Backbone Infrastructure and Secrecy

Peter Galbavy peter.galbavy at knowtion.net
Thu Jul 10 08:31:17 UTC 2003


Gil Levi wrote:
> While it is impossible to stop someone (a terrorist) from cutting
> fiber, it is possible to limit his ability to do damage. It is
> possible to create alternative routes to be used in such cases. Then
> while the primary route may be down, the alternate route will be used
> and no terrorist should be able to locate the alternative route since
> this is something known only to the telecom carrier and is definitely
> not public knowledge. While this is not new to anyone, what is new is

I am sure you have direct experience of networks that work like this. I have
direct experience of the opposite. I am sure there is a whole bell curve
distribution from bad to good - and sadly the point the bell curve tries to
make it that most occurances are in the middle...

Peter




More information about the NANOG mailing list