Sponsor Organization
Registry Organization
TLD Policies
Table of Appendices
D15.1
D15.2.1
D15.2.2
D15.2.3
D15.2.4
D15.2.5
D15.2.6
D15.2.7
D15.2.8
D15.2.9
D15.2.10
D15.2.11
D15.2.12
D15.2.13
D15.2.14
D15.3

TechDoc A

Internet Events International, Inc.
Registry Technical Plan

D15.1 - Registry Operator's Technical Capabilities

Our company is a new startup company formed to manage this top-level domain. As a new company the board understands that our technical staff are limited at present. The staff will consist of 1Senior System Administrator, 3 System Administrators, 4 Assistant System Administrators, 1 Senior Database Administrator, 3 Database Administrators, 4 Assistant Database Administrators, 4 Registry Monitors, 1 Web Designer, 1 Web Programmer, and 8 Helpdesk Support.

The Registry Platform has been developed with scalable operation and application systems. These systems can be extended through the use of Visual Studio Enterprise Development Tools and Specific Software Development Kits (SDKs) within Microsoft Developer Universal Subscription.  Using Global Development Tools will make the ability to find the required staff a much easier task.

Company Technology Position Profiles

Server Administrator

Microsoft Certified System Engineer (preferred) with 3-4 years of professional work experience in multiple NT server environments. Knowledgeable in e-commerce infrastructure, WINS, DNS, RAID, NTFS. Desired skills: SQL, MQSeries, MSMQ, Windows NT / 2000 Server, MS Exchange, XML, DHTML, and HTML

Assistant Server Administrator

Microsoft Certified System Engineer (preferred) with 2-3 years of professional work experience in multiple NT server environments. Knowledgeable in e-commerce infrastructure, WINS, DNS, RAID, NTFS. Desired skills: SQL, MQSeries, MSMQ, Windows NT / 2000 Server, MS Exchange, XML, DHTML, and HTML

Database Administrator

Microsoft Certified System Developer (preferred) with 3-4 years of professional work experience in SQL Server and NT server environments. Knowledgeable in e-commerce infrastructure, Relational Database environments, SQL Server 7 or greater, WINS, DNS, NTFS. Desired skills: SQL Database Structures, Windows 2000 Server,

Assistant Database Administrator

Microsoft Certified System Developer (preferred) with 2-3 years of professional work experience in SQL Server and NT server environments. Knowledgeable in e-commerce infrastructure, Relational Database environments, SQL Server 7 or greater, WINS, DNS, NTFS. Desired skills: SQL Database Structures, Windows 2000 Server,

Registry Monitors

Microsoft Certified System Engineer (preferred) with 2-3 years of professional work experience in multiple NT server environments. Knowledgeable in Relational Database environments, SQL Server 7 or greater,  Active Directory, WINS, DNS, NTFS. Desired skills: SQL Database Structures, DNS Management, Windows NT / 2000 Server,

Database Programmer

Microsoft Certified System Developer (required). Responsible for the architectural design and development of applications that update and extract information from relational databases. Work on architecture to improve performance scalability in a multiple database implementation and data mart environment. Work closely with client and project team to understand detailed specification. Articulate specification and design ideas to other team members. Design a quality solution to business problem.

Ensure own and other developer’s code is high quality. Ability to Architect, Design, and develop database applications with SQL Server on projects in a large scale database environment (>50 gigabytes). Experience programming in Windows NT / 2000 Cluster Environment. 5+years of Experience with relational database design, using Microsoft SQL Server. Experience coding with embedded SQL. Experience developing in a large database (50+ gigabytes) environment. Experience with performance Scalability, OLTP, Internet, Data Warehouse, Data Mart, ODBC Database Design, ETL processes, etc.

Network and Communication Analyst

This position requires experience with WAN, TCP/IP and ability to configure Cisco Routers and Switches. Duties include IP troubleshooting and configurations, and basic telecom troubleshooting. Must have experience with Windows NT / 2000, T1/ DS3/ OC3 circuits, Voice & Data circuits, VRU's, ACD & PBX, Frame Relay. Excellent communications and presentation skills required for this position.

Help Desk

1-2 years Helpdesk experience. Strong customer / end user support experience. Excellent communication and organizational skills. Strong problem solving ability. Ability to work under pressure. Willingness to work overtime.

Provide telephone support to employees and customers. Log, filter and prioritize requests and problems. Perform hardware and software ordering and tracking, PC and notebook configuration, software installs, troubleshoot hardware, and develop new ideas and strategies to ensure the helpdesk is running smoothly and efficiently.


Windows 95 / 98, Windows NT / 2000, Office suite, Outlook, Microsoft Exchange, NT server tools, general knowledge of LAN and WAN Environments.

Web Designer

Must have 1-3 years of solid experience using HTML, ASP and VBscript, with experience in a professional, shared-codebase, web development environment. Other skills desired for this position include DHTML, JavaScript, XML/XSL, COM, SQL, ADO, plus a sense for visual and interface design on the web. Other skills desired for this position include DHTML, JavaScript, XML/XSL, COM, SQL, ADO, plus a sense for visual and interface design on the web.

Web Programmer

An individual with 3+ years developing with Internet Information Server (IIS) in a Windows NT / 2000 Enterprise Server Environment. Should have experience with Site Server Commerce Server and SQL Database Server. Must have knowledge of ASP, and SQL Queries both writing and troubleshooting. FrontPage and Interdev experience a plus.

Skills Required: IIS, Windows NT / 2000, Site Server, SQL Server, ASP, MS FrontPage, MS Interdev, Visual Basic, JAVA.

D15.2.1 - General description of proposed facilities and systems

Main Operation Center

Our company has developed our facilities and systems with full redundant capabilities for the stability of the TLD service. The Main facility, located in Spokane, WA, will house the Main Servers, Registry Enforcement, Policy and Accreditation Group, and Registrar Service.

The Spokane Building is a 4 year old converted office/warehouse with a floor capacity of 60,000 sq. ft., located on fenced property on the west side of Spokane. Our connectivity to the Internet for the main site will be Dual OC3 (300MBps) capacity with the ability to expand up to OC192 (9600MBps) connections.

Computer System

The main platform is located in Spokane, It will have a scalable, reliable server platform built in four Tiers. First Tier is the Internet Caching Server to provide rapid access to the system. The Second Tier is the Front End Load Balancing servers that are used to balance the user access to the main servers. The Third Tier is the main application servers that are clustered with Windows 2000 Datacenter Server to provide a reliable platform and the ability to scale upwards. The Fourth Tier is our storage level where we have Two SAN (Storage Area Network) Storage Systems, NAS (Network Attached Storage) Storage System, Dual Tape Backup Libraries and Magneto-Optical Jukebox Backup Storage system.

 

This platform has been designed to handle 6000 concurrent users per second with the ability to scale upwards as required.  With the three different backup storage systems, our platform provides a highly stable platform for our company to manage our Top Level Domain Service.

 

Primary Power Systems

Our power systems at the Main Operation Center are in two levels. Level 1 - Main Power will be provided with separate connections for the server room and the rest of the building, and Level 2 - Secondary Power will be provided to the servers through a backup generator that will keep the servers and all necessary network hardware operational to the Internet until the main power is restored. 

Uninterruptible Power Supply (UPS)

Advances in enterprise computing and storage technologies demand a change in enterprise power protection technology. Symmetra is a single unit composed of modular components. This modular architecture provides the foundation of building and scaling near-continuous availability power systems with a flexible range of power capacity. The Symmetra® Power Array combines with the complete line of APC datacenter protection software and accessories to provide the four most critical elements of total datacenter protection: redundancy, scalability, manageability and serviceability.

An APC Symmetra UPS System will protect our main datacenter. First and Second Tier will have two UPS Systems providing backup to half the servers each. In the third tier each cluster will have a single UPS System. In the Fourth Tier, each storage facility will have a separate UPS System.

Ventilation Systems

The Spokane Building will have twin ventilation systems.  The first will provide ventilation to the computer server room only, and the main system will provide ventilation to the rest of the Building.

 

Figure 1 : Spokane Main Operation Center - Server Layout

 

Caching Layer (First Tier)

The router and/or security device is the first access point the browser hits. The firewall may be part of the router or an independent device.  The next traffic point is a caching device. The caching device has the ability to manage thousands of connections and serve web content requests on behalf of the web servers. Through this function alone, the caching device can take a substantial amount of the traffic off of the site's network at that point.

 

Front End Layer (Second Tier)

The next point is a traffic management device (load balancing server). This device has the ability to make intelligent decisions about which web server and/or application server is most suited to handle the next request. These decisions can be based on simple criteria such as which server is the most available, or the decision can be based on more complex criteria such as which e-commerce application server is holding the contents of a shopping cart.

 

Application Layer (Third Tier)

The next layer of the architecture is the application layer.  This layer will run a variety of specialty applications from the Dell line of versatile PowerEdge general-purpose servers and PowerVault storage solutions along with an extremely broad base of hardware, O/S and application support to build the core of the infrastructure.

 

Storage Layer (Fourth Tier)

In addition to PowerEdge servers and PowerVault fibre channel and SCSI storage, Dell offers Network Attached Storage (NAS) and Storage Area Network (SAN) solutions, high-speed server interconnects, and clustering technology to provide solutions from end-to-end in the Internet/intranet infrastructure.  We provide additional Storage facilities that enhance our redundancy of data for our service. The Magneto-Optical Drive provides storage in native Windows 2000 (NTFS) File Format with C2 Security at the file level.  A 1TB Tape Library provides an additional backup format for our system.

Backup Operation Center

The Utah facility will house the offsite backup servers, and act as our offsite development / test bed site for server and software enhancements.

The Utah building is an office with a floor capacity of 10,000 sq. ft. Our connectivity to the Internet for the backup site will be Dual DS3 (90MBps) capacity with the ability to expand up to OC12 (644MBps) connections. This office was developed to handle short period interruptions and development / test of platform enhancements.

Computer Systems

The Backup platform is located in Utah.  Designed similar to the Main Operation Center, the objective of the Offsite Backup is to provide an additional level of stability to our service platform. It can handle the same daily volume as the main center.

With this backup platform also designed to handle 6000 concurrent users per second with the ability to scale upwards as required the top level domain service will function 24 hours / seven days per week.   With the three different backup storage systems, we have provided additional data stability for our company. 

Primary Power Systems

Our Power systems at the Backup Center are in two levels.  Level 1 - Main Power will be provided with separate connections for the server room and the rest of the building, and Level 2 - Secondary Power will be provided to the servers through a backup generator that will keep the servers and all necessary network hardware operational to the Internet until the main power is restored.   

Uninterruptible Power Supply (UPS)

Advances in enterprise computing and storage technologies demand a change in enterprise power protection technology. Symmetra is a single unit composed of modular components. This modular architecture provides the foundation of building and scaling near-continuous availability power systems with a flexible range of power capacity. The Symmetra® Power Array combines with the complete line of APC datacenter protection software and accessories to provide the four most critical elements of total datacenter protection: redundancy, scalability, manageability and serviceability

Our backup datacenter will be protected by an APC Symmetra UPS System. First and Second Tier will have two UPS Systems providing backup to half the servers each. In the Third Tier each cluster will have a single UPS System. In the Fourth Tier, each storage facility will have a separate UPS System.

 

Figure 2 : Utah Backup Operation Center - Server Layout

 

Caching Layer (First Tier)

The router and/or security device is the first access point the browser hits. The firewall may be part of the router or an independent device.  The next traffic point is a caching device. The caching device has the ability to manage thousands of connections and serve web content requests on behalf of the web servers. Through this function alone, the caching device can take a substantial amount of the traffic off of the site's network at that point.

Front End Layer (Second Tier)

The next point is a traffic management device (load balancing server). This device has the ability to make intelligent decisions about which web server and/or application server is most suited to handle the next request. These decisions can be based on simple criteria such as which server is the most available, or the decision can be based on more complex criteria such as which e-commerce application server is holding the contents of a shopping cart.

Application Layer (Third Tier)

The next layer of the architecture is the application layer.  This layer will run a variety of specialty applications from the Dell line of versatile PowerEdge general-purpose servers and PowerVault storage solutions along with an extremely broad base of hardware, O/S and application support to build the core of the infrastructure.

Storage Layer (Fourth Tier)

In addition to PowerEdge servers and PowerVault fibre channel and SCSI storage, Dell offers Network Attached Storage (NAS) and Storage Area Network (SAN) solutions, high-speed server interconnects, and clustering technology to provide solutions from end-to-end in the Internet/intranet infrastructure.  We provide additional Storage facilities that enhance our redundancy of data for our service. The Magneto-Optical Drive provides storage in native Windows 2000 (NTFS) File Format with C2 Security at the file level.  A 1TB Tape Library provides an additional backup format for our system.

Network Connectivity

Network Routers

Cisco 7200 Series

The Cisco 7200 provides high-performance, density and availability with low per port prices. It also introduces industry-leading serviceability and manageability features.

The Cisco 7200 family delivers exceptional price/performance to meet distributed backbone and regional office requirements. Customers can now gain the advantages of high-performance network-layer switching and services, including security, quality of service, and traffic management to more locations throughout the Enterprise.

  • Benefits of the Cisco 7200 series routers include:
  • Accelerated services using PXF technology
  • Flexible Modular Interfaces including OC-3, DS-3, Fast Ethernet and Gigabit Ethernet, Packet Over Sonet and more
  • IP and ATM QoS/CoS
  • Modular design and small 3U footprint
  • MPLS VPN and Full L2TP Support
  • Feature Rich IP services and PPP termination support
  • Multiservice features support

 

Network Switches

Cisco 5000 Series

The new 2-port Gigabit GBIC uplink for the Catalyst 5000 Family allows voice and other mission critical traffic to be prioritized at the network edge, enabling end-to-end QoS solutions. It has advanced QoS capabilities like classification, WRED congestion avoidance, and multiqueue scheduling.

The new 24-port 100BaseFX SMF module provides high density, low cost, extended range connectivity for service providers. The QoS classification and WRED capabilities of this new module allow service providers to deliver differentiated services over the MAN.

Three recently introduced line cards for the Catalyst 5000 Family incorporate quality-of-service (QoS) classification and Weight Random Early Detection (WRED) drop-threshold management capabilities. The new modules allow users to classify traffic and also provide preferential treatment for priority traffic via WRED. The line cards are available in a 24-port 10/100 RJ-45 module, a 36-port 10/100 RJ-21 module, and a 24-port MT-RJ 100FX module.

The series features a Gigabit Ethernet and ATM-ready platform offering users high-speed trunking technologies including Fast EtherChannel® and OC-12 ATM. The Catalyst 5000 series also features a redundant architecture, dynamic VLANs, complete intranet services support, and media-rate performance with a broad variety of interface modules.

 

System Hardware

The hardware platform is based on Dell PowerEdge Servers and PowerVault Storage Systems and the tightly integrated third-party software to provide flexibility, reliability and stability of our TLD service now and in the future for the mission - critical service for the Internet.

Tier 1 - Cache Servers

Dell Power.App Cache 200 Servers

  • Pentium III 733Mhz Processor

  • 2GB RAM

  • 5 x 18GB 10,000 rpm Hard Drives

Tier 2 - Front-end Servers

Dell 2450 PowerEdge Servers

  • Load Balancing Server

  • Dual Pentium III 933Mhz Processor

  • 2GB SDRAM

  • 4x18GB Ultra 160 SCSI 10,000rpm Hard Drives

  • Internal Quad Channel 128MB Caching RAID Controller

  • External Quad Channel 128MB Caching RAID Controller

  • Two Intel Pro 100+ Dual Port NICS w/ Adaptive Load

  • Balancing and Adaptive Fault Tolerance

  • Intel Pro 1000 Gigabit NIC

  •  Dual Fiber Channel Controller

  • 3000VA UPS

 

Tier 3 - Application Servers
Operation Center
12 servers in four clusters of 3 
(2 DNS, 2 SQL)
Backup Center
6 Servers in two clusters of 3
(1 DNS, 1 SQL)

 

Dell 6450 PowerEdge Server

  • Quad Pentium Xeon Processor w/2M Cache

  • 4GB SDRAM

  • 4x18GB Ultra 160 SCSI 10,000rpm Hard Drives

  • Internal Quad Channel 128MB Caching RAID Controller

  • External Quad Channel 128MB Caching RAID Controller

  • Dual Fiber Channel Controller

  • 3000VA UPS

 

Tier 4 - Storage Servers

Dell PowerVault SAN Storage

  • 720GB Storage Space ( Max 34TB)

  • Storage Virtualization

  • Remote Mirroring (onsite and offsite)

  • Point - in - Time Copy

  • 3 Way Mirroring

  • Operating System (Online Copy) Bootable from SAN

  • Fibre Channel HBA

Dell PowerVault 760N - NAS Storage

  • 600Mhz RISC Processor

  • 1GB RAM

  • 4 x 180GB PowerVault 700N Fibre Channel Disk Arrays

Dell PowerVault 130T Tape Library - DLT7000

  • 4 Drives

  • 28 DLT 40GB Tapes

  • Uncompressed 1.05TB Storage Capacity

  • Compressed 2.1 TB Storage Capacity

Pinnacle Micro Jukebox Peak 1340

  • 1340GB Maximum Capacity

  • 258 Discs

  • 6 Drives with a Dual Picker

Office Server Network

Dell 4400 PowerEdge Servers

  • Dual Pentium III 933Mhz Processor

  • 1GB SDRAM

  • 216GB Ultra 160 SCSI 10,000rpm Hard Drives

  • Internal Quad Channel 128MB Caching Controller

  • External Dual Channel 128MB Caching Controller

  • Two Intel Pro 1000 NICS

  • Two Intel Pro100+ Dual Port NICS

  • Fibre Channel - Dual , FibOpt. HBA

 

Desktops

President, VPs, Directors

Dell Optiplex GX110

  • Pentium III 866Mhz Processor

  • 256MB SDRAM

  • 16MB Video

  • 20GB and 30GB Hard Drives

  • Windows 2000 Professional

  • 19" Ultrascan Monitors

  • 10/100 Ethernet Connection

  • 20/48x CDROM and 8/4/32x CDRW

  • HP ScanJet Color Scanner

  • HP LaserJet 1100e

 

General Management

Dell Optiplex GX110

  • Pentium III 800Mhz Processor

  • 256MB SDRAM

  • 16MB Video

  • 2x 15GB Hard Drives

  • Windows 2000 Professional

  • 17" Ultrascan Monitors

  • 10/100 Ethernet Connection

  • 20/48x CDROM

 

Information Technology Staff

& Monitoring Workstations

 

Dell Precision 420 Workstations

  • Pentium III 800Mhz Processor

  • 256MB RDRAM

  • 32MB Video ( Dual Monitor capable)

  • 40GB HD

  • Windows 2000 Professional

  • Dual 17" Ultrascan Monitors

  • 10/100 Ethernet Connection

 

Development Stations

For Web Designers, Programmers

 

Dell Precision 420 Workstations

  • Dual Pentium III 866Mhz Processor

  • 512MB RDRAM

  • 32MB Video ( Dual Monitor capable)

  • 2x 36GB HD Ultra 160 (10,000rpm)

  • RAID 1 - Redundancy

  • Windows 2000 Professional

  • Dual 19" Ultrascan Monitors

  • 10/100 Ethernet Connection

  • 20/48x CRDOM and 8/4/32X CDRW

  • Iomega 250MB Zip Drive

 

Standard Desktops

Dell Optiplex GX 110

  • Pentium III 733Mhz Processor

  • 128MB SDRAM

  • 16MB Video

  • 15GB Hard Drive

  • Windows 2000 Professional

  • 17" Monitors

  • 10/100 Ethernet Connection

  • 20/48x CRDOM

 

Standard Office Notebooks

Inspiron 3800

  • Pentium III 600Mhz Mobile Processor with SpeedStep
  • 128MB RDRAM
  • 10GB Hard Drive
  • 8MB Video
  • 14.1" LCD Screen
  • 8x DVD ROM
  • Windows Millennium
  • Xircom 10/100 Ethernet Connection
  • Internal Modem v.90 56K

 

System Software

The software platform is based on Microsoft.NET Platform and the tightly integrated third-party software to provide a flexibility, reliability and stability of our TLD service now and in the future for the mission-critical service for the Internet.  (Appendix : Software Overview Guides)

 

Registry Server Platform

Operating System
  • Microsoft Windows 2000 Datacenter Server
Mission-critical Applications
  • Microsoft SQL Server 2000 Enterprise Edition

  • Microsoft Site Server 3.0 Commerce Edition (Commerce Server 2000 Replacement)

  • Microsoft Application Center Server 2000

  • Shift4 NetEnterprise Card Transaction Software
System Backup and Security
  • Microsoft System Management Server 2.0

  • Microsoft Internet Security and Acceleration Server 2000

  • Veritas Volume Manager for Windows 2000

  • Veritas NetBackup DataCenter for Windows 2000

  • Optistorm for Windows 2000

 

Office Server Platform

Operating System
Applications
  • Microsoft Windows 2000 Server
  • Microsoft BackOffice Server

Workstation and Desktop Platform

Operating Systems
Applications
  • Microsoft Windows 2000 Professional
  • Microsoft Office 2000 Professional

Development Platform

Microsoft Developers Network
  • Visual Studio Enterprise Edition

  • Microsoft Office Developer's Edition

  • BackOffice Developer's Edition

  • Microsoft Platform Operating Systems

  • Microsoft Platform SDKs and Technical Library
Applications
  • Microsoft Active Directory Services Interface 2.5 toolkit

  • Rational SiteLoad Website Testing Software

  • Rational TestStudio 2000

  • Rational PerformanceStudio 2000

 

Levels of Security

We have 24 hour / seven day security, including both physical and server teams that will minimize security issues.

Physical Security Levels

Level 1 Outer Building and Foyer
Level 2 Internal General Staff Area
Level 3 Senior Management, Technology and Security Areas
Level 4 Server Rooms

Information Security Levels

Level 1 General Staff
Level 2 Operational Confidential
Level 3 Management Confidential
Level 4 Security Confidential

D15.2.2 - Registry - Registrar Model

Our Service Model for the registration of Domain Names has been developed to bring stability to the new top level domain and provide competitive environment for the growth of the TLD string into the future.

Phase 1 - Initial Setup (2001-2003)

On initiation of the TLD domain our company will manage both the Registry Operations and Registrar Operations with no other Registrars being created. This will give our company time to establish the TLD and build a future secure gateway for multiple registrars. 

Phase 2 - Expansion and Growth (2003 and beyond)

After the Initial Development phase is completed, our company will diverge into three distinct companies, (1) To control Policy and Administration, (2) Registry and Enforcement Operations, and (3) End-user Registration Service. At this time the Registry Company will expand the existing registrar model by calling for and accrediting new registrars for the TLD Global Expansion.

D15.2.3 - Database Capabilities

The Software Platform that has been chosen for its scalability and reliability includes the Microsoft SQL Server that will provide the Database Platform for the TLD. Using SQL Server we can scale with our cluster platform into terabytes of storage space. It provides a simple platform for development with Visual Studio Tools.

Client Records

All records are stored within the SQL Database.  Customers will have access to their records through a secured webpage to change any information contained on their account.  For Changes in Ownership of the Account, written documentation or authenticated digital documents must be forwarded to the assigned registrar for verification before account ownership changes can be effected.  All changes are logged for auditing purposes and security of information.

Grace Period

All changes to the location of the domain within the Internet will take 72 hours to cycle through the nameservers on the Internet. All other changes (name, address, technical contact, etc.) are update in within an hour of processing.

Database Development Process

The Development Process outlined below has been developed to maximize stability of software code and changes, and to minimize the effect of the development.

Phase 1 - Concept Mapping

For development of the database or changes in the existing database, each proposed change must be mapped and approved by the Board before commencement of project development.

Phase 2 - Development and Software Testing

Once project approval has been given, staff resources are allocated to develop the changes or software relating to the project. After the initial project software code has been developed, it then is tested with our advanced software and performance tools.  At this time any problems with the software code will be corrected and then tested again until all parts of the software code perform within the desired performance and load factors.

Phase 3 - Load and Performance Testing

After the development team has completed the development phase, a separate team will then re-test the software code for load and performance.  At this time any problems in the software will be returned to the developers for changes and then the code will be re-tested. Once completed, tested and passed, the code changes may be implemented.

Phase 4 - Migration and Update

The system administrator and other administrators associated with the implementation of new changes or software will migrate the existing system without any downtime to service.

 

Domain Whois and Order Process

This diagram illustrates a customer purchasing a new domain name or sub-domain name, either as an existing domain account holder or new account holder.  The name is held pending approval through the payment process; during this time the global whois service will show that the name has been taken.  When the name is cancelled, the name is then released, thus opening that name for repurchase.  Upon payment approval the name will be held for that account holder for the term selected.

Figure 3 : Domain Whois and Order Process

Website Frontpage

Front access for the general public to our services, and the gateway for progressive domain holder access to our registration service.

Whois / Search

The first step to register a new domain or sub-domain is to make sure the name is vacant and fits within the restricted use of this Top Level Domain service.

Whois Results

This displays the results of the search on the Domain Database. If the proposed name is in use, a registrant can search for another name; if the proposed name is not in use, then the system will proceed to the next step in the registration process.

Registration Agreement

Finding a valid name to register, the customer then reads the domain registration agreement that defines the domain holder rights and the registrar rights.

Agree With Registration Agreement

After accepting the Registration Agreement, the customer will continue to the next step in the registration process as (a) New Account or (b) Existing Account .

The customer may elect to disagree with the Registration Agreement by clicking, " No, Return to Frontpage," and proceeding back to the front page of our web service.

New Accounts

A general outline of the information contained within the application for domain registration (General Awareness Page).

Application Form

This page contains all of the information needed to open a new domain holder account, and additional fields for our search engine and Intellectual Protection Policy.

Existing Account

To access an existing domain holder account the customer will need to provide the email address, account number and domain. The account number provides secure access to account information.

Verify Information

After accessing account information for the Database, the customer will verify the information and continue to the next step of registration.

Confirm

After confirmation of information, the account will hold the requested domain name pending approval of domain purchase. This will prevent duplicate domain registration and will provide real-time updates to the whois / search engine service.

Shopping Cart

This provides the ability to shop for more domains and/or sub-domains and vary the terms for each domain or sub-domain. To add additional domains the customer must start the process over and accept again to the Registration Agreement. The customer then progresses to the next step of choosing to (a) Cancel Order or (b) Order Domains.

Cancel Order

Upon cancellation of an order the "hold pending approval" will be removed and the domain name may be repurchased by another prospective holder.

Order

Upon selecting "Order Now," the customer will proceed to the next step for Payment Processing of the domain purchase(s).

Payment Information

The purchaser will provide all necessary information to process the credit / debit card for the purchase of the selected domain(s) and/or sub-domain(s).

 

Card Authorization

Our company then requests a card authorization for payment through our card transaction engine  (See Appendix : Software -Shift4 NetEnterprise Software) .

Declined

If the card authorization is declined, the "hold pending approval" will be removed and the domain name may be repurchased by another prospective holder.

Confirmation Page "Approved"

Upon approval of card authorization the "hold pending approval" will change to approved status and the domain(s) and/or sub-domain(s) will process to the nameservers at the next update. Our Customer Service Standard is 72 hours from purchase of the domain name.


Domain Account Maintenance

Change of Domain Information
When changing the ownership of a domain name the legal documents and/or proof of purchase must be sent to the registrar before the registrar can change the ownership. After the change a letter will be sent to the new and old owners. The changes for Billing, Technical and Address information can be changed through the registrar website. Account holders will have access through a secure webpage by using their account number and billing email address.

Figure 4 : Domain Account Maintenance

 

Website Frontpage

Front access for the general public to our services and the gateway for progressive domain holder access to our registration service.

Domain Management Center

This area provides the account access to change information relating to an account. To access an existing domain holder account the holder will need to provide the email address, account number and domain. The account number provides secure access to the account information.

Account Records

Information regarding the request account will be displayed from the Top Level Domain SQL Database.  The holder will then choose (a) change of ownership or (b) change of any other information relating to the account.

Change Ownership

When changing ownership the existing domain holder must contact the registrar and provide official documents of transfer (minutes within a corporation, letter from owner, etc.)

Verification Ownership change to new owner

Once the registrar receives the documents regarding transfer of ownership, the registrar will contact the existing domain holder and verify the information contained within the documents.

Confirmation of changes

The registrar will then update the ownership of the account and provide the existing holder with the transfer code.

Letter of Change of Ownership

The registrar then sends a letter to the existing domain holder address finalizing the transfer of account, and sends a letter to the new domain holder with information regarding the new account and access number.

Verify Technical, Billing, Address Information

The existing account holder will verify all information regarding to the account, and then proceed to the next step of updating the account information.

Change for Technical, Billing, Address Information

The existing account holder then updates the Technical, or Billing or Address Information relating to the account.

Confirmation of Changes

Upon confirmation of the updates relating to the domain account, the Top Level Domain SQL Database and nameservers will be updated.

Email Changes

Upon confirmation of technical, billing or address changes to the domain account, the owner will receive a confirmation email.

 

D15.2.4 - Zone File Generation and Backup

All Domain Account Records are stored in the SQL Database.  Regularly throughout day, the database administrator executes the DNS filter that transfers all approved and changed domain account files through the Active Directory Interface Gateway to the nameservers.  As a backup to this gateway a second filter will transfer the same file information to a backup Nameserver text file. (Appendix  - Software - Active Directory Overview)

The SQL Server provides additional features over the current Domain Naming System. It provides a two tier system that maintains the service 24 hours / seven days per week. For our customer service standards the grace period for publishing a domain name to the Internet will be 72 hours.  This period will provide a good customer service while covering for any unforeseen problems that might occur.

 

 

Figure 5: Zone File Generation and Backup

SQL Database Servers

The SQL Database stores all the information required to update the nameservers about the domain or sub-domain under our TLD.

Active Directory Interface Gateway

The gateway receives the records from the SQL Database and filters the required fields for updating the nameserver through the Windows 2000 Active Directory Service

Manual Update DNS File

As a backup to the gateway we will also create a master text file from the SQL Database for our nameservers.

Domain Nameserver

The Nameservers are the depository for the domain name information for all the domains and sub-domains within our TLD, and provide the updating information to the Internet.

Publish to the Internet

The Nameservers will publish the updated domain name master file to the Internet on a regular basis throughout the day.

 

D15.2.5 - Zone File Distribution and Publication

Once the account record files have been successfully transferred to the nameservers, the nameservers will update the root server and the Internet regularly throughout the day.

For our customer service standards, the grace period for publishing the domain name to the Internet will be 72 hours.  This period will provide a good customer service while covering for any unforeseen problems that might occur.

Our company can also manage the root server for this restricted Top Level Domain for the Internet. Therefore, Internet Corporation for Assigned Names and Numbers (ICANN) can trial a "proof of concept" with a privately held root server for one domain.  The root server would be part of the sponsoring organization for this Top Level Domain.

 

Figure 6: Registry Flow Diagram

SQL Database Servers

The SQL Database stores all the information required to update the nameservers about the domain or sub-domain under our TLD.

Active Directory Interface Gateway

The gateway receives the records from the SQL Database and filters the required fields for updating the nameserver through the Windows 2000 Active Directory Service

Manual Update DNS File

As a backup to the gateway we will also create a master text file from the SQL Database for our nameservers.

Domain Nameserver

The Nameservers are the depository for the domain name information for all the domains and sub-domains within our TLD, and provide the updating information to the Internet.

Publish to the Internet

The Nameservers will publish the updated domain name master file to the Internet on a regular basis throughout the day.

 

D15.2.6 - Billing and Collection System

Our company has decided to build our payment system on a global credit / debit card platform. All of our domain account records are stored within a SQL Database that provides a robust platform to auto bill clients for renewals and manage the large volume of accounts. Our credit card gateway provides the ability to authorize all major payment types and provide tools for tracking and auditing the process.

Figure 7 : Renewal of Account Process

Sent Electronic Invoice to Account Holder

At the end of the current term for each account our system will generate an email to the Billing Contact for each account, requesting the account be updated. Within the email we will provide access to our Secure Online Payment Page for account holders.

Access Online Payment Secure Page

This page provides account access to pay fees associated with the account. Accessing an existing domain holder's account will require the email address, account number and domain name. The account number provides secure access to the account information.

Verify Account Information

The existing account holder information is displayed. The existing account holder will verify all information regarding to the account, and then proceed to the next step of payment for renewal fees associated with the account.

Payment Options and Terms for Payment

The account holder will provide all necessary information to process the credit / debit card for the renewal fee of the selected domain or sub-domain. At this time the account holder can change the length of term from single-year terms to five-year terms.

Changes to Account (at time of renewal) Call Registrar

When changing any details regarding the existing account at the time of payment, the domain holder must contact the registrar and provide the changes relating to the operation of the account. Changes regarding ownership of a domain require official documents of transfer (minutes within a corporation, letter from owner, etc.) to be furnished to the registrar before any transfer can take place.

Card Authorization Sought

Our company then requests a card authorization for payment through our card transaction engine  (See Appendix: Software -Shift4 NetEnterprise Software).

Declined

If card authorization is declined, the account will remain approved until the expiration of the term for the account, and then the domain will be removed from the nameserver.

Card Approved

Upon approval of card authorization, the domain account will remain on approved status, and any changes to the account will process to the nameservers at the next update. Our Customer Service Standard is 72 hours from processing.

 

D15.2.7 - Data Escrow and Backup

Data Escrow

The escrow of data for all registrations of our TLD will be secured, stored and managed by our company. We have the responsibility for the reliability of the information to all functions under this TLD service. Below outlines the various software and procedures that we will employ to maintain the data store.

Backup Process

Regular database replication and mirroring with the Backup Server onsite and offsite throughout the day will provide stability within our system. At the Main Operation Center, database mirroring will occur hourly to the backup servers and every four hours to the offsite Backup Center.

Complete system backup to Tape Library and MO Jukebox will occur every twelve hours.  This will provide consistent data backup to prevent major data loss to the service.

Database and System Backup Software

Our storage facilities for the Main Operation Center and Backup Center provide for two different backup systems. First, we have a Tape Library Backup to copy all SAN Storage Space where the SQL Database  and DNS Service are stored.  Veritas NetBackup DataCenter Software provides Enterprise Level Tools for Data Backup and Disaster Recovery.

 

Tape Backup Autoloader Library

Veritas Software Key Features :

  • Unlimited Scalability

  • Platform Independence

  • Centralized, Policy-Based Administration

  • Unparalleled Performance

  • Transparent, Nondisruptive Backups

  • Leverage the Latest Storage Hardware

 

Secondly, we have a Magneto-Optical (MO) Jukebox Storage to provide additional backup. KOM  Optistorm Software will administrate the MO Jukebox and provide enterprise tools for large scale storage.

Magneto - Optical Jukebox

KOM Optistorm Key Features :

  •  Rewritable Media

  • Scalable

  • 100% True NT File System

  • File Level NT Security

  • Accessible by Windows Explorer

 

 

D15.2.8 - Public accessible look-up / Whois service

With our structure for registration and management of the TLD Service, the public will have access to lookup / whois through the SQL Database. This provides security for the service and flexibility for growth, and reduces the duplication of information of our TLD.  With the SQL Database we can provide additional services such as a search engine allowing the public to find websites under our TLD.

We will provide FREE Whois Web Interface for all other registries and registrars that operate on the Internet System. As our system is developed off our SQL Database and not the DNS Servers, it may not be compatible with current whois services from other TLD vendors.

 

D15.2.9 - System Security

Operating System Security

Active Directory Service supports multiple security authentication protocols such as Kerberos, X.509 certificates, and Smart Cards to facilitate extranet development. The Active Directory approach to authentication also makes it easy to extend to additional authentication protocols. Once a user has authenticated to Active Directory, authorization is performed in a consistent fashion across files, applications and other resources.

Firewall Security

Microsoft Internet Security and Acceleration Server 2000 has a complete feature set for securing and accelerating the Internet. ISA Server provides enterprise security though a multi-layer firewall, fast access with a high performance Web cache, and integrated management capabilities that simplify and reduce the cost of managing internetworking.

Enterprise Security
Connecting networks and users to the Internet introduces security and productivity concerns. ISA Server has features that provide organizations a comprehensive means to control access and monitor usage. ISA Server protects networks from unauthorized access, inspects traffic, and alerts administrators to attacks.

Multi-layer firewall
Networks can be threatened in a variety of ways.  The multi-layer firewall maximizes network
security with packet, circuit, and application-level traffic screening to reduce the risk of unauthorized
access.

"Smart" application filters
ISA Server smart application filters recognize content and apply policy as the content traverses the network. The filters control application-specific traffic, such as electronic-mail and streaming media, with data-aware filters to enhance security. ISA Server can take advantage of Active Directory™ policy-based management features.

Dynamic IP filtering
By restricting access to an as-needed basis and opening ports only for active sessions, ISA Server
reduces the risk of external attacks.

 

Physical Security

The server room is a locked rooms that can be accessed by only the President, Executive Vice President, Vice President of Registration, and Backup Center Manager of IT.  In addition, a server key kept onsite within Security will allow system administrators to gain access by request to Security.  This provides limits on access to the server room and secures the servers from possible data corruption and damage. For system administrators to gain access they must request access from either the VP of Registration, Backup Center Manager, or the security officers on duty. They will monitor all server hardware maintenance or other hardware issues.

D15.2.10 - Peak Capacities

The hardware and software platform has been designed for the capacity of 6000 concurrent users per second, with the ability to increase within the first six months to 24,000 concurrent user per second. This capacity is 50% higher than the average usage of the Network Solutions, Inc. (NSI) website. Our platform can expand to the needs of our client base and the needs of the Internet without loss of stability of service.

 

  • The Hardware Platform has tier levels, clustered servers, full backup onsite and offsite.

  • Individual Enterprise UPS (uninterruptible power supply) Systems for both centers.

  • Network Connectivity has redundant connections within the centers and to the Internet.

  • The Platform has a cluster operating system, database, enterprise firewall protection, and DataCenter management and backup services.

 

D15.2.11 - System Reliability

When our system was designed we decided on clusters to maximize reliability of the hardware and software platforms. It allows our company to replace a server without loss of operational time, and provides the ability to expand the cluster into four nodes (currently three nodes).

Our hardware is monitored 24 hours / seven days per week by in-house system and database administrators. We have 24 hour / seven day per week service with four-hour response time from our hardware vendor for three years, and our enterprise software platform has unlimited tech support.

D15.2.12 - System outage prevention

First, the system at the Main Operation Center has dual platforms for backup and redundancy, safeguarding the loss of one server or cluster of servers. Secondly, the Backup Center is an offsite facility to provide backup for the main center when there is a major loss of operations (e.g., loss of Internet connection).

Our Company has designed the service not to fail unless both centers are disrupted, and by the end of the first year of operation our company has planned to add a third center to our platform, thus providing additional stability to our service.

D15.2.13 - System Recovery Procedures

Our system design provides dual server storage, secondary network storage, dual tape libraries and magneto-optical jukebox storage. This design provides three different storage facilities that provide full redundancy to our data.

We have two identical systems within the Main Operation Center that auto-detects problems within one system and switches to the backup system. This provides a continuation of service without loss of service.

We have completely independent Backup Center that will provide additional backup to the main center, in the event of the main center being completely shutdown through man-made or natural disasters.

At both centers will have 24 / 7 Technology Staff monitoring the servers.  If the system fails the on-duty systems administrator will ascertain the problem, inform the senior systems administrator and Vice President of Registration & Information Technology. They will take all steps necessary to ensure our service to the Internet is restored as quickly as possible.  All of the servers have a 24 hour / 7 days per week Response Hardware Tech Support within four hours through the system provider. 

 

D15.2.14 - Technical and Other Support

We recognize that support for our services provides good customer service to our domain holders and potential domain holders. Our First Level Support will come from our website that will have  "How-to" Files, Frequently Asked Questions and all company-related policies for registration and maintenance of a domain name account. Our Second Level Support will be two customer service sections. These sections are located within the Data Centers.

As our service has be developed for a global audience we will provide all material on the website in multiple languages. At the Customer Service Sections, we will endeavor to provide multiple languages support for our telephone customers.

 

D15.3 - Subcontractors

At this time, IEI does not plan to subcontract; instead all aspects of registry function will be provided in-house.