Browse Prior Art Database

SUBSCRIPTION SERVICE INFRASTRUCTURE

IP.com Disclosure Number: IPCOM000014003D
Original Publication Date: 1999-Dec-01
Included in the Prior Art Database: 2003-Jun-19
Document File: 2 page(s) / 41K

Publishing Venue

IBM

Related People

Frank Breslau: AUTHOR [+3]

Abstract

Disclosed is a multi-tier distributed service delivery topology for application hosting/business subscription services. The topology, as shown below, consists of: 1. a customer client tier; 2. a middle tier; and 3. an inner tier.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 63% of the total text.

Page 1 of 2

SUBSCRIPTION SERVICE INFRASTRUCTURE

Disclosed is a multi-tier distributed service delivery topology for

application hosting/business subscription services. The topology, as

shown below, consists of: 1. a customer client tier; 2. a middle tier;

and 3. an inner tier.

The customer client tier should require a minimum degree of involvement

from the customer technical personnel. This tier is comprised of client

owned by customers and connected by a LAN which supports communications

between the customer clients and the middle tier. The recommended

platform to support at the customer client tier is Intel 486 and higher

with 32-bit Windows (i.e., Windows 95, Windows 98, Windows NT

Workstation), connected by an IP network. The presentation layer of

the customer clients is application-dependent and can include Web

(preferred), terminal emulation (telnet-based), or application client

software. Any software to be used for presentation access should not

be installed on the customer clients, and should come from the middle

tier, which for this purpose would play a role of a LAN server. Thus,

the only modifications required at the customer clients include creation

of icons and minor customization for access to the LAN server on the second tier. The middle tier is the functional part of the offering. It must offer a variety of platforms, and may be a single computer or a collection of modules each performing a particular function. Middle tier machinery is installed at the customer site. Both middle tier machinery and software are owned by the provider of the offering. Provider personnel or designated vendors should be able to access the middle tier for any purpose other than access to the customer applications from the customer client tier. The specific minimum set of functions in the middle tier includes at least: LAN-accessed shared disk with Web browser firewall with Virtual Private Network (VPN) capability compatible with the VPN-capable firewall at the inner tier; appropriate security mechanisms restricting user access to the contents of the inner tier only to designated users and designated customer client computers in the customer client tier. Over and above the previously stated functionality, the specific platform(s) of the middle tier are determined by the applications being offered by and selected by the customer, i.e., the platform may be Windows NT server on Intel, AIX on RS/6000, AS/400, or S/390. The inner tier is located in a single worldwide location, or multiple regional geographic locations. If multiple geographic locations are present, they should be interconnected for the purposes of disaster recovery. If a single location is present, it should provide appropriat security, reliability/availability, and disaster recovery means to ensure 24X365 operations. The functions of the inner tier include at minimum: remote management of middle tier; automatic software...