North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Backbone Infrastructure and Secrecy

  • From: Peter Galbavy
  • Date: Thu Jul 10 04:34:19 2003

Gil Levi wrote:
> While it is impossible to stop someone (a terrorist) from cutting
> fiber, it is possible to limit his ability to do damage. It is
> possible to create alternative routes to be used in such cases. Then
> while the primary route may be down, the alternate route will be used
> and no terrorist should be able to locate the alternative route since
> this is something known only to the telecom carrier and is definitely
> not public knowledge. While this is not new to anyone, what is new is

I am sure you have direct experience of networks that work like this. I have
direct experience of the opposite. I am sure there is a whole bell curve
distribution from bad to good - and sadly the point the bell curve tries to
make it that most occurances are in the middle...

Peter