nanog mailing list archives

Re: Backbone Infrastructure and Secrecy


From: "Peter Galbavy" <peter.galbavy () knowtion net>
Date: Thu, 10 Jul 2003 09:31:17 +0100


Gil Levi wrote:
While it is impossible to stop someone (a terrorist) from cutting
fiber, it is possible to limit his ability to do damage. It is
possible to create alternative routes to be used in such cases. Then
while the primary route may be down, the alternate route will be used
and no terrorist should be able to locate the alternative route since
this is something known only to the telecom carrier and is definitely
not public knowledge. While this is not new to anyone, what is new is

I am sure you have direct experience of networks that work like this. I have
direct experience of the opposite. I am sure there is a whole bell curve
distribution from bad to good - and sadly the point the bell curve tries to
make it that most occurances are in the middle...

Peter


Current thread: