-run, produc- 
tion environment. Large machines such as a Cyber 990, an IBM 
3090, and a Maspar are all on the net. The library card catalogue, 
WAIS, X.500, and all the modern information services you would 
expect are all available. 


This is one of those operations that has everything you would 
want. The information technology center has a regular, frequent 
schedule of training classes, extensive documentation, a custom pro- 
gramming group, a proactive help desk, spacious labs, and a trouble 
ticket system. 


This is great for the university community, but certainly posed a 
challenge for the digital tourist. After all, what can you say about a 
place that does everything right? | 


After my briefing with Chris, I went across the street to meet the 
elusive Robert Elz, a long-time inhabitant of the Internet. Robert 
rarely works, or, for that matter even wakes, during the day, but I 
was in luck. Cricket matches were on this week and Robert had 
inverted his chronology to watch the games and post the results into 
netnews. 


Robert’s desk was stacked a few feet deep with paper, leaving 
only enough room for a keyboard and a half-dozen empty Coke 
cans. Robert had just returned from giving seminars in Thailand 
and the top of his stack included Thai-language keyboard templates. 
His wall had a map of all undersea cables in the Pacific region. 


After some chitchat with Robert about mutual friends in Bang- 
kok, I had worked a full two hours and then it was tea time. Back 
at the hotel, sitting in the lobby, I listened to the drivel of a lounge 
lizard playing a baby grand piano. 


186 


Melbourne 


After the second drink, I realized that the piano was unmanned. 
The thing had broken into a jaunty Elton John tune, so I walked 
over to investigate. Under the piano was a Yamaha Disklavier, a 
digital version of the old player piano, hooked up with solenoids to 
activate the keys and provide a very exact replica of the original 
performance. The Elton John tune was from the album “Don’t 
Shoot Me, I’m Only the Piano [Player].” 


187 


Sydney 


Wednesday evening, I flew in over the Sydney opera house and, 
after checking in, darted across the street for a quick bite of barbe- 
cued octopus. With a little time to kill, I strolled through neighbor- 
ing King’s Cross, the home of Sydney’s red light district. Sipping a 
Foster’s, I watched the strange melange of prostitutes looking for 
their first action of the night, world-weary backpackers trying to en- 
tertain themselves on a dollar, and a hip-looking hippie driving an 
antique Jaguar. Several Hare Krishnas trooped by, reminding me 
that it was time to go to work. 


I was soon met by Bob Kummerfeld, chairman of the University 
of Sydney’s Computer Science department. We dodged raindrops 
from my hotel over to the Hernandez Café, where we sat and talked 
over a café latte and a cappucino. Bob Kummerfeld was part of the 
first wave of networking, sparked by the Landweber symposiums. 
Bob attended his first one in Dublin, and ended up hosting the 1989 
symposium in Sydney, the last one before the informal seminars 
metamorphisized into the much larger INET conferences. 


In the late 70s, armed with VAXen and PDPs, Australia, like eve- 
ryplace else, wanted to connect their computers together. Running 
an early version of UNIX, the obvious choice would have been to 
use the UUCP protocols. UUCP had some features that not every- 
one liked. Its designers had intended UUCP as an interim solution, 
but, as often happens with prototypes, it rapidly became en- 
trenched. 


Kummerfeld and his partner, Piers Lauder, decided that they 
could do better and set about designing an alternative set of proto- 
cols. The result was the Sydney University Network, known as the 
SUN protocols. The SUN protocol suite started out being used at 
Sydney, the software was quickly picked up by Robert Elz in Mel- 
bourne, and, by 1988, 1,000 sites were on the network. Since the 
acronym SUN was identified with the Stanford University Network, 
the collection of computers that used Kummerfeld and Lauder’s 


188 


Sydney 


protocols eventually became known as the Australian Computer Sci- 
ence network (ACSnet). 

SUN is a protocol suite optimized for message handling. Unlike 
TCP/IP, it was not designed for interactive services such as Telnet. 
Message handling can be much more than e-mail and the SUN pro- 
tocols supported services such as file transfer and remote printing. 

The unit of transfer is the message, which can be infinitely long 
(although in practice, very long messages are broken up into man- 
ageable pieces). While UUCP performs error correction as it trans- 
fers the data, SUN uses a streaming protocol to send the entire 
message, identified as a series of packets. When the message is 
transmitted, the receiving end sends back a bitmap of corrupted or 
missing packets and those packets are then retransmitted. 

When a connection is established between two hosts, UUCP 
only supports transfer of a single message in one direction. SUN, 
by contrast, is multichannel and full duplex. Full duplex means that 
messages can go in both directions. Multichannel means each direc- 
tion is divided into four logical channels of different priorities. 

Channel 1 is the highest priority and is used for network man- 
agement messages. An example would be a message to decrease 
the packet size from the default of 1 kbyte down to the minimum of 
32 bytes. On a dirty line, small packets reduces the amount of data 
to be resent later since an error would affect a smaller chunk of the 
message. It does so, of course, at the expense of throughput. 

The other three channels are used for different kinds of message 
transfer. E-mail messages would typically travel on channel 2, al- 
lowing mail to get through even though a large file might be occu- 
pying channel 4. While it might take a longer time to get a large file 
through a link, it does mean that other applications are not frozen 
totally off the line. 

With multiple channels sending data, a cut in the line can inter- 
rupt several different messages. Rather than start sending the mes- 
sage again, SUN allows the session to start up where it left off, 
something that UUCP does not do. 

Use of multiple channels also tends to improve line utilization. 
When a message is received, the destination node must typically 
perform some processing. In a single channel application, the line 


189 


Exploring the Internet 


would be idle during that time. With four channels, data transfer 
can continue. 

Riding on top of the message transfer facility are applications. 
The suite has standard facilities such as file transfer and electronic 
mail and users can design their own protocols. 

The file transfer protocol allows both senders and receivers to 
initiate transfers. To send a file, for example, the recipient’s user- 
name and host are specified. The file would be spooled onto the 
target machine and e-mail sent to the recipient. The recipient could 
then chose whether or not to accept the file, moving it into personal 
disk space. 

E-mail supported standard Internet-style mail based on RFC 822, 
making a gateway to the TCP/IP mail system almost a trivial task. 
E-mail with the SUN protocol suite allows the transfer of arbitrary 
binary images, a feature that has been only recently added into 
SMTP and RFC 822. 

The architecture of messages and packets used in SUN allows a 
wide variety of different substrates to be used. Direct lines, mo- 
dems, and X.25 are all used and the protocols can run on top of IP. 
Bob even claimed that the protocol could run successfully on tele- 
graph lines, although nobody had yet had a pressing desire to run 
applications at 50 bps. 

While Bob went on and described features ranging from dy- 
namic routing protocols to broadcast and multicast support, I began 
to wonder why I was using UUCP on my home systems. The an- 
swer was fairly simple: UUCP was free and SUN wasn't. 

Kummerfeld and his partner had formed a company called Mes- 
sage Handling Systems to market the software. The University of 
Sydney had a one-third stake in the company and the software was 
being pedaled as MHSnet. Formed in 1988, the company was still 
in its early stages, but Bob told me about a few recent successes. 
One was a large insurance network that links brokers together. The 
other was the Australian diplomatic corps, which would use 
MHSnet to link their worldwide operations. 

Both groups were attracted to MHSnet by its ability to run over 
a wide variety of different transports, ranging from telegraph to IP. 
The message-based paradigm is quite appropriate for environments 


190 


Sydney 


with only sporadic connectivity. The software is small and efficient, 
taking less than 100,000 lines of code. 

Selling MHSnet to the government brought up the spectre of 
GOSIP. 

“Didn't you have problems with OSI bigots?” I asked. 

OSI was certainly an issue, he explained, but eventually it came 
down to practical issues such as whether software existed that could 
do the job. OSI as a general architecture certainly had appeal to 
many, but a lean and mean OSI that could run on low-quality, low- 
speed lines was not readily available. Indeed, one could argue that 
searching for such a beast was akin to looking for a hippopotamus 
capable of doing the limbo. 

To Bob and many others in the research community, OSI has ac- 
tually had a negative effect. If he proposed to do research on mes- 
sage handling, for example, somebody would invariably suggest 
that X.400 had already solved the issue and further research was 
superfluous. 

Bob’s theory was that the OSI wave had finally crested and peo- 
ple were settling on an environment characterized by IP over Foo 
and Foo over IP. OSI had promise, but while large groups had large 
meetings in a large number of locations, the IP community had 
mounted an equally ambitious but much more successful standards 
effort. 

The IP process was organized to suit the needs of the technical 
people, not the desire to reach a political consensus among market- 
ing representatives. The crucial difference between the two groups 
was that implementation and testing was the cardinal rule for the 
engineers. Bob cited the recent extensions to SMTP and RFC 822 to 
handle different kinds of data as an example. By the time the im- 
plementations reached standards status, a half-dozen implementa- 
tions would already exist and be deployed. 

The success of the Internet community didn’t necessarily mean 
that there was no role for the more formal (i.e., slower) procedures 
like those used at the ITU. Bob pointed to a low-level substrate, 
such as the definition of a digital hierarchy of line speeds, as an 
issue that needed to be codified, ratified, and digested by a hierar- 
chy of committees. 


191 


Exploring the Internet 


Of course, if low-level issues are the province of the public 
standards cartel in Geneva, that kind of leaves OSI out in the cold. 
After all, OSI starts work at about the same level as TCP/IP does. 
Since the OSI standards potatoes insist on defining theory first and 
leaving the implementations to “the market,” they have little to con- 
tribute to the upper layers of the network, where implementation 
and testing are crucial. 

I bid Bob Kummerfeld goodbye and went to my room to watch 
Dallas. It struck me that the politics of the Geneva standards cartel 
had an overwhelming resemblance to the goings-on at the Ewing 
Ranch. Perhaps I could write a nighttime soap called “ISO,” com- 
plete with a season finale of “Who Killed FTAM?” 


192 


Canberra 


Canberra became the capital of Australia for the same reason Wash- 
ington, D.C. became the capital of the U.S. In Australia’s case, Can- 
berra was chosen because it wasn’t Melbourne and it wasn’t Sydney 
and because it was somewhere between the two. 

Canberra is also the capital of the Australian Academic Research 
Network (AARNet), a network managed by Geoff Huston. The net- 
work came into being after ACSnet began to feel the strain of, as 
Geoff puts it, “networking on two bob.” ACSnet was strictly a vol- 
unteer effort between the computer science departments, with no 
management and no funding. 

DEC’s educational group had been providing international ac- 
cess, but after somebody took over the pipe for two days for a mas- 
sive file transfer, they pulled the plug. Robert Elz, who had been 
handling most of the international liaison work, arranged an X.25 
connection to UUnet in Virginia. 

X.25 costs money, so Elz wrote software to provide accounting 
and chargeback to the users. Then, the first leased line, operating at 
2,400 bps, was installed between Melbourne and Sydney. Network- 
ing was starting to cost money and it was evident that a more coor- 
dinated effort was needed. 

About this same time, the central computer departments de- 
cided that networking shouldn't be left to computer science. The 
computer departments put together a proposal for a national re- 
search network based on X.25 and the U.K. Coloured Book stand- 
ards. 

This group went to the federal government, but the feds had no 
interest in funding a national network. Next, they approached the 
committee of Vice-Chancellors, a group of the heads of all 38 uni- 
versities formed to lobby for the interests of higher education 
against other groups competing for a slice of the federal pie. 

The Vice-Chancellors were interested, but weren’t about to just 
hand the computer centers carte blanche. They initiated their own 
feasibility study. With the feasibility study, they decided the idea 


193 


Exploring the Internet 


was worth pursuing and, in January 1989, formed two groups to 
develop the idea. 


The first, the technical group, met for the first and last time that 
same month. “It was bloody obvious what needed to be done,” 
Geoff said. The network would simply be multiprotocol routers 
and leased lines. No code to write, no research issues to investigate. 
You simply took out the price books and tariff charts and figured 
out what you could afford. 


The policy and steering group only met three times. The Vice- 
Chancellor who chaired that group made it clear that they were 
there to build a network, “so let’s get on with it.” Geoff Huston is 
credited by many in Australia for helping to make sure that the 
process moved smoothly in both the policy and technical groups. 


By November 1989, everything was done. Geoff placed orders 
for leased lines and Cisco routers, telling both vendors he wanted a 
delivery date of April. He told Cisco how he wanted the routers 
pre-configured. With that much lead time, there was no excuse for 
delivery problems and none occurred. 


In the last week of April, all the boxes were in their locations 
and the 48 kbps lines were up and running. For the next three 
weeks, Geoff and his one other staff member toured the country 
turning on the boxes and connecting them to the campus Ethernet 
and the leased lines. In a total of three weeks, the entire network 
was up and running. 


The network continued to be run with only two people, even 
though it had expanded to 2 Mbps lines on key routes and had a 
huge growth in traffic. By January 1991, over 40 Gbytes per week 
were being transferred on the network. One year later, 77 Gbytes 
per week went through, and peaks of 120 Gbytes per week were not 
uncommon. 


The lack of religious battles over the network and the clockwork 
installation are widely credited to Geoff Huston’s deft leadership. 
He defused any attempts to make the network overly complicated 
and insisted on a multiprotocol backbone so that any traffic the cus- 
tomer wanted to transfer could be transferred. He showed that in- 
stalling a national network can truly be no fuss, no bother. 


194 


Canberra 


While hooking up the network internally was straightforward, 
there still remained issues in the Internet as a whole that were hav- 
ing a real effect on the operation of AARNet. Geoff gave me a dra- 
matic example of one of these issues. 

He started a traceroute to Barry Shein of Software Tool and Die, 
a well-known member of the Internet community. The traceroute 
went out from Canberra to the AARNet routers, reached NASA 
Ames and then failed. Barry is connected to the Internet via one of 
the Commercial Internet Exchange (CIX) members and AARNet 
connects to the Fix West. Since the NSFNET had refused to allow 
its routers to announce the presence of networks that had not signed 
the Appropriate Use Policy (AUP), the result was a fragmented In- 
ternet. 

Software Tool and Die was a classic example of commercializa- 
tion of the network. Barry Shein started the operation as a commer- 
cial IP service provider, giving over 1,000 people access to the 
Internet for an hourly fee, exactly the kind of thing the AUP warned 
against. Software Tool and Die could have waffled the issue, sign- 
ing the policy and issuing severe warnings to its users, but that 
seemed kind of silly. 

Since Software Tool and Die was an AlterNet hub, Barry Shein 
estimated that they had access to over 80 percent of the Internet. 
AlterNet was on the CIX, and most regionals had set up back door 
paths to one or the other of the commercial networks. Several com- 
mercial links to Europe existed, making international access to the 
EBONE and its regionals straightforward. In the U.S., only a few 
regionals in the Midwest had a single connection to NSFNET and 
were unreachable by Software Tool and Die customers. Most of the 
Pacific Rim, however, squeezed through the single Fix West link, 
and was cut off. 

Geoff Huston was quite adamant that the Internet was facing 
many serious issues, fragmentation being one of the more visible. 
The address space was quickly filling up, there were so many net- 
works that routing protocols were thrashing, and a host of other 
problems were surfacing. 

These problems were not inevitable in Geoff’s eyes. The Internet 
began as a single global community with ad hoc regulation of the 


195 


Exploring the Internet 


network for the common good. Over time, under the pressures of 
massive growth and commercialization, the common view splin- 
tered into many camps. Global connectivity is a key issue for the 
Australian community. At the end of a long, skinny pipe, much of 
their traffic is communication with other parts of the world. 

There is no group that worries about global connectivity, or even 
provides much in the way of a global regulatory framework and 
places like Australia, on the frontier of the Internet, feel the impact 
of this lawlessness first. The IAB had long been charged with look- 
ing out for the Internet, but Geoff pointed out that the heavy Ameri- 
can bias of the IAB doomed it, particularly in Europe. Many 
Europeans continue to refer to the TCP/IP protocol suite as “DoD 
IP’ to emphasize the American military origins of the Internet. 


While the IAB had failed to provide a global framework for con- 
nectivity, the engineering arm, the IETF, had not always provided 
solutions to the problems that needed solving. Geoff emphasized 
that the IETF was a “tremendous asset’ but also cited Marshall T. 
Rose’s comment that “adult supervision” was needed. 


The problem he saw was the lack of direction given to the IETF. 
The IAB and the IETF Steering Group (IESG) failed at times to pro- 
vide a solid agenda and timetables of engineering problems that 
needed solutions. Problems such as the address space exhaustion 
were studied in a fairly ad hoc fashion, even as the problems be- 
came more and more pressing. 


The IETF also suffered from an influx of goers and an increasing 
tendency by many to treat the occasion as a social forum rather than 
a working environment. 


So what forum should guide the evolution of the Internet? 
Geoff placed some hope in bodies like the Internet Society, but also 
wanted to see an operational solution to the problem of global con- 
nectivity. 


To participate in the global telephone network, you have to 
agree to certain sets of regulations in order to plug in. Geoff wanted 
to see some baseline regulations defining how one cooperates in the 
global network and, most importantly, a place to plug in to a global, 
neutral backbone. 


196 














INTEROP Before Midnight 













































































































































































































































































































































































































































































































































































ee 







































































































































































































































































































































































































































































































































































































































































The Akihabara ‘With Me’ Girls 





An ISDN Pay Phone 





Motherboard Sale 









































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































Juha Heinanen in His Castle 














Milo Medin and the Class C Airplane 




















Canberra 


The NSFNET is an American backbone that also doubles as a 
global backbone, provided you play by NSF rules. Geoff wanted to 
see some higher tier, say some FDDI-like point of interconnection. 
This ring would have no policies prohibiting certain classes of traf- 
fic. If you pay your share of the ring infrastructure, and abide by 
certain technical rules, you can join. 

Once on the ring, it is up to each individual member to decide 
whether or not to accept traffic from other ring members. This bi- 
lateral decision would allow the NSFNET to decline to accept com- 
mercial traffic without at the same time fragmenting the 
connectivity of the entire Pacific region. 

That night, over dinner and drinks at Geoff’s house, I brought 
up the question of international bodies again. He had high hopes 
for the Internet Society and I was curious whether he shared the 
opinion of Bob Kummerfeld in Sydney that the OSI process was a 
negative influence. 

Geoff felt that OSI was a good thing. It had kept all the goers 
busy, preventing them from turning their attention to forums where 
real work was being done. Had OSI not existed, all these people 
would have looked around for something to do and found things 
like IETF meetings. 

Under the Huston theory of standards development (and like 
any good theory, it helped predict and explain many phenomena of 
the standards world), one of the best things that could be done for 
the Internet community would be to initiate a movement for OSI++, 
keeping the standards potatoes fully occupied for another ten years. 


197 


Adelaide 


Friday morning, I was up at an obscenely early hour to catch my 
flight to Adelaide. It was the end of a hectic week in Australia and I 
was off to meet Simon Hackett. 


Simon took me to Internode Systems, his startup company of 
three people with a suite of offices located behind an Adelaide re- 
alty company. While Simon handled the usual run of emergencies 
caused by being away for an hour, I examined a disemboweled Sun 
2 in the corner, an ancient machine based on a Motorola 68010. The 
huge 100 amp power supply had died, which was just as well be- 
cause, as Simon pointed out, the thing drew enough power to drive 
a welder. Instead, a power supply from a little PC had been put 
into place and the Sun was up and running. 


Simon is best known for putting funny things on the Internet. 
At INTEROP 90, with the help of TGV, he showed off his Internet 
CD player. The Internet CD player was a stereo system controllable 
over the network. Connectivity to the net was provided by a 
“magic box,” consisting of a Motorola 68000 CPU, some memory, 
and a couple of RS-232 ports. 


The box was connected to the INTEROP show network using a 
SLIP link off one of the RS-232 ports. Portable TCP/IP software 
from TGV and portable SNMP code from Epilogue Technology were 
put into the magic box. 

The stereo system was a Pioneer tuner/amplifier, a Pioneer PD- 
M910 six-disc CD player, and two Klipsch speakers. The CD player 
has a “remote control in” jack, allowing control of both the tuner 
and the CD player. The output signal from the CD player has a mix 
of digital audio samples and status information. 

An SNMP MIB was defined and some X Window System soft- 
ware was written to interact with the SNMP module on the magic 
box. Of course, any SNMP network management station could have 
been used, but the X software had a nice visual representation of the 
stereo system. When the network management station changed a 


198 


Adelaide 


MIB variable, that information was used by Simon’s code on the 
magic box to control the CD player. 

The problem with doing something cute like the Internet CD 
player is that everybody expects you to top yourself the next year. 
At INTEROP 91 Fall, Simon separated the speakers from the CD 
player, using the Internet to distribute sound. The result was the 
NetPhone. 

The NetPhone is basically just a protocol for encoding sound (or 
any other data) on the network. This protocol, the MultiMedia Data 
Switch (MMDS), is built on top of UDP. MMDS takes a sample of 
data, and puts it into a UDP packet along with information such as 
the sampling rate and encoding format. The protocol can handle 
most isochronous data such as video or audio. 

The user input to the NetPhone is simply an audio board, such 
as those that are commonly found on Sun, NeXT, PC, or Macintosh 
computers. A telephone, speakers, or a microphone can all be con- 
nected to these boards. 

To provide connections between two NetPhones, a switchboard 
was implemented on a VAX. A phone makes its presence known by 
registering itself with this central switchboard. To place a call, a 
user issues a request to the switchboard, which then contacts the 
destination. If the two devices are available and have compatible 
sampling rates, a connection is established. 

If only two nodes want to talk, it doesn’t make sense to have the 
switchboard in the middle. In that case, the switchboard issues re- 
direct commands allowing the two nodes to send data packets di- 
rectly to each other. In the case of multiport calls, data goes to the 
switchboard which replicates the packets and resends them. 

MMDS is thus more than just a phone protocol, it is a way of 
moving sound and video around a wide-area network. At IN- 
TEROP 91 Fall, there were NetPhones on various computers, allow- 
ing people to talk to each other. People could place calls to the CD 
player in the TGV booth and listen to music. There were also two 
tuners, one in Melbourne and the other in Santa Cruz, allowing peo- 
ple to listen to radio broadcasts from either of the two cities. 

NetPhones are one paradigm of moving sound over the net- 
work, and similar efforts are underway in several places, including 


199 


Exploring the Internet 


Xerox and ISI, to develop ways to use this technology. Another ef- 
fort to incorporate sound into the network is multimedia electronic 
mail. 

Were the two paradigms complementary or would one win? Si- 
mon felt that not only did we need both message-based and real- 
time voice transfer, the two technologies should be aligned, so a 
voice message could be redirected to a NetPhone, or so that a Net- 
Phone might act as an answering machine, recording messages and 
then mailing them to the user. 

Messaging is an important way to interact with people and cer- 
tainly works on a one-to-one basis. However, the NetPhone also 
supports broadcast technologies, as in the case of allowing people 
all over the world to tune in to Melbourne radio and catch the 
cricket matches. 

Simon was continuing to work on the question of moving voice 
around the network. He was looking at ways that the switchboard 
could be taken out of the loop and various other enhancements to 
the MMDS protocol. 

His real interest, however, was the ability of the magic boxes to 
put arbitrary devices on a network. In that vein, he was working 
with Epilogue Technology to develop portable networking code that 
could be put on small, cheap boxes. That code includes TCP/IP, 
SNMP, and even higher level services such as NFS or the Ipr proto- 
col for line printing. The code runs on a box as stand-alone soft- 
ware, alleviating the overhead of a full operating system. 

The possibilities for such a box are very intriguing. Think about 
being able to put an NFS server on the network by packaging a few 
disk drives into a small box. Or, put a tape drive in with a box and 
use that as a remote backup device on the network. The number of 
devices one could put on the network with a cheap interface are 
endless. How about a machine room temperature monitor? Or a 
toaster? 

After we were done playing with the NetPhone and I had read 
my mail, we went to Simon’s house where I met his partner in Inter- 
node Systems, Robyn Hill. Robyn is also a naturalist and conducts 
tours of the Great Barrier Reef, the outback, and other scenic attrac- 
tions in Australia. 


200 


Adelaide 


The next day, Robyn, Simon, and I went for a tour of the Barossa 
Valley, one of Australia’s premier wine making regions. As we did 
the Barossa crawl, I was able to sample wines ranging from the typi- 
cal mixes of Cabernet Sauvignon and Shiraz to more unusual varie- 
ties such as a fruity Alicante. 


I was also able to replace the salami that was destroyed at cus- 
toms with an appropriate offering of food for my friend in Bangkok. 
Each vinyard sold a variety of condiments, and I stocked up on 
pickled prunes and kiwi jams. 


That night, we went to dinner at the Magic Flute, a posh restau- 
rant in trendy North Adelaide. I started with a truffled boned quail, 
stuffed with a rich pheasant pate and glazed with aspic. My main 
course was an exquisitely prepared pigeon served over wild rice 
and finished with a Madeira glaze. Simon had the peppered kanga- 
roo filet in a port gravy, garnished with the omnipresent beets, and 
Robyn chose rare mignons of venison. 


Over dinner, we discussed the bizarre bribery trial of Joh Bjelke- 
Petersen, for decades the Premier of Queensland. It was alleged 
that Bjelke-Petersen wanted money from Alan Bond, one of the 
more prominent rat-pack Aussie businessmen. Instead of just hand- 
ing Over money in a brown paper bag, however, it is alleged that the 
bribe had an ingen ious twist. Allegedly as a prearranged pretext, 
Bond's national television network publicly insulted the prime min- 
ister. Bjelke-Petersen turned around and sued for libel and the case 
was settled out of court for cash. 


While our dinner was good, dessert was absolutely spectacular. 
Robyn insisted we all get different things so she could taste them 
all. She ordered a gratin of raspberries and blueberries, cooked in a 
lemon custard and blowtorched on top to caramelize the sugar, then 
finished with an orange butter sauce. Simon had the hazelnut cake 
on a coulis of fresh coffee beans, and I had an ice cream confection 
of raspberry, mango, and passionfruit, separated by thin layers of 
chocolate licorice ice cream. Many fine lunches and dinners, indeed. 


We headed back and I slept in their spare room, along with 
three very fat tree frogs that Robyn keeps, and a mountain of old 
disk drives that Simon keeps. 


201 


Singapore 


Monday morning, I headed down Singapore’s spotless streets and, 
for Asia, an eerie lack of chaos, up to the National Computer Board 
to meet with Lew Yii Der, an engineer with Singapore’s Public 
Works Department. On my last visit, I was told that a contract had 
been awarded for an electronic road pricing system, and I was eager 
to learn more details. 


Since 1975, Singapore has attempted to reduce congestion in the 
central business district by charging a fee to enter the area during 
morning and evening rush hours. There are 26 entry points to the 
central area, known as the Restricted Zone. 


Before entering the Restricted Zone, a motorist pays SG $3 (U.S. 
$1.76) for a license and, when passing the entry point, ensures that 
the large pass is prominently visible on the left side of the wind- 
shield. Failure to prominently display results in your license num- 
ber being noted by the police patiently waiting by the side of the 
road and a ticket being mailed to your home. 

On a typical day, 300,000 vehicles enter the Restricted Zone, of 
Which 74,000 enter during the controlled periods. While the system 
has certainly reduced congestion by keeping those without the will 
or the resources away during rush hour, it has some drawbacks. 


The biggest problem is the manual nature of the system. Cars 
must stop to buy a license and then slow down to wave it around. 
Fifty-two officers must be present at the 26 entry points to enforce 
the system. 


Many cities throughout the world are investigating ways to re- 
duce congestion in central business districts. Lew Yii Der explained 
the two classes of solutions: passive and active. In a passive system, 
people maintain accounts with the government. When you enter a 
restricted area, a charge is made to a person’s account. Passive sys- 
tems thus require central billing, are difficult to maintain, and, even 
for Singapore, are considered too intrusive. An active system uses a 
stored value card. Buying a card for a subway and then running it 


202 


Singapore 


through a reader to activate the turnstile is an example of an active 
system. 

While I had understood, perhaps wrongly, on my previous visit 
that a contract for an active system had already been awarded, a bit 
of further discussion turned up the information that not only had 
the contract not been awarded, but the RFP was not yet out. An 
RFP had been issued previously, but it was worded so vaguely that 
vendors were not sure what to bid. 

Lew Yii Der gave me an outline of what the new RFP would 
specify. Smart cards would be mounted on all car windshields. 
Value for the cards would be added at sales outlets, where the mo- 
torist could also review the transaction log stored inside the card. 

When a motorist entered the Restricted Zone, the car would pass 
under a microwave beam, which would debit the appropriate 
amount from the card. If the card didn’t have enough money on it, 
a camera would be activated to take a picture of the rear license 
plate. 

Since the system didn’t exist, it was a bit hard to get more tech- 
nical details, so I spent the rest of my allotted hour trying to learn 
more about other traffic control systems. 

Like most big cities, Singapore has computerized its traffic lights 
in the busy parts of the city. The original system, installed in 1983, 
was a fixed system, meaning that the lights changed on some pre- 
arranged timetable. Each light had a phone line to a PDP computer 
which controlled the lights and attempted to form “green waves” so 
motorists could drive without stopping. 

In 1987, Singapore installed an Australian dynamic traffic man- 
agement system called SCATS. In addition to the traffic light, each 
intersection in this system has magnetic detector loops under the 
pavement, used to measure the flow of cars. A local controller at an 
intersection can use the absence or presence of cars to change lights. 
The data from the detector goes to the regional PDP computers, 
which use the traffic data to adjust light patterns while trying to 
establish green waves. Data from regional computers goes to a VAX 
11/750, which is used by headquarters staff to monitor traffic status. 

The traffic subsystem is also tied into the emergency fire system. 
Every major building in Singapore has a fire detection system tied 


203 


Exploring the Internet 


into the fire stations. When there is a fire, trucks are automatically 
dispatched from fire stations to the fire location and the traffic sys- 
tem is used to provide a green wave for the trucks. 

Between the parking control, the Restricted Zone, the traffic light 
management, the incredibly clean streets, and the gum-free subway 
system, it was certainly clear that Singapore was able to control the 
flow of people and vehicles in the city. I had to ask myself, how- 
ever, if there wasn’t some tradeoff between efficiency on the one 
hand and, on the other, an atmosphere that promotes a vibrant, 
creative, and (yes) fun place to live. 


0 


On my previous visit, I had learned about Tradenet, an EDI applica- 
tion for clearing customs paperwork. I had heard that not only was 
the customs work computerized, but that the Port of Singapore 
Authority (PSA) also had extensive systems. As with all things 
computer related, the National Computer Board was the place to 
start. 

Singapore is one of the world’s busiest ports. Since the opening 
of the Suez Canal in 1869, the island has been a major entrepdt port, 
serving as a clearinghouse between destinations in Europe and Asia. 

That afternoon, Chew Keng Wah of NCB brought me down to 
the Tanjong Pagar terminal where container ships are loaded and 
unloaded. We met with Ang Chong Hoat, an MIS manager for the 
port. 

Running a terminal as large as Tanjong Pagar is a highly com- 
plex scheduling problem. When a ship arrives, containers have to 
be unloaded and other containers loaded. Cranes mounted on rails 
are moved up and down the length of the wharf and are used to 
move containers on and off ships. 

Incoming containers are then placed on trucks and run over to 
an adjacent storage yard. There, containers are picked up by an 
even bigger crane, a transtainer, a device that constructs huge piles. 
When the ship arrives that is to carry the container to its destina- 
tion, the container makes the reverse journey back onto a ship. 


204 


Singapore 


The trick is to pile the containers so they are readily available 
when needed. You hope that the container you need at a given time 
is not buried under a pile of other containers that are not needed 
until later. It also makes sense to keep containers for similar desti- 
nations in the same area so the transtainer does not have to be 
moved around. 

The goal of all this is to minimize the amount of time a ship 
stays berthed at the terminal, thus making more effective use of 
scarce resources. This minimization is done in an environment of 
scarcity, where cranes, ships, transtainers, and berths are all finite 
resources. 

Planning the loading and unloading of ships and the subsequent 
placement of containers in the yard was once the province of a few 
highly skilled experts churning out plans by hand. A plan for a 
single ship could take many hours to work out. To automate the 
process, the Port Authority and the NCB developed an expert sys- 
tem to assist in the process, cutting the amount of time to develop a 
plan for a ship in half. The expert system was developed on Sun 
Workstations in Objective C and Lisp and took over 20 person- 
years. 

The ship planning system is the first of six that the PSA will 
eventually deploy. Other systems will try to place ships in berths 
adjacent to the correct yards, or try to take ships in a yard and place 
them in a correct berth, or make available the proper number of 
resources for the unloading and loading of a ship. 

The planning system thus tries to solve a complex optimization 
problem a level at a time. The results from one planning exercise, 
such as putting ships in the correct yards, is moved into a Sybase 
database. The next planning process takes that data out of Sybase 
and uses it as input for the next level of decision making. 

Since a yard has many simultaneous ships, it is still possible for 
one ship-unloading plan to interfere with another ship-unloading 
plan. The last planning module is a terminal operations simulator, 
used to take all the separately developed plans and see if they con- 
flict. If so, adjustments are made back up the chain. 

The planning network at Tanjong Pagar terminal consists of two 
mirrored Sun servers with approximately 5 Gbytes of disk space. 


205 


Exploring the Internet 


Planners use 13 workstations and various plotters and printers. 
Some of the modules, such as the ship planning system, were al- 
ready deployed. Others were just going online. 

Planning is one of three major clusters of computer applications 
in use at the terminal. A large mainframe is used for documentation 
and a third cluster of applications runs on a Stratus computer for 
fault-tolerant control of yard operations. 


The documentation system contains the raw data, such as when 
a ship is expected to arrive and the contents of that ship. This infor- 
mation is used to feed the planning process and also is used as in- 
put for back-office functions such as billing. 


Data for the documentation system is fed in electronically by 
shipping agents. Small companies emulate a 3270 terminal and dial 
in to fill out forms. Larger organizations use an APPC-based pro- 
gram to transfer data. Documentation data resides in an Ad- 
abase/ Natural application and an APPC-based program running on 
a SunLink gateway transfers data over to the Sybase server for plan- 
ning. 

The output from the planning process is used to feed the yard 
operations system. This system, which was preparing to go online 
when I visited, run on a Stratus platform. The Stratus is linked to 
the IBM using SNA APPC programs and to the Sun workstations 
using TCP/IP. 


The output of the planning process is a series of loading and 
unloading sequences, specifying container ID numbers, yard loca- 
tions, ship berth locations, and other identifying data. This informa- 
tion is translated into a series of micro instructions, such as a 
command to a transtainer to go to a certain location and expect to 
load a container with a certain label. Another command might give 
a truck instructions to move to a certain berth. 


All this is computerized, with custom PC-based systems on 
cranes and transtainers. PSA trucks get transponders to track their 
location and simple display terminals give truckers instructions. 
Trucks entering the terminal from local shipping companies are 
given a window during which they are allowed to enter the yard, 
and at the gate the truck is fitted with a transponder. 


206 


Singapore 


As we were driving back from the port, Chew Keng Wah told 
me that yard operations were only half of the port automation pro- 
gram. The other half was a marine-based control system that would 
automate the deployment of tugs, pilot allocation, and utilization of 
deep sea channels in and out of the terminals. 

Having finished my whirlwind tour of Singapore, I went back to 
my hotel to meet a friend for a drink. Bob Cook (not his real name) 
is a salesman for a large computer company. Salesmen for this com- 
pany are assigned territories by country. One will work in Thai- 
land, another in Singapore. Bob gets whatever is left. His beat 
includes places like Brunei and Bangladesh. 

I had brought Bob a copy of Stacker for his laptop PC. In many 
places, including Singapore, the only way to obtain legitimate soft- 
ware locally is to pay three times (or more) the U.S. list price. Even 
then, many U.S. companies refuse to provide technical support or 
updates. 

Lack of legitimate software drives many otherwise honest users 
into the arms of the software pirates. Bob always gave me a list of 
software he needed to purchase and I brought it over for him on my 
trips. Updates and other luxuries he had to get for himself from the 
pirates. 

After taking his software, Bob looked around the bar furtively. 
Everybody was watching the lounge lizards doing an Elton John 
tune. The audience was captivated, although the fact that the per- 
formers were clearly out of the Barry Manilow school just made me 
thirsty. 

The coast clear, Bob told me he had something for me, giving 
me a conspiratorial wink and pulling out a package of Big Red 
chewing gum. Singapore had just banned all chewing gum on the 
island, a reaction to the fact that somebody had discarded their gum 
in a couple of subway doors, jamming them. The fine for importing 
this vile substance with intent to deal had been set at SG $10,000 
and a year in jail. The government had just arrested four gum deal- 
ers and was threatening swift retaliatory action to any others fool 
enough to chew and talk about it. A government official was quick 
to point out, however, that only the importation and sale of the sub- 
stance was banned, not its chewing. 


207 


Exploring the Internet 


Bob’s frequent travels to free trade meccas like Bangladesh had 
given him plenty of opportunities, and he had become a key gum 
trafficker, supplying his teenage daughter and even occasionally of- 
fering a stick to friends. 


208 


Kuala Lumpur 


After an interminable wait for my luggage in front of a sign reading 
“baggage claim,” which had spent the time circling a belt in an adja- 
cent unlabeled room, I cleared customs. Nobody was around as I 
emerged from customs at some obscure side door. Seeing nobody 
around an exit door in an Asian airport gives one an extremely eerie 
feeling, as these places usually pack several hundred expectant 
families into a mob around the exit, making the walk to the taxi 
stand challenging. 


I looked around and saw that the mob was clustered around the 
other exit. I worked my way through the crowd into the middle, 
then turned around and walked back out. Sure enough, I soon saw 
a sign with my name on it and introduced myself to Rafee Yusoff 
from the Malaysian Institute of Microelectronic Systems (MIMOS). 


Rafee spoke perfect English, not surprising since he went to 
school in Iowa. We drove past palms and the heavy vegetation that 
grows in this steaming jungle climate. The traffic was a far cry from 
Singapore. Cars here easily turned three lanes into 4 or 5 as they 
darted in and out in increasingly complex geometric progressions. 


Malaysia is the world’s top exporter of integrated circuits, the 
result of an aggressive government policy of free trade zones, cheap 
labor, and a strong work force. Malaysia had hoped that the huge 
manufacturing operations of companies like Motorola, Texas Instru- 
ments, and Sony would lead to technology transfer and increased 
value added by the Malaysian work force. 


This didn’t happen. The Malaysian computer industry contin- 
ues to be devoted primarily to chip manufacture and assembly of 
components. MIMOS was created to help increase the Malaysian 
R&D effort and thus increase the technology transfer into the local 
community. 

Rafee deposited me in a waiting area and soon ushered me into 
a large conference room with a very, very large conference table, 
capable of seating groups of 40 or 50 people at a time. 


209 


Exploring the Internet 


Two women in chadors came in, followed by Chandron Elam- 
vazuthi, a bearded UNIX guru. Finally, the head of the MIMOS 
computer systems division, Dr. Mohamed B. Awang-Lah came in 
with a very large pile of transparencies. 

The purpose of my visit was a bit unclear, an understandable 
confusion since I was researching the Internet and Malaysia was not 
on said Internet. Dr. Mohamed gave a nice little speech, welcoming 
me to Malaysia and MIMOS for whatever reason it was that I had 
come. I then gave a nice little speech thanking MIMOS for their 
hospitality and thanking them in advance for whatever program 
they might have set up. 

After the introductory formalities, Dr. Mohamed started pulling 
out transparencies and sliding them across the table so I could see 
them. Soon a large stack had been fanned out in front of me, ex- 
plaining the purposes behind MIMOS and the various projects of 
the computer systems division. 

One project that MIMOS had worked on was to help the Minis- 
try of Education design the specifications for a PC to use in the 
school. Why not just buy some system that already existed? Chan- 
dran excused himself and ran pao to get a prototype of the 
Atom-1 computer for me to see. 

The entire PC had been built into a wedge which fit under the 
keyboard, and included a 3.5-inch floppy drive, serial and printer 
ports, and even a network interface. When you set the computer on 
the table, the keyboard tilted up a few inches and used much less 
real estate than any normal desktop. You still needed room, though, 
for a display on the desk (or hanging someplace nearby). 

After developing the prototypes, the Ministry of Education had 
then issued a Request for Proposal (RFP) and a private company 
took over the manufacture and delivered units for a fairly low cost. 
Sixty schools were in the process of putting in 20 PCs each and the 
Ministry had plans to computerize all 1,300 secondary schools. 

At this point, we paused while cups of Nescafé were poured for 
all of us, accompanied by sticky green sweets and some spicy meat 
pastries. While sipping my coffee, I looked around the room and 
noticed that everybody had notebooks and everyone seemed to be 
taking lots of notes. 


210 


Kuala Lumpur 


Between bites of pastries, we examined some more transparen- 
cies describing JARING, the proposed national research network for 
Malaysia. JARING means net in Malaysian, but I also learned that 
in English it had a much longer meaning, spelled out in a little 
poem at the beginning of a brochure I was given: 


Joint Development IT Infra-structure Built Upon 

Advanced Technology; Supports Multidisciplinary Collaborative 
Research, Development, and Educational Activities; Reflects 
Integrated Development Strategy Through Computer 
Networking; and has Worldwide Connectivity for 

Global Communication and Information Exchange. 


Wow! I wasn’t quite able to discern from the poem, however, 
what the network might look like. There were plans to link all the 
major universities and cities, and JARING was waiting until 
Telekom Malaysia would be able to deliver a 64 kbps line, a process 
that would take some time. 

In Kuala Lumpur, several institutions were connected together 
using X.25 with UUCP and X.28/X.29 protocols. An international 
X.25 connection provided the link to UUnet. TCP/IP links within 
Kuala Lumpur were running, but I was unsure of exactly where and 
what they were used for. 

MIMOS was planning on making the network some mix of X.25 
and TCP/IP. Apparently, they needed a solution that would allow 
some fairly ancient IBM computers in government ministries to par- 
ticipate in the network without requiring those ministries to spend 
any money, and straight X.25 solutions were old enough to work on 
all of these machines. 

We broke for a fine lunch of curried chicken, shrimp sambal 
with chilies, and a delicious omelette stuffed with sweet and spicy 
vegetables. With some time to kill before the afternoon meeting MI- 
MOS had set up, I was left in the MIMOS library. Perusing the 
shelves, I spotted a copy of the Internet Managers Guide right next 
to a copy of the Concise Encyclopedia of Islam. 


0 


211 


Exploring the Internet 


My MIMOS experience was a bit different from my usual site visit. 
Normally, I asked people for help in a new country and got back a 
list of e-mail addresses, which I used to set up a series of appoint- 
ments. Some appointments were time definite, others were vague 
promises of intent. 


Rather than giving me pointers, MIMOS had set up my entire 
itinerary. In fact, they would be accompanying me to all meetings. 
Dr. Mohamed made it clear that the MIMOS name had been ad- 
vanced on my behalf and it was understood that I should behave 
accordingly. Rafee continually probed to find out what the nature 
of my writing would be, perhaps hoping to avert a potentially em- 
barrassing piece. 


That afternoon, Chandran and one of the women in chadors, ac- 
companied by a MIMOS driver, were my escorts to go visit the 
headquarters of Plus, a private toll road that would span the Malay 
peninsula from the northern border with Thailand down to Singa- 
pore. 


I had heard that Malaysia was laying fiber optic cable when they 
built roads and it turned out that the rumors I had been hearing 
about for two years had to do with the Plus project. While the toll 
road was being installed, the corporation had planted a bundle of 36 
fiber cores, each capable of operating at anywhere from 34 Mbps up 
to 140 Mbps. The business case for the fiber had been made for 
internal operation of the toll road, but it was evident that quite a bit 


of spare capacity had been installed. 


I met with a team of five Plus MIS employees, headed by Rosli 
Md Tan. They joined our MIMOS delegation to form a fairly large 
party sitting around a large conference table. 


The MIS staff estimated that they would take roughly 8 Mbps of 
the fiber capacity for their internal network. They would also use 
fiber for the toll plaza voice network. The 8 Mbps data bandwidth 
was being set up as a large extended Ethernet spanning the entire 
Malay peninsula. 


The lowest unit of operation in a toll road is the lane in a toll 
plaza. Each lane in Plus would get a lane controller unit, a custom- 
ized PC that connected to the cash register, the light on top of the 


212 


Kuala Lumpur 


booth to signal that the lane is open, and various other toll collec- 
tion accoutrements. 

Up to 17 lanes in a plaza would then be connected by 9,600 bps 
serial lines into a PC that would act as a data collection unit. An 
18th virtual lane controller would be available inside the toll plaza 
headquarters to be used for collection of cash for things like 
monthly passes. 


The PC concentrator would in turn connect to a pVAX, which 
would act as the central computing resource for the toll plaza. The 
uVAX would also support management terminals as well as a point- 
of-sale terminal. 


The toll plaza pVAX would use the fiber infrastructure to peri- 
odically upload data to regional headquarters, which are equipped 
with a VAX Cluster. 


Inbetween the region and the toll plaza is an intermediate unit 
of management, the section. Section headquarters don’t have 
VAXen and must therefore go to regional headquarters for their 
data. Each section would have a set of terminals connected into the 
fiber patch panel, just as a voice phone would connect. At regional, 
a terminal server would take the incoming lines, thus connecting the 
terminal to the VAX cluster using the DEC LAT protocols. 


One interesting aspect of the toll road is that it must break in 
Kuala Lumpur, since Plus does not have permission to cross the city. 
To connect the northern and southern segments, Plus had leased an 
8 Mbps line from Telekom Malaysia. One more 8 Mbps leased seg- 
ment linked the northern segment to a VAX 6100 located at Plus 
headquarters, a building located, for some reason I could not under- 
stand, away from the toll road. 


Plus hoped to have the first segment, going 100 kilometers 
northward from Kuala Lumpur, up by August 1992. The entire 
road, and thus the management network, would be completed by 
1994. 

How would the spare bandwidth be allocated? Plus was owned 
by a holding company called the Renang Group, which also owned 
an electromechanical consulting organization known as Time Engi- 
neering. 


213 


Exploring the Internet 


Time Engineering had applied for a license and was about to 
become Malaysia’s second telephone company, providing at least 
long-haul data communications and possibly other services such as 
voice. The fact that Time Engineering had applied for a license was 
somewhat of a formality as the Renang Group was owned by Ma- 
laysia’s ruling party, a group that had been in power since 1957. As 
one embassy official sardonically put it, approval seemed “likely.” 


0 


The next morning, I passed up the opportunity provided by my ho- 
tel for a “western breakfast buffet’ featuring such delicacies as beef 
bacon, stale toasted white bread, and a tray of what was labeled 
“exotic tropical fruits” but contained instead grapes and honeydew 
melon. 

Maybe honeydew was exotic in Malaysia, but I opted instead for 
a dish one-third the price of the buffet (but still an order of magni- 
tude more than I would have paid on the street) of teocheow, a rice 
porridge accompanied by small portions of chicken sambal, dried 
anchovies mixed with peanuts, a pungent fish with black beans, and 
half a salted egg. 

Later, Rafee picked me up to bring me to Telekom Malaysia, the 
recently privatized government PTT. I was interested to see the 
status of their fiber infrastructure given the bold moves by Plus and 
Time Engineering. 

I noticed that everywhere we went, people always spoke to 
Rafee in English, even though I stood in the background. Even 
parking lot attendants would break into English, asking Rafee how 
long he intended to stay, as if he had turned into a foreigner by 
being with me. 

We reported to the 21st floor of the Wisma building only to find 
that the head of the Network Technical Services Division, whom we 
were supposed to meet, was not in that day. Suddenly, the conver- 
sation switched into rapid Malay. After a few minutes, a deputy 
division head was produced and we were ushered into the division 
director’s office to meet with Ahmad Tarmidi. 


214 


Kuala Lumpur 


Rafee made a nice speech thanking Mr. Tarmidi for seeing us 
and introducing MIMOS. I introduced myself as a reporter for Com- 
munications Week and explained that I was interested in the status of 
the fiber infrastructure. 

Ahmad Tarmidi then made a short, indefinite speech explaining 
that fiber played an important role in Malaysia’s future, as did tech- 
nologies like ISDN. The PIT was pulling fiber down the major 
north-south roads (with the obvious exception of Plus) and hoped 
to have coverage of the Peninsula by 1995. 

As to the specific services or the specific infrastructure, the con- 
versation was more than a bit vague. Yet, on the way outside, Mr. 
Tarmadi called Rafee back for a hurried conversation. Rafee ex- 
plained that the fact that I was a reporter had hit home and Tarmadi 
was worried I would give away sensitive business plans. I assured 
everybody that no strategic business advantage would be lost as a 
result of our little chat. 


0 


After a nice lunch in the MIMOS cafeteria, where I decided to skip 
the fish head curry in favor of less exotic fare, we headed off to visit 
Tenaga Nasional Berhad, the national electric company and another 
group that was laying a fiber infrastructure. 

At Tenaga, a group of only four people met us, still outnumber- 
ing our own delegation of three. The assistant general manager for 
information systems, Abdul Rahman Bin Shafi, welcomed us and 
gave us all, including his own staff, a document describing the Dis- 
tributed Source Data Generation Project. 

I flipped through the four-page document, scanning it for infor- 
mation. Abdul called the meeting to order and asked us all to turn 
to page 1, where he commenced to read the entire text aloud. 

Tenaga was proud to have what it called the largest distributed 
systems project in ASEAN. Implemented over a 36-month period at 
a cost of 18 million ringgit (U.S. $7.2 million), the project had con- 
nected 135 district offices and power stations of the electric utility 
system. 


215 


Exploring the Internet 


Processing oomph for the system was provided by a pair of 
fault-tolerant IBM 4300s. Distributed processing was the realm of 
Nixdorf computers, the prime contractor on the project. Telekom 
Malaysia’s X.25 network, Maypac, was used to connect district of- 
fices to headquarters at speeds ranging from 2,400 to 4,800 bps and 
occasionally at 9,600 bps. 


Applications consisted of various ways to input paper records, 
such as allowing the fact that a bill was paid and money collected to 
be transmitted to headquarters. Previously, the data had been input 
at headquarters, meaning that errors in entry codes and the like had 
not been caught until the data was well downstream. 


After the briefing paper was read, a huge TV was wheeled in. 
While it was being set up, Rafee made polite chitchat about the re- 
cent renovation of the MIS office space. We all commented on how 
well-lit the offices were, certainly an appropriate attribute for the 
offices of a monopoly electric utility. 


The video was then displayed. Ten minutes and forty-eight sec- 
onds long, the in-house video explained the success of ASEAN’s 
largest distributed project, accompanied throughout by a driving 
disco beat. Near the end, the disco turned into an anthem (though 
still accompanied by the disco drums), the hyperbole flew thick and 
fast and then finally the lights went back up to monopoly bright- 
ness. 


I looked around the table and saw that everybody in the meet- 
ing had a briefing packet, consisting of my resume, a Xerox of the 
cover of STACKS, a letter from MIMOS, and an internal Tenaga 
memo with a very long routing slip on it. 


Next on the agenda was a description of a home-grown commu- 
nications system, used to control the power substations. Substations 
could be located in very remote areas, so it was not possible to 
count on the telephone company to provide even voice service. 


The system consisted of twisted pair lines running along with 
the power lines and providing data transmission at 100 and 600 bps. 
One function of this communications system was to allow central 
headquarters to activate an emergency cutoff switch at a substation 
to prevent damage to the larger network. 


216 


Kuala Lumpur 


Tenaga was in the process of replacing the control system with a 
fiber optic network running along the power lines. The fiber would 
support cascaded, automated remote power substations and would 
even allow transmission of video images for monitoring and secu- 
rity. Tenaga was laying cables of 10 fibers, giving it a huge capacity 
for future expansion (or sale to a telephone company). 

We finished our meeting just before 4:00 PM., allowing Rafee to 
drop me at a taxi stand a few minutes after four. Government em- 
ployees are released at precisely 4:15, and a 20-minute ride immedi- 
ately turns into a 90-minute ordeal. I caught my taxi at 4:08, hitting 
the airport just ahead of the wave. 

Kuala Lumpur, like many airports in developing countries, has 
an acute shortage of terminal space, meaning that you cannot check 
in until two hours before a flight. It was a hot, humid jungle after- 
noon and I had several hours to kill before I could check in. 

I found a cart with a broken wheel and piled my garment bag 
and computer case into it and took off my jacket and rolled up my 
sleeves. I jumped my cart over the high curb, played chicken with a 
taxi (he won), and went across the street to find a bar. 

The airport hotel had a choice of stairs and an elevator. The 
stairs had a big picture of a durian, with the circle and the slash 
around it spelling out in terms suitable for international tourists that 
this hotel was a “No Durian” area. The elevator, used by western- 
ers to get into the main lobby, had no need for such a sign. The 
picture of the durian reminded me that I was soon going to be in 
Bangkok, where I would be able to get my fill of this strange, odor- 
iferous fruit. 

After a snack in the restauraunt of baby octopi on a bed of 
shredded jellyfish, I went to find the bar. Sitting in the small 
crowded bar, I watched a TV special on the wonders of Malaysian 
industry, focusing in this episode on the life of a pineapple. 

At 7:23, the screen went blank and was replaced with a picture 
of a big clock. How handy, I thought, a time service that randomly 
appears. The clock was soon replaced by pictures of Mecca and the 
sound of the call to prayer. Arabic and Malay subtitles started fill- 
ing the screen and rolling off, accompanied by an upbeat, yet inspi- 
rational soundtrack. Around me, the bartenders continued 


217 


Exploring the Internet 


preparing drinks. Prayers finished, the screen did another context 
switch back to the marvelous Malay miracle, now in the middle of a 
scene of pineapples getting lobotomies, interspersed with shots that 
featured happy foreign tourists on idyllic beaches eating pineapple. 

I left to stand in line and check in, cleared immigration, and 
walked past the endless row of duty-free shops, including one sell- 
ing bags of dried mangoes and prunes, items that I couldn’t recall 
falling under the duty-free exemption in too many countries. 

With great relief, I found the doors of the CIP lounge, a cool 
plush oasis for Commercially Important Persons. Making a living 
as a writer is kind of the antithesis of the CIP, and I take great de- 
light in making myself at home in such facilities whenever I can fool 
the authorities into letting me in. 


218 


Bangkok 


As you travel up the peninsula from Singapore, things get more 
chaotic, more exotic, more Asian. For sheer density of activity, 
Hong Kong represents the peak, with things getting a bit more or- 
derly as you head north towards Korea and Japan. Orderly is, of 
course, relative by Asian standards; the chaos level of any of these 
places is several orders of magnitude over any U.S. city. 

For mystery, though, you find your peak load in Bangkok. This 
was my tenth visit to Bangkok and I still had only a vague inkling 
of how the place worked. The chaos is there, but unlike Hong 
Kong, you can’t get a handle on it. Things are happening, but you 
don’t know what, and nobody stops to tell you. 

With the temperature a balmy 85° F and the Thais all wearing 
sweaters to ward off the cold, I set out on foot down Ploenchit Road 
to find the stock exchange. Dozens of large construction projects 
were all packed in together, part of Bangkok’s expansion as the only 
real city in a country with the fastest growing economy in the 
world. For years, the growth in GNP had been averaging over 7 
percent per year and from 1987 to 1990, GNP grew at an amazing 11 
percent per year. 

Each construction site was packed with a hundred or more la- 
borers from the Isan northeast of Thailand, near the Laotian and 
Cambodian borders. Teenage boys and girls worked alongside a 
few older workers in their 20s or 30s. They would stay at the same 
site for weeks or even months, living in the building as it shot up. 
A dozen or so food stalls clustered around each site, with old ladies 
and young girls making Isan food such as the fiery som tam, a pa- 
paya and chili salad made with lime juice and fish sauce (and, in the 
more authentic versions of the dish, served with crickets or land 
crabs for that extra crunch). Other stalls had dried fish, sticky rice, 
or grilled chicken, with construction workers ambling from one to 
the other, poking at the food and trying to decide what to eat. 

The morning rush hour was in full swing and I waited at the 
intersection with Wittayu Road, watching the police in their traffic 


219 


Exploring the Internet 


booth act as DJs, interspersing jaunty music with inspirational 
speeches intended to motivate motorists and pedestrians to conduct 
their business with dispatch. Of course, everybody went their own 
way. This particular section of Ploenchit road had once been desig- 
nated by the police chief as a “traffic law observance zone,” a title 
that did more to underscore the status of laws as suggestions than it 
did to convince anybody to change their driving habits. 

Wittayu road is a wide, shaded boulevard, lined with embassies 
and a few fancy hotels. I walked past the Imperial Hotel, site of the 
annual Fourth of July festival that offers free vasectomies and hot 
dogs. This event is sponsored by a Thai non-profit family planning 
and rural development group I had worked with. 


My appointment was at the Stock Exchange of Thailand (SET) 
with Dr. Surat Palalikit, a senior vice-president in charge of the MIS 
operation. I presented my business card to the security guard, an- 
nouncing myself in Thai. He nodded and picked up the phone. 


“A farang is here for Dr. Surat,” he said. Except for a few close 
friends, Thais always refer to me as “farang,” a foreigner, rather 
than by name. I occasionally bridled at being called “Mr. Foreign- 
er,” but realized that my name was virtually unpronounceable in 
Thai. The closest people usually got was “Mah-Lah-Moo” which 
translates into Thai as “come hunt the pig.” 


Dr. Surat was an energetic man, full of charm and speaking per- 
fect English. Trained as a molecular chemist, he had been a profes- 
sor at both Mahidon and Chulalongkorn Universities, two of the top 
Thai schools. 


A lack of computers made it challenging to do much research in 
molecular chemistry, so Dr. Surat decided to moonlight. A friend of 
his ran Chase Manhattan’s computers in Thailand and asked Dr. 
Surat to supervise the creation of a general ledger system. 


The system went in and worked. His friend was promoted to 
Hong Kong and Dr. Surat was given the job as EDP manager. After 
a couple of years doing that, he supervised the creation of an ATM 
network linking seven large banks. It was evident that, by now, mo- 
lecular chemistry was a hobby and he had found his calling in the 


financial markets. 


220 


Bangkok 


At that time, the Stock Exchange of Thailand was running a few 
PCs on a local area network. A committee was formed to go up to 
Taiwan and investigate their EDP system and Dr. Surat was invited 
along. The Taiwanese exchange was working well and it was evi- 
dent that Thailand needed to engage in some form of expansion to 
support a rapidly growing stock market. 


The choice was whether to make or buy a system. Dr. Surat 
presented the case for buying as much as possible, so strongly that 
they made him the EDP manager. That’s when Dr. Surat met Mary 
Jo Moccia, the person who had built the Midwest Stock Exchange 
system from the ground up and was porting her solution to stock 
exchanges all over the world. 


I had met Mary Jo on my trip to Thailand the previous year. We 
had sat next to each other for six hours on a plane and spent the 
time talking about everything from DECnet bugs to the differences 
in CPU architectures and their implication for efficient database en- 
gines to the long-term financial viability of DEC. 


Gruff, chain smoking, highly technical, everybody who worked 
with Mary Jo described her as one of the best MIS managers they 
had ever met. We had both been staying at the Regent Hotel, and 
all week I kept bumping into her. My consulting was done at the 
end of the week, and we had made tentative plans to get together 
Saturday morning for breakfast. 


Saturday morning, I picked up the phone and asked the opera- 
tor to connect me to Mary Jo’s room. 


“I'm sorry, but she has passed away,” was the reply. Thinking 
this was some kind of bizarre translation problem, I went down- 
stairs to investigate. 


While I was trying to get a manager at the desk, one of her staff 
passed by and overheard my conversation. I found out that Mary 
Jo had gone to bed after her weekly get-together with her staff and 
died during the night. 

Four very young, very shocked staff members stood around not 
knowing what to do. A U.S. embassy official took care of the details 
and got them booked on the next flight home, coincidentally the 
same flight I took. 


221 


Exploring the Internet 


I tried briefly to cheer them up, but there is really nothing you 
can say or do that will help in such a situation. I wrote an obituary 
for Computerworld, but the gesture felt empty and meaningless in the 
face of such a sudden and tragic loss. 


Dr. Surat and I talked about Mary Jo Moccia and it was evident 
that in the year that had passed since her death the project had got- 
ten back on track, but the loss still hurt. 


SET had resisted the temptation to run their operation on a large 
IBM or a fault-tolerant platform like Stratus or Tandem. Instead, 
their system was based on distributed minicomputers and worksta- 
tions, centered around a fairly small VAX Cluster. 


The back-end matching system, which takes care of the mechan- 
ics of buying and selling, is a cluster of two VAX 6510s. Three VAX 
3800 systems provide front-end processing to the network of 40 bro- 
kers. Each broker has a choice of an IBM AS 400, a Stratus, or DEC 
equipment. 

All the SET VAXen share an Ethernet segment. The brokers con- 
nect to the front end VAXen using simple leased lines. Since no 
modems are involved (and leased lines are hard to hack), security is 
fairly straightforward. 


In case the computer-to-computer links between the front-end 
systems and the brokers fail, each broker also has a terminal con- 
necting to a terminal server on the SET Ethernet. The terminals 
function as a backup in case the fancier front-end system goes 
down. 


The day before I visited, the SET had reached an all-time high 
volume of 8.585 billion baht (U.S. $343 million). The day I was 
there, as the Bangkok Post screamed out the next day, “the bull 
turned bionic,” reaching a total volume of 12.341 billion baht. The 
business section of the Post also went bionic, raving on about the 
“Super Bull” and the “Galloping Bull,” and generally carrying this 
metaphor so far that I felt like reaching for a shovel. 

Despite the metaphors, things were pretty calm at the exchange 
offices. People drifted in and out of Dr. Surat’s office, sat and lis- 
tened to our conversation for a while, and occasionally he would 
step out and talk with them for a few minutes. 


222 


Bangkok 


The system seemed to work fine. One broker switched to the 
terminal server backup and a meeting was called with the MIS staff 
and the brokers just to make sure things were under control. Even 
the broker’s offices, in a frenzy by Thai standards, seemed fairly 
calm to me. 

While the bull was going bionic, Dr. Surat and I sipped our cof- 
fees and chatted about the other two pieces of his MIS operation. 
One was the price reporting system, designed to feed out status in- 
formation to the ultra-modern, wall-sized displays on the walls of 
most brokerages, as well as VT terminals and PCs all over town. 

The other big component was called the SET Information Man- 
agement System. Under development, this system consisted of an 
IBM RISC processor running AIX and Ingres. Brokers and compa- 
nies would use this system to enter and retrieve information such as 
financial statements, profiles, and other fairly static information 
about stocks traded on the exchange. 

I asked how he planned to support generalized dial-in in an en- 
vironment where security was an issue. We tossed around the idea 
of a PC with modems, isolated from the net. The PC would accept 
uploads from people. At the end of the day, simple virus checks 
and authentication would be run. Then, the modems would be 
turned off and a switch flipped to connect the PC to the AIX system. 
The semi-validated data would be loaded into the Ingres database, 
presumably with more stringent data checking. 

Letting the public retrieve information without giving them ac- 
cess to the Ingres engine could be done in a similar fashion, caching 
standard reports to a PC and then disconnecting it from the net. 
The database engine could still be available to the brokers over the 
network, allowing them to retrieve more sophisticated reports. 

Like a good consultant, I threw this scheme on the table, then 
left before the dangers of reality exposed any flaws. Having 
worked my two hours for the day, I headed up Sarasin road, passed 
a pushcart selling crab mousse in banana leaf, and stopped in front 
of the black chicken joint. 

This shop specializes in chickens that have been bred to be black 
all the way through to the bone. The chicken is steeped in medici- 
nal herbs and is considered to be good for all sorts of things like 


223 


Exploring the Internet 


prosperity and virility (although I must admit, it tastes quite similar 
to your basic New England boiled chicken). I once brought a farang 
acquaintance in there and, needing one more dish to round out the 
meal, ordered “chicken leg in garlic sauce.” We were presented 
with a platter of steamed chicken feet in a sticky gel of garlic and 
agar. 

I turned down Ratjadamri road and walked past the Lumpini 
Park, one of the few large parks in a city of 8 million people, and 
headed towards the Bangkok Post. I wrote myself into the visitor log 
and then reached over the receptionist’s desk and into the top 
drawer and grabbed a badge. If you execute this maneuver with 
enough confidence, you walk right in. Show the slightest hesitation, 
however, and the bored receptionist will confine you to a plastic 
couch to await an escort. 

In the news room, I walked past desks all jammed together, sev- 
eral feet deep in old newspapers, press releases, books, and posters, 
and sat down at the empty desk of my friend Bob Halliday. Bob is 
officially a sub-editor, charged with turning copy for the Outlook 
section into a semblance of English. 

He is better known, however, for his book and music reviews. 
He approaches legendary status in Bangkok for his restaurant re- 
views, written under a pen name which means Sea Toad in Thai. 

Bob and I have an understanding. I bring him offerings of food 
and he introduces me to some of the best restaurants I’ve ever been 
to. I call him periodically from the States and he briefs me in great 
detail on the latest saffron chicken joint or some obscure noodle 
pushcart that has a line of Mercedes a mile long waiting for food. 

I dug into my dignified-looking black leather briefcase and 
pulled out a jar of pickled prunes and the last remaining packet of 
Astronaut Ice Cream. I also told him about the grisly fate of his 
salami, destroyed by the Australian meat police, a story so sad that 
it prompted Bob to wax poetic about a previous batch of sausages I 
brought over. 

After a brief period of contemplation over the salami (Bob was 
sure that customs in Australia was at that moment gorging them- 
selves on the links that were rightfully his), he began eyeing the ice 
cream. I insisted that this chalky, freeze-dried substance would 


224 


Bangkok 


have much better ice cream-like qualities if served cold, but I could 
tell that my arguments were having little weight. 

While Bob struggled with this dilemma, I went over to the of- 
fices of United Press International to meet a friend who rents space 
in the back. Peter Jansen is a long-time Asia resident who now 
writes a report about doing business in Vietnam. Writing about do- 
ing business in Vietnam is kind of like writing artificial intelligence 
programs in Cobol, so I always make a point of looking Peter up to 
see how he is getting along. 


Peter and I walked over to the Dusit Thani hotel and took the 
elevator up to the top floor. Instead of heading into the penthouse 
bar, we took a set of stairs marked only with a sign reading “mem- 
bers only” to the Foreign Correspondents Club of Thailand. Sitting 
in this quiet bar, surrounded by pictures of wars and riots in Laos, 
Burma, Vietnam, Cambodia, and Thailand, we drank a long string 
of Kloster beers. Most expatriate residents of Thailand prefer Klos- 
ter over the better-known Singha, Singha being rumored (probably 
unjustly) to contain formaldehyde as a preservative against heat. 


That night, Bob had a column to write, so we met up with two 
other friends to do research. Peter Skilling is a noted scholar of Ti- 
betan literature and Norman Bottorff spent years helping to coordi- 
nate ABC News coverage for Southeast Asia, including extended 
stints coordinating the coverage of hot spots like Tianamen Square 
and the Iran-Iraq war. 


The four of us piled into a taxi and headed out to Soi Nana. 
Our taxi went skidding into a major road and we all groaned as we 
saw that it was backed up for at least an hour. We piled back out 
and walked over to Nasir Al-Masri, an Egyptian restaurant that, be- 
fore the Kuwait war, would have been crawling with Arabs and 
prostitutes eyeing each other hungrily. 


The war had drastically reduced the Arab tourist trade and the 
restaurant was filled instead with the world traveller set, sitting in 
pairs looking sophisticated (and bored). We sat down, making lots 
of noise, and Bob and Peter entered a long, complicated negotiation 
in Thai with the waiter. Norman and I flagged down another waiter 
and ordered beer. 


225 


Exploring the Internet 


First to arrive on our table was a wonderful dish of hummus, 
labeled on the menu as “creamy stuff of crains Conianing Sesame 
Paste.” We instantly devoured the first plate and sent the waiter 
back for more. 

Soon, more and more plates arrived, filled with roast lamb, a 
fava bean salad soaked in garlic, stuffed vegetables, and more. 
Around us, the world travellers stopped eating and watched the pa- 
rade of food to our table with growing awe. Mountains of bread 
disappeared in a flurry as we dipped into plates, stopping only to 
order yet more food or to hand empty plates to waiters as they 
passed by. 

After 18 plates of food, I could see that we had made the diary 
of the backpacker sitting next to us. She was so impressed she for- 
got totally about her own dinner, her mouth opening wider and 
wider as we went for the world hummus-eating record. 

We finished the last of the grilled pigeon and ordered Turkish 
coffee, served in thimble sized glasses and having the consistency of 
40 weight motor oil. Our research done, we paid the bill of 1,500 
baht (U.S. $60), quite high by Thai standards, and left. 


5 


Friday morning, I walked a block from my hotel to Chitlom Towers 
to meet Narong Intante, president of the Value Group. Like many 
Thai companies, this one seemed to have a million names. The 
lobby listing sent me to the Value Systems Co., Ltd. On the seventh 
floor, the signs read Value Component Co., and Value Data Co, Ltd. 

I sat in the lobby of Value* and sipped my cup of freshly brewed 
Nescafé. The office was chilled to a level that signified a prosperous 
company and all the office girls wore heavy coats to ward off the 
cold. 

I was ushered into Khun Narong’s office while he finished up a 
deal for a whole bunch of workstations to some multinational. The 
Value Group was the official distributor for Microsoft and I had 
come to discuss the issue of intellectual property protection. Khun 
Narong had started the company four years ago as a distributor and 
it had grown to over 120 people. 


226 


Bangkok 


I wanted to know more about how you make a killing selling 
legal software in a country where piracy is not only rampant but 
almost legal. For 1,000 baht (U.S. $40) a pirate shop will sell you a 
complete Microsoft Windows, including disks and a photcopy of the 
manual. For 5,700 baht, you can buy a legitimate copy from Khun 
Narong. 


Value Systems had recently introduced a version of Windows, 
localized with Thai fonts and a Thai manual for 4,700 baht. To pro- 
tect their investment, Value was using a hard lock, a piece of hard- 
ware that must be present (usually on a serial port) for the software 
to run. 


Selling the simple English version, Narong estimated he had 
provided only 2 percent of the copies on the market. With the Thai 
version, however, he was hoping that legal copies would make up 
20 percent, or maybe even 30 percent, of the market share. 


With no real copyright protection, Narong had to rely on things 
like support and service to lure in corporations. A few large Thai 
corporations were beginning to be concerned about image and 
would buy at least a couple of legal copies to put into their machine 
rooms. A few even decided that legal copies reduced the amount of 
internal support needed and were a sound business decision. 


Increasingly though, it was a proliferation of viruses that was 
driving customers into Narong’s hands. Many large corporations 
had relied exclusively on pirate copies and some were paying the 
price. I heard from several sources, for example, that one of Thai- 
land’s largest banks had used pirated software not only for PCs but 
for larger systems as well. My sources informed me that the bank 
had been hard hit by a particularly virulent strain of virus and had 
only just recovered. 


Did the high price of software in Thailand have anything to do 
with piracy? One of the more persuasive arguments in favor of 
software piracy was that legal software was quite expensive, selling 
for several times the U.S. list price in a country with a much lower 
standard of living. 


Narong saw this as a chicken-and-egg problem. As long as soft- 
ware had no protection, there was no incentive to localize for the 


227 


Exploring the Internet 


Thai market. Lack of Thai language support kept the market low 
and the prices high. 

This argument seemed to confirm an impression I had that most 
of the piracy was destined for the Thai market. Although I had cer- 
tainly seen foreigners in the Patpong red light district bring in a 
laptop and say “fill ‘er up,” the vast majority of the copies made in 
Thailand were made as an incentive to sell hardware. 

I left Narong’s office and went out to the head of the road where 
a half-dozen teenagers sat passing the time playing checkers with 
bottle caps on a board marked on the sidewalk in chalk. Every 
street had one of these groups, serving as a motorcycle ferry to 
houses located deep within the complex maze of side streets that 
spread out from each road. Every morning and evening, you could 
see office girls being shuttled on these bikes, riding sidesaddle in 
tight skirts and high heels, hanging on nonchalantly with one hand 
as their chauffeurs went scuttling between lanes and over sidewalks. 

That afternoon, I was briefed by a gentleman who insisted that I 
identify him only as a “diplomat” from a “western embassy.” I re- 
ported to the guard post of the Western Embassy, went past two sets 
of metal detectors and incredible numbers of security guards, and 
entered the inner sanctum of foreign soil. 

There, I learned some of the background on the intellectual 
property dispute between the U.S. and Thailand. The heart of the 
problem was the patent law, which had explicitly disallowed protec- 
tion for pharmaceuticals, leading to a huge market in clones. Drugs 
can be a touchy trade negotiation issue, especially when a huge 
American multinational is pitted against a poor, sick Thai child. 

With the coup on February 23, 1991, a relatively honest govern- 
ment had been put into power, surprising the hell out of the mili- 
tary junta that had installed them to act as puppets. This new 
government had been diligently at work passing laws, and one that 
had almost gone into effect was a new patent law. 

Likewise, trademark protection was finally going into place. 
While trademarks had been nominally protected, penalties were so 
lax that products ranging from perfume to watches to clothing were 
regularly manufactured and sold both internally and to a huge tour- 
ist market. Of course, the pirates don’t always get their copies ex- 


228 


Bangkok 


act—I remember one Gucci watch knockoff with a picture of Snoopy 
on the dial. 

Copyright is a particularly sensitive issue in Thai politics. There 
was a 1979 law on the books, but the problem was that the Thai 
judiciary refused to enforce it, throwing cases out on technicalities. 
Software was not mentioned in the law at all and no cases had gone 
to court, so pirates had a virtual carte blanche to operate. 

The government of General Prem, the first democratically 
elected government in Thailand, introduced a new copyright law. 
The legislation was perceived as a bow to foreign pressure in a 
country that prides itself on its independence. General Prem’s 
goverment fell over the issue. 

Prem was followed by General Chatchai who had the honor of 
presiding over one of the most corrupt Thai governments ever. I 
remember sitting in Bahn Pitsanulok, the opulent former official 
state guest house and the offices of the Prime Minister’s personal 
staff. I was talking with one of the most senior members of the 
Prime Minster’s staff in an on-the-record interview and asked him 
what the current rate for bribes was on large government projects. 
He promptly let me know that the usual rate was 10 percent, but 
that this was, of course, negotiable. This same senior advisor cheer- 
fully admitted that almost all the software in the offices was pirated. 

This government was so venal that they were actually hurting 
business, an unpardonable sin. The military, itself a huge business, 
stepped in to protect their interests. Later, it came to light that sev- 
eral government ministers had managed to save so much on their 
meager salaries that in one case a minister increased his net worth 
by U.S. $50 million during only a few years in office. 

The government of the Anand administration was run by a half- 
dozen technocrats who were busily trying to straighten out the mess 
of the previous few years. (He was later replaced by Suchinda, the 
junta leader.) Things were simmering on the diplomatic front and 
negotiations had gone from the noise and publicity of 301 actions to 
the back room workings of the diplomatic process. Progress was 
being made, but no firm results had been achieved. 


D 


229 


Exploring the Internet 


Back at the hotel, I walked down the deserted hall of the hotel’s 
shopping arcade, each shop holding one or two very bored-looking 
attendants, shivering in the cold of the air conditioning. My room 
was located in a remote wing, absolutely deserted except for the 
elevator button pusher. This poor kid stood for twelve hours every 
day in an uncomfortable uniform, his only job being to push the up 
button if he saw somebody coming to save them any unnecessary 
wait. 

In my room, I needed to recharge my notebook and I noticed 
that, while I had packed an appropriate two prong adaptor, I didn’t 
have an adaptor for the three-prong, grounded plugs. I called 
housekeeping and a uniformed engineer was sent up. I explained 
the problem and he nodded and smiled, clearly understanding my 
dilemna. He reached over and grabbed the ground plug and started 
to snap it off. I recoiled in horror. 

“No, not good,” I protested, grabbing back all three of my 
prongs and moving to the other side of the room. 

“Cut! Cut!” he repeated over and over, chasing after me. The 
music wafting in from the hall speakers was playing “Somewhere 
Over the Rainbow.” 


0 


Saturday morning, I went out to the Pratunam area, where textile 
vendors crowd the sidewalks with bolts of cloth and silk, piled onto 
tables covered with umbrellas to provide some shade from the over- 
powering heat. Occasionally, an overloaded motorcycle would dart 
out of a shophouse and onto the sidewalk, somehow missing the 
milling crowds, and jump onto the street to go make a delivery. 

At the edge of Pratunam is Pantip Plaza, a shopping center with 
a large number of computer dealers. My favorite copy shop, a little 
shophouse jammed with 6 PC ATs and 6 young women sitting in 
front of them keeping the floppies humming, had been torn down. 
These low-rent retail operations were getting harder to find in Bang- 
kok and most of the businesses had moved into the big shopping 
centers favored by the Thais, huge air-conditioned atriums with 
three or four stories of balconies. 


230 


Bangkok 


Pantip Plaza had its share of computer dealers, and even one or 
two copy shops, but this was pretty tame stuff compared to the 
Golden Shopping Center in Hong Kong. At Pantip, there were 20 or 
30 shops, and a few had some halfhearted employees sitting around 
playing games. A few customers drifted by, but most had the slow, 
purposeless amble of the window shopper. 

I snapped a few pictures of pirates in action, then gave up and 
went down to the S&P Bakery for a dish of rice cooked with shrimp 
roe and chilies. Roe, of course, being a Thai euphemism on English- 
language menus for the orange fat in the shrimp’s head. 

Dinner that night was at an unassuming little restaurant, a 
brightly lit room with a few movie posters on the wall and lots of 
big, round tables, around which were seated large families, each 
with several generations present. Bottles of Mekong Whisky and 
soda water and buckets of ice were piled up on little carts next to 
each table. 

We started with grilled pork, doused in a fiery salsa of lime 
juice, garlic, and chilies and a big bowl of sour soup. The specialty 
of the house was oysters and mussels, served half-cooked with egg 
and vegetables, and we consumed a half-dozen plates of this deli- 
cious seafood. Dessert was fried taro root, dusted in pistachio and 
sugar, leaving even Bob so full that we omitted our traditional post- 
dinner search for the ultimate durian ice cream. 


0 


Sunday morning, I left the hotel for my usual breakfast of a bowl of 
noodles from a street stand. Returning to the hotel, I gathered a pile 
of notebooks, business cards, and photos and walked down to the 
business center. Two young attendants were seated at the desk, 
waiting for business. 

“T’d like to send these papers by Federal Express,” I said. 

“One hour,” an attendant replied. 

“Federal Express?” I repeated, with a puzzled look. 

“One hour, must go to shop,” the other attendant insisted, reach- 
ing for my stack of papers. 


231 


Exploring the Internet 


After repeating this little routine a few times I realized that they 
were referring to Photo Express, which, of course, didn’t really ex- 
plain why they thought I wanted to have notebooks developed. 

My flight wasn’t until evening, so I had time to have lunch with 
Bob. We went to an old hangout, the Italian restaurant Pan Pan. 
Normally, I try to stick to Asian food while in Asia, but Pan Pan is 
an exception. The Italian food is good and, more importantly, they 
have excellent durian ice cream. 

Durian is one of those mysteries of the East. On the outside, it’s 
about twice the size of a pineapple, with very sharp spikes about a 
half-inch tall sticking out all over, making it advisable not to fall 
asleep under a durian tree at harvest time. Inside, there are a half 
dozen segments of creamy, pale flesh that looks sort of like a ba- 
nana. The durian’s most famous feature, however, is its powerful, 
distinctive smell. | 

The taste is great, but the smell does tend to dissuade many 
westerners from taking an immediate liking to the “king of fruits.” 
I describe it as tasting something like a cross between a mushy ba- 
nana and brie, but one Englishman I know refers to it as “a bit like 
eating strawberries and cream in a public lavatory.” 

Well, I took an immediate liking to it. The first time I came to 
Bangkok, a mutual friend of ours, a freelancer who specialized in 
travel writing and auto magazines, had arranged for Bob to meet 
me at the airport. 

We went straight to a night market where prostitutes, pimps, 
and the like grab their midnight lunch. I was introduced to a wide 
variety of tropical fruits, including mangosteens, rambutans, and 
durians. 

On a subsequent trip to Bangkok, I achieved a very modest de- 
gree of fame by inventing the durian cheesecake. The creamy 
durian mixed perfectly with the eggs and cream cheese, and a coco- 
nut biscuit crust gave the cake a nice Asian twist. Of course, the 
cake did still smell like a durian, but for many people that was con- 
sidered a feature and not a bug. The recipe was an immediate hit at 
the Post and Bob published it in his column the following week. 


232 


Amsterdam 


Amsterdam was 0° C, certainly a change from Bangkok. I made a 
mad dash to the taxi stand and got to my hotel with plenty of time 
for a one-hour nap after my all-night flight. 


At 1 PM., I took a tram to Muiderpoort station, then got in a 
minibus that shot over a narrow little path running next to a canal 
and dropped me off at the complex of buildings holding Dutch re- 
search laboratories including the Centrum voor Wiskunde en Infor- 
matica (CWI), the computer science and mathematics institute, and 
the Nationaal Instituut voor Kernfysica en Hoge-Energiefysica (NIK- 
HEF), the Dutch institute for atomic high energy physics. 

NIKHEF and CWI have both been prominent centers of net- 
working in Europe for many years. NIKHEF was the Dutch HEPnet 
site, CWI had given an early home to EUnet, and this complex of 
buildings on Kruislaan road kept popping up in one context or an- 
other. It housed the RARE secretariat, it hosted a gateway to IXI, 
and the president of RIPE was Rob Blokzijl, a NIKHEF employee. 


It was to get to the bottom of all these projects and acronyms 
that I had come to Amsterdam. I had heard more and more about 
the maze of conflicting institutions, consortiums, organizations, and 
associations that made up the confused politics of European net- 
working. 

I was just in time for the eleventh meeting of Réseaux IP 
Européens (RIPE), an informal consortium of the TCP/IP research 
networks of Europe. I figured that RIPE must be something like the 
IETF, and thus a good place to gather information. 

The meeting was about to start, so I gathered my badge and one 
each of the dozens of handouts and went into a university-style lec- 
ture hall. Down at the bottom of the hall sat three serious-looking 
RIPE officials facing a room of 50 or so equally serious-looking engi- 
neers. 

Rob Blokzijl was going through a long agenda, reviewing action 
items from the previous meeting and making announcements. | 


233 


Exploring the Internet 


propped my jet-lagged eyes open with toothpicks and started leaf- 
ing through the materials I had picked up. 

RIPE was formed as a sort of anti-organization, a reaction to the 
total ineffectiveness of other groups in setting up a pan-European 
Internet. At the time RIPE was formed, there had been several years 
of thrashing while people tried to figure out how to make OSI into 
something real. 


Meanwhile, several organizations with work to accomplish had 
been putting together TCP/IP networks. An Internet was being 
formed, but on an ad hoc basis. Networks were touching and acci- 
dents were starting to happen. 


“What kinds of accidents were happening?” I naively asked Rob 
the next day while we were hiding in his office during a slack time 
in the working group sessions. 


“Routing loops, black holes, the usual,” Rob said. To try and 
solve the problems, Rob had convened a group of six people from 
the real networks in Europe. Nuclear physics was the lead player, 
so in addition to Rob there were representatives from CERN in Ge- 
neva and the Italian physics community. The Italians were operat- 
ing the only 2 Mbps international link in Europe at the time. To 
supplement the physicists, representatives from NORDUnet and 
EUnet also came. 


At first, the six tried to work through the Réseaux Associés pour 
la Recherche Européenne (RARE), the association of research net- 
working groups in Europe. RARE wouldn’t touch this issue, 
though. The six researchers were operating TCP/IP networks and 
RARE was exclusively and officially an OSI group. 


Borrowing a phrase from Daniel Karrenberg of CWI that the 
“time was ripe for networking in Europe,” an extremely lightweight 
organization was founded in September 1990 with the mission of 
helping to ensure cooperation among European IP networks. Rob 
Blokzijl formally announced the formation of the group in RFC 1181, 
a very carefully worded one-page document. 


In Europe, careful wording is crucial and I’ve seen more than 
one group spend several hours wordsmithing seemingly innocuous 
phrases. Rob proudly pointed out the triumphs in the RFC, such as 


234 


Amsterdam 


the sentence that “RIPE serves as a focal point for other common 
activities of the participants related to IP networking.” 

Apparently meaningless to the untrained eye, this sentence is 
rife with subtleties meant to steer a course through the shoals of 
politics. RIPE is a focal point, not an operational unit. It worries 
about only its own voluntary participants and is not trying to im- 
pose solutions on others. It deals only with IP networking and is 
thus not advocating against OSI but merely serves as a forum for 
those who have already chosen. 

By the time of the eleventh meeting, RIPE had grown to nearly 
30 organizations and was meeting quarterly. NIKHEF hosted many 
of the meetings and acted as the organization’s secretariat. In terms 
of developing new standards, RIPE was a pretty sleepy forum. 
Those wanting a marathon of 50 working groups producing moun- 
tains of paper were directed instead to the IETF. RIPE was much 
more collegial and informal. 

The week before the meeting, two days had been set aside for 
informal tutorials to bring new participants in TCP/IP up to speed. 
At the same time, a bake-off had been held featuring equipment 
from various vendors and even including an ISDN switch. People 
worked together to form different network topologies and see what 
types of problems arose. 

The meeting itself was a one-day plenary, followed by a day of 
working groups, followed by another day of plenary meetings. 
There were only a few working groups, devoted to issues like rout- 
ing and European connectivity. 

In addition to representatives from most of the central European 
countries, there was a heavy contingent of East Europeans, includ- 
ing delegations from Czechoslovakia, Poland, Hungary, and Yugo- 
slavia. Most of the representatives from Eastern Europe migrated to 
the working group session on connectivity. After a brief review of 
who was coming on line, the conversation turned to problems of 
mutual interest. 

One of the biggest issues was simply getting equipment. All the 
countries were on the U.S. export restrictions list and the Poles told 
how it had taken them a year just to get a Cisco router. Various 
suggestions were bandied about on just exactly how the USS. 


235 


Exploring the Internet 


wanted the myriad forms filled out, but it was obvious that the 
rules the U.S. imposed remained mysterious and arbitrary. 

Another working group was devoted to the issue of routing co- 
ordination. Routing was the single biggest technical issue at the 
meeting, and it is in this area that RIPE made its biggest contribu- 
tion. In the U.S., there was a single backbone which used the EGP 
protocol to announce available routes to the second-tier regional 
networks. The backbone was centrally managed, so all the regionals 
got fairly consistent information. In Europe, there was no backbone, 
so it was pretty much guaranteed that conflicting routing informa- 
tion would be propagated, leading to routing loops and black holes. 
RIPE took a look at the map of Europe and it became clear that four 
sites acted as the main hubs. 

These four sites, in Stockholm, Amsterdam, CERN, and Bologna, 
served as the centers for large numbers of secondary networks. 
Stockholm was the center of NORDUnet and Bologna was the cen- 
ter of the Italian network. Amsterdam and CERN had huge num- 
bers of links going out to different countries. 

The four sites agreed to take the lines running from Stockholm 
to Amsterdam to CERN to Bologna and turn them into a de facto 
European backbone. The routers at the four sites were combined 
into a single routing domain, thus presenting a consistent view of 
the world. To make the backbone a reality, all four sites agreed that 
transit traffic could traverse their links. 

This was certainly not a centrally managed, fault resilient, highly 
designed backbone, but it did the job of connecting the European 
Internet. Since the four main sites also had links to the U.S., the 
European Internet was well connected to NSFNET and the rest of 
the world. 

In a centrally managed backbone environment like NSFNET, 
low-level networks that wish to make their availability known to the 
world (and thus enable communications with said world) simply 
have to inform the NIC or NOC running the backbone. If the low- 
level network doesn’t fill out the appropriate forms or jump through 
the appropriate hoops, the network is simply not announced and 
thus is effectively isolated. It would be as if a road existed into a 
country but there was no indication of the road on any map. 


236 


Amsterdam 


In Europe, maintaining the name space was a trickier situation. 
RIPE came up with a novel plan to keep information up to date. A 
European WHOIS service was put into place containing network 
names, domain names, IP addresses, and the like. 

The incentive to keep this information up to date was quite sim- 
ple. The four backbone sites used the WHOIS database to load their 
routers. Sites that didn’t keep information up to date were simply 
not announced over the de facto backbone. 

RIPE was a simple, effective tool for coordination and instruc- 
tion, all done on a shoestring. The informal nature of the group and 
the advocacy of the heretical TCP/IP was too much for the network- 
ing establishment and RIPE came under heavy attack at first from 
officially sponsored groups like RARE. 

To understand why RARE would object, one has only to remem- 
ber that TCP/IP continues to be referred to by many as “DoD IP.” 
In contrast, OSI, developed with very heavy participation from 
European academics and PTTs, was the open way to do networking. 

While RIPE was under attack, it was also clear that IP network- 
ing was gaining a strong hold in Europe. In one of those bizarre 
twists of European politics, RIPE became an official RARE “activ- 
ity.” Not an official working group, mind you, with the connota- 
tions of European Commission financial support, official voting by 
one participant per country, and a chairman appointed by the RARE 
Council of Administration. Simply an activity. 

Under the merger and acquisition agreement, RIPE would con- 
tinue as an independent group and would elect its own chairman. 
RARE got to bring the renegades under its umbrella and unity once 
again reigned, at least on the surface. 

To tell the truth, I wasn’t exactly sure why the merger took 
place, but I did get a glimpse when Rob told me about the new 
RIPE NCC being formed. The informal RIPE backbone had been 
working well, but members decided they needed a more profes- 
sional Network Control Center. Not a mere NIC, several people 
cautioned me (but certainly less than a NOC), this NCC would 
serve a coordination and troubleshooting function. 

The NCC would be funded by voluntary contributions. Since 
RIPE was not a legal entity, the money would be funneled through 


237 


Exploring the Internet 


RARE. RIPE/RARE had already put out an RFP for ECU 250,000 
(U.S. $307,500), enough they hoped for a manager, two staff, some 
equipment, a travel budget, and some office space. Obviously, it 
was hoped that a group like NIKHEF or NORDUnet would respond 
with an offer within the budget, and would donate resources on top 
of the ECU 250,000. 

A committee had been formed to evaluate the responses to the 
RFP, consisting of two RIPE officers and two RARE officers. This 
group, upon making its decision, would forward it to the RARE Ex- 
ecutive, which in turn would make its recommendation and send it 
on up to the RARE Council of Administration. RARE would then 
officially hire (and fire) the manager. 


0 


Following this discussion, I must admit I was still a bit confused as 
to what was going on. While I wasn’t clear on the organizational 
ins and outs, it was certainly clear that RIPE was performing a valu- 
able coordinating function, allowing the technical people to gather 
in one room and work out solutions to problems. 

Sometimes the issues on the table were highly complex, such as 
how to do policy routing in an environment characterized by too 
many policies. Often, though, the issues were painfully simple. 

Take the issue of country codes, the two letter abbreviations by 
which you send a letter or provide the root portion of a DNS name. 
The list of such codes used to be fairly static, but with the disinte- 
gration of the Soviet Union there were a bunch of new roots to the 
name tree. 

Managing that root was a sign of power, and in more than one 
case, fights had broken out within a country between groups who 
felt they were the rightful namespace administrators. The right to 
control the top of the tree was a touchy issue in a place like Yugosla- 
via. Imagine a Serb administration of the Croatian subdomain, for 
example. 

RIPE served as a place where these types of issues could be 
ironed out. Not everything can be solved on an informal, technical 


238 


Amsterdam 


level, of course, but it is amazing how many problems can be 
worked out this way. 

One exchange in the RIPE plenary that I found interesting was 
the issue of where to find the current country codes. Officially, 
these codes are listed in an ISO standard and, in response to a query 
from the audience, a bureaucrat got up and explained that one ob- 
tained ISO standards from one’s own national standards body. 

Not a very useful solution to a simple problem, so somebody 
else got up and suggested that the information be obtained from the 
back of a Sun manual. The representative from Israel suggested that 
Larry Landweber maintained this information as part of his list of 
connectivity. 

Finally, somebody wanted to know if this information wasn’t 
online. He had heard about some standards server “someplace in 
the U.S.,” but when he tried to obtain standards there he had re- 
ceived an error message. 

I had the dubious honor of trying to explain why the ITU had 
withdrawn their permission for posting standards since the server 
wasn’t helping “the right sort of people.” Many of the Eastern 
Europeans were furious about the decision since it had been their 
only access to the vital documents. Would ISO be posting their 
standards, somebody wanted to know? 

I explained the concept of a standards haven in some friendly 


location like Budapest. Everybody laughed and the plenary broke 
up. 


0 


That afternoon, I managed to drag Glenn Kowack away from the 
center of the vortex he creates to find out about EUnet. Glenn had 
just finished his first year as the CEO of EUnet. EUnet was sort of 
the analog of the U.S. USENET, but had evolved into a much more 
structured network. 

In the U.S., the UUCP protocols had long been used to allow 
people to form a very loose confederation of systems, a sort of net- 
work anarchy. A new system would join USENET by setting up an 
arrangement with some existing system for the transfer of mail and 


239 


Exploring the Internet 


news, usually using dial-up links. The only real rule was the un- 
written tradition that if somebody was nice enough to let you join, 
you ought to do the same for somebody else. In this way, a loose 
web formed across the U.S. and a de facto network came into being. 
The informal nature of USENET meant no acceptable use poli- 
cies or votes to allow a new member in. Lack of formal structure, 
together with the low cost, meant that USENET (and the underlying 
UUCP protocols) spread quickly among small startup companies. 


Much of USENET ended up falling under the umbrella of 
USENIX, the U.S. UNIX users group. In Europe, simple networks 
were also forming in the context of UNIX user groups and the 
UUCP protocols. In Europe, though, there wasn’t quite the luxury 
for anarchy that the U.S. had. 


For one thing, calls across national borders were expensive 
enough that it made sense to concentrate traffic through a star con- 
figuration of national nodes and a central switch. The central 
switch was the famous mcvax (now mcsun), housed at CWI in Am- 
sterdam. Since an international call to one point in Europe costs 
pretty much the same as to any other point, there was no need for a 
fancy mesh topology, and the star stayed in place. 


Because calls cost so much, users started paying their share of 
line charges from the very beginning. Administration and manage- 
ment was totally volunteer and fell under the umbrella of the Euro- 
pean UNIX Users Group (EUUG), and the net came to be known as 
EUnet. 


By the time Glenn joined EUnet in January 1990, it had grown to 
be a TCP/IP and UUCP network with over 1,600 sites. Over the 
next year, it was to grow to well over 2,500 UUCP sites, 100 IP sites, 
and 750 news sites. All this traffic was going from local networks, 
run by a local UNIX user’s group, into a national node, and then 
over to Amsterdam. 


EUnet, with all these users, began playing a major role in Euro- 
pean networking, pooling its money with other groups like NOR- 
DUnet so that bigger pipes could be leased. Many of these shared 
lines formed the de facto European backbone of RIPE, and then later 
of EBONE. 


240 


Amsterdam 


One of the interesting aspects of EUnet is that it is often the very 
first network in a country. By January 1992, EUnet already had 22 
national members, each representing a national UNIX user’s group, 
running a national node, and paying for their own line to mcsun. 
The cost of international links, the Amsterdam equipment, and mis- 
cellaneous overhead like Glenn were also apportioned among the | 
members. 

With the craze towards open systems at a peak, EEUG changed 
its name to EurOpen to signify openness, truth, and beauty. Thank- 
fully, EUnet did not become OpenNet. 

Both parts of the EurOpen name are applied in a fairly loose 
fashion. Open included things like UNIX and TCP/IP instead of 
being a code-word for only OSI. European is also interpreted kind 
of loosely. Iceland, Tunisia, and Moscow are members of EUnet, 
stretching the word far beyond the confines of the European Com- 
munity, the European Free Trade Association, and even the Euro- 
pean continental boundaries. Egypt and Algeria were coming on 
line soon and Glenn didn’t really seem to care who joined as long as 
he could provide service and spread networking into new countries. 

In fact, it was the desire to spread networking to those who 
could use it that got Glenn his job with EUnet, in a very indirect 
fashion. In the 70s and 80s, Glenn led a reasonably normal life, tak- 
ing jobs like that of an R&D manager for Gould in Champaign-Ur- 
bana, Illinois. Of course, he did take a few years out to help found 
and run a community radio station, a job that many engineers don’t 
sport on their resumes. 

At the tail end of his stint with Gould, Glenn ended up as the 
first employee of the newly formed UNIX International. He enjoyed 
the job so much that, after the organization was off the ground, he 
quit and took three months off to go look at computers in Asia, 
visiting places like Hong Kong and Singapore. 

He came back from his sabbatical and set up shop again in 
Shampoo-Banana, this time hanging out his shingle as a freelance 
consultant. He was doing various consulting jobs when Eastern 
Europe collapsed. 

Glenn bought a Zenith laptop, packed his backpack, and took 
off. By the time he looked up, he found himself in Warsaw chairing 


241 


Exploring the Internet 


the first meeting of the Polish UNIX Users Group, an event made all 
the more challenging by his lack of any knowledge of Polish. 

In his travels, he made enough visits through Holland that he 
got to know the Amsterdam crowd well. EUnet decided to hire a 
real manager, and Glenn certainly seemed not only highly qualified 
but highly available. He took the job. 

EUnet is proof that networks can be set up with minimal outlays 
of funds. With a headquarters budget of ECU 600,000 (U.S. 
$738,000) and a total pan-European outlay of well under ECU 10 
million per year, EUnet has become one of the key European net- 
works, acting as the lead player in bringing new countries into the 
world Internet. 

EUnet has also played a key role in helping to form the EBONE 
consortium. EUnet’s historical role in working with other organiza- 
tions on line sharing has meant that lines to the U.S. and across 
Europe have been possible even when groups like RARE were un- 
able to act. 

One would think that a low-budget, technically astute, ex- 
tremely effective network would win plaudits from all over, but 
EUnet has its detractors. OSI-only groups view EUnet and its infor- 
mality as a definite threat. In some cases, active efforts are under- 
way to try and prevent EUnet from operating. 

A recent example was brought to light at the RIPE meeting. 
SWITCH, the national research network in Switzerland, had barred 
EUnet traffic from its network. Not only had the traffic been barred, 
it was cut off without any advance notice to EUnet, causing several 
days of confusion as people all over Europe tried to figure out their 
sudden loss of connectivity. 

At the RIPE plenary, Michael Nowlan, the Irish chairman of 
EurOpen, read a prepared statement protesting the lack of notice. 
What had really happened illustrated the type of politics that EUnet 
encountered. 

In each country, it is up to the national UNIX users group to 
figure out how to move traffic from the national node out to the rest 
of the country. In some countries, a simple dial-up star configura- 
tion is sufficient. In others, there is enough traffic that a backbone 
linking regional hubs makes sense. 


242 


Amsterdam 


How to provide that backbone is up to each group. In some 
cases, the group will simply lease lines and set up a backbone. In 
other cases, line-sharing agreements with a national research net- 
work might be established. In other cases, a contract can be set up 
with some other entity to provide the backbone. 

In Switzerland, the Swiss UNIX group (CHUUG) had been us- 
ing SWITCH, the national research network, as a_ backbone. 
CHUUG and SWITCH got into a squabble over various matters and 
CHUUG decided to set up its own backbone. SWITCH set up their 
routers to filter out EUnet IP traffic, thus cutting off connectivity 
from the 22 EUnet countries to anybody on SWITCH or with a tail 
link off of SWITCH. 

Fortunately, these childish games are the exception rather than 
the rule. In most countries, EUnet happily coexists with the na- 
tional research networks. The national nets handle the universities 
and the UNIX group handles low-volume UUCP clients, IP links to 
small companies, and anybody else who falls outside the official do- 
main of “research” as defined in that country. 


0 


With my work for the day done, I went out for a couple of beers 
with Scott Williamson, the manager of the new Network Informa- 
tion Center (NIC) in the U.S. The NIC had been recently transferred 
from SRI to GSI, a subsidiary of Infonet. GSI and Scott had a rough 
few months as things got going and Scott was now making the tour 
of conferences like RIPE and the IETF to convince the community 
that things were back in control. 

Running the NIC is no easy task, I learned. Just maintaining the 
WHOIS database requires an 800 Mbyte database running Ingres, a 
condition specified by the Defense Communications Agency, the of- 
ficial funding agency for the NIC. Even though a great part of the 
traffic into the NIC comes from the NSFNET, not the MILNET, the 
NSF had yet to set up its own similar facility, making Scott responsi- 
ble for both networks. 

One of the big problems was that the NIC had inherited its com- 
munications facilities as part of the DCA contract, which specified a 


243 


Exploring the Internet 


64 kbps link to the Internet. A pipe of that size is not enough for an 
organization that is at the center of the Internet and the link was 
quickly flooded. Only after the NASA Science Internet stepped in 
with a T1 line did things start to get better. 

Over beers, I learned that Scott is ideally suited for his job. His 
background was managing a team of UNIX programmers for vari- 
ous Washington tasks, such as a job for the Federal Emergency Man- 
agement Agency (FEMA) simulating telephone disasters. More to 
the point, though, he is a second-degree black belt in a Korean mar- 
tial art and spent three years in the Australian outback. Both experi- 
ences breed qualities that are useful when dealing with Washington 
bureaucrats. 

That night, RIPE had set up a group dinner at a local Indonesian 
restaurant. Indonesia was a former Dutch colony and an Indone- 
sian dinner provided excellent food, at a price that was affordable 
on all manner of budgets, an important consideration given the 
wide geographical representation at the meeting. 

Over salads in gloppy peanut sauce, preserved eggs in sweet 
chili and lemon grass, and fiery beef curries, the conversation 
drifted in and out of shop talk. I was too jet lagged and burnt out 
to think about networks, so I concentrated on the food. 


244 


Utrecht 


Wednesday morning, I brought my bags down to the train station 
and joined a stream of Dutch commuters. It is not unusual for peo- 
ple in Holland to live at one end of the country and work at the 
other. I was going half-way across the country to Utrecht, a half- 
hour away. 

The train ran parallel to one of the main Amsterdam canals, 
lined with houseboats and barges, then past warehouses and wind- 
mills. Passing the suburb of Amstel and the sprawling IBM com- 
plex, we started picking up speed. Suddenly, we were in the 
countryside, an elaborate system of canals crisscrossing the fields 
and forming a series of little islands, connected by bridges and 
sluices. 

It was market day in Utrecht and, since I didn’t have a hotel 
reservation, I headed right into the middle of the town square to 
look around for a place to stay. Spotting one, I avoided the tempta- 
tion to stop at stands full of cheeses, herring, and baked goods and 
got a room. 

With a few hours to kill, I brought my laptop into a little café by 
a canal, one of a half-dozen places crowded with tables of high- 
school and college kids sipping coffees and beers. At 2 PM., I gath- 
ered my things and went into the shopping center complex 
surrounding the train station to find Kees Neggers, co-managing di- 
rector of SURFnet, the Dutch academic and research network. 

After seeing so many networks like EUnet in Amsterdam and 
AARNet in Australia run with a couple of guys and a Sun, it was 
certainly a change to see SURFnet occupying a whole floor of plush 
offices. When I asked Kees how many people worked there, he said 
only 20, but many of them were responsible for supervising subcon- 
tractors. 

SURFnet is a company that is owned 49 percent by the Dutch 
PTT and 51 percent by the SURF Foundation, a group started in- 
itially by the universities, but which has grown to include research 
institutes, the research arms of corporations, and other institutions 


245 


Exploring the Internet 


of higher education such as teaching hospitals and vocational 
schools. 

To explain SURFnet, SURF, and the PTT, Kees went to the white 
board and carefully drew the organizational structure, drawing my 
attention to the legal status of all the parties and pointing out the 
differences in Dutch law between the limited liability partnership, 
the foundation, and the association. 

As Kees continued his chalk talk, it occurred to me that he had 
not said one word about the network itself. I knew that SURFnet 
was born as a project of SURF in 1986, had become a real company 
in 1989, and I even knew about things like the fact that it had a 
capitalization of 3 million guilders (U.S. $1.6 million), and expendi- 
tures of NG 14 million per year, of which NG 10 million were cost 
recovery services from users and 4 million was development paid 
for by the government. What I didn’t know was what the network 
did. 

Well, it turned out that SURFnet started by using the X.25 data 
service from the PTT. After some long thinking and a big RFP, 
Northern Telecom got the contract to install and manage a private 
X.25 network based on 64 kbps links. This net was based on three 
major hubs, with each leg of the triangle having two or three 64 
kbps links. Another 16 sites were equipped with switches, each of 
these having at least two lines into the network. Altogether, 413 
sites had connections. 

The network appeared to be your basic FOO over X.25 net. 
Most of the services had SURF* names. SURFmail, for example, 
was described in the annual report as “using the RFC-822 address- 
ing mode as an intermediate step towards the international X.400 
standard.” 

Recently, the network had begun the process towards a 2 Mbps 
backbone. To quell any political problems, five sites were given 2 
Mbps links and a “pilot” was run. Some lines ran straight IP, others 
ran straight X.25, and some ran a multiplexed mess of the two. 
Needless to say, the results of the pilot showed that running IP ona 
line was more efficient than running IP on top of X.25. However, 
with X.25 identified in many European countries as the “pathway to 
OSI” it was important to conduct the pilot. 


246 


Utrecht 


All this technical information I learned in a few minutes from 
Kees and by leafing through the annual report. Very quickly, 
though, we were back on the subjects of organizational charts, ex- 
amining how his network management staff served as contract su- 
pervisors to monitor the subcontractors that were doing network 
management. 


We moved on from SURFnet to pan-European politics, an area 
in which Kees is an extremely active player. His first foray was as 
the EARN representative for his country. When RARE was formed, 
SURF was named as the Dutch national member, and Kees was 
named SURF’s representation to the RARE Council of Administra- 
tion (CoA). 

RARE, the Réseaux Associés pour la Recherche Européenne, was 
started in 1986 to promote the use of networks based on open sys- 
tems solutions, read “OSI.” This was to be sharply contrasted to 
EARN, IBM's proprietary protocol, association, and network, foisted 
upon unknowing European countries as part of an alleged plot to 
dominate the market. Well, maybe not quite that sharply con- 
trasted, but it would not do to underestimate the fury of this par- 
ticular religious war. 


At that time, only the U.K. really had a national network. Many 
people assumed that OSI would be the basis for networking and 
that the PTTs would provide the infrastructure on which OSI would 
run. That infrastructure would be a commercial offering, univer- 
sally available, and available soon. 


The focus on the PTT as the service provider led to the assump- 
tion of a single national network, and thus RARE is made up of one 
member per country. There are also various associate members, in- 
ternational members, and liaison organizations, but the basic gov- 
ernance of the organization is by the Council of Administration 
which has one seat per country. 


There is another element of RARE that is worth noting. It gets 
money from two sources: contributions from member countries and 
from the European Commission. The European Commission com- 
ponent is strong enough that they wield considerable clout on 
RARE decisions. 


247 


Exploring the Internet 


Most of the linkage between RARE and the Commission has 
been through the COSINE project. (Every acronym must be pro- 
nounceable and preferably have a double meaning of some sort, 
however inane. In the case of COSINE, the expansion yields Coop- 
eration for OSI Networking in Europe.) 

COSINE was started in 1986 by another group called Eureka, a 
research fund subscribed to by a group of countries roughly equiva- 
lent to the RARE membership or the European Free Trade Associa- 
tion. The COSINE project of Eureka was handed over to the 
European Commission to act as project coordinator and they, in 
turn, picked RARE as the secretariat. 

What all this meant was that Eureka kicked in some money, the 
Commission kicked in some more, and a fraction of that money 
flowed downhill to RARE. Eventually, so the theory went, money 
would flow down even further into a series of market-pull activities 
that would prepare and stimulate OSI in Europe. 

Much of the research funded by the Commission was in the area 
of “pre-standardization research.” Pre-standardization was the 
process of preparing a bunch of documents that are then used as 
input to the standards process. In the case of COSINE, this meant 
establishing the subset of OSI that would best fit the special needs 
of Europe. 

The functional profiles of OSI were prepared by a series of 
working groups. Every country got a member. The chair could in- 
vite four “experts,” sort of a standards patronage position. The EC 
paid for the travel expenses of each delegate, kicked in for the cost 
of donuts at the meetings, and took care of the RARE secretariat. 

Paying people to go to meetings in fine places has the sure result 
of generating a large demand for meetings. The specification proc- 
ess dragged on as people tried to define which portions of OSI 
would be used in Europe. The assumption was that when those 
profiles were developed, the lure of the common European market 
would be enough to attract vendors like flies to a water buffalo. 

Vendors and researchers took one of two approaches. A few 
went ahead and just implemented the portions of OSI that made 
sense in a product. ISODE was a perfect example of this. Most just 
went ahead and sold TCP/IP products. 


248 


Utrecht 


After a couple of years of this process, a set of 10 very thick, 
very blue volumes of COSINE specifications were issued. These 10 
blue books were summarized in a red book, which in turn was sum- 
marized in an orange executive overview. I suspect quite a few cor- 
porations took that orange distillation and concentrated it yet 
further until senior management was hearing summaries such as 
“this stuff is great, trust us.” 


Once the specifications were complete, RARE developed a CO- 
SINE implementation plan. In January 1990, this implementation 
plan was signed as a contract between the Commission and RARE. 
The RARE COSINE Project Management Unit (PMU) became a real- 
ity. 

COSINE was designed as a three-year plan with a budget of 
ECU 30 million (U.S. $36.9 million). Most of that money, over ECU 
12 million, went into IXI, the International X.25 Infrastructure (IX]). 
A large chunk, ECU 6 million, went into the PMU. 


IXI is an international X.25 network for researchers. Countries 
like Greece, Yugoslavia, Ireland, and Portugal all use IXI as their 
main path into the European mainland. Even the U.K., for some 
strange reason, links itself into the continent with IXI. 


The network is simply a star configuration of a set of 64 kbps 
lines that link national X.25 networks. Typically, a private, virtual 
X.25 network is built on top of the PTT’s own offering. There are 
actually two stars, one in Amsterdam and one in Bern. Two 64 kbps 
links connect the stars, and each country gets one 64 kbps link into 
one of the hubs. 


Except for the U.K., that is. The U.K. is big enough that it really 
needs two 64 kbps links into Amsterdam. Of course, that means 
that you’re pumping 128 kbps of data into a 64 kbps network, but 
that’s another story. 


In a classic example of how networks will grab whatever re- 
sources they can, much of the IXI traffic consists of setting up a 
virtual circuit to NIKHEF, which operates a gateway from IXI into 
the Internet. While running TCP/IP on top of X.25 is not the most 
efficient implementation in the world, when that’s your only choice, 
it works fine. 


249 


Exploring the Internet 


The theory behind IXI, and all COSINE projects, was to stimu- 
late the market with the initial implementation. At the end of the 
three-year trial, some commercial entity would see the inherent 
profitability of the enterprise and step forward boldly with an ag- 
gressive bid to take the project over as a going concern. 

At the end of 1992, IXI would terminate, and there had not yet 
been a clamor for rights to run the service commercially. Unless, of 
course, there might be some Commission money in it. This had oc- 
curred to a few people, and RARE was about to start lobbying for 
an Operational Unit. 

Meanwhile, a second force reared its ugly head: people needed 
networks to do their jobs. Most of those national networks had 
started carrying large amounts of TCP/IP traffic, and many RARE 
members had to weigh the relative merits of keeping a network run- 
ning against the desire to attract Commission money. 

RIPE, of course, was the answer at first. RARE got in the act 
with the EBONE proposal, in which Kees took a leading role, along 
with groups like EUnet and NORDUnet. EBONE took the informal 
cooperation from 1991 and turned it into a more structured consor- 
tium for 1992. 

Since the meeting I had attended in November at the Amster- 
dam Zoo, the EBONE proposal had taken shape. Two key groups, 
CERN and IBM, had decided not to sign the formal memorandum 
of understanding, but would still cooperate in the project. 

Once the decisions to join (and how much to contribute) were 
made, the resources were turned over to an EBONE Action Team 
(EAT) to turn money, routers, people, and lines into a reasonable 
network. 

A 512 kbps backbone had been decided upon between Stock- 
holm, London, Amsterdam, Hamburg, and CERN. Three links to 
the U.S. were available, with two operating at 512 kbps and a T1 
line from CERN (the EASInet IBM line). In some cases, money had 
been used to upgrade existing facilities. In others, existing resources 
were simply put into the EBONE pool. 2 

The distinction was important because at the end of 1992, ac- 
cording to the Memorandum of Understanding that chartered 
EBONE, the group would disband and all resources would revert to 


250 


Utrecht 


owners (except for the money of course, which is kind of hard to 
give back once you've spent it). No formal company existed and 
there was no dedicated EBONE manager. 

At the end of 1992, the official plan was to have RARE start an 
Operational Unit. The Operational Unit would provide a home for 
things like EBONE and maybe even projects like IXI. The Opera- 
tional Unit would be set up with capital from RARE members (and 
presumably some nice research grants from the Commission to keep 
it going). Officially, the Unit would operate as a separate organiza- 
tion, but with RARE members contributing the capital, RARE mem- 
bers would get the shares, and presumably, RARE would have some 
influence in how those shares got used. 

Setting up the Operational Unit and operating it as a more for- 
mal replacement for EBONE could be looked at one of two ways. 
On the one hand, it could be the badly-needed professional opera- 
tion that would run the long-heralded pan-European infrastructure. 
A few cynics looked at the Operational Unit in another way, seeing 
a power grab that could hurt existing operations such as EUnet. 

The official raison d’étre for the Operational Unit was contained 
in a report Kees handed me entitled “Final Report of the RARE Task 
Force on the Establishment of the Operational Unit for the Supply of 
Network and Information Services to the R&D Community” with a 
bright yellow cover and attractive GBC binding. 

This report was a marvel of detail, containing a complete busi- 
ness plan for the Operational Unit with a cash flow analysis through 
1996, job descriptions for OpUnit officers, and an annex of com- 
monly. asked questions and answers, my favorite being ‘““Why are 
data networks important for Europe?” 

This report explained how a professionally managed backbone 
was key for Europe. In fact, it was assumed that you needed to 
provide this capability through a single organization, sort of the 
way that the NSFNET had provided a single backbone service in the 
US. 

The flaw in this analogy was that the NSFNET had not provided 
the single backbone service in the United States or for the Internet. 
The backbone was, as soon as multiple networks came into being, a 
combination of resources. 


251 


Exploring the Internet 


The NSFNET, for example, had to cooperate with the MILNET, 
the replacement for the ARPANET. NASA already had NSI, Energy 
had ESnet, and corporations had their own networks. A single 
backbone provider was certainly not the only way to structure Euro- 
pean networking. 

As I was looking through the business plan for the OpUnit, Kees 
handed me another document, a report from the European Engi- 
neering Planning Group, which in turn had been set up by the 
RARE Council of Administration. 

The EEPG document had a grand plan for networking in 
Europe. Kees was a key member of the EEPG. The EEPG outlined 
a scheme in which research networking in Europe would need, to be 
a success, four bodies. An Operational Unit was one of them. A 
networking association (RARE), a policy body (people with money), 
and a “consultative networking forum” were the other three bodies. 

Of course, there were other networking associations in Europe, 
but RARE had been doing a pretty good job of setting up agree- 
ments. RIPE had become a RARE activity, a status certainly placing 
it lower in the hierarchy than an association. 

That left EARN. RARE had been engineering an acquisition and 
merger of EARN, proposing that the two groups form as a way of 
increasing their mutual power. Like a giant game of RISK, with 
Europe under control, RARE was taking an active role in the inter- 
national scene, participating in places like the Co-ordinating Com- 
mittee for Intercontinental Research Networking (CCIRN) and 
co-founding the Internet Society. 

This wasn’t everything, either. I learned that RARE had helped 
form the European Workshop on Open Systems (EWOS) which 
would help set up European OSI profiles. RARE was also part of 
the European Telecommunications Standard Institute (ETSI), the of- 
ficial pan-European telecommunications standards body which was 
worrying about issues like ISDN or 2 Mbps X.25 networks and had 
joined the European Council of Telecommunications User Associa- 
tions (ECTUA). 

I left Kees’ office with my head swimming. He had let me know 
that he had to leave by 4:06. I had thought the departure time was a 
bit odd, but it occurred to me that Kees was in the shopping center 


252 


Utrecht 


of which the train station was a part and that he had probably 
timed the walk down to the trains. Just in case he felt like getting a 
jump on things, I left at 4:03. 

Walking back to town, to keep warm, I went through all the new 
acronyms I| had learned, hoping that repeating them would generate 
enough hot air to counteract the chill. Needing a cup of coffee and 
a blank piece of paper to sort everything out, I ducked in out of the 
cold into a little corner coffee shop with windows all fogged up a 
definitely counterculture clientele. 

Rubbing my hands to warm up, I stepped up to the counter to 
order. 

“Do you have a menu?” I asked the attendant who ambled over 
from a table where he was playing chess. 

He pointed down on the glass. I quickly realized that I was at 
the wrong counter. This menu specialized in regional specialties. 
The left hand side featured different kinds of hashish, ranging from 
your basic Lebanese to your more exotic Nepalese. The 10 and 25 
guilder columns contained how many grams (or portions of grams) 
you got for your money. The right hand side of the menu was de- 
voted to fine marijuanas, featuring orange bud, sinsemilla, and the 
like. 

Not needing to confuse myself even further, I went down the 
steep spiral stairs to the coffee bar in the basement. There, amidst 
the kids rolling joints, the din of pinball, and the very loud music, I 
read through the stack of documents I had collected that day. 


253 


Bonn 


Thursday morning, I sat on the track at the Utrecht station waiting 
for my train to Bonn. If you’re a few minutes early, its fun to go up 
to the tracks and watch the other trains leave. The 9:23 local was 
leaving on my track and I watched the clock turn to 9:23. Exactly 
two seconds later, the train was on its way. 

One of the questions that always puzzles me is what conditions 
lead to a successful infrastructure. The European networking infra- 
structure was certainly not as developed as it could be. Likewise, 
the telephone infrastructure had always been expensive and not al- 
ways on the forefront of technological change. 

Yet, the European passenger train system, developed in a highly 
fragmented period of highly sovereign governments, was a miracle. 
The trains go to every town of consequence and many of none. 
Even more remote places are connected to the transportation web by 
a series of bus systems, coordinated with the train schedules, of 
course. 

Staring at the track, hoping for a flash of insight, I realized that 
my train was about to leave. A few hours later I arrived at the 
Hauptbahnhof in Bonn and pulled out my itinerary of travel reser- 
vations. To my horror, I discovered that I was booked in a suburb 
of Bonn, Konigswinter. 

My instructions to my travel agent had been simple. “No Holi- 
day Inns, no suburbs.” Bonn, like Prague, is one of those cities that 
never has enough hotels and I was lucky I wasn’t as far away as 
Cologne, the provisional capital. 

I wandered around the train station for a while trying to figure 
out how to get to Konigswinter. I spied a sign for the tram system 
with the magic word on it and caught the first one leaving. The 
tram was labled Bad Honef and I crossed my fingers that the track 
didn’t serve multiple locations. 

When I got on, I realized that I didn’t have a ticket. All over, 
colorful signs in multiple languages indicated that tickets must be 
immediately validated or I would face a DM 60 (U.S. $36) fine. 


254 


Bonn 


Having no idea how to get a ticket, or where I was going, I alter- 
nated between peering out the window looking for some appropri- 
ate sign and looking nervously around for some sign of the ticket 
police. 

Konigswinter turned out to be a resort on the Rhine river. My 
hotel had a view of four castles up in the hills, was right across the 
town square from the church belltower, and my room was right on 
the river, looking out at barges and ferries, the tram, a boardwalk, 
and people out strolling in the cold air. 


I went down to the sun room to work. Old men, couples, and 
mothers with children came in periodically to get a cup of coffee, a 
beer, or some ice cream. I ordered a cup of coffee, with the waitress 
checking to make sure I just wanted one cup. 


The next morning, at breakfast, the waitress wanted to know if I 
wanted my coffee in a “can or a cup?” Outside it was still dark and 
I could make out the fog banks in the hills. Suddenly, the fog 
started to glow and I could see the black silhouettes of the castles. 
Then it was daylight and time to try to make my way into Bonn. 


I took the tram back into the main train station and went in 
search of an information booth. I waved a business card in their 
face and they sent me to track 2. As I was trying to decipher the 
map of the extensive tram system, one pulled in. I suddenly real- 
ized that I had been sent to the wrong track, narrowly missing get- 
ting on one going the wrong way. 


Armed with a valid ticket, I arrived at the stop in front of the 
monolithic police station headquarters, walked a few blocks over to 
the offices housing GMD, and found Klaus Birkenbihl. 


Klaus is the manager of the Netzzentrum fuer die Wissenschaft, 
the science networks center in the Institut fur Anwendungsorien- 
tierte Software- und Systemtechnik at the Gesellschaft fur Mathema- 
tik und Datenverarbeitung mit beschrankter Haftung. In the 
interests of saving space, it is hoped the reader will excuse the infor- 
mality of referring to the organization as simply GMD. 


GMD is a government-owned research institute specializing in 
mathematics and computer science. Like INRIA, the French insti- 
tute, the institute gets 60 to 70 percent of its funds from the govern- 


255 


Exploring the Internet 


ment, raising the rest through contracts with industry. GMD has 
1,200 staff, of which 700 are scientists. 

I had come to see Klaus to find out about one more network, the 
IBM-sponsored EASInet. I had always assumed that BITNET, and 
its European cousin, EARN, were IBM’s contribution to networks. I 
heard periodically about EASInet, but did not know anything about 
the network nor why IBM should start yet another network. EARN 
had started in 1984, originally with six countries but, after Dennis 
Jennings heard about it, six countries plus Ireland. The IBM model 
was to fund the program for three years, after which it would be- 
come self-sustaining. EARN added many countries and did, in fact, 
become self-sustaining. 

Not only did EARN become independent, but you might even 
say the board got a touch hostile, planning a transition to OSI and 
cozying up to DEC. The OSI focus was actually a political necessity, 
part of a compromise with the PTTs who agreed to loosen some of 
their restrictions on clients sharing leased lines in return for a prom- 
ise by EARN to migrate to OSI as soon as the protocols became 
technically and financially viable. This all happened in 1984 and the 
OSI migration took a bit longer than anyone expected. By the time I 
got there, most EARN sites were migrating to the BITNET 2 proto- 
cols, more commonly known as TCP/IP. 

The upshot of the OSI (and later TCP) focus was that it was 
quite obvious that EARN was no longer an IBM animal. Creating a 
network that was self-sustaining after three years was a great public 
service, but didn’t really serve the other goals of maintaining the 
IBM presence in Europe and, in the long run, selling more iron. 

IBM developed a new proposal as a way of providing an incen- 
tive to the big mainframe market in the research community known 
as the European Academic Supercomputer Initiative (EASI). Under 
the program, IBM plunked down large amounts of heavy metal in 
selected research institutions and paid for the cost of 64 kbps links 
between participants, the collection of those links forming a fairly 
hefty donation of bandwidth. In addition, IBM paid for the cost of 
a T1 line from CERN to NSFNET and hired GMD to manage the 
network. 


256 


Bonn 


EASInet consisted of 18 sites by the beginning of 1992, with loca- 
tions from Spain and Italy in the south, to Stockholm, Amsterdam, 
and Hamburg further north. Most of these sites were not exclu- 
sively “EASInet” sites, but were on a variety of networks. CERN, 
for example, an EASInet site was sometimes referred to as the Cen- 
ter for European Research Networking. 

In a few cases, the EASInet link was in fact a dedicated 64 kbps 
line between two sites. In most cases, however, the IBM money had 
been thrown together with other sources. For example, a 256 kbps 
line between Amsterdam and CERN was split between HEPnet, 
EUnet, and SURFnet. The line sharing arrangements that EASInet 
started were an important early example of the model later used in 
EBONE. 

To handle multiple protocols, many of the EASInet lines used 
NET’s IDNX time division multiplexers, with most of the band- 
width given over to TCP/IP and SNA and other, smaller, circuits 
applied to X.25 and DECnet. EASInet was really bandwidth. In 
some cases, GMD actually took care of the lines, in others the job 
was split with other organizations. Some of the data flows were 
point-to-point sessions, others were part of broader networks such 
as HEPnet or the European Internet. 

When IBM had agreed to cooperate with EBONE, what they 
meant was that the T1 line to NSFNET would become a pathway to 
the U.S., and thus to Asia. Even though IBM had not signed the 
EBONE document, the link would be available to transit traffic. 


0 


Helping coordinate EASInet was only one of GMD’s projects. The 
site also acted as a key gateway between Germany and the rest of 
the Internet. Germany had long been one of the most ardent OSI 
advocates. In 1984, the ministry of research and technology started 
up a membership organization, the Deutsches Forschungsnetz 
(DFN), the German research network intended to give the German 
scientific community the full benefits of OSI. 

GMD, part of the federal research establishment, ended up with 
a sort of schizophrenic role. On the one hand, they took part in the 


257 


Exploring the Internet 


fervent OSI cult built around the leadership of their funding agency, 
helping DFN on conceptual work and software development. 

On the other hand, GMD had work to do and actively helped 
build EARN, running the German national node since 1987. At the 
same time, GMD started building a private X.25 network to link 
German national research laboratories together. 

This private network, AGFnet, was not OSI (in fact it was SNA), 
but at least it contained X.25, the “pathway to OSI,” to make it po- 
litically palatable to the bureaucracy. What AGFnet did do was 
prod DEN into action, which resulted in a national X.25 network 
called Wissenschaftsnetz (WIN or “science network”). 

DFN had a notable success in building WIN: they made it af- 
fordable. With the fairly strong backing of the federal government, 
DEN was able to convince the German PTT to give it preferential 
rates and, most importantly, to avoid imposing volume-based 
charges. The result was a rate of DM 5,000 per month for a 64 kbps 
line. By 1991, WIN had spread throughout Germany and much of 
the research community was on the network, including commercial 
researchers such as Daimler Benz. 

After what Klaus wryly termed “a period of difficulty,” DFN ac- 
cepted the premise of multiprotocol networks. In fact, with users 
paying for their own usage, it turned out that the vast majority of 
sites chose to use TCP/IP or EARN protocols. 

There was still some OSI work on the network, particularly since 
the federal government was willing to finance such research. X.400 
usage, in particular, had significant usage and was growing quickly. 
GMD operated application gateways to the Internet and EARN 
worlds to keep connectivity. 

Hanging in Klaus’ office, high up near the ceiling, was an abacus 
with a little mouse perched on top. This odd little arrangement was 
the Birkenbihl massively parallel supercomputer, given to Klaus by 
his daughter. “Look,” he said, pointing to the blue and red beads, 
“it even has a color graphics display.” 

I went back to Konigswinter, hoping to warm up with a nice, 
hearty German meal, but it was the off-season and all the interesting 
places were boarded up. A half-dozen Greek restaurants appeared 
to be Gyros-only joints, with nary a drop of taramasalata in sight, so 


258 


Bonn 


I settled on an Italian restaurant. There I was served limp, over- 
cooked noodles in a heavy, congealed green sauce. 

“That was the worst pesto I’ve ever had,” I told the waiter as I 
paid up. 

“Thank you very much,” he said with a proud smile. 

I finally found a sausage shop open and filled up on a couple 
mugs of Konig-Pilsner and a Riesenbackwurst, a greasy sausage 
served on a slab of cardboard with a puddle of mustard. Much bet- 
ter than the lime-green pesto. 

The next morning, checking out of the hotel, I watched the clerk 
punch my room number into the computer and we stood staring at 
each other with forced smiles while the dot matrix printer chugged 
away. The clerk retrieved the printout, then walked over to an an- 
cient cash register and punched in the room charges, one by one. 
He then picked up a thick sheaf of bar bills and added them in, one 
by one. 

He took that printout over to a calculator, where he added in my 
minibar charges. By then, I was not in the least surprised when he 
took that slip over to his desk and figured out the tax, adding it in 
by hand. 

“Not very modern,” he said with a shrug. 

I had to agree. 


259 


Brussels 


I took the early morning Schnellzug to Cologne. With over an hour 
to kill, I put my bags into a locker and checked out the bar and café. 


It was 8:00 AM., but the bar was standing room only—there 
were no chairs but lots of men standing around drinking their pre- 
train beers. In the café, there were eight of us and five had ciga- 
rettes going, all crammed into a space smaller than a Manhattan 
studio apartment. I went back to the bar. 


Two minutes before departure, I went up to the track just as the 
train to Brussels pulled in. I boarded and spent a dreamy two hours 
staring at sleepy villages and isolated farm houses, built of stone 
and sitting precariously on hills in the middle of black fields. 


We entered Brussels, the center of the densest train network in 
Europe. Our track joined others and soon we were picking our way 
through a yard dozens of tracks wide. Then, suddenly, we were 
inside the cavernous central train station. 


I spent the weekend catching up on my reading and looking for 
open restaurants in a city where it seemed like even the red light 
district closed on weekends. Brussels prides itself on being at the 
geographic center of Europe, and thinks of itself as the logical capi- 
tal of the European Community, home to the Commission. I think 
of it more as the Indianapolis of Europe. 


After the sleepy calm of the weekend, I figured my two days 
trying to find out about the infamous Directorate Generale 13 (DG 
XIII) would be relatively simple and might even yield useful infor- 
mation. 


This optimistic mood was soon to change. The weather got even 
colder, the food got toxic, the taxi drivers started getting into acci- 
dents, and, worst of all, I entered the bureaucratic swamp of the 
European Commission. 


0 


260 


Brussels 


Monday morning, I walked over to the European parliament build- 
ing and up the Rue du Loi, past huge monoliths filled with func- 
tionaries, to the Rue de Trévres, home to a portion of DG XIII. The 
European Commission security system requires visitors to leave 
their passports as identification, but since I had a fax from a DG XIII 
PR officer I was allowed through. Security didn’t even look at the 
fax to make sure that the letter wasn’t a request to have me perma- 
nently barred from Europe. 

On the second floor, I was ushered into the office of Peter 
Johnston, an official of the F Directorate of the 13th Directorate-Gen- 
eral of the Commission of the European Communities. We were 
soon joined by another official, also named Peter. There was one 
seat free on my side of the little conference table, but Peter 2 took 
great pains to clear off a chair and align himself with Peter 1 on the 
other side. 

With both Peters in place, they began an interchangeable litany 
of platitudes, trying to explain everything the Commission was do- 
ing from promoting networking to ensuring the future of interna- 
tional trade. I had heard about things like COSINE, RACE, PACE, 
RISE, and the European Nervous System and naively asked if per- 
haps one of the Peters could explain these pieces, perhaps starting 
with the RACE project. 

There was my first mistake. You see, RACE is a program, not a 
project. 

“No, no, no,” Peter 1 chided me, explaining how, in the context 
of the third framework there were a series of programs such as 
RACE, each of which was made up of dozens and dozens of pro- 
jects. RACE was no mere project, thank you. 

I learned little of substance in my briefings, but later, digging 
through over 20 pounds of documents I had amassed, I was able to 
put together a cursory picture of the programs and projects and 
themes and frameworks that the Peters were so unable to articulate. 

DG XIII is the portion of the bureaucracy of the Commission 
charged with looking after the areas of telecommunications, infor- 
mation technology, and innovation. DG XIII has taken an active role 
in industrial policy, funding a great deal of research and develop- 
ment, and also handling some regulation. 


261 


Exploring the Internet 


The reason for DG XIII is that Europe has traditionally been a 
stronghold of the PTTs, monopoly service providers of postal serv- 
ices, telecommunications, telegraph, and even, in many cases, bank- 
ing and other sundry services. Although the size of the European 
economy is about the same as the U.S., fragmentation of telecommu- 
nications has led to conflicting standards, closed markets, and ineffi- 
cient service providers. 


The Commission was taking a variety of steps as a regulatory 
body to try and open up telecommunications, including requiring 
PTTs to relax their procurement policies so all European suppliers 
could compete. Other regulatory steps included requiring a single 
112 emergency phone number for all of Europe and a single stand- 
ard for mobile radiotelephony, replacing the 6 different standards 
that had sprung up in the 12 EC member states. 


In all this regulation, DG XIII worked with the existing PI's, 
trying to get them to change their practices. —The Commission was 
less than enthusiastic about taking steps that might lead to the PTTs’ 
demise. In fact, the second prong of the Commission's strategy was 
to couple regulation with a very strong industrial policy, trying to 
keep the industry competitive. 


This was no minor research program, either. In the fields of in- 
formation technology and communications, the Commission was 
funding R&D to the tune of ECU 2.221 billion from the period 1990 
to 1994. (The ECU was worth roughly U.S. $1.25 in 1992). 


To understand the Commission, it is best to defer the natural 
inclination to ask where the money was spent and what resulted 
and instead focus on the process. 


The quintessential model for an EC program was Esprit. Started 
in February 1984, DG XIII bills Esprit as “the key to reviving Euro- 
pean technology.” The premise behind Esprit was matching funds. 
The Commission would put up half the money for a research pro- 
ject, the participants would put up the other half. 


Rather than have researchers suggest some interesting research, 
the Commission would issue a call for proposals. To respond, a 
group had to have at least two industrial partners from at least two 
EC countries. Typically, a successful group would have up to a half- 


262 


Brussels 


dozen members, including research institutions, consulting firms, 
telecommunications companies, and computer companies. 

Esprit shelled out ECU 1.5 billion and involved 3,000 researchers 
in the first phase from 1984 to 1988. From 1988 to 1992, Esprit 
shelled out another ECU 3.2 billion, involving almost 6,000 re- 
searchers. 

Probably the best known result of Esprit is the transputer, an 
example of which is the T800 chip, a 10-MIP, 32-bit, RISC processor 
useful as a building block for parallel computers or signal process- 
ing units. Of course, there are several other chips that the 
transputer must compete against, such as those from Motorola, In- 
tel, and the Sparc consortium. 

Other projects helped train engineers in VLSI design or devel- 
oped opto-electrical equipment for video reception at medium dis- 
tances without amplification. Esprit officials categorize these as 
“major results” and point to “over 500 major results” in the Esprit 
program. 

I examined the list of major results through the end of 1989. 
There were 343 major results, and it is interesting that 43 of these 
were in the category of having made a “substantial contribution to 
the preparation of international standards.” If prestandardization 
activities got their own category and were counted as major results, 
it was obvious that all this money was certainly not going to de- 
velop new technology or to conduct real research. 

Though the bulk of Esprit money went to things like high-defi- 
nition TV standards, a substantial sum was devoted to an area of 
research projects known as the “Information Exchange System.” 
Best known of these projects was COSINE and its IXI backbone. 
IXI, connecting 20 different X.25 networks in 17 countries, was listed 
as the key infrastructure for Information Exchange. 

A COSINE brochure proudly stated that IXI was transferring 25 
Gbytes of data per month by the Spring of 1991. The fact that IX] 
was several years late in coming was not mentioned, nor was the 
fact that 25 Gbytes per month is not a tremendous amount of data. 
The German DFN X.25 network, for example, was transferring over 
70 Gbytes per month of TCP/IP data over X.25, not to mention sub- 
stantial traffic from other protocols such as SNA. 


263 


Exploring the Internet 


There were several other information exchange projects proudly 
trumpeted in the COSINE literature, but my favorite was ROSE, Re- 
search Open Systems for Europe. The project started in 1983 and 
ran for 60 months, involving five European vendors such as Bull, 
ICL, and Olivetti. ROSE had the novel goal to promote OSI and 
“reinforce standardization work by implementing the standards and 
demonstrating them.” Ata gala demonstration at the Esprit 88 con- 
ference, the vendors all demonstrated OSI prototypes that included 
FTAM, X.400, and the X.28/X.29 PAD services. 

With Esprit such a shining success, DG XIII used it as a model 
for other industrial policy programs. The STAR program, for exam- 
ple, was started to try and get the less developed portions of the 
telephone infrastructure jumpstarted. From 1986-91, the Commis- 
sion pumped ECU 780 million into places like Northern Ireland, 
Portugal, and Greece, with matching funds coming from the mem- 
ber states. 

These types of government intervention can be quite useful if 
the money is put into the right places. The program that really 
caught my attention was RACE, Research and Development in Ad- 
vanced Communications Technologies for Europe. RACE was sup- 
posed to get a broadband ISDN network into Europe and if there 
was any place a massive infusion of help was needed, it was the 
European telephone system. 

As the two Peters explained to me, RACE was focused on the 
area of integrated broadband communications (IBC) and was meant 
to avoid the problems that ISDN had encountered on its way to 
market. 

According to Peter 1, ISDN had run into a few setbacks because 
the standards were too vague, leading to incompatible implementa- 
tions. While the ISDN generation of technology was getting on its 
feet, it had taken a bit longer than anyone had planned. 

In other words, ISDN was a fiasco, consumed huge amounts of 
resources, and produced few results (but did so consistently over a 
long period of time). RACE would make sure the next generation 
of technology had a smoother roll-out. 

If the problem with ISDN had been vague standards, then RACE 
would make sure that all the downstream activities from stand- 


264 


Brussels 


ards—the implementation profiles, conformance specifications, fea- 
ture subsets, and the like—were formulated in great detail, thus 
avoiding incompatibility. 

DG XIII had set itself the highly ambitious goal of a B-ISDN 
network by 1995 and was investing heavily. Between mid-87 and 
mid-92, RACE would involve 294 organizations in 92 projects for a 
total outlay of ECU 1.2 billion (U.S. $1.47 billion), of which the Com- 
mission was pitching in ECU 550 million. 

The RACE literature explained that by bringing all the European 
players together in one project, the risk of failure was reduced. Eve- 
rybody would work together for a common goal. Putting all your 
assets into one investment was a strategy I had not learned in my 
class on portfolio analysis, but I was willing to hear the argument 
out. 

RACE hoped to somehow speed up the standardization process, 
a “well-known bottleneck in the exploitation of high technology.” 
Rather than reduce the bottleneck by reducing the size of the stack 
of paper and focusing on implementation experience, RACE was 
going to try and increase the volume of paper produced. 

The result would be the integrated broadband communications 
architecture, a pile of documents that would specify everything nec- 
essary for the network. This suite of documents would, of course, 
be adopted by the rest of the world, opening up the vast external 
market for European suppliers to exploit. 

RACE, one of my glossy brochures exultantly proclaimed, was 
“the current focus of attention of all the intellectual and industrial 
work on advanced telecommunications in Europe.” 

When you talked to the Peters, though, you got the idea that the 
real purpose of RACE was to reinforce the dominant position of the 
PTTs. ATM cell switching, the technology that forms the basis for 
most of RACE and B-ISDN, was to Peter 1 simply a means to elimi- 
nate “rate arbitrage.” 

Rate arbitrage is one of those code words that summarizes all 
that is evil about those who insist on setting up their own networks. 
By this philosophy, the only reason that a value added network (i.e., 
anybody but the PTT) can exist is because entrepreneurs take ad- 
vantage of differential tariffs for different speeds. 


265 


Exploring the Internet 


If the tariffs did not vary, the philosophy goes, everybody would 
buy their services from the underlying network provider, the PTT. 
The evil of the Valued-Added Network (VAN) is that these greedy 
businessmen skim the cream off the top, diverting funds away from 
the PTT that is trying to provide service to everybody. If the profit- 
able business accounts go to the VAN, who takes care of the poor 
widow in the village? 


This line of argument makes a lot of sense unless you ask a 
more fundamental question. Do the PTTs have the capability to do 
the work in the first place? If not, the cream-skimming argument 
breaks down at that first assumption. Stopping others from doing 
important work is not an effective strategy for building an infra- 
structure. 


While I was mulling over the proper way to get high-speed fiber 
and ATM switches into place, the two Peters had left the now-bor- 
ing details of the RACE program for their newest toy, a program so 
new it didn’t even have an acronym. 


This new program was in the area of telematics, bureau-speak 
for applications that use networks. To the tune of ECU 376 million 
from 1990 to 94, the Commission was funding half of the projects in 
seven telematic areas, including transportation, health care, libraries, 
and government. 


I had been wondering what the purpose of Peter 2 was, and | 
soon learned that he was heavily involved with the transportation 
portion of the telematics program. Peter 1 ceded the floor and Peter 
2 began his presentation. 


He talked for 10 minutes, at which point I started leafing back 
through my notes. During those 10 minutes, Peter 2 had not uttered 
one sentence that was evenly vaguely comprehensible. I under- 
stood the words, but was unable to parse any of the sentences, let 
alone extract any semantic content. 


Evidently, there had been a separate program of research on in- 
telligent road systems, known as Drive. Drive successfully com- 
pleted a total of 71 projects in 1991, presumably with many major 
results and at a cost of ECU 60 million. Of course, overhead took 10 
percent away, but this was still real money. 


266 


Brussels 


Peter 2 kept referring to the “road transport informatics in the 
context of the Drive 2 programme,” but I had a tough time under- 
standing what that actually meant. Luckily, Peter 1 realized the 
problem and cut in. 

“I must insist,” he said, arching his eyebrows, “there is no Drive 
2 programme.” Rather, it was more appropriate to refer to the 
transportation “theme” within the larger context of the telematics 
program. 

I still didn’t know what this theme/ program/ project cluster was 
actually doing, so I asked Peter 2 to give me an example of one of 
the pilot projects or some technology that was actually being used. 

He couldn’t. He mumbled on about harmonization of standards 
and finally explained, as if talking to a small child, that it was “hard 
to pick out a particular report from Drive and say this was used 
here,” pointing to the table in front of him. 

It was clear to them that I didn’t realize that I was in a room 
with policy makers, not some mundane road technician or highway 
analyst. Peter 1 gave me a lecture about the vast scope of DG XIII. 
It was as if I had asked the Chairman of the Board of EXXON to tell 
me how many gas stations he had in Lexington, Kentucky. (Of 
course, if you asked the Chairman of EXXON to name any one city 
in which he had a station, chances are he might be able to answer 
that question.) 

I decided to try another tack. The Peters and 40 of their col- 
leagues seemed to spend most of their time issuing contracts under 
various themes. Was the process computerized? 

Peter 1 was insulted. Peter 2 sniffed. 

“Of course we’re computerized,” Peter 1 said, waving vaguely 
in the direction of his desk, which bore an Olivetti PC and a 
Hewlett-Packard laser printer. 

“What kind of network do you use?” 

“Uh, Novell,” one mumbled uncertainly. The other one looked 
down and shuffled some papers. 

“And what kind of DBMS do you use to manage your contract 
boilerplate library?” I wanted to know. 

A look of panic crossed their faces. Peter 1 gave an exasperated 
sigh. Peter 2 seemed to think they were using Foxbase. Peter 1 rose 


267 


Exploring the Internet 


and handed me some brochures. Peter 2 excused himself for an im- 
portant meeting upstairs. 


0 


I took the subway out to the isolated suburb of Beaulieu, where DG 
XIII has office space, to meet Jurgen Rosenbaum, an information of- 
ficer. We paid our mutual respects and lied about how much help 
we would be to each other. I collected another 10 pounds of paper, 
then left to try and find someplace to grab lunch in the hour before 
my next meeting. 

Beaulieu has at least four huge office complexes and dozens 
more under construction, and is surrounded by modern looking 
apartment blocks. Yet, with all these people, there was not a single 
place to eat, or even get a newspaper. This was city planning at its 
best. 

I got back on the subway and went a few stops into town, hur- 
rying to find a lone Spanish restaurant down the street from the 
station. After a quick lunch of fish soup (preceded by a 25 minute 
wait), I hustled back to the subway to find my next bureaucrat. 

Halfway through our audience on Esprit, I felt myself getting 
more and more nauseous. I realized with horror that this wasn’t 
caused by platitudes but that I was feeling the all too familiar onset 
of food poisoning from the fish. 

As I rode into town, I felt worse and worse, just making it back 
to the warmth of my mediocre hotel before collapsing. I spent the 
entire next day in bed, trying to gather enough strength for Wednes- 
day’s train ride to Paris. 

I left Brussels puzzled by the European Commission. There is 
certainly a place for a strong industrial policy, as the Japanese dem- 
onstrated with their MITI program and as the U.S. Defense Ad- 
vanced Research Projects Agency repeatedly showed with TCP/IP, 
UNIX, and a host of other successes. Yet in the one field I felt quali- 
fied to judge, the Commission appeared to have been a total failure. 
The European Internet was coming into being, but only after fight- 
ing active opposition from DG XIII. 


268 


Paris 


On the Euro-City train to Paris, I started to feel a little better. The 
conductor looked at my Eurail pass and smiled broadly. 

“Ah, un American! C’est tres bon!” he exclaimed with a classic 
Parisian accent. This was about as out of character for a Parisian as 
it would be to have a New Yorker tell you to “have a nice day.” 
Still, it was a welcome diversion from the dour gloom of Belgium. 

As the train passed through St. Quentin and headed up the Oise 
river, the countryside started getting familiar, the houses looked 
French, and even the farms had a characteristic look. I arrived at 
the Gare du Nord and stepped into the car of a virtuoso taxi driver 
who shot down alleys and back streets, delivering me to the 
Montparnasse district for the remarkable fare of FF 70. I gave him 
100, the amount such a ride would normally cost. 

Flipping on CNN in my room, I was just in time for a commer- 
cial featuring “beautiful, bountiful, beguiling, Belgium.” Popping 
open a beer from the minibar, I mentally added “bullshit and bu- 
reaucrats” to their list. 

After watching President Bush’s State of the Union address, | 
bundled up and went up the Boulevard Montparnasse to fetch my 
92-year old great-aunt, stopping on the way for a paper sack of 
roasted chestnuts to warm my hands and popping into Le Chien 
Qui Fume for a quick drink. 

Over a salad of preserved quail on a bed of dandelions, water- 
cress, onions, and gooseberries, I tried to explain to my aunt the 
concept of a technical travelogue. She listened carefully, frowned a 
bit perplexedly, and told me that she was very proud of me, what- 
ever it was that I was doing. 

Thursday morning, I took the Métro to the edge of the city, then 
a train out to Versailles. My taxi took a detour around the immense 
castle that had housed Marie Antoinette and over to the neighboring 
suburb of Rocquencourt, where INRIA has a facility. 

My 10 A.M. appointment wasn’t there. He had sent me mail, but 
when I logged into a borrowed terminal I saw, to my horror, that I 


269 


Exploring the Internet 


had received no new mail messages for over a week. Something 
was drastically wrong. 


The secretary at INRIA told me where I had to go for my meet- 
ing. On the way back into town, I tried to figure out what had 
happened. The problem was no doubt in my home PC (or, more 
likely, in the way I had configured it). 


The domain of Malamud.COM is a registered domain. When 
somebody starts to send mail to any of the millions of possible ad- 
dresses in the Malamud.COM domain, a record in the Domain 
Name System points to my commercial service provider, Colorado 
SuperNet. 


Colorado SuperNet takes all incoming mail and spools it on a 
special UUCP-only account I maintain on their machine. A few 
times a day, my PC calls up that account and retrieves all incoming 
mail messages. Those messages are sorted, combined with my MCI 
Mail, any fax notifications I can grep out of my fax log, and some 
miscellaneous status messages, and the whole lot is sent right back 
up to the interactive account on Colorado SuperNet that I use while 
on the road. 


In desperation, I stopped at the train station and gave a call to 
my fax number. Since the fax is answered by a fax board in a PC, it 
stands to reason that a high pitched tone on the other end would 
tell me that my PC was still up and running, and, by logical conclu- 
sion, that my house was not a charred, smoking wreck. 


Having successfully pinged my house (but not solved the mail 
problem), I continued on to La Défense, a complex of convention 
centers, shopping centers, exhibit halls, and other public spaces, all 
surrounding a futuristic looking arch, kind of a 21st-century rendi- 
tion of the Arc de Triomphe. There, next to the World Trade Center, 
is the InfoMart, a three story high set of exhibit spaces for computer 
vendors. 


Most of the vendors are your typical IBM, Bull, and Microsoft 
variety, but there are a couple of odd ducks. One is a “house of the 
future” exhibit, built to the new European home automation stand- 
ards. This house-like display, full of spas, jacuzzis, exercise bikes, 
and other things I would never allow in my own house, was a coop- 


270 


Paris 


erative venture of a dozen vendors, all trumpeting the future of do- 
motics. 

The other shop that doesn’t really fit in is one rented by four 
research agencies, including INRIA. There, I met with Milan Sterba, 
a young Czech with joint appointments at INRIA and the Prague 
School of Economics. 

Though officially he had been in the business school in Prague, 
Milan had spent most of his time on the large Czechoslovakian pro- 
ject to develop an MVS-like operating system to run on the reverse- 
engineered System 370 clones manufactured in Bulgaria and Russia. 
Milan had spent several years working in his chosen specialty, tele- 
communications, developing a VITAM-like telecommunications ac- 
cess method. 

At INRIA, in addition to real work like reconfiguring Sun work- 
stations, Milan had an informal role as one of the focal points for 
East European countries trying to get on the Internet. He main- 
tained a document detailing current connectivity, chaired sessions at 
RIPE meetings, and otherwise helped to spread information around 
where it was needed. 

The rapid progress in the former Eastern Bloc and Soviet Union 
had been truly amazing. As fast as the countries could persuade the 
U.S. to process the paperwork for Cisco routers, countries were 
plopping in TCP/IP nodes, enhancing EARN connections, and us- 
ing UUCP and EUnet to spread connectivity into new places. 

Bulgaria, for example, was using a dial-up UUCP link to Am- 
sterdam for connectivity. Dial-up was then being used to send mes- 
sages and files to the 10 Bulgarian EUnet sites. Dial-up UUCP was 
a common first step for many countries, a fact worth keeping in 
mind before sending long messages to people on the other end of 
slow (and expensive) lines. 

Poland was typical of countries with higher levels of connectiv- 
ity. Poland had a 9,600 bps leased line between Warsaw and Copen- 
hagen and used statistical multiplexors to combine TCP/IP with the 
EARN NJE/BSC protocols. Another 9,600 bps leased line between 
Krakow and CERN used DECnet protocols as part of HEPnet, but 
was converted to IP as soon as an export license for a Cisco router 
was approved. A 64 kbps leased line between Warsaw and NOR- 


271 


Exploring the Internet 


DUnet in Stockholm was going operational in 1992 and would 
greatly enhance TCP/IP connectivity to the country. 

Milan and I talked about the effect that posting standards had 
had in Czechoslovakia. Milan told me that, to his knowledge, only 
one copy of the ITU Blue Book existed and people spent consider- 
able time going to a central facility to consult standards documents. 

The ITU and others in the standards cartel had always insisted 
that the standards were reasonably priced for those “serious” about _ 
doing work. Milan confirmed that this position was nonsense and 
that many countries in Eastern Europe had particularly welcomed 
the ability to access documents they needed for their work. 

I found it particularly distressing that the ITU policies were hav- 
ing the effect of preventing people in developing countries from ac- 
cessing technical standards. After all, one of the purposes of the 
United Nations, of which the ITU is a key part, is to promote a 
world community. Keeping key documents hidden from those 
without money, indeed keeping documents hidden from entire 
countries without money, is certainly a convoluted perversion of the 
UN mission. 

That night, I had dinner in a Venetian restaurant, a classic place 
with a dozen tables and the owner acting as the head (and only) 
waiter. In his 50s, stout, distinguished looking and impeccably 
dressed, the owner showed people to their tables, practicing the art 
of being apparently servile while in reality insulting everyone he 
could. While ignoring my waiter and eating a mediocre mezzaluna 
funghi, I read Don Fernando, Somerset Maugham’s classic essay on 
Spain. Maugham was writing about the playwright Lope De Vega, 
author of 2,200 plays. 

Many had proudly pointed to the size of this document base, 
equating De Vega’s proclivity for producing paper with greatness. 
De Vega himself had not taken this seriously, remarking that “if any- 
one should cavil at my plays and think that I wrote them for fame, 
undeceive him and tell that I wrote them for money.” 

When you reward people for producing paper, they will do so. 
When the European Commission and RARE paid people’s expenses 
to go to meetings and make specifications, it is not surprising that 
they took so long to make them, nor that they were so voluminous. 


272 


Paris 


Likewise, when you take a stack of OSI documents and put 
them next to the RFC series, you can tell pretty quickly which ones 
were produced by standards professionals and which ones were 
written by engineers who had software to write and networks to 
run. 


0 


Friday morning, I met Jean-Paul Le Guigner of the Comité Réseau 
des Universités, a committee of French universities formed to set up 
a national research network, much like EDUCOM in the U.S. and 
the vice-chancellors committee in Australia. 

We took the subway to Jussieu, changing trains and walking 
through the long, intricate tunnels connecting Paris Métro lines, 
ending up at the Université Pierre et Marie Curie. Widely acknow- 
ledged as one of the uglier campuses ever built, the university was 
constructed during the period in the 1960s and 1970s when slabs of 
unfinished concrete were considered “modern.” 

At the university, we found the office of Christian Michau of the 
Unité Réseaux du CNRS, Jean-Paul’s equivalent in the research 
world. CNRS, the Centre National de la Recherche Scientifique, 
acted as a coordinating body for French research institutions like 
INRIA and ORSTOM. 

The two groups, the universities and the researchers, had 
banded together to form Renater, the Réseau National de Télécom- 
munications de la Recherche. Funded to the tune of FF 50 to 60 
million (around U.S. $10 million) per year, this network would form 
a national backbone of 2 Mbps in 1992 with the core expanding to 
34 Mbps in early 1993. 

Renater, like the NSFNET in the U.S., was set up as a network of 
networks, linking regionals together and France to the rest of the 
world. Unlike NSFNET, the interface to the network would be pro- 
vided by the telephone company, in this case France Telecom. 

France Telecom, under contract to Renater, would offer a point 
of presence to which regionals could connect. The regionals, like 
the R3T2 network I had seen in Sophia-Antipolis, were locally 
funded. In the case of R3T2, for example, local and regional net- 


273 


Exploring the Internet 


works had started the network as a way of attracting industry and 
promoting education. 


After checking to see if my house was spitting up mail yet, 
Christian, Jean-Paul, and I headed over to Christian Michau’s office 
and sat around a conference table. We were joined by two other 
gentlemen who were somehow joining Renater and needed a brief- 
ing on the project. 

It was quickly established that having me speak French was a 
better strategy than forcing the other four to speak English. Chris- 
tian suggested I start with a brief description of my project. Some- 
how, while I was researching this book I found that many of my 
hosts, though always very hospitable and full of information, never 
quite understood the concept of a “technical travelogue.” 


I complied, giving a little speech and feeling quite content that I 
had remembered enough French to pull this off. Everybody smiled 
and nodded gravely, each in turn thanking me. Then, one of the 
observers leaned over to Jean-Paul and suggested that perhaps a 
good way to proceed would be for somebody to explain exactly 
What the American gentleman was hoping to accomplish. 


Once this was all straightened out, Christian and Jean-Paul pro- 
ceeded to tell me about Renater. In France, research institutions and 
universities have a great deal of independence. To make things dif- 
ficult, any attempt to establish a national research network would 
cut across three different government ministries. 


Through a minor miracle, in February 1991 an interministerial 
convention was signed which established the authorization for Ren- 
ater to begin planning. A pilot committee was formed, which 
spawned a technical committee, which created a project team. By 
the end of January 1992, a contract with France Telecom was days 
away from signing and a pilot network was already in place. Re- 
markably quick, given the number of ministries and bureaucracies 
involved. 


Renater was designed to be a multiprotocol network, but with 
an interesting twist. The networks in many countries, such as Ger- 
many’s DFN, ran all protocols over X.25 (“the pathway to OSI”). 
Running TCP/IP over X.25 was certainly a combination that 


274 


Paris 


worked, but for connecting two hosts together a straight leased line 
made more sense. 


Renater was set up in a very pragmatic fashion as two networks, 
one presenting an IP interface, the other an X.25 interface. At 2 
Mbps, the X.25 network would simply layer on top of the Transpac 
public X.25 network. The IP network, a totally separate system, 
would be a series of Cisco routers on leased lines. 


The network would be quickly upgraded to 34 Mbps in early 
1993, at least on core routes. It was hoped that at these higher 
speeds that ATM-based cell switching would allow the X.25 and IP 
networks to coexist on the underlying substrate. 


Presenting an X.25 interface solved several problems. OSI could 
run on the network, so all parties in Renater were able to boldly 
proclaim that theirs was an OSI network which incidently happened 
to support “immediate needs of existing traffic.” The X.25 network 
also gave a platform on which DECnet and SNA traffic could run. 


Michau and LeGuigner were decidedly pragmatic about their 
work, trying hard to avoid political battles and concentrate instead 
on getting the network up and running. They strenuously avoided 
religious decisions they didn’t have to make, using mechanisms like 
study groups to look at questions of SMTP versus X.400. 


What I found most interesting was the close working relation- 
ship with France Telecom. The telephone company seemed to view 
Renater as an opportunity instead of a threat, using the research 
community as a place to test technology and building expertise for 
future commercial rollouts. 


A 5-year contract worth roughly U.S. $10 million per year had 
been signed with the telephone company, giving them a substantial 
incentive to provide a working network. In addition, a contract pro- 
vision was added that any tariff decreases in the future would be 
used to upgrade the bandwidth of the research network, thus guar- 
anteeing a fixed amount for the telco and at the same time protect- 
ing the research community. 


How had Renater managed to avoid the need to make OSI their 
only protocol? Michau had one of the better answers to the ques- 
tion of OSI I had seen. 


275 


Exploring the Internet 


“Many countries in Europe are beginning to realize that OSI is 
not X.25,” he explained. Instead, he looked to standards like OSI to 
provide solutions to a range of problems, particularly at the applica- 
tion layer. 

If you accept OSI as a set of services instead of some monolithic 
religion, useful protocols like X.400 and X.500 can be applied imme- 
diately instead of waiting for an entire grand design to come into 
being. In fact, you could, with this view, run X.400 on top of 
ISODE, which in turn can run on top of TCP/IP, and still provide 
OSI service. 

Defining OSI as a series of applications took Renater out of the 
debate. After all, Renater was simply providing an infrastructure, a 
core backbone, and it was up to the users to decide what to run on 
that backbone. 

Running an X.25 interface kept Renater in the OSI game. Even 
for international links, Renater was willing to use X.25 links. While 
acknowledging that “some choices are not technically perfect,” it 
was Clear that Renater would consider projects like the 2 Mbps IX] 
extension. After all, the European Commission favored X.25 and the 
Commission had lots of money. It was clear that the larger Euro- 
pean countries like France would quickly catch up to the U.S., put- 
ting in high-bandwidth backbones, setting up regional networks, 
and running multiprotocol environments. 

That night, I picked up my great-aunt for a quick dinner. Over 
glasses of port and a dish of snails soaked in garlic and butter, we 
talked about her childhood in Russia, her emigration to Montreal 
and New York in the early part of the century, and her escape from 
the Nazis in the war, walking over the border to Free France with 
her 6 year old daughter in the middle of the night. She had been in 
France for 60 years, even receiving the Legion of Honor for her 
work at the Pasteur Institute, where she conducted research and 
later helped numerous visiting scientists get settled. After walking 
her back to her apartment, I went to my seedy hotel to pack and 
trade insults with the snooty night manager. 


276 


Washington, D.C. 


February 1, having visited nine countries in January, I happily 
landed at Dulles airport, taking my carry-on luggage straight 
through customs and into my waiting rental car. My hotel was a 
minor miracle, cheap and comfortable. I went straight down to the 
bar in the basement and settled in with the New York Times, a bacon 
cheeseburger, and a bottle of Brooklyn Lager, a beer as “vital and 
diverse as the city itself.” 

Sunday evening, I met Tony Rutkowski, who had quit his job at 
the swamp of the ITU and moved back to Washington to work for 
Sprint International. Although we had exchanged lots of e-mail 
messages, it was still nice to talk in person. While e-mail is certainly 
convenient, person-to-person is still a communication medium that 
has a much higher semantic bandwidth. 

Monday, I made an early morning reverse commute out to the 
suburbs, thumbing my nose at the parking lot heading into the city. 
In fact, it was so early when I got to Reston that I stopped into the 
local Sheraton for breakfast. 

“We are glad to be able to contribute to the start of your day,” 
the menu proclaimed. “We bid you a wonderful day.” Thinking I 
might have misread my itinerary, I pulled it out to make sure | 
wasn’t in California. 

After my power breakfast of a bagel with lox, I wandered over 
to the headquarters of the Corporation for National Research Initia- 
tives (CNRI), the institutional home of such network luminaries as 
Drs. Vinton Cerf and Bob Kahn. 

My first meeting was with Vint Cerf, the Chairman of the In- 
ternet Activities Board (IAB) and an engineer whose involvement 
with TCP/IP dates back to the very first ARPANET nodes. Vint is 
famous for his ability, despite a huge stack of lofty responsibilities, 
for keeping up a detailed knowledge of the protocol suite at all lay- 
ers. 

Vint Cerf is the kind of person who can switch from briefing a 
congressional aide to an in-depth discussion of dynamic routing 


277 


Exploring the Internet 


protocols, public key cryptography, or the inner details of multi-me- 
dia messaging. I have never seen him attend a working group 
meeting at technical forums like the IETF without making at least 
one substantive contribution. 

Technical issues, though still demanding, now have to contend 
with organizational questions, issues that suck up more and more of 
his time. The most pressing issue was the future of the IAB and the 
IETF, two organizations that had been remarkably successful but 
were institutionally adrift. 

The IAB started as a technical advisory committee to the De- 
fense Advanced Research Projects Agency, but when the ARPANET 
died, the IAB was no longer an official body. Through technical 
leadership rather than governmental fiat, the IAB continued to 
guide the development of the TCP/IP protocols in the Internet com- 
munity. 

The IAB had to bear the liabilities of its DoD origins in a 
changed world. It didn’t help, of course, that the IAB remained an 
all-American group until 1991, when Christian Huitema from France 
was asked to join. (Not to mention the fact that in 1992, the IAB 
remains exclusively composed of white, western males.) 

Lack of accountability and lack of international representation 
made it increasingly difficult for the IAB to exercise leadership. The 
standards-making activities of the IAB and the IETF also raised is- 
sues of due process, antitrust liability, copyright, and a host of other 
issues difficult to resolve without a more formal organization. 

Vint Cerf’s solution to these problems was to announce the for- 
mation of a new professional association, the Internet Society. The 
IAB and the IETF would become activities of the Internet Society. 

The Society managed to attract quite a few other projects as 
well. The INET conference which evolved from the Larry Landwe- 
ber seminars would become the annual meeting of the Society. Tony 
Rutkowski would run the publications board and hoped to produce 
a newsletter of topical information and a journal of archival mate- 
rial. 

Launching an activity of this magnitude is never easy, and by 
February 1992, Vint Cerf had already spent many months getting 
the project off the ground. A key activity was selecting the initial 


278 


Washington, D.C. 


trustees and drafting bylaws. Though the Society would be mem- 
ber-run, the first board would appoint itself. Then, in 1993, the first 
third of the trustees would be up for election. Within three years, 
the entire 21 person board would have been elected by members. 

Self-selection of the first board and the decision to have the first 
official meeting at INET 92 in Kobe, Japan was causing some grum- 
bling by American engineers, who were used to having IETF meet- 
ings in accessible U.S. locations. 

One of the key architectural assumptions of the Internet Society 
is that it must be truly international to succeed in giving legitimacy 
to the standards-making activities of the IAB. As such, Cerf and 
many others felt that holding the first meeting out of the U.S. and 
appointing a truly international board were crucial to its success. 

A set of bylaws and other procedures, control by a group of 
trustees, and other formal structures were also a change from the 
IETF, which had run its first meetings by shouting out policy at ple- 
nary meetings. Even in 1992, the IETF ran as a pretty loose sort of 
organization. 

More elaborate procedures were also crucial if the activities lead- 
ing to a standard were ever challenged. Standards promote interop- 
erability, but can also be challenged as a potential antitrust violation 
if it appears that there is collusion to restrain trade. 

The big challenge was how to change the process to put in some 
form of accountability, yet still maintain the effectiveness and flexi- 
bility of the IAB and the IETF. Too much process, and the whole 
thing would degenerate into just another standards body, pumping 
out paper and enjoying many fine lunches and dinners. 

The Internet Society had been simmering in the six months since 
the announcement of its formation at INET 91 in Copenhagen. De- 
spite the low profile, 800 members had joined. Though this was a 
small fraction of the 95,000 members of the Association for Comput- 
ing Machinery (ACM), Cerf was encouraged and saw it as a good 
start. The board was also falling into place, with members from Ja- 
pan, Australia, and several European countries joining the American 
members. 

Next to Vint Cerf’s office is that of Bob Kahn, the founder and 
president of CNRI. Kahn was a Senior Scientist at BBN responsible 


279 


Exploring the Internet 


for the design of the ARPANET, then moved over to DARPA as Di- 
rector of the Information Processing Techniques Office where he in- 
itiated the largest computer R&D program ever undertaken by the 
federal government, a billion dollar Strategic Computing Program. 
He still plays a crucial role in the Internet, with CNRI coordinating 
the 5 gigabit testbeds he helped to establish. 

A former MIT professor, Kahn is described by most people who 
have met him as an extremely quick study. Hand him any topic and 
in a few minutes he will have something intelligent to say about it. 
A classic long-range thinker, he devotes much of his time to the 
question of how to build an effective infrastructure. 

We talked about the “look and feel” of an infrastructure—what 
somebody needs to know in order to use it. Cars and roads, for 
example, require a fairly extensive knowledge base, ranging from 
how to use the pedals to how to read a street sign. Other infrastruc- 
tures, ranging from electrical systems to education to banking and 
insurance, all have their own particular look and feel. 

The issue for the Internet was providing a growth path for this 
infrastructure, which would support a pervasive, global Internet. 
With 4 to 7 million people already on the Internet, how would it 
grow to support an order of magnitude more? 

It was interesting to look at what types of organizations were 
getting plugged into the Internet. Small users were rapidly getting 
on to some portion of the network, even if it meant something as 
simple as getting an MCI Mail account and learning how to use a 
modem and address messages. 

Likewise, very large (or very high tech) users were getting 
plugged in, linking their campus networks to regional providers. 
They had the staff to manage their own networks, extending the 
Internet out to the users. 

What seemed to be missing altogether, though, was a way for 
medium-sized enterprises without a high tech component to get on 
the network. Even getting a simple Novell network up and running 
was causing more stress than necessary. 

I continued my day of meetings and greetings, ending up the 
evening having dinner with one of my editors, Stephanie Faul. 
Over a dish of crunchy jelly fish salad, we talked about her latest 


280 


Washington, D.C. 


projects in the world of freelance. In addition to her usual stint act- 
ing as a ghost editor for the AAA Magazine, Stephanie had just 
landed a corporate writing gig, helping to organize a seminar with 
the prescient theme “The Future is Tomorrow.” 


0 


Tuesday was spent hiding from the cold, doing research in the 
Hawk and Dove, one of a half-dozen Irish bars on Capitol Hill. Af- 
ter paying a call at the Office of Technology Assessment to brief a 
staff member on the Bruno project, I took the metro under the mall 
to the offices of the National Science Foundation. 

Steve Goldstein, the manager of international programs for the 
NSFNET, had invited me to his home for dinner and we would join 
his carpool from the NSF. He had just come back from a WAIS 
symposium and brought me a set of the conference materials. We 
both agreed that WAIS could easily prove to be the Lotus 1-2-3 of 
the Internet, providing users with a simple, intuitive way to get real 
information. 

Steve and his life-partner Isabelle were both members of a gour- 
met cooking club and my timing was lucky enough to get the left- 
overs. While we waited for Isabelle to get home, Steve heated up a 
pork roast stuffed with mushrooms and a dish of fennel bulbs in a 
delicate cheese sauce while we talked about the NSF and the 
NSENET. 

The NSF has taken its charter to help U.S. science and engineer- 
ing as a broad mandate which ranges from hands-on science muse- 
ums for children all the way to funding research into teraflop 
computers. 

The NSFNET is a perfect example of the broad interpretation 
NSF takes of its mandate. Instead of dedicated networks for super- 
computer centers, the agency built a system of general-purpose re- 
gional networks connected by a backbone—a true infrastructure. 

Steve Goldstein described the NSF funding philosophy as strate- 
gically placed “drops of oil,” hoping to leverage comparatively 
small expenditures to achieve a broad impact. The drops of oil phi- 
losophy was necessary because the agency’s budget was fairly 


281 


Exploring the Internet 


small. Program directors have to husband their money carefully 
and overhead is kept down to a paltry four percent. 

The international program of NSFNET, for example, makes do 
with a budget well under a million dollars per year, a minuscule 
amount when you consider how high telephone tariffs are and what 
an important role NSF played in building a global Internet. 

To spread the money out, NSFNET usually funds half-circuits. 
Most international circuits are actually operated by the two PTs 
involved, each making up the tariff for the outgoing line. Typically, 
NSF only picks up the cost for the U.S. half-circuit, which are often 
significantly lower in cost—anywhere from 20 percent to factors of 
2, 3, and even 4 times less. In some cases, the international partner 
will pick up the cost for both half-circuits. NORDUnet, for example, 
paid for the whole line to the U.S. for some time until the NSF was 
able to pitch in. 

In the case of the “fat pipes,” the high bandwidth circuits over- 
seas, there is usually a consortium of agencies that pay. The link to 
the U.K., for example, has the NSF, DARPA, and NASA sharing the 
costs in one direction and the Joint Network Team and the Ministry 
of Defense sharing the other side. 

In addition to sharing costs for general-purpose infrastructure, 
NSF is able to get a lot for its money because of simple competition. 
Sprint, for example, is the manager of international connection serv- 
ices for NSF, and won that contract because of a very agressive bid 
response. Sprint didn’t do this out of altruism—the experience it 
gained with NSF was invaluable in capturing other international 
business. 

NSF encourages regional solutions as a more efficient way to 
connect the world. To Europe, for example, the NSF helps fund the 
lines to INRIA in France and NORDUnet in Stockholm, both major 
gateways for their respective regions. 

The agency also uses line sharing to buy larger pipes. The 
NSFNET backbone, for example, does not actually lease telephone 
lines. Instead, NSFNET contracts for a T3 service which runs on an 
underlying network owned by ANS. That underlying network car- 
ries traffic both for NSF and for ANS commercial customers, with 
packets from the two sources freely commingling. 


282 


Washington, D.C. 


Line sharing is applied to international links as well. NSF joined 
the EBONE consortium as an informal “supporting organization,” 
the same category chosen by CERN and IBM. Supporting in this 
case meant that NSFNET and EBONE would be connected, but that 
NSF would not sign the memorandum of understanding. 

Line sharing in EBONE meant that traffic from AlterNet and 
NSFNET might share the same lines. Government regulations pro- 
hibited NSF from funding commercial traffic, and this was the root 
cause of many of the appropriate use restrictions on the Internet. 
Allowing traffic from commercial services to share a link with 
NSFNET, provided the commercial service paid its own way, was an 
important step forward. 

Acceptable use policies were set up in the era of the physical 
networks when NSF leased 56 kbps lines. The idea was that NSF 
should not be subsidizing traffic generated by those outside the 
community it meant to serve—the scientific and engineering re- 
searchers. 

This policy was getting harder and harder to enforce, particu- 
larly if the enforcement mechanism was to bar all traffic originating 
from certain broad groups from traversing key links. With NSFNET 
simply paying for service, it no longer really mattered if packets 
fraternized, so long as the educational and research communities 
got their money’s worth. 


0 


Wednesday morning, I walked a few blocks north to Dupont Circle 
to the home of Bob Barad, founder and sole employee of Baobab 
Communications. Bob runs the Baobab bulletin board, a Fidonet 
node specializing in African development. 

His house is full of old maps of Africa, and blankets, baskets, 
and masks collected during his two years in the Peace Corps in Si- 
erra Leone and on many subsequent visits to the continent. After 
his two years in swamp rice development in Sierre Leone, he came 
back for a law degree, then returned to Togo on a Fulbright scholar- 
ship. 


283 


Exploring the Internet 


Following that he spent a couple of years at the World Bank, an 
experience he diplomatically called “an extension of my education.” 
Bob started spending his spare time dialing into bulletin boards. He 
got an account on PeaceNet and found he could start talking to peo- 
ple in Africa. He was hooked. 

Soon he had hung out his shingle as a freelance development 
consultant, a business that seems to draw heavily on his Fidonet 
expertise. He had quickly tired of being a user of other peoples’ 
boards and wanted to set up his own node. 

Bob had been corresponding with a digital nomad named Mike 
Jensen, a man who travels the world with a laptop, setting up Fi- 
donet nodes. Jensen blew into town one day late in 1989, stayed at 
Bob’s house for a day, and Baobab was in business. 

Fidonet is a network which can be thought of as the PC equiva- 
lent of the UNIX USENET system. It provides mail, file transfer, 
and news feeds, all managed by an informal volunteer hierarchy of 
city, regional, and national hubs. The free software and the cheap 
platforms it runs on have attracted the attention of many human 
rights, environmental, and other public interest groups. 

Being able to set up a network anyplace there was a PC had 
proved valuable in Bob’s business. He had just completed a job 
putting in nodes between Chad, Mauritania, and a group in Ar- 
lington, Virgina. The Virginia group was a subcontractor on a U.S. 
AID program to provide a famine early warning system. 

Satellite images of the weather are periodically broadcast by the 
European Space Agency. Data would be downloaded and proc- 
essed, resulting in graphic images of the affected areas that would 
be placed in files totalling roughly 70 kbytes. These files would be 
transferred to floppy disks and sent by DHL to Chad and Maurita- 
nia for use by regional workers. 

This was a situation ripe for automation. By elimination of the 
weekly DHL runs, the payback from the use of computers could be 
immediately quantified, a situation very different from those trying 
to justify the more nebulous benefits such as “increased interaction” 
resulting from general-purpose e-mail. 

The Fidonet software was successfully installed and the first files 
transferred. The system worked so well that one site immediately 


284 


Washington, D.C. 


requested the previous week’s file, which had not yet arrived by 
DHL. 

The transfer of data uses the zmodem protocol on a direct call 
between the African sites and Arlington. Direct polling to the end 
destination is not unusual in Fidonet. While it is possible to hand 
off messages to a local gateway for percolation through the network, 
high priority data usually cuts through the hierarchy. To send mail 
to Africa, for example, Bob placed a biweekly call to the London 
hub, a site only a hop or two away from the African destinations. 

The number of bulletin boards like Baobab in operation all over 
the world is truly incredible. Merely listing the boards in ASCII for- 
mat makes for a file of 1.44 Mbytes. One of the great challenges of 
the Internet will be to give those BBS systems an easy way to inte- 
grate into the global network, providing better connectivity than just 
mail delivery, but doing so in a way that is cheap and easy. 

I returned to my hotel to check out, only to discover that the 
window to my car had been broken in the overnight parking ga- 
rage. I filled out forms for the parking garage, the police, Hertz, 
and American Express in order to get my keys back and sit on a pile 
of broken glass, sucking wind on the drive to Dulles Airport. 


285 


Cleveland 


Having never been to Cleveland, I was firmly convinced that I 
didn’t want to go. To my surprise, my visit was delightful. My 
hotel was a 1910 mansion, renovated in 1988 to be warm and to 
support modems and CNN. Dinner was just a stroll down the block 
to another renovated mansion, where I made short work of fresh 
rainbow trout, grilled with a pungent caper and garlic sauce. The 
conversation around me was, not surprising given the proximity to 
Case Western Reserve University, full of graduate-student angst and 
plans for monumental careers in the “real world.” 

Thursday morning, I met Tom Grundner, the founder of the 
Cleveland Free-Net and an apostle of populist computing. Grund- 
ner became a BBS hacker in 1984 when, as an assistant professor of 
family medicine, he was looking for a way to deliver community 
health information to the public. His St. Silicon bulletin board was 
such a success that, as Tom relates it, “it ate my career.” 

St. Silicon blossomed and by 1986 had become the Cleveland 
Free-Net, a multi-user service running on a UNIX platform with 
functionality similar to CompuServe. Users could chat with each 
other, could go through builetin boards, and send mail. 

There were, however, some big differences from CompuServe. 
For one thing, the service was free to the user. Grundner draws an 
analogy to television, where commercial networks fill one niche and 
the Public Broadcasting System (PBS) fills another. Grundner sees 
the Free-Net movement as the PBS of videotex. 

In Cleveland, the network quickly expanded as more and more 
volunteers agreed to act as moderators for different topic areas. 
Lawyers, doctors, librarians, veterinarians, and many other profes- 
sionals quickly joined. Rollerskating and Sci Fi SIGs came into be- 
ing, until there were more than 400 different topic areas. 

While people were using the system, keeping it going was cost- 
ing money. It was kind of hard to claim that this was tenure-track 
research for a professor of family medicine, so Tom looked around 
for another institutional home. 


286 


Cleveland 


He struck a deal with Case Western Reserve University’s com- 
puter group. They were in the process of spending U.S. $10 million 
for an all-fiber campus network but, according to Tom, “no one 
gave a thought what to put on it.” Cleveland Free-Net became a 
university project that also served the community, running on five 
Sun servers maintained by the department. 


Tom got a salary, a couple of big offices, and a place in the bu- 
reaucracy far away from daily control of the Free-Net. Of course, he 
still had the ultimate control weapon, the ability to cause a loud fuss 
if things went too far off track. 


So what to do? In 1989, he started the National Public Telecom- 
puting Network (NPTIN) and started pushing the Free-Net concept 
in other cities and countries. It was to the offices of the NPTN that 
Tom had brought me. 


Both rooms were jammed with shelves, tables, postage meters, 
and ratty old couches, making these offices no different from count- 
less public interest groups all over the country. This was obviously 
the kind of place where lots of volunteers spent their evenings. 


It was morning, though, and the place was deserted. I sat down 
next to a life-size balloon with a skeleton painted on the front. 


“Meet my staff,” Tom said wryly, while he flitted around the 
room checking Macintoshes. He lit a cigarette and sat down in an 
easy chair to tell me about his populist computing movement. 


The model for a Free-Net was based around a local organizing 
committee. This group of volunteers would organize and run the 
Free-Net, raising money wherever they could for a multi-user sys- 
tem, a copy of UNIX, and some modems and phone lines. The com- 
mittee would then get on its collective knees and plead with the 
nearest college with a router for Internet access. 

Software to run the Free-Net comes from Case Western Reserve 
in Cleveland. Long available for only U.S. $1, the University had 
gotten stars in its eyes and raised the price to U.S. $850 for non- 
profits, and much more to corporations. 

In addition to the software, Tom’s NPTN group provides what 
he had dubbed “cybercasting services.” His first cybercasting suc- 
cess was convincing USA Today to allow him to distribute at low 


287 


Exploring the Internet 


cost an online, electronic version of the newspaper. USA Today got 
supplemented with a variety of other news feeds. 

When the Supreme Court started its Hermes project to distribute 
opinions electronically, it selected 12 groups ranging from the Free- 
Net and UUnet to UPI, Reuters, and Mead Data. Other information 
on current events (“teledemocracy” in Free-Netese) comes from the 
Congressional Memory Project. Every week, NPTN takes three Sen- 
ate bills and three House bills and types in a two- to three-para- 
graph summary of the bill and how officials voted. The database 
builds every week, allowing people to start scanning the voting re- 
cord of incumbents during reelection campaigns. 


Cleveland Free-Net has grown over the years to 40,000 regis- 
tered users, with 1,000 to 1,500 unique logins per day. Other Free- 
Nets are operational in Cleveland, Cincinnati, Peoria, and 
Youngstown. There is even a rural Free-Net in Medina County, 
southwest of Cleveland. An old, donated IBM RT running AIX is 
maintained at a 100-bed community hospital in the county seat. The 
local agricultural agent is on the system, as are librarians and other 
professionals in town. 


Medina County is typical of most midwestern rural counties. It 
is perfectly square and the county seat is in the middle of the 
square. A call from anyplace in the county to the seat is considered 
a local call. Farmers, practically all of whom have PCs to run their 
farms, have a strong incentive to avoid long rides into town. 
Grundner felt that Medina County could serve as a model for the 
entire Midwest. 


Financing Free-Nets is an interesting proposition. In Cincinnati, 
Cincinnati Bell sponsors the system. Many of the other sites operate 
on a shoestring. Grundner offers two financing models to the local 
organizational committees. On the pay-as-you-go model, the local 
Free-Net pays for services. A USA Today feed, for example, is based 
on the number of lines and will cost a typical Free-Net U.S. $1,000 to 
$2,000. 


The other model has the Free-Net gather the names and ad- 
dresses of users and ship them off to Grundner. Grundner, in turn, 
sends out tear-stained letters pleading for contributions. Of the five 


288 


Cleveland 


existing Free-Nets and the five others about to go into existence, 
three opted for the pay-as-you-go plan. 

Whenever Tom could get a plane ticket abroad, he tried to 
spread the Free-Net concept to other countries. Often, though, he 
spreads the Free-Net concept by electronic mail, as in the case with 
his correspondance to the Helsinki Free-Net or to Richard Naylor in 
Helsinki. 

Grundner was even invited to give a seminar in Singapore, 
sponsored by the National Computer Board. I found this a bit 
strange as Singapore’s government, and especially the NCB, is 
pretty much the antithesis of the populist ideas Grundner repre- 
sents. Interestingly, Grundner was invited back to Singapore, this 
time not by the NCB but by the Singapore Microcomputer Society. 

The aspect of NPTN that was the most fascinating was Academy 
One, a K-12 computer literacy project based at Cleveland Free-Net 
that uses the Internet to try and include kids from all over the 
world. 

Academy One sponsors periodic special events, such as the 
TeleOlympics. Any school with an Apple II (or any other cheap sys- 
tem), a modem, and Telnet prompt could participate in the 
TeleOlympics. 

Four events were picked, including a 50 meter dash, standing 
and running broadjumps, and a tennis ball throw. The kids went to 
the school yard and ran the events, then came back in and posted 
their results. 

The day started in New Zealand, then moved on to California, 
Cleveland, and ended up in Finland. The Free-Net kept a leader 
board of individual results, class averages, and a running news 
commentary with late breaking bulletins like “Mrs. Jones and her 
4th Grade Class Break into the Lead.” 

A more sophisticated event was the space shuttle simulation. 
University School in Shaker Heights had a full scale mockup of the 
interior of the space shuttle, courtesy of a NASA program, complete 
with tape loops of the Earth from space running on TVs located 
behind the portholes. 

With children’s games, the kid with the toy gets to name the 
game, so University School acted as mission control, running 24- 


289 


Exploring the Internet 


hour simulations of a shuttle run. Other schools got to play other 
roles. 

A school in California was selected as the alternate landing site. 
An alternate landing site has to furnish weather data to mission con- 
trol, so the kids would go out and gather data on temperature, hu- 
midity, and barometric pressure. The data would go to mission 
control, which would respond with the current shuttle status. 
Status information was used to plot the current location on a map. 

For all the Academy One events (and for Free-Net as a whole), 
the focus is on accessibility. This means cheap and easy to use. 
Tom looks with great skepticism at things like gigabit testbeds, pre- 
ferring instead to convince a librarian to start an online book club. 

I dropped off my rental car and went to the airport restaurant 
for a nondescript meal, spiced up by an article in the New Yorker 
about a group of Tibetan refugees in Scotland. In a strange form of 
cross-cultural exchange, the Scottish haggis would be used as a base 
for the traditional Tibetan momo dumplings. Poems by Robert 
Burns and the Dalai Lama were read at these affairs. One of the 
Tibetans had tactfully suggested to his countrymen that the momos 
were even more delicious when doused with liberal quantities of 
hot sauce. 


290 


Chicago 


With great relief I arrived at O’Hare airport, knowing that my next 
plane ride would bring me home. I drove out the I-88 toll road, 
past AT&T’s Bell Laboratories, to the little town of Warrenville. 
When I first moved to Warrenville in 1969, the town of a few thou- 
sand people was in the middle of farm country. 

Robert Wilson, the legendary high energy physicist had gathered 
many of the best experimental physicists in the world to 6,800 acres 
of prairie to make the largest accelerator ever built. Over the years, 
the accelerators they constructed became capable of smashing pro- 
tons against antiprotons at the incredible energy of 1.8 Trillion Elec- 
tron Volts (TEV). 

Collisions of subatomic particles at high energies help reveal in- 
formation about quarks and leptons, the fundamental forms of mat- 
ter. Acting like a giant microscope, the Fermilab accelerator used 
higher energies to create and discover particles unobservable at 
lower energies. 

In the mid-1970s, the accelerator provided evidence of the exist- 
ence of the upsilon, a subatomic particle composed of a bottom 
quark and an anti-bottom quark, a discovery that provided strong 
support for the Standard Model. In the 1990s, the lab was hot on 
the trail of the top quark, the last quark yet to be observed experi- 
mentally. 

When I moved to Warrenville, though, there was nothing but 
prairie where Fermilab now stands. My father and the other physi- 
cists did their work in a suburban office complex until they could 
start using houses in a subdevelopment on the site that had been 
purchased under eminent domain. Old farmhouses from the coun- 
tryside were moved together into a cluster, to house visiting scien- 
tists. The subdevelopment was painted bright primary colors, and a 
chef was brought in to staff the village cafeteria (although the food 
was lousy, at least there was a chef). 

At that time, Fermilab was just beginning to coalesce. While 
everybody slaved away building the accelerator, Wilson continued 


291 


Exploring the Internet 


to put in those unique features that made the lab such a special 
place. A herd of buffalo was brought in and a project was started in 
the middle of the 4-mile circumference main ring to restore it to the 
original prairie grasses. One of the lab buildings was even con- 
structed as a geodesic dome, with the panels of the dome made out 
of panes of plastic, sandwiching thousands and thousands of alumi- 
num cans, collected in a recycling program by the neighboring 
schools. 

My visit to Fermilab on Friday had been set up over the past 
two months via electronic mail. Around Singapore I had received a 
message from a lab public relations engineer asking if we might 
make my visit a two-way exchange of information. 

Of course, I wrote back, two-way is good. By the time I hit Am- 
sterdam, I had another message from the lab wanting to know if I 
would be discussing the future of networking on my visit. With 
another 100 messages to plow through, I dashed a hurried (but puz- 
Zled) acknowledgment. 

Arriving at the lab, I saw that the little two-way exchange had 
blossomed into a full-blown public seminar with the title “The Fu- 
ture of Networking.” A nice topic, no doubt, but one best left to 
astrologers and marketing analysts. 

I asked around to see if perhaps some physicist had spoken on 
“The Future of Cosmology” in a recent seminar, and perhaps I was 
just part of some series. No such luck, so I took advantage of the 
rule that states the one with the white board gets to set the agenda 
and changed my topic to a more manageable one. 

After my talk, I sat down with some of the Fermilab networking 
staff, including the managers of the U.S. High Energy Physics net- 
work (HEPnet). HEPnet ties physicists in dozens of countries to the 
major world physics laboratories, such as Fermilab, CERN in Ge- 
neva, NIKHEF in Holland, KEK in Japan, and many, many, other 
sites. 

HEPnet started as a physical network, a microwave link between 
Lawrence Berkeley Laboratory and the Stanford Linear Accelerator 
Center (SLAC). It was based on DECnet protocols, a natural choice 
considering the overwhelming use of PDP and VAX computers in 
the physics community. 


292 


Chicago 


The network quickly grew, using the big laboratories as hubs to 
run tail circuits to regional (and sometimes not so regional) research 
universities. CERN and Fermilab were two of the more aggressive 
hubs, bringing some of the first network lines into places like China, 
South America, and Eastern Europe. 


Connecting the hubs together were the lines that made up the 
HEPnet backbone. While some of the tail sites were strictly DECnet, 
many of the backbone sites began using multiprotocol routers, let- 
ting HEPnet finance a part of the line and having the other user 
communities fund the rest. 


Many of the universities at the ends of the tail circuits began 
joining the Internet, and the HEPnet lines became one of many pos- 
sible paths, or often just a virtual network layered on some other 
service provider. 


Gradually, HEPnet grew from a single protocol network to a 
multiprotocol one, and from a physical network to a shared line use 
model. The shared line use just made HEPnet a convenient label for 
the bundle of resources that the high energy physics community 
was purchasing for its users. 


In the U.S., HEPnet was partially swallowed up by a larger net- 
work run by the Department of Energy, the Energy Sciences net- 
work (ESnet). Rather than lease many lines between labs for 
individual communities, ESnet would furnish the backbone. 


Although HEPnet relinquished the role of backbone, it still fur- 
nished quite a few tail sites, particularly medium-speed links to 
places that ESnet did not serve, such as Brazil, or those sites that 
need special high-speed dedicated capacities, such as the physics 
departments of many large universities. In addition to managing 
the dedicated links, the HEPnet group was trying to move towards 
providing higher level services, such as running a mail gateway and 
starting video conferences. 

In addition to the HEPnet WAN links, the Fermilab Computer 
Division had to manage a vast array of internal resources, including 
what was reputed to be the largest VAX Cluster in the world. 
Workstations are a dime a dozen, and large Amdahls provide local 
mainframe support. 


295 


Exploring the Internet 


The network architecture at Fermilab was originally, as can be 
expected by the DECophilic physicists, set up as a huge extended 
Ethernet running protocols like DECnet and LAT. Over time, 
though, UNIX-based workstations made TCP/IP an important part 
of the network. 

Routers were introduced to segment the traffic into subnet- 
works. With some of the Local Area VAX Clusters (LAVCs) having 
as many as 60 workstations as clients, segmenting the network cer- 
tainly made management easier. 

The biggest concern, though, was how to continue migrating to 
higher and higher bandwidth LANs. Fermilab is the kind of place 
that will always be using the latest equipment in all sorts of custom 
configurations. To accommodate FDDI and any future LANs, the 
laboratory laid bundles of 48 single and multimode fibers around 
the ring. 

All that fiber around the lab meant that in addition to one or 
more lab backbones, the Computer Division could take a fiber to an 
experiment or workgroup, thereby creating rings on demand. Like 
many sites, Fermilab was trying hard to go through the exercise of 
laying fiber in a large area only once. 


0 


After a quick lunch, I went into the building housing the Linear 
Accelerator (LINAC), the first of the seven accelerators linked to- 
gether at the laboratory. Behind racks and racks of electronic equip- 
ment, I found the office of Peter Lucas, one of the designers of the 
accelerator control system. 

Controlling a series of accelerators involves monitoring and set- 
ting a huge number of devices on subsystems ranging from vacuum 
pumps to refrigeration units to superconducting magnets. In the 
case of Fermilab, the accelerator control system must handle over 
45,000 data points, some of which operate at very high frequencies. 

Most devices are managed by CAMAC crates, a venerable back- 
plane architecture that can hold up to 22 cards per crate. CAMAC 
crates are controlled by serial links, which in turn plug into a com- 
puter, usually a PDP 11. 


294 


Chicago 


The computer can poll each of the cards on the crate to gather 
and set data. If a card needs to generate an interrupt, it can set a 
single “look at me” bit on the crate. The computer then polls each 
of the cards to find out which ones need attention. The basic con- 
trol flow on the front end was thus a PDP 11 to a CAMAC crate to a 
card to the device being controlled (although the PDPs were sched- 
uled to be swapped out at some point for »VAXen). 

In the early 1980s, when this system was first being put together, 
VAXen were just being released. A series of 3 11/785s, later supple- 
mented by an 8650, acted as database servers, keeping track of in- 
formation on each of the data points, such as which CAMAC and 
PDP that data point was accessible from. 

The last part of the system were pVAXen (originally PDPs) act- 
ing as consoles. The basic operation would be for a console to log a 
request for a certain data element at a certain frequency. The data- 
base server would define the elements and the PDP 11s were re- 
sponsible for delivering the data. 

So how to connect all these systems together? In 1986, when the 
current network was being designed, the great Ethernet versus To- 
ken Ring debate was raging. After extensive deliberations, the lab 
decided the predictable latency of the token ring was needed for the 
main ring control system. 

DEC, of course, was firmly in the Ethernet camp, but lack of 
product support by the vendor doesn’t faze experimental physicists. 
They turned to their electrical engineers, who built token ring cards 
for the Unibus used by the PDPs and VAXen. 

Running on top of the token ring, the lab put their own Accel- 
erator Control network (ACnet). ACnet allows any console to moni- 
tor and manage any device, a capability that makes operators at 
other accelerator centers stuck with special purpose consoles green 
with envy. 

ACnet is a protocol in which a console logs a single request, 
which can generate a stream of data. A request might be for a cer- 
tain data item at 1 hz, which would yield a stream of data spaced 
one per second. In addition to logged requests, certain events trig- 
ger alarms, sending the front-end PDP into the database to decide 
who should be notified. 


295 


Exploring the Internet 


The token ring choice worked, but it turned out that there really 
wasn’t that much difference between it and Ethernet. Not only that, 
DEC kept coming out with new pVAXen, each sporting a newly in- 
compatible variant on the Q-bus. It was evident that Ethernet had 
to be incorporated into the network somehow. 

An Ethernet was added and VAXstations started to pop up 
around the laboratory as consoles. To link the Ethernet with ACnet, 
the lab designed and wrote an Ethernet-to-token ring bridge run- 
ning in software on one or more of the VAXen. 

The ACnet was still token ring, but the addition of the bridge 
meant that authorized users from all over the lab had access to ac- 
celerator data. One of the VAXen was even set up with the X Win- 
dow System, allowing X servers to access the data. 

Since X runs just fine on top of the Internet, especially if you are 
communicating between two core sites, it is even possible to run the 
accelerator remotely. On one occasion, lab employees at a confer- 
ence in Japan pulled up the accelerator control panels. To prevent 
any possibility of accelerator hackers, the lab set up the system so 
that remote terminals could only read data items. 

This architecture proved to be quite flexible, easily expanding to 
meet the needs of the Tevatron and other newer subsystems. PDPs 
controlling CAMAC crates could easily be added if new data points 
needed to be controlled. Over time, CAMAC crates became a bit 
old-fashioned and newer devices simply had a VME crate directly 
on the token ring, alleviating the need for the front-end PDP. 

Even the token ring decision turned out to have been wisely 
made. Networking at the lab grew like a prairie fire, with worksta- 
tions going in as fast as physicists could unpack them. This is not a 
user community that will wait for official installers to unpack boxes. 
In fact, if pieces are missing, they are just as liable to manufacture a 
replacement themselves as they are to call up the shipper and com- 
plain. 

After walking me through the architecture, Peter Lucas took me 
over to an X Window System console and showed me some of the 
1,000 application packages that had been written for the accelerator. 

All the screens were color coded, providing visual clues on 
which items in a complex form led to other screens and which items 


296 


Chicago 


could be changed by the user. Clicking on a line item with the ID 
for a CAMAC crate, for example, would result in a graphic repre- 
sentation of the map, with each card and its ID depicted. Clicking 
on one of the cards would show the data items kept by the card and 
its current status. 

All these programs were written at first for PDPs, in a day when 
that level of user interface was real, heavy-duty programming. 
These were the kind of programmers who battled their way through 
RSX, FORTRAN 2, and TECO, languages that make me shudder 
whenever I think of them. 


0 


When the superconducting magnets in the main ring generate pro- 
ton-antiproton collisions at 1.8 TEV, there needs to be a way to col- 
lect data describing the event and store it away for further analysis. 
The detectors used in high energy physics are as complicated as the 
accelerator itself. 

I drove around the main ring to D Zero (D@), the quadrant of 
the ring containing a detector that had been under construction for 
over nine years. The instrument had consumed most of the time of 
400 physicists and the U.S. $50 million camera was almost ready to 
be inserted into the ring. 

D@© was a six-story building, just large enough to house the de- 
tector. When it was operational, the detector would put out 100,000 
data points per collision, and there would be a collision every 3.5 
microseconds. With roughly 250 kbytes per collision, this results in 
a data rate of 75 Gbytes per second. 

This is quite a bit of data, especially when you consider the fact 
that the experiment would run 24 hours per day for six to nine 
months at a time. One of the great hopes of the DO detector was 
that it would provide experimental evidence of the existence of the 
top quark, the only one not yet empirically observed. 

Top quarks are very rare, and it was quite likely that only one 
(or less) would be found per day. In a day of operation, the data 
acquisition subsystem on the detector thus had to somehow filter 


297 


Exploring the Internet 


through 6.48 petabytes (6.48 million gigabytes) looking for the inter- 
esting 250,000 bytes. 

D@ was pandemonium. With the pins being pulled in a few 
days to roll the detector in, desks were littered with piles of empty 
styrofoam cups and coke cans, boards were everywhere in various 
stages of assembly or disassembly. A pager went off every few min- 
utes, directing people to where they weren't. 

I found Dean Schaumberger, a professor from State University of 
New York at Stony Brook who agreed to give me a quick briefing. 
We walked through the data acquisition system, concentrating on 
the data and ignoring the physics. To decide which events to keep, 
an event mask provided the first level of filtering, allowing the 
physicists to hone in on a few dozen attributes that characterize in- 
teresting events. Once the event mask was tripped, boards housed 
in 79 VME-based front end crates would digitize the data on the 
detector. The goal of the mask was to reduce the data flow to 200 to 
400 events per second. 

Since it was possible that two interesting events could occur 
back to back, the front-end boards were double buffered. After the 
two buffers were full, though, events that tripped the mask had to 
be discarded until space became available again. 

The 79 front-end crates were distributed among eight data ca- 
bles, each cable providing a 32-bit wide data path running at 10 
Mhz, yielding a data rate of 40 Mbytes per cable. With all eight 
cables running in parallel, the data flow reached 320 Mbytes per 
second. 

The next level of analysis was provided by a farm of 50 pVAX 
4000s, each machine running at the rate of about 12 times a VAX 
11/780. Each pVAX had 8 custom boards, one for each of the 8 data 
cables. The data cables thus came out of the VME Crates and 
snaked through each of the pVAXen allowing any machine to collect 
all the data on one event. 

The pVAXen, running the ELN real-time operating system, were 
also connected to a scheduling VAX, a machine that decided where 
on the farm there were available cycles to process the next event. 

With the major pieces in place, Dean walked me through the 
data path. When the mask got tripped, data would go into the 


298 


Chicago 


front-end boards. If the data bus was clear, the token generator (an- 
other p VAX at the end of the data bus) would issue a token with the 
current event number. 

Each of the eight data cables would get a token. On any one of 
those cables, if a VME crate saw a token, it was able to capture the 
token and send as many bursts of data as it needed, releasing the 
token downstream when it was done to allow the next crate to 
dump its data. When all eight tokens got back to the token sched- 
uler, the next event could proceed. 

When the data reached a np VAX on the farm, it would undergo 
scrutiny by a variety of programs designed to filter interesting 
events from the subatomic chaff. The goal at this stage was to win- 
now down the data rate another 200 to 400 times. 

Events that met the second level of filtering would emerge from 
the p VAX farm and go to a VAX 6000 to be spooled to tape. I saw a 
rack with 11 Exabyte tape drives on it, and Dean informed me that 
the experiment had well over 50. 

This was not excessive when you consider that one event per 
second for six months would be close to 4 terabytes of data. Even- 
tually, a physicist would spend up to a half hour with each interest- 
ing event, looking for clues. Some events that looked particularly 
promising were also spooled on the VAX 6000 for immediate analy- 
sis during the run. 


0 


The next morning, I went with my father to see SciTech, a hands-on 
science museum for kids he had spent the last two years building. 
SciTech had managed to obtain a cavernous old post office in the 
middle of nearby Aurora. 

The museum specialized in the very big and the very small, 
teaching kids about light, sound, astronomy, and even particle phys- 
ics. Every exhibit was hands-on. To explain quarks, for example, 
SciTech was modifying slot machines, replacing lemons and cherries 
with rare quarks and adjusting the probabilities to match. Pulling 
the lever to create a particularly rare particle would result in a prize. 


299 


Exploring the Internet 


All around were prisms, tuning forks, echo chambers, comput- 
ers, and dozens of other devices making up the exhibits. Signs were 
next to each exhibit and teenage “explainers” would walk around 
telling people what they were seeing. A group of girl scouts trun- 
dled down to the basement to help build a new exhibit. Upstairs, 
some six-year olds were playing in a science club. 

Starting a museum is never easy, and SciTech had managed to 
surprise everybody with its rapid growth. Still run on a shoestring, 
the museum was able to get enough grants, admissions, and mem- 
bers to keep expanding the exhibits and start filling up the huge old 
post office. 

I admired the exhibits, then ran to catch my plane. O’Hare was 
not as bad as usual, so I had a little time to kill. Walking down the 
moving walkway, I came to a stop behind a little girl and her 
mother. 

“Move over, honey,” the mother said, “this is an airport and the 
nice man has to hurry and catch his plane.” 

The little girl smiled sweetly and moved over, just in time for 
me to get off the ramp and head into the nearby cocktail lounge. 


300 


Boulder 


On the flight back to Boulder, I struck up a conversation with the 
prosperous looking yuppie on my left. He worked for Trammel 
Crow, the quintessential Texas real estate developer. We talked 
about the current fiscal performance of Compag, his Vail vacations, 
and the relative profit potential of commercial and residential devel- 
opment in the greater Houston area. 

Over a second drink, I asked this seemingly normal modern 
businessman what sort of activity brought him to Boulder. A 
merger, perhaps or an acquisition? Dividing virgin forest into poor 
imitations of Southern California? 

“T’'ve quit my job to open a Great Harvest outlet in Madison, 
Wisconsin, ” he explained, referring to the popular whole wheat and 
granola bakery located in a Boulder shopping mall. 


Back in Boulder, I brought a box of Parisian chocolates over to 
my neighbor, a freelance wholesale carpet salesman and the proud 
owner of at least a dozen vehicles. The vehicles gave the place a bit 
of a hill-country look, but I didn’t mind since it made it harder to 
tell that my house was deserted most of the time. 

“Do you ever suffer from writers block?” he wanted to know. 
“How about jet lag?” 

“Um, sort of,” I said with a lack of conviction, pretty sure this 
wasn’t just an idle question. 

“Here,” he said, handing me several packets of powders. “I’ve 
added a new line,” pointing proudly to the pouches of Wow!™ and 
Focus!™ (“Nutrients for the Brain”), products of Durk Pearson & 
Sandy Shaw®, the founders of Omnitrition International and the in- 
ventors of Designer Foods™., 

Pearson and Shaw have built quite a nice little business taking 
the hopes we all share for intelligence and vigor and peddling them 
nationwide in a hierachical sales scheme of life extension that has 
taken in such world-famous businessmen as Jerry Rubin. I thanked 
my neighbor and told him I'd be in touch, remembering the advice 


301 


Exploring the Internet 


my mother gave as I left home to never fight with the woman who 
feeds your cat when you are going away soon. 

Soon, in fact, was an understatement. I had less than two weeks 
to dump the text I had accumulated, sort out my finances, and get 
back on the plane for my third round-the-world. First on my list 
was to bring my primitive PC in for a new disk drive, the cause of 
its failing to function as my mail system for the last few weeks. 

Next on the list was responding to a couple of hundred mes- 
sages from people trying to understand why they couldn’t get ITU 
standards anymore. Bruno was dead and engineers all over the 
world wanted to know all the grisly details. Most agreed that the 
situation was ridiculous and couldn’t understand why the ITU 
would reverse such an obviously useful service. 

Most touching was a message from a blind engineer in Australia 
who had hoped that he could work with the ASCII text, piping it 
out to /dev/audio so he could hear the texts. The message re- 
minded me of Milan Sterba, who told me about the pitiful number 
of copies of the standards that existed in Czechoslovakia. I for- 
warded both bits of information to Dr. Tarjanne at the ITU, inquir- 
ing if it was truly the policy of a major UN agency to deny access to 
the physically handicapped and those in developing countries. A 
cheap shot perhaps, but that’s politics. 

In the middle of the week, while trying to come up with 12 
pithy columns for Communications Week, I checked my mail to see an 
urgent note from Mike Schwartz. David Farber, a grand old man of 
networking, was giving a lecture in an hour and a half and nobody 
in Computer Science seemed to have been aware of the event. 

When Mike found out from out-of-band sources he promptly 
broadcast a message to those of us who would realize that this was 
a worthwhile way to spend an afternoon, and I promptly rear- 
ranged my schedule. 

David Farber had actually been on my mind that morning. One 
problem with trying to write a technical travelogue is that you can’t 
possibly see everything. I wasn’t going anywhere in Africa, Central 
America, or South America, for example. I wasn’t going to any of 
the supercomputer centers. I wasn’t even going to visit Merit, the 
network operations center for the NSFNET. 


302 


Boulder 


And, I couldn’t figure out how to squeeze in visits to try and 
meet people like Ira Fuchs and David Farber, people instrumental in 
a host of key projects ranging from ARPANET to CSNET to BITNET 
to the NSFNET. 

It was my luck that Boulder is close to enough ski areas to at- 
tract frequent guest lecturers, including David Farber. When I got 
to the lecture hall, it appeared that the computer science department 
wasn’t as awed as I was. Only Mike Schwartz came from the de- 
partment, the rest of the professors being unable to climb down 
from their towers in time. 

Farber started by explaining how the gigabit testbeds came to 
be. People like Farber, Gordon Bell (the father of the VAX) and Bob 
Kahn from CNRI had spent several years working to get the project 
funded by NSF and DARPA. The genesis for the testbeds came 
when researchers started asking what would come after Broadband 
ISDN and ATM cell switching. 

In particular, the researchers wanted to know what applications 
would run on these testbeds. Visits to places like Bellcore and Bell 
Labs didn’t yield any answers: the telephone companies didn’t see a 
market for gigabit networks and weren't paying attention to them 
yet. 

Even if gigabit networks existed, the researchers saw a funda- 
mental problem: the current technology would not evolve gracefully 
into gigabit or multi-gigabit speeds. 

Switching technology, for example, had progressed up an evolu- 
tionary chain from T1 to T3 to the 622 Mbps speeds of Broadband 
ISDN. These switches had become increasingly complex, and many 
felt they had reached the edge of the technology. What DARPA 
called a “paradigm shift” would be needed to move to the next 
stage. 

Government leadership was obviously in order here, and Kahn 
and Farber made a proposal to NSF for the gigabit testbeds. The 
proposal had a few unusual features to it. For one, the testbeds 
would depend extensively on participation from industry, and in- 
dustry would have to pay its own way. 

Money from NSF and DARPA would go to pay for the academ- 
ics and program overhead, and this leverage would be used to bring 


303 


Exploring the Internet 


in industrial participants. To prove that industry would indeed par- 
ticipate, Farber and Kahn produced letters from IBM, DEC, Xerox, 
Bell Labs, and Bellcore. 

The other unusual twist to the proposal was that although gov- 
ernment would start the program, the operation of the project 
should be left in the hands of what Farber called “an organization 
with a faster metabolism.” Ultimately, this management group 
ended up being CNRI. 


After a series of white papers, proposals, and intensive lobbying, 
the project was set up with U.S. $15 million in funding. Bob Kahn 
hit the road and used that seed money to raise another U.S. $100 
million in facilities and staff commitments from industry. 


All the resources were put into a pot and reorganized into the 
five gigabit testbed projects. In some cases, additional participants 
(particular telephone companies to provide fiber) were added to 
round out a testbed. 


Most of the testbeds were set up to look at a combination of the 
underlying technology and applications. The CASA project in Cali- 
fornia and New Mexico, for example, would run three test applica- 
tions over wide-area gigabit channels. | 


The Aurora project, the testbed that Farber had joined, was a bit 
different, concentrating on the underlying technology. The chief 
participants were a group from MIT led by David Clark, Farber’s 
group at the University of Pennsylvania, and teams from Bellcore 
and IBM. Several telephone companies were also participating to 
provide up to 2.4 Gbps of wide-area bandwidth. 


Typical of the research flavor of Aurora was the work being 
done in the switching substrate. Bellcore would look at cell-based 
switching using ATM technology. IBM would run an entirely differ- 
ent datagram substrate based on their PARIS project. 

Farber and Clark were looking at the upper levels, the protocols 
that ran on the fat pipes. Both felt that current protocols, such as 
the TCP/IP suite, might not work on the next generation of net- 
works. 

Most protocols were based on many modules that exchanged 
messages, with protocols layered on other protocols. While this was 


304 


Boulder 


architecturally convenient, the result was that software layers would 
endlessly transform data, copying it from one buffer to another. 

The immediate problem was thus not on the network. A gigabit 
was more than most hosts could handle. The problem was not only 
in the CPU or the programming model, either. The problem was 
the network software. Clark was advocating application-layer fram- 
ing, collapsing the protocol stack and giving the application much 
better control over network operation. He saw many of the flaws in 
today’s networks as the result of modules making decisions in areas 
such as flow control that didn’t make sense in the context of the 
upper layer user. 

Farber was proposing an equally radical solution, doing away 
with the message abstraction of current protocols and moving to- 
wards a totally different way of looking at the network. Instead of 
messages, Farber wanted to look at the network as a memory mov- 
ing mechanism, a backplane. 

Programmers on a single host, or even a multiprocessor, deal 
with memory as the main abstraction. Calling a subroutine by 
name, for example, is a simple way to refer to a segment of memory. 
If the network implements that same abstraction, programmers can 
continue to work within the model they were used to and the net- 
work simply becomes an extension of that model. 

With its roots in an early research project conducted by Farber 
and his student Paul Mockapetris, the concept first really took shape 
in a 1985 Ph.D. thesis by Gary Delp, another one of Farber’s stu- 
dents. The system was called Memnet, and consisted of a bunch of 
PC ATs connected to a modified memory interface and a cache, con- 
nected in turn to a 600 Mbps token ring. 

The LAN acted as a way for requesting, moving, and writing 
segments of memory. The caches on other hosts could keep copies 
of segments, alleviating the need for a network operation on fre- 
quently accessed pages. 

Memnet demonstrated that a LAN could indeed be a simple ex- 
tension of memory. It operated within the flat address space of DOS 
and enforced tight consistency guarantees on pages of memory 
through mechanisms such as only permitting one writer per seg- 
ment. 


305 


Exploring the Internet 


By 1988, the Memnet concept had been moved up to software, 
running on an Ethernet LAN. A modified version of Sun’s UNIX, 
developed by Ron Minnich, another Farber student, allowed several 
hosts to share memory. The software was actually put into produc- 
tion use at a supercomputer center, being a useful mechanism to 
provide parallel processing on certain classes of applications. 

It was clear to Farber and his students that Memnet was one 
example of a general class of networks. To extend Memnet to a 
wide area environment, some changes would have to be made. A 
ring topology or a simple bus was not appropriate, and constraints 
like the flat address space would certainly have to be relaxed. Most 
importantly, looser consistency guarantees would be needed if the 
system would successfully scale to become a “national memory 
backplane.” 

Farber and his students were actively working on an implemen- 
tation, called GobNet, that would eventually work on the Aurora 
testbed. On a gigabit testbed, the software certainly showed prom- 
ise. The latency of a 3,000-mile gigabit network is roughly equiva- 
lent to a local page fault on a machine, meaning that the network 
could appear to the host as the equivalent of a memory segment 
that had been paged to disk. | 

While page faults were natural on a host, they were also some- 
thing to be avoided. Virtual memory systems would preemptively 
cache memory segments to try and have the proper segment waiting 
when it was asked for. This was also going to be the key to good 
performance on a wide-area Memnet. 

The switches in GobNet would have the caches. If a host re- 
quested a segment not in the cache, the cache would have to go and 
find the requested object. In a token ring or Ethernet, finding an 
object is simple: you ask for it. 

In a WAN, though, the topology may be quite complex and find- 
ing the correct path is the real challenge. GobNet would use a 
flooding algorithm, similar to what a bridge would use in trying to 
decide where a host lay on an extended Ethernet. 

For the first request on a segment, the request would be flooded, 
being sent out every available path on the network. Eventually, one 
hopes, the page would come back on a certain path. Each of the 


306 


Boulder 


switches on that path would set up a segment to host binding so 
that future references to the segment would be easier to find. 

Flooding a network to find an object and then setting up a bind- 
ing for future references turned out to be a strategy that was good 
for more than just memory segments. Researchers at Bellcore were 
using the same technique in personal communications systems to 
find the current location of a portable phone anywhere in the coun- 
try. 

The view of the Internet as a national memory backplane was 
exciting, but what impressed me the most was the overall scope of 
the research being conducted in the gigabit testbeds. It was clear 
that this was money well spent and that we would all benefit from 
the incredible collection of talent that had been assembled. 

After the lecture, with my column deadlines looming, I raced to 
the Trident, a coffee shop and bookstore, to try and find some pithy 
sayings to write. Munching a Blueberry Tahini bar, I walked around 
the bookstore hoping to get inspiration. 

I picked up a copy of The Secret Books of the Egyptian Gnostics but 
couldn’t find any parallels to my current subject. When The Aro- 
matherapy Workbook didn’t prove to be any help, I sat down and 
tried to grind out words of MIS wisdom while around me people 
layed out tarot cards and discussed the many paths to personal ful- 
fillment. 


307 























example ol a qe iol class aw ryt 
ah: saniplalgd sap ane eat 
ie so opg lle¥o of awe pont sd_ont aft 
sone aainith oatediey Sidewia au tah ety nee. 
reps, shane y Lhe, blac, AY AeAR bows jaca, Hoye. ys 
e car noistegees come had ln Mah "9 oa oak 
of, ‘basen Lanciie 4 esctifk eb Fon yor Min sun a A 
itiqrganos boll bas. 108 ol ooiedord bias FOUR. infaph t a i 
hawete ba PBW (hy, ae a L MUG sordald. & ape ans uit a as NS 
toed, Chr abt testhe -aovenigen: ts Vag AEM a ° eae 
Sec chsiignn La st mega ott pa ae S392; I t to a ah ae 
“tite cad ndanlcyterrH> 0. Bt Taller, XR P 
SUB ey elds, ee : Ly ghedy WARE: a PE. YN Pale rok prAores CGY" 
siaiap ‘3 ~ ae KUOT abiivy: guobalw elm io abuow 10 aoe af hat 
“htt ban Qn296,, oA. TREK, wage ot bewepransts bas it ioxal Yok > £ 


rae OT) were and ar. 
ting to, be awoke Virtus) sistigs #9 nyatem wend preemp pt we ly” 
Cache-mermwiry 3 Cyrene i iy ana have U 2 proper resmnerit walt 
VV ) etl rf wer asked fon. ‘This was alue. ROIs 10 _ the «Ky, a 
perutonarnt on 8 Wwidewra Mimuet. ‘ME 7 
te fwiiches In Goole: wosdd. have the caches, i ay ae 
quested a segment notin the cache, the cache would Hianve teen 
find the requested ehjant diy a token, Ting, oF Echemet, “findis ee 
oblgot is siniples you wk fordt |. gi ome 9," Ti 
In a WAIN, theugh, the apology may be parton ace 
ing the correct path tw the teal challenge. “Gobet, 
fooding alyoritua, similar ty what 0 bedge ch visi | ne | 
sich Ses See a pel shear _ 


EA) 









nal 
4 





2 qaaet Snenc 
mn of ante Ly Claes 


Round 3 


In Search of a Standards Haven 
















ei? |) ae! Ray 

Pier a am ce 

ty 7 rr | pe Le 

r of le ee Au a pei Wa, 
} dai al ay au ilk sn vi ie “ q 
f ny W 

jr OK: i . inte Ming ttt se ie 
rf eae eben ths 


ee ee) nu | | Unn ites js : ve Se a 
_ | im ey) Wy . ‘4 iat sm py. 
eat sentry aa . 

can . in os Gone i ua en Pt 


A ray i + ais iD / 


‘aay wel debate 5 a8 foes? a nt 


Pre 


ts Ne 
7 rae : 


: an = ‘ 





erry ar (iis rales 
an iy vO ee mh ne Pian 





i ; i uy ue pe i ) 2 a f 


ie 


Marina del Rey 


Sitting by the lagoon in Marina del Rey, I sipped a Pilsner Urquell 
and watched the planes at LAX, two taking off followed by two 
landing in an infinite repetition. In addition to the world’s largest 
man-made small boat harbor, Marina del Rey is the home of the 
Information Sciences Institute (ISI), a research group that has played 
a key role in the development of the Internet. 


Monday morning, I got in my car to find ISI. Since the Institute 
is part of the University of Southern California, I expected to arrive 
at some ramshackle house on the edge of campus, but instead found 
myself on the 11th floor of a modern office building, right on the 
edge of the harbor. 


With 200 staff members and most of its funding from the De- 
fense Advanced Projects Research Agency (DARPA) and other gov- 
ernment agencies, ISI plays an important catalyst role in several 
areas. The MOSIS service, for example, is a way for researchers to 
get small quantities of custom VLSI circuits. MOSIS gangs together 
designs from many researchers onto one mask, breaking fabrication 
costs down to manageable levels. 


My goal, though, was not to learn about MOSIS but to try and 
learn more about the many networking projects IS] undertakes. 
First stop was to find Dr. Jon Postel, Director of ISI’s Communica- 
tions Division. Jon was reading his mail when I came in, a never- 
ending task when you get over 100 messages per day. He looked 
up from his two-finger typing and gave me a warm welcome, evi- 
dence of his long residence in California. 


Postel is one of the best-known figures in networking. The edi- 
tor of the RFCs titled “Internet Protocol” and “Transmission Control 
Protocol,” he is certainly the person most often cited in the footnotes 
at the back of research papers. In addition to writing key protocols, 
Postel is the editor of the Request for Comment (RFC) series, and 
has thus been responsible for the documentation of the TCP/IP pro- 
tocol suite. 


311 


Exploring the Internet 


Jon had set up a demanding schedule which we promptly shot 
to hell. All the projects were so interesting, I kept dallying to find 
out more. Even then, I saw only a fraction of what ISI had to offer, 
not even getting to talk to people like Clifford Neuman, codeveloper 
of key network services such as Prospero and Kerberos. 

We started talking about the networks to which ISI belongs. 
Several years ago, Postel sent a mail message around proposing that 
a network, now called Los Nettos, be started. The very same day, 
Susan Estrada of the San Diego Supercomputer Center proposed the 
establishment of CERFnet. 

Both networks went forward and they illustrate two different, 
yet complementary approaches to providing network service. Jon 
describes Los Nettos as a “regional network for Blue Chip clients.” 
Los Nettos connects 9 big players, including UCLA, Caltech, TRW, 
and the RAND Corporation. The network assumes that the clients 
are self sufficient and thus has little overhead. As Jon puts it, “we 
have no letterhead and no comic books.” 

By contrast, CERFnet is a full-service network provider, one of 
the most aggressive and best-run mid-level networks. CERFnet has 
aggressively pursued commercial customers and helped to found 
the Commercial Internet Exchange (CIX). CERFnet provides a wide 
range of user services, including comic books, buttons for users, and 
other introductory materials. 

Both models are necessary and the two networks interconnect 
and work well together. T1 lines from UCLA and Caltech down to 
the San Diego Supercomputer Center give Los Nettos dual paths 
into the NSFNET backbone. Having the two types of service 
providers gives customers a choice of the type of service they need. 

ISI is also a member of two other networks, DARTnet and the 
Terrestrial Wideband (TWB) network, both experimental systems 
funded by DARPA. TWB is an international network, connecting a 
variety of defense sites and research institutes, including UCL in 
London. 

TWB is a semi-production network used for video conferences 
and simulations. The simulations, developed by BBN, consist of ac- 
tivities such as war games with tanks, allowing tank squadrons in 
simulators across the country to interact with each other so com- 


312 


Marina del Rey 


manders can experiment with different strategies for virtual destruc- 
tion. 

DARTnet, by contrast, is an experimental network used to learn 
more about things like routing protocols. To learn more about 
DARTnet, I walked down the hall to find Robert Braden, executive 
director of the IAB. Braden was buried behind mountains of paper, 
including a formidable pile of RFCs. 

DARTnet connects eight key sites such as BBN, ISI, MIT, and 
Xerox PARC. Braden described the network as “something re- 
searchers can break.” Although applications such as video confer- 
encing run on the network, the main purpose is experimentation 
with lower layer protocols. 

Each of the DARTnet sites run Sun computers as routers. Peri- 
odically, network researchers, such as the elusive Van Jacobson, 
modify the code in those routers to experiment with new routing or 
transport protocols. 

One of the key research efforts is supporting different classes of 
traffic on one network. Video, for example, requires low delay vari- 
ance in the data stream, a requirement not necessarily compatible 
with large file transfers. 

DARInet researchers are examining ways that resource reserva- 
tion can be accommodated in a general-purpose network. Connec- 
tion-oriented protocols, such as ST, share the underlying 
infrastructure with the connectionless IP protocol. IP multicasting 
and other newer innovations are also implemented in the network, 
allowing bandwidth-intensive video to be sent to several sites with- 
out necessarily duplicating the video stream. 

The next stop on my tour was a visit with Gregory Finn and 
Robert Felderman, two of the developers of ATOMIC, an intriguing 
gigabit LAN under the direction of Danny Cohen. ATOMIC is 
based on Mosaic, a processor developed at Caltech as the basis for a 
massively parallel supercomputer. 

One of the requirements for a message-based, massively parallel 
system is a method for passing messages from one processor to an- 
other. Mosaic had built this routing function into the processor. ISI 
decided to use that same chip as the basis for a LAN instead of a 
supercomputer. 


313 


Exploring the Internet 


The prototype Gregory and Robert showed me consisted of 
three Suns connected together with ribbon cables. Each Sun has a 
VME board with four Mosaic chips and two external cables. It is 
interesting to note that each Mosaic chip runs at 14 MIPS, making 
the LAN interface board significantly more powerful than the main 
processor. 


The four channels on the board have a data throughput rate of 
640 Mbps. Even on this rudimentary prototype, 1,500-byte packets 
were being exchanged at a throughput rate of over 1 Gbps. Small 
packets were being exchanged at the mind-boggling rate of 3.9 mil- 
lion per second. 


The system I saw simply had host interface boards connected 
directly to each other. The same Mosaic chip is being used as the 
basis for a LAN switch, an architecture that seems to provide a vi- 
able alternative to the increasingly complex ATM switches. 


The Mosaic-based supercomputer consists of arrays of 64 chips, 
configured on boards 8 square. The ATOMIC project was going to 
use those arrays as the basis for a switch, connecting host interfaces 
(and other grids) to the edge of the array. 


Messages coming into the grid would be routed from one Mo- 
saic chip to another, emerging at the edge of the grid to go into a 
host interface or another grid. Source routing headers on the mes- 
sages were designed to take advantage of the hardware-based rout- 
ing support in the processors. In effect, 896 MIPS of processing 
power on a grid would sit idle while the routing hardware moved 
messages about. 


What was so intriguing about ATOMIC was the simplicity and 
elegance of the architecture. While ATM switches had become ever 
more complex in order to support more users or higher speeds, this 
appeared to be an architecture that could scale evenly. 


Even more intriguing was cost. The individual Mosaic chips 
and the 8 by 8 grids were being made in large quantities for the 
Caltech supercomputer and costs would descend to very low levels 
if ATOMIC ever went into production. The tinker-toy approach to 
connecting grids together meant that a LAN switch could easily 
grow at small incremental costs. 


314 


Marina del Rey 


ATOMIC is implemented as a LAN under the Berkeley sockets 
interface, allowing TCP/IP to run over the network. There is no 
reason, however, that ATOMIC couldn’t be made to send fixed- 
length packets of 54 bytes, making the technology well-suited to 
ATM and B-ISDN, as well as more flexible packet-based architec- 
tures. 

With only a few researchers, ISI showed that gigabit switches 
didn’t necessarily have to involve huge development teams or com- 
plex designs. By piggybacking on the Mosaic effort, the ISI re- 
searchers quickly prototyped a novel solution to a difficult problem. 

Just down the hall from the laboratory housing the ATOMIC 
project is the ISI teleconferencing room. Multimedia conferencing 
has always been a highly visible effort at ISI, and I met with Eve 
Schooler and Stephen Casner, two key figures in this area, to learn 
more about it. 

Traditional teleconferencing uses commercial codecs (coder-de- 
coders, sort of a video equivalent to a modem) over dedicated lines. 
ISI, along with BBN, Xerox, and others, has been involved in a long- 
term effort to use the Internet infrastructure to mix packet audio 
and video along with other data. 

The teleconferencing room at ISI is dominated by a large-screen 
Mitsubishi TV split into four quadrants. In the upper left, I could 
see Xerox PARC, in the lower right, the room I was in. In the Xerox 
quadrant, I could see Stephen Deering, a key developer of IP multi- 
casting, holding a meeting with some colleagues. In the upper right 
hand quadrant, I could see the frozen image of a face from MIT left 
over from the previous day. 

Working on multimedia networking began as early as 1973 
when ARPANET researchers experimented with a single audio 
channel. To get more people involved, Bob Kahn, then director of 
DARPA’s Information Processing Techniques Office, started a satel- 
lite network. In time, this network evolved into the Terrestrial 
Wideband (TWB) network. 

Over the years, the teleconferencing effort settled into a curious 
mix of production and research. Groups like the IAB and DARPA 
used the facilities on a regular basis to conduct meetings, with TWB 
logging over 360 conferences in the past three years. 


315 


Exploring the Internet 


On the research side, people like Eve Schooler and Steve Casner 
were experimenting with issues as diverse as the efficient use of un- 
derlying networks to high-level tools used by meeting participants. 


At the low level, one of the big constraints is raw bandwidth. 
Video channels can take anywhere from 64 to 384 kbps, depending 
on the brand of codec and the desired picture quality. Codec re- 
searchers are examining strategies to squeeze better pictures out of 
the pipes, ranging from better compression to clever techniques 
such as varying the amount of data sent depending on the amount 
of motion. 


Teleconferencing, because of high codec costs, had been based 
on connecting special, dedicated rooms together. With the cost of 
codecs coming down and even getting integrated into workstations, 
the focus is rapidly switching to office-based group applications, al- 
lowing people to sit at their desks in front of their multimedia 
workstations. 


While desk-based video was still a ways down the pike, audio 
was maturing rapidly. ISI has been working with people such as 
Simon Hackett in Australia to come up with a common protocol for 
moving audio around the network. 


After this whirlwind morning of research projects, Jon Postel 
took me to lunch and I returned to learn more about the key admin- 
istrative role ISI plays in the Internet. 


First stop was the famous Joyce K. Reynolds, Postel’s right arm. 
In addition to announcing new RFCs to the world, Joyce manages 
the Internet Assigned Numbers Authority (IANA), the definitive 
registry of constants like TCP port numbers, SNMP object identifi- 
ers, and Telnet options. IANA included all administered numbers 
except for Internet addresses and autonomous system numbers, an 
area in which ISI acts as a technical advisor to the NIC. 


Although Joyce’s job in RFC processing and IANA functions 
would seem to take all her time, she also manages the IETF User 
Services area. For several years, she had been pushing the IETF to 
try and make using the network as important a priority as making it 
run. Finally, User Services got elevated to a real “area,” and Joyce 
led the effort to publish tutorial documents and introductory guides. 


316 


Marina del Rey 


Right next to Joyce’s office is that of Ann Cooper, publisher of 
the Internet Monthly Report containing summaries of X.500 pilots, 
IAB meetings, IETF and IRTF meetings, gigabit testbeds, and other 
key activities. 

One of Ann Cooper’s functions is administrator of the U.S. do- 
main. While most U.S. names are in the commercial (.COM) or edu- 
cational (.EDU) name trees, the rest of the world uses a 
country-based scheme. The U.S. domain is an effort to bring the 
U.S. up to speed with the rest of the world. 

My own domain name is Carl@Malamud.COM. While this is 
nice for me, placing myself this high on the name hierarchy starts to 
turn the Domain Name System, in the words of Marshall T. Rose, 
“from a tree into a bush.” In fact, Rose, being a good citizen of the 
network, has registered himself under the mtview.ca.us subdomain. 

While most U.S. members of the Internet are still under the 
older .COM, .GOV, and .EDU trees, the .US domain is beginning to 
catch on. In fact, enough people want to register that ISI] has dele- 
gated authority for more active cities to local administrators. Erik 
Fair, for example, the Apple network administrator, has taken over 
the task of administering names for San Francisco. 

My day at ISI was finished just in time to go sit in traffic. I had 
proved myself to be a non-native of California by booking my flight 
in the wrong airport, so I wheeled my car past three Jaguars head- 
ing into the Marina and started the 3-hour drive south to San Diego, 
watching the snow-capped mountains poking their heads over the 
Los Angeles basin fog. 


317 


San Francisco 


Tuesday morning, I took the shuttle from my hotel to the airport to 
await the arrival of the flight from Tokyo so I could meet George 
Abe, a manager of Infonet, a commercial, global IP network. The 
driver asked us for our airlines. 

“United, Domestic,” one person shouted. 

“United, International,” chimed in a second. 

A couple in the back looked at each other in bewilderment. The 
lady elbowed her husband. 

“Uh, United, Hawaii,” he said. 

I met George in an airport lounge. Incredibly energetic after a 
15-hour flight, he bounced in, whipped out his view graphs, and 
started to tell me all about Infonet. 

Infonet was originally started as a time-sharing company owned 
by Computer Sciences Corporation (CSC), offering application pro- 
grams on a series of Univac 1180s running their own proprietary 
operating system. To access the mainframes, by 1971 the company 
had started offering an X.25-like packet service in competition with 
companies like Tymnet. 

In the mid-1980s, George Abe worked as a member of a 3-man 
team to upgrade this proprietary network to X.25. Then, CSC de- 
cided packet networks were not their cup of tea and decided to di- 
vest. Infonet managers were able to convince a large number of 
PTTs around the world that they needed a way to compete against 
global giants like IBM and AT&T. The sales pitch worked and In- 
fonet became 100 percent owned by telephone companies, with ma- 
jor shares held by MCI, the German Deutsche Bundespost, and the 
French Transpac, with smaller stakes help by eight other PTTs. 

By the late 1980s, the network had grown and was based on 
multiplexors located in 34 key locations. Attached to these core 
nodes were X.25 switches, PBXs, and other interface devices, all con- 
nected together by international circuits. 

In 1990, Abe spent a week in Finland with Juha Heinanen, and 
the network soon added Cisco routers along with the X.25 switches, 


318 


San Francisco 


allowing Infonet to provide IP service. Like the Finnish PTT service, 
the IP service was a way of connecting corporate networks together. 

The first question from MIS managers when George described 
the service invariably was “Are you connected to the Internet?” 


At first, George would hem and haw, sheepishly admitting that 
they weren't connected with the rest of the world. 


“Good!” was the usual reply. Large corporate MIS staffs were 
scared stiff of the security implications of the Internet, imagining 
hordes of hackers breaking into their systems. 


Increasingly, though, users were beginning to demand some 
form of interconnection, at least mail connectivity if nothing else. 
Infonet was using PSI as a service provider, although I noticed that 
George Abe had only an MCI Mail address. 


The solution to access to the broader Internet was similar to the 
one I saw in Finland. Inside of Infonet, a router at the border of the 
PSI domain has access control lists. If a customer of Infonet pays a 
fee, traffic for that particular Internet address can make it through 
the router. Otherwise, even though there is data link level connec- 
tivity with PSI, the router acts as a firewall, keeping out IP level 
traffic for those who don’t want it. 


What was interesting about Infonet was not the few hundred 
customers it had signed up by the end of 1991, but the corporate 
backers. In addition to its shareholder PTTs, Infonet had enlisted 
most of the other monopoly carriers around the world as sales affili- 
ates. In many countries, therefore, a company that wanted interna- 
tional IP service would have to deal with Infonet. 


I wasn’t quite sure what to make of this company, but made a 
mental note that it was certainly worth watching. I left George Abe 
to run a crucial errand down at Interop. 


Ole Jacobsen, publisher of ConneXions, had asked me to help set- 
tle an Acronym Dispute (AD). Barry Leiner, a former DARPA pro- 
gram manager, had submitted an article which discussed, in part, 
the International Standards Organization. Ole, with his eagle eye, 
had tried to explain that ISO really stood for the International Or- 
ganization for Standardization, but Leiner insisted that a dyslexic 
acronym could not possibly be correct. 


319 


Exploring the Internet 


I brought Ole the cover sheet from an ISO standard, a worthless 
piece of paper that cost me U.S. $10. Sure enough, the International 
Organization for Standardization had its name proudly embossed 
on the front. Using the document to silence Barry Leiner was per- 
haps the first time this particular standard had found a useful appli- 
cation. 


320 


Tokyo 


Friday morning, after a breakfast of green beans, cocktail franks, 
and a salad, I met Kenji Naemura, at the time a vice president of 
Nippon Telegraph and Telephone who has since become a professor 
at Keio University. We sat in the back of a car with shiny white seat 
covers and drove 50 km south of Tokyo to NTT’s Yokosuka research 
laboratories. 


Naemura began his career in the 1960s in Tokyo using a machine 
developed by NTT that preserved the Illiac I interface but had a 
different architecture, possibly the world’s first clone. Naemura de- 
veloped the hardware architecture for NIT switches, then spent two 
years at Champaign-Urbana working on the Illiac IV. 


When he got back to Japan, the focus moved from switch archi- 
tectures to communications software, and Naemura began playing a 
central role in the Japanese delegation to ISO. He was involved in 
the very first OSI meetings where the seven-layer Reference Model 
was developed. Although the Japanese delegation would not have 
been unhappy to have been referred to as the seven samurai, Nae- 
mura felt that perhaps the archiecture should have a less rigid strati- 
fication of the protocol architecture. 


Naemura was bringing me to Yokosuka to learn more about 
NTT’s vision of what the telephone network would look like in the 
next 25 years. Dubbed VI&P, for “Visual, Intelligent, and Personal,” 
the vision had been developed over several years as a broad consen- 
sual effort within the corporation. The previous shared vision had 
been the installation of narrowband ISDN around the country, and 
with that effort well underway, NTT, the largest corporation in the 
world, wanted to give its employees a sense of common purpose. 


Basically, VI&P outlined a B-ISDN, all-fiber telephone network 
with 620 Mbps channels into the home and one or more terabits of 
capacity inside the network. NTT was targeting a 15 year develop- 
ment effort, with large-scale deployment in the early years of the 
21st century. 


321 


Exploring the Internet 


Much of the VI&P effort dovetailed into current products. For 
example, NTT had recently announced a 230 gram portable tele- 
phone. One of the VI&P goals is for a 50-gram personal phone, cou- 
pled with an intelligent network to find the phone wherever the 
person might be. 

We started our tour by looking at some of the prototypes, devel- 
oped for press briefings, management demos, and other shows. Al- 
though there were a half-dozen systems, the one that I found the 
most interesting was called “teleview.” 

The heart of teleview was image processing software to extract 
objects from a video feed. The prototype had a camera trained on 
an NTT office and used ISDN to send the video to a Yokosuka 
workstation. Based on movement of people and the location of 
desks, the computer could determine if people were sitting at the 
desks. 

My immediate reaction was that this was highly Orwellian, al- 
lowing supervisors to track the length of bathroom breaks. While 
toilet tracking was certainly one of the possible applications, there 
were others. 

For example, a touch screen on a workstation had a grid, with 
one square for each employee. If the employee was at the desk, the 
square was green. Touching the square automatically dialed the 
telephone. Of course, if a dog were sitting in the employee’s chair, 
the square would also be green, but the phone might not get an- 
swered. 

We touched a button and a poor harassed employee of NTT ig- 
nored it for a while, then finally picked it up. 

“Just testing, thanks a lot,” my tour guide said. The employee 
didn’t bother turning around and I got the impression that he 
wasn’t as thrilled with teleview as the researchers were. 

The marketing video for VI&P showed a couple of other 
teleview applications. Applied to a parking lot, teleview could di- 
rect drivers directly to empty spaces. At an amusement park, the 
system could count the number of people in line, displaying the ex- 
pected delay for each ride on monitors. 

After a walk through various labs, looking at ATM switches, 
HDTV systems being fed with 150 Mbps lines, and prototype equip- 


322 


Tokyo 


ment for distributing fiber from poles to homes, we drove back to 
Tokyo to NTI’s Kasumigaseki showroom to look at ISDN equip- 
ment. 

Japan has very aggressively deployed narrowband ISDN, pro- 
viding service in two thousand service areas distributed over all the 
islands. Both basic rate and primary interfaces are available, and | 
met several people with basic rate service in their homes. 


The showroom was full of slick equipment ranging from G4 
digital fax to dedicated floppy disk transfer devices. Videoconfer- 
encing stations, ISDN pay phones, and portable video phones were 
all available. Although the cost for equipment and service is not 
cheap, NTT had managed to attract over 60,000 basic rate lines by 
the end of 1991. 

Throughout my visit, people kept pointing to picture phones, 
and it was obvious that they hoped this device would spur personal 
ISDN use. While picture phones didn’t appear to me to be the Lo- 
tus 1-2-3 of the ISDN market, I did see one device that had real 
promise, the ISDN Karaoke Machine. 

Using 2 64-kbps B channels, a large database server could send 
audio down one pipe and a video image with song lyrics and a 
bouncing ball down the other. The system kept the bouncing ball 
synchronized with the audio track. Here was a way to turn every 
room into a karaoke bar. 

Dr. Naemura dropped me off at NTT’s R&D headquarters where 
I met the three scientists who were translating STACKS into Japa- 
nese. Shigeki Goto, Ken-Ichiro Murakami, and Hisao Nojima came 
walking into the conference room armed with huge stacks of paper. 
For the next two hours, we went through a long list of what they 
politely referred to as “questions.” 

Most of the “questions,” of course, were examples of typos, mis- 
calculations, and other errors on my part. Not only had they scruti- 
nized my text on a word-by-word basis, but in most cases had gone 
back to the original protocol specifications to check all data. It oc- 
curred to me that perhaps we should translate the Japanese version 
back into English for the next edition. 


0 


323 


Exploring the Internet 


Saturday, Jun Murai had asked me to come to the monthly WIDE 
meeting. With a few hours to kill before the meeting, I went to the 
Akihabara “Electric Town” to look at the latest palmtop computers. 

An intriguing discovery was the Takeru Club, a vending ma- 
chine for selling software. In the center of this 4-foot high machine 
was a touch screen to select software. On the right were receptacles 
for bills and coins. On the left were floppy drives for three different 
diskette formats, and even a slot for dispensing laser discs. 

Restraining myself from buying software, and tearing myself 
away from a 14-channel programmable controller, I caught a series 
of trains down to the Yagami campus of Keio University. I got a can 
of hot coffee from the vending machine and sat down to wait for 
Jun. 

When we arrived at Keio, we found a room full of 40 volunteers, 
students, and scientists, hard at work discussing internetworking is- 
sues. Research results were presented, the latest routing tables were 
discussed, and new plans for WIDE were formulated. This group 
gathered once a month for an all-day Saturday session and had pre- 
viously met twice a month. Monthly meetings by these volunteers 
are supplemented every year at two camps, where all 65 WIDE re- 
searchers and students collect in the middle of Mt. Fuji, wiring 
themselves into the network with Ethernets and ISDN. 

I gave my lecture, a rambling discourse on resource discovery, 
then read my mail and went back to Tokyo and wandered around 
the Ginza entertainment district. In a liquor store, I decided against 
buying a bottle of Lemon Pie and Cream and went next door to a 
random sushi joint for a dinner of uni and kazunoko. On the way 
back to the hotel, I stopped into the Atlantis Blue bar, a fairly new 
establishment proudly sporting “Since 19XX” on its sign, figuring 
they deserved my money for using wild cards on their date. 


0 


Sunday morning, suffering from newspaper withdrawal, I went in 
search of the International Herald Tribune. In Japanese, one asks for 
the paper as “the Geraldo,” but a search of a half-dozen hotels in 
my area yielded nothing. 


324 


Tokyo 


After two hours of walking, I was getting hungry, so I followed 
the railroad tracks to the next station. Under the tracks was a little 
sushi restaurant, no bigger than your average closet. A dozen stools 
were set around a circular counter. In the 2 by 3 foot space in the 
middle of the counter was the chef. A conveyer belt full of plates 
circled this island and customers simply grabbed plates as they 
came by. 

Over the belt was another level which held tea glasses, chop- 
sticks, jars of radish, and, in front of each stool, a spout for dispens- 
ing hot water, and a bucket of tea bags. If you didn’t see what you 
wanted, you shouted out and the chef would make it and hand it 
out. After a half-dozen dishes, I forked over 480 yen (U.S. $3.84), 
amazingly cheap for Tokyo. 

Fortified with octopus, I spied a bookstore, found my Geraldo, 
and went back to the hotel to await my dinner appointment that 
night at Jun Murai’s house. 

Jun lives in Seijogakuen, the Japanese Hollywood. I boarded the 
wrong train and ended up in Sagami Ohno, the equivalent of going 
across Manhattan by way of New Jersey. The trains were full of 
commuters, many wearing white surgical-style face masks worn 
when sick to prevent the spread of disease. 

After a few more wrong turns, I finally ended up at Jun’s house. 
The house, on the same plot with his parents, is unusual by Japa- 
nese standards. Apart from its large size, it features built-in Eth- 
ernet cabling, wiring for 5-channel Dolby stereo, and a truly 
impressive area of electronics gear. A little table near the entrance 
held a stack of 12 remote controls for the VCRs, televisions, CD 
players, and other evidence of many, many trips to Akihabara. 

Over a dinner of salsa and margaritas, smoked salmon wrapped 
in horseradish and California wine, and roast pork with champagne, 
we talked about—no suprise here—computers. Jun keeps his finger 
right on the pulse of the latest technology and seemed to already 
have used most devices that I had only heard about. 

Monday morning, I found a Yashinoya shop and had a bowl of 
fatty beef over rice garnished with a raw egg. Totally enamored by 
this time with Japanese food and electronics, I pulled out the Japan 
Times to look for a place to live. A three bedroom apartment—“with 


325 


Exploring the Internet 


telephone”—was available for a mere 1 million yen (U.S. $8,000) per 
month, but the six month deposit would have put a real crimp in 
my hardware acquisition plans. A nice room of 42.05 square meters 
was only 200,000 yen, but I wasn’t quite sure how I could fit my 
computers into a space that small, let alone find room for a bed. 

At 9 AM., I met Tomoo Okada from Fujitsu for a trip down to 
the new Tokyo city hall, at 60 billion yen (U.S. $500 million) reputed 
to be the most expensive building ever built. We took the train to 
Shinjuku station, which handles a mind-boggling 3 million passen- 
gers per day, and walked out the west gate to the city hall. 

The complex consists of two towers, 34 and 48 stories high, and 
a 7-story city council hall, all clustered around a 5,000-square-meter 
outdoor Citizen’s Plaza. All the buildings are made of a lattice of 
light and dark granite, which, along with the reflective glass makes 
the complex look like a huge integrated circuit. 

We started on the first floor in the main control room for the 
large tower. The room is divided into regions, one for each of the 
major subsystems. Each region has a series of video screens and 
keyboards. The elevator panel, for example, shows the status of all 
20 elevators and has emergency shutoff switches for each one below 
each screen. | 

Another set of screens shows the status of all 800 card readers in 
the complex. All employees have magnetic cards, and these are 
used to clock in in the morning, to open conference rooms, and even 
to start up computers. At the far end of the room, a technician was 
using a mouse to click on the diagram of one of the floors. He se- 
lected a room, and with his mouse adjusted the humidity setting 
from 40 to 50 percent. 

We took an elevator, equipped with extra buttons at waist level 
for handicapped access, up two floors to a public videotex room. 
Here, citizens can pull up and view or print demographic data, 
schedules of cultural events, and city council meetings, as well as a 
wide variety of other types of information. That same floor features 
a publications sales outlet, a citizen counseling area, and other pub- 
lic services. 

On the 13th floor, we entered an office area 108 meters long 
housing part of the MIS group. This floor, like all the other office 


326 


Tokyo 


floors, has an “OA Room,” which houses PCs for secretaries as well 
as the wiring closet. 

The complex features an optical backbone with 7 km of fiber 
running FDDI. Access to this backbone is through 100 bridges lo- 
cated in office complexes, machine rooms, and other locations. At- 
tached to the bridge is a star coupler which is used to distribute 
fiber out to the workstations. These local loops run Ethernet and 
add another 295 km of fiber. 

On the 9th floor, we looked down from the viewer’s gallery into 
the 2-story room housing the Disaster Prevention Center. This con- 
trol room is used in the event of natural disasters, such as earth- 
quakes, typhoons, or large fires. 

In the middle of the room are two 200-inch video screens. Video 
feeds from helicopters and other sources can be displayed on the 
screens, as well as computer simulations which show the expected 
spread of fires. On either side of the screens are other displays that 
show the current weather conditions, the reporting status of civil 
disaster teams, and other information needed to determine strategy. 

Next, we went up to the 10th floor, devoted to seven 3090-class 
mainframes from Fujitsu, Hitachi, and IBM. Another machine room 
in the other tower has another five large systems, for a total of 3,000 
square meters of machine rooms. 

Each machine room has a fault-resilient IBM System 88, featur- 
ing dual processors, dual disk drives, and dual buses. The two ma- 
chines act as hot backups for each other, providing a second level of 
protection. The System 88s are used for environmental monitoring, 
using a token ring to control and read information such as power 
status, humidity, and temperature. In case of an exception condi- 
tion, the environmental monitoring system could initiate an orderly 
shutdown, dial telephones for system programmers, and sound 
alarms. 

Each of the machine rooms features a special earthquake-resis- 
tant raised floor. In case of large shocks, the steel lattice will absorb 
and dampen vibrations, rolling the entire machine room in the op- 
posite direction from the building. 

Impressive as all these systems were, I was most intrigued by 
the analog data jack on the ISDN pay phone in the lobby. The next 


327 


Exploring the Internet 


morning, I called up Jun Murai and asked him to set me up a local 
login, then headed back to Shinjuku. 

I set up my office in the lobby, balancing my fax modem and 
laptop on the counter. Ten minutes later, 1 was reading my mail in 
Colorado, using the talk program to bother my systems manager, 
and even Kermiting my files down to my laptop to work on later. 

Periodically, people would sidle over to try and figure out what 
this crazy Gaijin was up to. Each time I spotted somebody looking 
over my shoulder, I would point excitedly at the screen and say 
“America!” This was usually enough to evoke a polite smile and a 
hasty retreat. 

At Narita airport, I set up my laptop in the lounge to work on 
the files I had downloaded. Sipping a scotch and munching dried 
squid, I noticed that people kept their distance. 


328 


Seoul 


My previous visit to Korea had been a six-hour transit stay just be- 
fore the Olympics and I had been used as training material for a 
half-dozen different security teams getting their procedures ready 
for the onslaught of tourists and athletes. My current visit was con- 
siderably less high-strung, although there was still an awfully large 
number of security personnel in evidence. It was a traffic violation 
control day and each intersection had one or two cars pulled over 
for traffic violations and the expressway had police vans every few 
hundred meters, waiting for potential perpetrators to pass. 

Wednesday morning, I took a cab out to the Korea Advanced 
Institute of Science and Technology (KAIST) to meet Kilnam Chon, a 
professor in the computer science department. KAIST is the center 
of one of Korea’s R&D networks, the System Development Network 
(SDN) which, for some reason, is also known as Hana. SDN has 
hubs at the two major KAIST locations in Seoul and at the Daeduk 
Science Park. 

Fifteen universities and research organizations connect to the 
two hubs at speeds ranging from 9.6 to 56 kbps. A 56 kbps line to 
the University of Hawaii links this TCP/IP network into the In- 
ternet. SDN supports OSI applications such as FTAM and X.400, 
but usage was declining rather than increasing. Five years ago, in 
the middle of a large OSI push, 20 percent of traffic was X.400, but 
the number faded to insignificance as users switched over to SMTP- 
based mail handlers. 

There are two other TCP/IP networks in Korea. While SDN 
supports itself by fees from members, the other two are government 
supported. The Korea Research Environment Open Network 
(KREOnet) is sponsored by the Ministry of Science and Technology 
and was originally established to provide an access path to a Cray. 
KREOnet was linked to SDN in two locations, providing a fairly 
seamless Internet. 

KREOnet also maintained a 56 kbps link to CERFnet in San Di- 
ego, but it appeared that most Internet traffic moved across the 


329 


Exploring the Internet 


PACCOM link to Hawaii. Though the Hawaii link was saturated at 
times, for some reason the CERFnet link had been relegated to a role 
as a backup. 

The third network was the Korea Research Network (KREN), 
sponsored by the Ministry of Education. The network linked eleven 
BITNET sites in Seoul to Japan via a 9,600 bps line. KREN also 
linked nine universities together with 9,600 bps TCP/IP lines and 
provided a path into the rest of the Korean Internet. 

After a morning briefing on the networks, Professor Chon in- 
vited me to choose between hamburgers and “lousy Korean food” 
in the KAIST dining room. Lousy was an overstatement, but it cer- 
tainly would not be described as spectacular. 

What made the lunch palatable was the conversation. Professor 
Chon was the chair of the JTC1 Korean Committee, the key commit- 
tee for OSI work, and was also active in the CCITT standards arena. 
He had heard that the Bruno project had been killed and grilled me 
for the reasons. 

Professor Chon had been planning on replicating Bruno for Ko- 
rea and we discussed whether Korea really needed the ITU’s per- 
mission. As an individual, one could argue that I had in fact 
needed their permission, assuming you take the copyright assertion 
at face value. 

A country, on the other hand, was in a different situation. After 
all, the ITU had come into being when countries like Korea had 
signed the ITU treaty. A key aspect of international law is that any 
right not explicitly delegated is retained by sovereign states, and 
one had to wonder if the ITU could prohibit Korea from distributing 
standard documents to its citizens. 

One could even read the ITU treaty as encouraging this behav- 
ior. The treaty required that all members take all possible steps to 
achieve the broadest dissemination of ITU recommendations. 
Though online distribution of standards was not specifically men- 
tioned, it was certainly not explicitly prohibited. 

I explained my concept of a “standards haven,” where a country 
would ensure that standards were available online to its citizens. 
Not for anonymous FIP, mind you, since that would muddy the 
issue of sovereignty. Once the standards were online in one country, 


330 


Seoul 


though, it would be a simple matter of cutting tapes for other coun- 
tries. 

“Let’s do it!” Professor Chon said. I cautioned that there might 
be political fallout, with the ITU possibly objecting to the Foreign 
Ministry, a common bureaucratic home for the official delegate to 
the ITU. In Korea, though, the ITU representative happened to be 
in the Ministry of Telecommunications. To my delight, the Ministry 
had already gone on record as actively supporting online distribu- 
tion of standards and had passed the requirement for such a fileser- 
ver down to Korea Telecom, the PTT. 

Lunch started to taste better and I finished my kim chi. Korea 
was looking more and more like it might become the world’s first 
standards haven. 

The conversation then shifted to other standards documents, 
particularly OSI. There were two types of OSI documents that inter- 
ested Professor Chon: working group documents and the final prod- 
ucts, the International Standards. 

Working group documents constituted enormous piles of study 
papers, submissions, drafts, technical corrigenda, and other docu- 
ments in such profusion that simply moving paper around to par- 
ticipants had become the key bottleneck in the standards process. 

ISO had formed a working group on working group procedures, 
but the working group was still bogged down in formulating the 
procedures under which it would operate. The best that they had 
come up with had been to use floppy disks to exchange ASCII- 
based files. 

The secretariat for JTC1 was, unfortunately, ANSI. Any attempt 
to provide a file server for distribution of working documents 
would require the cooperation of the ANSI secretariat and it was 
highly unlikely that this notorious group of luddites would want 
any part of it. ANSI had been the single most vocal critic of the 
Bruno experiment, sending their objections straight to Pekka Tar- 
janne. 

Online distribution of working documents would certainly im- 
prove the ISO process, but I wasn’t so sure that I wanted to improve 
it. It would be much more interesting to get the product from that 
process available to those mere mortals who didn’t have the time or 


331 


Exploring the Internet 


money to fly to exotic locations and stay in expensive hotels. People 
in developing countries, students, and others without extensive re- 
sources should at least be able to read the international standards. 

ISO standards, centrally produced and all in a common format, 
were a prime candidate for scanning and optical character recogni- 
tion. A single format and high-quality documents means that the 
OCR software can quickly learn and can produce a fairly accurate 
rendition of the standards. Modern OCR software can go so far as 
to save markup information such as the font size or the location, 
making semi-automatic conversion into a language such as SGML 
very feasible. 

The only hitch was that distribution rights went from ISO to the 
national standards bodies and ISO appeared to have inserted a 
minimum selling price for international standards. For draft inter- 
national standards, though, there was no minimum selling price. In 
other words, a national standards body could give away a DIS but 
not an IS. 

In most cases (but not all), the draft standard was virtually iden- 
tical to the final product. The definition of a draft standard is that 
there are only minor technical corrections to be made. It would cer- 
tainly be nice to distribute the final product (the idea of giving stu- 
dents an inferior product certainly grated), but this might be a 
loophole that would force some change. 

The goal of setting up standards havens was not to get countries 
into the standards distribution business. Instead, I was much more 
interested in getting ISO and ITU to see the light and begin the 
process of distribution themselves. After all, it would make so 
much more sense to put a series of FIP (or FTAM) servers around 
the world and release all documents over the Internet. 

Professor Chon set me up to visit Korea Telecom the next day to 
pitch my idea, and I went back to town to take care of unfinished 
business. First on the list was a new power cord. The lounge at 
Narita Airport had only 2-prong straight outlets and, desperate to 
get some work done, I had finally snapped the ground prong off the 
cord for my laptop. 


Luckily, Korea used the same outlets as the U.S., including the 
same grounded outlets. Unluckily, however, getting the concierge at 


332 


Seoul 


the hotel to send me in the right direction was a bit of a challenge. 
Arranging a visit to the North Korean border would have been a 
snap, but computer components drew a blank. | 

I made typing motions until the concierge shrugged her shoul- 
ders and wrote the name Se-Woon Sang Ga on a piece of paper. I 
handed the paper to the cabby who shot me a puzzled look, 
shrugged his shoulders, and took off. Ten minutes later, he pulled 
in front of a run-down 5 story concrete building. 

Turned out this was where people rebuild old video games. 
Room after room was filled with old motherboards, technicians 
squinting at oscilloscopes and old men playing Go. The halls were 
crowded with rebuilt machines and school children came flooding 
in to play free games, testing the machines. 

I wandered past a store that sold nothing but joy sticks, another 
that had ribbon cables, several video tube stores, and, inexplicably, a 
sculptor making plaster busts of the dearly departed. Finally, I 
found a shop with a few PCs running Tetris. I made jabbing mo- 
tions at the wall, ran my hands in a snaking motion towards a PC, 
and reached for the power switch, making flicking motions. 

One of the kids, realizing that I probably wouldn't just disap- 
pear, got up from his game and I repeated my charade. He nodded 
and reached up to the top shelf and handed me a power cord. I 
forked over my 3,000 won (U.S. $4) and went happily back to the 
hotel. 


0 


The next day, I took a cab way out to the outskirts of Seoul to the 
research laboratories of Korea Telecom. The Umyon Dong building, 
I found out sitting in Future Hall, was the most intelligent building 
in Korea. 

It certainly looked smart. Everything gleamed, the halls were 
empty, and there were lots of video screens all over. Ushered up to 
the second floor, I met Moon-Haeng Huh and Joo-Young Song, two 
senior officials of Korea Telecom. They showed me around the 
building, pointing out CATV servers, the FDDI backbone, and even 
fingerprint recognition equipment for entry to high security areas. 


333 


Exploring the Internet 


The place didn’t even have light switches or temperature controls in 
the rooms: you used the telephone to call the automated control 
server, keying in the temperature you wanted for a room. 

After some ginseng tea, we discussed the idea of a standards 
server. The labs, with an IBM 3090, Pyramid superminis, VAXen, 
Sun servers, and lots of other equipment, certainly had the re- 
sources. They also had the mandate. We agreed that this looked 
like a likely project and I left agreeing to send in a formal proposal. 
I couldn’t wait to get home to get this started, but I had a few more 
stops to make first. 


334 


Taipei 


I handed over TW $1,000 (U.S. $40) to the cab driver and checked 
into my hotel, asking for a 4:45 A.M. wakeup call. It was 9 PM. 
While waiting for my baked dried squid with chili sauce to come up 
from room service, I read about SEEDNET, half of the Taiwanese 
Internet. 

As with many countries, the Internet was split among multiple 
ministries. Education ran TANET for the universities and the com- 
mercial SEEDNET was run out of industry. The namespace was 
split between the two groups. 

What was interesting about SEEDNET (but certainly not brought 
out in the paper I read) was that SEEDNET used a block of 249 
Class C addresses. SEEDNET was connected to JVNCnet, which in 
turn was connected to the NSFNET backbone. 

Having a country take 249 separate Class C addresses was an 
interesting illustration of the problem of the IP address space. Class 
B addresses were being rationed because of exhaustion of that por- 
tion of the address space, but giving out multiple Class C addresses 
could put an additional strain on the routers, already working hard 
to keep up with close to 5,000 known network addresses. 

At the time of my visit to Taipei, SEEDNET was physically con- 
nected to JVNCnet, but the SEEDNET world was not announced 
over the NSFNET backbone to other regionals. If you attempted to 
connect to SEEDNET from JVNCnet, the routers would know how 
to route the packet. If you tried to do so from another regional, 
packets would disappear. 

The SEEDNET problem was certainly just a temporary one, but 
it showed the strains that were beginning to appear on the routing 
infrastructure of the Internet. Older networks, such as the MILNET, 
had even more problems. 

The MILNET routers could only handle routing information for 
3,750 networks. Since the NSFNET had over 5,000 networks, the 
MILNET administrators had to decide which routes to accept and 
which to ignore. The decision had been that all international net- 


335 


Exploring the Internet 


works that were not associated with peer military organizations 
were cut off inside the MILNET. The Australian AARNet, for exam- 
ple, could no longer communicate directly with hosts inside the 
MILNET. 

Cutting off people who probably wouldn’t talk to you is cer- 
tainly a rational response to the problem of saturating the Internet. 
The problem, however, was that this didn’t solve the long-term 
problem of scaling the Internet. The Internet was doubling every 7 
to 10 months and there were projections that the routing table size 
could easily grow by an order of magnitude if nothing was done. 

Address space resolution was a big issue at all the IETF meet- 
ings. One solution which was proposed was to do away with the 
distinction of address classes and instead delegate arbitrary blocks 
of addresses to the regional networks, which would in turn delegate 
blocks to their clients. 

Using blocks of addresses and delegation on the hierarchy 
meant that, with suitable changes in the routing protocols, a single 
network prefix and mask could be used to refer to what otherwise 
might have been several hundred (or even thousand) entries in a 
routing table. 

I fell asleep trying to figure out why it had to be so hard to put 
together an integrated global Internet. There was obviously a need 
for many types of networks: the day of “the” network had long 
passed. Yet, this diversity meant that the network was starting to 
fragment and splinter into subsets of connectivity. 

The next morning, dozing on the airplane to Hong Kong, I was 
awakened by the flight attendant who presented me with a large 
box with the imprint “Name Card Holder” on it. Looking around, I 
saw all the other business class passengers stuffing their gifts into 
carry-on bags. 

I opened mine to find a handsome slab of wood with a large 
blue and green ceramic duck mounted on it. Presumably, the busi- 
ness cards would be inserted in the beak. While this functional yet 
attractive desk accessory would certainly have made an impressive 
addition to my office decor, I felt that my seatmate might make bet- 
ter use of it. I handed my gift to him and he whisked it into his bag 
before I could change my mind. 


336 


Hong Kong 


Hong Kong was hell. I got in at 9 in the morning and had 12 hours 
to kill before my flight to Bombay. My first stop was out to Sha Tin 
to visit Chinese University. Eric Lo Hing Cheung started me up a 
visitor account and let me read my mail, telling me about the latest 
status of Internet access. To nobody’s surprise, the system had 
moved forward at a remarkable rate since my last visit and most of 
the Hong Kong universities were up and running. 

Eric and Dr. Michael Chang were both gracious as always, but I 
had a problem. My back went out and I could barely move. I 
travel very light when it comes to clothes and other luxuries, but all 
the books I insist on bringing with me brings the weight up to the 
level that is enough to seem light but can strain the back when you 
take a different plane every day. Sure enough, I felt like lying on 
the floor at Chinese University, but that would have been less than 
polite. 

I took a cab to the main island to find a place to lie down. The 
fare card in the taxi had a list of all the surcharges, including HK $4 
(U.S. $0.50) for each “piece of luggage, animal, or bird.” At the bot- 
tom, though was an addendum which said that “wheelchair or 
crutches, carried by a disabled person free.” I tried to think of the 
legislative history that must have gone into such a clause. 

I spent the rest of the day with my friend Harry Rolnick, the 
writer. Harry is not the kind of person who minds if you spend the 
afternoon lying on his floor and I hoped that my back would re- 
cover. 

It was deadline day for Harry, a weekly columnist for the South 
China Morning Post. It being March 6, he decided that the Michelan- 
gelo virus would be a likely topic. Harry is not your most techni- 
cally astute type—this is somebody who still uses Wordstar—but 
has a great sense of humor. 

We spent the next hour trying to dream up new viruses. The 
civil servant virus was easy enough: it simply dims the screen and 
does nothing. The Hong Kong waiter virus has possibilities: you 


337 


Exploring the Internet 


can’t find the thing, but it will pop up occasionally and snarl at you. 
And, of course, there is the expatriate manager virus, which won't 
go off until mid-morning, when it displays “what a night, what a 
night” on the screen and then goes to lunch. 

While Harry finished his column, I laid on the floor and looked 
up at the walls. The walls were certainly interesting. When he is 
not reviewing concerts or restaurants, Harry does things like travel 
to Korea to write feature pieces about kim chi or travel through the 
mountains of Pakistan to get a little exercise. His walls show the 
results. 

On one wall was a framed copy of the Pyongyang Times from 
North Korea. “Comrade Kim Jong Il Inspects Kwangbok Depart- 
ment Store” blazed the headline. On the other wall was a 1991 cal- 
endar from Kampuchea Airlines, certainly a rare item. 

To help me pass the time, Harry handed me down a copy of a 
North Korean-English phrasebook he had acquired on a recent visit. 
Verb conjugation was illustrated by the following sequence: 

“We fight against Yankees” 

“We will fight against Yankees” 

“We have fought against Yankees” 

My favorite section, though, was the one on admirations, point- 
ing out ways to say nice things about people. 

“What a wise leadership.” 

“Fancy abolishing taxation!” 

“This is a success for the people indeed.” 

This phrasebook made me want to spend some time in North 
Korea. After all, where else can you find such an interesting permu- 
tation of the language? 

I started to count the number of cities I had been in the past 5 
months. Flat on my back, nursing a Mekhong whiskey to ease the 
pain, I wondered if it was worth it. There had to be an easier way 
to earn a living. 

Then, Harry walked in and showed me some of his clips, includ- 
ing his story on kim chi, the fiery Korean pickled cabbage, made by 
burying cabbage and peppers for the winter to ferment. Perhaps 
there was an easier way to earn a living, but sitting in a cubicle 


338 


Hong Kong 


hacking UNIX kernels would never expose me to the wonders of 
kim chi. 

I dragged myself downstairs, caught a taxi, and gritted my teeth 
all the way to the airport, dragged my way through customs, and 
finally got on the plane. Even the dumpling stuffed with yam ice 
cream and served with a delicate, blue peanut sauce didn’t ease the 
pain. 


339 


Bomba 


At 2 AM., I crawled off the plane in Bombay feeling miserable. Brit- 
ish Airways whisked me through the diplomatic line and carried 
my luggage out to the curb where I grabbed a shuttle to the closest 
hotel I could find. 

Twelve hours later, after an hour under a hot shower, I finally 
felt up to a taxi down to Juhu Beach, south of Bombay, where I lay 
in my hotel room for the next two days recuperating. Lying on the 
floor, I spent my time reading marriage ads in the Times of India and 
watching Hindi films. Outside, the beach was teeming with people 
riding horses, watching the horse races, or gathering around acro- 
bats doing flips. Looking down, I could spot a row of Kalaghatta 
stands advertizing the cold, ink-black drinks known as the “poor 
man’s Coke” and thought to myself that a beer would be nice. Just 
then, the phone rang. 

“Mr. Carl, this is room service. Would you like some tea or 
something to drink?” The idea of telepathic room service appealed 
to me. I began to feel much better. 


0 


Monday morning, Dr. S. Ramani, director of the National Center for 
Software Training, sent a huge old empty Tata bus to collect me. We 
rattled our way through the swarming vehicles adorned with “Horn 
OK Please” bumper stickers, past the shack which specialized in re- 
winding old fans, to the NCST headquarters. 

My day with Ramani was a whirlwind of activity. Fascinated by 
how to use networks to help his country, Ramani rapidly jumped 
from ways to help the Indian Antarctic expedition to how to control 
infectious diseases to railway reservation systems to ways to dis- 
seminate Indian news to graduate students overseas. 

He would leap to the white board and draw a diagram, then call 
out for his secretary to get certain staff members, then he would 


340 


Bombay 


grab first one, then two telephones and start placing calls to officials 
and corporate executives for more information. 

“Ramani, here,” he said, calling the managing director of the 
Press Trust of India, a wire service with over 1,700 employees. “I 
have some ideas to discuss. Can you have dinner tonight at 9?” 


The managing director had just gotten back from a trip to Delhi 
to meet with the Prime Minister, but dinner was arranged. 


Meanwhile, we discussed ERNET, the Indian research network. 
The backbone was built around hubs in four cities—Bombay, Ma- 
dras, Bangalore, and Delhi—which were connected to each other by 
9,600 bps leased lines running TCP/IP. Other sites all over the 
country used UUCP into these hubs. 


Over 70 sites in ERNET shared a single 9,600 bps satellite link to 
UUnet for international access. Needless to say, I felt more than a 
little bit guilty using Telnet to read my mail back in Colorado. 


Low bandwidth, both domestic and international, was partly 
due to India’s economic situation and partly to some technical de- 
tours towards satellites instead of terrestrial lines. Unlike some 
other countries I had visited, the underdeveloped Internet infra- 
structure was certainly not due to the lack of qualified engineers or 
a demand among users. India has one of the largest cadres of scien- 
tists in the world and the computer scientists I met at NCST were 
highly capable and fully aware of current developments in the In- 
ternet. 


The economic situation was certainly a prime stumbling block in 
putting together a real research network (let alone a commercial 
service offering). The rupee had only just started to become con- 
vertible when I visited India and foreign exchange was at a pre- 
mium. The U.S. half-circuit for the 9,600 bps line had been funded 
by the United Nations Development Program (UNDP). 


Even within India, getting phone lines was no mean feat. Lines 
cost roughly the same as in the U.S., but average salaries in the U.S. 
are an order of magnitude higher than in India. The telephone in- 
frastructure in India was notoriously underdeveloped, with electro- 
mechanical exchanges (i.e., something has to move to complete a 
circuit) still in operation in many locations. The wait for a residen- 


341 


Exploring the Internet 


tial line could easily take several years. Businesses pay a substantial 
surcharge to cut the wait to weeks or months. 

In rural areas, lines are so unstable that running UUCP over 
them could lead to endless retries. Even when the lines are opera- 
tional, overhead of 500 percent is not uncommon. In fact, in some 
areas the lines were so bad that ERNET used a novel “floppy-based 
e-mail system.” It turned out to be significantly more cost effective 
when the line got bad enough to simply spool mail to floppies and 
hire a courier to bring the diskettes down to the nearest hub. One 
system manager in Kanpur was once observed going through this 
biweekly ritual, neatly labeling floppies and stacking them into a 
pile. 

“These guys have no other business,” he grumbled, “all they do 
is keep sending mail through the day and night.” Ramani showed 
me the network management utility which showed 30 to 70 mes- 
sages exchanged per courier run with one of the FloppyNet sites in 
Kanpur. 

Even in Bombay, local lines are not immune to problems. Dur- 
ing the summer monsoon, 80 to 100 inches of rain can fall in 80 days 
of the monsoon season, knocking out service for 7 to 10 days per 
year. For this reason, the main international gateway had been lo- 
cated 20 km south of NCST in downtown Bombay. This machine, 
Sangam, was located in the Air India building and was just a kilo- 
meter from the telephone company’s point of presence, making it 
fairly immune to disruptions during the monsoon. 

‘20 kilometers south of NCST, in downtown Bombay’. 

A poor telephone infrastructure led Ramani and others in the 
Indian academic community to look to satellites, particularly the In- 
dian manufactured INSAT series. The satellites gave high band- 
width, used Indian technology, and needed only a dish on the roof 
instead of depending on local infrastructure. 

The original ERNET project plan from 1984 envisioned linking 
the 8 large academic and research institutions together with 4.5 me- 
ter dishes. For 1.5 million dollars, this infrastructure would provide 
multiple data paths, based on, of course, OSI protocols. By 1988, the 
project had evolved to specify 64 kbps data paths for the transmis- 
sion of voice, data, and fax. 


342 


Bombay 


The voice requirement would satisfy needs for voice broadcast 
services for seminars, and would allow network management to 
have their own voice channels. The data channels would be estab- 
lished using the X.25 protocols and very coarse time slots of 1 sec- 
ond or even more would be provided. The data channels were thus 
suitable only for file transfer and electronic mail. 


Although the project plans developed on schedule, the satellite 
kept getting delayed. By 1988, though, some Indian students re- 
turning from the states started agitating for Telebit modems, capable 
of running at fairly high speeds over voice-grade lines. 


Anil Garg and some other NCST staffers began playing with 
UUCP dial-up transfers. The first links were in Bombay between 
NCST and a sister institution, the Indian Institute of Technology 
(IIT). At the time, the only phone available at the IIT computer sci- 
ence department was located in the office of the chairman. 


To transfer mail, Anil would call up the chairman of the depart- 
ment, apologize for the interruption, and ask him to place the phone 
on the modem. If the phone was needed for voice sessions, then 
e-mail would have to wait. Eventually, a set time slot on the tele- 
phone was allocated and, assuming calls got through, e-mail started 
to flow regularly. 


Over time, the terrestrial network started to grow. By 1991, with 
a little prodding from Vinton Cerf, an advisor to ERNET, the net- 
work was based on leased lines and Cisco routers. In early 1992, 
Ramani was in the midst of careful negotiations with the Depart- 
ment of Telecommunications to use a 64 kbps chunk of a new 140 
Mbps fiber line to Delhi and maybe even to get a piece of the digital 
microwave links to Bangalore and Madras. 


Meanwhile, the satellite project was finally getting off the 
ground, but its purpose had to be reevaluated. The terrestrial 
ERNET was obviously much more suitable for interactive applica- 
tions and with 64 kbps terrestrial lines coming in the foreseeable 
future, Ramani was searching for a use for the satellites. Ramani 
was hoping that the satellite WAN could supplement the terrestrial 
network, perhaps being used by applications with a broadcast focus, 
such as the distribution of news. 


343 


Exploring the Internet 


Over a lunch of aloo bhindi and carrot halwa in the NCST can- 
teen—equipped with a PC and custom software, of course—Ramani 
explained his attempts to automate the infectious disease units of 
the local hospitals. 


Bombay hospitals get several hundred admissions per day for 
diseases ranging from dysentery to measles, polio, and hepatitis. 
An estimated 20,000 deaths per year are caused in Bombay by dis- 
eases that are preventable by vaccination, boiling drinking water, or 
other simple means. 

When an admission occurs at a hospital, the admissions officer 
fills out a slip and places it in a pigeonhole for one of Bombay's 23 
wards. The slips are picked up and, within 24 hours or so, make 
their way to public health officers in the wards who take appropri- 
ate actions. In the case of measles, for example, the health officer 
might go to a child’s building and look for unvaccinated playmates. 

Ramani had been conducting briefings and otherwise pushing 
people to computerize the process. He was hoping that a small 
number of computers could easily cut out the 24 hour delay. More 
importantly, aggregate information could be quickly examined for 
trends. A cluster of hepatitis cases, when displayed on a map 
would quickly indicate contaminated drinking water in a neighbor- 
hood. The information could be used to make special efforts in 
those neighborhoods to try and convince people to boil their water, 
at least for a while. 

That afternoon, I F[Ped my mail down to a local account to 
avoid tying up the international link, then went downstairs to give a 
lecture on the politics of standards. The audience of several dozen 
people were all active in implementing standards or using them as 
part of their work. This was certainly a sympathetic audience and 
everybody laughed when I explained the theory the standards pota- 
toes advanced that anybody “serious” about implementing stand- 
ards could certainly afford to participate in the process. Somebody 
came up to me after the lecture and explained how tough it was to 
get foreign exchange allocated for buying documents, let alone tak- 
ing trips to conferences and standards meetings. 

After the lecture, I went back to my hotel and pressed (having 
finally reprogrammed myself) the elevator’s up button to go down 


344 


Bombay 


to the coffee shop. The coffee shop was playing a rousing polka 
over the intercom, but I didn’t see any kielbasas on the menu so I 
ordered some samosas and sweet lime water instead. 

That evening, Dr. Ramani picked me up and we went to a local 
restaurant to meet Gourang Kundapur, managing director of the 
Press Trust of India (PTI). Over a dinner of brains masala and tan- 
doori cauliflower, we gossiped about Indian politics, a topic even 
more complex than the politics of standards. 


0 


Tuesday morning, my driver took me from Juhu to Bombay to see 
the railway reservation system at Victoria Terminus, one of the main 
train stations and a Bombay landmark. Smack in the middle of rush 
hour, we dodged goats tied to shacks on the side of the road, push- 
carts loaded with potatoes, and cows that ambled along content in 
the knowledge that they alone were safe on the roads. 

My driver took what might charitably called a fairly aggressive 
approach to driving. He clearly felt that the green light was an indi- 
cation that he should have already cleared the intersection. Even 
stuck behind several dozen cars, he would keep his hand on the 
horn. The side mirrors were carefully folded flat against the car, 
giving at least 3 inches of extra maneuvering room. 

Arriving at the Central Reservations building, I entered a very 
large room filled with an incredibly dense mob waiting for tickets. 
Fighting my way up to the information counter, I was handed a 
form before I could even open my mouth, then was promptly swept 
along with the crowd. 

The Indian Railways system is one of the largest in the world, 
moving 10 million passengers a day in over 6,000 trains. Tickets for 
these trains come in 7 categories (e.g., express or local), 32 kinds of 
quotas (e.g., foreigner or defense official), 100 types of discounts 
(e.g, veteran or handicapped), and 7 classes of reservations (e.g., 
first class or first class air conditioning). 

The old, non-computerized system had, although I had a hard 
time picturing it, been known for incredibly long lines, which pre- 
sumably meant that the lobbies must had somehow fit in even more 


345 


Exploring the Internet 


people than I saw. To make a booking, you needed to be in the 
right line for the particular class of tickets for the particular train 
you wanted to take. 

Demand has always far outstripped supply for Indian trains, so 
it was not unusual to have 1,000 people clustered around one clerk, 
while the next counter was empty. An 8-hour wait in line only to 
find there were no seats left was not unheard of. 

Assuming you were able to fight your way up to the top of the 
line and get the clerk’s attention, the process still had no guarantees. 
Complicated rate calculations, manual ledger books, and a host of 
paperwork led to lots of errors. When you got to the train, you 
might easily discover that there were duplicate bookings or that a 
supposedly sold-out train had dozens of empty seats. 

To find out about the new and improved system, I met with 
officials from CMC, Ltd. the government-backed system integrators 
that had computerized the reservations process. CMC had set up 
five separate reservations systems for each of the five main regions 
of India, centered in Bombay, Delhi, Calcutta, Hyderabad, and Ma- 
dras. 

Four of the five systems were based on VAXen. For some rea- 
son, Hyderabad had some small CDC systems. Bombay was typical 
with two VAX 8650s and a 6310 clustered together. All the code was 
written in FORTRAN and even the database management functions 
had been locally developed. 

The Bombay system handled 7 different reservation centers. Vic- 
toria Terminus was the largest, with 80 terminals, and the nearby 
Churchgate station had 20 terminals. Muxes and modems linked 
remote terminals to the cluster. A satellite office in Ahmedabad, 500 
km away, linked 45 terminals over a series of eight 4,800 bps lines. 
All told, around 200 terminals handled 50,000 to 60,000 transactions 
on a typical day, with peaks up to 90,000 in the busy season. 

For customers, the system meant that a reservation for any train 
in any class could be made in any line. Just as importantly, far 
fewer errors were made, since fares were automatically calculated 
and it was much harder to double-book seats. 

Oddly enough, there was a downside. On the old system, it was 
possible to gauge your approximate chances of getting a ticket by 


346 


Bombay 


the size of the queue and your ability to step over people and get to 
the front. On the new system, it was much harder to estimate your 
chances, since you competed with people all over the city. Monitors 
were posted at the stations indicating how many seats were avail- 
able on the more popular runs, but the Chief Commercial Superin- 
tendent told me he was certainly receiving complaints from people 
unable to get tickets. 

The huge excess demand for tickets made scalping a profitable 
business. Ticket sales were limited to 4 to 6 per person to prevent 
scalping and each ticket had imprinted on it the name, age, and sex 
of the passenger. An ID was not required to ride the train, but con- 
ductors attempted to make sure that the holder of the ticket had at 
least some resemblance to the data on the ticket. The main result 
was that scalpers had adopted more sophisticated inventory man- 
agement techniques. 

While the seven main reservation centers in the Bombay region 
were online, smaller stations still used electromechanical teleprinters 
to communicate with Bombay. The messages would be received on 
slips of paper, a clerk would key in the data to the computer and 
send a message back to the station which would issue the ticket. 
Recently, data from a few teleprinter sites had been fed straight into 
the VAX. Hooking teleprinters to the VAX allowed properly format- 
ted messages to be automatically answered. Not quite an interac- 
tive terminal, but much quicker than the old system. 

This same message switch was being used to connect the inde- 
pendent systems for each region. When I visited, each center had a 
few terminals for each of the other regions, allowing a Bombay pas- 
senger to book passage on a train originating in Calcutta. Hooking 
those lines into a local VAX instead of a terminal would provide a 
way for one system to be a virtual teleprinter to a remote region. 

After my briefing, my hosts insisted on showing me their ma- 
chine room, which we entered via the washroom. Afterwards, I 
rode back out to Juhu, passing a line three blocks long waiting to 
enter the temple of Ganesh, the god with the elephant head. 


0 


347 


Exploring the Internet 


Wednesday, Ramani sent one of the NCST jeeps to pick me up. The 
jeep was prominently adorned with “Govt. of India” on the front 
and back. NCST is not technically a part of the government, but 
Ramani explained that the labels made parking significantly easier. 

I spent the day at the edge of the Ramani cyclone, periodically 
leaving to check on my FIP jobs, which were downloading source 
code for utilities that I thought might be useful to NCST. By the 
end of the day, netfind, perl, traceroute, and WAIS had all made it 
over the link. 

The only thing I really wanted to bring down was the code for 
Cleveland Free-Net. A Free-Net is typically linked to Cleveland 
over the Internet and has a local bank of modems for public access. 
Ramani and I couldn’t see how NCST could meet this requirement, 
but wanted to see if there was some way that the Free-Net concept 
could be applied in India. 

Unfortunately, Free-Net wouldn’t let us do that. Public access or 
nothing. People in India rarely had PCs and modems at home, and 
adding substantial traffic to an already saturated 9,600 bps link just 
didn’t make any sense. 

WAIS had no such arbitrary administrative restrictions, however. 
While ideally a WAIS client accessed servers all over the world, it 
was certainly technically feasible to run an isolated WAIS world on 
an Ethernet, providing a local information environment. Running 
WAIS with the NCST LAN was useful as a way for building up 
local expertise and seemed to fit right in with another current pro- 
ject. 

NCST was taking the wire service from the Press Trust of India 
and feeding it into a VAX. There, the news feed was automatically 
broken up into individual items and fed into a local USENET news 
group. Every Friday, one day’s worth of news was posted globally, 
providing information on Indian politics, sports, and culture to 
graduate students and professionals overseas. 

Once the news hit the VAX, applications like WAIS might be an 
interesting method for searching and reading the news. NCST pro- 
grammers were also developing their own sophisticated applica- 
tions for sifting through information, such as a stock and news 
monitor that was built on SCO’s Open Desktop. 


348 


Bombay 


All these fancy user interfaces made me curious how the news 
got produced. The next day, I went back into Bombay to visit the 
headquarters of the PTI. We drove past a police officer on a chauf- 
feur-driven scooter and ended up at Flora Fountain in the center of 
India’s banking district. 

The Uco Bank building, where PTI was located, was a few 
blocks away from where my driver left me off. He waved his arms 
vaguely in the proper direction, and I headed off down the street. 
Every block or so, I would stop a policeman or a rickshaw-wallah 
and say “Uco Bank Building” a few times. 


I happened to be clutching a few random notes in my hand and 
every time I stopped to ask for directions, the person would grab 
the paper out of my hand and scrutinize it for several minutes. The 
notes had nothing to do with Uco Bank, but after a while the person 
would look up and wave me on down the street. 


This method apparently worked because I soon saw a sign for 
the Uco Bank Building. I found it interesting that no matter which 
paper I had in my hand, it would be grabbed and examined. With a 
chuckle I thought of Cliff Lynch, one of the more active members of 
the library automation community. Cliff is famous for always 
clutching a stack several inches thick of business cards and scraps of 
paper. It would have taken him all day to get directions. 


I went up the rickety stairs to the PTI offices and met Gourang 
Kundapur. Over cups of sweet coffee, he told me the history of PTI. 
Formed as a cooperative for small and medium newspapers in the 
early part of the century, the service was taken over by Reuters be- 
fore the war. When the British left in August 1947, Reuters also 
pulled out and PTI was formed as a non-profit cooperative. 


The news is gathered by over 400 journalists spread in 135 of- 
fices throughout the country. Before automation began, stories were 
typed on a teleprinter and punched to paper tape. The paper tape 
was fed in and the data went over a 50-baud line to one of four 
main centers. 


In 1980, when Ramani began acting as a consultant to PIT, the 
entire network of 100,000 km of 50 baud lines was based on manual 
switching. The data came into a regional center and a tape was 


349 


Exploring the Internet 


punched. A subeditor edited the story, and a new tape was be pro- 
duced. 

The tape then went to the transmission room, where an operator 
flipped switches to indicate which lines should be active, and the 
story was sent out. If the story had wide enough distribution, re- 
gional centers got the data, punched a tape, and sent it out to their 
local clients. 

The obvious places to computerize were the four regional of- 
fices. PDP 11 systems were installed with custom code to terminate 
the teleprinter lines, acting as a switch and also providing an online 
editing environment for editors. 

Connecting teleprinter lines turned out to be no mean feat. Each 
line transmitted at a slightly different speed. Custom boxes were 
developed that adjusted the speed to an exact 50 baud, manually at 
first and later automatically. The code from the PDP system was 
later ported to Xenix, with the Xenix system acting as an editing 
environment and a backup to the message switching function of the 
Pe. 

While the regional offices were fairly well automated, Mr. Kun- 
dapur explained that it was not quite as easy to get rid of the tele- 
printers or even the 50 baud lines. The 50 baud lines were available 
to the press at 1/6 of the cost of normal lines, and, while it was 
possible to drive the lines at higher speeds locally, this would not 
work in remote areas. 

People were another consideration. Electromechanical printers 
were noisy and dirty, but they had been used so long that people 
knew how they worked. Old-time journalists were not quick to 
adapt to electronic teleprinters (i.e., a dot matrix printer and a key- 
board), although the mechanics tended to love the new systems as 
they required air conditioning. 

For larger sites, teleprinters had been replaced with PCs or Atex 
systems. A custom device was built by a PTI subsidiary which ad- 
justed the incoming voltage, changed the speed to 300 bps, and con- 
verted 5-bit BAUDOT code to ASCII, allowing most computers to 
easily accept a teleprinter feed. 

PTI didn’t have the most hi-tech system in the world, but it il- 
lustrated how to work in a technically challenging environment and 


350 


Bombay 


still get work done. The system was continuing to move forward, 
with the central code being ported to an 80486 running UNIX and 
TCP/IP to link regional centers being investigated. 

I got back to NCST in time for a quick lunch of baingan ka 
bhartha, a delicious eggplant dish similar to the Middle Eastern 
baba ganouj, accompanied by flat chapati bread. That afternoon 
and the next day I spent giving lectures on topics as diverse as 
WAIS and high speed networking and meeting with NCST students 
and staff. Saturday, Ramani and I got together to talk about stand- 
ards. 


Ramani was chair of a key committee in the Bureau of Indian 
Standards (BIS). One of the challenges in India was training large 
numbers of engineers, both for developing local systems and to 
stimulate the growing software export industry. 


Training engineers meant giving them the information they 
needed and that meant giving them access to standards. BIS had 
been grappling for several years on how to distribute information, 
and online standards was high on their list. Ramani’s committee 
had already decided that dissemination of information was a key 
priority. 

Would Ramani be interested in posting standards for the Indian 
community? “In a minute,” Ramani said without any hesitation at 


all. 


This was the second place that felt that training people was 
much more important than playing international politics, and it was 
obvious that many other countries would post standards if the data 
were available. 


It was obvious to me that I should get off the road and get busy 
preparing data, a task I couldn’t do very well from an airplane. Be- 
fore I could go home, though, I had one more stop to make. 


I reported to Bombay’s international airport for my 3:30 A.M. 
flight to London, Chicago, and Madison, Wisconsin. After seven 
stamps on my boarding pass, three in my passport, a special line 
and three stamps to clear my computer, a half-dozen luggage 
checks, and several lines with no apparent purpose, I was on my 
Way. 


351 


Madison 


While killing time in the lounge at Heathrow waiting for my plane 
to Chicago, a group of three couples sat down next to me and 
started playing dominoes. Obviously on a tour of some sort, they 
played their game and babbled on about some market they had vis- 
ited in Cairo. 

A few minutes later, a young lady bearing a name badge with 
the title “Travel Coordinator” came running up, all out of breath. 

“T almost didn’t make it,” she told them, “I was on the wait list.” 

“Oh dear!” one of her charges commiserated. “Was your lug- 
gage too heavy?” 


0 


Monday morning, I felt great despite my 12-hour jet lag and 26-hour 
trip. This was my last stop, my 56th city since INTEROP 91 Fall, 
less than 6 months ago, and I was SSA looking forward to ter- 
minating this little journey. 

I had come to Madison to learn how the Internet had gone from 
a DoD-centered ARPANET to a collection of autonomous systems in 
the early 1980s. ‘To learn this ancient lore, I had come to meet Larry 
Landweber, one of the key figures in the early development of the 
Internet. 

In India, some of us had been sitting around over a beer specu- 
lating on the topic of Larry’s age. He was a fairly prominent theore- 
tician before his entry into networking, and the consensus was that 
Lah-Ree (as his name is pronounced in much of the world) must 
easily be in his 60s and close to retirement. 

When I mentioned this little anecdote to Larry, he quickly estab- 
lished that he was well under 50 and had no immediate plans to 
retire. It’s always good to start an interview by putting your subject 
in a pleasant, relaxed state of mind. 

We walked down to the computer room in the Computer Sci- 
ence department for a quick tour. Computer Science at Wisconsin is 


352 


Madison 


large, with over 35 faculty, and extremely well equipped. The ma- 
chine room is huge and includes such sports computers as a Think- 
ing Machines CM5 and a now ancient 32-node HyperCube, each 
node equipped with a 300 Mbyte disk drive. 

As we walked past old VAX 11/750s, kept in place so the uni- 
versity auditors didn’t reclaim machine room space, we stumbled 
across two brand new Silicon Graphics computers. Larry called 
over the computer room manager, who was busy trying to get some 
equipment packed and shipped back to the manufacturer. 


“Whose SGI machines are those?” Larry asked. 
“Those are yours, Larry,” the manager said with a patient smile. 


At the corporate offices of Me, Inc., the arrival of a new RS-232 
cable is enough to stop work for a celebration, so I couldn’t imagine 
having so much equipment you forget about two Silicon Graphics 
machines. 


Outside the machine room, Larry logged onto a little terminal 
next to a coke machine and typed in his request for a Diet Coke, 
which soon came slamming out of the slot. I commented on how 
clever it was to rig up the machine to a host. 


Turned out the reason for this automated soda server was fairly 
practical. The campus administration had passed some sort of rule 
that would have removed the machine from its convenient location 
outside the machine room. By hooking it up to the network, a mere 
soda server became a full-fledged example of computer science re- 
search. The machine stayed. 


Back upstairs, we sat down for a history lesson. Larry’s first 
exposure to networking came in the summer of 1977 when he was 
sitting in a bar with a few other theoreticians lamenting the lack of 
communications among themselves. They dreamed up the idea of 
TheoryNet for exchanging e-mail and, luckily, an NSF official was 
sitting with them. 


“Give me a proposal,” he said. 


Next thing he knew, Larry had a grant for U.S. $136,000, which 
for a theoretician was a lot of money, far surpassing any previous 
grant he had received. Soon, theoreticians all over the country were 
happily banging away on their Texas Instruments paper terminals, 


353 


Exploring the Internet 


exchanging missives on NP completeness and computational com- 
plexity. 

In 1977, Larry became chair of the department and started look- 
ing around for ways to improve computing facilities. He began 
casting covetous glances at the ARPANET, but Wisconsin didn’t 
have nearly enough defense contracts to justify its inclusion in the 
elite dozen or so nodes. 


Wisconsin certainly wasn’t the only school not on the ARPANET, 
and Larry started looking around for ways to get the have-nots on 
the network. He was primarily interested in Computer Science de- 
partments, a logical focus given the level of penetration of networks 
at the time. 

Kent Curtis was director of the Computer Science section of NSF 
and was quickly sold on the idea of a CSNET. A small group of 
computer scientists was convened in May 1979 to discuss the idea. 
First on the agenda was to see if maybe they could just get into the 
ARPANET. While the ARPANET had plans to grow, it wasn’t clear 
that it would grow so fast that it would include them. Just in case, 
Kent Curtis encouraged the group to submit a proposal. 

In November 1979 the proposal for CSNET was submitted and 
went out for review. The results were disastrous. Reviewers 
thought TCP/IP was far too complex for end-users, networking 
should be left to the ARPANET professionals, and who did these 
amateurs think they were anyway? 

Not exactly a vote of confidence. Kent Curtis looked at the re- 
views, thought about it, and sent Larry back with U.S. $49,000 to 
make a study. By June 1981, a second proposal for CSNET was sub- 
mitted and the reviews were again negative. 

Kent Curtis looked at the reviews, and called an advisory panel 
together. They didn’t like the idea, either. Curtis kept on support- 
ing the idea though. What made CSNET possible was the skillful 
lobbying by Kent Curtis inside the government and the cooperation 
of DARPA. Vinton Cerf had attended a CSNET planning meeting 
and indicated that DARPA looked on the project favorably and 
would be willing to work with CSNET on ways to interconnect. 
January 1980, after some fairly intense lobbying, NSF awarded U.S. 
$5 million for five years to the CSNET project. 


354 


Madison 


Armed with money and the blessings of NSF and DARPA, a 
group of five people was put together to manage the project. A 
classic exercise in distributed management, CSNET was run by 
Larry Landweber, Peter Denning, Dave Farber, and Tony Hearn, 
along with Bill Kern, the NSF project manager. The project began 
the task of putting together a comparatively low-cost solution that 
would allow a sharp increase in the size of the Internet. 

One of the immediate effects of the NSF award was to get Madi- 
son and the other key development sites onto the ARPANET. These 
sites—Madison, Purdue, RAND, and Delaware—formed the core of 
CSNET. For the rest of the CSNET world, there were three levels of 
connectivity: exchanging mail, using a service host, and full TCP/IP 
connectivity. 

For exchanging mail, CSNET used a technique known as Phone- 
Net. PhoneNet used the MMDF software developed by Dave 
Crocker and Dave Farber to transfer messages over telephone lines, 
much in the same way UUCP did. 

There was a big difference from UUCP, however. Mail which 
arrived at the PhoneNet relays at RAND and the University of Dela- 
ware could continue on into the ARPANET. DARPA had agreed 
that the CSNET sites, a group of hosts outside of their direct admin- 
istrative control, could exchange mail with ARPANET sites. This 
was thus the first example of two autonomous systems connected 
together with gateways. Although the initial exchanges were e-mail 
only, this was soon expanded to IP connectivity. 

The agreement between ARPANET and CSNET to allow connec- 
tion was a carefully worded agreement, prohibiting sites in the 
CSNET from forwarding data originating from the ARPANET to 
“non-authorized users.” Most importantly, though, the agreement 
delegated authority to the CSNET to administer its own network, 
omly requiring that the members of CSNET abide by the rules of 
acceptable use of the network. 

The issue of charging was also carefully dealt with, specifying 
that there would be no charges between the autonomous systems: 
you accept my traffic and I'll accept yours. Lack of settlement pro- 
cedures has remained a tradition in the Internet even today. The 
Commercial Internet Exchange, for example, uses a system of flat 


355 


Exploring the Internet 


fees based on the size of pipes, not on the amount or attributes of 
the data flowing through those pipes. 

PhoneNet allowed message exchange within CSNET and to the 
ARPANET, but didn’t give people access to services like Telnet and 
FTP. To provide this higher level of connectivity, CSNET provided a 
service host at Madison. 

Users were given individual accounts and used X.25 or dialin to 
log onto the service host. From there, they had full access to the 
ARPANET. The service host also held a collection of useful docu- 
ments and some nameserver software to help users find electronic 
mail addresses. 

PhoneNet and the service host caught on like wildfire. By De- 
cember 1981, the RAND and Delaware relays were up and running 
and Purdue, Princeton, and the NSF were PhoneNet clients. By the 
summer of 1982, 24 sites were on PhoneNet and two years later 
there were 84 sites. The population of PhoneNet peaked in 1988 at 
170 sites. 

Getting sites fully integrated into the ARPANET with IP access 
was a bit tougher. At the time, X.25 was viewed as the way to set 
up widely dispersed hosts and the common carriers were telling 
people that in the future, X.25 networks would become cheap and 
leased lines expensive. 

There were two well-known public data networks at the time, 
Tymnet and Telenet. Tymnet didn’t return phone calls from CSNET, 
so Telenet became the candidate network for interconnecting CSNET 
hosts at the IP level. (Note the difference between the Telenet X.25 
network and the Telnet virtual terminal service.) 

All the X.25 networks at the time were optimized for the holy X 
trinity, X.3, X.28, and X.29. These standards defined how an asyn- 
chronous terminal could connect to a Packet Assembler/Disassem- 
bler, which in turn set up virtual circuits to hosts on the X.25 
network. 

Optimizing for terminals made it tough on hosts. Telenet used 
128-byte packets and a virtual circuit could only have two packets 
outstanding. This certainly slowed down potential throughput, but 
to make matters worse, the data link level of LAP-B enforced a limit 
of 7 outstanding packets for all virtual circuits sharing a link. 


356 


Madison 


What this meant was that a host with a 9,600 bps link to Telenet 
could only get 1 to 2 kilobits of throughput on one virtual circuit. 
This was a best-case scenario, and during peak periods congestion 
reduced the throughput even further. 

Douglas Comer of Purdue took on the daunting task of trying to 
integrate X.25 and TCP/IP. Comer and his group developed a solu- 
tion using multiple X.25 circuits, one of the first examples of path 
splitting. Comer’s group also developed the software that set up 
and tore down virtual circuits in a manner that was transparent to 
IP. 

Comer’s group mapped datagrams over virtual circuits. The ap- 
proach of layering connectionless traffic over connection-oriented 
circuits was considered controversial at the time. Another group at 
University College London took a different approach, using protocol 
translation to turn TCP circuits into X.25 circuits. Comer’s group 
went off and hacked, and came back with a working IP over X.25 
demonstration between Madison and Purdue. 

Even with this clever software, X.25-based networking never re- 
ally caught on in the U.S. Not only was performance poor, but the 
cost for running TCP/IP over X.25 could be astronomical. Remem- 
ber, these networks charged by the packet and a single character 
typed for a Telnet session could consume 4 packets (send character, 
acknowledge, echo character, acknowledge). 

Even though the cost was high, a few sites wanted IP access 
badly enough that they were willing to pay. After Purdue built and 
tested the software, Rice was the first X.25 customer in the fall of 
1984, and was soon joined by DEC’s Western Research Laboratory, 
and BBN. Later, as it became clear that leased lines were more eco- 
nomical, the Purdue group developed a low-cost leased line net- 
work called Cypress, which was offered as an alternative access 
path in CSNET. 

BBN also became the site for the new Coordination and Infor- 
mation Center (CIC) and became the support center for CSNET. 
The service host and MMDF relays were moved, and the CIC main- 
tained the document database and helped new users get started. 

Although NSF funded CSNET, they also made sure that a clause 
was inserted in the project plan that the network should be self suf- 


357 


Exploring the Internet 


ficient at the end of five years. At the end of five years, it was in 
fact self sufficient, charging universities U.S. $2,000 to $5,000 per 
year and industrial sites such as DEC and IBM $30,000 to partici- 
pate. Self-sufficiency of CSNET was used by the NSF as an impor- 
tant justification for funding future projects such as the NSFNET. 

In addition to self-sufficiency, CSNET helped establish a tradi- 
tion in the U.S. of projects of limited scope. Instead of expanding 
CSNET to be a backbone, to serve other communities, and to 
achieve world peace, CSNET remained focused on one problem. 
Over time, other solutions such as regional networks became more 
attractive and by 1988 the number of CSNET hosts was beginning to 
decline. By 1989, CSNET had merged with BlITnet and by 1991, 
PhoneNet was dead. 

CSNET was not just limited to the U.S. It formed an important 
way, along with BITNET, to spread the Internet overseas. The inter- 
national spread of the Internet was directly linked to an annual se- 
ries of meetings that came to be known as the Landweber Seminars. 
I was interested to learn that Larry was not even present at the first 
Landweber Seminar. 

In September 1982, Peter Kirstein of University College London 
convened a “meeting on U.S.-European Academic Network Collabo- 
ration.” The meeting was small, but included representatives from a 
half-dozen countries. 

At this meeting, Germany described their DFN project, the Scan- 
dinavians described active projects in Norway and Sweden, and the 
U.K. described the Coloured Book. There was a CSNET presenta- 
tion, and CERN described the early stages of what would become 
HEPnet. 

In other words, this was a collection of people who were actu- 
ally doing something about getting together to exchange informa- 
tion. One of the most useful functions of such a meeting was what 
occurred in the halls and at dinner where synergy between different 
groups quickly led to new projects. 

In 1983, Kirstein and Landweber jointly organized another semi- 
nar in Oslo at which Larry announced that CSNET was going to go 
international. Needless to say, the question of where it would go 
international first occupied much of the discussions at the breaks. 


358 


Madison 


In February 1984, Israel became the first international member of 
CSNET. A carefully worded agreement was signed stating that data 
originating from the ARPANET would not be forwarded. Interna- 
tional access, after all, had the potential to become a political issue. 

The Israel PhoneNet connection was rapidly followed by Korea, 
with Professor Kilnam Chon aggressively pursuing connectivity. By 
September 1986, PhoneNet access had spread to Australia, Canada, 
France, Germany, and Japan. Israel, Korea, and the Japanese NTT 
soon got IP access. 

The Landweber Seminars became firmly established as a place 
for people to meet and things like CSNET connectivity, gateways, 
and other projects to get started. In 1984, the Seminar convened in 
Paris, followed in subsequent years by Stockholm, Dublin, Prince- 
ton, Jerusalem, and Sydney. 

Princeton, in 1987, was the breakthrough meeting. The invita- 
tion-only seminar had reached 100 people and the attendance list 
was certainly impressive, including most of the people active in 
spreading the Internet. 

By Sydney, the meeting had grown so big that the seminar for- 
mat began to outlive its usefulness. It was decided that year that 
the seminar should metamorphosize into a conference, and the next 
year INET 91 was held in Copenhagen. At INET 92, in Kobe, Japan, 
the conference turned into the annual meeting of the Internet Soci- 


ety. 
0 


After a nap to shake off jet lag, I drove across town for dinner with 
Larry and his wife, Jean. Also there was Tony Hearn, one of the 
CSNET founders, who was driving through on a college inspection 
tour with his son and had stopped for the night in Madison. 

We had a nice dinner of vegetarian lasagna and steaming home- 
made rye bread, finished by strawberries with a soy powder cus- 
tard. When the second bottle of wine was cracked, a 1969 Pinot 
Noir, Tony Hern sniffed his glass appreciatively and smiled mischie- 
vously. 


359 


Exploring the Internet 


“Gee, this would taste great with meat,” he teased. “Honey,” 
Larry said, turning to his wife, “do we have any cow left?” 

“1 think we have a slab in the freezer.” 

I began to fade from jet lag and went back to my hotel, anxious 
not to miss my early flight the next morning back to Boulder. 


360 


Boulder 


It was Tuesday afternoon, and I was home. I wandered over to the 
Ideal Market, the kind of place that has a “customer-of-the-month,” 
to get myself a bagel with lox and cream cheese. 

“Have a nice day,” the bag person said to me as I walked in the 
front door. 

“Have a nice day,” the deli person said, handing me my bagel. 

“Have a nice day,” said Dennis, the chi-chi butcher, as he va- 
cated his table to go back to selling ground buffalo and turkey brat- 
wurst. 

That did it. Enough was enough. I went over to the pay phone 
and called my realtor. Minutes later the formalities were complete 
and my house was on the market. 

Before I could leave Boulder, however, I had to finish this book. 
Mind you, this was not out of some sense of duty or an overwhelm- 
ing desire to clean up loose ends. Half of my advance was payable 
when I turned in a manuscript suitable for publication, and I 
needed the money to move. 

I did what many Boulder residents do during those rare mo- 
ments when they have to concentrate, and went to the Trident Cafe. 
Sitting down, I looked around. 

At the next table, a man with unfocused eyes was flipping 
through a book of star charts, trying to find astrologically similar 
periods in the past to shed light on the future. In a booth nearby, a 
guy was dealing out Tarot cards, stopping periodically to stare at his 
destiny and grumble to himself. The table next to him was spread 
out with materials for advanced Shambhala training, and next to 
that three people were engaged in some strange form of group mas- 
sage. 

With so many people looking for inner truth and sharing their 
feelings, I decided to try and list the good qualities of OSI. After 
thirty minutes of protocol meditation, however, I looked down at 
my piece of paper. It contained only one item. 

“We have to live with it,” my list read. 


361 


Exploring the Internet 


The goals of the OSI effort are certainly laudable. The concept 
of open systems is about as hard to argue against as any other lofty 
ideal. But, saying that being against OSI is to be against open sys- 
tems assumes there is only one road to truth, beauty, and interoper- 
ability. 

Quite simply, OSI has not achieved anything close to its goals. 
Too much complexity, lack of hands-on experience, and far too 
many fine lunches and dinners had hindered the creation of a lean, 
mean, finite-state architectural machine. 

Just because OSI is not ideal, however, doesn’t mean that it can 
be ignored. OSI has been adopted by many governments as a low- 
est common denominator of connectivity, taking its place as the logi- 
cal successor to IBM’s RJE and Bisynch protocols. 

OSI has become one of those challenges that keep system inte- 
grators and consultants employed. OSI is just one of those ugly 
things you have to deal with when putting together a system, no 
different than COBOL-driven ISAM files, sendmail configurations, 
or VIAM routing tables. In fact, OSI has become one of those 
things that made ideal fodder for students taking MIS classes in 
business schools: 


“Final Exam, Essay Question: Finance has OSI, 
Accounting has SNA, and Personnel uses 
Novell. FIAM over LAN Manager has been 
proposed for an enterprise-wide file system. 
Discuss. Extra Credit: Write a justification for 
the proposition that NetWare is actually compli- 
ant with OSI.” 


While OSI has not achieved the goals the committees have set 
for it, neither was the effort totally wasted. Certainly the careers of 
hundreds and hundreds of standards potatoes could have been bet- 
ter spent, but there are a few pieces that can be salvaged. 

The only way to salvage the work, however, is to get the process 
out of the hands of those who would build machines in the abstract 
and back to those who are engaged in the hard, dirty work of build- 
ing networks. To salvage anything about OSI, the standards have to 
be known or the work will simply be ignored. 


362 


Boulder 


Just because the approach to building networks by committee 
didn’t work doesn’t mean that lone wolves can do any better. 
Rather, a special type of person is needed, one who understands 
people well enough to mobilize resources and understands the tech- 
nology well enough to know which resources to mobilize. 

In my journey, I met many people who effectively built national 
networks. Geoff Huston in Australia, Juha Heinanen, in Finland, 
Jun Murai in Japan, Glenn Kowack from EUnet, and Rick Adams 
from UUnet are only a few examples of people who successfully 
built large networks, providing the leadership necessary to turn 
technology into infrastructure. 

While there are many people who succeeded, there are many, 
many more who spent their time building castles out of air. Efforts 
like the COSINE project in Europe, for example, kept many people 
busy making presentations instead of stringing cable. 

The ratio of goers to doers in the world of research is just as 
lopsided. For every Marshall T. Rose, Steve Hardcastle-Kille, or 
Christian Huitema, there are a hundred people arguing about what 
to call the TCP/IP protocol suite instead of writing code. 

The trick appears to be to provide an environment which allows 
people to do useful work, and then letting them get on with it. Part 
of that means providing appropriate resources, but resources alone 
don’t guarantee anything. There are too many multimillion dollar 
mega-projects that went nowhere to think that throwing money at a 
problem has any relationship to the final outcome. 

In fact, the contrary appears to be the case. There are many pro- 
jects that started on a shoestring, with a few researchers borrowing 
a modem and appropriating a phone line. The common denomina- 
tor in most of these projects was a desire to get work done and a 
fascination with the technology. 

An ad hoc approach to building networks convinced the stand- 
ards potatoes that the Internet was some kind of academic toy, un- 
suitable for doing real things. They were wrong and the toy turned 
out to be the piles of OSI paper. 

The Internet is a machine, built by thousands and thousands of 
engineers to solve real problems. So how can this machine be 
turned into a truly global infrastructure? How can the spirit of in- 


363 


Exploring the Internet 


ventiveness that had built the machine in the first place be pre- 
served? 

One can think of infrastructure in layers, and it seems that most 
of the failed efforts can be traced to a tendency to concentrate on 
one layer to the exclusion of others. As they would say in Boulder 
(if they thought about it), infrastructure is holistic. 

At one layer, you have the real things, the technology that makes 
networks. Protocols, hardware, and all the technical details that are 
studied in engineering schools are all part of the real layer. 

Technology alone doesn’t make a network, though. The next 
layer is the people layer where technology is applied, deployed, and 
networks start being used. The leadership of the NSF, DARPA, and 
the IAB are all functions at the people layer. 

Don’t think that you can do one layer without the other. NSF 
provided money and leadership, but the NSFNET also required the 
solution of many technical problems before it became a reality. 
Likewise, there are many great technologies that remain research 
prototypes because nobody takes the time to move them into the 
field. 

One can think of the people layer as the process of governance, 
but that does not imply government. EUnet and the USENET, for 
example, are strong evidence that resources can be organized and 
deployed without the involvement of official bureaucracies. 

Eventually, we reach the paper layer, where things are docu- 
mented. One hopes, of course, that the paper is actually some form 
of data online. Documentation is the key to allowing the activities 
in one part to spread to other communities. 

Too often, technology remains a black box. By writing down 
What is happening, others can learn what goes on inside of that 
black box and improve it. This is the crucial mistake that OSI made 
when they invented paper, but forgot to show it to anybody. 

Paper can mean standards, but it can also mean procedures and 
policies. Paper has a big impact on how the network is used and 
who can use it. Standards and the other forms of paper, virtual or 
real, are the laws and regulations of networks. 

These laws have a real effect. Is your routing protocol complex? 
You've raised the cost of entry. Do you have an acceptable use pol- 


364 


Boulder 


icy? You've limited your population. Have you invented an anony- 
mous FIP mechanism and an RFC series? You’ve encouraged the 
spread of the network. 

Paper thus reflects something even deeper, the fundamental hu- 
man values that say what we can do and how. The technology, 
standards, and networks are all reflections of those values. 

Infrastructure, at all levels, reflects how we apply these funda- 
mental human values. Privacy, for example, can be protected or de- 
stroyed by a network. There is no inevitable loss of privacy on 
computer networks, but that is certainly one possible outcome. 
Likewise, free speech can be encouraged, property can be protected, 
and we can mold the technology to reflect what we want. 

It is the coupling of an awareness of these fundamental values 
with an understanding of the technology that allows us to build a 
truly global infrastructure. Technically unsophisticated policy mak- 
ers make bad laws, just as politically unsophisticated engineers 
make bad networks. 


0 


Educating policy makers and engineers is certainly a nice, long-term 
goal, but it doesn’t provide any concrete steps to be taken today. 
Putting standards online, though, is a concrete step. The task is 
technically simple and the benefits were clear. 

The Bruno project demonstrated how trivial it is to make infor- 
mation available on computer networks. That this information 
should, indeed must, be available to all is, to borrow the words of 
Geoff Huston in Australia, “bloody obvious.” 

Yet, in pursuing this goal, I ran into a solid wall of resistance. 
To the people running the process, posting standards leads to the 
demise of international standards and takes money away from de- 
veloping countries. 

In visiting twenty countries, though, it was obvious to me that 
the developing countries are the ones most hurt by the policies of 
the international standards bodies. They are the ones that need 
most to train engineers, to develop products for export, and to ap- 
ply cheap, easily-available technology to pressing problems. 


365 


Exploring the Internet 


Even the developed countries are not helped by policies that re- 
stricted participation to a bureaucratic elite. The real networks that 
I visited were built from the ground up. The most effective net- 
works were built by people with problems to solve. If we want 
those networks to be interoperable, certainly a goal of the standards 
process, people building the networks have to be able to get the 
standards. 

The concept of the standards haven is one way around the bu- 
reaucracies, but it is not a very productive way to solve the prob- 
lem. While a few countries probably will post standards for their 
engineers, nobody had confirmed their intention to do so officially. 
Indeed, while Korea and India liked the standards haven concept, 
the idea was caught in the mire of their own bureaucracies. Ulti- 
mately, the standards haven concept is a temporary stopgap and a 
more permanent solution must come directly from the standards 
cartel. This is a problem crying for global leadership. 

Availability of information is one of those fundamental human 
values that needs to be established as a conscious decision, a funda- 
mental part of the infrastructure. Bruno was a stopgap, and even if 
a few people working on their own could come up with a new stop- 
gap, what we need is a real solution. 


0 


Returning from the coffee shop, it was time to tackle a three-foot-tall 
pile of mail that had come while I was gone. Having the SnailMAIL 
to process in a batch let me have a little fun. 

As I sorted my mail, I pulled out all the postage-paid cards and 
put them into a stack, throwing everything else into the recycle bin. 
I then performed triage on the stack, dividing them up into things I 
wanted information on (a total of two cards), things I didn’t care 
about, and companies and interest groups I didn’t like. 

The cards for the bad organizations were left blank and depos- 
ited in the nearest post box. Voting with postage-paid cards was a 
form of economic democracy I learned from my politically-active 
mother. Over time, individual action can snowball and even the 
bulkiest bureaucracies will give way. 


366 


A 
Abe, George, 318-19 
Academic Computing Services, 134 
Academy One project, 289-90 
Acampora, Anthony, 141 
Acnet (Accelerator Control network), 
295-96 
Acorn project, 141-43 
applications, 142-43 
architecture, 142 
basis of, 142 
ACSnet, 193 
Adams, Rick, 363 
Address space resolution, 336 
Adelaide, Australia, 198-201 
Advanced Network and Services 
(ANS), 103, 145, 282 
AFGnet, 258 
Aiso, Dean, 45 
Akihabara, 49-50, 55, 324-25 
“Electric Town,” 324 
AlterNet, 195 
Amsterdam, 90-94, 233-44 
Bulgarian dial-up UUCP link, 271 
CWI (Centrum voor Wiskunde en 
Informatica), 233-34, 240 
NIKHEF (Nationaal Instituut voor 
Kernfysica en Hoge-Energie- 
fysica), 233, 235, 238, 292 
RIPE (Réseaux IP Européens), 233- 
39, 242-44, 250 
Andrew File System (AFS), 37 
Andrews, W. Clayton, 141-42 
Appropriate Use Policy (AUP), 195 
Ardis public data network, 62 
ARPANET, 9, 88, 98, 252, 277-78, 280, 
315, 352, 354-56, 359 ASN.1, 121- 
22 
Association for Computing Machinery 
(ACM), 279 
AT&T, 318 
ATOMIC project, 313-15 


INDEX 


Auckland, 182-84 
Wellington, 175-77 
Auerbach, Karl, 31, 151 
Australia: 
Adelaide, 198-201 
Australian AARNET, 193, 195, 245, 
336 
Canberra, 193-97 
Melbourne, 184-87 
Sydney, 188-92 
Australian Academic Research Net- 
work (AARNet), 193, 195, 245, 
336 
AUTOCAD, 23, 56 


B 
Bangkok, Thailand, 219-32 
general ledger system, 220-21 
Pantip Plaza, 230-31 
Stock Exchange of Thailand (SET), 
220, 222-23 
Value Group, 226-28 
Baobab, 284-85 
Barad, Bob, 283-85 
Bay Area Regional Research Network 
(BARRnet), 30, 86, 173-74 BBN, 
88, 315, 357 
Becker, Jordan, 152 
Becker, Paul, 141 
Behemoth, 161-64 
audio bus, 163 
chord keyboard, 162 
computers on, 162 
cost of, 164 
Global Positioning System (GPS), 
164 
head mouse, 162-63 
helmet, 163 
power bus, 163 
security for, 164 
Belgium, 260-68 


Index 


Bell, Gordon, 303 
Bellcore, 304, 307 
Berkeley, California, 157-60 
Birkenbihl, Klaus, 255-56, 258 
BITNET, 15, 38, 59, 68, 84, 86, 358 
Bjelke-Petersen, Joh, 201 
Blokzijl, Rob, 233-35, 237 
Blue Book, The, 5, 11, 22-23, 124, 128, 
130, 272 
conversion of, 22-25 
Bombay, India, 340-51 
Bureau of Indian Standards (BIS), 
351 
ERNET, 341-43 
NCST (National Center for Soft- 
ware Training), 340-45, 348, 351 
PTI (Press Trust of India), 349-51 
railway reservation system, 345-47 
Bond, Alan, 201 
Bonn, Germany, 254-59 
Border Gateway Protocol (BGP), 88, 137 
Bottorff, Norman, 225 
Boulder, Colorado, 21-25, 153-54, 157, 
301-7, 361-66 
Bratislava, Czechoslovakia, 15 
Brim, Scott, 136-37 
British Telecom, 71 
Broadband ISDN (B-ISDN), 303, 315, 
321 
Bruno, Giordano, 35 
Bruno project, 35, 44, 116-17, 124-33, 
170, 302, 366 
applying to ISO world, 130 
ITU printing operation vs., 127-28 
termination of, 125, 153-54 
Brussels, Belgium, 260-68 
Bulletin board services, Minitel and, 20 
Butterfield, Julie, 6 
Butterfly, The, 174 


(ee 

California: 
Berkeley, 157-60 
Marina del Rey, 311-17 
Moffet Field, 171-74 


Mountain View, 161-65 
San Francisco, 166-70, 318-20 
San Jose, 22 
CAMAC crates, 294-97 
Canberra, Australia, 193-97 
Carpenter, Brian, 18, 93 
Casner, Stephen, 315-16 
CCIR, 125 
CCITT, 69, 125, 330 
recommendation D.1, 68 
CDCNET, 186 
Cedok, 13 
Center for Telecommunications Re- 
search (CTR), 141-44 
Acorn project, 141-43 
operational nature of, 143 
Centrum voor Wiskunde en Infor- 
matica (CWI), 233-34, 240 
CERFnet, 105, 312, 329-30 
Cerf, Vinton, 34, 84-85, 123, 151, 277- 
79, 343, 354 
CERN, 18, 91, 172, 234, 236, 250, 257, 
271, 283, 292-93, 358 
Chang, Michael, 60, 337 
Chapin, Lyman, 123 
Chatchi, General, 229 
Chaundry, Chris, 185-86 
Chen, Tommi, 67 
CHEOPS satellite, 18 
Cheung, Eric Lo Hing, 337 
Chicago, 291-300 
Chinese University (New Territories), 
60 
Cho, Mr., 65-66 
Chon, Kilnam, 329-32, 359 
Cisco routers, 17, 102, 105, 194, 235, 
2, 275 
CITI (Columbia Institute for Tele-Infor- 
mation), 143-44 
Private Networks and Public Objec- 
tives project, 144 
City Lights bookstore, 159 
Clark, David, 304-5 
Clasper, Harry, 93-94 
Cleveland, Ohio, 286-90 
Cleveland Free-Net, 286-89, 348 
CLNS, 107 


CNET, 120 

CNRS (Centre National de la Recher- 
che Scientifique), 273 

Cody’s bookstore, 158 

Cohen, Danny, 313 

Colorado, Boulder, 21-25, 153-54 

Colorado SuperNet, 270 

Columbia University, New York: 


CITI (Columbia Institute for Tele-In- 


formation), 143-44 
CTR (Center for Telecommunica- 
tions Research), 141-44 
Comer, Douglas, 34, 357 
Commercial Internet Exchange (CIX), 
Wisp aha 
Communications Week International, 108, 
110, 131, 154, 302 
Computer Literacy bookstore, 159-60 
Computer Sciences Corporation (CSC), 
318 
Connection Oriented Network Service 
(CONS), 90 
ConneXions journal, 3, 33, 165, 319 
Cooper, Ann, 317 
Copyright protection: 
of ITU documents, 129-31 
Value Group, 227-28 
Cornell University, 136-40 
CUINFO, 138-39 
Gateway Daemon (gated), 137-38 
routing protocols, work on, 136 
Corporation for National Research In- 


itiatives (CNRI), 81, 277, 279, 303- 


4 
COSINE project, 248-50, 261-64, 363 
budget, 249 
IXI (International X.25 Infrastruc- 
ture), 249-50, 263 
origin of, 248 
Project Management Unit (PMU), 
249 
Crocker, Dave, 355 
Crow, Trammel, 301 
Crowcroft, Jon, 99 
CTR, See Center for Telecommunica- 
tions Research (CTR) 
CSNET, 84, 354, 355-59 


Index 


CUINFO, 138-39 
Curtis, Kent, 354 
CWI, See Centrum voor Wiskunde en 
Informatica (CWI) 
Cypress network, 357 
Czechoslovakia: 
Bratislava, 15 
Prague, 13-16 
Czech Technical University, 13-14 


D 

DARPA, 268, 278, 280, 303, 311, 312, 
315, 354, 364 

Data Communications, 3 

Datanet, 104-6 

Datapak, 63 

DEC LAT protocols, 213 

DECnet, 17, 39, 40, 85, 92, 104, 105, 
186, 257, 271, 293-94 

DECnet Phase IV, 172 

DECnet Phase V, 55, 110, 172 

Deering, Stephen, 315 

Delp, Gary, 305 

Denning, Peter, 355 

desJardins, Richard, 34-35 

Develnet, 62 

DEN (Deutsches Forschungsnetz) pro- 
ject, 257-58, 263, 274, 358 

DG XIII, 89, 261-64, 267 

Dial-up UUCP, 271, 343 

Digital Equipment Corporation (DEC), 
73, 150, 151, 295, 304, 358 

Western Research Laboratory, 357 

Digital Resource Institute, 116 

Directory assistance, Minitel and, 19 

Directory User Agent, X.500, 96-97 

DISH, 96 

$Link, Singapore Network Services 
(SNS), 75 

Domain Name System (DNS), 97-98, 
147, 317 

DSA, 95-98 

Dublin, 83-89 

Dunedin, New Zealand, 178-81 

D Zero, 297-99 


Index 


E 


EASInet, 93, 250, 256-57 
EBCDIC character set, 24 
EBONE (European Backbone), 89, 90- 
94, 240, 250, 257, 283 
contributions to, 92-93 
DECnet Phase IV traffic and, 92 
EBONE Action Team, 93, 250 
management committee, 93-94 
Memorandum of Understanding, 
250-51 
EDI, 74, 204 
Eicher, Larry, 117, 130-31 
Elamvazuthi, Chandron, 210, 212 
Electronic mail, in outlying areas, 115 
Elz, Robert, 186, 193 
England, 95-99 
ENIAC, 14 
Epilogue Technology, 31, 198, 200 
Eppenberger, Urs, 17 
ERNET, 341-43 
floppy-based e-mail system, 342 
infrastructure, 342-43 
ESnet (Energy Sciences network), 174 
HEPnet and, 293 
Esprit, 262-64, 268 
Estrada, Susan, 312 
Ethernets, 17, 18, 54, 62, 73, 120, 126, 
306, 324, 348 
EUnet, 15, 45, 233, 239-42, 251, 257, 364 
EBONE consortium and, 242 
Eureka group, COSINE project and, 
248-49 
European Academic Research Net- 
work (EARN), 15, 84, 247, 252, 
256, 258, 271 
European Academic Supercomputer In- 
itiative (EASI), 256 
European Commission, 268, 272, 276 
DG XIII, 261-64, 267 
RARE contributions, 247-48 
European Council of Telecommunica- 
tions User Associations (EC- 
TUA), 252 
European Internet, 268 
European Nervous System, 261 


European Telecommunications Stand- 
ards Institute (ETSI), 119, 252 

European UNIX Users Group (EUUG), 
240-42 

European Workshop on Open Systems 
(EWOS), 252 

EurOpen, 241-42 

Exterior Gateway Protocol (EGP), 88, 
137 


F 

Fair, Erik, 317 

Farber, David, 84, 302-4, 306, 355 

Faul, Stephanie, 280-81 

FDDI, 18, 30, 40, 69, 73, 122, 197, 294, 

333 
Federal Emergency Management 
Agency (FEMA), 244 

Federal Express, 62, 67, 231 

Feist, Jerry, 138 

Felderman, Robert, 313-14 

Fermilab, 18, 291-97 
CAMAC crates, 294-97 
Linear Accelerator (LINAC), 294 
network architecture, 294 
networking at, 296 

Fidonet, 284-85 

Finland, 100-107 

Finn, Gregory, 313-14 

Firefighters, 4 

FIX-East, 173 

FIX-West, 38, 173, 195 

Flaming, 4 

Flat-rate pricing, 63, 70 

Fluckiger, Francois, 18 

Forrester, Ian, 178-81 

Frame Relay, 32, 105-6 

France: 
France Telecom, 19, 273-75 
Nice, 119-23 
Paris, 19-20, 108-15, 269-76 

FRED, 96 

Free-Net, 286-89, 348 

Fry’s, 160 

FTAM, 17, 107, 264, 332 


370 


FTP Software, 31, 34 

Fuchs, Ira, 84, 303 

Fujisawa, 38, 43-48 

Fujitsu, Value Added Group, 41 

Full duplex, definition of, 189 

FUNET (Finnish University Network), 
104-5 

Fuzzball, 88 


G 

Garg, Anil, 343 

gated software, 137-38 

Gates, Bill, 100 

Gateway Daemon, 137 

Geneva, 3-12, 18, 116-18, 124-33 

Germany, Bonn, 254-59 

Gigabit testbeds, rearch conducted in, 

307 

GIPSI, 120 

GMD, 255-58 
DEN (Deutsches Forschungsnetz) 

project, 257-58, 263, 274, 358 

EASInet, 93, 250, 256-57 

GobNet, 306 

Golden Shopping Center, 55-58, 231 
Macrosoft stall, 56-57 

Goldstein, Steve, 281-82 

GOSIP Institute, 35 

Goto, Shigeki, 323 

Graphics, standards and, 130 

Gross, Phill, 149 

Grundner, Tom, 286-89 

Gruntorad, Jan, 13-15 


H 

Hackett, Simon, 198-201, 316 
Haleiwa, 37 

Halliday, Bob, 224-25, 231, 232 
Hanafi, Waleed, 60-63 

Happy Valley, 51-52, 63 
Hardcastle-Kille, Steve, 95, 363 
Harju, Raimo, 100 

Hawaii, Honolulu, 36-37 
HEAnet, 84 


Index 


Hearn, Tony, 355 
Heinanen, Juha, 103-6, 318, 363 
Helsinki Free-Net, 289 
HEPnet, 39, 172, 271, 292-93 
ESnet (Energy Sciences network) 
and, 293 
growth of, 293 
Hermes project, 288 
High technology, in outlying areas, 115 
Hill, Robin, 200-201 
Hitachi notebook, 49-50 
Hoat, Ang Chong, 204 
Hong, Yeo Ning, 74 
Hong Kong, 51-64, 219, 337-39 
Golden Shopping Center, 55-58, 231 
Hong Kong University, 59-60 
Hutchinson Mobile Data, 60-62 
Jockey Club, 51-55, 62 
Honig, Jeff, 136-37 
Honolulu, 36-37 
Huh, Moon-Haeng, 333 
Huitema, Christian, 119-23, 278, 363 
Huston, Geoff, 193-97, 363, 365 
Hutchinson Mobile Data (Hong Kong), 
60-62 


I 
IBM 9000, 74-75 
IBM, 93-94, 145, 256, 283, 304, 318, 358 
PARIS project, 304 
IDNet, 79 
IDPR/IDRP, 137 
IETF, 128, 147-52, 196, 235, 278-79, 336 
certified protocol engineers board, 
proposal for, 148-49 
MIB (management information 
base), 150-51 
standards, 148 
Steering Group (IESG), 150, 196 
working groups, 148 
India, Bombay, 340-51 
Indian Institute of Technology (IIT), 343 
INET, 278-79, 359 
Infolan, 105-6 
Infonet, 319 


Index 


Information Communication Institute 
of Singapore (ICIS), 69-70 
Information Sciences Institute (ISI), 311- 
16 
ATOMIC Project, 313-15 
CERFnet, 312 
DARTnet, 312-13 
MOSIS service, 311 
multimedia conferencing, 315-16 
Terrestrial Wideband (TWB) net- 
work, 312-13, 315 
Infrastructure, 365 
Ingres, 56, 243 
INMARSAT, 71-72 
INRIA, 119-23, 255, 269-71, 273, 282 
ASN.1 benchmark, 122 
computer network project, 120-21 
MAVROS compiler, 121-22 
robotics projects, 119-20 
The Obviously Required Name 
Server (THORN), 121 
X.400 project, 121 
Institut National de la Recherche en In- 
formatique et Automatique, See 
INRIA 
Intercontinental Research Networking 
(CCIRN), 252 
International Direct Dial (IDD) links, 72 
International standards documents, 3- 
12 
availability of, 3-5 
copyright protection, lack of, 4 
International X.25 Infrastructure (IXI), 
249-50, 263 
Internet, 3-5, 8, 18, 97, 99, 109, 125- 26, 
128, 169, 177, 195-96 
Finland, 103 
France, 112 
installing at San Jose Convention 
Center, 29-35 
Internet Activities Board (IAB), 11, 
97, 149-51, 196, 277-78, 315 
Internet Assigned Numbers Author- 
ity (IANA), 315 
Internet Monthly Report, 317 
Japan, 39 
Managers Guide, 211 


372 


in outlying areas, 115 
policy routing protocols, 106 
Request for Comments (RFCs), 3 
subnetwork support, 106 
Internet Society, 196-97, 252, 278-79 
Internode Systems, 198 
INTEROP, 22, 25, 29-36, 130, 165, 198, 
352 
Ireland, Dublin, 83-89 
Irish Universities Network, 83-84 
ISDN, 47, 77, 109, 235, 264-65, 303, 322, 
324 
Singapore, 71 
ISDN Karaoke Machine, 323 
Ishida, Haruhisa, 38-40 
ISI, See Information Sciences Institute 
ISODE (ISO Development Environ- 
ment), 95-96, 148, 248 
ISO (International Organization for 
Standardization), 8-12, 130, 319- 
21 
standards, 332 
IT2000, 77-78, 80-81 
Ithaca, 134-40 
ITU (International Telecommunication 
- Union), 3-12, 20-25, 44, 116-18, 
124-25, 153-54, 170, 272, 330-31 
Blue Book, The, 5, 11, 22-25, 124, 
128, 130, 272 
Consultative Committee on Interna- 
tional Telephone and Telegraph, 
5 
copyright protection of documents, 
129-31 
Information Systems Steering 
Group, 124-25, 129 
lack of computer literacy at, 6-7 
mail system, 131-32 
printing department, 127-28 


J 

Jacobsen, Ole, 33, 165, 319-20 

JAIN, 39 

JANET Coloured Book protocols, 84, 96 
Jansen, Peter, 225 


Index 


Japan: 
Akihabara, 49-50 
Fujisawa, 38, 43-48 
ISDN and, 47 
KEK, 292 
networks in, 38-39 
Tokyo, 38-42, 321-28 
JARING network, 211 
Jennings, Dennis, 83-90, 92-94, 122, 145 
Jensen, Mike, 284 
Jipguep, Mr., 117 
Jockey Club (Hong Kong), 51-55, 62 
Customer Information Terminal 
(CIT), 53-54 
Telebet system, 53-54, 62 
vendor/ technology policy, 54 
Johnston, Peter, 261 
Joint Network Team (JNT), 96, 282 
JUNET, 39, 45-46 
Junsec, 44, 48 
JVNCnet, 335 


K 

Kahle, Brewster, 166-70 

Kahn, Bob, 277, 280, 303-4, 315 

Karrenberg, Daniel, 234 

Keio University (Fujisawa campus), 39, 
43-48 

Kent, Stephen, 123 

Kerberos, 33 

Kern, Bill, 355 

Kim II Sung University (Pyongyang), 
66 

King, Ken, 139-40 

Kirstein, Peter, 98-99, 358 

Knowbots, 81 

Knowles, Stev, 31, 148 

Korea, 38, 329-34 

Korea Telecom, 331-34 

Kowack, Glenn, 239, 241-42, 363 

Kowloon, 60 

KREN (Korea Research Network), 330 

KREOnet (Korea Research Environ- 
ment Open Network), 329-30 

Kuala Lumpur, Malaysia, 209-18 


MIMOS (Malaysian Institute of Mi- 
croelectronic Systems), 209-12, 
215 
Plus project, 212-13 
Tenaga Nasional Berhad, 215-17 
Kummerfeld, Bob, 188-92, 197 
Kundapur, Gourang, 349 
Kuo, Frank, 85 


L 

Lambert, Carol, 134, 136, 139 

Lambert, H. Dave, 134-36, 139 

Landweber, Jean, 359-60 

Landweber, Larry, 45, 84-85, 122, 278, 
352-54, 355, 358-60 

Landweber Seminars, 358-59 

Lanlink, 104-5 

LANs (Local Area Networks), 305-6 

Large Electron-Positron (LEP), 18 

LAT, 73, 294 

Lauck, Tony, 85, 150 

Lauder, Piers, 188-90 

Leased lines, 15, 17, 90, 101-2, 193 

Le Guigner, Jean-Paul, 273-75 

Leiner, Barry, 319-20 

Linear Accelerator (LINAC), 294 

Linear lightwave networks (LLNs), 142 

Local Area VAX Clusters (LAVCs), 294 

London, 95-99 

Los Nettos network, 312 

Lucas, Peter, 294, 296 

Lynch, Cliff, 349 

Lynch, Dan, 4, 123, 160 


M 

Macau, 65-66 

McKenzie, 9-12 

Madison, Wisconsin, 352-60 

Malamud.COM, 270 

Malaysia, 209-18 

Management Information Base (MIB), 
34 

Marina del Rey, California, 311-17 


Index 


Information Sciences Institute (ISI), 

311 

Markwell, John, 54 

MBA Experiment, 135-36 

MCI, 145 

MCI Mail, 109, 270, 280 

Medin, Milo, 171-74 

Medinet, Singapore Network Services 
(SNS), 75 

Melbourne, Australia, 184-87, 193 

Memnet, 307 

Message Handling Systems, 190 

MFEnet (MuffyNet), 85 

MHSnet, 190-91 

Michau, Christian, 273, 275 

Michigan state network (Merit), 145 

MicroGrafix Designer, 23 

Microsoft Word for Windows, 23-24 

Mikrokonsultit Oy, 100-102 

Mills, David, 88 

MILNET, 252, 335-36 

MIMOS (Malaysian Institute of Mi- 
croelectronic Systems), 209-15 

Minitel, 19-20 

Mobitex system, 62 

Moccia, Mary Jo, 221-22 

Mockapetris, Paul, 147, 305 

Moffet Field, California, 171-74 

Mohamed, B. Awang-Lah, 210, 212 

Mosaic, 313-14 

MOSIS service, 311 

Motif, 56 

Mountain View, California, 161-65, 171 

Multichannel, definition of, 189 

MultiMedia Data Switch (MMDS), 199 

Mun Chun, Chew, 71 

Murai, Jun, 39-48, 324-25, 328, 363 

Murakami, Ken-Ichiro, 323 


N 

N-1net, 38 

NACSIS, See National Center for Sci- 
ence Information Systems (NAC- 
SIS) 

Naemura, Kenji, 321, 323 


Narong, Khun, 226-28 
NASA-Ames Research Center, 30, 171, 
195 
NASA Science Internet (NSI), 171-74, 
244, 252 
applications, 171-72 
as Internet backbone, 173 
links, ownership of, 173 
Network Control Center, 172 
SNMP and, 172 
NASA Telephone Company, 173-74 
Nationaal Instituut voor Kernfysica en 
Hoge-Energiefysica (NIKHEF), 
2334230, 2087292 
National Center for Atmospheric Re- 
search (NCAR), 87 
National Center for Science Informa- 
tion Systems (NACSIS), 38 
National Center for Software Training 
(NCST), 340-45, 348, 351 
National Computer Board (NCB), 78-80 
National Science and Technology 
Board (NSTB), 67-68 
National University of Singapore 
(NUS), 67-69 
Naylor, Chris, 175, 177 
Naylor, Jeremy, 175 
Naylor, Richard, 175-77, 289 
Neggers, Kees, 90-94, 245-47, 251-53 
NESTE system, 100 
Netherlands: 
Amsterdam, 90-94, 233-44 
Utrecht, 245-53 
NetPhone, 199-200 
Network Information Center (NIC), 
243-44 
Network Interface Unit (NIU), 142 
Networld, 29 
Netzzentrum fuer die Wissenschaft, 255 
Neuman, Clifford, 312 
New Mexico, Santa Fe, 147-52 
New Territories, 60 
New York City, 141-44 
Acorn project, 141-43 
CITI (Columbia Institute for Tele-In- 
formation), 143-44 
New Zealand, 178-81 


Index 


World Communications Laboratory, 

181 

Ng, Nam, 59 

Nice, France, 119-23 

Nielsen, Torben, 36-37, 45 

NiftyServe, 42 

NIKHEF, See Nationaal Instituut voor 
Kernfysica en Hoge-Energie- 
fysica (NIKHEF) 

Nippon Telegraph and Telephone 
(NTT): 


Kasumigaseki showroom, 323 
vision, 321-23 
Yokosuka research laboratories, 321 
Ni Shtilleabhain, Aine M., 144 
NJE, 15 
Noam, Eli, 144 
Nojima, Hisao, 323 
Nomadic Research Labs, 164 
NORDUnet, 93, 104-5, 234, 236, 240, 
250, 282 
Norwegian Telecom, 71 
Novell, 12, 59, 105, 280 
Nowlan, Michael, 242 
NREN, 103 
NSF, 38, 85-89, 122, 197, 281-83, 303, 
354, 364 
connections program, 146 
NSFNET, 11, 30, 82, 83, 87-91, 137, 145- 
46, 174, 195-197, 236, 243, 251-52, 
256-57, 273, 281-83, 302, 312, 335, 
364 
NSTB, See National Science and Tech- 
nology Board (NSTB) 
NTT, 45 
NUS, See National University of Singa- 
pore (NUS) 
Nynex, Minitel and, 20 


O 

OCR software, ISO standards and, 332 

ODA (Office Document Architecture), 
37, 98 

Office of Technology Assessment, 146 

Okado, Tomoo, 41-42, 326 


Open Desktop (SCO), 56, 348 
OrderLink, Singapore Network Serv- 
ices (SNS), 75 
ORSTOM, 111-14, 119, 273 
computer support, 112-13 
functions of, 111-12 
research centers, location of, 112 
RIO network, 113-14 
OSI IS-IS, 137 
OSI (Open Systems Interconnection), 3, 
12, 17, 45, 86-98, 191-93, 197, 235, 
237, 246-48, 258, 276, 331, 361-62 
OSPF, 137 


P 

PACCOM, 180, 330 

PACE, 261 

Packet Assembler/Disassembler, 356 

Palalikit, Surat, 220-22 

PARADISE ESPRIT project, 96 

Paris, France, 19-20, 108-15, 269-76 
CNRS (Centre National de la Re- 

cherche Scientifique), 273 

INRIA, 119-23, 255, 269-71, 273 
Renater, 273-76 

Parkkari, Vesa, 100-107 

Partridge, Craig, 33 

PBX, 33 

PDP-11, 88 

PDP, 53, 110, 292, 295-97 

PeaceNet, 284 

PERL code, 25 

PhoneNet, 356, 358-59 

Phone Shell Project, 46 

Poireau, Gerard, 19-20 

Port of Singapore Authority, 204-7 

Postel, Jon, 3, 149-50, 311-12, 316 

Prague, Czechoslovakia, 13-16 

Prem, General, 229 

Prestandardization research, 248 

Privacy, 365 

Programmers, memory and, 305 

Protocols, basis of, 304-5 

PSInet, 105 

PTTs, 89, 91, 247, 256, 265-66, 318, 319 


Index 


Q 
Quarterman, John, 170 
Quipu, 95-96 
interfaces interacting with, 96 


R 


RACE (Research and Development in 
Advanced Communications 
Technolgies for Europe), 261, 264- 
66 

Rahman Bin Shafi, Abdul, 215 

Ramani, S., 340-45, 348-51 

RARE, See Réseaux Associés pour la 
Recherche Européenne (RARE) 

Rate arbitrage, 265-66 

Recommendation D.1, CCITT, 68 

Relevantum Oy, 100 

Renang Group, 213-14 

Renater (Réseau National de Télécom- 
munications de la Recherche), 
273-76 

Renaud, Pascal, 111-13 

Request for Comments (RFCs), 3, 311 

RFC 1181, 234 

Réseaux Associés pour la Recherche 
Européenne (RARE), 91, 233, 
234, 237, 242, 247-48, 250-51, 272 

contributions, sources of, 247 

Council of Administration, 238, 247, 
252 

Operational Unit, proposed setup 
of, 251-52 

Réseaux IP Européens (RIPE), 233-39, 
242-44, 250 

Network Control Center (NCC), 
237-38 

Reynolds, Joyce, 316-17 

Richter, Walter, 125-26 

RIPE, See Réseaux IP Européens (RIPE) 

Roberts, Steve, 161-65 

Robotics projects, INRIA, 119-20 

Rolnick, Harry, 65-66, 337-38 

Romkey, John, 33-34 

Rose, Marshall T., 34, 95, 111, 148, 196, 
317, 363 


Rosebud interface, 168 

Rosenbaum, Jurgen, 268 

ROSE project (Research Open Systems 
for Europe) , 264 

Routing domains, reachability be- 
tween, 137 

RTF, 24, 25 

Rutkowski, Tony, 3-8, 13, 22, 35, 44, 
116-17, 124-25, 128-33, 154, 277-78 


S 
St. Silicon bulletin board, 286 
San Diego Supercomputer Center, 312 
SDSCnet, 86-87 
San Francisco, 166-70, 318-20 
SF Net, 166 
Wide Area Information Servers 
(WAIS), 167-69 
San Jose, 22, 29-35 
Santa Fe, 147-52 
Schaumberger, Dean, 298-99 
Schiller, Jeffrey, 33 
Schooler, Eve, 315-16 
Schrader, Bill, 87 
Schwartz, Michael, 170, 302 
Schwartz, Mischa, 141 
SciTech, 299-300 
SDSCnet (San Diego Supercomputer 
Center), 86-87 
SEEDNET, 335-36 
Seoul, Korea, 329-34 
Korea Telecom, 331-34 
KREN (Korea Research Network), 
330 
KREOnet (Korea Research Environ- 
ment Open Network), 329-30 
SGML, 37, 332 
Sham Shui Po, 55-58 
Shaw, Robert, 153 
Shein, Barry, 195 
ShowNet, 31-32, 34, 166 
Simple Book, The (Rose), 34 
Singapore, 67-82, 202-8, 219 
IDNet, 79 


376 


Information Communication Insti- 
tute of Singapore (ICIS), 69-70 
ISDN, cost of, 71 
IT2000, 77-78, 80-81 
National Computer Board (NCB), 
78-80, 204 
Port of Singapore Authority (PSA) 
systems, 204-7 
Restricted Zone, 202, 204 
SCATS system, 203-4 
TECHnet, 67-69 
Tradenet, 74-75, 81, 204 
Singapore Network Services (SNS), 74- 
76 
$Link, 75 
Medinet, 75 
OrderLink, 75 
Tradenet EDI system, 74-75, 81 
Singapore Telecom, 68, 70-72 
Skyphone, 71-72 
Teleview, 72-74 
Singapore—The Next Lap (Times Edi- 
tions), 78 
Skilling, Peter, 225 
Skyphone, 71-72 
SMDS, 32, 67, 106 
Smith, Mike, 117, 130 
SMTP, 191 
SNA, 92, 102 
SNS, See Singapore Network Services 
(SNS) 
SnailMAIL, 366 
SNMP, 32, 33, 148, 198, 316 
NASA Science Internet (NSI) and, 
172 
Software Tool and Die, 195 
Solutions Showcases, 32 
Song, Joo-Young, 333 
Song, Tay Eng, 80 
Sons of Bruno, 35, 117 
Sprint, 33 
STACKS (Malamud), 45, 65-66, 67, 130, 
323 
Standards, free distribution of, 131 
Standards haven concept, 330-31 
Stanwyck, Don, 69-70 
Sterba, Milan, 271-72, 302 


index 


Stern, Thomas, 142 
Stock Exchange of Thailand (SET), 220, 
222-23 
Stockman, Bernhard, 93 
Sun Microsystems, 23-25, 151, 161 
SUN protocol suite, 188-90 
compared to TCP/IP, 189 
E-mail, 190 
messages/ packets, architecture of, 
190 
streaming protocol, 189 
SURFnet, 90-92, 245-47, 257 
restrictions on content of traffic, 91 
Swiss UNIX group (CHUUG), 243 
SWITCH (Swiss Telecommunication 
System for Higher Education 
and Research), 17, 121, 242-43 
Switzerland: 
Geneva, 3-12, 18, 116-18, 124-33 
Zurich, 17 
Sydney, Australia, 188-92, 193 
SUN protocol suite, 188-90 


T 

T1 lines, 30, 256-57, 312 

Taipei, 335-36 

Taiwan, 38, 335-36 

Tampere, 100-107 

Tan, Rosli Md, 212 

Tarjanne, Pekka, 7, 22, 35, 116-18, 132, 
153-54, 302 

Tarmidi, Ahmad, 214-15 

TCP/IP, 15, 17, 34, 40, 45-46, 47, 68, 85- 
86, 90, 91, 95-96, 102, 106, 112, 
122, 172, 186, 189, 200, 211, 233, 
234, 237, 240, 248, 256-58, 268, 
271, 274, 277, 294, 315, 329, 354, 
363 

protocol suite, 9, 11, 12, 47, 85, 88, 
114, 196, 311 
routing protocols, 137 

TECHnet, 67-69 

Telebet system, Jockey Club (Hong 
Kong), 53-54, 62 

Telecom Finland, 104, 106, 117, 125 


377 


Index 


Telekom Malaysia, 211, 213, 214 
Telenet, 356 
Teleview, Singapore Telecom, 72-74 
Telnet, 139, 189, 316, 356 
Tenaga Nasional Berhad, 215-17 
communications system, 216-17 
distributed systems project, 215-16 
TeX, 37 
Thailand, 219-32 
Thinking Machines, WAIS and, 169 
Thio Hoe Tong, Dr., 67-69 
TIFF files, 23, 24 
Time Engineering, 214 
Todai International Science Network 
(TISN), 39 
Tokyo, 38-42, 321-28 
Tokyo City Hall, 326-28 
Top quarks, 297-98 
TPS, 24725 
Trademark protection, Thailand, 228-29 
Tradenet EDI system, Singapore Net- 
work Services (SNS), 74-75, 81, 
204 
Trade press, technical knowledge of, 
109-11 
Transpac, 20 
Tsim Sha Tsui, 58-59 
Tymnet, 356 


U 
U.K. Coloured Book standards, 193, 358 
Ultra networks, 18 
United Nations Development Program 
(UNDP), 341 
United States: 
Berkeley, California, 157-60 
Boulder, Colorado, 21-25, 153-54, 
157, 301-7, 361-66 
Chicago, Illinois, 291-300 
Cleveland, Ohio, 286-90 
Honolulu, Hawaii, 36-37 
Ithaca, New York, 134-40 
Madison, Wisconsin, 352-60 
Marina del Rey, California, 311-17 
Mountain View, California, 161-65 


New York City, 141-44 
San Francisco, California, 166-70 
San Jose, California, 22 
Washington, D.C., 145-46, 277-85 
U.S. Defense Advanced Research Pro- 
jects Agency, See DARPA 
University College London (UCL), 95- 
99 


networking at, 98-99 
University of Hawaii network, 36 
University of Melbourne network, 184- 
87 
University of Sydney, 190 
UNIX, 24, 47, 56, 241, 244, 339 
European UNIX Users Group 
(EUUG), 240-42 
Routing Information Protocol (RIP), 
137 
Swiss UNIX group (CHUUG), 243 
USENET, 46, 239-40, 348, 364 
UTP-based Ethernets, 40 
Utrecht, 245-53 
UUCP, 15, 39, 103, 122, 177, 189-90, 
211, 239, 355 
Dial-up UUCP, 271 
ORSTOM and, 113 
UUnet, 45, 193, 211, 288, 341 


V 

Value Added Group, Fujitsu, 41 

Value-Added Network (VAN), 266 

VAX, 24, 53, 54, 61-62, 292-93, 303, 347, 
348 

VAXen, 54, 73, 295-96, 298, 346 

VME crates, 298-99 

VTP, 17 


W 

Wah, Chew Keng, 204, 207 

WAIS, See Wide Area Information Serv- 
ers (WAIS) 

Waikiki (Hawaii), 37 

Wanchai, 60 


378 


WAN links, 18 
WANs (Wide Area Networks), 306 
Washington, D.C., 145-46, 277-85 
Weird Stuff Warehouse, 160 
Wellington, Auckland, 175-77 
City Net, 176-77 
WHOIS database, 97, 237, 243 
Wholebrain Technology, 153 
Wide Area Information Servers 
(WAIS), 167-69, 186, 281, 348 
client interfaces, 168-69 
clients, 168 
document indexing, 167 
document storage, 168 
NeXT and, 169 
pieces of, 167 
servers on Internet, 169 
simple WAIS (SWAIS), 168 
Thinking Machines and, 169 
user requirements, 168 
WAIStation, 168-69 
XWAIS, 169 
WIDE (Widely Integrated Distributed 
Environment), 39, 44-46 
ISDN module, 47 
Williamson, Scott, 243 
Wilson, Robert, 291 
Wolff, Steve, 88-89, 145-46 
Word Perfect, 24-25 
World Communications Laboratory 
(New Zealand), 181 
Worona, Steve, 13 
Wurzel, 21-22 


X 
X.3, 356 


X.25, 17, 41, 54, 62, 73, 83-84, 90, 101-2, 


Ps ol207 219023; 


211, 246, 274-76, 318, 343, 356-57 


X.28, 84, 211, 264, 356 
X.29, 84, 211, 264, 356 
X.75, 113 


X.400, 7, 17, 32, 95, 102, 121-22, 129, 153 


X.500, 186, 317 
alternative hierarchies, 97-98 


Index 


common schema for directory, de- 
velopment of, 97 

directory structure, 95-96 
Directory User Agent (DUA), 96-98 
integration into ISODE, 95 
name structuring, 97-98 
performance, 98 
relaying mechanism, 97 
replication, 97 
rigid hierarchy, 97-98 

X.800, 23 

Xerox Corporation, 304, 315 

X Window System, 96, 198, 296 
kanji support for, 46 


Y 

Yap, Michael, 76-77, 80, 82 
Yeung, Edwin, 51 

Yii Der, Lew, 202-3 

Yusoff, Rafee, 209, 212, 214-15 


Fé 

Zakharov, Dr., 9-12 
Zentec character set, 24 
Zurich, 17 





ens, oe 
Tekry jew, ‘ra A ame eee ey 
TRS PO aA aol Dolesid: | 
Tenay : RIOR oy hiteipeint 
Marte CD aetna Reon 


sMintrebaited ay chor li? sapere weg 
re “ 3) * Jueinetem qaiveler 


Mhall wi, TNE 2 MORE 
fare. é “ARR emai high ~ 


ite Ele <ag es ‘2, Li Fuso 


FY! fies, 7et ARG He eeio JF Rotax 
Mere 2 Sas, mm hye Rete ieee } wa bertW x 
paloth pebtiegguedineg 


jaa 14 


in% 2 B y 
r% de BOR STAN Fears gsi 

he 2 rider ay 
wh. oh Siw 5 44 iy 
alien * BP erat of 2 peck —— 


&? ‘ 
2% {@& . ‘3 Or bars + 


; £).938 Ved onine welts 
‘ i * 
: Cas std 
Tre Yok ty r 
it s : ‘ aah — 
7 rl a MAMAN Ss, 343, S04). - 


Estes petwrarks, LS 
Lipeltet Mg Gorm Dew horpnerit : 
{UN DP), 342 
rtiond Stains’. ’ 
fete eg, CAV ford TAP Gi 
eo: Colegace, 25-25 15554, : 
7, BS) th 
«Tht ah Padois, # aoy She: | aa 
Chaveiand, (thio Zbl. . 
Honaltthy, Seaangeesp e te 
{thaca, Mew York, age me 
| nin dled ey © iaorale 3 


a 19; TALTH 





Ef QU - 


| SBS, 


Way oe - e. 









































pepe vere 
ARTS * 


eS 


Ueiverdnrer 3 

niverniiv of Gf 
e> . 

Linivers ty OB T antec dn 

UNIX, 4, SOC 

muro LINX gees 

= LCi, 240-82 cor Joe 

a béepowell 

é 68! yah ZAM 
aT SORE a 


yah Oe | 


ob-bet 08.8 


yoo modal aandesintiy 

¥ ist (teks we a 
Valu Aided € sit SD, aie’ Fa i / 

Vege Adda} Meteork Te 4 ri ater 

aa, So Bd, alae sae MS, S47, 

Jae . 


peas ae ate. 



















ote ae hit? Th i 
i 4 at } 
Pils hy Fat 7 Ae Pre 
ee “en ‘ : | a | 
Le | 4 ’ 
Tae A, he fi 4 
ET ee ee aa tit OV; ni ‘* 
ies Gerke emt Byki : 
: eel ine ’ 
; ray iy ; Aa 
Vala) bye 4h ) 
ty a i 
Peal a i j 
7 4 at 
re | EN ' 
y Ar} Tye aa 
« * rug 
rs i » ” A vs 
H 
Cat a i 4 
r if @ é Py 
Pe : i, . 4) f 
4 ee SP 
A 
1 
i re 
ip NN 
e ¥ , 
ik 4 
i) j a ( 
= f ‘ f i et 3 
| | ok , 
pot 17 ' 
it ; a \f 
2 
xy ed 
4 ‘ . 
| 
ra % ' 
AS 
uy 
j 
‘ 
! ' 
< j i mh) 
¢ net aN : 7 ' 
i 
ri 
pest | ' 
i 
‘ 
— 
: 
4 yt j 
: 
4 
‘ 
| 
{ N 
Pd 
h ; ) 
- s : 5 ; 
a7 i 
i “7 
Peet van 
a4 i ‘ angel ae 
; j , nt i has Hl 
. an 7 





ye AY we 
/ q 


(Continued from front flap) 


MK 
INTEROP 


What is INTEROP? 


INTEROP—The Interoperability Conference 
and Exhibition — was developed to help you 
understand the rapid and far-reaching 
changes in the computer and communica- 
tions industries. INTEROP Fall (San 
Francisco Bay Area) and INTEROP Spring 
(Washington, D.C.) are the premier network- 
ing computing educational forums, and 
Interop Company is pleased to include a 
copy of this Prentice Hall professional refer- 
ence book in the course materials of all 
INTEROP conference attendees. 





INTEROP provides a leading edge technical 
program consisting of several dozen in- 
depth tutorials, 50 conference sessions, and 
informal Birds of a Feather sessions. The 
unique INTEROP exhibition provides a “lab- 
oratory of learning” where vendors demon- 
strate the interoperability of their products 
and technologies through a connection to 
the show network. INTEROP’s exclusive 
Solutions Showcase™ Demonstrations fea- 
ture competing vendors cooperatively 
demonstrating the interoperability of their 
products and illustrating the benefits of new 
and emerging technologies. 


To request more information about 
INTEROP: 


Interop Company 
480 San Antonio Road, Suite 100 
Mountain View, CA, USA 94040-1219 


1-415-941-3399, Fax: 1-415-949-1779 
1-800-INTEROP, Info@Interop.COM 


PRENTICE HALL 
Englewood Cliffs, NJ 07632 
Printed in the U.S.A. 


COMPUTER NETWORKING 


EXPLORING © 
HE INTERN ET 


—= A Technical Travelogue —= ee 
CARL MALAM U D 


After traveling around the world 3 times in 6 months and visiting 56 cities! 21 countries, 
Carl Malamud chronicles the results of his voyage of discovery i in Exploring the Internet: A 

_ Technical Travelogue. \n an easy-to-understand narrative style, he provides you with techni- 
cally sophisticated descriptions of everything from new networking research to efforts to 
build national and international infrastructures to the many fine lunches and dinners he | 
enjoyed. This book is a technical travelogue that looks at people, laboratories, and institu- 
tions that illustrate the incredible scope and diversity of the Intermet. : 








Here are just a few of the places he visited: 


e In Hong Kong, Malamud explored the Royal Hong Kong Jockey Club nines a massive : 
network handles millions of bets each race day. 

¢ In Amsterdam, he witnessed the birth of EBONE, a long- cawated pan- Eucbern pee 
backbone, and visited EUnet, an organization on nS front lines of the pes into places ae 
Tunisia, Algeria, and Bulgaria. 2 

e In Cleveland, Malamud visited with Tom Grundner, a network evangelist wna. puts com- 
munity networks together and spreads the faith in places like Peoria. . 


STACKS, also by Carl Malamud, presents a technically sophisticated overview of interoper- Se 
ability in today’s computer networks. Bringing key technical trends into perspective, 
STACKS combines descriptions with case studies on subjects ranging from HIPPI to ATM, 
SONET to Frame Relay, and SMDS to Broadband ISDN. The book shows how technology i is 
used and includes real-world studies of gigabit testbeds, terabit networks, any agi : 


libraries. | 
“Malamud is one Crazy Gaijin! Exploring : "Exploring the Internet is a real surprise! — 
the Internet will be a big hit in Japan.” Malamud has figured out how to do 
Professor Jun Murai, Director research and have fun too!” 
WIDE Network, Japan Glenn Kowack, CEO. 


| - EUnet, The Netherlands — 
“STACKS succeeds marvelously ... a great book." 


2 nu NTL? 


oe es eet i ail Travelogue || 


"ANI I 


PRENTICE HALL 89 


Englewood Cliffs, NJ 07632